Microsoft Defender for Endpoint review
Updated June 08, 2024
Microsoft Defender for Endpoint review
Score 8 out of 10
Vetted Review
Verified User
Overall Satisfaction with Microsoft Defender for Endpoint
Microsoft Defender is a fantastic product for endpoint security. We use almost all the features available in this product. We have enabled it in our Intune. We have configured a profile for on-boarding Windows devices and have enabled all the benefits of Defender. Similarly we have on-boarded android and iOS devices. We have configured a compliance policy for them. We have created app protection policy. We have configured conditional access to block accesses of the devices that exceed your threat level. Also configured the Antivirus and Anti-malware policies. By implementing all these we have made our environment almost secured of external threats and vulnerabilities. This has also helped us to improve our compliance score.
- It examines and acts quickly to all the vulnerabilities or threats from the external attacks.
- It detects and blocks all the unsafe application which can cause problems to the system.
- Its Antivirus feature protects the system from all the harmful viruses.
- It works wonderfully well for Windows devices but when it comes to MAC devices it is not that supportive as it is for Windows. There is definitely some scope of improvement there.
- It has limited support for third party tools.
- Sometimes the user experience can be not that good as their system performance is impacted when the scan is active.
- Positive impact is that all the security related features has come under one umbrella.
- After using this product we did not feel of going to any other solution. This is that good.
- The pricing is on a higher side as all the Microsoft products are but overall happy with the performance.
- Scalability
- Integration with Other Systems
- Ease of Use
We are using the features below...
Threat Intelligence for vulnerability management.
Incidents and Alerts for security monitoring and responding to it.
Email and Collaboration for tracking of messages.
Attack Simulation Training for security awareness training and tests.
Compliance Manager for managing compliance
Data Classification for classifying data.
eDiscovery for searching emails and creating .pst files.
Data Loss Protection for creating policies and preventing data from moving out of the organization and avoiding reaching in wrong hands.
Data Life Cycle Management for retention policies and tags.
Threat Intelligence for vulnerability management.
Incidents and Alerts for security monitoring and responding to it.
Email and Collaboration for tracking of messages.
Attack Simulation Training for security awareness training and tests.
Compliance Manager for managing compliance
Data Classification for classifying data.
eDiscovery for searching emails and creating .pst files.
Data Loss Protection for creating policies and preventing data from moving out of the organization and avoiding reaching in wrong hands.
Data Life Cycle Management for retention policies and tags.
There are many endpoints which Microsoft Defender has been protecting in our Organization's IT infrastructure environment.
1. Mobiles
2. Laptops.
3. Desktop computers.
4. Tablets.
5. Virtual machines.
6. Embedded devices.
7. Servers.
8. Printers.
9. Scanners.
There are also other IOT (Internet OF Things) devices which Microsoft Defender is protecting such as Cameras, Security systems, Biometrics and Smart Speakers.
1. Mobiles
2. Laptops.
3. Desktop computers.
4. Tablets.
5. Virtual machines.
6. Embedded devices.
7. Servers.
8. Printers.
9. Scanners.
There are also other IOT (Internet OF Things) devices which Microsoft Defender is protecting such as Cameras, Security systems, Biometrics and Smart Speakers.
- Symantec Endpoint Security, Proofpoint Insider Threat Management and Cisco Endpoint Security Analytics
As we are using 90% of Windows devices and laptops in our organisation we figured out that Microsoft Defender for Endpoint is a better solution for us as compared to above solutions mentioned. It is very easy and convenient to use this solution with Windows devices. The configuration is more compliant and compatible with Windows devices. The templates provided in the profile are very easy to use. Not that above mentioned solutions are not good but Microsoft Defender for Endpoint suits as per our organisation's environment. You have to look and analyse what is good for your organisation.
Do you think Microsoft Defender for Endpoint delivers good value for the price?
Yes
Are you happy with Microsoft Defender for Endpoint's feature set?
Yes
Did Microsoft Defender for Endpoint live up to sales and marketing promises?
Yes
Did implementation of Microsoft Defender for Endpoint go as expected?
Yes
Would you buy Microsoft Defender for Endpoint again?
Yes