# TD Docs

<h2 align="center">ThreatDefence Documentation</h2>

<table data-view="cards"><thead><tr><th></th><th></th><th></th><th data-hidden data-card-target data-type="content-ref"></th><th data-hidden data-card-cover data-type="image">Cover image</th></tr></thead><tbody><tr><td><i class="fa-play">:play:</i></td><td>Getting Started</td><td>Quick start with our platform and services: product breakdown, deployment, FAQ, and support.</td><td><a href="quick-start">quick-start</a></td><td></td></tr><tr><td><i class="fa-wrench">:wrench:</i></td><td>Platform Management</td><td>Manage users, MFA, portal access, dashboards, and reports.</td><td><a href="../platform-management/platform-overview">platform-overview</a></td><td></td></tr><tr><td><i class="fa-laptop">:laptop:</i></td><td>Endpoint Agent</td><td>Requirements, release notes, and deployment steps.</td><td><a href="../endpoint-agent/prerequisites">prerequisites</a></td><td></td></tr><tr><td><i class="fa-mailbox">:mailbox:</i></td><td>Microsoft 365</td><td>Entra ID and Microsoft 365 monitoring, Graph API, Purview, Defender.</td><td><a href="../microsoft-365/prerequisites">prerequisites</a></td><td></td></tr><tr><td><i class="fa-server">:server:</i></td><td>Appliances</td><td>Deployment and management of TD sensors (NDR, Syslog forwarders, deception honeypots).</td><td><a href="../appliances/network-sensor/overview">overview</a></td><td></td></tr><tr><td><i class="fa-plug">:plug:</i></td><td>SIEM Integrations</td><td>Integrate log sources such as EDR, email security, and firewalls.</td><td><a href="../siem-integrations/siem-integrations">siem-integrations</a></td><td></td></tr><tr><td><i class="fa-starfighter">:starfighter:</i></td><td>Attack Surface Management</td><td>Dark web monitoring, impersonating domains, external scanning, and ASM.</td><td><a href="../attack-surface-management/attack-surface-management">attack-surface-management</a></td><td></td></tr><tr><td><i class="fa-user-police-tie">:user-police-tie:</i></td><td>Security Operations</td><td>24/7 SOC, incident response, and detection playbooks.</td><td><a href="../security-operations/security-operations">security-operations</a></td><td></td></tr><tr><td><i class="fa-book-open">:book-open:</i></td><td>SOC Analyst Guide</td><td>Everyday analyst tasks, platform navigation, threat hunting and alert triage.</td><td><a href="../soc-analyst-guide/quickstart">quickstart</a></td><td></td></tr><tr><td><i class="fa-heart">:heart:</i></td><td>Legal and Compliance</td><td>Compliance programs, agreements, and privacy policies.</td><td><a href="../legal-and-compliance/compliance">compliance</a></td><td></td></tr></tbody></table>
