Skip to content

Commit c5c50c9

Browse files
authored
Merge pull request #5511 from KesemSharabi/overviews
Overview revamp
2 parents a984fa4 + 6868d83 commit c5c50c9

File tree

3 files changed

+52
-143
lines changed

3 files changed

+52
-143
lines changed

defender-endpoint/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@
88
items:
99
- name: What is Microsoft Defender for Endpoint?
1010
items:
11-
- name: Defender for Endpoint on Windows
11+
- name: Defender for Endpoint
1212
href: microsoft-defender-endpoint.md
1313
- name: Defender for Endpoint on macOS
1414
href: microsoft-defender-endpoint-mac.md

defender-endpoint/defender-endpoint-trial-user-guide.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -39,19 +39,19 @@ This playbook is a simple guide to help you make the most of your free trial. Us
3939
<center><h2>Microsoft Defender for Endpoint</center></h2>
4040
<table>
4141
<tr>
42-
<td><a href="microsoft-defender-endpoint.md#tvm"><center><img src="media/logo-mdvm.png" alt="Vulnerability Management"> <br><b> Core Defender Vulnerability Management</b></center></a></td>
43-
<td><a href="microsoft-defender-endpoint.md#asr"><center><img src="media/asr-icon.png" alt="Attack surface reduction"><br><b>Attack surface reduction</b></center></a></td>
44-
<td><center><a href="microsoft-defender-endpoint.md#ngp"><img src="media/ngp-icon.png" alt="Next-generation protection"><br> <b>Next-generation protection</b></a></center></td>
45-
<td><center><a href="microsoft-defender-endpoint.md#edr"><img src="media/edr-icon.png" alt="Endpoint detection and response"><br> <b>Endpoint detection and response</b></a></center></td>
46-
<td><center><a href="microsoft-defender-endpoint.md#ai"><img src="media/air-icon.png" alt="Automated investigation and remediation"><br> <b>Automated investigation and remediation</b></a></center></td>
47-
<td><center><a href="microsoft-defender-endpoint.md#mte"><img src="media/mte-icon.png" alt="Microsoft Threat Experts"><br> <b>Microsoft Threat Experts</b></a></center></td>
42+
<td><a href="/defender-vulnerability-management/defender-vulnerability-management"><center><img src="media/logo-mdvm.png" alt="Vulnerability Management"> <br><b> Core Defender Vulnerability Management</b></center></a></td>
43+
<td><a href="overview-attack-surface-reduction.md"><center><img src="media/asr-icon.png" alt="Attack surface reduction"><br><b>Attack surface reduction</b></center></a></td>
44+
<td><center><a href="next-generation-protection.md"><img src="media/ngp-icon.png" alt="Next-generation protection"><br> <b>Next-generation protection</b></a></center></td>
45+
<td><center><a href="overview-endpoint-detection-response.md"><img src="media/edr-icon.png" alt="Endpoint detection and response"><br> <b>Endpoint detection and response</b></a></center></td>
46+
<td><center><a href="automated-investigations.md"><img src="media/air-icon.png" alt="Automated investigation and remediation"><br> <b>Automated investigation and remediation</b></a></center></td>
47+
<td><center><a href="endpoint-attack-notifications.md"><img src="media/mte-icon.png" alt="Microsoft Threat Experts"><br> <b>Microsoft Threat Experts</b></a></center></td>
4848
</tr>
4949
<tr>
5050
<td colspan="7">
51-
<a href="microsoft-defender-endpoint.md#apis"><center><b>Centralized configuration and administration, APIs</a></b></center></td>
51+
<a href="api/management-apis.md"><center><b>Centralized configuration and administration, APIs</a></b></center></td>
5252
</tr>
5353
<tr>
54-
<td colspan="7"><a href="microsoft-defender-endpoint.md#mtp"><center><b>Microsoft Defender portal</a></center></b></td>
54+
<td colspan="7"><a href="/unified-secops/overview-defender-portal"><center><b>Microsoft Defender portal</a></center></b></td>
5555
</tr>
5656
</table>
5757
<br>
Lines changed: 43 additions & 134 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,10 @@
11
---
22
title: Microsoft Defender for Endpoint
3-
description: Microsoft Defender for Endpoint is an enterprise endpoint security platform that helps defend against advanced persistent threats.
3+
description: Learn about Microsoft Defender for Endpoint, an enterprise endpoint security platform that helps defend against advanced persistent threats.
44
ms.service: defender-endpoint
5-
ms.author: bagol
6-
author: batamig
5+
author: KesemSharabi
6+
ms.author: kesharab
77
ms.localizationpriority: high
8-
manager: bagol
98
audience: ITPro
109
ms.collection:
1110
- m365-security
@@ -14,151 +13,61 @@ ms.collection:
1413
ms.custom: intro-overview
1514
ms.topic: article
1615
search.appverid: met150
17-
ms.date: 05/07/2025
18-
appliesto:
19-
- Microsoft Defender for Endpoint
20-
- Microsoft Defender for Endpoint Plan 1
21-
- Microsoft Defender for Endpoint Plan 2
22-
- Microsoft Defender Vulnerability Management
23-
#customer intent: As an IT security leader or SOC engineer responsible for endpoint protection, I want a concise overview of Microsoft Defender for Endpoint's capabilities, integrations, and deployment considerations so I can evaluate its fit for my organization and plan onboarding and operations.
16+
ms.date: 11/05/2025
17+
#customer intent: As an IT security leader or SOC engineer responsible for endpoint protection, I want a concise overview of Microsoft Defender for Endpoint's capabilities, integrations, and deployment considerations, so I can evaluate its fit for my organization and plan onboarding and operations.
2418
---
2519

2620
# Microsoft Defender for Endpoint
2721

22+
Microsoft Defender for Endpoint is an enterprise endpoint security platform designed to help enterprises prevent, detect, investigate, and respond to advanced threats on their endpoints. Endpoints include laptops, phones, tablets, PCs, access points, routers, and firewalls.
2823

29-
Microsoft Defender for Endpoint is an enterprise endpoint security platform designed to help enterprise networks prevent, detect, investigate, and respond to advanced threats. Example endpoints include laptops, phones, tablets, PCs, access points, routers, and firewalls.
24+
Defender for Endpoint is part of [Microsoft Defender XDR](/defender-xdr/) and can be [integrated](threat-protection-integration.md) with other Microsoft solutions, including:
3025

31-
> [!TIP]
32-
> Microsoft Defender for Endpoint is available in two plans, Defender for Endpoint Plan 1 and Plan 2. A new Microsoft Defender Vulnerability Management add-on is now available for Plan 2.
33-
>
34-
> For more information on the features and capabilities included in each plan, including the Defender Vulnerability Management add-on, see [Microsoft 365 guidance for security & compliance](/office365/servicedescriptions/microsoft-365-service-descriptions/microsoft-365-tenantlevel-services-licensing-guidance/microsoft-365-security-compliance-licensing-guidance).
26+
* [Intune](/intune/intune-service/)
27+
* [Microsoft Defender for Cloud](/azure/defender-for-cloud/)
28+
* [Microsoft Defender for Cloud Apps](/defender-cloud-apps/)
29+
* [Microsoft Defender for Identity](/defender-for-identity/)
30+
* [Microsoft Defender for Office](/defender-office-365/)
31+
* [Microsoft Defender Vulnerability Management](/defender-vulnerability-management/defender-vulnerability-management)
32+
* [Microsoft Sentinel](/azure/sentinel/)
3533

34+
## Operating systems
3635

37-
Watch the following video to learn more about Defender for Endpoint:
36+
Defender for Endpoint supports the following operating systems:
3837

39-
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=88c39a8e-5b13-418e-9093-f8d6100ca728]
38+
* Windows
39+
* macOS
40+
* Linux
41+
* Android
42+
* iOS
4043

41-
Defender for Endpoint uses the following combination of technology built into Windows 10 and Microsoft's robust cloud service:
44+
## Licensing
4245

43-
- **Endpoint behavioral sensors**: Embedded in Windows 10, these sensors collect and process behavioral signals from the operating system and send this sensor data to your private, isolated, cloud instance of Microsoft Defender for Endpoint.
46+
Defender for Endpoint is available in three plans. You can find more information about these plans and additional Defender licenses in [Microsoft 365 guidance for security & compliance](/office365/servicedescriptions/microsoft-365-service-descriptions/microsoft-365-tenantlevel-services-licensing-guidance/microsoft-365-security-compliance-licensing-guidance).
4447

45-
- **Cloud security analytics**: Using big data, device learning, and unique Microsoft optics across the Windows ecosystem, enterprise cloud products (such as Office 365), and online assets, behavioral signals are translated into insights, detections, and recommended responses to advanced threats.
48+
* [Microsoft Defender for Business](/office365/servicedescriptions/microsoft-365-service-descriptions/microsoft-365-tenantlevel-services-licensing-guidance/microsoft-365-security-compliance-licensing-guidance#microsoft-defender-for-business) - An endpoint security solution designed for small and medium-sized businesses.
49+
* [Defender for Endpoint Plan 1](defender-endpoint-plan-1.md) - Provides core endpoint protection capabilities.
50+
* [Defender for Endpoint Plan 2](/office365/servicedescriptions/microsoft-365-service-descriptions/microsoft-365-tenantlevel-services-licensing-guidance/microsoft-365-security-compliance-licensing-guidance#which-licenses-provide-the-rights-for-users-to-benefit-from-the-service-1) - A comprehensive endpoint protection solution that includes advance capabilities.
4651

47-
- **Threat intelligence**: Generated by Microsoft hunters, security teams, and augmented by threat intelligence provided by partners, threat intelligence enables Defender for Endpoint to identify attacker tools, techniques, and procedures, and generate alerts when they're observed in collected sensor data.
52+
## Defender for Endpoint capabilities
4853

49-
<center><h2>Microsoft Defender for Endpoint</center></h2>
50-
<table>
51-
<tr>
52-
<td><a href="#tvm"><center><img src="media/logo-mdvm.png" alt="Vulnerability Management"> <br><b> Core Defender Vulnerability Management</b></center></a></td>
53-
<td><a href="#asr"><center><img src="media/asr-icon.png" alt="Attack surface reduction"><br><b>Attack surface reduction</b></center></a></td>
54-
<td><center><a href="#ngp"><img src="media/ngp-icon.png" alt="Next-generation protection"><br> <b>Next-generation protection</b></a></center></td>
55-
<td><center><a href="#edr"><img src="media/edr-icon.png" alt="Endpoint detection and response"><br> <b>Endpoint detection and response</b></a></center></td>
56-
<td><center><a href="#ai"><img src="media/air-icon.png" alt="Automated investigation and remediation"><br> <b>Automated investigation and remediation</b></a></center></td>
57-
<td><center><a href="#mte"><img src="media/mte-icon.png" alt="Microsoft Threat Experts"><br> <b>Microsoft Threat Experts</b></a></center></td>
58-
</tr>
59-
<tr>
60-
<td colspan="7">
61-
<a href="#apis"><center><b>Centralized configuration and administration, APIs</a></b></center></td>
62-
</tr>
63-
<tr>
64-
<td colspan="7"><a href="#mtp"><center><b>Microsoft Defender XDR</a></center></b></td>
65-
</tr>
66-
</table>
67-
<br>
54+
This section lists key Defender for Endpoint capabilities and provides links to more detailed information. To view a list of core capabilities and the operating systems that support them, see [Supported Microsoft Defender for Endpoint capabilities by platform](/defender-endpoint/supported-capabilities-by-platform).
6855

69-
<p></p>
56+
| Capability | Description |
57+
|---|---|
58+
|[APIs](api/management-apis.md) |Automate Defender for Endpoint and integrate it into your existing workflows. |
59+
|[Attack surface reduction](overview-attack-surface-reduction.md) |Ensures endpoint settings are properly configured and secure, and that vulnerabilities are mitigated. Includes [network protection](network-protection.md) and [web protection](web-protection-overview.md), which regulate access to malicious IP addresses, domains, and URLs. |
60+
|[Automated investigation and remediation](automated-investigations.md) |Automatic investigation and remediation capabilities. |
61+
|[Endpoint Attack Notifications](endpoint-attack-notifications.md) |Proactive hunting, prioritization, and insights that help identify and respond to threats. |
62+
|[Endpoint detection and response](overview-endpoint-detection-response.md) |Detect, investigate, and respond to advanced threats. Includes [advanced hunting](/defender-xdr/advanced-hunting-overview) which provides a query-based threat-hunting tool that lets you proactively find breaches and create custom detections. |
63+
|[Microsoft Secure Score for Devices](/defender-vulnerability-management/tvm-microsoft-secure-score-devices) |Assess the security state of your network, identify unprotected systems, and take actions to improve your organization's security. |
64+
|[Next-generation protection](next-generation-protection.md) |Catch and block all types of emerging threats. |
7065

71-
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=95c63786-0382-413d-8a75-eb373e825fa6]
66+
## Privacy and compliance
7267

73-
> [!TIP]
74-
> - Learn about the latest enhancements in Defender for Endpoint: [What's new in Microsoft Defender for Endpoint](whats-new-in-microsoft-defender-endpoint.md).
75-
> - Microsoft Defender for Endpoint demonstrated industry-leading optics and detection capabilities in the recent MITRE evaluation. Read: [Insights from the MITRE ATT&CK-based evaluation](https://cloudblogs.microsoft.com/microsoftsecure/2018/12/03/insights-from-the-mitre-attack-based-evaluation-of-windows-defender-atp/).
76-
77-
> [!TIP]
78-
> For more information about Defender for Endpoint capabilities across Windows, Mac, and Linux, see [Supported Microsoft Defender for Endpoint capabilities by platform](/defender-endpoint/supported-capabilities-by-platform).
79-
80-
<a name="tvm"></a>
81-
82-
**[Core Defender Vulnerability Management](/defender-vulnerability-management/defender-vulnerability-management)**
83-
84-
Built-in core vulnerability management capabilities use a modern risk-based approach to the discovery, assessment, prioritization, and remediation of endpoint vulnerabilities and misconfigurations. To further enhance your ability to assess your security posture and reduce risk, a new Defender Vulnerability Management add-on for Plan 2 is available.
85-
86-
For more information on the different vulnerability management capabilities available to you, see [Compare Microsoft Defender Vulnerability Management offerings](/defender-vulnerability-management/defender-vulnerability-management-capabilities).
87-
88-
<a name="asr"></a>
89-
90-
**[Attack surface reduction](overview-attack-surface-reduction.md)**
91-
92-
The attack surface reduction set of capabilities provides the first line of defense in the stack. By ensuring configuration settings are properly set and exploit mitigation techniques are applied, the capabilities resist attacks and exploitation. This set of capabilities also includes [network protection](network-protection.md) and [web protection](web-protection-overview.md), which regulate access to malicious IP addresses, domains, and URLs.
93-
94-
<a name="ngp"></a>
95-
96-
**[Next-generation protection](next-generation-protection.md)**
97-
98-
To further reinforce the security perimeter of your network, Microsoft Defender for Endpoint uses next-generation protection designed to catch all types of emerging threats.
99-
100-
<a name="edr"></a>
101-
102-
**[Endpoint detection and response](overview-endpoint-detection-response.md)**
103-
104-
Endpoint detection and response capabilities are put in place to detect, investigate, and respond to advanced threats that might have made it past the first two security pillars. [Advanced hunting](/defender-xdr/advanced-hunting-overview) provides a query-based threat-hunting tool that lets you proactively find breaches and create custom detections.
105-
106-
<a name="ai"></a>
107-
108-
**[Automated investigation and remediation](automated-investigations.md)**
109-
110-
In conjunction with being able to quickly respond to advanced attacks, Microsoft Defender for Endpoint offers automatic investigation and remediation capabilities that help reduce the volume of alerts in minutes at scale.
111-
112-
<a name="ss"></a>
113-
114-
**[Microsoft Secure Score for Devices](/defender-vulnerability-management/tvm-microsoft-secure-score-devices)**
115-
116-
Defender for Endpoint includes Microsoft Secure Score for Devices to help you dynamically assess the security state of your enterprise network, identify unprotected systems, and take recommended actions to improve the overall security of your organization.
117-
118-
<a name="mte"></a>
119-
120-
**[Microsoft Threat Experts](endpoint-attack-notifications.md)**
121-
122-
Microsoft Defender for Endpoint's new managed threat hunting service provides proactive hunting, prioritization, and more context and insights that further empower Security operation centers (SOCs) to identify and respond to threats quickly and accurately.
123-
124-
> [!IMPORTANT]
125-
> Defender for Endpoint customers need to apply for the Microsoft Threat Experts managed threat hunting service to get proactive Targeted Attack Notifications and to collaborate with experts on demand. Experts on Demand is an add-on service. Targeted Attack Notifications are always included after you have been accepted into Microsoft Threat Experts managed threat hunting service.
126-
>
127-
> If you aren't enrolled yet and would like to experience its benefits, go to **Settings** \> **General** \> **Advanced features** \> **Microsoft Threat Experts** to apply. Once accepted, you'll get the benefits of Targeted Attack Notifications, and start a 90-day trial of Experts on Demand. Contact your Microsoft representative to get a full Experts on Demand subscription.
128-
129-
<a name="apis"></a>
130-
131-
**[Centralized configuration and administration, APIs](api/management-apis.md)**
132-
133-
Integrate Microsoft Defender for Endpoint into your existing workflows.
134-
135-
<a name="mtp"></a>
136-
137-
**[Integration with Microsoft solutions](threat-protection-integration.md)**
138-
139-
Defender for Endpoint directly integrates with various Microsoft solutions, including:
140-
141-
- Microsoft Defender for Cloud
142-
- Microsoft Sentinel
143-
- Intune
144-
- Microsoft Defender for Cloud Apps
145-
- Microsoft Defender for Identity
146-
- Microsoft Defender for Office
147-
- Skype for Business
148-
149-
**[Microsoft Defender XDR](/defender-xdr/microsoft-365-defender)**
150-
151-
With Microsoft Defender XDR, Defender for Endpoint, and various Microsoft security solutions, you have a unified pre- and post-breach enterprise defense suite that natively integrates across endpoint, identity, email, and applications to detect, prevent, investigate, and automatically respond to sophisticated attacks.
152-
153-
## Security, privacy, and compliance information
154-
155-
- [Zero Trust with Microsoft Defender for Endpoint](zero-trust-with-microsoft-defender-endpoint.md)
156-
157-
- [Microsoft Trust Center - Data protection and privacy](https://www.microsoft.com/trust-center/privacy)
158-
159-
- [Privacy at Microsoft](https://privacy.microsoft.com/)
160-
161-
- [Privacy & data management overview](/compliance/assurance/assurance-privacy)
162-
163-
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]
68+
Follow these links to learn more about privacy and compliance at Microsoft, and Defender for Endpoint.
16469

70+
* [Zero Trust](zero-trust-with-microsoft-defender-endpoint.md)
71+
* [Microsoft Trust Center - Data protection and privacy](https://www.microsoft.com/trust-center/privacy)
72+
* [Privacy at Microsoft](https://privacy.microsoft.com/)
73+
* [Privacy & data management overview](/compliance/assurance/assurance-privacy)

0 commit comments

Comments
 (0)