0% found this document useful (0 votes)
22 views20 pages

Microsoft Defender For Endpoint - Architecture, Features & Plans

Uploaded by

jajamsrinu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views20 pages

Microsoft Defender For Endpoint - Architecture, Features & Plans

Uploaded by

jajamsrinu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 20

7/7/24, 4:52 PM Microsoft Defender for Endpoint: Architecture, Features & Plans

BlueVoyant
MICROSOFT SECURITY

Microsoft Defender for Endpoint:


Architecture, Features, and Plans

ON THIS PAGE

Microsoft Defender for Endpoint Architecture

Microsoft Defender for Endpoint Features

What Are Plan 1 and Plan 2?

Best Practices for Addressing False Positives and Negatives in Defender for
Endpoint

What is Microsoft Defender for


Endpoint (formerly Microsoft
Defender Advanced Threat
Protection)?
Microsoft Defender for Endpoint is an enterprise-grade Microsoft
security platform for preventing, detecting, investigating, and
responding to advanced threats on enterprise networks. It is built
into Windows 10 and various Microsoft Azure services.

Here are key features of Defender for Endpoint:

• Endpoint behavioral sensors—built into Windows 10, these


sensors gather and process behavioral signals from the operating
system. This data is sent to a cloud-based, private instance of
Microsoft Defender for Endpoint.

https://www.bluevoyant.com/knowledge-center/microsoft-defender-for-endpoint-architecture-features-and-plans 1/20
7/7/24, 4:52 PM Microsoft Defender for Endpoint: Architecture, Features & Plans

• Cloud security analytics—the solution gathers information from


Microsoft optics across the ecosystem, including online assets
and enterprise cloud products like Office 365. It employs big-
data and device learning to translate these behavioral signals into
detections, insights, and recommended responses to threats.

• Threat intelligence—third-party partners and Microsoft hunters


and security teams contribute threat intelligence to Defender for
Endpoint. The solution uses the information to identify specific
attacker techniques, procedures, and tools. It creates alerts when
observing these indicators of attack in collected sensor data.

Microsoft Defender for Endpoint


Architecture

Key Components
Microsoft Defender for Endpoint includes the following key
components:

• Admin portal—allows you to monitor endpoints, identify security


incidents and respond to them.

• Attack Surface Reduction (ASR)—analyzes attack surfaces and


enforces rules that can reduce the attack surface on endpoints.

• Endpoint Detection and Response (EDR)—helps you detect


attacks happening in real time and respond to them directly on
endpoint devices.

• Behavioral blocking and containment—helps identify threats


based on process behaviors on endpoints, even when attacks are
already in progress.

• Automated investigation and response—uses multiple


inspection and analysis methods to prioritize alerts and execute
automated responses.

https://www.bluevoyant.com/knowledge-center/microsoft-defender-for-endpoint-architecture-features-and-plans 2/20
7/7/24, 4:52 PM Microsoft Defender for Endpoint: Architecture, Features & Plans

• Advanced threat hunting—lets you use a query-based tool to


explore the past month of data, proactively looking for threat
indicators and threat actors in the environment.

• Threat analytics—reports from Microsoft security experts


covering recent high-impact threats.

Onboarding and Setup


The following diagram illustrates how you start using Microsoft
Defender for Endpoint in your organization.

Image Source: Microsoft

https://www.bluevoyant.com/knowledge-center/microsoft-defender-for-endpoint-architecture-features-and-plans 3/20
7/7/24, 4:52 PM Microsoft Defender for Endpoint: Architecture, Features & Plans

The diagram shows the process for onboarding endpoint devices so


they can be protected by Defender for Endpoint:

1. Onboard devices through Microsoft Intune, System Center


Configuration Manager, scripts, or other supported management
tools.

2. Devices start sending signals to Microsoft Defender for


Endpoint.

3. Managed devices join or enroll in Azure Active Directory (Azure


AD).

4. Windows devices deployed on-premises, and enrolled in


Windows Active Directory, are synchronized using Azure AD
Connect.

5. Once the process is complete you can view Microsoft Defender


for Endpoint alerts, responses, and other data in Microsoft 365
Defender.

Related content: Read our guide to Microsoft 365 Defender

Microsoft Defender for Endpoint


Features
Please note that Microsoft Defender for Endpoint has been split into
two editions—Plan 1 and Plan 2. Plan 2 contains all the features
below, while Plan 1 has only some of them. Learn more below.

Threat and Vulnerability Management


This feature helps you identify vulnerabilities and misconfigurations
in endpoint devices in real time, without needing to deploy special
agents or perform vulnerability scans.

How it works
https://www.bluevoyant.com/knowledge-center/microsoft-defender-for-endpoint-architecture-features-and-plans 4/20
7/7/24, 4:52 PM Microsoft Defender for Endpoint: Architecture, Features & Plans

Threat and vulnerability management uses sensors on endpoints to


detect vulnerabilities. It can prioritize vulnerabilities based on an
analysis of all detections in your organization, whether endpoints
contain sensitive data or not, and the threat landscape.

This capability is fully cloud-based, integrates with the rest of the


endpoint security stack (Defender for Office 365, Defender for
Identity, and Defender for Cloud Apps). It leverages the Microsoft
Intelligent Security Graph and application analytics knowledge
base, which contains trillions of security data points from Microsoft
software deployed worldwide.

Benefits

Threat and vulnerability management can help reduce your


organization’s risk as a result of security vulnerabilities. By ensuring
endpoints are hardened, you improve resilience to cyber attacks.

Attack Surface Reduction (ASR)


ASR can help you automatically reduce attack surfaces on endpoint
devices by blocking certain capabilities at the operating system
level and controlling applications and web access.

How it works

ASR is based on rules, which can control software behaviors like


launching executables and scripts, including scripts that are
obfuscated or otherwise suspicious, and software performing
actions that are not typical for normal work activity.

Because these rules can have an impact on users and might block
legitimate software functionality, it is possible to run ASR in audit
mode, to identify what specific rules would block, and also in a
special “warn mode,” which warns users that the content they are
trying to view is blocked, but allows them to unblock it for 24 hours.

Benefits

ASR rules can help remove opportunities for attackers to


compromise endpoint devices or networks. By applying as many
https://www.bluevoyant.com/knowledge-center/microsoft-defender-for-endpoint-architecture-features-and-plans 5/20
7/7/24, 4:52 PM Microsoft Defender for Endpoint: Architecture, Features & Plans

rules as possible, you reduce your attack surface and eliminate


many possible attacks against your endpoints.

Next-generation Protection
This feature includes the basic protection offered by Microsoft
Defender Antivirus, and additional protection against advanced
threats.

How it works

Next-generation protection includes the following advanced


capabilities, in addition to legacy antivirus:

• Behavioral and heuristic antivirus protection—always-on


scanning and monitoring of file and process behavior, identifying
suspicious activity using predetermined heuristics, or by
comparison applications to a normal behavioral baseline. This
capability can block applications that appear to be unsafe, even if
they are not detected as malware.

• Cloud-delivered protection—fast updates of threat intelligence


data to ensure endpoints are protected against the latest threats.

• Protection and product updates—pushes updates of Microsoft


Defender Antivirus to endpoints, even if it is working in passive
mode. Supports distribution of updates through Windows Server
Update Service (WSUS), Microsoft Endpoint Configuration
Manager, or the regular methods you use to deploy Microsoft
updates to endpoints.

Benefits

Next-generation protection is able to detect and block advanced


and unknown threats, protecting against malware and exploits that
cannot be detected by legacy antivirus.

Endpoint Detection and Response (EDR)


https://www.bluevoyant.com/knowledge-center/microsoft-defender-for-endpoint-architecture-features-and-plans 6/20
7/7/24, 4:52 PM Microsoft Defender for Endpoint: Architecture, Features & Plans

This feature enables security teams to detect attacks in real time, as


they occur, and respond to them via direct access to the endpoint.

How it works

EDR alerts security analysts about suspicious events on endpoints,


allows them to prioritize alerts and quickly investigate the full scope
of the incident, and take immediate action to mitigate threats.

The process starts from an alert created in the EDR system. EDR
aggregates alerts using the same attack techniques, or associated
with the same attacker, making it easy for analysts to respond to
threats occurring across multiple endpoints. It collects behavioral
data such as process activity, network activity, kernel and memory
usage, login activities, registry changes, and file changes. All data is
stored for six months, enabling deep investigation of attacks to see
their origins.

Benefits

EDR lets you adopt an “assume breach” mentality, being ready for
breaches on endpoint devices, rapidly investigating them, and
taking action to contain and eradicate threats before they can do
damage.

Automated Investigation and Remediation (AIR)


This feature lets you reduce alert volumes, helping security teams
focusing on the most important alerts and identifying real security
incidents.

How it works

AIR uses multiple inspection algorithms which reduce alert volume,


and suggest automated remediation actions for high priority alerts.
These remediation actions appear in the Action Center, allowing
analysts to view pending actions, approve or reject them, and also
undo actions if necessary.

Benefits

https://www.bluevoyant.com/knowledge-center/microsoft-defender-for-endpoint-architecture-features-and-plans 7/20
7/7/24, 4:52 PM Microsoft Defender for Endpoint: Architecture, Features & Plans

AIR reduces alert fatigue and helps your organization’s security


analysts respond to more critical endpoint incidents in less time.

Microsoft Secure Score for Devices


This feature provides an automated assessment of an entire
enterprise network, helping you identify systems that are
unprotected and take action to improve security.

How it works

Secure Score for Devices identifies unprotected systems and


automatically performs actions to improve their security posture.
The results of security assessments can be viewed in the Microsoft
365 Defender portal. Secure Score for Devices shows a single score
for the entire network, indicating how many endpoint devices are
secure against cyber attacks.

This feature is able to scan and detect the security posture of


applications, operating systems, networks, user accounts, and
specific security controls.

Benefits

Secure Score for Devices provides a holistic view of endpoint


security across an enterprise network, allowing you to perform rapid
assessments, plan and prioritize security remediation efforts.

Microsoft Threat Experts


This is Microsoft’s threat hunting service, provided by human
security experts. Microsoft experts provide expert-level monitoring
and proactive hunting of threats in your environment. The feature
provides targeted attack notifications for threats discovered by
Microsoft experts.

Benefits

Microsoft Threat Experts complements your in-house security team


with Microsoft expertise, who use advanced techniques to identify

https://www.bluevoyant.com/knowledge-center/microsoft-defender-for-endpoint-architecture-features-and-plans 8/20
7/7/24, 4:52 PM Microsoft Defender for Endpoint: Architecture, Features & Plans

sophisticated and evasive threats in your environment, which


otherwise could have been missed.

What Are Plan 1 and Plan 2?


Microsoft Defender for Endpoint was originally released as a
complete endpoint detection and response (EDR) and advanced
threat protection solution. In November 2021, Microsoft released a
limited edition of the product, which provides device security for
Windows, MacOS, Android, and iOS devices at a lower price for
organizations with more limited budgets and security requirements.

The original and new versions of the Microsoft Defender for


Endpoint were renamed as follows:

• Defender for Endpoint Plan 1—this is the new name for the
limited edition of the product intended for smaller businesses

• Defender for Endpoint Plan 2—this is the new name for the full
version of the product, which was previously named simply
“Microsoft Defender for Endpoint”

The following diagram can help you understand the differences


between Plan 1 and Plan 2. The green boxes below are the features
only available in Plan 1. Plan 2 includes all the features, including
the ones colored in gray.

https://www.bluevoyant.com/knowledge-center/microsoft-defender-for-endpoint-architecture-features-and-plans 9/20
7/7/24, 4:52 PM Microsoft Defender for Endpoint: Architecture, Features & Plans

Image Source: Microsoft

Best Practices for Addressing False


Positives and Negatives in
Defender for Endpoint
False positives are a common problem in endpoint protection. A
false positive is an alert that indicates malicious activity, although in
reality it is not a threat. The opposite problem is a false negative - a
real threat that was not detected by the solution. Microsoft 365
Defender provides several capabilities that can help you deal with
and minimize false positives and negatives.

Review and Classify Alerts


Defender for endpoint provides two simple tools that can help
address false positives:

• Suppressing alerts - if you see an alert that does not represent a


threat, or may be a true positive but is unimportant, you can
suppress it to stop getting alerts for that entity.

https://www.bluevoyant.com/knowledge-center/microsoft-defender-for-endpoint-architecture-features-and-plans 10/20
7/7/24, 4:52 PM Microsoft Defender for Endpoint: Architecture, Features & Plans

• Classifying alerts - in addition to suppressing alerts, you should


also classify the alert as “true positive”, “benign true positive”, and
“false negative” to help the Defender of Endpoint engine learn to
identify similar false positives.

Review Remediation Actions


Defender for Endpoint performs remediation actions automatically
when it detects security issues on endpoints. Some actions are
triggered manually by your security team via Live Response, which
provides direct access to the endpoint to mitigate threats.

When reviewing alerts, remember to look at remediation actions as


well. If the alert is false negative and remediation actions were
taken, you can usually undo them. For example, you can restore
quarantined files. Keep in mind that Live Response actions cannot
be undone.

Review or Define Exclusions


Microsoft Defender for Endpoint lets you define exclusions, which
specify that in certain cases a remediation action should not be
performed. After discovering false positives and unwanted
remediations, you can define exceptions to prefer the solution from
performing these actions again. For example, you can define
specific files that won’t be quarantined.

The exclusion process involves two elements:

• Exclusions for Microsoft Defender Antivirus - these exclusions


should be defined sparingly and should only include files, folders,
and processes that are resulting in false positive.

• Indicators for Microsoft Defender for Endpoint - these are


indicators of compromise (IoC) that trigger alerts and
remediations. You can specify files, IP addresses, or URLs that
should be omitted from scans. Add “allow” indicators to exclude
entities from next-generation protection.

https://www.bluevoyant.com/knowledge-center/microsoft-defender-for-endpoint-architecture-features-and-plans 11/20
7/7/24, 4:52 PM Microsoft Defender for Endpoint: Architecture, Features & Plans

Submit Files for Analysis


If you are not sure if a file is truly malicious or not, you can submit it
to Microsoft for investigation. You can track your submissions and
receive a response for each submission. When you submit a file, it is
automatically scanned and the system provides immediate
information - for example, if the file was previously submitted, you
see the previous resolution. If not, you will receive a response from a
human analyst at Microsoft.

Review and Adjust Your Threat Protection


Settings
You can fine tune your threat protection options to reduce the
number of false positives. Consider adjusting the following options
to meet your organization’s requirements:

• Cloud-delivered protection - by default this is not enabled. If


you set it to High, High+, or Zero Tolerance, you will be alerted
about more issues but will also experience more false positives.

• Remediation for potentially unwanted applications (PUA) -


PUA is software that is not malware, but can cause unwanted
effects on endpoints such as slowdown, ads, or installation of
other programs. Consider running PUA protection in audit mode
initially, or test it on a small group of endpoints, to identify false
positives.

• Automated investigation and remediation (AIR) - this feature


examines alerts and provides a verdict for each piece of evidence
- Malicious, Suspicious, or No Threats. Depending on your
settings, it can also perform automated remediation. Tune AIR
settings to the level of sensitivity and automation your
organization needs.

https://www.bluevoyant.com/knowledge-center/microsoft-defender-for-endpoint-architecture-features-and-plans 12/20
7/7/24, 4:52 PM Microsoft Defender for Endpoint: Architecture, Features & Plans

MANAGED DETECTION & RESPONSE

Microsoft Security with BlueVoyant


Deploy the Microsoft security tools you already have and eliminate the headaches and cost
of disparate security products.

Learn more about MDR for Microsoft

RELATED CONTENT

Microsoft Defender for Identity: Architecture and Key Capabilities

Microsoft 365 Defender

Microsoft Defender for Office 365: Workflow, Features, and Plans

What Is Microsoft 365 E5 and Top 10 Security Features


View more

Subscribe to our blog

Stay informed with the latest news by receiving our monthly blog
email.

https://www.bluevoyant.com/knowledge-center/microsoft-defender-for-endpoint-architecture-features-and-plans 13/20
7/7/24, 4:52 PM Microsoft Defender for Endpoint: Architecture, Features & Plans

Company Email *

Submit

Read BlueVoyant's Privacy Policy.

Additional Readings

MICROSOFT SECURITY

Microsoft Defender for Identity: Architecture and Key Capabilities

https://www.bluevoyant.com/knowledge-center/microsoft-defender-for-endpoint-architecture-features-and-plans 14/20
7/7/24, 4:52 PM Microsoft Defender for Endpoint: Architecture, Features & Plans

MICROSOFT SECURITY

Microsoft 365 Defender

MICROSOFT SECURITY

Microsoft Defender for Office 365: Workflow, Features, and Plans

https://www.bluevoyant.com/knowledge-center/microsoft-defender-for-endpoint-architecture-features-and-plans 15/20
7/7/24, 4:52 PM Microsoft Defender for Endpoint: Architecture, Features & Plans

MICROSOFT SECURITY

What Is Microsoft 365 E5 and Top 10 Security Features

MICROSOFT SECURITY

Microsoft Security: Architecture, Tools, and Technologies

https://www.bluevoyant.com/knowledge-center/microsoft-defender-for-endpoint-architecture-features-and-plans 16/20
7/7/24, 4:52 PM Microsoft Defender for Endpoint: Architecture, Features & Plans

MICROSOFT SECURITY

What Is Azure Sentinel (Renamed to Microsoft Sentinel)?

MICROSOFT SECURITY

Microsoft Sentinel Deployment Best Practices - 2nd Edition

https://www.bluevoyant.com/knowledge-center/microsoft-defender-for-endpoint-architecture-features-and-plans 17/20
7/7/24, 4:52 PM Microsoft Defender for Endpoint: Architecture, Features & Plans

MICROSOFT SECURITY

Microsoft Sentinel Updated One-Page Diagram

View all

Products
Managed Detection & Response

MDR for Microsoft

MDR for Splunk

MDR for Endpoint

Supply Chain Defense

Digital Risk Protection

Professional Services

Services
Digital Forensics & Incident Response

Incident Preparedness

Governance, Risk & Compliance

Penetration Testing

https://www.bluevoyant.com/knowledge-center/microsoft-defender-for-endpoint-architecture-features-and-plans 18/20
7/7/24, 4:52 PM Microsoft Defender for Endpoint: Architecture, Features & Plans

Solutions
Managed Detection & Response

Supply Chain Defense

Digital Risk Protection

Artificial Intelligence

Government

Resources
eBooks

Solution Briefs

Infographics

Reports

Videos

Webinars

White Papers

Blog

Learning Center

Partners
Technology Partners

Partners Overview

Company
Leadership

Careers

News

Press Releases

Events

Company Overview

Awards

Incident Response
https://www.bluevoyant.com/knowledge-center/microsoft-defender-for-endpoint-architecture-features-and-plans 19/20
7/7/24, 4:52 PM Microsoft Defender for Endpoint: Architecture, Features & Plans

Customer Login
Partner Login
Contact Us

335 Madison Ave, Suite 5G


New York, NY 10017
[email protected]

© Copyright 2024 BlueVoyant


Cookie Policy Privacy Policy & Legal Notice Trust

https://www.bluevoyant.com/knowledge-center/microsoft-defender-for-endpoint-architecture-features-and-plans 20/20

You might also like