Do you use Microsoft Defender for Endpoint?

Last updated by Tiago Araújo [SSW] about 1 month ago.See history

Microsoft Defender for Endpoint is an enterprise endpoint security platform designed to help enterprise networks prevent, detect, investigate, and respond to advanced threats. As part of Microsoft Defender XDR, it is managed at https://security.microsoft.com/

defender365 2022 08 10
Figure: Microsoft Defender XDR – Dashboard 

There are a number of licensing options - check out Microsoft's documentation for information.

Microsoft Defender for Endpoint can be used to manage and investigate all devices on your network - whether on your domain or joined to Intune.

Configuration

Follow the instructions to:

Secure Score

Microsoft Secure Score is a measurement of an organization's security posture, based on data from Defender for Endpoint and other Microsoft security products. It can be found at security.microsoft.com/securescore.

Points are given as per the following actions:

  • Configuring recommended security features
  • Remediating vulnerabilities
  • Addressing the improvement action with a third-party application or software, or an alternate mitigation

secure score 2022 08 10
Figure: Microsoft Secure Score

How to increase Secure Score

Each improvement activity is worth up to 10 points, based on their importance. Points are obtained by implementing security recommendations, such as updating software or configuring Intune policies (or GPOs) to secure user accounts and devices.

Security admins should check this score regularly and improve the score where possible.

Device Inventory

Device inventory shows a list of the devices in your network. Devices are added to the device inventory through the Microsoft Defender for the Endpoint onboarding process. You’ll see information such as device name, domain, risk level, exposure level, OS platform, onboarding status, sensor health state, and other details for easy identification of devices most at risk.

Risk level reflects the overall risk assessment of the device based on combination of factors, including the types and severity of active alerts on the device. Resolving active alerts, approving remediation activities, and suppressing subsequent alerts can lower the risk level.

Exposure level reflects the current exposure of this device based on the cumulative impact of its pending security recommendations.

badexample exposure 2022 08 10
Figure: Bad example - High exposure level

goodexample exposure 2022 08 10
Figure: Good example – No High exposure level

Security admins should check this page regularly and reduce the risk/exposure/criticality levels where possible.

discoveredvulner 2022 08 10
Figure: Severity level – High Exposure

Security Recommendations

The Microsoft Defender portal has security recommendations for exposed devices which can be remediated manually after doing the needful (maybe a simple update): https://security.microsoft.com/security-recommendations/

Incidents & Alerts

In Microsoft Defender XDR, an incident is a collection of correlated alerts and associated data that define the complete story of an attack. Defender for Office 365 alerts, automated investigation and response (AIR), and the outcome of the investigations are natively integrated and correlated on the Incidents page.

When critical incidents occur, you should receive an email notification so that you can act on the alert immediately.

defender alert
Figure: Example email alert from Defender

However, it is also important to check the Incidents page in Defender, to resolve less critical alerts - or email alerts that you may have missed. It is a good idea to set a reminder to check this page weekly.

These alerts can include emails that have been reported as malware or phishing, data loss prevention (DLP), or unwanted software detections.

defender incidents
Figure: Bad example - Unresolved incidents

defender no incidents
Figure: Good example - All incidents resolved

Ash Anil
Chris Schultz
We open source. Powered by GitHub