0
(0)

Get and deploy updates across your organization’s devices

As a best practice, keep your organization’s devices and endpoints up to date. Make sure your existing endpoint protection and antivirus solution is up to date, and that the operating systems and apps your organization is also have the latest updates. Doing this now can help prevent problems later as you migrate to Defender for Endpoint and Microsoft Defender Antivirus.

Make sure your existing solution is up to date

Keep your existing endpoint protection solution up to date, and make sure that your organization’s devices have the latest security updates.

Need help? See your solution provider’s documentation.

Make sure your organization’s devices are up to date

Need help updating your organization’s devices? See the following resources:

Get Microsoft Defender for Endpoint

Now that you’ve updated your organization’s devices, the next step is to get Defender for Endpoint, assign licenses, and make sure the service is provisioned.

  1. Buy or try Defender for Endpoint today. Start a free trial or request a quote.
  2. Verify that your licenses are properly provisioned. Check your license state.
  3. Set up your dedicated cloud instance of Defender for Endpoint. See Defender for Endpoint setup: Tenant configuration.
  4. If endpoints (such as devices) in your organization use a proxy to access the internet, see Defender for Endpoint setup: Network configuration.

At this point, you are ready to grant access to your security administrators and security operators who will use the Microsoft 365 Defender portal.

 Note

The Microsoft 365 Defender portal is sometimes referred to as the Defender for Endpoint portal, and can be accessed at https://security.microsoft.com. The former Microsoft Defender Security Center (https://securitycenter.windows.com) will soon redirect to the Microsoft 365 Defender portal. To learn more, see Microsoft 365 Defender portal overview.

Grant access to the Microsoft 365 Defender portal

The Microsoft 365 Defender portal is where you access and configure features and capabilities of Defender for Endpoint. To learn more, see Overview of the Microsoft 365 Defender portal.

Permissions to the Microsoft 365 Defender portal can be granted by using either basic permissions or role-based access control (RBAC). We recommend using RBAC so that you have more granular control over permissions.

  1. Plan the roles and permissions for your security administrators and security operators. See Role-based access control.
  2. Set up and configure RBAC. We recommend using Intune to configure RBAC, especially if your organization is using a combination of Windows 10, macOS, iOS, and Android devices. See setting up RBAC using Intune.

    If your organization requires a method other than Intune, choose one of the following options:

  3. Grant access to the Microsoft 365 Defender portal. (Need help? See Manage portal access using RBAC.

Configure device proxy and internet connectivity settings

To enable communication between your devices and Defender for Endpoint, configure proxy and internet settings. The following table includes links to resources you can use to configure your proxy and internet settings for various operating systems and capabilities:

Source : Official Microsoft Brand
Editor by : BEST Antivirus KBS Team

How useful was this post?

Click on a star to rate it!

Average rating 0 / 5. Vote count: 0

No votes so far! Be the first to rate this post.

(Visited 10 times, 1 visits today)