(87) Configuring Defender for Endpoint
- Mr B SOE way
- Sep 6, 2023
- 2 min read
What is Defender for Endpoint?
Microsoft Defender for Endpoint (MDE) is a comprehensive solution for preventing, detecting, and automating the investigation and response to threats against endpoints. Defender for Endpoint is supported for multiple platforms, including Windows, Linux, macOS, and mobile platforms iOS and Android. Microsoft Defender for Endpoint (MDE) is a massive platform of features and not a single product. It is a platform with tons of security features, services, and controls. Hopefully, this complete blog series gives more explanation in high-level overviews and in-depth technical information based on my own best practices.
Microsoft Defender for Endpoint is a key component of the Microsoft 365 Defender architecture and part of the Microsoft 365 Defender platform. It shares data/ signals and architecture with the following products;
Microsoft Defender for Endpoint (MDE)
Microsoft Defender for Office365 (MDO
Microsoft Defender for Cloud Apps (MDA)
Microsoft Defender for Identity (MDI)
Azure AD Identity Protection (AADIP)
Defender for Endpoint contains a couple of major components including;
Asset discovery
Threat & Vulnerability Management (TVM)
Attack Surface Reduction (ASR)
Next-Generation Protection (NGP)
Endpoint Detection & Response (EDR)
Automated Self-healing/ Automation investigation and remediation (AIR)
Microsoft Threat Experts

How to configure Defender for Endpoint?
The configuration will be via security.microsoft.com, this will be broken with the following:
General - Email notifications:
Navigate to security.microsoft.com then Settings then Microsoft 365 Defender then Email notifications.
Enter a notification name under Basics
Then select notification settings for the following highlighted and select Alert severity as "High"


General - Advanced features:
Navigate to security.microsoft.com then Settings then Endpoints then Advanced features.
By default, a number of the settings will be turned on.
The key settings are listed in this table below and select "On" for the following preferences.
Permissions - Roles:
Navigate to security.microsoft.com then Settings then Endpoints then Permissions then select Roles.
Select Turn on roles
Select Add role and configure with the following.
Roles in Microsoft 365 Defender (RBAC):
Configuring and enabling RBAC roles with Defender for Endpoint, can be done by going to security.microsoft.com then Settings then Microsoft 365 Defender then Permissions and roles. Currently the workloads are set to "Not active", set it to "Active"

Permissions - Device groups:
I generally configure device groups with the following setup unless the organisation has more than one or more different naming conventions, you can customise with the following:
Rules - Web content filtering:
Microsoft Defender for Endpoint enables web content filtering at the endpoint level negating the need for proxies or full-tunnel VPN connections. Web content filtering should be applied to workstations. Web content filtering in Microsoft Defender for Endpoint leverages services provided by Cyren. To check the classification of a URL or report a misclassified URL visit:
By navigating to security.microsoft.com then Settings then Endpoints then Rules then Web content filtering, select Add Policy.

Specify a policy name such as "Web Content Filtering" then choose under "Block categories"
Configuration manager - Enforcement scope:
Allow security setting in Intune to be enforced by Microsoft Defender for Endpoint (MDE).
This configuration setting will apply to devices that are not yet enrolled to Intune.
It is a requirement to turn on the integration in Microsoft Defender for Endpoint connector settings under Intune (which is done under "General - Advanced features"




Comments