Microsoft
Defender for Endpoint P2
Defender for Endpoint Plan 1 includes
the following capabilities:
·
Next-generation
protection: that includes industry-leading, robust antimalware and
antivirus protection
·
Manual
response actions: such as sending a file to quarantine, that your security team
can take on devices or files when threats are detected
·
Attack
surface reduction capabilities: that harden devices, prevent zero-day
attacks, and offer granular control over endpoint access and behaviors
·
Centralized
configuration and management: with the Microsoft 365 Defender portal and
integration with Microsoft Intune
·
Protection
for a variety of platforms: including Windows, macOS, iOS, and Android devices
·
Device
discovery Microsoft Defender for Endpoint provides a device discovery
capability that helps you find unmanaged devices connected to your corporate
network without the need for extra appliances or cumbersome process changes.
·
Device
inventory: The Device inventory shows a list of the devices in your
network where alerts were generated. By default, the queue displays devices
seen in the last 30 days. At a glance you'll see information such as domain,
risk level, OS platform, and other details for easy identification of devices
most at risk.
·
Threat
analytics: Track and respond to emerging threats through threat analytics
·
Automated
investigations: The technology in automated investigation uses various
inspection algorithms and is based on processes that are used by security
analysts.
·
Advances
hunting: Proactively hunt for threats with advanced hunting in Microsoft 365
Defender
·
Endpoint
detection and response: Endpoint detection and response capabilities in
Defender for Endpoint provide advanced attack detections that are near real-time
and actionable. Security analysts can prioritize alerts effectively, gain
visibility into the full scope of a breach, and take response actions to
remediate threats.
·
Endpoint
Attack Notifications: Endpoint Attack Notifications (previously referred to as
Microsoft Threat Experts - Targeted Attack Notification) provides proactive
hunting for the most important threats to your network, including human
adversary intrusions, hands-on-keyboard attacks, or advanced attacks like
cyber-espionage. These notifications show up as a new alert.
Revolution Technology BD has made the shopping easier for its customers. Please follow those easy steps to start shopping and stay connected with us: