9.5 KiB
title, description, keywords, search.product, ms.prod, ms.mktglfcycl, ms.sitesec, ms.pagetype, ms.author, author, ms.localizationpriority, manager, audience, ms.collection, ms.topic
title | description | keywords | search.product | ms.prod | ms.mktglfcycl | ms.sitesec | ms.pagetype | ms.author | author | ms.localizationpriority | manager | audience | ms.collection | ms.topic |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Threat Protection (Windows 10) | Microsoft Defender for Endpoint is a unified platform for preventative protection, post-breach detection, automated investigation, and response. | threat protection, Microsoft Defender Advanced Threat Protection, attack surface reduction, next-generation protection, endpoint detection and response, automated investigation and response, microsoft threat experts, Microsoft Secure Score for Devices, advanced hunting, cyber threat hunting, web threat protection | eADQiWindows 10XVcnh | w10 | deploy | library | security | macapara | mjcaparas | medium | dansimp | ITPro | M365-security-compliance | conceptual |
Threat Protection
Microsoft Defender for Endpoint is a unified platform for preventative protection, post-breach detection, automated investigation, and response. Defender for Endpoint protects endpoints from cyber threats, detects advanced attacks and data breaches, automates security incidents, and improves security posture.
Tip
Enable your users to access cloud services and on-premises applications with ease and enable modern management capabilities for all devices. For more information, see Secure your remote workforce.
Microsoft Defender for Endpoint
[!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4obJq]
Threat & vulnerability management
This built-in capability uses a game-changing risk-based approach to the discovery, prioritization, and remediation of endpoint vulnerabilities and misconfigurations.
- Threat & vulnerability management overview
- Get started
- Access your security posture
- Improve your security posture and reduce risk
- Understand vulnerabilities on your devices
Attack surface reduction
The attack surface reduction set of capabilities provide the first line of defense in the stack. By ensuring configuration settings are properly set and exploit mitigation techniques are applied, these set of capabilities resist attacks and exploitation.
- Hardware based isolation
- Application control
- Device control
- Exploit protection
- Network protection, web protection
- Controlled folder access
- Network firewall
- Attack surface reduction rules
Next-generation protection
To further reinforce the security perimeter of your network, Microsoft Defender for Endpoint uses next-generation protection designed to catch all types of emerging threats.
- Behavior monitoring
- Cloud-based protection
- Machine learning
- URL Protection
- Automated sandbox service
Endpoint detection and response
Endpoint detection and response capabilities are put in place to detect, investigate, and respond to intrusion attempts and active breaches. With Advanced hunting, you have a query-based threat-hunting tool that lets your proactively find breaches and create custom detections.
- Alerts
- Historical endpoint data
- Response orchestration
- Forensic collection
- Threat intelligence
- Advanced detonation and analysis service
- Advanced hunting
Automated investigation and remediation
In addition to quickly responding to advanced attacks, Microsoft Defender for Endpoint offers automatic investigation and remediation capabilities that help reduce the volume of alerts in minutes at scale.
- Automated investigation and remediation
- View details and results of automated investigations
- View and approve remediation actions
Microsoft Threat Experts
Microsoft Defender for Endpoint's new managed threat hunting service provides proactive hunting, prioritization, and additional context and insights. Microsoft Threat Experts further empowers Security Operation Centers (SOCs) to identify and respond to threats quickly and accurately.
- Targeted attack notification
- Experts-on-demand
- Configure your Microsoft 365 Defender managed hunting service
Centralized configuration and administration, APIs
Integrate Microsoft Defender for Endpoint into your existing workflows.
- Onboarding
- API and SIEM integration
- Exposed APIs
- Role-based access control (RBAC)
- Reporting and trends
Integration with Microsoft solutions
Microsoft Defender for Endpoint directly integrates with various Microsoft solutions, including:
- Intune
- Microsoft Defender for Office 365
- Microsoft Defender for Identity
- Azure Defender
- Skype for Business
- Microsoft Cloud App Security
Microsoft 365 Defender
With Microsoft 365 Defender, Microsoft Defender for Endpoint and various Microsoft security solutions form a unified pre- and post-breach enterprise defense suite that natively integrates across endpoint, identity, email, and applications to detect, prevent, investigate, and automatically respond to sophisticated attacks.