Skip to content

Commit 2f6eaea

Browse files
authored
Merge branch 'main' into docs-editor/switch-to-mde-phase-2-1750089266
2 parents 51dc292 + 93e04b3 commit 2f6eaea

File tree

12 files changed

+80
-4
lines changed

12 files changed

+80
-4
lines changed

ATPDocs/investigate-security-alerts.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ Investigate alerts that are affecting your environment, understand what they mea
1212
Begin your investigation by selecting an alert from the **Alerts** page in the Microsoft Defender portal. The alerts page displays a list of all security alerts generated by Defender for Identity, including their severity, status, and impacted assets. Selecting an alert opens the alert page, which contains the alert title, the affected assets, the details side pane, and in some cases, an alert story.
1313

1414
> [!NOTE]
15-
> The **alert story** and **export to Excel** options are only available for alerts that use the original Defender for Identity structure.
15+
> The **alert story** and **export to Excel** options are only available for alerts that use the classic Defender for Identity structure.
1616
> For more information about differences in how alerts are presented in the Defender portal, see [View and manage alerts](understanding-security-alerts.md).
1717
1818
## Investigate using the alert story
672 KB
Loading
652 KB
Loading
680 KB
Loading

ATPDocs/remove-replication-permissions-microsoft-entra-connect.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,11 @@ Smart attackers are likely to target Microsoft Entra Connect in on-premises envi
3030

3131
1. Take appropriate action on those accounts and remove their 'Replication Directory Changes' and 'Replication Directory Changes All' permissions by unchecking the following permissions:
3232

33-
![Screenshot of the replication permissions.](media/remove-replication-permissions-microsoft-entra-connect/permissions.png)
33+
[![Screenshot that shows Replicationconfiguration](media/remove-replication-permissions-microsoft-entra-connect/replicationconfiguration.png)](media/remove-replication-permissions-microsoft-entra-connect/replicationconfiguration.png#lightbox)
34+
35+
36+
37+
3438

3539
> [!IMPORTANT]
3640
> For environments with multiple Microsoft Entra Connect servers, it’s crucial to install sensors on each server to ensure Microsoft Defender for Identity can fully monitor your setup. It has been detected that your Microsoft Entra Connect configuration does not utilize Password Hash Sync, which means that replication permissions are not necessary for the accounts in the Exposed Entities list. Additionally, it’s important to ensure that each exposed MSOL account is not required for Replication Permissions by any other applications.

ATPDocs/toc.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -85,7 +85,7 @@ items:
8585
- name: Listen for SIEM events
8686
href: deploy/configure-event-collection.md
8787
displayName: standalone
88-
- name: Activate Defender for Identity capabilities on your domain controller
88+
- name: Activate Defender for Identity capabilities on your domain controller (Preview)
8989
href: deploy/activate-capabilities.md
9090
- name: Integrate with identity services
9191
items:

defender-endpoint/TOC.yml

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -560,11 +560,14 @@
560560
items:
561561
- name: Migration guides overview
562562
href: migration-guides.md
563+
- name: Considerations for side-by-side deployment
564+
href: mde-side-by-side.md
563565
- name: Migrate servers to Defender for Cloud
564566
href: migrating-mde-server-to-cloud.md
565567
- name: Migrate to Defender for Endpoint
566-
href: switch-to-mde-overview.md
567568
items:
569+
- name: Overview
570+
href: switch-to-mde-overview.md
568571
- name: Phase 1 - Prepare
569572
href: switch-to-mde-phase-1.md
570573
- name: Phase 2 - Setup
Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,11 @@
1+
---
2+
author: denisebmsft
3+
ms.author: deniseb
4+
ms.date: 06/13/2025
5+
ms.topic: include
6+
ms.service: defender-endpoint
7+
---
8+
9+
If you want to run multiple security solutions side by side, see [Considerations for performance, configuration, and support](/defender-endpoint/mde-side-by-side).
10+
11+
You might have already configured mutual security exclusions for devices onboarded to Microsoft Defender for Endpoint. If you still need to set mutual exclusions to avoid conflicts, see [Add Microsoft Defender for Endpoint to the exclusion list for your existing solution](/defender-endpoint/switch-to-mde-phase-2#step-3-add-microsoft-defender-for-endpoint-to-the-exclusion-list-for-your-existing-solution).

defender-endpoint/mde-planning-guide.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -70,4 +70,6 @@ Here's a list of prerequisites required to deploy Defender for Endpoint:
7070

7171
Start your deployment with [Step 1 - Set up Microsoft Defender for Endpoint deployment](production-deployment.md)
7272

73+
[!INCLUDE [side-by-side-scenarios](includes/side-by-side-scenarios.md)]
74+
7375
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]
Lines changed: 52 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,52 @@
1+
---
2+
title: Microsoft Defender for Endpoint alongside other security solutions
3+
description: See recommendations for running Defender for Endpoint alongside other security solutions.
4+
ms.service: defender-endpoint
5+
ms.localizationpriority: medium
6+
ms.date: 06/13/2025
7+
ms.topic: conceptual
8+
author: emmwalshh
9+
ms.author: ewalsh
10+
ms.custom:
11+
- nextgen
12+
- partner-contribution
13+
ms.reviewer: pahuijbr
14+
manager: deniseb
15+
ms.collection:
16+
- m365-security
17+
- tier2
18+
search.appverid: met150
19+
---
20+
21+
# Microsoft Defender for Endpoint alongside other security solutions
22+
23+
**Applies to:**
24+
25+
- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
26+
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
27+
28+
## Considerations with concurrent security solutions
29+
30+
Large organizations use a wide variety of security solutions, and running multiple security solutions concurrently can lead to performance issues and conflicts. To help minimize interoperability issues, trusted security solutions can often be configured to mitigate conflicts with each other. Organizations should understand the potential benefits, risks, and mitigation recommendations to make informed choices.
31+
32+
1. **Avoid duplication**. Running multiple security solutions that perform the same function can lead to performance issues and conflicts. It's generally recommended to avoid redundant capabilities, as this increases the likelihood of problematic product interactions.
33+
34+
Microsoft Defender for Endpoint can be configured to disable endpoint detection and response (EDR) in block mode, automated investigation & remediation, protection from potentially unwanted applications (PUA protection), network discovery & response, and other capabilities. This can reduce overlap with detection and response functions provided by non-Microsoft endpoint security solutions. Responsibility for these functions falls to the solution actively providing those functions.
35+
36+
Similarly, setting Microsoft Defender Antivirus in passive mode ensures that when another anti-malware solution is present, Microsoft Defender Antivirus doesn't perform active protection, remediation, or malware blocking. Responsibility for malware protection shifts to the active anti-malware solution.
37+
38+
2. **Configure mutual exclusions**. Security exclusions are used to prevent certain entities from being scanned or blocked by security software. Creating mutual exclusions between security solutions can help avoid performance issues and compatibility problems. Exclusions can potentially decrease protection, so it's important to only exclude processes and paths that are confidently benign.
39+
40+
When creating mutual exclusions between two security solutions, organizations are deferring protection for those solutions to their respective vendors. If a non-Microsoft EDR solution is unable to monitor Defender for Endpoint binaries, for example, then Microsoft is being trusted to protect its own solution. Likewise, if Defender for Endpoint is unable to monitor a non-Microsoft solution, then that vendor is being trusted to protect its own solution. These gaps in protection need to be actively managed as solutions change, to help minimize risk.
41+
42+
> [!NOTE]
43+
> For Microsoft Windows performance, for example, see [Performance overview - Windows Client | Microsoft Learn](/troubleshoot/windows-client/performance/performance-overview) and [Performance overview - Windows Server | Microsoft Learn](/troubleshoot/windows-server/performance/performance-overview).
44+
45+
3. **Consider system configuration**. In side-by-side scenarios, even well configured security tools can be impacted by underlying system limitations. Ensure that endpoints meet hardware requirements and stagger resource-heavy tasks. Built-in telemetry can monitor performance to help isolate interoperability issues from system constraints. Solutions and scenario guides are available to help troubleshoot and self-solve performance-related issues, or organizations can leverage available support resources.
46+
47+
Delegating security functionality, creating exclusions, and configuring settings can help reduce the likelihood of interoperability issues, but these might not be eliminated completely. Acceptable risk is different for every organization; optimizing for usability might increase risk, and optimizing for security will likely impact usability. Organizations should weigh the benefits of interoperability over potential risks.
48+
49+
## Customer support
50+
51+
Commercially reasonable support is provided through Microsoft Customer Service & Support and Microsoft-managed support offerings. In troubleshooting performance, reliability, and other issues, customers might be asked to temporarily remove potentially conflicting solutions to identify the source of the issue. Depending on the issue, customers might be asked to engage with the vendor of the non-Microsoft solution.
52+

0 commit comments

Comments
 (0)