Onboarding using Microsoft Endpoint Configuration Manager 0 (0)

This article is part of the Deployment guide and acts as an example onboarding method. In the Planning topic, there were several methods provided to onboard devices to the service. This topic covers the co-management architecture.  Diagram of environment architectures While Defender for Endpoint supports onboarding of various endpoints and tools, this article does not cover them. […]

Read More

Deploy Microsoft Defender for Endpoint in rings 0 (0)

Deploying Microsoft Defender for Endpoint can be done using a ring-based deployment approach. The deployment rings can be applied in the following scenarios: New deployments Existing deployments New deployments A ring-based approach is a method of identifying a set of endpoints to onboard and verifying that certain criteria is met before proceeding to deploy the […]

Read More

Onboard to the Microsoft Defender for Endpoint service 0 (0)

Learn about the various phases of deploying Microsoft Defender for Endpoint and how to configure the capabilities within the solution. These are the steps you need to take to deploy Defender for Endpoint: Step 1: Onboard endpoints to the service Step 2: Configure capabilities Step 1: Onboard endpoints using any of the supported management tools […]

Read More

Set up Microsoft Defender for Endpoint deployment 0 (0)

Deploying Defender for Endpoint is a three-phase process: TABLE 1 Phase 1: Prepare Phase 2: Setup Phase 3: Onboard You are here! You are currently in the set-up phase. In this deployment scenario, you’ll be guided through the steps on: Licensing validation Tenant configuration Network configuration  Note For the purpose of guiding you through a […]

Read More

Prepare Microsoft Defender for Endpoint deployment 0 (0)

You are currently in the preparation phase. Preparation is key to any successful deployment. In this article, you’ll be guided on the points you’ll need to consider as you prepare to deploy Defender for Endpoint. Stakeholders and approval The following section serves to identify all the stakeholders that are involved in the project and need […]

Read More

Deployment phases (Microsoft) 0 (0)

Learn how to deploy Microsoft Defender for Endpoint so that your enterprise can take advantage of preventative protection, post-breach detection, automated investigation, and response. This guide helps you work across stakeholders to prepare your environment and then onboard devices in a methodical way, moving from evaluation, to a meaningful pilot, to full deployment. Each section […]

Read More

Plan your Microsoft Defender for Endpoint deployment 0 (0)

Plan your Microsoft Defender for Endpoint deployment so that you can maximize the security capabilities within the suite and better protect your enterprise from cyber threats. This solution provides guidance on how to identify your environment architecture, select the type of deployment tool that best fits your needs, and guidance on how to configure capabilities. […]

Read More

Microsoft Defender for Endpoint evaluation lab 0 (0)

Conducting a comprehensive security product evaluation can be a complex process requiring cumbersome environment and device configuration before an end-to-end attack simulation can actually be done. Adding to the complexity is the challenge of tracking where the simulation activities, alerts, and results are reflected during the evaluation. The Microsoft Defender for Endpoint evaluation lab is […]

Read More

Microsoft Defender for Endpoint for non-Windows platforms 0 (0)

Microsoft has been on a journey to extend its industry leading endpoint security capabilities beyond Windows and Windows Server to macOS, Linux, Android, and iOS. Organizations face threats across a variety of platforms and devices. Our teams have committed to building security solutions not just for Microsoft, but also from Microsoft to enable our customers to protect and secure […]

Read More

Microsoft Defender for Endpoint for US Government customers 0 (0)

Microsoft Defender for Endpoint for US Government customers, built in the Azure US Government environment, uses the same underlying technologies as Defender for Endpoint in Azure Commercial. This offering is available to GCC, GCC High, and DoD customers and is based on the same prevention, detection, investigation, and remediation as the commercial version. However, there […]

Read More