Microsoft Defender XDR Unified Security automated response and ROI in action.
Overall Satisfaction with Microsoft Defender XDR
We use Microsoft Defender XDR to monitor for cyber threats, increase our response time to cyber events and tie into Microsoft Purview for insider risk management and data loss prevention. We can investigate and remediate threats from a single portal and Microsoft Defender XDR integrates perfectly with Purrview for insider risk and adaptive DLP policies.
Pros
- Anti-phishing workflows
- Threat and vulnerability scanning and detection
- Insider risk detection and policy enforcement
Cons
- The security portal is busy and can be difficult to navigate
- Licensing is spread across multiple plans.
- Struggles with non-Microsoft ecosystems like Linux or other SIEM tools besides Sentinel
- Automated remediation reduced manual workloads and accelerated our response time by 80%
- Lowered our breach likelihood by 20%
- Lowered downtime by 50%
Before implementing Microsoft Defender XDR, we relied on multiple point solutions for endpoints, email, identity and cloud apps. These tools were isolated, creating blind spots and slowing investigations. We are also overwhelmed by high volumes of alerts, many of which were false positives. We also lack a dedicated SOC team to manage advanced detection tools.
Now Microsoft Defender XDR consolidates all signals into a single portal, simplifying investigations. Alerts are full of user details, device info and severity scores, reducing fatigue and enabling prioritization.
Yes, automated response is actively used in my evnvironment. Adaptive protection and automated remediation workflows are enabled, integrating insider risk signals to Microsoft Defender XDR. This enables faster response times. It also reduces our security teams burden with automated playbooks to handle repetitive task like quarantining files and disabling accounts. Improved risk management with Purview.
We currently connecting Microsoft Defender XDR data to Microsoft Sentinel. Integration of Sentinel and Microsoft Defender for XDR is largely straight forward. Basically enable the Microsoft Defender XDR connector in Sentinel. Assign the correct roles and then configure the ingestion of incidents, alerts and advanced hunting date from Microsoft Defender XDR into Sentinel.
Yes
Microsoft Defender XDR is deeply integrated with Microsoft 365 services, offering a single pane of glass for endpoints, email, identity and cloud apps. The competitors require additional connectors for Microsoft workloads. Microsoft Defender XDR is highly cost-effective, especially since we are already utilizing E5 licensing. Competitors require a separate subscription, increasing total cost of ownership.
Do you think Microsoft Defender XDR delivers good value for the price?
Yes
Are you happy with Microsoft Defender XDR's feature set?
Yes
Did Microsoft Defender XDR live up to sales and marketing promises?
Yes
Did implementation of Microsoft Defender XDR go as expected?
Yes
Would you buy Microsoft Defender XDR again?
Yes


Comments
Please log in to join the conversation