6

Considerations for Deployment and Configuration

As we touched on in the previous chapter, Microsoft Defender for Endpoint’s (MDE’s) deployment and configuration choices typically depend on the tools you are already using in your environment. Depending on your current management strategy, this can be beneficial – or require you to rethink your approach.

For a long time, Microsoft held on to the strategy of introducing new features alongside Windows operating system development. Later, coverage was expanded to both down-level as well as non-Windows operating systems; this expanded coverage resulted in a more fragmented feature set and a dependence on Microsoft’s first-party management solutions. Unfortunately, this first-party management also ...

Get Microsoft Defender for Endpoint in Depth now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.