Skip to main content
TrustRadius
Microsoft Defender for Endpoint

Microsoft Defender for Endpoint
Formerly Microsoft Defender ATP

Overview

What is Microsoft Defender for Endpoint?

Microsoft Defender for Endpoint (formerly Microsoft Defender ATP) is a holistic, cloud delivered endpoint security solution that includes risk-based vulnerability management and assessment, attack surface reduction, behavioral based and cloud-powered next generation protection, endpoint detection and response (EDR), automatic investigation…

Read more
Recent Reviews

Secure workstations with MDE

8 out of 10
November 03, 2023
Microsoft Defender for Endpoint offers exceptional threat insight and protection. Its KQL powered Advanced Hunting provides deep analysis. …
Continue reading
Read all reviews

Awards

Products that are considered exceptional by their customers based on a variety of criteria win TrustRadius awards. Learn more about the types of TrustRadius awards to make the best purchase decision. More about TrustRadius Awards

Popular Features

View all 7 features
  • Malware Detection (53)
    8.5
    85%
  • Infection Remediation (52)
    8.2
    82%
  • Anti-Exploit Technology (51)
    8.0
    80%
  • Centralized Management (52)
    7.9
    79%

Reviewer Pros & Cons

View all pros & cons
Return to navigation

Pricing

View all pricing

Academic

$2.50

On Premise
per user/per month

Standalone

$5.20

On Premise
per user/per month

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services
Return to navigation

Product Demos

Microsoft Defender for Endpoint Overview

YouTube
Return to navigation

Features

Endpoint Security

Endpoint security software protects enterprise connected devices from malware and cyber attacks.

8.2
Avg 8.5
Return to navigation

Product Details

What is Microsoft Defender for Endpoint?

Presented as an epicenter for comprehensive endpoint security, Microsoft Defender for Endpoint helps users rapidly stop attacks, scale security resources, and evolve defenses across operating systems and network devices.

Rapidly stops threats: Protects against sophisticated threats such as ransomware and nation-state attacks.

Scales security: Puts time back in the hands of defenders to prioritize risks and elevate the organization's security posture.

Evolves the organization's defenses: Goes beyond endpoint silos and mature the organization's security based on a foundation for extended detection and response (XDR) and Zero Trust.

Microsoft Defender for Endpoint Features

Endpoint Security Features

  • Supported: Anti-Exploit Technology
  • Supported: Endpoint Detection and Response (EDR)
  • Supported: Centralized Management
  • Supported: Infection Remediation
  • Supported: Vulnerability Management
  • Supported: Malware Detection

Microsoft Defender for Endpoint Screenshots

Screenshot of blocked activitiesScreenshot of Detects & respondsScreenshot of discovers vulnerabilityScreenshot of Eliminates blind spotsScreenshot of Risk management

Microsoft Defender for Endpoint Video

Microsoft Defender for Endpoint

Microsoft Defender for Endpoint Competitors

Microsoft Defender for Endpoint Technical Details

Deployment TypesOn-premise
Operating SystemsWindows
Mobile ApplicationNo

Frequently Asked Questions

Microsoft Defender for Endpoint (formerly Microsoft Defender ATP) is a holistic, cloud delivered endpoint security solution that includes risk-based vulnerability management and assessment, attack surface reduction, behavioral based and cloud-powered next generation protection, endpoint detection and response (EDR), automatic investigation and remediation, managed hunting services, rich APIs, and unified security management.

CrowdStrike Falcon, Symantec Endpoint Security, and Sophos Intercept X are common alternatives for Microsoft Defender for Endpoint.

Reviewers rate Endpoint Detection and Response (EDR) and Malware Detection highest, with a score of 8.5.

The most common users of Microsoft Defender for Endpoint are from Mid-sized Companies (51-1,000 employees).
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(174)

Attribute Ratings

Reviews

(1-19 of 19)
Companies can't remove reviews or game the system. Here's why
Yash Mudaliar | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
Incentivized
Microsoft Defender for Endpoint is being used an EDR and vulnerability management tool for our organization as well as for our clients. The use cases for this tool is primarily includes automating responses to incidents, performing weekly vulnerability assessments and managing endpoint security policies across the organization. We also employ it to set up evaluation labs for specific scenarios occasionally.
  • Vulnerability Management is without a doubt one of the most efficient features of Microsoft Defender for Endpoint. It provides enough details about the vulnerability, its impact and the remediation as well.
  • The latest addition of 'Endpoint Security Policies' has been a very well thought and insightful feature that relieves the security analysts from the hassle of switching to Intune just for reviewing the endpoint security policies.
  • 'Automated Remediation' is a boon to many organizations across the industry that helps in responding to ongoing attacks at machine speed. Microsoft Defender for Endpoint does it quite well in terms of accuracy and quickness.
  • Dynamic device tagging feature has been an underrated feature from Microsoft Defender for Endpoint. It is such a reliable and efficient feature that saves a lot of time whether you are dealing with vulnerabilities or incidents.
  • While 'Vulnerability Management' is one of my favorite features, I do feel that it has been the same for quite some time and now it should have some integration capabilities to do actions like inform the affected users, or take small actions like updating the OS, sending prompts to devices etc.
  • I think most people will agree with me when I say that 'Baseline Assessments' feature should now have more standards added to its inventory. CIS and STIG are the only ones available in this feature without any updates for a long time now.
  • Device Discovery while a good feature is appearing to somewhat unstable in nature. It does not provide admins with enough details and any actions to take on the discovered devices.
Microsoft Defender for Endpoint will be super useful to you if you have a Microsoft security ecosystem in your organization because of the flawless and hassle-free integration capabilities.
Microsoft Defender for Endpoint will be a great choice when you are a big organization (more than 500 endpoints) and are dealing with customer data from a critical industry.
Although if you lie in the SMB segment, taking standalone Microsoft Defender for Endpoint plans will make you confused about which features to go for and which ones to let go off. Hence, explore other options here.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
The defender is deployed on all the end-user devices and servers except for a few legacy servers, and it is very easy to deploy and has good offline and online detection ratings. The agent is very easy to handle, and updates are easy to push with minimal effort and has a wide range of detections for Windows, Linux, and Mac OS. It gives very fast and optimal scanning results with minimal CPU utilization.
  • The threat detection is very good in Defender, during log4j exploitation we got a great deal of support from the Defender, and proactive coverage was received.
  • During a recent security incident in our organization, the defender support team was quick to hop in and release the emergency patches and malware signature updates via hotfix, which has helped us deal with the security incident proactively.
  • The ease of deployment on the endpoint and scanning feature, which consume minimal resources, and the offline and online coverages of threats are great advantages of Defender.
  • Sometimes interacting with the support becomes difficult and more technical side, people who can understand customer concerns better will be of great help.
  • Offline coverage can be even better.
  • So far, I have had the best experience with defenders, and there is not much to complain about defenders.
If you are looking for a scalable solution with decent organization size and even if it is relatively small it works very well. If you are looking for a solution that has great offline and online coverage that allows stimulated attacks and good for testing it is highly recommended. If you often run scans and looking for something that should not hinder the performance of your endpoint you should definitely go for it.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
We use Microsoft Defender Endpoint to check incoming E-mail and PDF, ZIP and xlsx files for viruses. Incoming E-mail without or with attachments or downloaded files can contains viruses, malware or other dangerous components.We receive daily many E-mail, some with attachments, and our customers upload many files to our servers. This should not cause any security problems
  • Incoming E-mails are tested for viruses
  • Zip files that are extracted are checked for viruses
  • Downloaded executables are also checked for viruses
  • Better reporting of found dangerous code
  • More insight into the resources used by a system scan
  • It is good that regular updates are made available
Microsoft defender prevented an downloaded executable with suspicious code from being installed.
This was well suited.
The executable generated by a c compiler that was not Microsoft's was considered dangerous code.
This was not suitable.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
We are using this as our endpoint AV. We migrated from Trellix to Defender very recently. This was not a pressing point for us except our org was moving from G-Suite and Microsoft a very good deal for the Collaboration and Security Infrastructure. We have only used the product for EDR and for ATP. The overall performance of our endpoints are good till now. There were slowness reported in the older versions of Defender but with M365, we did not notice any significant slowness of system performance. One major plus is the security dashboard which gives you a very good view of the reports for CISOs.
  • End Point Protection in real time
  • Security Dashboard for CISOs
  • End point detection and Response
  • Don't have any points to add here
if you have significant no. Microsoft products in your ecosystem then Defender works extremely well. We onboarded defender as part of M365, which includes MDO and MDE both.
If your customers are spread across multiple geographies, then Defender can help you setup Compliance policies based on each reason which reduces the efforts from DPO significantly.
Apart from these, I feel it is a feature rich and stable EDR product.
September 21, 2023

Easy and Reliable to Use

Score 9 out of 10
Vetted Review
Verified User
Incentivized
We use this product enterprise-wide on all of our workstations and servers. It aids in securing the endpoints and users as well as providing easy auditing and reporting on the back end of it all. It allows us to scan at will and/or schedule scans. It also provides real time protection. When an issue is detected the alert system is immediate. Overall, a very solid option for us.
  • Auditing of All Endpoints and Events
  • Real-Time Protection
  • Configuration and Deployment of the Product
  • It evolves as threats do, but keeping up with threats is always a concern.
When it comes to providing reports for supervisors, Microsoft Defender for Endpoint makes it simple to pull the requested information without having to spend a lot of time hunting for what has been requested. Even better than that is that I feel strongly confident in the product to actually protect our environment overall.
September 21, 2023

Good basic security.

Score 7 out of 10
Vetted Review
Verified User
Incentivized
We have a very small number of clients that use this product for their security solution. I have not had a lot of hands-on experience with it, but for the ones that do use it, it seems to work very well for them with very minimal interaction on our part.
  • Does not bog down the system.
  • Easy product to maintain.
  • Clean interface.
  • Could use some more options in the main GUI.
  • Would like options for advanced scanning and protection.
  • A advanced help or FAQ section.
This is a good product for clients that just need simple security software that just works out of the box with no extra configuration needed. The product does a good job of automatically updating itself. It does not bog the systems down that it is deployed on so clients don't even know it is there.
September 20, 2023

Malware Stops Here

Kimberly Hammond | TrustRadius Reviewer
Score 7 out of 10
Vetted Review
Verified User
Incentivized
It's one of the security measures we use with our security stack. Especially protection from Ransomware that's reappearing again.
  • catch malware
  • web and network protection
  • like the ability to set rules
  • not easy to create allowances for certain groups of users
  • It tends to lock a feature out sometimes that it may deem dangerous and it's hard to work around that
It protects the business as a whole with it's network protection which does not allow malicious domains to be navigated to on the network. We've had some questionable websites that were caught because of this fast acting software
Score 10 out of 10
Vetted Review
Verified User
Incentivized
We use Microsoft Defender to ensure essential protection for our computers. It detects persistent threats and can remove them. We also make periodic scans and set real-time protection. The Defender flags the files as potentially harmful, and you can submit the files to Microsoft for review. Also, we use Microsoft Defender offline.
  • Offline protection.
  • Actively scan files and process them in the background.
  • Protection history.
  • Scheduled scans.
  • Performance optimizations.
  • Incorporate behavior analysis.
  • Improve user interface and usability.
Microsoft Defender is well suited for home users who run Microsoft OS, small businesses with limited IT resources, large enterprises that require centralized management, some educational institutions for cost-effective protection, nonprofit and charity organizations offering protection from malware threats, mixed IT environments for easy and effective integration, for users and organizations with basic security needs.
Score 7 out of 10
Vetted Review
Verified User
Incentivized
We use Microsoft Defender for Endpoint as our primary AV and firewall solutions for both our Windows and Mac enviornments as well as our Windows Servers. In addition, the other primary use case the product solves for us is blocking the use of usb devices and external storage devices from being plugged into our endpoints.
  • Blocking USB and External Media
  • Vulnerability Reporting
  • Proactive Alerting
  • Lots of upfront configuration necessary
  • Tons of configuration options
  • Hard to deploy to Macs
I think Microsoft Defender for Endpoint is well suited for a Microsoft Enviornment that has is committed to the WIndows\Office suite of products as it easily integrates and deploys in that type of environment. In a mixed or primarily mac environment it does not have the complete integration that one may want and is hard to deploy through a MAC mdm such as Jamf.
September 19, 2023

Ease to install and manage

Score 9 out of 10
Vetted Review
Verified User
Incentivized
We use Microsoft Defender for Endpoint on our employees laptops and other devices that they will use to VPN into our network with. It adds a extra layer of security for devices when they are on the network but not in our offices. We push regular updates to it and require it for being on the VPN
  • Easy to deploy
  • extra protection for remote devices
I think it's suited very well if you have a lot of remote users and want some extra protection on their laptops or tablets. In my experience, Its easy to deploy and to install during the initial Laptop build or to push out using a remote management tool. I also think its easy to setup the VPN to check to make sure its upto date before they can connect.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
We have it deployed statewide. Specifically for all of our endpoint systems in our department, it's 3,500 endpoints that we're making sure are secure.
  • Doing well is being able to detect issues. It does that!
  • I'm not sure, because we recently had a cyber attack that affected a lot of our endpoints, and we've been trying to recover for the last year and a half on that, and I'm not sure that it's something the Defender for Endpoint would've been able to assist with. So I don't really have an answer for that, honestly.
We use it on an enterprise level for the whole state of Alaska. I guess in that sense that's well suited for that. But at the department level, we don't have a huge amount of control, so I guess it's super suited for enterprise-level security. That's how we use it. I don't really have anything beyond that. My knowledge on it is pretty slim, but I do know that we have it for not department-wide, but enterprise-wide. I know that the lack of control at the department level is a bummer for us. But for Enterprise Solutions, it's great. It works well.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
We deploy it to all the computers that we set up. We use the updating service to update those computers for antivirus and other defense purposes. And we do scans, I think either every other week or at least once a month.
  • It does really good scanning and alerting when some of our employees and clients have not updated it quite yet. We reset that shield to glow bright red so that they update that and scan, at least do a quick scan every once in a while. I mean, sometimes I wish it was once a week, but once every three weeks or so, I think we're okay with it.
  • If I could set it to automatically update every time the computer has woken up from sleep, I would, because a lot of the times when our Microsoft services turn off, we find that they're not actually turning off and stopping all processes and it seems to only update when we completely turn off our system. I want this automatic update. The automatic update should be more frequent essentially.
It's good if our colleagues are already purchasing Microsoft products and have the tier of Microsoft licensing that this is included. I would definitely recommend that they use it, but a lot of my friends do not use Microsoft products or have that tier. They usually use the free tier, something along those lines. But here in our business, we have E five licenses, so it comes free and we love using it. It is well suited to do its scans, keep us updated, and keep us with our compliance goals. Less appropriate? I'm really not sure if it's not included.
Luis Fernandez Jr. 👾 | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Microsoft Defender for Endpoint performs well when using to protect endpoints (PCs, laptops, and servers) from various threats like malware, viruses, and advanced attacks. Scalability is always a challenge in any organization. With Defender for Endpoint we can define the policy and configure setting to match our business needs. Defender for Endpoint has features such as data protection and threat intelligence that bring awareness and risk reduction by analyzing events in our environment.
  • Threat intelligence.
  • Data Protection.
  • Protection against Security Threats.
  • More training and simulation for an end user.
  • More advanced threat-hunting UI overhaul. A lot of the features are nested in multiple menus and side panes.
  • Executive Reports and Summaries of Windows Timeline.
I’m environments that require a variety of policies for different groups of user, Defender for end point performs great. Even for small business Defender for Endpoint can be effective. Obluba few areas where the landscape is at high risk or user count isn’t using to many environments integrated with Windows or cloud is when I would not suggest Defender for Endpoint, but these are few scenarios.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
Microsoft Defender is a fantastic product for endpoint security. We use almost all the features available in this product.
We have enabled it in our Intune. We have configured a profile for on-boarding Windows devices and have enabled all the benefits of Defender. Similarly we have on-boarded android and iOS devices. We have configured a compliance policy for them. We have created app protection policy. We have configured conditional access to block accesses of the devices that exceed your threat level. Also configured the Antivirus and Anti-malware policies. By implementing all these we have made our environment almost secured of external threats and vulnerabilities. This has also helped us to improve our compliance score.
  • It examines and acts quickly to all the vulnerabilities or threats from the external attacks.
  • It detects and blocks all the unsafe application which can cause problems to the system.
  • Its Antivirus feature protects the system from all the harmful viruses.
  • It works wonderfully well for Windows devices but when it comes to MAC devices it is not that supportive as it is for Windows. There is definitely some scope of improvement there.
  • It has limited support for third party tools.
  • Sometimes the user experience can be not that good as their system performance is impacted when the scan is active.
If your organisation has more than 1000 people and is heavily loaded with Windows devices this product can be very useful to manage them. It will protect your devices, laptops. It protects your system from viruses and external attacks. It is very quick in reacting to all the threats and vulnerabilities that are coming from the internet. As a security administrator it will help you to maintain the compliance score healthy by providing robust solution to your security problems. It will also show you which devices are not compliant. It will protect the devices from unsafe applications which are not healthy for the system.

If your organisation has maximum number of MAC devices then honestly I would not recommend this solution for you.
Joe Aldeguer | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
MDE is Microsoft's latest cybersecurity tool which takes a holistic approach to protect my organization from known and zero-day threats. I love the fact that I don't need to stitch together a diverse solution to increase my organization's security posture. I only have to use one login to manage my dashboard. MDE is compatible with all endpoints in my organization. I have macOS, iOS, Windows server, Windows 10, and Ubuntu Linux on-boarded. It is an EDR, XDR that is mapped against the MITRE ATT&CK framework.
  • Compatible with macOS, iOS, Android, Windows Server, Windows 10 and Linux
  • It runs natively on Windows it is not a bolted on solution. Once you have the correct license it is easy enough to light up the application to protect the endpoint
  • Integrated with Microsoft Intune
  • It is designed to detect and remediate adversary tactics from the MITRE knowledge base.
  • Microsoft analyzes billions of signals daily to detect attacks against O365 tenants these same signals are fed into ML to further fine-tune MDE. How many other solutions out there will have access to this vast amount of data to analyze to train their ML?
  • Automated detection and remediation of threats with a graphical timeline view of how the treat got into the device and was stopped
  • It has its own vulnerability scanner to feed data into the dashboard so you can see daily which endpoints need to be patch first based on its value
  • It comes with an advanced hunting tool using the kusto query language to search your tenant for threats
  • It can keep 180 days of log data
  • From one bundled license I can protect Exchange online email, Sharepoint, Microsoft Teams, One Drive, Azure identities, AD, endpoints
  • Web filtering on the macOS it not available yet
  • They recently made it easier to on-board macOS endpoints using Microsoft Intune by deploying it as an app. It used to take a lot of more configuration profiles to set up. For older macOS Sierra using the older extensions it will still require the multiple steps to on-board to MDE
  • They need to integrate Microsoft Cloud app into the new dashboard of MDE
  • Reduce the memory overhead of the mdatp agent running on Linux
Small or large organizations will benefit from using MDE. They need to provide a way to buy MDE as a standalone add-on product not only make it a bundled feature in Microsoft 365 E5. I wish it had the ability to deploy updates to 3rd party apps when the vulnerability scanner discovers a vulnerability. Currently, I have to use a 3rd party tool to address this gap.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
We use Microsoft Defender ATP to get visibility into systems, as well as provide antivirus protection for our Microsoft 365 resources. We currently have it set up for just our IT department and a select few users as we consider transitioning our entire organization away from our current, more traditional Antivirus to something like ATP.
  • Visibility: It's great to be able to see what KBs are missing, etc.
  • Lightweight AV protection built on the already included Windows Defender Application
  • Deployment: We've had some issues deploying, especially outside of the Windows environment.
  • Offboarding: There is currently no way to delete a computer. They disappear over time. We even renamed a computer, and it kept both the old and new name in there. Eventually, the older machines do go away, but there is no manual way to do this at the moment.
Microsoft Defender Advanced Threat Protection is the perfect solution for a company that is completely invested in a Microsoft environment. We have Windows 10 machines joining our Azure Active Directory. We use Exchange Online for emails, and it feels like Defender ATP gives you visibility into each and every corner of our environment. It's super lightweight and fairly easy to deploy (though we had some isolated difficulties), and end users seem to not notice it, which is, in my opinion, a very positive thing.

Where it may not be great is in mixed-OS environments. It requires a bit of determination to get ATP installed on OSX or Linux. While these platforms do get fewer viruses in general, it's good to have the layer of visibility and security for web and browser based threats.
Score 7 out of 10
Vetted Review
Verified User
Incentivized
Microsoft Defender is being used across our organization by all the departments. The major reason why we are using the software is, of course, data protection. In this day and age, when data has become such a valuable asset, one needs to keep their data safe from hackers or rival companies.
  • One of the undeniable strengths of Windows Defender is that it is free. It already comes packaged with Windows. You don't have to install separately or pay extra for the excellent kind of protection it provides.
  • Unlike all the other anti-virus software out there, the service is very light on the system and one doesn't even get to know when a background check is going on in the background. I never had to open the application to run scans. It automatically keeps running in the background and informs if anything fishy is going on in the background.
  • When it comes to the latest threats and malware, it is not the most updated antivirus software in the market. It can always benefit from quick virus definition updates.
  • It is not a complex antivirus solution when it comes to its feature sets. People who are finicky about each and every feature will be a little disappointed with the lack of options/settings available to configure the antivirus.
In my opinion, It is well suited for small start-ups and entrepreneurs who have just started doing business. But when the amount of client data that you hold increases, you should not completely rely on Windows Defender. Another paid antivirus will definitely be recommended. But, I think they have really stepped up their game recently in terms of updating the software and virus definitions.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
We use MS Defender ATP on all of our systems. It uses low resources compared to other AV providers and full integration into Windows OS. You don't experience the breakage that happens when you have a 3rd part AV providers when there are feature roll-up updates and hotfixes issued by Microsoft. Also is MS ATP is competitive compared to 3rd part AV providers.
  • It does not take up a lot of system resources, unlike other 3rd part AV providers.
  • Integrated into the MS product line without having to touch it too much, unlike 3rd part AV providers.
  • Easy to set-up and manage endpoints.
  • It does not break Windows OS like 3rd party AV providers whenever a patch or roll updated is deployed.
  • Detection rates are less than some of the competitors out there.
  • Too many false positives with 3rd part applications.
  • For smaller deployments can get expensive compared to competitors.
MS ATP is great for any organization that wants to protect itself from AV, malware, spyware, and ransomware threats. I can't imagine any organization doing without an AV protection provider. Small deployment can get expensive compared to the competition.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
This is the main threat protection software being used all across the University. It is used to monitor threats/viruses/malware, etc. that occur on users machines. It is pre-configured on all computers that connect to the network. This ensures that users don't really need to worry about installing threat protection software on their individual computers, or worry about configuring settings.

It address the business problem of helping to protect every computer that connects to the network, or that connects to the domain. All policies/settings get pushed down to the clients that are installed on the individual machines. There doesn't need to be user interaction to get this done
  • It is great at proactively monitoring threats across the network. It works seamlessly with the client to monitor individual user computers, and it has a good real-time scanning engine.
  • On the client side, Windows Defender doesn't require a whole lot of system resources to run, nor will it create unnessary slowdowns of a computer, even while scanning for threats
  • We've noticed one issue with the SmartScreen filter settings on the client and trying to install programs. If the Administrator sets the setting to Block on the server side, then this might interfere with some programs trying to get installed on the client side. Microsoft should look into this issue, and maybe offer more sub-settings for the Block option
  • Noticed that Windows Defender will occassionally do a system scan on a client during business hours, even though on the server side, scans are set for the middle of the night. This does not occur on all endpoints, or at all times, but tends to be random
It would be well suited in an environment where most all your endpoints are Windows-based computers, as Windows Defender is already built into the operating system, so there is no client to have to worry about installing. It also will make the management of endpoints easier on the server side, if most all machines are Windows-based.

It might be less of ideal solution if a company/organization were looking for something more robust, or had a lot more features/configuration settings. It also might be less ideal for a company/organization that was looking for a product that didn't have a high detection rate of false positives
Return to navigation