Strengthen your Zero Trust posture—a new, unified approach to security is here.
Read the blog
Help secure endpoints with industry-leading, multiplatform detection and response.
Disrupt ransomware on any platform
Apply AI-powered endpoint security across Windows, Linux, macOS, iOS, Android, and IoT devices.
Outmaneuver sophisticated adversaries with AI
Stop cyberattacks such as ransomware and move at machine speed with industry-transforming AI that amplifies your security team’s strengths.
Boost prevention with global threat intelligence
Minimize vulnerabilities with a clear view of your cyberattack surface and adversaries, along with best practices for cyberthreat prevention.
Secure devices end to end
Help protect your multiplatform and IoT devices with a comprehensive, industry-leading next-generation antivirus, detection, and response solution at the core of Microsoft Defender XDR.
Watch the video
Learn how to secure your digital estate and disrupt ransomware attacks in an average of just three minutes with industry-leading endpoint detection and response.
Defender for Endpoint key capabilities
Disrupt ransomware early in the cyberattack chain
Automatically disrupt ransomware cyberattacks by blocking lateral movement and remote encryption in a decentralized way across all your devices.
Move at machine speed with Microsoft Security Copilot
Use built-in, security-specific generative AI to rapidly investigate and respond to incidents, prioritize alerts, and learn new skills. Copilot is now embedded in Defender XDR for Copilot customers.
Trick cyberattackers with auto-deployed deception
Automatically generate and disperse deception techniques at scale to expose cyberattackers with early-stage, high-fidelity signals.
Gain an unimpeded view of adversaries
Know your adversaries with more than 78 trillion daily signals from multiple sources, including the largest clouds, security organizations, 1.5 billion devices, internet graphs, and more than 10 thousand experts in 72 countries.
Elevate your security posture
Improve your security configuration with prioritized recommendations from Microsoft Secure Score.
Configure flexible controls for your enterprise
Balance protection and productivity with granular controls including settings, policies, web and network access, cyberthreat detection, and automated workflows.
Leave no device undetected
See and manage your cyberattack surface from a single view across all managed and unmanaged Windows, Linux, macOS, iOS, Android, IoT, and network devices.
Operate security and IT teams in tandem
Simplify security and IT collaboration using unified endpoint management to prevent confusion, misconfigurations, and potential security gaps.
Back to tabs
Unified security operations platform
Secure your digital estate with the only security operations (SecOps) platform that unifies the full capabilities of extended detection and response (XDR) and security information and event management (SIEM).
Unified portal
Detect and disrupt cyberthreats in near-real time and streamline investigation and response.
Back to tabs
Industry recognition
Defender for Endpoint is a recognized industry leader.
Showing %{start}%{separator}%{end} of %{total} items
Skip Industry recognition section
Gartner
Microsoft was named a Leader in the 2024 Gartner® Magic Quadrant™ for Endpoint Protection Platforms.1
MITRE
Microsoft delivered 100% protection in the 2024 MITRE ATT&CK evaluation.
Forrester
Microsoft is named a Leader in The Forrester Wave™: Extended Detection and Response Platforms, Q2, 2024.2
IDC
Microsoft has the largest worldwide market share in modern endpoint security.3
IDC
Microsoft was named a Leader in the IDC MarketScape reports for Worldwide Modern Endpoint Security across Enterprise, Midsize, and Small Businesses, 2024.4
End of Industry recognition section
See what our customers are saying
PeerSpot
Defender for Endpoint has earned the #1 Ranked badge in Endpoint Protection Platform.
PeerSpot
Defender for Endpoint has earned the Leader spot for Endpoint Protection for Business Solutions.
Back to tabs
Compare flexible purchase options
Explore the comprehensive security capabilities in Defender for Endpoint P1 (included with Microsoft 365 E3) and Defender for Endpoint P2 (included with Microsoft 365 E5), as well as versions of these suites that do not include Microsoft Teams.
Microsoft Defender for Endpoint P1
Defender for Endpoint P1 offers a foundational set of capabilities, including industry-leading antimalware, cyberattack surface reduction, and device-based conditional access.
-
Unified security tools and centralized management
-
Next-generation antimalware
-
Cyberattack surface reduction rules
-
Device control (such as USB)
-
Web control/category-based URL blocking
-
Device-based conditional access
-
APIs, SIEM connector, custom threat intelligence
Microsoft Defender for Endpoint P2
Defender for Endpoint P2 offers all the capabilities in P1, plus endpoint detection and response, automated investigation and incident response, and cyberthreat and vulnerability management.
Includes everything in Defender for Endpoint P1, plus:
-
Endpoint detection and response
-
Automated investigation and remediation
-
Cyberthreat and vulnerability management
-
Threat intelligence (cyberthreat analytics)
-
Endpoint attack notifications5
Related Microsoft Defender products
Protect against cyberthreats with best-in-class security from Microsoft.
Microsoft Defender XDR
Get integrated threat protection across devices, identities, apps, email, data, and cloud workloads.
Microsoft Defender Vulnerability Management
Reduce risk with continuous vulnerability assessment, risk-based prioritization, and remediation.
Microsoft Defender for Business
Get online security protection for individuals and families with one easy-to-use app.6
Microsoft Defender for individuals
Get online security protection for individuals and families with one easy-to-use app.5
Additional resources
Become a Defender for Endpoint expert
Get training for security operations and security admins, whether you’re a beginner or have experience.
Watch episode one of The Defender’s Watch
Learn how to strengthen your security with evidence-based insights from experts in modern threat protection.
Stay up to date
Get product news, configuration guidance, product tutorials, and tips.
Dive deeper into the product
Get technical details on capabilities, minimum requirements, and deployment guidance.
Frequently asked questions
-
Defender for Endpoint is a comprehensive, cloud-native endpoint security solution that delivers visibility and AI-powered cyberthreat protection to help stop cyberattacks across Windows, macOS, Linux, Android, iOS, and IoT devices. Built on the industry’s broadest cyberthreat and human intelligence insights, it can seamlessly evolve your security with XDR-level alert correlation to automatically disrupt sophisticated cyberthreats such as ransomware. Defender for Endpoint provides visibility into devices in your environment, offers vulnerability management to help you better understand your cyberattack surface, and delivers endpoint protection, endpoint detection and response (EDR), mobile cyberthreat protection, and managed hunting in a single platform. With Defender for Endpoint, customers can discover and secure endpoint devices across a multiplatform enterprise.
Explore Defender for Endpoint documentation
-
Defender for Endpoint provides cross-platform coverage across Windows, iOS, and Linux. New features or capabilities are typically provided on operating systems that haven’t yet reached the end of their support lifecycle. In line with industry best practices, Microsoft recommends the installation of the latest available security patches for any operating system.
Explore supported Defender for Endpoint capabilities by platform
-
Microsoft Defender for Endpoint is a cloud-native endpoint security platform that provides visibility, cyberthreat protection, and EDR capabilities to stop cyberattacks across Windows, macOS, Linux, Android, iOS, and IoT devices. Microsoft Defender for Office 365 is a collaborative security solution that helps secure your email and Microsoft Teams environments with advanced protection against phishing, business email compromise, ransomware, and other cyberthreats.
Learn more about Microsoft Defender for Office 365
-
Microsoft has long invested in safe deployment practices and established a robust model in how we deliver updates to customers of Defender for Endpoint. In addition, customers have full control over how updates are delivered and how controls are applied to their device estate. This model of shared control helps ensure security and resiliency.
Learn more about our safe deployment practices
Protect everything
Make your future more secure. Explore your security options today.
Укрепите свою модель безопасности «Никому не доверяй»: представляем новый унифицированный подход к безопасности
Перейти в блог
Помогите защитить конечные точки с помощью передовых в отрасли средств обнаружения и реагирования, работающих на нескольких платформах.
Срыв атак программ-шантажистов на любой платформе
Применяйте систему безопасности для конечной точки на базе искусственного интеллекта для устройств с Windows, Linux, macOS, iOS, Android и устройств Интернета вещей.
Упреждение сложных атак злоумышленников с помощью ИИ
Останавливайте кибератаки, например программы-шантажисты, и выполняйте действия с компьютерной скоростью благодаря искусственному интеллекту, который преобразует целую отрасль и улучшает меры защиты вашей команды безопасности.
Улучшение методов предотвращения с помощью глобальной аналитики угроз
Сведите к минимуму уязвимости с помощью четкого представления области кибератак и злоумышленников, а также благодаря рекомендациям по предотвращению киберугроз.
Комплексная защита устройств
Помогите защитить свои мультиплатформенные устройства и устройства Интернета вещей с помощью лучшего в отрасли единого антивирусного решения следующего поколения по обнаружению и реагированию, лежащего в основе Microsoft Defender XDR.
Смотреть видео
Узнайте, как защищать свое цифровое имущество и срывать атаки программ-шантажистов в среднем всего за три минуты с помощью лучшей в отрасли системы обнаружения и нейтрализации атак на конечные точки.
Основные возможности Defender для конечной точки
Блокирование программ-шантажистов на ранней стадии цепочки кибератак
Автоматически прерывайте кибератаки программ-шантажистов, блокируя боковое смещение и удаленное шифрование децентрализованным способом на всех ваших устройствах.
Перемещение со скоростью машины с Microsoft Security Copilot
Используйте встроенный генеративный ИИ, предназначенный специально для защиты, чтобы быстро исследовать инциденты и реагировать на них, определять приоритеты оповещений и изучать новые навыки. Copilot теперь внедрен в Defender XDR и доступен для клиентов Copilot.
Обман злоумышленников при помощи введения в заблуждения с автоматическим развертыванием
Автоматически создавайте и распределяйте методы введения в заблуждение в большом масштабе для выявления злоумышленников с помощью сигналов высокого качества на ранних этапах.
Неискаженное представление злоумышленников
Изучайте своих противников с помощью более чем 78 триллионов ежедневных сигналов из различных источников, включая крупнейшие облака, организации безопасности, 1,5 миллиарда устройств, интернет-графики и более 10 тысяч экспертов в 72 странах.
Улучшение состояния безопасности
Улучшите конфигурацию безопасности с помощью приоритетных рекомендаций из Оценки безопасности (Майкрософт).
Настройка гибких элементов управления для организации
Обеспечивайте баланс между защитой и производительностью с помощью детальных элементов управления, включая параметры, политики, сетевой и веб-доступ, обнаружение киберугроз и автоматические рабочие процессы.
Обнаружение всех устройств
Просматривайте и регулируйте область кибератак в едином представлении на всех управляемых и неуправляемых устройствах с Windows, Linux, macOS, iOS, Android, устройствах Интернета вещей и сетевых устройствах.
Взаимодействие команд безопасности и ИТ-отделов
Упростите взаимодействие отделов безопасности и ИТ с помощью единого управления конечными точками, чтобы избежать путаницы, неправильных настроек и потенциальных пробелов в системе безопасности.
Назад к вкладкам
Объединенная платформа операций по обеспечению безопасности
Защитите свои цифровые ресурсы, используя единственную платформу операций по обеспечению безопасности (SecOps), объединяющую возможности расширенного обнаружения угроз и реагирования на них (XDR) с функциями управления информационной безопасностью и событиями безопасности (SIEM).
Объединенный портал
Обнаруживайте и срывайте кибератаки почти в реальном времени и упрощайте исследование и реагирование.
Назад к вкладкам
Признание в отрасли
Defender для конечной точки является признанным лидером в отрасли.
Показано элементов: %{start}%{separator}%{end} из %{total}
Пропустить Признание в отрасли раздел
Gartner
Корпорация Майкрософт названа лидером в области разработки платформ защиты конечных точек согласно отчету Magic Quadrant™ от компании Gartner® за 2024 год.1
MITRE
Корпорация Майкрософт обеспечила 100 % защиту в оценке MITRE ATT&CK 2024.
Forrester
Корпорация Майкрософт названа лидером в отчете Forrester Wave™: Платформы Extended Detection and Response, 2-й кв. 2024 года2.
IDC
У корпорации Майкрософт самая большая в мире доля рынка в области современных средств защиты конечных точек3.
IDC
Корпорация Майкрософт была названа в отчетах IDC MarketScape лидером среди поставщиков современных средств защиты конечных точек для крупных организаций, среднего и малого бизнеса в 2024 году4.
Окончание — Признание в отрасли раздел
Отзывы наших клиентов
PeerSpot
Defender для конечной точки получил эмблему №1 на платформе защиты конечных точек.
PeerSpot
Defender для конечной точки стал лидером среди решений по защите конечных точек для бизнеса.
Назад к вкладкам
Сравнить гибкие варианты покупки
Изучите комплексные возможности безопасности Defender для конечной точки (план 1), входящего в состав Microsoft 365 E3, и Defender для конечной точки (план 2), входящего в состав Microsoft 365 E5, а также версии этих наборов, не содержащие Microsoft Teams.
Microsoft Defender для конечной точки (план 1)
Defender для конечной точки (план 1) предлагает базовые возможности, в том числе передовую защиту от вредоносных программ, сокращение направлений кибератак и условный доступ на основе устройств.
-
Единая платформа для обеспечения безопасности и централизованного управления
-
Передовая защита от вредоносных программ
-
Правила для сокращения направлений кибератак
-
Управление устройствами (портами USB и т. д.)
-
Брандмауэр для конечных точек
-
Веб-контроль и блокировка URL-адресов по категориям
-
Условный доступ на основе устройств
-
Контролируемый доступ к файлам
-
API, соединитель SIEM, настраиваемая аналитика угроз
Microsoft Defender для конечной точки (план P2)
Defender для конечной точки (план 2) обладает всеми возможностями плана 1, а также обеспечивает обнаружение и нейтрализацию атак на конечные точки, автоматическое расследование и исправление инцидентов, контроль киберугроз и уязвимостей.
Все возможности Defender для конечной точки (план 1), а также:
-
Обнаружение и нейтрализация атак на конечные точки
-
Методы введения в заблуждение
-
Автоматическое исследование и исправление
-
Контроль киберугроз и уязвимостей
-
Аналитика угроз (аналитика киберугроз)
-
Песочница (подробный анализ)
-
Уведомления об атаках на конечную точку5
Связанные продукты Microsoft Defender
Защититесь от киберугроз с помощью ведущей системы безопасности от Майкрософт.
Microsoft Defender XDR
Интегрированная защита от угроз для корпоративных устройств, удостоверений, приложений, электронной почты, данных и облачных рабочих нагрузок.
Управление уязвимостями Microsoft Defender
Сокращайте риски с помощью функций непрерывной оценки уязвимостей, расстановки приоритетов в зависимости от рисков и исправления.
Microsoft Defender для бизнеса
Защитите пользователей и их семьи в Интернете с помощью одного простого и удобного приложения6.
Microsoft Defender для индивидуальных пользователей
Получите защиту для пользователей и их семей в Интернете с помощью одного простого и удобного приложения5
Дополнительные ресурсы
Станьте экспертом по Defender для конечной точки
Пройдите обучение для специалистов по безопасности и администраторов, которое будет полезно как новичкам, так и экспертам с опытом.
Посмотрите первый эпизод подкаста «Вахта Защитника» (The Defender’s Watch)
Узнайте, как укрепить систему безопасности, с помощью обоснованных выводов от специалистов по современной защите от угроз.
Не упустите ничего важного
Следите за новостями о продукте, изучайте руководства по настройке, инструкции по использованию и рекомендации.
Изучите продукт подробнее
Ознакомьтесь с техническим описанием возможностей, минимальными требованиями к системе и инструкциями по развертыванию.
Вопросы и ответы
-
Defender для конечной точки — это комплексное, ориентированное на облако решение безопасности конечной точки, которое обеспечивает видимость и защиту от киберугроз на базе искусственного интеллекта, чтобы останавливать кибератаки на устройствах с Windows, macOS, Linux, Android, iOS и устройствах Интернета вещей. Созданное на основе самой широкой в отрасли аналитики киберугроз и человека это решение может легко развивать вашу систему безопасность с помощью корреляции оповещений уровня XDR, чтобы автоматически блокировать сложные киберугрозы, например программы-шантажисты. Defender для конечной точки обеспечивает видимость устройств в вашей среде, управление уязвимостями для улучшения понимания области кибератак, а также защиту конечных точек, обнаружение и нейтрализацию атак на конечные точки (EDR), защиту от киберугроз на мобильных устройствах и управляемую охоту на угрозы на единой платформе. С помощью Defender для конечной точки клиенты могут обнаруживать и защищать устройства конечных точек в многоплатформенной организации.
Обзор документации по Defender для конечной точки
-
В качестве комплексного решения для защиты конечных точек служба Defender для конечной точки включает антивирусную программу в Microsoft Defender — средство защиты нового поколения, которое усиливает периметр безопасности сети. Оно обнаруживает и блокирует известные и возникающие киберугрозы в реальном времени на устройствах с Linux, macOS, Windows и Android. Антивирусная программа в Microsoft Defender включает следующие компоненты.
- Антивирусная защита в реальном времени с постоянной проверкой, использующей мониторинг поведения файлов и процессов, а также другие методы эвристики. Она также обнаруживает и блокирует приложения, которые считаются небезопасными, но могут не обнаруживаться как вредоносные программы.
- Облачная защита с практически мгновенным обнаружением и блокировкой новых и возникающих киберугроз.
Антивирусная программа в Microsoft Defender предоставляет полный охват для всех методов MITRE ATT&CK. Это решение получило награду Best Advanced Protection 2022 (Лучшая расширенная защита за 2022 г.) от AV-TEST и наивысшие рейтинги во всех основных отраслевых антивирусных тестах для предприятий и потребителей, в том числе AV Comparatives, SE Labs и MRG Effitas.
- Обзор защиты нового поколения
- Подробнее об антивирусной программе в Microsoft Defender
- Узнайте, как включить и настроить функции антивирусной программы в Microsoft Defender
- Подробнее об облачной защите и антивирусной программе в Microsoft Defender
- Обзор результатов AV-TEST
-
Defender для конечной точки обеспечивает кроссплатформенный охват в Windows, iOS и Linux. Новые функции и возможности обычно предоставляются в операционных системах, которые еще не достигли конца жизненного цикла поддержки. В соответствии с отраслевыми рекомендациями корпорация Майкрософт рекомендует устанавливать последние доступные обновления системы безопасности для любой операционной системы.
Обзор поддерживаемых возможностей Defender для конечной точки по платформам
-
Нет. Аналитики безопасности управляют Defender для конечной точки на портале Microsoft Defender XDR, который является единой консолью для комплексной защиты конечных точек, включая управление уязвимостями, защиту от киберугроз, а также возможности обнаружения и реагирования.
Для клиентов, желающих обеспечить взаимодействие своих групп безопасности и ИТ-отделов, Defender для конечной точки предоставляет согласованный single source of truth (единый источник истины) с зеркалированием в Intune для управления параметрами безопасности конечных точек в Windows, macOS и Linux.
Клиенты, желающие расширить защиту конечных точек на несколько доменов, могут избежать дополнительных действий по интеграции, которые часто требуются другими поставщиками защиты конечных точек.
- Подробнее об управлении политиками безопасности конечных точек
- Узнайте, как легко управлять параметрами безопасности для Windows, macOS и Linux в Defender для конечной точки
- Подробнее о решениях XDR от Майкрософт
-
Microsoft Defender для конечной точки — это ориентированная на облако платформа безопасности конечной точки, которая обеспечивает видимость, защиту от киберугроз и возможности EDR, чтобы останавливать кибератаки на устройствах с Windows, macOS, Linux, Android, iOS и устройствах Интернета вещей. Microsoft Defender для Office 365 — это решение для совместной работы, которое помогает защитить электронную почту и среды Microsoft Teams с помощью расширенных механизмов защиты от фишинга, компрометации корпоративной почты, программ-шантажистов и других киберугроз.
Подробнее о Microsoft Defender для Office 365
-
Компания Майкрософт уже давно инвестирует в безопасные методы развертывания и создала надежную модель доставки обновлений клиентам Defender для конечной точки. Кроме того, клиенты полностью управляют тем, как доставляются обновления и как применяются средства управления к их устройствам. Такая модель совместного управления помогает обеспечить безопасность и отказоустойчивость.
Подробнее о наших методиках безопасного развертывания
Всесторонняя защита
Сделайте свое будущее безопаснее. Узнайте о возможных вариантах защиты уже сегодня.
Следите за новостями Microsoft Security
Discover Microsoft Defender for Endpoint — an essential cybersecurity tool for 2024. Learn about its features, requirements, and steps for onboarding and deployment to protect your data effectively.
Cybersecurity is everyone’s focus these days — or should be. With a spike in data breaches in 2023, organizations of all sizes and in all industries need to protect themselves.
New threat protection technologies are constantly being developed, and your business should take advantage of them.
One of these is Microsoft Defender for Endpoint. It is an industry-leading solution that can be used to meet Cyber Security Maturity Model Certification (CMMC) 2.0 requirements for defense contractors, and these standards are worth pursuing for anyone. Your, and your customers’, data is worth the effort.
What is Microsoft Defender for Endpoint?
Microsoft Defender is classed as endpoint detection and response (EDR) software. This is a new generation of anti-virus software. Traditionally, anti-virus software relies on libraries of known malware, detects it, then acts.
EDR software goes one step further by providing preventive protection. Most of the time, it can catch malware before it starts running. When that fails, such as with a zero-day exploit it may miss, it moves into post-breach detection and investigation. It works with Microsoft Defender Antivirus to protect your entire network.
Note that it should not be confused with Microsoft Defender 365, which focuses on protecting the data in your Office 365 subscription. Microsoft Defender for Endpoint integrates into Windows 10 to protect your entire system.
Benefits and Features
Microsoft has done a good job of providing all of the features you need. They include:
Next-Generation Protection
Instead of relying on quickly outdated libraries, Microsoft Defender uses machine learning to provide behavior-based protection. It also gives you access to Microsoft’s threat resistance research and big data analysis to help spot more threats…ideally, again, before they run and cause damage or a breach.
Threat and Vulnerability Management
Not all threats are malware. Microsoft Defender can identify, assess, and remediate vulnerabilities and misconfigurations in real time. This means that it spots issues such as leaving a router firewall turned off.
Attack Surface Reduction
The fewer ways hackers can get in, the better. Defender reduces the potential attack surface by using features such as application control, exploit protection, controlled folder access, and network firewall.
This helps you set up role-based and project-based access that lowers the risk associated with a given account compromise. If somebody leaves their laptop logged in, then whoever finds it will only have limited access to data and systems.
Automation
Microsoft Defender includes AIR (automated investigation and remediation) capabilities. It can take some time to get this set up and tuned the way you need it, but once you have it, it reduces your alert volume and frees technicians to respond to more serious issues the automated systems can’t handle.
Endpoint Detection and Response Capabilities
The software constantly analyzes behavioral telemetry, keeping data for up to six months and giving you access to a rich forensic dashboard. Behavioral analysis can catch strange things before they become a problem and helps spot malware and threats that are not in the database. It can also sometimes find human factor issues. For example, if somebody never logs on after 10pm, then their credentials being used at 11:30pm might flag an account compromise.
Secure Score
The dashboard also assigns a secure score to all devices. This allows you to spot weak points in your network, whether they are hardware or training issues, and remediate them before a breach happens. It can help you focus training where it is most needed.
Attack Simulations
Microsoft Defender for Endpoint also has an evaluation lab. This allows you to run attack simulations, with multiple configurations available. It offers internal simulations as well as ones powered by attack IQ and SafeBreach (these require specific software). You can watch the simulation in real time, and some might trigger an automated investigation which will help you detect issues. Running regular simulations is the best way to protect your network.
Microsoft Threat Experts
If you need some extra help, you also have access to Microsoft Threat Experts. These are real experts who can audit your environment and hunt for threats for less cost than hiring an in-house expert.
Note that Defender for Business, intended for smaller organizations, doesn’t include the Advanced Hunting/Threat Hunting feature, because generally that’s of little use to people who don’t have full teams. It also doesn’t include access to Microsoft Threat Experts.
What Are the Requirements?
To run Microsoft Defender for Endpoint, you must have one of the following licenses:
- Windows 10 Enterprise E5
- Windows 10 Education A5
- Microsoft 365 E5
- Microsoft 365 E5 Security
- Microsoft 365 A5
You then purchase one of the three licenses: Microsoft Defender for Business, Defender for Endpoint Plan 1, or Defender for Endpoint Plan 2. These can be included as a package with other Microsoft 365 plans.
Additionally, if you plan on running it on a Windows server, the server must have one of the following:
- Azure Security Center with Azure Defender
- Defender for Endpoint for Servers (each server needs its own license).
Supported browsers are Google Chrome or Microsoft Edge. Other browsers may work, but testing has not been done and there is no guarantee.
Defender is not entirely limited to Windows systems, however. You can add macOS, Linux servers, iOS and Android mobile devices. Cell phones are enrolled using Microsoft Intune.
Windows devices on the network that you want to protect must run one of the following:
- Windows 10 Enterprise
- Windows 10 Enterprise LTSC 2016 or later
- Windows 10 IoT Enterprise
- Windows 10 Education
- Windows 10 Pro
- Windows 10 Pro Education
- Windows 11 Enterprise
- Windows 11 IoT Enterprise
- Windows 11 Education
- Windows 11 Pro
- Windows 11 Pro Education
- Windows Server 2012 R2
- Windows Server 1803 or later
- Windows Server 2019 and later
- Windows Server 2019 core edition
- Windows Server 2022
- Windows Server 2022 core edition
- Azure Virtual Desktop
- Windows 365 running one of those versions
For other devices, it supports macOS 12, 13, and 14, Android 8 and above and iOS 15 and above. Minimum Linux distribution requirements are:
- Red Hat Enterprise — 7.2
- CentOS — 7.2
- CentOS — 7.2
- Debian — 9
- SUSE Linux Enterprise — 12
- Oracle Linux — 7.2
- Amazon Linux — 2 or 2023
- Fedora — 33
- Alma — 8.4
- Mariner — 2
Anything else is officially unsupported. Also, avoid running Microsoft Defender for Endpoint alongside other endpoint software on iOS devices, as it can cause crashes and performance degradation. If you are installing Microsoft Defender on personal devices (BYOD), educate your employees on the need to remove other endpoint defense software.
You can support earlier versions of Windows with the Log Analytics/Microsoft Monitoring Agent.
Onboarding and Deployment
Microsoft provides an automated setup guide in the Microsoft 365 admin center. It can only be installed by a global admin, and you should take a full inventory of devices and structure.
You will then need to validate your license and cloud provider and choose your data center. If you already have Microsoft XDR, it will use the same data center. Otherwise, you use the data center for your geographical region.
We highly recommend using the automated setup guide, which will detect aspects of your environment and guide you through deployment appropriately in most cases, although getting expert help will avoid common pitfalls. Microsoft Defender also uses role-based access control, although you can opt out of this and use basic permissions instead. Role-based access control, however, makes sure that only users who need access to the software get it or, in this case, only those who need to make configuration changes can. For larger organizations, you can also limit access geographically. We highly recommend using role-based access control for all software and systems.
The software can be deployed cloud-native, through co-management, or on-premises. Choose the option that works best with your existing infrastructure. Microsoft Intune is essential if you include mobile devices and works well for deploying to Windows and MacOS machines. Linux servers require specific deployment. but Intune can handle everything else. Every device used on your network should be onboarded, including personal devices. Do not allow people to connect a personal cell phone, tablet, or laptop to the office network without onboarding.
Other Things to Consider
Microsoft Defender for Endpoint is a good choice if you already use Microsoft 365 intensively as you can sometimes get a good deal by bundling licenses. Because it can conflict with other security software on some mobile devices, some organizations may elect not to use it on phones and tablets if they already have a solution they like. It is also more complicated to use with Linux.
Consider which features you need and the size of your company when choosing a license. Most small businesses don’t need all of Microsoft Defender for Endpoint’s features and can manage on the Microsoft Defender for Business license. For these companies, a managed provider who can help them decide if this is the right software is particularly important.
Remember that it works in concert with Microsoft Defender Anti-Virus, which is needed for proper threat detection. However, it provides robust, full-featured threat detection that moves beyond traditional anti-virus software alone.
A major pitfall is not deploying the software correctly or not onboarding all devices. Working with a trusted IT partner who has done hundreds of deployments helps get it right the first time and avoids you thinking you are well protected when, in fact, you have a major hole due to, for example, not using role-based access correctly.
At Agile IT, we offer managed services to help your business handle all your IT and security needs. In addition, we offer advice on licensing and deployment. If you have a small team, we can install and deploy Microsoft Defender for Endpoint for you and provide training to help you use it effectively. If you are looking to improve your network security and considering
Microsoft Defender for Endpoint or just want to learn more about it, contact us today!
More employees are now working from remote locations than ever before, relying on collaborative tools to communicate with co-workers and share sensitive data. Microsoft Defender for Endpoint uses EDR to ensure that devices such as desktop workstations, laptops, tablets, and smartphones are all protected.
The critical role endpoints play also makes them central targets for cybercriminals. Unfortunately, these remote devices are vulnerable to attacks. Criminals often use endpoint devices as entry points to penetrate corporate networks. From there, they execute malware and ransomware attacks.
What Is Endpoint Detection Response (EDR)?
Endpoint Detection and Response (EDR) is an endpoint security solution that monitors end-user devices and detects and responds to cyber threats such as viruses, malware and ransomware.
EDR evaluates endpoint-system-level behaviours and applies data analytics to detect suspicious system behaviour. It can also provide contextual information, block malicious activity, and suggest appropriate remediation to restore systems.
In real-time, EDR provides advanced threat detection for enhanced security investigation and response capabilities. Also supported are incident data search, investigation alert triage, threat hunting, suspicious activity validation, and malicious containment.
Does Microsoft Defender for Endpoint Provide EDR?
Microsoft Defender for Endpoint, part of the Microsoft 365 Defender security suite, offers EDR. Microsoft Defender for Endpoint is an enterprise endpoint security platform that prevents, detects, investigates, and responds to advanced threats. It uses a combination of technologies built into Windows 10 and Microsoft’s cloud service.
Microsoft 365 Defender is a unified pre/post-breach enterprise level defence suite. It coordinates detection, prevention, investigation, and response across all endpoints, email, identities, and applications, providing integrated protection against attacks.
With Microsoft 365 Defender integration, security teams can leverage the threat signals that each Microsoft product receives to determine the full scope and impact of the threat.
Microsoft Defender for Endpoint protects against advanced threats by leveraging several of Microsoft’s already robust features. The Windows 10, 11, and Microsoft cloud service technologies used include the following:
Endpoint Behavioural Sensors
Embedded in Windows, the endpoint behavioural sensors collect and process behavioural signals from the operating system. These can send the sensor data to the private cloud instance of Microsoft Defender for Endpoint.
Cloud Security Analytics
Cloud security analytics involves leveraging big data, device learning, and Microsoft optics across enterprise cloud products like Office 365. The system translates online assets and behavioural signals into detections and insights. With that, it can recommend calculated responses to advanced threats.
Threat Intelligence
Threat intelligence enables Defender for Endpoint to identify attacker techniques, tools, and strategies. It also generates alerts as they are observed via collected sensor data. Threat intelligence is further augmented by additional, partner-provided threat intelligence.
Microsoft Defender for Endpoint – Key Features
Here are 7 Microsoft Defender for Endpoint key features to boost endpoint security.
1. Threat and Vulnerability Management
Defender for Endpoint uses endpoint behavioural sensors, cloud security analytics, and threat intelligence to handle threat and vulnerability management.
When combined within the Windows ecosystem, they offer enterprises powerful tools for preventing, identifying, and blocking endpoint threats.
2. Attack Surface Reduction
An organisation’s attack surface incorporates any area estate-wide that an attacker can compromise from a network or single device perspective. Thus, reducing your attack surface increases protection for those key areas, ensuring hackers have fewer avenues to execute attacks.
One way to maximise this feature is to configure Microsoft Defender for Endpoint’s attack surface reduction rules. Some of these rules can restrict the following actions:
- Launching executable files or scripts that download or run files
- Running suspicious scripts
- Performing behaviours that apps don’t typically initiate
Such software behaviours are often legitimate actions, though they are considered risky. Applying attack surface reduction rules constrains these software-based risky behaviours, which helps keep your organisation safe.
3. Next-Gen Protection
Microsoft Defender for Endpoint DER functionality enforces the security perimeter of your networks using next-generation protection. Next-generation protection catches emerging threats.
Along with Microsoft Defender Antivirus, next-generation protection includes behaviour-based, heuristic, and real-time antivirus protection. This includes always-on scanning, file and process behaviour monitoring, and other real-time protection such as detecting and blocking unsafe app installations or updates.
Next-gen protection can also be delivered via the cloud, which means near-instant detection and threat blocking. Finally, it involves dedicated product updates, including Microsoft Defender Antivirus updates.
4. Endpoint Detection and Response
Defender for Endpoint detection and response EDR provides advanced near-time and actionable attack detections. Security teams can prioritise alerts, understand the scope of a breach, and respond immediately.
When EDR detects a threat, it can notify human analysts to investigate. Alerts that contain the same attack techniques or are attributed to the same attacker are aggregated, creating a single incident for clarity. Aggregating alerts into incidents makes it easier for analysts to investigate and respond to threats.
Defender for Endpoint continuously collects behavioural cyber telemetry. Collection processes include processing network activities, other information, kernel and memory manager optics, user login activities, and registry and file system changes, among other things.
The system stores this information for six months, enabling security teams to review the attack from various timelines and viewpoints. When combined, these response capabilities give your security team the power to remediate threats immediately.
5. Automated Investigation and Remediation
Automated Investigation and Remediation (AIR) technology uses inspection algorithms based on processes used by security analysts. AIR capabilities examine alerts and then take action to resolve breaches.
AIR significantly reduces alert volume, enabling security teams to focus on more sophisticated threats and other high-priority initiatives. The Action Centre tracks all remediation actions. Within the Action Centre, pending actions are approved or rejected.
An automated investigation starts when an alert triggers or someone manually initiates the investigation. Any subsequent alerts generated are automatically added until that investigation is completed. By default, the automated investigation expands EDR detects similar activity on a different device.
As additional alerts add to the automated investigation, the system generates a verdict for each piece of evidence gathered. Those verdicts determine whether the evidence is malicious, suspicious, or benign. From there, it applies appropriate remediation actions.
6. Microsoft Threat Experts
Microsoft Threat Experts is a managed threat hunting service that offers expert monitoring and analysis for Security Operation Centres (SOCs). This service provides expert-driven insights and data through access to experts on-demand and targeted attack notification.
Users can communicate with security personnel within Microsoft 365 Defender and receive a timely response. Security experts aid in a better understanding of the latest complex threats affecting organisations, including potentially compromised devices, alert inquiries, and root causes of suspicious network connections.
Targeted attack notification enables proactive hunting for significant threats to your network like hands-on-keyboard attacks, advanced cyber-espionage attacks, and human adversary intrusions. These notifications show up as new alerts to ensure that critical threats don’t get missed.
7. Microsoft Secure Score for Devices
The threat and vulnerability management dashboard of the Microsoft 365 Defender portal contains the ‘Microsoft Secure Score for Devices’. A higher score means the device’s endpoints are more resilient from cybersecurity threats. The score reflects the collective security configuration state of your devices, including the following categories:
- Accounts
- Application
- Network
- Operating system
- Security controls
You can select a category that takes you to the Security recommendations page and view any relevant recommendations for improving security on that device.
The data contained in the Microsoft Secure Score for Devices card comes from ongoing vulnerability discovery processes. The data is aggregated along with configuration discovery assessments that continuously monitor, analyse, and provide remediation and recommendations.
Conclusion
As the threat landscape becomes increasingly complex, protecting your network’s remote endpoints is a priority. Microsoft 365 Defender for Endpoint incorporates robust EDR features security and combines them with existing security technologies within the Microsoft ecosystem.
This feature-rich EDR service maintains your endpoints and fortifies them to prevent, detect, investigate, and respond to the most advanced threats.
From anti-malware, anti-phishing, SEO poisoning, and 2FA to SASE and cloud-based air-gap immutable backup storage, Securus has a security solution to suit your requirement and budget. If you would like to discuss your network security requirements in more detail with one of our cyber security professionals, please don’t hesitate to get in touch.
Further Technology Articles
Building a Secure Digital Future: Securus Communications Responds to the UK Cyber Security and Resilience Policy Statement
The UK Government’s newly published Cyber Security and Resilience Policy Statement sets out a strategic vision for strengthening the nation’s digital defences. It lays the groundwork for proposed legislation—expected to be introduced to Parliament in 2025—that aims to modernise and…
Welcoming Alex Fisentzides to the Securus Communications Team
We are excited to announce that Alex Fisentzides has joined Securus Communications as our new Network Engineer. Alex brings with him a wealth of experience and expertise, making him a valuable addition to our technical team. In his role, Alex…
Securus Communications: A Year of Growth and Innovation in 2024
Securus Communications, a leader in providing secure and reliable communication and cyber security solutions, has marked a successful year in 2024, achieving significant milestones across its operations. These accomplishments underline our commitment to innovation, growth, and customer-focused service. Network Infrastructure…
Securus Communications Ltd Achieves IASME Cyber Assurance Level 2: What It Means for Our Clients
We are delighted to announce that Securus Communications Ltd has achieved IASME Cyber Assurance Level 2 certification. This significant milestone underscores our commitment to maintaining the highest cyber security standards and reassures our clients that they are partnering with…
Microsoft Defender for Endpoint — formerly Microsoft Defender Advanced Threat Protection or Windows Defender ATP — is an endpoint security platform designed to help enterprise-class organizations prevent, detect and respond to security threats.
Defender for Endpoint can help an organization respond to potential threats, such as malware or ransomware, using tools built into Windows 10 and Azure services. These tools provide automated investigation, preventative and post-breach security detection and response features.
Defender for Endpoint was previously known as Microsoft Defender Advanced Threat Protection but was rebranded in 2019 along with other products under the Defender brand.
Features and capabilities
Microsoft Defender for Endpoint offers the following security features and capabilities:
- Threat and vulnerability management. A software inventory is performed on endpoints in real time. This information is used to detect, prioritize and mitigate security vulnerabilities related to installed applications and missing patches.
- Attack surface reduction. The overall attack surface of a system is reduced through hardware isolation and application control. Application audit data is monitored and exclusions are added for necessary applications. Attack surface reduction rules are also employed.
- Next-generation protection. Defender for Endpoint performs continuous scans to detect and block threats. This feature uses Microsoft Defender Antivirus, as well as behavior-based antivirus protection and cloud-delivered protection.
- Endpoint detection and response. Defender for Endpoint groups related attacks into incidents. This type of aggregation helps security professionals prioritize, investigate and respond to threats.
- Automated investigation and remediation. If left unchecked, network endpoints can generate an overwhelming number of security alerts. The Automated Investigations feature examines and resolves alerts, allowing security professionals to focus on other tasks.
- Secure score. Defender for Endpoint uses a security score to rate the current security configuration. This score is based on categories including application, operating system, network, accounts and security controls.
- Endpoint Attack. Previously Microsoft Threat Experts — Targeted Attack Notification, Endpoint Attack is a managed hunting service that detects and prioritizes attacks, including keylogger or cyber attacks.
- Management and APIs. A collection of APIs integrate Defender for Endpoint into an organization’s workflow.
- Shared data. Defender for Endpoint shares data with other Microsoft products, including Azure Active Directory Identity Protection, Microsoft Defender for Endpoint, Microsoft Defender for Office 365, Microsoft Defender for Cloud Apps and Microsoft Defender for Identity.
- Endpoint behavioral sensors. These sensors collect and process behaviors from Windows 10.
- Support for platforms. Defender for Endpoint offers security services for Windows, Linux, macOS, iOS and Android operating systems.
Defender for Endpoint plans
Windows Defender for Endpoint offers two main plans — Plan 1 (P1) and Plan 2 (P2). P1 is a base version and P2 offers everything that P1 offers but adds several features.
P1 offers the following features:
- APIs, security information and event management connector.
- Application control.
- Controlled folder access.
- Device-based conditional access.
- Device control such as USB.
- Endpoint firewall.
- Network protection.
- Next-generation antimalware.
- Unified security tools with centralized management.
- Web control and categorized URL blocking.
P2 includes all previously mentioned features, plus the following:
- Automated investigation and remediation.
- Defender Vulnerability Management capabilities.
- Endpoint detection and response.
- Sandbox.
- Threat intelligence through analytics.
Defender for Endpoint also offers a standalone Defender for Business version. This version comes with threat and vulnerability management features, attack surface reduction, endpoint detection and response, and automated investigation and response. However, it has limited web content filtering and cross-platform support features.
Microsoft Defender for Business is available as a standalone user subscription for small and medium-sized businesses or as part of Microsoft 365 Business Premium.
Microsoft Defender for Endpoint P1 is available as a standalone subscription license for commercial and education customers. It’s also included as part of certain Microsoft 365 plans.
Microsoft Defender for Endpoint P2 is also available as a standalone license or as part of certain versions of Windows 10 and 11 Enterprise and certain versions of Microsoft 365.
Microsoft offers a free trial of both P1 and P2 versions of Microsoft Defender for Endpoint.
Additional integrations
Windows Defender for Endpoint can be integrated with other Microsoft software, including the following:
- Azure Information Protection.
- Conditional Access.
- Microsoft Intune.
- Microsoft Defender for Cloud.
- Microsoft Defender for Cloud Apps.
- Microsoft Defender for Identity.
- Microsoft Defender for Office.
- Microsoft Sentinel.
- Skype for Business.
Strengths and weaknesses
One of Microsoft Defender for Endpoint’s biggest strengths is its feature list. It can also create a graphical attack timeline using data related to a given attack. The tool is also compatible with other operating systems, including Windows, Linux, macOS, iOS and Android.
But Microsoft’s implementation of Defender for Endpoint also has some weaknesses. For example, the product automatically disables other antimalware and endpoint detection and response software present on an endpoint. This means that depending on the configuration, installing Defender for Endpoint can weaken an organization’s security posture if it has previously installed security tools.
Outside of Windows environments, Defender for Endpoint can be challenging to deploy, such as on older macOS devices. Likewise, Linux systems might experience high memory usage for endpoint agents.
Cybercriminals have several ways they can spread malware. Learn how archive files using ZIP and RAR formats have become the most popular way to distribute malware to end users’ machines.
This was last updated in April 2023
Continue Reading About Microsoft Defender for Endpoint (formerly Windows Defender ATP)
- EDR tools for Windows Server compared
- Microsoft Defender ATP taps into cloud for added protection
- What are some features in Microsoft Defender ATP?
- What’s the deal with Microsoft Defender for Android and iOS?
- Microsoft extends Defender umbrella to Google Cloud Platform
Dig Deeper on Application and platform security
-
What is elliptical curve cryptography (ECC)?
By: Rahul Awati
-
What is a checksum?
By: Rahul Awati
-
What is Blowfish?
By: Rahul Awati
-
What is cryptology?
By: Rahul Awati