Configuring and managing Microsoft Defender for Endpoint
Microsoft Defender for Endpoint is designed to be an endpoint detection and response tool (EDR) that helps businesses monitor and detect, further investigate, and respond to attacks on their devices and networks. This one topic could easily take up a full chapter on its own – we will cover the major topics of system requirements, onboarding, and offboarding processes to fulfill the AZ801 exam objectives. Let’s start by reviewing the system and software requirements.
Licensing, software, and hardware requirements for Microsoft Defender for Endpoint
The basic requirements for Microsoft Defender for Endpoint are as follows:
- The client’s computer needs to be managed by Microsoft Intune or running the Configuration Manager client
- A current subscription to Microsoft Defender for Endpoint (Plan 1, Plan 2, or Microsoft Defender for Endpoint Server)
- A supported operating system (covers Windows...