Deploy the Microsoft Defender for Endpoint environment
Learn how to deploy the Microsoft Defender for Endpoint environment, including onboarding devices and configuring security.
Learning objectives
Upon completion of this module, the learner will be able to:
- Create a Microsoft Defender for Endpoint environment
- Onboard devices to be monitored by Microsoft Defender for Endpoint
- Configure Microsoft Defender for Endpoint environment settings
Deploying the Microsoft Defender for Endpoint environment involves configuring your tenant, onboarding your devices, and configuring security team access.
You're a Security Operations Analyst working at a company that is implementing Microsoft Defender for Endpoint. Your manager plans to onboard a few devices to provide insight into required changes to the SecOps team response procedures.
You start by initializing the Defender for Endpoint environment—next, you onboard the initial devices for your deployment by running the onboarding script on the devices. You configure security for the environment. Next, you create Device groups and assign the appropriate devices.
After completing this module, you'll be able to:
- Create a Microsoft Defender for Endpoint environment
- Onboard devices to be monitored by Microsoft Defender for Endpoint
- Configure Microsoft Defender for Endpoint environment settings
When accessing your Microsoft 365 Defender portal settings for Endpoints for the first time, you'll be able to configure many attributes. You must be a global administrator or security administrator for the tenant. On the Set-up preferences page, you can set the:
Data storage location - Determine where you want to be primarily hosted: US, EU, or UK. You can't change the location after this set up and Microsoft won't transfer the data from the specified geolocation.
Data retention - The default is six months.
Enable preview features - The default is on, can be changed later.
To access the Microsoft 365 Defender portal settings for Endpoints do the following action:
- Go to (https://security.microsoft.com)
- Select Settings.
- Select Endpoints.
If the organization doesn't require the endpoints to use a Proxy to access the Internet, the following configuration isn't required.
The Microsoft Defender for Endpoint sensor requires Microsoft Windows HTTP (WinHTTP) to report sensor data and communicate with the Microsoft Defender for Endpoint service. The embedded Microsoft Defender for Endpoint sensor runs in the system context using the LocalSystem account. The sensor uses Microsoft Windows HTTP Services (WinHTTP) to enable communication with the Microsoft Defender for Endpoint cloud service. The WinHTTP configuration setting is independent of the Windows Internet (WinINet) internet browsing proxy settings and can only discover a proxy server by using the following discovery methods:
Autodiscovery methods:
Transparent proxy
Web Proxy Autodiscovery Protocol (WPAD)
If a Transparent proxy or WPAD has been implemented in the network topology, there's no need for special configuration settings.
Understand operating systems compatibility and features
Microsoft Defender for Endpoint is available on the following Operating Systems:
- Windows
- macOS
- Linux
- Android
- iOS
Supported Windows versions
- Windows 7 SP1 Enterprise (Requires ESU for support.)
- Windows 7 SP1 Pro (Requires ESU for support.)
- Windows 8.1 Enterprise
- Windows 8.1 Pro
- Windows 11 Enterprise
- Windows 11 Education
- Windows 11 Pro
- Windows 11 Pro Education
- Windows 10 Enterprise
- Windows 10 Enterprise LTSC 2016 (or later)
- Windows 10 Enterprise IoT
- Windows 10 Education
- Windows 10 Pro
- Windows 10 Pro Education
- Windows server
- Windows Server 2008 R2 SP1 (Requires ESU for support)
- Windows Server 2012 R2
- Windows Server 2016
- Windows Server, version 1803 or later
- Windows Server 2019
- Windows Server 2022
- Windows Virtual Desktop
When accessing your Microsoft 365 Defender portal settings for Endpoints for the first time, you'll be able to configure many attributes. You must be a global administrator or security administrator for the tenant. On the Set-up preferences page, you can set the:
Data storage location - Determine where you want to be primarily hosted: US, EU, or UK. You can't change the location after this set up and Microsoft won't transfer the data from the specified geolocation.
Data retention - The default is six months.
Enable preview features - The default is on, can be changed later.
To access the Microsoft 365 Defender portal settings for Endpoints do the following action:
- Go to (https://security.microsoft.com)
- Select Settings.
- Select Endpoints.
If the organization doesn't require the endpoints to use a Proxy to access the Internet, the following configuration isn't required.
The Microsoft Defender for Endpoint sensor requires Microsoft Windows HTTP (WinHTTP) to report sensor data and communicate with the Microsoft Defender for Endpoint service. The embedded Microsoft Defender for Endpoint sensor runs in the system context using the LocalSystem account. The sensor uses Microsoft Windows HTTP Services (WinHTTP) to enable communication with the Microsoft Defender for Endpoint cloud service. The WinHTTP configuration setting is independent of the Windows Internet (WinINet) internet browsing proxy settings and can only discover a proxy server by using the following discovery methods:
Autodiscovery methods:
Transparent proxy
Web Proxy Autodiscovery Protocol (WPAD)
If a Transparent proxy or WPAD has been implemented in the network topology, there's no need for special configuration settings.
Defender for Endpoint is a comprehensive cloud-based endpoint security solution developed by Microsoft. It provides advanced protection against sophisticated threats across multiple platforms, including Windows, macOS, Linux, Android, and iOS.
The solution employs artificial intelligence and machine learning technologies to detect and prevent a wide range of attacks, including fileless, zero-day, and ransomware attacks. It also offers endpoint detection and response (EDR) capabilities, enabling security teams to investigate and respond to threats in real-time.
In summary, Defender for Endpoint is a robust endpoint security solution that offers advanced threat protection, machine learning-based detection and response capabilities, and centralized management of security policies across multiple platforms.
Comments
Post a Comment