Skip to content

Commit e1e6fbb

Browse files
authored
Merge pull request #3993 from pahuijbr/patch-30
Update mde-side-by-side.md
2 parents 23a7222 + 21497e9 commit e1e6fbb

File tree

6 files changed

+73
-1
lines changed

6 files changed

+73
-1
lines changed

defender-endpoint/TOC.yml

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -560,11 +560,14 @@
560560
items:
561561
- name: Migration guides overview
562562
href: migration-guides.md
563+
- name: Considerations for side-by-side deployment
564+
href: mde-side-by-side.md
563565
- name: Migrate servers to Defender for Cloud
564566
href: migrating-mde-server-to-cloud.md
565567
- name: Migrate to Defender for Endpoint
566-
href: switch-to-mde-overview.md
567568
items:
569+
- name: Overview
570+
href: switch-to-mde-overview.md
568571
- name: Phase 1 - Prepare
569572
href: switch-to-mde-phase-1.md
570573
- name: Phase 2 - Setup
Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,11 @@
1+
---
2+
author: denisebmsft
3+
ms.author: deniseb
4+
ms.date: 06/13/2025
5+
ms.topic: include
6+
ms.service: defender-endpoint
7+
---
8+
9+
If you want to run multiple security solutions side by side, see [Considerations for performance, configuration, and support](/defender-endpoint/mde-side-by-side).
10+
11+
You might have already configured mutual security exclusions for devices onboarded to Microsoft Defender for Endpoint. If you still need to set mutual exclusions to avoid conflicts, see [Add Microsoft Defender for Endpoint to the exclusion list for your existing solution](/defender-endpoint/switch-to-mde-phase-2#step-3-add-microsoft-defender-for-endpoint-to-the-exclusion-list-for-your-existing-solution).

defender-endpoint/mde-planning-guide.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -70,4 +70,6 @@ Here's a list of prerequisites required to deploy Defender for Endpoint:
7070

7171
Start your deployment with [Step 1 - Set up Microsoft Defender for Endpoint deployment](production-deployment.md)
7272

73+
[!INCLUDE [side-by-side-scenarios](includes/side-by-side-scenarios.md)]
74+
7375
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]
Lines changed: 52 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,52 @@
1+
---
2+
title: Microsoft Defender for Endpoint alongside other security solutions
3+
description: See recommendations for running Defender for Endpoint alongside other security solutions.
4+
ms.service: defender-endpoint
5+
ms.localizationpriority: medium
6+
ms.date: 06/13/2025
7+
ms.topic: conceptual
8+
author: emmwalshh
9+
ms.author: ewalsh
10+
ms.custom:
11+
- nextgen
12+
- partner-contribution
13+
ms.reviewer: pahuijbr
14+
manager: deniseb
15+
ms.collection:
16+
- m365-security
17+
- tier2
18+
search.appverid: met150
19+
---
20+
21+
# Microsoft Defender for Endpoint alongside other security solutions
22+
23+
**Applies to:**
24+
25+
- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
26+
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
27+
28+
## Considerations with concurrent security solutions
29+
30+
Large organizations use a wide variety of security solutions, and running multiple security solutions concurrently can lead to performance issues and conflicts. To help minimize interoperability issues, trusted security solutions can often be configured to mitigate conflicts with each other. Organizations should understand the potential benefits, risks, and mitigation recommendations to make informed choices.
31+
32+
1. **Avoid duplication**. Running multiple security solutions that perform the same function can lead to performance issues and conflicts. It's generally recommended to avoid redundant capabilities, as this increases the likelihood of problematic product interactions.
33+
34+
Microsoft Defender for Endpoint can be configured to disable endpoint detection and response (EDR) in block mode, automated investigation & remediation, protection from potentially unwanted applications (PUA protection), network discovery & response, and other capabilities. This can reduce overlap with detection and response functions provided by non-Microsoft endpoint security solutions. Responsibility for these functions falls to the solution actively providing those functions.
35+
36+
Similarly, setting Microsoft Defender Antivirus in passive mode ensures that when another anti-malware solution is present, Microsoft Defender Antivirus doesn't perform active protection, remediation, or malware blocking. Responsibility for malware protection shifts to the active anti-malware solution.
37+
38+
2. **Configure mutual exclusions**. Security exclusions are used to prevent certain entities from being scanned or blocked by security software. Creating mutual exclusions between security solutions can help avoid performance issues and compatibility problems. Exclusions can potentially decrease protection, so it's important to only exclude processes and paths that are confidently benign.
39+
40+
When creating mutual exclusions between two security solutions, organizations are deferring protection for those solutions to their respective vendors. If a non-Microsoft EDR solution is unable to monitor Defender for Endpoint binaries, for example, then Microsoft is being trusted to protect its own solution. Likewise, if Defender for Endpoint is unable to monitor a non-Microsoft solution, then that vendor is being trusted to protect its own solution. These gaps in protection need to be actively managed as solutions change, to help minimize risk.
41+
42+
> [!NOTE]
43+
> For Microsoft Windows performance, for example, see [Performance overview - Windows Client | Microsoft Learn](/troubleshoot/windows-client/performance/performance-overview) and [Performance overview - Windows Server | Microsoft Learn](/troubleshoot/windows-server/performance/performance-overview).
44+
45+
3. **Consider system configuration**. In side-by-side scenarios, even well configured security tools can be impacted by underlying system limitations. Ensure that endpoints meet hardware requirements and stagger resource-heavy tasks. Built-in telemetry can monitor performance to help isolate interoperability issues from system constraints. Solutions and scenario guides are available to help troubleshoot and self-solve performance-related issues, or organizations can leverage available support resources.
46+
47+
Delegating security functionality, creating exclusions, and configuring settings can help reduce the likelihood of interoperability issues, but these might not be eliminated completely. Acceptable risk is different for every organization; optimizing for usability might increase risk, and optimizing for security will likely impact usability. Organizations should weigh the benefits of interoperability over potential risks.
48+
49+
## Customer support
50+
51+
Commercially reasonable support is provided through Microsoft Customer Service & Support and Microsoft-managed support offerings. In troubleshooting performance, reliability, and other issues, customers might be asked to temporarily remove potentially conflicting solutions to identify the source of the issue. Depending on the issue, customers might be asked to engage with the vendor of the non-Microsoft solution.
52+

defender-endpoint/migration-guides.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -34,6 +34,7 @@ If you're considering moving to Defender for Endpoint, we have guidance to help.
3434

3535
|Scenario|Guidance|
3636
|---|---|
37+
| You're using a non-Microsoft endpoint protection solution, and you want to try Defender for Endpoint alongside your existing solution. | [Microsoft Defender for Endpoint alongside other security solutions](mde-side-by-side.md) |
3738
|You don't have an endpoint protection solution in place yet, and you want to know more about Defender for Endpoint. You want to see how Defender for Endpoint works before rolling it out in your environment.|[Microsoft Defender for Endpoint evaluation lab](evaluate-microsoft-defender-antivirus.md)|
3839
|You're just getting started with your deployment but are unsure which guidance to use and need a wizard-driven approach to help you make the right deployment decisions.|[Advanced deployment guides for Microsoft 365 and Office 365 products](/microsoft-365/enterprise/setup-guides-for-microsoft-365?)|
3940
|You already have Defender for Endpoint, and you want some help getting everything set up and configured.|[Microsoft Defender for Endpoint deployment guide](mde-planning-guide.md)|

defender-endpoint/switch-to-mde-overview.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -50,4 +50,7 @@ The process of migrating to Defender for Endpoint can be divided into three phas
5050
## Next step
5151

5252
- Proceed to [Prepare for your migration](switch-to-mde-phase-1.md).
53+
54+
[!INCLUDE [side-by-side-scenarios](includes/side-by-side-scenarios.md)]
55+
5356
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

0 commit comments

Comments
 (0)