{"id":30523,"date":"2024-01-17T07:25:40","date_gmt":"2024-01-17T12:25:40","guid":{"rendered":"https:\/\/centricconsulting.com\/?p=30523"},"modified":"2024-01-17T13:32:14","modified_gmt":"2024-01-17T18:32:14","slug":"onboarding-with-microsoft-defender-advanced-threat-protection-mdatp","status":"publish","type":"post","link":"https:\/\/centricconsulting.com\/blog\/onboarding-with-microsoft-defender-advanced-threat-protection-mdatp\/","title":{"rendered":"Installation Needs for Microsoft Defender for Endpoint"},"content":{"rendered":"

Learn how to onboard computers with Microsoft Defender for Endpoint, which goes beyond Microsoft Defender\u2019s endpoint anti-virus protection.<\/h2>\n
\n

As device, or endpoint, management in the cloud continues to mature \u2013 and hybrid-joined devices become a tighter management strategy than domain-joined or Azure-joined alone \u2013 the idea of securing a floating endpoint becomes far more critical. From zero-hour detection and remediation to advanced persistent threat (APT) detection, response and reporting, Microsoft Defender<\/a> for Endpoint (previously known as Microsoft Defender Advanced Threat Protection, or MDATP) covers all your endpoint threat protection needs.<\/strong><\/p>\n

In this blog, I\u2019ll cover how simple it is to onboard computers and begin using Microsoft Defender for Endpoint.<\/p>\n

Microsoft Defender for Endpoint Onboarding<\/h2>\n

Microsoft Defender for Endpoint is integrated with multiple services throughout the Microsoft 365 suite<\/a>, including Microsoft Endpoint Manager and Microsoft Endpoint Configuration Manager.<\/p>\n

Microsoft Endpoint Manager is an umbrella over the following technologies and is integrated with Microsoft Endpoint Configuration Manager:<\/p>\n