Reader small image

You're reading from  Microsoft 365 Security and Compliance for Administrators

Product typeBook
Published inMar 2024
PublisherPackt
ISBN-139781837638376
Edition1st Edition
Right arrow
Authors (2):
Sasha Kranjac
Sasha Kranjac
author image
Sasha Kranjac

Sasha Kranjac has been recognized as a Microsoft Regional Director (RD), Microsoft Most Valuable Professional (MVP) in two categories (Azure and Security), he is Microsoft Certified Trainer (MCT), MCT Regional Lead, Certified EC-Council Instructor (CEI), a CompTIA Instructor, speaker at international conferences, user groups, and events, and a book author on cloud security, Microsoft Azure, Microsoft 365, and Windows Server. Sasha is the CEO of Kloudatech, an IT training and consulting company, a Microsoft Partner, an AWS Partner, and a CompTIA Authorized Delivery Partner, specialized in cybersecurity, cloud security architecture and IT training. They deliver high quality vendor and custom IT training and PowerClass Workshops internationally. He is also the CEO of Kranjac Consulting and Training, a consulting, training, and engineering company, specialized in civil engineering and CAD design.
Read more about Sasha Kranjac

Omar Kudović
Omar Kudović
author image
Omar Kudović

Omar Kudovic works as a Senior System Engineer in SYS Company d.o.o. Sarajevo. He has a few professional Microsoft certifications, such as Security Expert: Cybersecurity Architect and Azure Enterprise Expert. For the last 12 years, he has been awarded the Microsoft Most Valuable Professional (MVP) in the Office 365 Apps and Services category. For the past few years, he has been actively working on the application of Microsoft Security and Compliance solutions in government and business organizations. Participated as a lecturer at hundreds of IT conferences in the world. In private life, passionate music collector and audiophile.
Read more about Omar Kudović

View More author details
Right arrow

Microsoft Defender for Endpoint

Microsoft Defender for Endpoint is a Microsoft solution that provides protection for Windows, macOS, Android, and iPhone devices against various forms of malware, including viruses, spyware, and ransomware. It uses machine learning and behavioral analysis to detect and respond to threats in real-time. With its ease of use, scalability, and integration with Microsoft’s security stack, Defender for Endpoint is a powerful tool for organizations looking to improve their endpoint security and protect against the latest threats.

This chapter will cover the following topics:

  • Introducing Microsoft Defender for Endpoint
  • Configuring Microsoft Defender for Endpoint
  • An overview of the Microsoft Intune admin center
  • Endpoint security in the Microsoft Intune admin center

Introducing Microsoft Defender for Endpoint

Defender for Endpoint integrates with the Microsoft 365 security stack and leverages the Microsoft cloud infrastructure to provide comprehensive, multi-layered security for endpoint devices. It uses behavioral sensors, cloud-based protection, and threat intelligence to detect and respond to advanced threats in a timely manner. In addition to its antivirus capabilities, Defender for Endpoint also includes features such as device control, firewall, and network protection. The solution also provides device management capabilities, allowing administrators to monitor and manage the security of all endpoint devices in their organization from a single console.

Microsoft Defender for Endpoint is important for several reasons:

  • Advanced threat protection: Defender for Endpoint uses artificial intelligence and machine learning to detect and respond to threats in real-time. This helps organizations protect against the latest and most sophisticated...

Technical and license requirements

Microsoft Defender for Endpoint requires the following minimum administrative roles for managing the solution:

  • Global administrator: To sign in and manage Microsoft Defender for Endpoint and related services
  • Security administrator: To manage security policies and responses to threats
  • Device administrator: To manage devices and device policies

It is important to note that these roles are the minimum required and the exact administrative roles required may vary depending on the specific needs and requirements of the organization.

Regarding supported browsers for Microsoft Defender for Endpoint, you can use either Microsoft Edge or Google Chrome. According to Microsoft’s information site about Microsoft Defender for Endpoint, other browsers can be used, but only those two are supported fully.

Microsoft Defender for Endpoint is included in Enterprise plans or can be added to the tenant as a standalone plan. There are...

Configuring Microsoft Defender for Endpoint

The Device Overview portal in Microsoft Intune provides a comprehensive view of the security status of devices connected to an organization’s network. The following are some of the key information and insights that you can see in the Device Overview portal:

  • Device count: The Device Overview portal provides an overview of the number of devices that are connected to the network, including the number of devices that are protected by Microsoft Defender for Endpoint
  • Threats detected: The portal displays the number of threats that have been detected and remediated on the network, including malware, ransomware, and other types of cyber threats:
  • Vulnerabilities: The portal provides insight into the vulnerabilities on the network, including missing security updates, unpatched software, and other security weaknesses
  • Device health: The portal displays the health of devices, including the operating system version, the status...

Endpoint Security

Confused? Microsoft Defender for Endpoint or Endpoint Security? Microsoft Defender for Endpoint and Endpoint Security are both security solutions offered by Microsoft, but they have some important differences. Microsoft Defender for Endpoint is an advanced endpoint protection platform that helps to prevent, detect, investigate, and respond to advanced threats on devices and networks. It provides real-time protection against viruses, malware, and other cyberattacks. It also includes features such as behavioral analysis, cloud-powered protection, and automated security intelligence, as we already mentioned in the introduction. Defender for Endpoint is designed for organizations of all sizes, and it offers centralized management and reporting capabilities.

On the other hand, Endpoint Security is a more basic security solution that provides antivirus and anti-malware protection for Windows 10 devices. It is included in the Microsoft 365 Business Premium and Microsoft...

Summary

Microsoft Defender for Endpoint with Microsoft Intune represents a crucial cybersecurity solution in today’s dynamic threat landscape. It is designed to address the diverse and evolving security challenges faced by organizations. Formerly known as Windows Defender ATP, this platform specifically focuses on defending endpoint devices, which are on the front line in the battle against cyber threats.

In a world where cyberattacks are constantly evolving in sophistication, Microsoft Defender for Endpoint offers an extensive toolkit to combat these challenges effectively. With its advanced threat protection capabilities, it guards against a wide spectrum of threats, including malware, ransomware, and zero-day attacks.

One of its standout features is the EDR functionality, which empowers organizations to not only identify but also respond swiftly to security incidents. This capability enhances an organization’s ability to investigate and remediate threats promptly...

lock icon
The rest of the chapter is locked
You have been reading a chapter from
Microsoft 365 Security and Compliance for Administrators
Published in: Mar 2024Publisher: PacktISBN-13: 9781837638376
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
undefined
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime

Authors (2)

author image
Sasha Kranjac

Sasha Kranjac has been recognized as a Microsoft Regional Director (RD), Microsoft Most Valuable Professional (MVP) in two categories (Azure and Security), he is Microsoft Certified Trainer (MCT), MCT Regional Lead, Certified EC-Council Instructor (CEI), a CompTIA Instructor, speaker at international conferences, user groups, and events, and a book author on cloud security, Microsoft Azure, Microsoft 365, and Windows Server. Sasha is the CEO of Kloudatech, an IT training and consulting company, a Microsoft Partner, an AWS Partner, and a CompTIA Authorized Delivery Partner, specialized in cybersecurity, cloud security architecture and IT training. They deliver high quality vendor and custom IT training and PowerClass Workshops internationally. He is also the CEO of Kranjac Consulting and Training, a consulting, training, and engineering company, specialized in civil engineering and CAD design.
Read more about Sasha Kranjac

author image
Omar Kudović

Omar Kudovic works as a Senior System Engineer in SYS Company d.o.o. Sarajevo. He has a few professional Microsoft certifications, such as Security Expert: Cybersecurity Architect and Azure Enterprise Expert. For the last 12 years, he has been awarded the Microsoft Most Valuable Professional (MVP) in the Office 365 Apps and Services category. For the past few years, he has been actively working on the application of Microsoft Security and Compliance solutions in government and business organizations. Participated as a lecturer at hundreds of IT conferences in the world. In private life, passionate music collector and audiophile.
Read more about Omar Kudović