Microsoft Defender for Endpoint (formerly Microsoft Defender ATP) is a holistic, cloud delivered endpoint security solution that includes risk-based vulnerability management and assessment, attack surface reduction, behavioral based and cloud-powered next generation protection, endpoint detection and response (EDR), automatic investigation and remediation, managed hunting services, rich APIs, and unified security management.
$2.50
per user/per month
Pricing
DNSFilter
Microsoft Defender for Endpoint
Editions & Modules
BASIC
$0.90
per month per user
PRO
$1.80
per month per user
ENTERPRISE
$2.70
per month per user
Academic
$2.50
per user/per month
Standalone
$5.20
per user/per month
Offerings
Pricing Offerings
DNSFilter
Microsoft Defender for Endpoint
Free Trial
Yes
Yes
Free/Freemium Version
No
No
Premium Consulting/Integration Services
No
No
Entry-level Setup Fee
No setup fee
No setup fee
Additional Details
Each tier has a monthly minimum price. Contact sales today for more details.
Add-On support is an additional 20% of plan cost.
I like how easy it is to manage the filtering software from the web portal. It's super straightforward to set up my networking equipment with clear instructions. I like that it automatically blocks threats without me having to do anything. It also lets me remotely manage both of our locations and networks from the same portal with the same policies. Very useful for saving time setting up content filtering.
I can definitely tell you where it’s more suited, because we haven’t come across any less appropriate scenarios. But definitely in regard to how we centrally manage our user space and our endpoints, it’s been beneficial from an API perspective and is really transferable, with strong collaboration with our Azure stack. It works very well.
Definitely on the threat action and response. We didn't have a stress-response option before, but the dependent brand point provided it instantly. Also, it's doing UVA and machine learning, which we didn't have before. So it's definitely providing more sophisticated threat-detection capabilities than we had before.
Improved scalability: As an organization's needs grow and evolve, the software should be able to scale up and handle an increasing number of users and devices.
More granular controls: The ability to set more detailed and specific policies, such as the ability to block certain types of content for specific groups of users, would give organizations more flexibility and control over their internet usage.
Advanced threat protection: Increasing the software's ability to detect and protect against advanced threats such as zero-day exploits and APTs would provide a more comprehensive security solution.
The only thing is sometimes, because Microsoft has so many platforms, it gets a little confusing, like am I in the security platform? Am I in Purview? Where am I at right now? Because there's so many sites that are kind of doing a lot of the same thing, and so that does get a little confusing from time to time, but outside of that, it's a pretty good product.
Cost add-ons for Security features is nickel and diming the process to keep pace with cybercrime. Limited Education budgets require us to be more pro-active in finding cost-effective measures to protect our devices, staff and students. Defender is a strong, well-featured product that is pricing itself out of the education market
Microsoft Defender for Endpoint is a great EDR to have that works quickly and silently in the background and it integrates well with other Microsoft services. As an IT manager, I can appreciate that I do not get bombarded by alerts for every small detail. On the flipside, the management site can use some work in being more clear and should be more streamlined so I'm not clicking through multiple pages to figure out what happened
Microsoft Defender for Endpoint chugs along just fine no matter what we throw at it and what systems it's running on. It doesn't take up a lot of resources either, so that's welcomed.
The first time I tried to onboard my macOS endpoints to MDE I struggled for quite a bit. I had to reach out to Microsoft's MDE support team. The tech was very helpful in walking me through the steps during a screen share session
Deployment was handled by our team here and everything went pretty smoothly. We did have a few hiccups in our test group, but that only took a bit to get ironed out.
When compared to Kerio Control we found Central Management of filtering to be much easier, it also allowed us to apply filtering to remote devices like laptops and had better logging. We found DNSFilter to be much easier to deploy then Webroot DNS Protection because Webroot required the Anti Virus to be installed before deployment was even possible, and reporting features were very lacking.
Previously, we've used Sophos. We've used, way back when, McAfee, Norton, Symantec, all those. And we finally settled on Microsoft Defender for Endpoint. We're a Microsoft technology stack shop. So obviously it was natural. It's built into Windows, so we're not adding additional agents. Some of the other vendors and their agents, for a while, would compete with CPU usage. And so it actually slowed down the machines. Because Microsoft Defender for Endpoint is built into the Windows product, Microsoft is going to ensure that it does not affect the other productivity tools that a user may use.
We used to deploy Cisco Umbrella before switching to DNSFilter. I feel like you need an advanced degree to set up and manage Cisco Umbrella. Not the case with DNSFilter. You will save time and money by leveraging a very easy to use product.