Microsoft Defender holds up to the sales pitch and more
November 03, 2021

Microsoft Defender holds up to the sales pitch and more

Anonymous | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User

Overall Satisfaction with Microsoft Defender for Endpoint (formerly Microsoft Defender ATP)

We use it organization-wide. Defender has addressed malware, phishing, and viruses (trojans). This has significantly decreased our issues and potential exposure.
  • Great dashboard for the techs on the end of support
  • Provides good notifications for the user
  • Does a great job quarantining questionable emails that may have suspicious links.
  • Stop changing the product name - creates confusion at times
  • Able to identify potential issues with files and attachments
  • Provides details on the back end so tech staff can determine if it is a real threat, especially if someone decides to share the suspicious file
  • Notifications are very clear
  • The product has remediated risks
  • Raised confidence within upper management after dealing with a breach prior to moving to Defender
  • The amount of false positives are very low so it becomes credible
Very reliable with accuracy
Does not become a resource hog

Do you think Microsoft Defender for Endpoint delivers good value for the price?

Yes

Are you happy with Microsoft Defender for Endpoint's feature set?

Yes

Did Microsoft Defender for Endpoint live up to sales and marketing promises?

Yes

Did implementation of Microsoft Defender for Endpoint go as expected?

No

Would you buy Microsoft Defender for Endpoint again?

Yes

Microsoft Endpoint Manager (Microsoft Intune + SCCM), Microsoft 365 (formerly Office 365), Adobe Acrobat Reader DC
[Microsoft Defender is a] great product for standard office users. It does not become a resource hog, yet does the job well.

Microsoft Defender for Endpoint Feature Ratings

Anti-Exploit Technology
9
Endpoint Detection and Response (EDR)
10
Centralized Management
10
Hybrid Deployment Support
Not Rated
Infection Remediation
9
Vulnerability Management
10
Malware Detection
10