Summary
If you only use detection and response capabilities in MDE, you likely would not be configuring a lot of settings on your endpoints. Typically, you may have sufficient controls available in the MDE portal and use a management solution from your current antimalware vendor.
If you are using the full MDE stack, which is highly recommended, in this chapter, you will have learned that Microsoft has ensured you can use whatever existing deployment and configuration tools that may already be available in your environment. For operating systems where the MDE components are built in, such as modern Windows, you may only need to perform onboarding; this works out well. Minimal effort is needed. For other operating systems, or if you need to perform advanced configuration, you will want to select a tool that is more geared toward systems management, such as Intune or Configuration Manager. However, the endpoint security-tailored experience is also available for a more focused experience...