For Security Engineers, SOC Analysts, and IT Administrators Who Configure Defender for Endpoint, Intune Security Policies, and Endpoint Hardening
Endpoint Security Engineering
The Mission: Build an Endpoint Security Stack That Survives Both Production Users and Real Adversaries
Every M365 E5 customer has Defender for Endpoint. Almost none have tuned it beyond defaults. No ASR rules in block mode. Default AV policy. No custom detections. No forensic readiness. No device control. This course closes that gap — and extends beyond MDE into the OS internals, cross-platform considerations, and adversary tradecraft that a complete endpoint security engineer needs to understand. You will learn not just what to configure, but what attackers do to bypass it, and how to validate that your controls actually work. Every configuration includes blast radius analysis, testing methodology, and production deployment strategy.
The Endpoint Security Engineering Framework
Every configuration decision in this course runs through three questions:
1. What does this control actually block? Not what the documentation says it blocks. What happens in production when real users with real applications hit this control. Every ASR rule, every AV setting, every compliance policy is tested against realistic production scenarios before deployment.
2. What breaks when you enable it? Every security control has a blast radius. ASR rules block legitimate line-of-business applications. Compliance policies lock users out of corporate resources. AV exclusions create security gaps. This course teaches blast radius assessment before deployment — not after the help desk is overwhelmed.
3. How do you validate it is working? A configured control is not a working control. Every policy needs a validation method — a KQL query, an Atomic Red Team test, a health dashboard that proves the control is doing what you intended. Configuration without validation is security theatre.
Who this course is for
Security engineers responsible for the endpoint security stack but operating with mostly default configurations. You know MDE exists. You know ASR rules exist. You have not deployed them in block mode because you do not know what will break. This course gives you the methodology to deploy confidently.
SOC analysts who investigate MDE alerts daily but have no input into how the protection layer is configured. You want to move from consumer of endpoint telemetry to engineer of the endpoint stack that generates it.
IT administrators who manage Intune and need to understand the security policies they deploy at a deeper level — not just which buttons to click, but why those settings matter and what happens when the attacker encounters them.
IR practitioners who depend on endpoint telemetry and want to ensure the forensic readiness and detection coverage they rely on is actually configured. This course builds the foundation that Practical IR and Incident Triage depend on.
Who this course is not for
Certification preppers. This is not an SC-200 study guide or a portal walkthrough. It is an operational engineering course. If you want to pass a certification exam, use a certification prep course. If you want to build an endpoint security stack that survives contact with real adversaries, use this course.
Deep forensic investigators. Practical IR and Linux IR cover full forensic analysis. This course covers forensic readiness and artifact collection — ensuring evidence exists when the incident happens, not deep analysis and timeline reconstruction.
Complete beginners. This course assumes familiarity with the MDE portal and basic KQL. If you are new to KQL, complete Mastering KQL first. If you have never used the MDE portal, start with SOC Operations or M365 Security Operations.
Built on Northgate Engineering — not abstract examples
Every configuration, every detection rule, every deployment decision in this course is built for Northgate Engineering — an 810-person precision manufacturing company with 865 Windows endpoints (Windows 11 23H2), 12 Windows servers (4 DCs, 2 SQL, 2 IIS, 2 file servers, 2 application servers), 8 Linux servers (6 RHEL manufacturing, 2 Ubuntu web), 520 mobile devices, M365 E5 licensing, Intune management, and BlueVoyant as managed SOC partner. Current state: MDE onboarded on 90% of endpoints, everything else at default. Target state: complete endpoint security architecture — 100% onboarded, ASR enforced, AV tuned, EDR optimised, 20+ custom detections, compliance-driven conditional access, forensic readiness validated, servers and Linux covered, vulnerability management operational, monitoring and governance in place.
What you will be able to do
1. Deploy MDE at enterprise scale with validated onboarding across Windows, Linux, macOS, servers, and VDI — achieving 100% sensor coverage with device health monitoring that catches devices that silently fall off.
2. Configure and enforce all ASR rules using the audit-first methodology: deploy in audit mode, analyse audit data with KQL, build exclusion sets for legitimate applications, and graduate to block mode with confidence. No guessing. No breaking production.
3. Engineer Defender Antivirus beyond defaults — cloud protection levels, behavioral detection, ransomware protection, controlled folder access, and role-specific server configurations with blast radius analysis for every setting.
4. Build 20+ custom detection rules in MDE using KQL, covering credential access, lateral movement, persistence, and defense evasion. Each detection includes automated response actions, Atomic Red Team validation, and the monthly review process that keeps detections accurate.
5. Hunt proactively across all endpoint tables with 40+ production KQL queries organised by ATT&CK tactic. Build the hunt-to-detection pipeline that converts hunting findings into automated detection rules.
6. Deploy complete forensic readiness — advanced audit policies, PowerShell logging, Sysmon, Windows Event Forwarding, KAPE, Velociraptor, OSQuery, and Windows LAPS. When the incident happens, the evidence already exists.
7. Understand evasion from the defender's perspective — process injection, AMSI bypass, ETW tampering, EDR evasion, and anti-forensics. Build detections that survive evasion evolution because they target behavior, not artifacts.
8. Extend endpoint security across platforms — Windows servers, Linux (Defender for Linux, eBPF, Sysmon for Linux), macOS, and VDI environments. CIS Benchmarks for server hardening. Cross-platform unified hunting.
9. Integrate with zero trust architecture — device compliance driving conditional access, MDE risk signals in Entra ID, Sentinel cross-workload correlation, Logic App automation playbooks, and MDE API programmatic management.
10. Produce a complete, deployable architecture document — every configuration, every decision, every exception, every monitoring query, every governance procedure. The artifact you take to your own environment.
Course at a glance
Modules: 16 (ES0–ES15) across 4 phases
Interactive labs: 16 (one per module — assessment simulators, configuration workshops, detection exercises)
Custom detection rules: 20+ production KQL rules with Atomic Red Team validation
Hunting queries: 40+ organised by ATT&CK tactic
Format: Written content — production KQL, PowerShell, Intune configurations, SVG diagrams, interactive labs, worked artifacts, knowledge checks
Free content: ES0–ES1 (2 modules) — no account required
Paid content: ES2–ES15 (14 modules) — Premium or Team subscription
Platform: Microsoft Defender for Endpoint (P2), Intune, Sentinel, Entra ID
Built by Ridgeline Cyber
Ridgeline Cyber Defence builds security operations training grounded in practical and operational experience. The team behind this course runs CSOC operations across on-prem, Splunk, and Microsoft 365 security stacks, Cisco and Palo Alto networks, and managed SOC partnerships.
Experience spans endpoint security engineering, detection engineering, incident response, and DFIR investigation across on-prem, M365, and Linux environments — including configuring and tuning MDE across enterprise fleets, building custom detection rules, and validating endpoint security controls against real attack techniques.
The configurations, detection rules, and deployment methodologies in this course are drawn from that operational work — adapted for training but grounded in production endpoint security engineering.
Technical requirements
Microsoft 365 E5 tenant: Recommended for hands-on configuration. A free M365 E5 developer tenant provides MDE P2, Intune, Sentinel, Entra ID, and Defender for Office 365. ES0 provides complete lab setup guidance. The course is completable without a tenant using provided screenshots, pre-generated KQL results, and sample data sets.
Windows 11 VM: For endpoint-specific exercises — KAPE collection, EZ Tools parsing, Sysmon deployment, Atomic Red Team testing. VMware Workstation Pro (free) with the Windows 11 Evaluation ISO (free, 90-day).
Ubuntu VM: For Linux endpoint security exercises — Defender for Linux deployment, Sysmon for Linux, eBPF verification. Any Ubuntu 22.04+ or RHEL 8+ system.
KQL proficiency: Basic KQL is required — where, summarize, project, join. If you are new to KQL, complete Mastering KQL (K0–K3 minimum) first.
MDE portal familiarity: You should know how to navigate the device page, incident queue, and Advanced Hunting interface. SOC Operations, M365 Security Operations, or production MDE experience is sufficient.
No third-party paid tools required. MDE, Intune, Sentinel, and Entra ID are included in the M365 E5 developer tenant. All complementary tools (Sysmon, KAPE, EZ Tools, Velociraptor, OSQuery, Atomic Red Team, WinPMEM) are free.
Course Syllabus
Four phases. Sixteen modules. ES0–ES1 are free — no account required.
Free Phase 1 — Foundations
ES0Phase 2 — Protection Engineering
ES2Phase 3 — Detection and Response
ES7Phase 4 — Advanced and Operations
ES11Prerequisites
Required:
Basic KQL — Mastering KQL K0–K3 minimum. You need to be comfortable with where, summarize, project, join, and time functions.
Familiarity with the MDE portal — from SOC Operations, M365 Security Operations, Practical IR, or production experience. You should know what the device page, incident queue, and Advanced Hunting interface look like.
Recommended but not required:
Entra ID Security — conditional access and device identity integration (connects directly to ES3 and ES14).
Detection Engineering — detection methodology that this course applies to endpoint-specific tables (connects to ES8).
Practical IR — investigation methodology that depends on the forensic readiness this course builds (connects to ES11).
Where this course fits
The other Ridgeline courses use Defender for Endpoint. This course teaches how to build the endpoint foundation those courses depend on:
Detection Engineering assumes endpoint telemetry is flowing. This course ensures it is.
Practical IR assumes forensic readiness is configured. This course builds it.
Incident Triage assumes the endpoint stack generates reliable alerts. This course engineers the stack.
Threat Hunting assumes endpoint data exists to hunt against. This course ensures collection, retention, and enrichment are operational.
Learner ladder: Entra ID Security (identity layer) → Endpoint Security Engineering (endpoint layer) → Detection Engineering (detection layer) → SOC Operations (operational layer)
Support and community
Questions about course content: training@ridgelinecyber.com
Billing and account management: Self-service via your account page or training@ridgelinecyber.com
LinkedIn: Follow Ridgeline Cyber for operational security content, course updates, and new module announcements
Usage rights and disclaimer
Course materials: Licensed for individual professional development. You may deploy configurations, detection rules, scripts, and policies from this course in your organization's production environment. You may not redistribute course content, share account credentials, or republish course materials.
Endpoint security configurations: All Intune policies, KQL queries, detection rules, Sysmon configs, and automation playbooks are provided as-is for deployment in your environment. Test every configuration in audit mode before enforcement. Security controls have production impact — validate blast radius before deployment. Ridgeline Cyber Defence is not responsible for operational impact from deployed configurations.
Fictional environment: All scenarios use the fictional Northgate Engineering environment. Any resemblance to real organizations, incidents, or individuals is coincidental. IP addresses use RFC 5737 documentation ranges.
Version and changelog
Current version: 1.0 | Last updated: 2026
2026 — v1.0: Course launch. 16 modules (ES0–ES15) across 4 phases. Complete endpoint security engineering from OS internals through architecture deployment. 20+ custom detection rules, 40+ hunting queries, forensic readiness stack, cross-platform coverage, zero trust integration, and capstone architecture document.
This course is actively maintained. Endpoint security configurations are updated as MDE capabilities evolve, new ASR rules are released, and new attack techniques emerge. Check this page for version updates.