Microsoft 365 Defender - migration, deployment, administration

Microsoft Defender is an integrated platform for the protection of information systems. This platform protects all our resources no matter where they are, in the cloud, on a mobile device or on on-premise servers. Protects files, services, applications, identity, accounts. Most often, Microsoft Defender is seen as an antivirus protection service from within Windows, where it actually performs the following functions:
- Windows Defender Antivirus
- Windows Defender Firewall
- Windows Defender Control
- Microsoft Defender Application Guard
- Microsoft Defender SmartScreen
#WeKnowHowToDoIT!









Microsoft 365 Defender – systems security
A much wider scope of protection is guaranteed by Microsoft 365 Defender:
Endpoint protection in Microsoft Defender
- Endpoint protection Defender for Endpoint Windows, Android, iOS
- Resources with Defender Vulnerability Management, i.e. vulnerability and vulnerability management that is subject to continuous analysis
- Email and content protection
- Identities with Defender for Identity and Azure Active Directory (Azure AD) Identity Protection – an advanced solution for identifying unusual events, logins from another end of the world, spoofing attempts and eavesdropping.
Office 365 protection in Microsoft Defender
- Automatic deployment with the best default rules
- Defined policies and levels of IT security depending on defined parameters or for designated user groups
- Reporting system status and discovered threats
- A powerful tool to understand, simulate and respond to threats
- Automatic response to threats
Microsoft Defender for Identity
- Monitoring and analysis of end-user behavior and actions
- Protect identities, credentials stored in Azure AD
Protect AD FS running in cloud and on-premise, hybrid environments
Microsoft Defender for Cloud Apps
- Protect sensitive data stored in vaults or applications. Automatic protection of data processing processes
- Detection of anomalous user behavior, identification of ransom actions
- Compliance assessment of applications placed in the cloud by compliance patterns
Microsoft 365 Defender for business
- A solution designed for small and medium-sized companies, i.e. up to 300 users
- Enterprise solution scaled for SMB market
- Integration with Microsoft Intune
Managing vulnerabilities in Microsoft Defender
- Finding vulnerabilities in systems and applications
Intelligent risk-based prioritization, focuses on emerging threats, identifies those breaches that are active and protects the resources of the highest value
Microsoft Defender for Cloud Apps
- Protect sensitive data stored in vaults or applications. Automatic protection of data processing processes
- Detection of anomalous user behavior, identification of ransom actions
- Compliance assessment of applications placed in the cloud by compliance patterns
Microsoft Defender for Cloud Apps
- Protect sensitive data stored in vaults or applications. Automatic protection of data processing processes
- Detection of anomalous user behavior, identification of ransom actions
- Compliance assessment of applications placed in the cloud by compliance patterns
Microsoft Defender for Cloud Apps
- Protect sensitive data stored in vaults or applications. Automatic protection of data processing processes
- Detection of anomalous user behavior, identification of ransom actions
- Compliance assessment of applications placed in the cloud by compliance patterns
Microsoft Defender for Cloud – Protect systems and data in the cloud
Microsoft Defender for Cloud
- Protect assets and track security progress
- SPM – Remediate security issues and observe improvements in security posture
- CWP – Identify unique workload security requirements
- Protect resources for Azure, AWS
Microsoft Defender for Storage
- Storage Protection
- Explore security anomalies
- Shortcut reputation analysis
Microsoft Defender for SQL
- Database vulnerability detection
- Analytics based on SQL Advanced Threat Protection
Microsoft Defender for containers
- Protect containers in Azure Kubernetes Service
- Amazon EKS container protection
- Protect containers in on-premises/ on-premises Kubernetes
Microsoft Defender for App Service
- Identification and protection against attacks against applications running in APP Service
- Microsoft Defender for Key Vault
- Protects apps and credentials
Microsoft Defender for DNS
- Detects data exfiltration for Azure in a DNS tunnel
- Detects software that communicates inappropriately with command or control servers
- Detects DNS attacks
- Detection of infected domains
Microsoft Defender for Resource Manager
Protect Azure Resource Manager for deploying and managing, updating and removing stubs in Microsoft Azure
Microsoft Defender for open source relational databases
- Detects brute-force attacks
- Detects suspicious database activity
- Detects anomalous accesses and unusual query patterns
Microsoft for IoT
- Microsoft Defender for IoT for End-User Organizations
- Protect devices and IoT/OT network traffic
- Microsoft Defender for IoT for Device Builders
- Through a microagent, analysis of projected systems
Summary and all information can be found in the service:
- Microsoft Defender threat intelligence
- A unified platform for managing, analyzing, and responding to collected alerts, incidents, and risks.
Microsoft Defender for business
#WeKnowHowToDoIT!
What versions is Microsoft Defender available in?
Microsoft Defender is available as:Separate product in Microsoft Defender Plan
1 and Plan 2,As a component of Microsoft 365 in some packages under the name Microsoft Defender for Business
As Microsoft
Defender antivirus
Does Microsoft Defender always have the same functionality in different Microsoft suites?
Each Microsoft Defender Pack, depending on the package in which it is available, has different capabilities and different functionalities, always check what you buy, and if you are not able to choose the right product yourself, ask us for a consultation
Sprawdź inne usługi Microsoft 365
#MyWiemyJakToZrobić!