Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
240 views86 pages

Defender For Endpoint - Tech Intensity

The document discusses the importance of advanced security solutions like Microsoft Defender for Endpoint, highlighting its capabilities and pricing for different plans. It emphasizes the need for layered security in response to increasingly complex cyber threats, particularly those related to COVID-themed attacks. Additionally, it addresses the challenges faced by analysts in managing alerts and the necessity for automated investigation and remediation tools.

Uploaded by

Abdessabour
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
240 views86 pages

Defender For Endpoint - Tech Intensity

The document discusses the importance of advanced security solutions like Microsoft Defender for Endpoint, highlighting its capabilities and pricing for different plans. It emphasizes the need for layered security in response to increasingly complex cyber threats, particularly those related to COVID-themed attacks. Additionally, it addresses the challenges faced by analysts in managing alerts and the necessity for automated investigation and remediation tools.

Uploaded by

Abdessabour
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 86

Travis Guinn

Cloud Solutions Architect


Malware encounters align with news headlines

COVID-themed attacks: United States

Microsoft Digital Defense Report 2020


Take your security to the next
level with a layered and highly
extensible solution that builds
the foundation for XDR and
Zero Trust.
Delivering endpoint security across platforms

Azure Virtual Desktop


Microsoft Defender Capabilities P1 P2
for Endpoint Centralized management (reporting, triage, response actions)  
Next-generation antimalware  
P1 vs P2 capability
Device control (e.g.: USB)  
comparison
Endpoint firewall  
Attack Surface Reduction rules  
Network protection  
Web control / category-based URL blocking  
Device-based conditional access  
Ransomware mitigation  
API’s, SIEM connector, custom TI  
Application control  
Endpoint Detection and Response 
Automated investigation and remediation 
Threat and vulnerability management 
Threat intelligence (Threat Analytics) 
Sandbox (deep analysis) 
Microsoft Threat Experts 
Microsoft 365 E3

$32 / USER / MONTH

 Microsoft Defender for


Endpoint Plan 1
1) Sold as standalone SKU
• Priced at $3/user/month
• Entitlement for up to 5 devices
• Generally available late 2021
Microsoft Defender for Endpoint 2) Included as part of Microsoft 365 E3/A3
Plan 1 • All existing Microsoft 365 E3/A3
customers will be “upgraded” to
$3 / USER / MONTH
Microsoft Defender for Endpoint Plan 1

aka.ms/mdelicensing
Microsoft 365 E5

$57 / USER / MONTH

 Microsoft Defender for


Microsoft Defender for Endpoint Endpoint Plan 2
Plan 2
1) Sold as standalone SKU
• Priced at $5/user/month
$5 / USER / MONTH
• Entitlement for up to 5 devices
2) Included as part of Microsoft 365 E5/A5
3) Included as part of Microsoft 365 E5
Security

aka.ms/mdelicensing
ASR
Microsoft
AMSI
blog
blog
blog
blog
As attacks become more complex and multi-staged,
it’s difficult to make sense of the threats detected
Announcement blog
Analysts overwhelmed by manual alert
investigation & remediation
Alert queue

Analyst 1 Analyst 2
?

You might also like