Understand endpoint detection and response - Microsoft Defender for Cloud (2024)

  • Article

With Microsoft Defender for Servers, you gain access to and can deploy Microsoft Defender for Endpoint to your server resources. Microsoft Defender for Endpoint is a holistic, cloud-delivered, endpoint security solution. The main features include:

  • Risk-based vulnerability management and assessment
  • Attack surface reduction
  • Behavioral based and cloud-powered protection
  • Endpoint detection and response (EDR)
  • Automatic investigation and remediation
  • Managed hunting services

You can learn about Defender for Cloud's integration with Microsoft Defender for Endpoint by watching this video from the Defender for Cloud in the Field video series: Defender for Servers integration with Microsoft Defender for Endpoint

For more information about migrating servers from Defender for Endpoint to Defender for Cloud, see the Microsoft Defender for Endpoint to Microsoft Defender for Cloud Migration Guide.

Benefits of integrating Microsoft Defender for Endpoint with Defender for Cloud

Microsoft Defender for Endpoint protects your Windows and Linux machines whether they're hosted in Azure, hybrid clouds (on-premises), or multicloud environments.

The protections include:

  • Advanced post-breach detection sensors. Defenders for Endpoint's sensors collect a vast array of behavioral signals from your machines.

  • Vulnerability assessment from Microsoft Defender Vulnerability Management. With Microsoft Defender for Endpoint installed, Defender for Cloud can show vulnerabilities discovered by Defender Vulnerability Management and also offer this module as a supported vulnerability assessment solution. Learn more in Investigate weaknesses with Microsoft Defender Vulnerability Management.

    This module also brings the software inventory features described in Access a software inventory and can be automatically enabled for supported machines with the auto deploy settings.

  • Analytics-based, cloud-powered, post-breach detection. Defender for Endpoint quickly adapts to changing threats. It uses advanced analytics and big data. It's amplified by the power of the Intelligent Security Graph with signals across Windows, Azure, and Office to detect unknown threats. It provides actionable alerts and enables you to respond quickly.

  • Threat intelligence. Defender for Endpoint generates alerts when it identifies attacker tools, techniques, and procedures. It uses data generated by Microsoft threat hunters and security teams, augmented by intelligence provided by partners.

When you integrate Defender for Endpoint with Defender for Cloud, you gain access to the benefits from the following extra capabilities:

  • Automated onboarding. Defender for Cloud automatically enables the Defender for Endpoint sensor on all supported machines connected to Defender for Cloud.

  • Single pane of glass. The Defender for Cloud portal pages displays Defender for Endpoint alerts. To investigate further, use Microsoft Defender for Endpoint's own portal pages where you see additional information such as the alert process tree and the incident graph. You can also see a detailed machine timeline that shows every behavior for a historical period of up to six months.

    Understand endpoint detection and response - Microsoft Defender for Cloud (1)

What are the requirements for the Microsoft Defender for Endpoint tenant?

A Defender for Endpoint tenant is automatically created, when you use Defender for Cloud to monitor your machines.

  • Location: Data collected by Defender for Endpoint is stored in the geo-location of the tenant as identified during provisioning. Customer data - in pseudonymized form - might also be stored in the central storage and processing systems in the United States. After you configure the location, you can't change it. If you have your own license for Microsoft Defender for Endpoint and need to move your data to another location, contact Microsoft support to reset the tenant.

  • Moving subscriptions: If you move your Azure subscription between Azure tenants, some manual preparatory steps are required before Defender for Cloud deploys Defender for Endpoint. For full details, contact Microsoft support.

Note

To move your Defender for Endpoint extension to a different subscription in the same tenant, delete either the MDE.Linux' or 'MDE.Windows extension from the virtual machine and Defender for Cloud will automatically redeploy it.

Check out the minimum requirements for Defender for Endpoint, to see what the licensing, browser, hardware, software requirements are and more.

Related content

Understand endpoint detection and response - Microsoft Defender for Cloud (2024)
Top Articles
Did You Lose Money Investing in Bitcoin? You're Not Alone.
How to recover your Google Account or Gmail
Www.politicser.com Pepperboy News
Truist Park Section 135
Dr Lisa Jones Dvm Married
Tap Tap Run Coupon Codes
Oppenheimer & Co. Inc. Buys Shares of 798,472 AST SpaceMobile, Inc. (NASDAQ:ASTS)
Texas (TX) Powerball - Winning Numbers & Results
Swimgs Yung Wong Travels Sophie Koch Hits 3 Tabs Winnie The Pooh Halloween Bob The Builder Christmas Springs Cow Dog Pig Hollywood Studios Beach House Flying Fun Hot Air Balloons, Riding Lessons And Bikes Pack Both Up Away The Alpha Baa Baa Twinkle
Autozone Locations Near Me
Corporate Homepage | Publix Super Markets
shopping.drugsourceinc.com/imperial | Imperial Health TX AZ
Moe Gangat Age
Simple Steamed Purple Sweet Potatoes
C-Date im Test 2023 – Kosten, Erfahrungen & Funktionsweise
Slushy Beer Strain
Bx11
Beebe Portal Athena
Labby Memorial Funeral Homes Leesville Obituaries
Ahrefs Koopje
Nearest Walgreens Or Cvs Near Me
Scout Shop Massapequa
Azur Lane High Efficiency Combat Logistics Plan
Defending The Broken Isles
Boxer Puppies For Sale In Amish Country Ohio
Wat is een hickmann?
Panolian Batesville Ms Obituaries 2022
Temu Seat Covers
The Clapping Song Lyrics by Belle Stars
Ewg Eucerin
Page 2383 – Christianity Today
Sinai Sdn 2023
Craigslist Middletown Ohio
Craigslist/Phx
Sam's Club Near Wisconsin Dells
October 19 Sunset
2430 Research Parkway
Litter-Robot 3 Pinch Contact & DFI Kit
Top-ranked Wisconsin beats Marquette in front of record volleyball crowd at Fiserv Forum. What we learned.
Indio Mall Eye Doctor
Metro Pcs Forest City Iowa
Henry Ford’s Greatest Achievements and Inventions - World History Edu
Atom Tickets – Buy Movie Tickets, Invite Friends, Skip Lines
Vindy.com Obituaries
Kutty Movie Net
Fool's Paradise Showtimes Near Roxy Stadium 14
Yourcuteelena
10 Types of Funeral Services, Ceremonies, and Events » US Urns Online
Ephesians 4 Niv
Here’s What Goes on at a Gentlemen’s Club – Crafternoon Cabaret Club
683 Job Calls
Latest Posts
Article information

Author: Sen. Emmett Berge

Last Updated:

Views: 6314

Rating: 5 / 5 (80 voted)

Reviews: 87% of readers found this page helpful

Author information

Name: Sen. Emmett Berge

Birthday: 1993-06-17

Address: 787 Elvis Divide, Port Brice, OH 24507-6802

Phone: +9779049645255

Job: Senior Healthcare Specialist

Hobby: Cycling, Model building, Kitesurfing, Origami, Lapidary, Dance, Basketball

Introduction: My name is Sen. Emmett Berge, I am a funny, vast, charming, courageous, enthusiastic, jolly, famous person who loves writing and wants to share my knowledge and understanding with you.