Microsoft Defender XDR
February 06, 2024

Microsoft Defender XDR

Anonymous | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User

Overall Satisfaction with Microsoft Defender XDR

Microsoft Defender XDR is mainly responsible for the detection and handling of Phishing related emails. Microsoft Defender XDR is also responsible for the detection of anomalous user logins. We basically use this tool for the monitoring of user activities. It is also useful in identifying registered devices for a user and is a big help during our investigations.
  • Phishing email detection
  • Detection of anomalous login activities
  • Asset inventory
  • Easy deployment of policies
  • Although it does detect phishing emails, there are still some flaws in the detection. Some malicious emails are getting delivered to a user’s inbox and some are getting quarantined. In my experience, there are som inconsistencies but overall it is a great tool.
  • Microsoft Defender XDR has been a great help when it comes to preventing targeted phishing in our organization.
Visibility. Everything just comes to that. We all know you can’t protect what you don’t know.
Currently, we are not making use of this functionality as we are still on the development stages in using this.
Possibly in the future but for now we are still trying things that would work for us the best.
As far as I know yes we were able to connect Microsoft Defender XDR on our SIEM platform.

Do you think Microsoft Defender XDR delivers good value for the price?

Yes

Are you happy with Microsoft Defender XDR's feature set?

Yes

Did Microsoft Defender XDR live up to sales and marketing promises?

I wasn't involved with the selection/purchase process

Did implementation of Microsoft Defender XDR go as expected?

I wasn't involved with the implementation phase

Would you buy Microsoft Defender XDR again?

Yes

If your company is mostly runs on Windows, I definitely recommend using Microsoft Defender XDR. It allows you to have an overall visibility in your network which allows your cybersecurity team respond to incidents in a timely manner. Personally, this is a great layer of security you can add as part of the security in-depth structure.