{"id":30523,"date":"2024-01-17T07:25:40","date_gmt":"2024-01-17T12:25:40","guid":{"rendered":"https:\/\/centricconsulting.com\/?p=30523"},"modified":"2024-01-17T13:32:14","modified_gmt":"2024-01-17T18:32:14","slug":"onboarding-with-microsoft-defender-advanced-threat-protection-mdatp","status":"publish","type":"post","link":"https:\/\/centricconsulting.com\/blog\/onboarding-with-microsoft-defender-advanced-threat-protection-mdatp\/","title":{"rendered":"Installation Needs for Microsoft Defender for Endpoint"},"content":{"rendered":"
As device, or endpoint, management in the cloud continues to mature \u2013 and hybrid-joined devices become a tighter management strategy than domain-joined or Azure-joined alone \u2013 the idea of securing a floating endpoint becomes far more critical. From zero-hour detection and remediation to advanced persistent threat (APT) detection, response and reporting, Microsoft Defender<\/a> for Endpoint (previously known as Microsoft Defender Advanced Threat Protection, or MDATP) covers all your endpoint threat protection needs.<\/strong><\/p>\n In this blog, I\u2019ll cover how simple it is to onboard computers and begin using Microsoft Defender for Endpoint.<\/p>\n Microsoft Defender for Endpoint is integrated with multiple services throughout the Microsoft 365 suite<\/a>, including Microsoft Endpoint Manager and Microsoft Endpoint Configuration Manager.<\/p>\n Microsoft Endpoint Manager is an umbrella over the following technologies and is integrated with Microsoft Endpoint Configuration Manager:<\/p>\n Here are just a few of the Microsoft Defender products associated with Microsoft\u2019s Azure environment<\/a>:<\/p>\n Microsoft Defender for Endpoint has expanded its coverage over the last few years and can now be onboarded to operating systems using the methods listed below. There are a variety of options available, so I recommend considering your needs and asset inventories before designing a total onboarding plan.<\/p>\n The following installation methods are available for Windows-based operating systems:<\/p>\n Windows 7 SP1 and 8.1, both of which require you to use the Log Analytics \/ Microsoft Monitoring Agent<\/p>\n Windows Server 2012 R2, 2016<\/p>\n Windows 1803, 2019, and 2022<\/p>\n Windows 10, Windows 11<\/p>\n The following installation methods are available for non-Windows-based operating systems:<\/p>\n All the scripts and information are located in the onboarding settings section in the Microsoft Defender Security Center along with the rest of the Microsoft Defender for Endpoint management tools at https:\/\/securitycenter.windows.com<\/a>. As always, the requirements defined by your organization should serve as your guide to purchasing, configuring and using software.<\/p>\n \n Microsoft Defender for Endpoint Onboarding<\/h2>\n
\n
\n
Windows Operating Systems<\/h2>\n
\n
\n
\n
\n
\n
\n
\n
\n
Non-Windows Operating Systems<\/h2>\n
\n
For More Information<\/h2>\n