Microsoft

Secure Your Devices with Defender for Endpoint – Part 1



In this first part of our series on securing your devices, we dive into Defender for Endpoint! Join us as we explore the ins and outs of licensing, and learn how to configure your devices using Microsoft Intune. We’ll also guide you through creating essential policies like antivirus, Windows firewall, attack surface reduction, and tamper protection. Don’t miss out on these crucial steps to enhance your device security! #CyberSecurity #MicrosoftIntune #DefenderForEndpoint

🧑‍🏫 NEW Course – Discover Microsoft 365 and Get More Done
► Start Learning –

🆓 FREE Facebook Group
From security to productivity apps to getting the best value from your Microsoft 365 investment, join our Microsoft 365 Mastery Group

🆓 FREE Microsoft 365 Guide
Our FREE Guide – Discover 5 things in Microsoft 365 that will save your business time and money….. and one feature that increases your Cyber Security by 99.9%
► Download our guide here today:

💻 Want to Work Together?
Drop me an email: jonathan@bearded365guy.com

😁 Follow on Socials
TikTok @bearded365guy
Instagram @bearded365guy

📽️ Video Chapters
00:00 Introduction
01:44 Licensing
03:40 Feature Differences
04:49 Connect Intune to Defender
06:57 Create EDR Policy
07:53 Prep Work
08:32 Create Entra ID Device Group
10:48 Admin Permissions
12:22 Configure Email Alerts
15:13 Next Gen Antivirus
16:08 Create AV Policy in Intune
24:00 Create Windows Firewall Policy
26:47 Attack Surface Rules
28:18 Configure ASR Policy
32:58 Tamper Protection
35:34 Troubleshooting Mode
36:50 Final Thoughts

[ad_2]

source

Related Articles

17 Comments

  1. Careful when using M365 maps – even though a great tool, it hasn’t been updated since July 2023. On a side note, thank you so much for these 37 minutes of pure knowledge sharing. Cheers!

  2. How does the dynamic rules section work with devices that aren't company owned ones? The boss wants to use his own PC (typical boss knows best IT conflict) and we have several freelancers that we need to give access to certain Sharepoint sites. How do I make sure the rules only apply to company owned devices and what different rules would you suggest for freelancers? In Intune, we do have them separated between corporate and personal. Is it just for MDM corporate?

  3. DFB/DFE are very capable platforms but what if you want to add an MDR and 24/7 SOC/SIEM? Are there fully managed 3rd-party solutions? I know Microsoft has offerings but they seem more hands-off by offering the platform and capabilities but it’s up to the customer to manage and support it all.

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button