0
(0)

Plan your Microsoft Defender for Endpoint deployment so that you can maximize the security capabilities within the suite and better protect your enterprise from cyber threats.

This solution provides guidance on how to identify your environment architecture, select the type of deployment tool that best fits your needs, and guidance on how to configure capabilities.

Image of deployment flow.

Step 1: Identify architecture

We understand that every enterprise environment is unique, so we’ve provided several options to give you the flexibility in choosing how to deploy the service.

Depending on your environment, some tools are better suited for certain architectures.

Use the following material to select the appropriate Defender for Endpoint architecture that best suites your organization.

STEP 1: IDENTIFY ARCHITECTURE
Item Description
Thumb image for Defender for Endpoint deployment strategy.
PDF | Visio
The architectural material helps you plan your deployment for the following architectures:

  • Cloud-native
  • Co-management
  • On-premise
  • Evaluation and local onboarding

Step 2: Select deployment method

The following table lists the supported endpoints and the corresponding deployment tool that you can use so that you can plan the deployment appropriately.

Step 3: Configure capabilities

After onboarding endpoints, configure the security capabilities in Defender for Endpoint so that you can maximize the robust security protection available in the suite. Capabilities include:

  • Endpoint detection and response
  • Next-generation protection
  • Attack surface reduction

Source : Official Microsoft Brand
Editor by : BEST Antivirus KBS Team

How useful was this post?

Click on a star to rate it!

Average rating 0 / 5. Vote count: 0

No votes so far! Be the first to rate this post.

(Visited 2 times, 1 visits today)