Microsoft Defender for Endpoint Deep Dive: Part 1

Uncover the technology stack behind Microsoft's most critical security component - from behavioral sensors and cloud analytics to automated investigation capabilities that redefine endpoint protection

CyberBoo
๐Ÿ’ก Think your disconnected environment canโ€™t use AI-driven protection? Think again.
With Microsoftโ€™s Streamlined Connectivity, enabling Defender for Endpoint in restricted networks has never been easier. Proxies make it possibleโ€”hereโ€™s how to do it right: https://blog.brianbaldock.net/mde-proxies-2025
#CyberSecurity #DefenderForEndpoint #XDR
Take advantage of Microsoft Defender for Endpoint to defend against advanced threats targeting your endpoints, including malware, ransomware, and sophisticated attacks. #DefenderForEndpoint #EndpointSecurity

Comprehensive guidance for the Defender community on MDE's capabilities so you know exactly what's available

The v6 update has 15 changes, including:

โ€ข New ASR capabilities
โ€ข New Defender antivirus capabilities
โ€ข New device response actions
โ€ข Much more!

Ultimate Comparison of Defender for Endpoint Features by OS - Ru Campbell MVP
https://campbell.scot/feb-2024-ultimate-comparison-of-defender-for-endpoint-features-by-os/

#microsoftdefender #defender #mde #m365 #microsoft365 #defenderforendpoint #edr #xdr #microsoft #blueteam #azure

[Updated Feb 2024] Ultimate Comparison of Defender for Endpoint Features by OS - Ru Campbell MVP

Finally, itโ€™s time for a refresh.  Itโ€™s been a while!  Due to personal circumstances, I havenโ€™t been able to keep the Ultimate Comparison of MDE by OS updated.  Iโ€™ve had time to dive into the changes since v5 and itโ€™s really been amazing to see MDE grow in scope.  What is MDE and why do we need an โ€˜ultimate comparisonโ€™? Microsoft Defender for Endpoint (MDE) is a massive stack of endpoint protection and endpointโ€ฆ

Ru Campbell MVP

๐๐ซ๐จ๐ญ๐ž๐œ๐ญ ๐ฎ๐ง๐ฆ๐š๐ง๐š๐ ๐ž๐ ๐จ๐ซ 3๐ซ๐ ๐ฉ๐š๐ซ๐ญ๐ฒ ๐Œ๐ƒ๐Œ ๐ฆ๐š๐ง๐š๐ ๐ž๐ ๐ข๐Ž๐’/๐€๐ง๐๐ซ๐จ๐ข๐ ๐๐ž๐ฏ๐ข๐œ๐ž๐ฌ ๐ฐ๐ข๐ญ๐ก ๐Œ๐ƒ๐„

In this blog post, you will learn how to protect unmanaged (personal) or 3rd party MDM managed iOS and Android devices with Microsoft Defender for Endpoint as your Mobile Threat Defense (MTD) solution.

The solution leverages Intuneโ€™s App Protection Policies aka MAM to enforce Device Protection with MDE regardless of the device enrollment state.

https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/protect-unmanaged-or-3rd-party-mdm-managed-ios-android-devices/ba-p/4057691

#mde #defender #defenderforendpoint #mtd #mobile #mobileprotection #mobilerhreatdefence #edr #xdr #microsoft #microsoftsecurity #soc #intune #mdm #mam #byod #ios #android #cloudnative

Protect unmanaged or 3rd party MDM managed iOS/Android devices with MDE

A guide to using Microsoft Defender for Endpoint as a mobile threat defense solution for Unmanaged (personal) and 3rd party MDM mobile devices.

TECHCOMMUNITY.MICROSOFT.COM
Become a Microsoft Defender for Endpoint Ninja

Do you want to become a ninja for Microsoft Defender for Endpoint? We can help you get there! 

TECHCOMMUNITY.MICROSOFT.COM

@smfinlay
I've seen some inconsistent behavior with case sensitivity with ==, maybe see if it works if the case matches. Could also be a space in the data.

#DefenderforEndpoint #KQL

For those familiar with #DefenderforEndpoint and #KQL advanced hunting, do you know why I would get results from the query using the "contains" operator and get no results using the "==" operator?

๐€๐ฎ๐ ๐ฆ๐ž๐ง๐ญ ๐ฒ๐จ๐ฎ๐ซ ๐„๐ƒ๐‘ ๐ฐ๐ข๐ญ๐ก ๐๐ž๐œ๐ž๐ฉ๐ญ๐ข๐จ๐ง ๐ญ๐š๐œ๐ญ๐ข๐œ๐ฌ ๐ญ๐จ ๐œ๐š๐ญ๐œ๐ก ๐š๐๐ฏ๐ž๐ซ๐ฌ๐š๐ซ๐ข๐ž๐ฌ ๐ž๐š๐ซ๐ฅ๐ฒ

Deception is now a built-in capability in Microsoft Defender for Endpoint.

Deception in Defender for Endpoint provides customers with:

โžก ๐‡๐ข๐ ๐ก ๐œ๐จ๐ง๐Ÿ๐ข๐๐ž๐ง๐œ๐ž ๐๐ž๐ญ๐ž๐œ๐ญ๐ข๐จ๐ง๐ฌ ๐š๐ง๐ ๐š๐ฎ๐ญ๐จ๐ฆ๐š๐ญ๐ข๐œ ๐๐ข๐ฌ๐ซ๐ฎ๐ฉ๐ญ๐ข๐จ๐ง ๐จ๐Ÿ ๐ญ๐ก๐ซ๐ž๐š๐ญ๐ฌ โ€“ Detects human operated lateral movement in the early stages of a cyber-attack and triggers attack disruption to contain the threat.

โžก๐€๐ˆ-๐ฉ๐จ๐ฐ๐ž๐ซ๐ž๐ ๐ ๐ž๐ง๐ž๐ซ๐š๐ญ๐ข๐จ๐ง ๐จ๐Ÿ ๐š๐ฎ๐ญ๐ก๐ž๐ง๐ญ๐ข๐œ ๐๐ž๐œ๐จ๐ฒ๐ฌ ๐š๐ง๐ ๐ฅ๐ฎ๐ซ๐ž๐ฌ โ€“ Defender for Endpoint uses machine learning to autogenerate and deploy authentic decoys and lures into your network that mirror production assets

โžก๐๐ฎ๐ข๐ฅ๐ญ ๐ข๐ง๐ญ๐จ ๐ญ๐ก๐ž ๐ž๐ฑ๐ข๐ฌ๐ญ๐ข๐ง๐  ๐ž๐ง๐๐ฉ๐จ๐ข๐ง๐ญ ๐š๐ ๐ž๐ง๐ญ - no additional deployment or management of sensors on your network.

โžก๐ˆ๐ง๐ญ๐ž๐ ๐ซ๐š๐ญ๐ž๐ ๐ข๐ง๐ญ๐จ ๐ญ๐ก๐ž ๐—๐ƒ๐‘ ๐’๐Ž๐‚ ๐ž๐ฑ๐ฉ๐ž๐ซ๐ข๐ž๐ง๐œ๐ž โ€“ for easy, end to end investigation of attacks

https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/ignite-news-augment-your-edr-with-deception-tactics-to-catch/ba-p/3982253

#defender #microsoftdefender #mde #xdr #deception #azure #microsoft #microsoftsecurity #soc #ransomware #ai #aisecurity #analyst #defenderforendpoint #cloudnative #cloudsecurity

Ignite News: Augment your EDR with deception tactics to catch adversaries early

Deception is now built into Defender for Endpoint and helps disrupt attacks even faster.

TECHCOMMUNITY.MICROSOFT.COM