www.microsoft.com
Open in
urlscan Pro
2a02:26f0:6c00:284::356e
Public Scan
URL:
https://www.microsoft.com/en-us/security/business/threat-protection/endpoint-defender
Submission: On June 10 via api from US — Scanned from DE
Submission: On June 10 via api from US — Scanned from DE
Form analysis
1 forms found in the DOMName: searchForm — GET https://www.microsoft.com/en-us/security/site-search
<form class="c-search" autocomplete="off" id="searchForm" name="searchForm" role="search" action="https://www.microsoft.com/en-us/security/site-search" method="GET" data-seautosuggest=""
data-seautosuggestapi="https://www.microsoft.com/msstoreapiprod/api/autosuggest"
data-m="{"cN":"GlobalNav_Search_cont","cT":"Container","id":"c3c1c9c4c1m1r1a1","sN":3,"aN":"c1c9c4c1m1r1a1"}" aria-expanded="false"
style="overflow-x: visible;">
<input id="cli_shellHeaderSearchInput" aria-label="Search Expanded" aria-autocomplete="list" aria-expanded="false" aria-controls="universal-header-search-auto-suggest-transparent" aria-owns="universal-header-search-auto-suggest-ul" type="search"
name="q" role="combobox" placeholder="Search Microsoft Security" data-m="{"cN":"SearchBox_nav","id":"n1c3c1c9c4c1m1r1a1","sN":1,"aN":"c3c1c9c4c1m1r1a1"}" data-toggle="tooltip"
data-placement="right" title="Search Microsoft Security" style="overflow-x: visible;">
<button id="search" aria-label="Search Microsoft Security" class="c-glyph" data-m="{"cN":"Search_nav","id":"n2c3c1c9c4c1m1r1a1","sN":2,"aN":"c3c1c9c4c1m1r1a1"}"
data-bi-mto="true" aria-expanded="false" style="overflow-x: visible;">
<span role="presentation" style="overflow-x: visible;">Search</span>
<span role="tooltip" class="c-uhf-tooltip c-uhf-search-tooltip" style="overflow-x: visible;">Search Microsoft Security</span>
</button>
<div class="m-auto-suggest" id="universal-header-search-auto-suggest-transparent" role="group" style="overflow-x: visible;">
<ul class="c-menu" id="universal-header-search-auto-suggest-ul" aria-label="Search Suggestions" aria-hidden="true" data-bi-dnt="true" data-bi-mto="true" data-js-auto-suggest-position="default" role="listbox" data-tel="jsll"
data-m="{"cN":"search suggestions_cont","cT":"Container","id":"c3c3c1c9c4c1m1r1a1","sN":3,"aN":"c3c1c9c4c1m1r1a1"}" style="overflow-x: visible;"></ul>
</div>
</form>
Text Content
We use optional cookies to improve your experience on our websites, such as through social media connections, and to display personalized advertising based on your online activity. If you reject optional cookies, only cookies necessary to provide you the services will be used. You may change your selection by clicking “Manage Cookies” at the bottom of the page. Privacy Statement Third-Party Cookies Accept Reject Manage cookies Skip to main content Microsoft Microsoft Security Microsoft Security Microsoft Security * Home * Solutions * Cloud security * Identity & access * Information protection & governance * Ransomware * Secure remote work * Risk management * SIEM & XDR * Small & medium business * Zero Trust * Products * Identity & access Identity & access * Microsoft Entra Overview * Azure Active Directory part of Microsoft Entra * Microsoft Entra Permissions Management * Microsoft Entra Verified ID * Azure Key Vault * SIEM & XDR SIEM & XDR * Microsoft Sentinel * Microsoft Defender for Cloud * Microsoft 365 Defender * Microsoft Defender for Endpoint * Microsoft Defender for Office 365 * Microsoft Defender for Identity * Microsoft Defender for Cloud Apps * Microsoft Defender Vulnerability Management * Cloud security Cloud security * Microsoft Defender for Cloud * Azure Firewall * Azure Web App Firewall * Azure DDoS Protection * GitHub Advanced Security * Endpoint security Endpoint security * Microsoft 365 Defender * Microsoft Defender for Endpoint * Microsoft Defender for IoT * Microsoft Defender for Business * Microsoft Defender Vulnerability Management * Identity threat protection Identity threat protection * Microsoft Defender for Identity * Azure AD Identity Protection * Risk management & privacy Risk management & privacy * Microsoft Purview Overview * Microsoft Purview Insider Risk Management * Microsoft Purview Communication Compliance * Microsoft Purview eDiscovery * Microsoft Purview Compliance Manager * Microsoft Priva Risk Management * Information protection Information protection * Microsoft Purview Overview * Microsoft Purview Information Protection * Microsoft Purview Data Lifecycle Management * Microsoft Purview Data Loss Prevention * Device management Device management * Microsoft Endpoint Manager * Services * Partners * Resources * Get started Get started * Customer stories * Security 101 * Product trials * How we protect Microsoft * Reports and analysis Reports and analysis * Microsoft Security Insider * Microsoft Digital Defense Report * Security Response Center * Community Community * Microsoft Security Blog * Microsoft Security Events * Microsoft Tech Community * Documentation and training Documentation and training * Documentation * Technical Content Library * Training & certifications * Additional sites Additional sites * Compliance Program for Microsoft Cloud * Microsoft Trust Center * Security Engineering Portal * Service Trust Portal * Contact sales * More * Start free trial * All Microsoft * * Microsoft Security * Azure * Dynamics 365 * Microsoft 365 * Microsoft Teams * Windows 365 * Tech & innovation Tech & innovation * Microsoft Cloud * AI * Azure Space * Mixed reality * Microsoft HoloLens * Microsoft Viva * Quantum computing * Sustainability * Industries Industries * Education * Automotive * Financial services * Government * Healthcare * Manufacturing * Retail * All industries * Partners Partners * Find a partner * Become a partner * Partner Network * Find an advertising partner * Become an advertising partner * Azure Marketplace * AppSource * Resources Resources * Blog * Microsoft Advertising * Developer Center * Documentation * Events * Licensing * Microsoft Learn * Microsoft Research * View Sitemap Search Search Microsoft Security Cancel Sign in to your account Sign in MICROSOFT DEFENDER FOR ENDPOINT THREATS ARE NO MATCH. Learn more Start free trial MICROSOFT DIGITAL DEFENSE REPORT Get deep analysis of current threat trends with extensive insights on big-game ransomware, phishing, IoT threats, and nation-state activity. Read the report COMPLETE ENDPOINT SECURITY Discover and secure Windows, macOS, Linux, Android, iOS, and network devices against sophisticated threats. RAPIDLY STOP THREATS Gain the upper hand against sophisticated threats like ransomware and nation-state attacks. SCALE YOUR SECURITY Put time back in the hands of defenders to prioritize risks and elevate your security posture. EVOLVE YOUR DEFENSES Advance beyond endpoint silos and mature your security based on a foundation for XDR and Zero Trust. INDUSTRY RECOGNITION * FORRESTER Microsoft Defender for Endpoint is named a leader in The Forrester Wave™: Endpoint Detection and Response Providers, Q2 2022.6 Read the blog * FORRESTER Microsoft Defender is named a Leader in The Forrester New Wave™: Extended Detection and Response (XDR) Providers, Q4 2021.2,4 Read the blog * GARTNER Gartner® names Microsoft a Leader in the 2021 Magic Quadrant™ for Endpoint Protection Platforms.1,3 Read more * FORRESTER Microsoft Defender for Endpoint is named a Leader in The Forrester Wave™: Endpoint Security Software as a Service, Q2 2021.4,5 Read the blog * MITRE Microsoft leads in real-world detection in MITRE ATT&CK evaluation. Read more * INDUSTRY ANTIVIRUS TESTS Our antimalware capabilities consistently achieve high scores in independent tests. Read more INDUSTRY RECOGNITION * FORRESTER Microsoft Defender for Endpoint is named a leader in The Forrester Wave™: Endpoint Detection and Response Providers, Q2 2022.6 Read the blog * FORRESTER Microsoft Defender is named a Leader in The Forrester New Wave™: Extended Detection and Response (XDR) Providers, Q4 2021.2,4 Read the blog * GARTNER Gartner® names Microsoft a Leader in the 2021 Magic Quadrant™ for Endpoint Protection Platforms.1,3 Read more * FORRESTER Microsoft Defender for Endpoint is named a Leader in The Forrester Wave™: Endpoint Security Software as a Service, Q2 2021.4,5 Read the blog * MITRE Microsoft leads in real-world detection in MITRE ATT&CK evaluation. Read more * INDUSTRY ANTIVIRUS TESTS Our antimalware capabilities consistently achieve high scores in independent tests. Read more * * * * * * View full size More about this diagram Microsoft Defender for Endpoint delivers industry-leading endpoint security for Windows, macOS, Linux, Android, iOS, and network devices and helps to rapidly stop attacks, scale your security resources, and evolve your defenses. It’s delivered at cloud scale, with built-in AI that reasons over the industry’s broadest threat intelligence. Our comprehensive solution enables discovery of all endpoints and even network devices, such as routers, in your environment. It offers vulnerability management, endpoint protection, endpoint detection and response (EDR), mobile threat defense, and managed hunting all in a single, unified platform. ELIMINATE THE BLIND SPOTS IN YOUR ENVIRONMENT Discover unmanaged and unauthorized endpoints and network devices, and secure these assets using integrated workflows. Learn more CAPABILITIES DISCOVER VULNERABILITIES AND MISCONFIGURATIONS IN REAL TIME Bring security and IT together with threat and vulnerability management to quickly discover, prioritize, and remediate vulnerabilities and misconfigurations. Learn more Explore the interactive guide GET EXPERT-LEVEL THREAT MONITORING AND ANALYSIS Empower your security operations centers with Microsoft Threat Experts. Get deep knowledge, advanced threat monitoring, analysis, and support to identify critical threats in your unique environment. Read the blog Watch the video QUICKLY GO FROM ALERT TO REMEDIATION AT SCALE WITH AUTOMATION Automatically investigate alerts and remediate complex threats in minutes. Apply best practices and intelligent decision-making algorithms to identify active threats and determine what action to take. Watch the video Learn why you should turn on automation today BLOCK SOPHISTICATED THREATS AND MALWARE Defend against never-before-seen, polymorphic and metamorphic malware and fileless and file-based threats with next-generation protection. Learn about next-gen protection Learn about behavioral blocking and containment DETECT AND RESPOND TO ADVANCED ATTACKS WITH BEHAVIORAL MONITORING Spot attacks and zero-day exploits using advanced behavioral analytics and machine learning. Learn how to investigate incidents Watch the advanced hunting webinar ELIMINATE RISKS AND REDUCE YOUR ATTACK SURFACE Use attack surface reduction to minimize the areas where your organization could be vulnerable to threats. Learn about attack surface reduction Learn about web protection INTEGRATED THREAT PROTECTION WITH SIEM AND XDR Microsoft empowers your organization’s defenders by putting the right tools and intelligence in the hands of the right people. Combine security information and event management (SIEM) and extended detection and response (XDR) to increase efficiency and effectiveness while securing your digital estate. Learn more about threat protection Microsoft 365 Defender Microsoft Sentinel Microsoft Defender for Cloud MICROSOFT 365 DEFENDER Prevent and detect attacks across your Microsoft 365 workloads with built-in XDR capabilities. Learn more about Microsoft 365 Defender MICROSOFT SENTINEL Aggregate security data and correlate alerts from virtually any source with cloud-native SIEM from Microsoft. Learn more about Microsoft Sentinel MICROSOFT DEFENDER FOR CLOUD Protect your multicloud and hybrid cloud workloads with built-in XDR capabilities. Learn more about Microsoft Defender for Cloud MICROSOFT 365 DEFENDER Prevent and detect attacks across your Microsoft 365 workloads with built-in XDR capabilities. Learn more about Microsoft 365 Defender MICROSOFT SENTINEL Aggregate security data and correlate alerts from virtually any source with cloud-native SIEM from Microsoft. Learn more about Microsoft Sentinel MICROSOFT DEFENDER FOR CLOUD Protect your multicloud and hybrid cloud workloads with built-in XDR capabilities. Learn more about Microsoft Defender for Cloud ADDITIONAL CAPABILITIES SECURE YOUR MOBILE DEVICES Microsoft Defender for Endpoint offers mobile threat defense capabilities for Android and iOS. Learn more QUICKLY EVALUATE CAPABILITIES Fully evaluate our capabilities in a few simple steps in the Microsoft Defender for Endpoint evaluation lab. Learn more STREAMLINE AND INTEGRATE WITH APIS Integrate Microsoft Defender for Endpoint with your security solutions and streamline and automate security workflows with rich APIs. Connect with APIs SIMPLIFY ENDPOINT SECURITY MANAGEMENT Use a single pane of glass for endpoint configuration, deployment, and management with Microsoft Endpoint Manager. Learn about endpoint security management COMPARE FLEXIBLE PURCHASE OPTIONS Explore the comprehensive security capabilities in Microsoft Defender for Endpoint P2, coming soon with Microsoft 365 E5, and Microsoft Defender for Endpoint P1, included with Microsoft 365 E3. MICROSOFT DEFENDER FOR ENDPOINT P1 Microsoft Defender for Endpoint P1 offers a foundational set of capabilities, including industry leading antimalware, attack surface, and device-based conditional access. Included with Microsoft 365 E3 MICROSOFT DEFENDER FOR ENDPOINT P2 Microsoft Defender for Endpoint P2 offers the complete set of capabilities, including everything in P1 plus endpoint detection and response, automated investigation and incident response, and threat and vulnerability management. Try it for free Included with Microsoft 365 E5 Compare Microsoft Office Product features Feature name Microsoft Defender for Endpoint P1 Microsoft Defender for Endpoint P2 Product feature Unified security tools and centralized management Feature is included Feature is included Next-generation antimalware Feature is included Feature is included Attack surface reduction rules Feature is included Feature is included Device control (such as USB) Feature is included Feature is included Endpoint firewall Feature is included Feature is included Network protection Feature is included Feature is included Web control / category-based URL blocking Feature is included Feature is included Device-based conditional access Feature is included Feature is included Controlled folder access Feature is included Feature is included APIs, SIEM connector, custom TI Feature is included Feature is included Application control Feature is included Feature is included Endpoint detection and response Feature is not included Feature is included Automated investigation and remediation Feature is not included Feature is included Threat and vulnerability management Feature is not included Feature is included Threat intelligence (Threat Analytics) Feature is not included Feature is included Sandbox (deep analysis) Feature is not included Feature is included Microsoft Threat Experts7 Feature is not included Feature is included Swipe to view more plans * MICROSOFT DEFENDER FOR ENDPOINT P1 Microsoft Defender for Endpoint P1 offers a foundational set of capabilities, including industry leading antimalware, attack surface, and device-based conditional access. Included with Microsoft 365 E3 * Unified security tools and centralized management Feature is included * Next-generation antimalware Feature is included * Attack surface reduction rules Feature is included * Device control (such as USB) Feature is included * Endpoint firewall Feature is included * Network protection Feature is included * Web control / category-based URL blocking Feature is included * Device-based conditional access Feature is included * Controlled folder access Feature is included * APIs, SIEM connector, custom TI Feature is included * Application control Feature is included * Endpoint detection and response Feature is not included * Automated investigation and remediation Feature is not included * Threat and vulnerability management Feature is not included * Threat intelligence (Threat Analytics) Feature is not included * Sandbox (deep analysis) Feature is not included * Microsoft Threat Experts7 Feature is not included * MICROSOFT DEFENDER FOR ENDPOINT P2 Microsoft Defender for Endpoint P2 offers the complete set of capabilities, including everything in P1 plus endpoint detection and response, automated investigation and incident response, and threat and vulnerability management. Try it for free Included with Microsoft 365 E5 * Unified security tools and centralized management Feature is included * Next-generation antimalware Feature is included * Attack surface reduction rules Feature is included * Device control (such as USB) Feature is included * Endpoint firewall Feature is included * Network protection Feature is included * Web control / category-based URL blocking Feature is included * Device-based conditional access Feature is included * Controlled folder access Feature is included * APIs, SIEM connector, custom TI Feature is included * Application control Feature is included * Endpoint detection and response Feature is included * Automated investigation and remediation Feature is included * Threat and vulnerability management Feature is included * Threat intelligence (Threat Analytics) Feature is included * Sandbox (deep analysis) Feature is included * Microsoft Threat Experts7 Feature is included SEE WHAT OUR CUSTOMERS ARE SAYING Read their stories MICROSOFT DEFENDER FOR BUSINESS Elevate your security with enterprise-grade endpoint protection built for businesses with up to 300 employees in a simple and cost-effective solution. Learn more LEARN ABOUT OUR PARTNERS * ARCSIGHT Pull Microsoft Defender for Endpoint detections into the ArcSight Security Information Event Management (SIEM) solution. Learn more * DEMISTO Enable your security team to orchestrate and automate endpoint security monitoring by integrating Demisto with Microsoft Defender for Endpoint. Learn more * SAFEBREACH Gain visibility into the types of attacks Microsoft Defender for Endpoint is blocking using insight from correlations with SafeBreach attack simulations. Learn more * MORPHISEC Integrate forensics data to help prioritize alerts, determine machine at-risk score, and visualize the full attack timeline. Learn more * THREATCONNECT Alert or block based on custom threat intelligence from ThreatConnect Playbooks using Microsoft Defender for Endpoint indicators. Learn more * PALO ALTO NETWORKS Enrich your endpoint protection by extending Autofocus and other threat feeds to Microsoft Defender for Endpoint using MineMeld. Learn more * DELL TECHNOLOGIES ADVANCED THREAT PROTECTION Identify malicious behavior and anomalies with the round-the-clock capabilities of this professional monitoring service. Learn more * CSIS MANAGED DETECTION AND RESPONSE Gain actionable insights into what, when, and how security incidents have taken place with continuous monitoring and security alert analysis. Learn more * INSPARK Help protect, detect, and respond to threats with the uninterrupted, managed service capabilities of InSpark's Cloud Security Center. Learn more * RED CANARY Deploy managed detection and response in minutes with Red Canary, a security operations partner for modern teams. Learn more * CYREN Seamlessly integrate advanced web content filtering into Microsoft Defender Security Center. Learn more * CRITICALSTART Reduce your alerts by 99 percent with the Zero Trust Analytics Platform. Learn more LEARN ABOUT OUR PARTNERS * ARCSIGHT Pull Microsoft Defender for Endpoint detections into the ArcSight Security Information Event Management (SIEM) solution. Learn more * DEMISTO Enable your security team to orchestrate and automate endpoint security monitoring by integrating Demisto with Microsoft Defender for Endpoint. Learn more * SAFEBREACH Gain visibility into the types of attacks Microsoft Defender for Endpoint is blocking using insight from correlations with SafeBreach attack simulations. Learn more * MORPHISEC Integrate forensics data to help prioritize alerts, determine machine at-risk score, and visualize the full attack timeline. Learn more * THREATCONNECT Alert or block based on custom threat intelligence from ThreatConnect Playbooks using Microsoft Defender for Endpoint indicators. Learn more * PALO ALTO NETWORKS Enrich your endpoint protection by extending Autofocus and other threat feeds to Microsoft Defender for Endpoint using MineMeld. Learn more * DELL TECHNOLOGIES ADVANCED THREAT PROTECTION Identify malicious behavior and anomalies with the round-the-clock capabilities of this professional monitoring service. Learn more * CSIS MANAGED DETECTION AND RESPONSE Gain actionable insights into what, when, and how security incidents have taken place with continuous monitoring and security alert analysis. Learn more * INSPARK Help protect, detect, and respond to threats with the uninterrupted, managed service capabilities of InSpark's Cloud Security Center. Learn more * RED CANARY Deploy managed detection and response in minutes with Red Canary, a security operations partner for modern teams. Learn more * CYREN Seamlessly integrate advanced web content filtering into Microsoft Defender Security Center. Learn more * CRITICALSTART Reduce your alerts by 99 percent with the Zero Trust Analytics Platform. Learn more * * * * * * * * * * * * BECOME A PARTNER Learn more about becoming a partner and integrating with Microsoft Defender for Endpoint. Follow this simple, step-by-step guide to start using our flexible platform and rich APIs. Get started ONE RF_IMG Module TOP DIVE DEEPER INTO THE PRODUCT Get technical details on capabilities, minimum requirements, and deployment guidance. Read the documentation ONE RF_IMG Module BTM ADDITIONAL RESOURCES BECOME A MICROSOFT DEFENDER FOR ENDPOINT EXPERT Get training for security operations and security admins, whether you’re a beginner or have experience. Access training resources LEARN MORE ABOUT OUR FEATURES Explore educational videos about Microsoft Defender for Endpoint. Watch the videos STAY UP TO DATE Get product news, configuration guidance, product how-tos, and tips. Read the blogs 1. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. GARTNER and Magic Quadrant are registered trademarks and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and are used herein with permission. All rights reserved. 2. The Forrester New Wave™: Extended Detection and Response (XDR) Providers, Q4 2021, Allie Mellen, October 2021. 3. Gartner Magic Quadrant for Endpoint Protection Platforms, Peter Firstbrook | Dionisio Zumerle | Prateek Bhajanka | Lawrence Pingree | Paul Webber, 05 May 2021. 4. Forrester and Forrester Wave are trademarks of Forrester Research, Inc. 5. The Forrester Wave™: Endpoint Security Software as a Service, Q2 2021, Chris Sherman with Merritt Maxim, Allie Mellen, Shannon Fish, Peggy Dostie, May 2021. 6. The Forrester Wave™: Endpoint Detection and Response Providers, Q2 2022, Allie Mellen, April 2022. 7. Includes Targeted Attack Notifications (TAN) and Experts on Demand (EOD). Customers must apply for TAN and EOD is available for purchase as an add-on. -------------------------------------------------------------------------------- Follow Microsoft * LinkedIn * Twitter * Blog What's new * Surface Laptop Go 2 * Surface Pro 8 * Surface Laptop Studio * Surface Pro X * Surface Go 3 * Surface Duo 2 * Surface Pro 7+ * Windows 11 apps Microsoft Store * Account profile * Download Center * Microsoft Store support * Returns * Order tracking * Virtual workshops and training * Microsoft Store Promise * Flexible Payments Education * Microsoft in education * Devices for education * Microsoft Teams for Education * Microsoft 365 Education * Education consultation appointment * Educator training and development * Deals for students and parents * Azure for students Business * Microsoft Cloud * Microsoft Security * Dynamics 365 * Microsoft 365 * Microsoft Power Platform * Microsoft Teams * Microsoft Industry * Small Business Developer & IT * Azure * Developer Center * Documentation * Microsoft Learn * Microsoft Tech Community * Azure Marketplace * AppSource * Visual Studio Company * Careers * About Microsoft * Company news * Privacy at Microsoft * Investors * Diversity and inclusion * Accessibility * Sustainability English (United States) * Sitemap * Contact Microsoft * Privacy * Manage cookies * Terms of use * Trademarks * Safety & eco * About our ads * © Microsoft 2022 Close dialog Modal dialog Microsoft Defender for Endpoint is easy to deploy, configure, and manage with a unified security management experience. It offers endpoint security for clients, servers, mobile devices, and network devices. This diagram shows Microsoft Defender for Endpoint capabilities, including risk-based vulnerability management and assessment, attack surface reduction, behavioral-based and cloud-powered next-generation protection, endpoint detection and response (EDR), automatic investigation and remediation, and managed hunting services. These capabilities are underscored with rich APIs that enable access and integration with our endpoint security platform. Dialog closed