www.microsoft.com Open in urlscan Pro
2a02:26f0:6c00:284::356e  Public Scan

URL: https://www.microsoft.com/en-us/security/business/threat-protection/endpoint-defender
Submission: On June 10 via api from US — Scanned from DE

Form analysis 1 forms found in the DOM

Name: searchFormGET https://www.microsoft.com/en-us/security/site-search

<form class="c-search" autocomplete="off" id="searchForm" name="searchForm" role="search" action="https://www.microsoft.com/en-us/security/site-search" method="GET" data-seautosuggest=""
  data-seautosuggestapi="https://www.microsoft.com/msstoreapiprod/api/autosuggest"
  data-m="{&quot;cN&quot;:&quot;GlobalNav_Search_cont&quot;,&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c3c1c9c4c1m1r1a1&quot;,&quot;sN&quot;:3,&quot;aN&quot;:&quot;c1c9c4c1m1r1a1&quot;}" aria-expanded="false"
  style="overflow-x: visible;">
  <input id="cli_shellHeaderSearchInput" aria-label="Search Expanded" aria-autocomplete="list" aria-expanded="false" aria-controls="universal-header-search-auto-suggest-transparent" aria-owns="universal-header-search-auto-suggest-ul" type="search"
    name="q" role="combobox" placeholder="Search Microsoft Security" data-m="{&quot;cN&quot;:&quot;SearchBox_nav&quot;,&quot;id&quot;:&quot;n1c3c1c9c4c1m1r1a1&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;c3c1c9c4c1m1r1a1&quot;}" data-toggle="tooltip"
    data-placement="right" title="Search Microsoft Security" style="overflow-x: visible;">
  <button id="search" aria-label="Search Microsoft Security" class="c-glyph" data-m="{&quot;cN&quot;:&quot;Search_nav&quot;,&quot;id&quot;:&quot;n2c3c1c9c4c1m1r1a1&quot;,&quot;sN&quot;:2,&quot;aN&quot;:&quot;c3c1c9c4c1m1r1a1&quot;}"
    data-bi-mto="true" aria-expanded="false" style="overflow-x: visible;">
    <span role="presentation" style="overflow-x: visible;">Search</span>
    <span role="tooltip" class="c-uhf-tooltip c-uhf-search-tooltip" style="overflow-x: visible;">Search Microsoft Security</span>
  </button>
  <div class="m-auto-suggest" id="universal-header-search-auto-suggest-transparent" role="group" style="overflow-x: visible;">
    <ul class="c-menu" id="universal-header-search-auto-suggest-ul" aria-label="Search Suggestions" aria-hidden="true" data-bi-dnt="true" data-bi-mto="true" data-js-auto-suggest-position="default" role="listbox" data-tel="jsll"
      data-m="{&quot;cN&quot;:&quot;search suggestions_cont&quot;,&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c3c3c1c9c4c1m1r1a1&quot;,&quot;sN&quot;:3,&quot;aN&quot;:&quot;c3c1c9c4c1m1r1a1&quot;}" style="overflow-x: visible;"></ul>
  </div>
</form>

Text Content

We use optional cookies to improve your experience on our websites, such as
through social media connections, and to display personalized advertising based
on your online activity. If you reject optional cookies, only cookies necessary
to provide you the services will be used. You may change your selection by
clicking “Manage Cookies” at the bottom of the page. Privacy Statement
Third-Party Cookies

Accept Reject Manage cookies
Skip to main content
Microsoft
Microsoft Security
Microsoft Security
Microsoft Security
 * Home
 * Solutions
    * Cloud security
    * Identity & access
    * Information protection & governance
    * Ransomware
    * Secure remote work
    * Risk management
    * SIEM & XDR
    * Small & medium business
    * Zero Trust

 * Products
    * Identity & access Identity & access
      * Microsoft Entra Overview
      * Azure Active Directory part of Microsoft Entra
      * Microsoft Entra Permissions Management
      * Microsoft Entra Verified ID
      * Azure Key Vault
    * SIEM & XDR SIEM & XDR
      * Microsoft Sentinel
      * Microsoft Defender for Cloud
      * Microsoft 365 Defender
      * Microsoft Defender for Endpoint
      * Microsoft Defender for Office 365
      * Microsoft Defender for Identity
      * Microsoft Defender for Cloud Apps
      * Microsoft Defender Vulnerability Management
    * Cloud security Cloud security
      * Microsoft Defender for Cloud
      * Azure Firewall
      * Azure Web App Firewall
      * Azure DDoS Protection
      * GitHub Advanced Security
    * Endpoint security Endpoint security
      * Microsoft 365 Defender
      * Microsoft Defender for Endpoint
      * Microsoft Defender for IoT
      * Microsoft Defender for Business
      * Microsoft Defender Vulnerability Management
    * Identity threat protection Identity threat protection
      * Microsoft Defender for Identity
      * Azure AD Identity Protection
    * Risk management & privacy Risk management & privacy
      * Microsoft Purview Overview
      * Microsoft Purview Insider Risk Management
      * Microsoft Purview Communication Compliance
      * Microsoft Purview eDiscovery
      * Microsoft Purview Compliance Manager
      * Microsoft Priva Risk Management
    * Information protection Information protection
      * Microsoft Purview Overview
      * Microsoft Purview Information Protection
      * Microsoft Purview Data Lifecycle Management
      * Microsoft Purview Data Loss Prevention
    * Device management Device management
      * Microsoft Endpoint Manager

 * Services
 * Partners
 * Resources
    * Get started Get started
      * Customer stories
      * Security 101
      * Product trials
      * How we protect Microsoft
    * Reports and analysis Reports and analysis
      * Microsoft Security Insider
      * Microsoft Digital Defense Report
      * Security Response Center
    * Community Community
      * Microsoft Security Blog
      * Microsoft Security Events
      * Microsoft Tech Community
    * Documentation and training Documentation and training
      * Documentation
      * Technical Content Library
      * Training & certifications
    * Additional sites Additional sites
      * Compliance Program for Microsoft Cloud
      * Microsoft Trust Center
      * Security Engineering Portal
      * Service Trust Portal

 * Contact sales
 * More
 * Start free trial

 * All Microsoft
    * * Microsoft Security
      * Azure
      * Dynamics 365
      * Microsoft 365
      * Microsoft Teams
      * Windows 365
    * Tech & innovation Tech & innovation
      * Microsoft Cloud
      * AI
      * Azure Space
      * Mixed reality
      * Microsoft HoloLens
      * Microsoft Viva
      * Quantum computing
      * Sustainability
    * Industries Industries
      * Education
      * Automotive
      * Financial services
      * Government
      * Healthcare
      * Manufacturing
      * Retail
      * All industries
    * Partners Partners
      * Find a partner
      * Become a partner
      * Partner Network
      * Find an advertising partner
      * Become an advertising partner
      * Azure Marketplace
      * AppSource
    * Resources Resources
      * Blog
      * Microsoft Advertising
      * Developer Center
      * Documentation
      * Events
      * Licensing
      * Microsoft Learn
      * Microsoft Research
    * View Sitemap

Search Search Microsoft Security

Cancel
Sign in to your account
Sign in



MICROSOFT DEFENDER FOR ENDPOINT


THREATS ARE NO MATCH.

Learn more
Start free trial



MICROSOFT DIGITAL DEFENSE REPORT

Get deep analysis of current threat trends with extensive insights on big-game
ransomware, phishing, IoT threats, and nation-state activity.

Read the report


COMPLETE ENDPOINT SECURITY

Discover and secure Windows, macOS, Linux, Android, iOS, and network devices
against sophisticated threats.


RAPIDLY STOP THREATS

Gain the upper hand against sophisticated threats like ransomware and
nation-state attacks.


SCALE YOUR SECURITY

Put time back in the hands of defenders to prioritize risks and elevate your
security posture.


EVOLVE YOUR DEFENSES

Advance beyond endpoint silos and mature your security based on a foundation for
XDR and Zero Trust.





INDUSTRY RECOGNITION




 * FORRESTER
   
   Microsoft Defender for Endpoint is named a leader in The Forrester Wave™:
   Endpoint Detection and Response Providers, Q2 2022.6
   
   Read the blog


 * FORRESTER
   
   Microsoft Defender is named a Leader in The Forrester New Wave™: Extended
   Detection and Response (XDR) Providers, Q4 2021.2,4
   
   Read the blog


 * GARTNER
   
   Gartner® names Microsoft a Leader in the 2021 Magic Quadrant™ for Endpoint
   Protection Platforms.1,3
   
   Read more


 * FORRESTER
   
   Microsoft Defender for Endpoint is named a Leader in The Forrester Wave™:
   Endpoint Security Software as a Service, Q2 2021.4,5
   
   Read the blog


 * MITRE
   
   Microsoft leads in real-world detection in MITRE ATT&CK evaluation.
   
   Read more


 * INDUSTRY ANTIVIRUS TESTS
   
   Our antimalware capabilities consistently achieve high scores in independent
   tests.
   
   Read more


INDUSTRY RECOGNITION




 * FORRESTER
   
   Microsoft Defender for Endpoint is named a leader in The Forrester Wave™:
   Endpoint Detection and Response Providers, Q2 2022.6
   
   Read the blog


 * FORRESTER
   
   Microsoft Defender is named a Leader in The Forrester New Wave™: Extended
   Detection and Response (XDR) Providers, Q4 2021.2,4
   
   Read the blog


 * GARTNER
   
   Gartner® names Microsoft a Leader in the 2021 Magic Quadrant™ for Endpoint
   Protection Platforms.1,3
   
   Read more


 * FORRESTER
   
   Microsoft Defender for Endpoint is named a Leader in The Forrester Wave™:
   Endpoint Security Software as a Service, Q2 2021.4,5
   
   Read the blog


 * MITRE
   
   Microsoft leads in real-world detection in MITRE ATT&CK evaluation.
   
   Read more


 * INDUSTRY ANTIVIRUS TESTS
   
   Our antimalware capabilities consistently achieve high scores in independent
   tests.
   
   Read more

 * 
 * 
 * 
 * 
 * 
 * 


View full size
More about this diagram


Microsoft Defender for Endpoint delivers industry-leading endpoint security for
Windows, macOS, Linux, Android, iOS, and network devices and helps to rapidly
stop attacks, scale your security resources, and evolve your defenses. It’s
delivered at cloud scale, with built-in AI that reasons over the industry’s
broadest threat intelligence. Our comprehensive solution enables discovery of
all endpoints and even network devices, such as routers, in your environment. It
offers vulnerability management, endpoint protection, endpoint detection and
response (EDR), mobile threat defense, and managed hunting all in a single,
unified platform.




ELIMINATE THE BLIND SPOTS IN YOUR ENVIRONMENT

Discover unmanaged and unauthorized endpoints and network devices, and secure
these assets using integrated workflows.

Learn more






CAPABILITIES


DISCOVER VULNERABILITIES AND MISCONFIGURATIONS IN REAL TIME

Bring security and IT together with threat and vulnerability management to
quickly discover, prioritize, and remediate vulnerabilities and
misconfigurations.

Learn more Explore the interactive guide


GET EXPERT-LEVEL THREAT MONITORING AND ANALYSIS

Empower your security operations centers with Microsoft Threat Experts. Get deep
knowledge, advanced threat monitoring, analysis, and support to identify
critical threats in your unique environment.

Read the blog Watch the video


QUICKLY GO FROM ALERT TO REMEDIATION AT SCALE WITH AUTOMATION

Automatically investigate alerts and remediate complex threats in minutes. Apply
best practices and intelligent decision-making algorithms to identify active
threats and determine what action to take.

Watch the video Learn why you should turn on automation today


BLOCK SOPHISTICATED THREATS AND MALWARE

Defend against never-before-seen, polymorphic and metamorphic malware and
fileless and file-based threats with next-generation protection.

Learn about next-gen protection Learn about behavioral blocking and containment


DETECT AND RESPOND TO ADVANCED ATTACKS WITH BEHAVIORAL MONITORING

Spot attacks and zero-day exploits using advanced behavioral analytics and
machine learning.

Learn how to investigate incidents Watch the advanced hunting webinar


ELIMINATE RISKS AND REDUCE YOUR ATTACK SURFACE

Use attack surface reduction to minimize the areas where your organization could
be vulnerable to threats.

Learn about attack surface reduction Learn about web protection


INTEGRATED THREAT PROTECTION WITH SIEM AND XDR

Microsoft empowers your organization’s defenders by putting the right tools and
intelligence in the hands of the right people. Combine security information and
event management (SIEM) and extended detection and response (XDR) to increase
efficiency and effectiveness while securing your digital estate.

 

Learn more about threat protection


Microsoft 365 Defender Microsoft Sentinel Microsoft Defender for Cloud


MICROSOFT 365 DEFENDER

 

Prevent and detect attacks across your Microsoft 365 workloads with built-in XDR
capabilities.

Learn more about Microsoft 365 Defender


MICROSOFT SENTINEL

 

Aggregate security data and correlate alerts from virtually any source with
cloud-native SIEM from Microsoft.

Learn more about Microsoft Sentinel


MICROSOFT DEFENDER FOR CLOUD

 

Protect your multicloud and hybrid cloud workloads with built-in XDR
capabilities.

Learn more about Microsoft Defender for Cloud


MICROSOFT 365 DEFENDER

 

Prevent and detect attacks across your Microsoft 365 workloads with built-in XDR
capabilities.

Learn more about Microsoft 365 Defender


MICROSOFT SENTINEL

 

Aggregate security data and correlate alerts from virtually any source with
cloud-native SIEM from Microsoft.

Learn more about Microsoft Sentinel


MICROSOFT DEFENDER FOR CLOUD

 

Protect your multicloud and hybrid cloud workloads with built-in XDR
capabilities.

Learn more about Microsoft Defender for Cloud




ADDITIONAL CAPABILITIES


SECURE YOUR MOBILE DEVICES

Microsoft Defender for Endpoint offers mobile threat defense capabilities for
Android and iOS.

Learn more


QUICKLY EVALUATE CAPABILITIES

Fully evaluate our capabilities in a few simple steps in the Microsoft Defender
for Endpoint evaluation lab.

Learn more


STREAMLINE AND INTEGRATE WITH APIS

Integrate Microsoft Defender for Endpoint with your security solutions and
streamline and automate security workflows with rich APIs.

Connect with APIs


SIMPLIFY ENDPOINT SECURITY MANAGEMENT

Use a single pane of glass for endpoint configuration, deployment, and
management with Microsoft Endpoint Manager.

Learn about endpoint security management



COMPARE FLEXIBLE PURCHASE OPTIONS

Explore the comprehensive security capabilities in Microsoft Defender for
Endpoint P2, coming soon with Microsoft 365 E5, and Microsoft Defender for
Endpoint P1, included with Microsoft 365 E3.

MICROSOFT DEFENDER FOR ENDPOINT P1





Microsoft Defender for Endpoint P1 offers a foundational set of capabilities,
including industry leading antimalware, attack surface, and device-based
conditional access.

Included with Microsoft 365 E3


MICROSOFT DEFENDER FOR ENDPOINT P2





Microsoft Defender for Endpoint P2 offers the complete set of capabilities,
including everything in P1 plus endpoint detection and response, automated
investigation and incident response, and threat and vulnerability management.

Try it for free
Included with Microsoft 365 E5

Compare Microsoft Office Product features
Feature name

Microsoft Defender for Endpoint P1

Microsoft Defender for Endpoint P2

Product feature    

Unified security tools and centralized management

Feature is included

Feature is included

Next-generation antimalware

Feature is included

Feature is included

Attack surface reduction rules

Feature is included

Feature is included

Device control (such as USB)

Feature is included

Feature is included

Endpoint firewall

Feature is included

Feature is included

Network protection

Feature is included

Feature is included

Web control / category-based URL blocking

Feature is included

Feature is included

Device-based conditional access

Feature is included

Feature is included

Controlled folder access

Feature is included

Feature is included

APIs, SIEM connector, custom TI

Feature is included

Feature is included

Application control

Feature is included

Feature is included

Endpoint detection and response

Feature is not included

Feature is included

Automated investigation and remediation

Feature is not included

Feature is included

Threat and vulnerability management

Feature is not included

Feature is included

Threat intelligence (Threat Analytics)

Feature is not included

Feature is included

Sandbox (deep analysis)

Feature is not included

Feature is included

Microsoft Threat Experts7

Feature is not included

Feature is included



Swipe to view more plans




 * MICROSOFT DEFENDER FOR ENDPOINT P1
   
   
   
   
   Microsoft Defender for Endpoint P1 offers a foundational set of capabilities,
   including industry leading antimalware, attack surface, and device-based
   conditional access.
   
   Included with Microsoft 365 E3
   
    * Unified security tools and centralized management
      
      Feature is included
   
    * Next-generation antimalware
      
      Feature is included
   
    * Attack surface reduction rules
      
      Feature is included
   
    * Device control (such as USB)
      
      Feature is included
   
    * Endpoint firewall
      
      Feature is included
   
    * Network protection
      
      Feature is included
   
    * Web control / category-based URL blocking
      
      Feature is included
   
    * Device-based conditional access
      
      Feature is included
   
    * Controlled folder access
      
      Feature is included
   
    * APIs, SIEM connector, custom TI
      
      Feature is included
   
    * Application control
      
      Feature is included
   
    * Endpoint detection and response
      
      Feature is not included
   
    * Automated investigation and remediation
      
      Feature is not included
   
    * Threat and vulnerability management
      
      Feature is not included
   
    * Threat intelligence (Threat Analytics)
      
      Feature is not included
   
    * Sandbox (deep analysis)
      
      Feature is not included
   
    * Microsoft Threat Experts7
      
      Feature is not included
   
   

 * MICROSOFT DEFENDER FOR ENDPOINT P2
   
   
   
   
   Microsoft Defender for Endpoint P2 offers the complete set of capabilities,
   including everything in P1 plus endpoint detection and response, automated
   investigation and incident response, and threat and vulnerability management.
   
   Try it for free
   Included with Microsoft 365 E5
   
    * Unified security tools and centralized management
      
      Feature is included
   
    * Next-generation antimalware
      
      Feature is included
   
    * Attack surface reduction rules
      
      Feature is included
   
    * Device control (such as USB)
      
      Feature is included
   
    * Endpoint firewall
      
      Feature is included
   
    * Network protection
      
      Feature is included
   
    * Web control / category-based URL blocking
      
      Feature is included
   
    * Device-based conditional access
      
      Feature is included
   
    * Controlled folder access
      
      Feature is included
   
    * APIs, SIEM connector, custom TI
      
      Feature is included
   
    * Application control
      
      Feature is included
   
    * Endpoint detection and response
      
      Feature is included
   
    * Automated investigation and remediation
      
      Feature is included
   
    * Threat and vulnerability management
      
      Feature is included
   
    * Threat intelligence (Threat Analytics)
      
      Feature is included
   
    * Sandbox (deep analysis)
      
      Feature is included
   
    * Microsoft Threat Experts7
      
      Feature is included
   
   








SEE WHAT OUR CUSTOMERS ARE SAYING

Read their stories




MICROSOFT DEFENDER FOR BUSINESS

Elevate your security with enterprise-grade endpoint protection built for
businesses with up to 300 employees in a simple and cost-effective solution.

Learn more





LEARN ABOUT OUR PARTNERS




 * ARCSIGHT
   
   Pull Microsoft Defender for Endpoint detections into the ArcSight Security
   Information Event Management (SIEM) solution.
   
   Learn more


 * DEMISTO
   
   Enable your security team to orchestrate and automate endpoint security
   monitoring by integrating Demisto with Microsoft Defender for Endpoint.
   
   Learn more


 * SAFEBREACH
   
   Gain visibility into the types of attacks Microsoft Defender for Endpoint is
   blocking using insight from correlations with SafeBreach attack simulations.
   
   Learn more


 * MORPHISEC
   
   Integrate forensics data to help prioritize alerts, determine machine at-risk
   score, and visualize the full attack timeline.
   
   Learn more


 * THREATCONNECT
   
   Alert or block based on custom threat intelligence from ThreatConnect
   Playbooks using Microsoft Defender for Endpoint indicators.
   
   Learn more


 * PALO ALTO NETWORKS
   
   Enrich your endpoint protection by extending Autofocus and other threat feeds
   to Microsoft Defender for Endpoint using MineMeld.
   
   Learn more


 * DELL TECHNOLOGIES ADVANCED THREAT PROTECTION
   
   Identify malicious behavior and anomalies with the round-the-clock
   capabilities of this professional monitoring service.
   
   Learn more


 * CSIS MANAGED DETECTION AND RESPONSE
   
   Gain actionable insights into what, when, and how security incidents have
   taken place with continuous monitoring and security alert analysis.
   
   Learn more


 * INSPARK
   
   Help protect, detect, and respond to threats with the uninterrupted, managed
   service capabilities of InSpark's Cloud Security Center.
   
   Learn more


 * RED CANARY
   
   Deploy managed detection and response in minutes with Red Canary, a security
   operations partner for modern teams.
   
   Learn more


 * CYREN
   
   Seamlessly integrate advanced web content filtering into Microsoft Defender
   Security Center.
   
   Learn more


 * CRITICALSTART
   
   Reduce your alerts by 99 percent with the Zero Trust Analytics Platform.
   
   Learn more


LEARN ABOUT OUR PARTNERS




 * ARCSIGHT
   
   Pull Microsoft Defender for Endpoint detections into the ArcSight Security
   Information Event Management (SIEM) solution.
   
   Learn more


 * DEMISTO
   
   Enable your security team to orchestrate and automate endpoint security
   monitoring by integrating Demisto with Microsoft Defender for Endpoint.
   
   Learn more


 * SAFEBREACH
   
   Gain visibility into the types of attacks Microsoft Defender for Endpoint is
   blocking using insight from correlations with SafeBreach attack simulations.
   
   Learn more


 * MORPHISEC
   
   Integrate forensics data to help prioritize alerts, determine machine at-risk
   score, and visualize the full attack timeline.
   
   Learn more


 * THREATCONNECT
   
   Alert or block based on custom threat intelligence from ThreatConnect
   Playbooks using Microsoft Defender for Endpoint indicators.
   
   Learn more


 * PALO ALTO NETWORKS
   
   Enrich your endpoint protection by extending Autofocus and other threat feeds
   to Microsoft Defender for Endpoint using MineMeld.
   
   Learn more


 * DELL TECHNOLOGIES ADVANCED THREAT PROTECTION
   
   Identify malicious behavior and anomalies with the round-the-clock
   capabilities of this professional monitoring service.
   
   Learn more


 * CSIS MANAGED DETECTION AND RESPONSE
   
   Gain actionable insights into what, when, and how security incidents have
   taken place with continuous monitoring and security alert analysis.
   
   Learn more


 * INSPARK
   
   Help protect, detect, and respond to threats with the uninterrupted, managed
   service capabilities of InSpark's Cloud Security Center.
   
   Learn more


 * RED CANARY
   
   Deploy managed detection and response in minutes with Red Canary, a security
   operations partner for modern teams.
   
   Learn more


 * CYREN
   
   Seamlessly integrate advanced web content filtering into Microsoft Defender
   Security Center.
   
   Learn more


 * CRITICALSTART
   
   Reduce your alerts by 99 percent with the Zero Trust Analytics Platform.
   
   Learn more

 * 
 * 
 * 
 * 
 * 
 * 
 * 
 * 
 * 
 * 
 * 
 * 




BECOME A PARTNER

Learn more about becoming a partner and integrating with Microsoft Defender for
Endpoint. Follow this simple, step-by-step guide to start using our flexible
platform and rich APIs.

Get started


ONE RF_IMG Module TOP




DIVE DEEPER INTO THE PRODUCT

Get technical details on capabilities, minimum requirements, and deployment
guidance.

Read the documentation


ONE RF_IMG Module BTM




ADDITIONAL RESOURCES


BECOME A MICROSOFT DEFENDER FOR ENDPOINT EXPERT

Get training for security operations and security admins, whether you’re a
beginner or have experience.

Access training resources


LEARN MORE ABOUT OUR FEATURES

Explore educational videos about Microsoft Defender for Endpoint.

Watch the videos


STAY UP TO DATE

Get product news, configuration guidance, product how-tos, and tips.

Read the blogs


1. Gartner does not endorse any vendor, product or service depicted in its
research publications, and does not advise technology users to select only those
vendors with the highest ratings or other designation. Gartner research
publications consist of the opinions of Gartner’s research organization and
should not be construed as statements of fact. Gartner disclaims all warranties,
express or implied, with respect to this research, including any warranties of
merchantability or fitness for a particular purpose.
GARTNER and Magic Quadrant are registered trademarks and service mark of
Gartner, Inc. and/or its affiliates in the U.S. and internationally and are used
herein with permission. All rights reserved.
2. The Forrester New Wave™: Extended Detection and Response (XDR) Providers, Q4
2021, Allie Mellen, October 2021.
3. Gartner Magic Quadrant for Endpoint Protection Platforms, Peter Firstbrook |
Dionisio Zumerle | Prateek Bhajanka | Lawrence Pingree | Paul Webber, 05 May
2021.
4. Forrester and Forrester Wave are trademarks of Forrester Research, Inc.
5. The Forrester Wave™: Endpoint Security Software as a Service, Q2 2021, Chris
Sherman with Merritt Maxim, Allie Mellen, Shannon Fish, Peggy Dostie, May 2021.
6. The Forrester Wave™: Endpoint Detection and Response Providers, Q2 2022,
Allie Mellen, April 2022.
7. Includes Targeted Attack Notifications (TAN) and Experts on Demand (EOD).
Customers must apply for TAN and EOD is available for purchase as an add-on.



--------------------------------------------------------------------------------

Follow Microsoft
 * LinkedIn
 * Twitter
 * Blog

What's new
 * Surface Laptop Go 2
 * Surface Pro 8
 * Surface Laptop Studio
 * Surface Pro X
 * Surface Go 3
 * Surface Duo 2
 * Surface Pro 7+
 * Windows 11 apps

Microsoft Store
 * Account profile
 * Download Center
 * Microsoft Store support
 * Returns
 * Order tracking
 * Virtual workshops and training
 * Microsoft Store Promise
 * Flexible Payments

Education
 * Microsoft in education
 * Devices for education
 * Microsoft Teams for Education
 * Microsoft 365 Education
 * Education consultation appointment
 * Educator training and development
 * Deals for students and parents
 * Azure for students

Business
 * Microsoft Cloud
 * Microsoft Security
 * Dynamics 365
 * Microsoft 365
 * Microsoft Power Platform
 * Microsoft Teams
 * Microsoft Industry
 * Small Business

Developer & IT
 * Azure
 * Developer Center
 * Documentation
 * Microsoft Learn
 * Microsoft Tech Community
 * Azure Marketplace
 * AppSource
 * Visual Studio

Company
 * Careers
 * About Microsoft
 * Company news
 * Privacy at Microsoft
 * Investors
 * Diversity and inclusion
 * Accessibility
 * Sustainability

English (United States)
 * Sitemap
 * Contact Microsoft
 * Privacy
 * Manage cookies
 * Terms of use
 * Trademarks
 * Safety & eco
 * About our ads
 * © Microsoft 2022

Close dialog
Modal dialog

Microsoft Defender for Endpoint is easy to deploy, configure, and manage with a
unified security management experience. It offers endpoint security for clients,
servers, mobile devices, and network devices. This diagram shows Microsoft
Defender for Endpoint capabilities, including risk-based vulnerability
management and assessment, attack surface reduction, behavioral-based and
cloud-powered next-generation protection, endpoint detection and response (EDR),
automatic investigation and remediation, and managed hunting services. These
capabilities are underscored with rich APIs that enable access and integration
with our endpoint security platform.

Dialog closed