Considerations for Deployment and Configuration
As we touched on in the previous chapter, Microsoft Defender for Endpoint’s (MDE’s) deployment and configuration choices typically depend on the tools you are already using in your environment. Depending on your current management strategy, this can be beneficial – or require you to rethink your approach.
For a long time, Microsoft held on to the strategy of introducing new features alongside Windows operating system development. Later, coverage was expanded to both down-level as well as non-Windows operating systems; this expanded coverage resulted in a more fragmented feature set and a dependence on Microsoft’s first-party management solutions. Unfortunately, this first-party management also needed to catch up to support this expanded coverage and evolving feature set.
In this chapter, you will augment your planning with deeper technical explanations of different operating systems requirements, deployment...