Skip to main content
TrustRadius
Microsoft Defender for Endpoint

Microsoft Defender for Endpoint
Formerly Microsoft Defender ATP

Overview

What is Microsoft Defender for Endpoint?

Microsoft Defender for Endpoint (formerly Microsoft Defender ATP) is a holistic, cloud delivered endpoint security solution that includes risk-based vulnerability management and assessment, attack surface reduction, behavioral based and cloud-powered next generation protection, endpoint detection and response (EDR), automatic investigation…

Read more
Recent Reviews

Secure workstations with MDE

8 out of 10
November 03, 2023
Microsoft Defender for Endpoint offers exceptional threat insight and protection. Its KQL powered Advanced Hunting provides deep analysis. …
Continue reading
Read all reviews

Awards

Products that are considered exceptional by their customers based on a variety of criteria win TrustRadius awards. Learn more about the types of TrustRadius awards to make the best purchase decision. More about TrustRadius Awards

Popular Features

View all 7 features
  • Malware Detection (53)
    8.5
    85%
  • Infection Remediation (52)
    8.2
    82%
  • Anti-Exploit Technology (51)
    8.0
    80%
  • Centralized Management (52)
    7.9
    79%

Reviewer Pros & Cons

View all pros & cons
Return to navigation

Pricing

View all pricing

Academic

$2.50

On Premise
per user/per month

Standalone

$5.20

On Premise
per user/per month

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services
Return to navigation

Product Demos

Microsoft Defender for Endpoint Overview

YouTube
Return to navigation

Features

Endpoint Security

Endpoint security software protects enterprise connected devices from malware and cyber attacks.

8.2
Avg 8.5
Return to navigation

Product Details

What is Microsoft Defender for Endpoint?

Presented as an epicenter for comprehensive endpoint security, Microsoft Defender for Endpoint helps users rapidly stop attacks, scale security resources, and evolve defenses across operating systems and network devices.

Rapidly stops threats: Protects against sophisticated threats such as ransomware and nation-state attacks.

Scales security: Puts time back in the hands of defenders to prioritize risks and elevate the organization's security posture.

Evolves the organization's defenses: Goes beyond endpoint silos and mature the organization's security based on a foundation for extended detection and response (XDR) and Zero Trust.

Microsoft Defender for Endpoint Features

Endpoint Security Features

  • Supported: Anti-Exploit Technology
  • Supported: Endpoint Detection and Response (EDR)
  • Supported: Centralized Management
  • Supported: Infection Remediation
  • Supported: Vulnerability Management
  • Supported: Malware Detection

Microsoft Defender for Endpoint Screenshots

Screenshot of blocked activitiesScreenshot of Detects & respondsScreenshot of discovers vulnerabilityScreenshot of Eliminates blind spotsScreenshot of Risk management

Microsoft Defender for Endpoint Video

Microsoft Defender for Endpoint

Microsoft Defender for Endpoint Competitors

Microsoft Defender for Endpoint Technical Details

Deployment TypesOn-premise
Operating SystemsWindows
Mobile ApplicationNo

Frequently Asked Questions

Microsoft Defender for Endpoint (formerly Microsoft Defender ATP) is a holistic, cloud delivered endpoint security solution that includes risk-based vulnerability management and assessment, attack surface reduction, behavioral based and cloud-powered next generation protection, endpoint detection and response (EDR), automatic investigation and remediation, managed hunting services, rich APIs, and unified security management.

CrowdStrike Falcon, Symantec Endpoint Security, and Sophos Intercept X are common alternatives for Microsoft Defender for Endpoint.

Reviewers rate Endpoint Detection and Response (EDR) and Malware Detection highest, with a score of 8.5.

The most common users of Microsoft Defender for Endpoint are from Enterprises (1,001+ employees).
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(174)

Attribute Ratings

Reviews

(1-25 of 73)
Companies can't remove reviews or game the system. Here's why
Score 8 out of 10
Vetted Review
Verified User
Incentivized
Endpoint Security (6)
80%
8.0
Anti-Exploit Technology
80%
8.0
Endpoint Detection and Response (EDR)
90%
9.0
Centralized Management
80%
8.0
Infection Remediation
80%
8.0
Vulnerability Management
70%
7.0
Malware Detection
80%
8.0
Abdul Ayub | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Endpoint Security (6)
83.33333333333334%
8.3
Anti-Exploit Technology
100%
10.0
Endpoint Detection and Response (EDR)
N/A
N/A
Centralized Management
100%
10.0
Infection Remediation
100%
10.0
Vulnerability Management
100%
10.0
Malware Detection
100%
10.0
Conrad Nyamache | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
Incentivized
Endpoint Security (6)
96.66666666666666%
9.7
Anti-Exploit Technology
80%
8.0
Endpoint Detection and Response (EDR)
100%
10.0
Centralized Management
100%
10.0
Infection Remediation
100%
10.0
Vulnerability Management
100%
10.0
Malware Detection
100%
10.0
Score 7 out of 10
Vetted Review
Verified User
Incentivized
Endpoint Security (6)
80%
8.0
Anti-Exploit Technology
80%
8.0
Endpoint Detection and Response (EDR)
90%
9.0
Centralized Management
90%
9.0
Infection Remediation
60%
6.0
Vulnerability Management
80%
8.0
Malware Detection
80%
8.0
Score 8 out of 10
Vetted Review
Verified User
Incentivized
Endpoint Security (6)
78.33333333333333%
7.8
Anti-Exploit Technology
70%
7.0
Endpoint Detection and Response (EDR)
70%
7.0
Centralized Management
80%
8.0
Infection Remediation
80%
8.0
Vulnerability Management
80%
8.0
Malware Detection
90%
9.0
November 27, 2023

Microsoft Defender Review

Score 8 out of 10
Vetted Review
Reseller
Endpoint Security (6)
63.33333333333333%
6.3
Anti-Exploit Technology
80%
8.0
Endpoint Detection and Response (EDR)
50%
5.0
Centralized Management
80%
8.0
Infection Remediation
60%
6.0
Vulnerability Management
60%
6.0
Malware Detection
50%
5.0
Yash Mudaliar | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
Incentivized
Endpoint Security (6)
80%
8.0
Anti-Exploit Technology
80%
8.0
Endpoint Detection and Response (EDR)
90%
9.0
Centralized Management
70%
7.0
Infection Remediation
80%
8.0
Vulnerability Management
80%
8.0
Malware Detection
80%
8.0
Score 7 out of 10
Vetted Review
Verified User
Incentivized
Endpoint Security (6)
70%
7.0
Anti-Exploit Technology
70%
7.0
Endpoint Detection and Response (EDR)
70%
7.0
Centralized Management
70%
7.0
Infection Remediation
70%
7.0
Vulnerability Management
70%
7.0
Malware Detection
70%
7.0
Score 8 out of 10
Vetted Review
Verified User
Incentivized
Endpoint Security (6)
78.33333333333333%
7.8
Anti-Exploit Technology
60%
6.0
Endpoint Detection and Response (EDR)
80%
8.0
Centralized Management
80%
8.0
Infection Remediation
80%
8.0
Vulnerability Management
80%
8.0
Malware Detection
90%
9.0
Score 8 out of 10
Vetted Review
Verified User
Incentivized
Endpoint Security (6)
78.33333333333333%
7.8
Anti-Exploit Technology
70%
7.0
Endpoint Detection and Response (EDR)
80%
8.0
Centralized Management
80%
8.0
Infection Remediation
70%
7.0
Vulnerability Management
80%
8.0
Malware Detection
90%
9.0
Score 8 out of 10
Vetted Review
Verified User
Endpoint Security (6)
83.33333333333334%
8.3
Anti-Exploit Technology
80%
8.0
Endpoint Detection and Response (EDR)
80%
8.0
Centralized Management
80%
8.0
Infection Remediation
80%
8.0
Vulnerability Management
90%
9.0
Malware Detection
90%
9.0
Score 8 out of 10
Vetted Review
Verified User
Endpoint Security (6)
78.33333333333333%
7.8
Anti-Exploit Technology
90%
9.0
Endpoint Detection and Response (EDR)
90%
9.0
Centralized Management
50%
5.0
Infection Remediation
70%
7.0
Vulnerability Management
90%
9.0
Malware Detection
80%
8.0
Score 9 out of 10
Vetted Review
Verified User
Incentivized
Endpoint Security (5)
88%
8.8
Anti-Exploit Technology
90%
9.0
Endpoint Detection and Response (EDR)
80%
8.0
Centralized Management
100%
10.0
Vulnerability Management
80%
8.0
Malware Detection
90%
9.0
Score 8 out of 10
Vetted Review
Verified User
Incentivized
Endpoint Security (6)
85%
8.5
Anti-Exploit Technology
80%
8.0
Endpoint Detection and Response (EDR)
90%
9.0
Centralized Management
70%
7.0
Infection Remediation
90%
9.0
Vulnerability Management
90%
9.0
Malware Detection
90%
9.0
Martin Venter | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Endpoint Security (6)
98.33333333333334%
9.8
Anti-Exploit Technology
90%
9.0
Endpoint Detection and Response (EDR)
100%
10.0
Centralized Management
100%
10.0
Infection Remediation
100%
10.0
Vulnerability Management
100%
10.0
Malware Detection
100%
10.0
Score 9 out of 10
Vetted Review
Verified User
Incentivized
Endpoint Security (6)
93.33333333333334%
9.3
Anti-Exploit Technology
90%
9.0
Endpoint Detection and Response (EDR)
90%
9.0
Centralized Management
90%
9.0
Infection Remediation
100%
10.0
Vulnerability Management
90%
9.0
Malware Detection
100%
10.0
Score 9 out of 10
Vetted Review
Verified User
Incentivized
Endpoint Security (6)
90%
9.0
Anti-Exploit Technology
100%
10.0
Endpoint Detection and Response (EDR)
90%
9.0
Centralized Management
70%
7.0
Infection Remediation
90%
9.0
Vulnerability Management
100%
10.0
Malware Detection
90%
9.0
Score 8 out of 10
Vetted Review
Verified User
Incentivized
Endpoint Security (6)
68.33333333333333%
6.8
Anti-Exploit Technology
60%
6.0
Endpoint Detection and Response (EDR)
70%
7.0
Centralized Management
60%
6.0
Infection Remediation
70%
7.0
Vulnerability Management
70%
7.0
Malware Detection
80%
8.0
Score 5 out of 10
Vetted Review
Verified User
Incentivized
Endpoint Security (6)
85%
8.5
Anti-Exploit Technology
70%
7.0
Endpoint Detection and Response (EDR)
100%
10.0
Centralized Management
70%
7.0
Infection Remediation
90%
9.0
Vulnerability Management
90%
9.0
Malware Detection
90%
9.0
Bhuwan Chandra | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
Incentivized
Endpoint Security (6)
76.66666666666667%
7.7
Anti-Exploit Technology
70%
7.0
Endpoint Detection and Response (EDR)
80%
8.0
Centralized Management
50%
5.0
Infection Remediation
80%
8.0
Vulnerability Management
90%
9.0
Malware Detection
90%
9.0
Score 9 out of 10
Vetted Review
Verified User
Incentivized
Endpoint Security (6)
90%
9.0
Anti-Exploit Technology
90%
9.0
Endpoint Detection and Response (EDR)
90%
9.0
Centralized Management
90%
9.0
Infection Remediation
90%
9.0
Vulnerability Management
90%
9.0
Malware Detection
90%
9.0
Score 9 out of 10
Vetted Review
Verified User
Incentivized
Endpoint Security (6)
91.66666666666666%
9.2
Anti-Exploit Technology
90%
9.0
Endpoint Detection and Response (EDR)
90%
9.0
Centralized Management
100%
10.0
Infection Remediation
90%
9.0
Vulnerability Management
90%
9.0
Malware Detection
90%
9.0
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Endpoint Security (6)
100%
10.0
Anti-Exploit Technology
100%
10.0
Endpoint Detection and Response (EDR)
100%
10.0
Centralized Management
100%
10.0
Infection Remediation
100%
10.0
Vulnerability Management
100%
10.0
Malware Detection
100%
10.0
Score 6 out of 10
Vetted Review
ResellerIncentivized
Endpoint Security (6)
51.66666666666667%
5.2
Anti-Exploit Technology
50%
5.0
Endpoint Detection and Response (EDR)
50%
5.0
Centralized Management
60%
6.0
Infection Remediation
50%
5.0
Vulnerability Management
50%
5.0
Malware Detection
50%
5.0
Return to navigation