Protective Defensive Defender
September 21, 2023

Protective Defensive Defender

Anonymous | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User

Overall Satisfaction with Microsoft Defender for Endpoint

with the current trend of the remote working, multiple device access along with the security levels and external threats. It have become necessity to provide the security to devices at various access levels within the organization. With the built in vulnerability management and risk management approach, the assessment of endpoint vulnerabilities are enhanced to access security while taking the remote access of machines. While accessing the production machines present in the office, the credentials are not secure enough to create a safe workspace
along with the external threats , Resourceful finding the vulnerabilities and anomalous activity.
  • Embedded security sensors are there with no 3rd party software involvement.
  • vulnerabilities detection speed is good.
  • secured access to the remote access machines
  • detailed information regarding possible threats
  • third party apps are limited with limited access.
  • challenging configuration of devices with affecting system performance
  • initialization of the new access devices may be time consuming
  • secure access to multiple machines instances reducing external threats
  • ease in work from remote locations
  • showing detail regarding the possible vulnerabilities, that may cause harm
  • easily manageable
  • Scalability
  • Ease of Use
In our project multiple machines (endpoints) are accessed by the Agents (users) at a single time. Thorough the web-based access, the credentials are not secured enough to take remote of the endpoints, the possibility of external threat increased with browser access. Therefore after the initial setup of the access devices, the device vulnerabilities decreased creating better workspace and scalability utilized with multiple instances creating the safe environment.
For the secured remote access of the multiple production machines through browser, the Microsoft Defender is utilized at the office machines (endpoints). With the advanced vulnerability management and auto threat detection, it can detect weather the access is secured and authorized or not. It verifies users, devices and all applications and acts as a secure device management tool.
Depending upon the project size and number of production machines it depends. Currently depending upon the bots (3-5), production machines are managed with concurrency. All the machines work on the Widows platform and these machines are accessed by the 3-4 agents.
It manages the endpoint weaknesses and possible vulnerabilities the device is exposed to within the environment.

Do you think Microsoft Defender for Endpoint delivers good value for the price?

Yes

Are you happy with Microsoft Defender for Endpoint's feature set?

Yes

Did Microsoft Defender for Endpoint live up to sales and marketing promises?

I wasn't involved with the selection/purchase process

Did implementation of Microsoft Defender for Endpoint go as expected?

I wasn't involved with the implementation phase

Would you buy Microsoft Defender for Endpoint again?

Yes

As the remote working/use of multiple machines have become common, along with the ease of working , the vulnerability have also drastically increased as no one is really sure that the credentials (single step authentication) are safe. With the Automated remediation of threats and detection response the secure access of the machines are improved as we take multiple production machines access at a single time. Showing detailed information about the threat, user, device- reduces the time consumption

Microsoft Defender for Endpoint Feature Ratings

Anti-Exploit Technology
8
Endpoint Detection and Response (EDR)
9
Centralized Management
8
Infection Remediation
9
Vulnerability Management
10
Malware Detection
10