Skip to content

Commit cf43956

Browse files
committed
added include
1 parent bd491da commit cf43956

File tree

7 files changed

+24
-13
lines changed

7 files changed

+24
-13
lines changed

defender-endpoint/deployment-strategy.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -32,6 +32,8 @@ We understand that every enterprise environment is unique, so we've provided sev
3232

3333
:::image type="content" source="/defender/media/defender-endpoint/onboarding-architecture-2.png" alt-text="The deployment flow":::
3434

35+
[!INCLUDE [side-by-side-scenarios](includes/side-by-side-scenarios.md)]
36+
3537
## Step 1: Identify your architecture
3638

3739
Depending on your environment, some tools are better suited for certain architectures. Use the following table to decide which Defender for Endpoint architecture best suits your organization.

defender-endpoint/onboard-configure.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -32,6 +32,8 @@ ms.date: 09/30/2024
3232
3333
In this step, you're ready to configure Microsoft Defender for Endpoint capabilities.
3434

35+
[!INCLUDE [side-by-side-scenarios](includes/side-by-side-scenarios.md)]
36+
3537
## Configure capabilities
3638

3739
In many cases, organizations have existing endpoint security products in place. The bare minimum being an antivirus solution, but in some cases, an organization might have existing endpoint detection and response solution.

defender-endpoint/onboarding.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -33,6 +33,8 @@ ms.date: 05/08/2025
3333

3434
> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://go.microsoft.com/fwlink/p/?linkid=2225630)
3535
36+
[!INCLUDE [side-by-side-scenarios](includes/side-by-side-scenarios.md)]
37+
3638
## Onboard devices using any of the supported management tools
3739

3840
The deployment tool you use influences how you onboard endpoints to the service. Refer to your selected [deployment method](deployment-strategy.md#step-2-select-your-deployment-method).

defender-endpoint/production-deployment.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -40,8 +40,7 @@ In this deployment scenario, you're guided through the steps on:
4040
- Tenant configuration
4141
- Network configuration
4242

43-
> [!IMPORTANT]
44-
> Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
43+
[!INCLUDE [side-by-side-scenarios](includes/side-by-side-scenarios.md)]
4544

4645
For the purpose of guiding you through a typical deployment, this scenario will only cover the use of Microsoft Configuration Manager. Defender for Endpoint supports the use of other onboarding tools but we won't cover those scenarios in the deployment guide. For more information, see [Identify Defender for Endpoint architecture and deployment method](deployment-strategy.md).
4746

defender-endpoint/switch-to-mde-overview.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -35,6 +35,8 @@ If you're ready to move from a non-Microsoft endpoint protection solution to [Mi
3535

3636
When you migrate to Defender for Endpoint, you begin with your non-Microsoft antivirus/antimalware protection in active mode. Then, you configure Microsoft Defender Antivirus in passive mode, and configure Defender for Endpoint features. Then, you onboard your organization's devices, and verify that everything is working correctly. Finally, you remove the non-Microsoft solution from your devices.
3737

38+
[!INCLUDE [side-by-side-scenarios](includes/side-by-side-scenarios.md)]
39+
3840
## The migration process
3941

4042
:::image type="content" source="media/phase-diagrams/migration-phases.png" alt-text="The MDE migration process" lightbox="media/phase-diagrams/migration-phases.png":::

defender-endpoint/switch-to-mde-phase-1.md

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -37,11 +37,13 @@ search.appverid: met150
3737

3838
This migration phase includes the following steps:
3939

40-
1. [Get and deploy updates across your organization's devices](#step-1-get-and-deploy-updates-across-your-organizations-devices).
41-
2. [Get Microsoft Defender for Endpoint Plan 1 or Plan 2](#step-2-get-microsoft-defender-for-endpoint-plan-1-or-plan-2).
42-
3. [Grant access to the Microsoft Defender portal](#step-3-grant-access-to-the-microsoft-365-defender-portal).
43-
4. [Review more information about device proxy and internet connectivity settings](#step-4-view-information-about-device-proxy-and-internet-connectivity-settings).
44-
5. [Capture performance baseline data from the endpoint](#step-5-capture-performance-baseline-data-from-the-endpoint)
40+
1. Get and deploy updates across your organization's devices.
41+
2. Get Microsoft Defender for Endpoint Plan 1 or Plan 2.
42+
3. Grant access to the Microsoft Defender portal.
43+
4. Review more information about device proxy and internet connectivity settings.
44+
5. Capture performance baseline data from the endpoint.
45+
46+
[!INCLUDE [side-by-side-scenarios](includes/side-by-side-scenarios.md)]
4547

4648
## Step 1: Get and deploy updates across your organization's devices
4749

defender-endpoint/switch-to-mde-phase-3.md

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -35,12 +35,14 @@ search.appverid: met150
3535

3636
**Welcome to Phase 3 of [migrating to Defender for Endpoint](switch-to-mde-overview.md#the-migration-process)**. This migration phase includes the following steps:
3737

38-
1. [Onboard devices to Defender for Endpoint](#step-1-onboard-devices-to-microsoft-defender-for-endpoint).
39-
2. [Run a detection test](#step-2-run-a-detection-test).
40-
3. [Confirm that Microsoft Defender Antivirus is in passive mode on your endpoints](#step-3-confirm-that-microsoft-defender-antivirus-is-in-passive-mode-on-your-endpoints).
41-
4. [Get updates for Microsoft Defender Antivirus](#step-4-get-updates-for-microsoft-defender-antivirus).
42-
5. [Uninstall your non-Microsoft solution](#step-5-uninstall-your-non-microsoft-solution).
43-
6. [Make sure Defender for Endpoint is working correctly](#step-6-make-sure-defender-for-endpoint-is-working-correctly).
38+
1. Onboard devices to Defender for Endpoint.
39+
2. Run a detection test.
40+
3. Confirm that Microsoft Defender Antivirus is in passive mode on your endpoints.
41+
4. Get updates for Microsoft Defender Antivirus.
42+
5. Uninstall your non-Microsoft solution.
43+
6. Make sure Defender for Endpoint is working correctly.
44+
45+
[!INCLUDE [side-by-side-scenarios](includes/side-by-side-scenarios.md)]
4446

4547
## Step 1: Onboard devices to Microsoft Defender for Endpoint
4648

0 commit comments

Comments
 (0)