Microsoft Defender for Endpoint (formerly Microsoft Defender ATP) is a holistic, cloud delivered endpoint security solution that includes risk-based vulnerability management and assessment, attack surface reduction, behavioral based and cloud-powered next generation protection, endpoint detection and response (EDR), automatic investigation and remediation, managed hunting services, rich APIs, and unified security management.
$2.50
per user/per month
Pricing
DNSFilter
Microsoft Defender for Endpoint
Editions & Modules
BASIC
$0.90
per month per user
PRO
$1.80
per month per user
ENTERPRISE
$2.70
per month per user
Academic
$2.50
per user/per month
Standalone
$5.20
per user/per month
Offerings
Pricing Offerings
DNSFilter
Microsoft Defender for Endpoint
Free Trial
Yes
Yes
Free/Freemium Version
No
No
Premium Consulting/Integration Services
No
No
Entry-level Setup Fee
No setup fee
No setup fee
Additional Details
Each tier has a monthly minimum price. Contact sales today for more details.
Add-On support is an additional 20% of plan cost.
I like how easy it is to manage the filtering software from the web portal. It's super straightforward to set up my networking equipment with clear instructions. I like that it automatically blocks threats without me having to do anything. It also lets me remotely manage both of our locations and networks from the same portal with the same policies. Very useful for saving time setting up content filtering.
I think it's well suited as a drop-in EDR, really an XDR, I guess if you want to go there. A platform for most organizations. I think it lacks some of the granularity in off-the-shelf rule sets that I want for defense Industrial base or financial services clients. For heavily targeted organizations, I think it requires a lot more customization than some of the competitor products off the shelf. So if you get there, it's not there day one.
It integrates perfectly with Azure Sentinel. I mean, that's great. We can have a single pane of class with other platforms, like Defender for Cloud, Defender for endpoints, and Defender for servers, which is awesome as well. The ease of deployment is because Microsoft made sure around a year ago that every single workstation with Microsoft Windows came with Defender for Endpoints embedded.
Improved scalability: As an organization's needs grow and evolve, the software should be able to scale up and handle an increasing number of users and devices.
More granular controls: The ability to set more detailed and specific policies, such as the ability to block certain types of content for specific groups of users, would give organizations more flexibility and control over their internet usage.
Advanced threat protection: Increasing the software's ability to detect and protect against advanced threats such as zero-day exploits and APTs would provide a more comprehensive security solution.
While it's a very good product for auditing, it has a very hard time to distinguish what is malicious and is an attack, what is not. Very rarely we get indication of a real malicious attack. We got lots of hours for off the shelf malware that it cleans up automatically. So basically we never get to look at it, which is a positive thing, but threats are detected by the third party endpoint, so it will not be enough by itself.
Cost add-ons for Security features is nickel and diming the process to keep pace with cybercrime. Limited Education budgets require us to be more pro-active in finding cost-effective measures to protect our devices, staff and students. Defender is a strong, well-featured product that is pricing itself out of the education market
Because in terms of the usability is easy to understand, it's easy to manage, obviously you need to have specific skills to do that, but I would say that even the console and the product is walking through the flow that you are looking for on this console.
The first time I tried to onboard my macOS endpoints to MDE I struggled for quite a bit. I had to reach out to Microsoft's MDE support team. The tech was very helpful in walking me through the steps during a screen share session
When compared to Kerio Control we found Central Management of filtering to be much easier, it also allowed us to apply filtering to remote devices like laptops and had better logging. We found DNSFilter to be much easier to deploy then Webroot DNS Protection because Webroot required the Anti Virus to be installed before deployment was even possible, and reporting features were very lacking.
I would say not to name specific company names, because I'm a partner with one of them and that's the account that I work with. But I use some competing solutions that I would say are pretty heavy from an overhead perspective with the agent that has to be installed in the machine. It can be too restrictive for permissions where it gets in the way of an employee doing their job and the ability for Defender to be secure in that, but still allow an employee to go about their day and do what they need to do is certainly a change maker there. But yeah, from the other products perspective across the years, whether it be business or personal, some other products I can name are other endpoint protections from Vera Avast, McAfee, of course as folks remember that. And some of the other major players too that I would say a large networking company that doubles in security as well. I'll name them that way.
We used to deploy Cisco Umbrella before switching to DNSFilter. I feel like you need an advanced degree to set up and manage Cisco Umbrella. Not the case with DNSFilter. You will save time and money by leveraging a very easy to use product.