Protective Defensive Defender
September 21, 2023
Protective Defensive Defender
Score 8 out of 10
Vetted Review
Verified User
Overall Satisfaction with Microsoft Defender for Endpoint
with the current trend of the remote working, multiple device access along with the security levels and external threats. It have become necessity to provide the security to devices at various access levels within the organization. With the built in vulnerability management and risk management approach, the assessment of endpoint vulnerabilities are enhanced to access security while taking the remote access of machines. While accessing the production machines present in the office, the credentials are not secure enough to create a safe workspace
along with the external threats , Resourceful finding the vulnerabilities and anomalous activity.
along with the external threats , Resourceful finding the vulnerabilities and anomalous activity.
- Embedded security sensors are there with no 3rd party software involvement.
- vulnerabilities detection speed is good.
- secured access to the remote access machines
- detailed information regarding possible threats
- third party apps are limited with limited access.
- challenging configuration of devices with affecting system performance
- initialization of the new access devices may be time consuming
- secure access to multiple machines instances reducing external threats
- ease in work from remote locations
- showing detail regarding the possible vulnerabilities, that may cause harm
- easily manageable
- Scalability
- Ease of Use
In our project multiple machines (endpoints) are accessed by the Agents (users) at a single time. Thorough the web-based access, the credentials are not secured enough to take remote of the endpoints, the possibility of external threat increased with browser access. Therefore after the initial setup of the access devices, the device vulnerabilities decreased creating better workspace and scalability utilized with multiple instances creating the safe environment.
For the secured remote access of the multiple production machines through browser, the Microsoft Defender is utilized at the office machines (endpoints). With the advanced vulnerability management and auto threat detection, it can detect weather the access is secured and authorized or not. It verifies users, devices and all applications and acts as a secure device management tool.
Depending upon the project size and number of production machines it depends. Currently depending upon the bots (3-5), production machines are managed with concurrency. All the machines work on the Widows platform and these machines are accessed by the 3-4 agents.
It manages the endpoint weaknesses and possible vulnerabilities the device is exposed to within the environment.
It manages the endpoint weaknesses and possible vulnerabilities the device is exposed to within the environment.
Do you think Microsoft Defender for Endpoint delivers good value for the price?
Yes
Are you happy with Microsoft Defender for Endpoint's feature set?
Yes
Did Microsoft Defender for Endpoint live up to sales and marketing promises?
I wasn't involved with the selection/purchase process
Did implementation of Microsoft Defender for Endpoint go as expected?
I wasn't involved with the implementation phase
Would you buy Microsoft Defender for Endpoint again?
Yes