<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Microsoft-Defender-Xdr on Ru Campbell MVP</title>
    <link>https://campbell.scot/categories/microsoft-defender-xdr/</link>
    <description>Recent content in Microsoft-Defender-Xdr on Ru Campbell MVP</description>
    <generator>Hugo</generator>
    <language>en-gb</language>
    <lastBuildDate>Fri, 16 Feb 2024 17:13:38 +0000</lastBuildDate>
    <atom:link href="https://campbell.scot/categories/microsoft-defender-xdr/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>[Updated Feb 2024] Ultimate Comparison of Defender for Endpoint Features by OS</title>
      <link>https://campbell.scot/feb-2024-ultimate-comparison-of-defender-for-endpoint-features-by-os/</link>
      <pubDate>Fri, 16 Feb 2024 17:13:38 +0000</pubDate>
      <guid>https://campbell.scot/feb-2024-ultimate-comparison-of-defender-for-endpoint-features-by-os/</guid>
      <description>&lt;p&gt;Finally, it&amp;rsquo;s time for a refresh.  It&amp;rsquo;s been a while!  Due to personal circumstances, I haven&amp;rsquo;t been able to keep the Ultimate Comparison of MDE by OS updated.  I&amp;rsquo;ve had time to dive into the changes since v5 and it&amp;rsquo;s really been amazing to see MDE grow in scope.&lt;/p&gt;
&lt;h2 id=&#34;what-is-mde-and-why-do-we-need-an-ultimate-comparison&#34;&gt;What is MDE and why do we need an &amp;lsquo;ultimate comparison&amp;rsquo;?&lt;/h2&gt;
&lt;p&gt;Microsoft Defender for Endpoint (MDE) is a massive stack of endpoint protection and endpoint detection and response (EDR) capabilities.  It integrates with the broader Microsoft Defender XDR and is available for almost any OS you&amp;rsquo;ll find in an enterprise.  This cross-platform nature of MDE makes it difficult to understand and track what features and capabilities are available on each OS.  It&amp;rsquo;s not always intuitive, and you may be in for some surprises.  Hence by I began the &lt;strong&gt;Ultimate Comparison of Defender for Endpoint Features by OS&lt;/strong&gt; up to date to keep you aware of what you&amp;rsquo;re getting and what you need to go start implementing if you haven&amp;rsquo;t already.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Microsoft Defender for Cloud Apps - Common Microsoft 365 Security Mistakes Series</title>
      <link>https://campbell.scot/microsoft-defender-for-cloud-apps-common-microsoft-security-mistakes-series/</link>
      <pubDate>Fri, 09 Feb 2024 17:30:41 +0000</pubDate>
      <guid>https://campbell.scot/microsoft-defender-for-cloud-apps-common-microsoft-security-mistakes-series/</guid>
      <description>&lt;p&gt;Defender for Cloud Apps (MDA) is such a hidden gem. When talking with Microsoft 365 E5 customers, it&amp;rsquo;s amazing how few of them really grab MDA and squeeze all they can out of it. It&amp;rsquo;s often classified as a cloud access security broker (CASB) but that&amp;rsquo;s an oversimplication: the product can do so much more such as SaaS security posture management (SSPM) and, most topical in light of &lt;a href=&#34;https://www.microsoft.com/en-us/security/blog/2024/01/25/midnight-blizzard-guidance-for-responders-on-nation-state-attack/&#34;&gt;recent events&lt;/a&gt;, OAuth app governance.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Entra Self Service Password Reset - Common Microsoft 365 Security Mistakes Series</title>
      <link>https://campbell.scot/entra-self-service-password-reset-common-microsoft-security-mistakes-series/</link>
      <pubDate>Sat, 03 Feb 2024 11:32:34 +0000</pubDate>
      <guid>https://campbell.scot/entra-self-service-password-reset-common-microsoft-security-mistakes-series/</guid>
      <description>&lt;p&gt;It&amp;rsquo;s a trope in IT circles: users forget their passwords. The greater your scale, the more time this can occupy with tickets, service desk calls, and so on. If you use Microsoft Entra ID (previously Azure Active Directory), &lt;strong&gt;self service password reset&lt;/strong&gt; (SSPR) is a capability that can help reduce this overhead. SSPR offers a user-driven admin-less approach, where users verify they are authorised to reset forgotten passwords then can do so.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Microsoft Defender Vulnerability Management - Common Microsoft 365 Security Mistakes Series</title>
      <link>https://campbell.scot/microsoft-defender-vulnerability-management-common-microsoft-365-security-mistakes-series/</link>
      <pubDate>Sat, 03 Feb 2024 10:57:52 +0000</pubDate>
      <guid>https://campbell.scot/microsoft-defender-vulnerability-management-common-microsoft-365-security-mistakes-series/</guid>
      <description>&lt;p&gt;Microsoft Defender Vulnerability Management (MDVM) is an often overlooked service that can be licensed standalone or is included in other Microsoft Defender licenses. In my experience, I&amp;rsquo;ve never seen it licensed standalone, but customers with Defender for Endpoint (MDE) P2, Defender for Servers  (MDS) P1, and Defender for Business (MDB) benefit from it&amp;rsquo;s &lt;em&gt;core capabilities&lt;/em&gt;.  In addition to the core capabilities, &lt;em&gt;add-on capabilities&lt;/em&gt; are available in the standalone license, Defender for Servers P2, or as an upgrade to the P1 licenses.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Exchange Online Protection &amp; Defender for Office 365 - Common Microsoft 365 Security Mistakes Series</title>
      <link>https://campbell.scot/exchange-online-protection-defender-for-office-365-common-microsoft-365-security-mistakes-series/</link>
      <pubDate>Tue, 19 Dec 2023 08:26:45 +0000</pubDate>
      <guid>https://campbell.scot/exchange-online-protection-defender-for-office-365-common-microsoft-365-security-mistakes-series/</guid>
      <description>&lt;p&gt;Exchange Online Protection (EOP) and Microsoft Defender for Office 365 (MDO) are the email and collaboration security services native to Microsoft 365. EOP is included at all levels of licensing for Exchange Online, with MDO bringing additional security capabilities to license levels such as Business Premium, Microsoft 365 E3, and Microsoft 365 E5.&lt;/p&gt;
&lt;p&gt;In this blog, I&amp;rsquo;ll review five of the most common security mistakes I see in tenants regarding EOP and MDO. Realistically, this list could go to fifty mistakes, but I&amp;rsquo;ll focus on ones I think you can quickly convert into quick wins or just may have never crossed your mind.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Microsoft Improves and Simplifies Defender for Endpoint Management Capabilities</title>
      <link>https://campbell.scot/microsoft-improves-and-simplifies-defender-for-endpoint-management-capabilities/</link>
      <pubDate>Mon, 10 Jul 2023 20:47:03 +0000</pubDate>
      <guid>https://campbell.scot/microsoft-improves-and-simplifies-defender-for-endpoint-management-capabilities/</guid>
      <description>&lt;p&gt;In one of the biggest changes to Microsoft Defender for Endpoint (MDE) in its product history, you no longer need a separate management engine to configure endpoint settings.&lt;/p&gt;
&lt;p&gt;In this blog, we&amp;rsquo;ll look at what that change is, why it was necessary, initial impressions, and what you might want to do next.&lt;/p&gt;
&lt;h2 id=&#34;historic-management-architecture-needed-simplifying&#34;&gt;Historic management architecture needed simplifying&lt;/h2&gt;
&lt;p&gt;MDE (and it&amp;rsquo;s Windows client, Microsoft Defender Antivirus (MDAV)) always stood out from the crowd of endpoint protection platforms as being, well, a bit &lt;em&gt;weird&lt;/em&gt; in terms of management architecture. With most platforms, you get a central admin console which pushes out endpoint settings. Think scan schedules, quarantine rules, exclusions, CPU throttling, etc. MDE/MDAV, on the other hand, instead relied on an external management tool such as Intune (MDM), Configuration Manager, or Group Policy.&lt;/p&gt;</description>
    </item>
    <item>
      <title>[Feb 2023] Ultimate Comparison of Defender for Endpoint Features by OS</title>
      <link>https://campbell.scot/mde-comparison-feb-2023/</link>
      <pubDate>Sun, 19 Feb 2023 15:46:12 +0000</pubDate>
      <guid>https://campbell.scot/mde-comparison-feb-2023/</guid>
      <description>&lt;p&gt;Microsoft Defender for Endpoint (MDE) is a massive stack of endpoint protection and endpoint detection and response (EDR) capabilities.  It integrates with Microsoft 365 Defender (the broader XDR platform) and is available for almost any OS you&amp;rsquo;ll find in an enterprise.  This cross-platform nature of MDE makes it difficult to understand and track what features and capabilities are available on each OS.  It&amp;rsquo;s not always intuitive, and you may be in for some surprises.  I try to keep this &lt;strong&gt;Ultimate Comparison of Defender for Endpoint Features by OS&lt;/strong&gt; up to date to keep you aware of what you&amp;rsquo;re getting and what you need to go start implementing if you haven&amp;rsquo;t already.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Ultimate Comparison of Defender for Endpoint Features by OS [Updated August 2022]</title>
      <link>https://campbell.scot/mde-comparison-august-2022/</link>
      <pubDate>Fri, 26 Aug 2022 07:32:32 +0000</pubDate>
      <guid>https://campbell.scot/mde-comparison-august-2022/</guid>
      <description>&lt;p&gt;This is the updated &amp;ldquo;matrix&amp;rdquo; of OS supported for the almost 80 features, services, and important components that make up Microsoft Defender for Endpoint. This follows up on my March 2022 release of the comparison.&lt;/p&gt;
&lt;p&gt;What&amp;rsquo;s new?&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Now available in Excel format, which was the biggest request :)&lt;/li&gt;
&lt;li&gt;Added the new Microsoft Defender Vulnerability Management capabilities (add-on license required)&lt;/li&gt;
&lt;li&gt;Added macOS tamper protection support&lt;/li&gt;
&lt;li&gt;Added macOS network and web protection&lt;/li&gt;
&lt;li&gt;Added iOS and Android&amp;rsquo;s mobile network protection&lt;/li&gt;
&lt;li&gt;Added Linux cloud-delivered protection support&lt;/li&gt;
&lt;li&gt;Added Windows troubleshooting mode&lt;/li&gt;
&lt;li&gt;Added macOS, iOS, and Android support for network indicators of compromise&lt;/li&gt;
&lt;li&gt;Updated host firewall reporting supported OSs&lt;/li&gt;
&lt;li&gt;Updated attack surface reduction (ASR) rule supported Windows and Windows Server versions&lt;/li&gt;
&lt;li&gt;Updated block at first sight (BAFS) supported OSs (thanks Polle Vanhoof + Thomas Verheyden)&lt;/li&gt;
&lt;li&gt;Updated Windows Server support for indicators of compromise (thanks Polle Vanhoof + Thomas Verheyden)&lt;/li&gt;
&lt;li&gt;Removed preview references for the unified agent for Windows Server 2012 R2 and 2016&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Obligatory disclaimers:&lt;/p&gt;</description>
    </item>
    <item>
      <title>Updated March 2022: Ultimate Comparison of Defender for Endpoint Features by Operating System</title>
      <link>https://campbell.scot/march-22-defender-for-endpoint-feature-comparison/</link>
      <pubDate>Tue, 29 Mar 2022 07:27:18 +0000</pubDate>
      <guid>https://campbell.scot/march-22-defender-for-endpoint-feature-comparison/</guid>
      <description>&lt;p&gt;It&amp;rsquo;s been about 5 months since I last updated my comparison of Defender for Endpoint features by OS.  This is a &amp;ldquo;matrix&amp;rdquo; of the &lt;em&gt;tons&lt;/em&gt; of features, services, and important components that make up Microsoft Defender for Endpoint.&lt;/p&gt;
&lt;p&gt;Three months later, it&amp;rsquo;s overdue an update.  So here it is :)  I&amp;rsquo;ve also decided to rename it to The Ultimate Comparison of MDE Features by OS&amp;hellip; because renaming&amp;rsquo;s what we do, right?&lt;/p&gt;</description>
    </item>
    <item>
      <title>Updated October 2021: Availability of Defender for Endpoint Features by Operating System</title>
      <link>https://campbell.scot/october-2021-comparison-of-defender-for-endpoint-features/</link>
      <pubDate>Tue, 19 Oct 2021 20:36:54 +0000</pubDate>
      <guid>https://campbell.scot/october-2021-comparison-of-defender-for-endpoint-features/</guid>
      <description>&lt;p&gt;In July, I released v1 of The Big Comparison of Defender for Endpoint Features by Operating System (or, what I think is much catchier, TBCMDEFOS).  This was a &amp;ldquo;matrix&amp;rdquo; of the &lt;em&gt;tons&lt;/em&gt; of features, services, and important components that make up Microsoft Defender for Endpoint.&lt;/p&gt;
&lt;p&gt;Three months later, it&amp;rsquo;s overdue an update.  So here it is :)&lt;/p&gt;
&lt;p&gt;The headline news is that, in preview anyway, there&amp;rsquo;s a bunch of additions to Windows Server 2012 R2 and 2016 thanks to a new agent-based deployment (&amp;ldquo;unified solution&amp;rdquo;) that replaces the need for the Microsoft Monitoring Agent and System Centre Endpoint Protection.  You now get almost feature parity with Windows Server 2019&amp;rsquo;s security features: ASR rules, next-generation protection, block at first sight, etc.  For a guide on how to get up and running with it, &lt;a href=&#34;https://petri.com/how-to-install-defender-for-endpoint-server-2012-r2-2016&#34;&gt;check out my writeup on Petri&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Tons of Microsoft Defender for Endpoint Improvements for Server 2012 R2 &amp; 2016</title>
      <link>https://campbell.scot/tons-of-microsoft-defender-for-endpoint-improvements-for-server-r/</link>
      <pubDate>Fri, 08 Oct 2021 11:36:48 +0000</pubDate>
      <guid>https://campbell.scot/tons-of-microsoft-defender-for-endpoint-improvements-for-server-r/</guid>
      <description>&lt;p&gt;New protection capabilities for Microsoft Defender for Endpoint (MDE) customers have landed in public preview, Oct 7 &amp;lsquo;21, for Windows Server 2012 R2 and Windows Server 2016.  With the public preview released today, Windows Server 2012 R2 and 2016 gain &amp;rsquo; &lt;a href=&#34;https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/defending-windows-server-2012-r2-and-2016/ba-p/2783292&#34;&gt;functional equivalence&lt;/a&gt;&amp;rsquo; to 2019, thanks to the use of a new agent that is being described as the &amp;lsquo;unified solution&amp;rsquo;.&lt;/p&gt;
&lt;h2 id=&#34;historically-a-significant-gap&#34;&gt;Historically, a significant gap&lt;/h2&gt;
&lt;p&gt;Previously, as I&amp;rsquo;ve detailed &lt;a href=&#34;https://petri.com/understanding-microsoft-defender-for-endpoint-and-how-it-protects-your-data&#34;&gt;here&lt;/a&gt; and &lt;a href=&#34;https://campbell.scot/the-big-comparison-of-defender-for-endpoint-features-by-operating-system/&#34;&gt;here&lt;/a&gt;, there was a large feature gap between Windows Server 2019 and these &amp;ldquo;down-level&amp;rdquo; OSs. The onboarding process was also different.  To get devices into MDE, you had to deploy the Microsoft Monitoring Agent (MMA).  This was required as the EDR sensor wasn&amp;rsquo;t built-in, unlike with Server 2019.  While Server 2016 shipped with Microsoft Defender Antivirus (MDAV) installed already, to get any kind of scanning and endpoint protection capability in Server 2012 R2, you had to install System Centre Endpoint Protection.&lt;/p&gt;</description>
    </item>
    <item>
      <title>The Big Comparison of Defender for Endpoint Features by Operating System</title>
      <link>https://campbell.scot/the-big-comparison-of-defender-for-endpoint-features-by-operating-system/</link>
      <pubDate>Sun, 11 Jul 2021 09:59:10 +0000</pubDate>
      <guid>https://campbell.scot/the-big-comparison-of-defender-for-endpoint-features-by-operating-system/</guid>
      <description>&lt;p&gt;Microsoft Defender for Endpoint (MDE) is a massive platform.  It&amp;rsquo;s not a single product, and it&amp;rsquo;s more than just a service.  It&amp;rsquo;s a platform of &lt;em&gt;tons&lt;/em&gt; of security features, portals, services, and controls.  The more you dig in, the more elements of general Microsoft security have been included in the MDE &amp;ldquo;branding&amp;rdquo;.  It&amp;rsquo;s not only endpoint detection and response (EDR), but also Windows 10 security settings.  It&amp;rsquo;s not just the security software on the device, it&amp;rsquo;s also ongoing threat and vulnerability management.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Microsoft Defender Antivirus – Schedule &amp; Install Updates via Network Shares</title>
      <link>https://campbell.scot/microsoft-defender-antivirus-schedule-install-updates-via-network-shares/</link>
      <pubDate>Sat, 13 Mar 2021 21:28:12 +0000</pubDate>
      <guid>https://campbell.scot/microsoft-defender-antivirus-schedule-install-updates-via-network-shares/</guid>
      <description>&lt;p&gt;Although not common, there are scenarios out where you will have LAN-only devices onboarded in Microsoft Defender for Endpoint (MDE), or at least using Microsoft Defender Antivirus (MDAV).  With no line of sight to the internet, you can use options such as WSUS, but in this blog, I&amp;rsquo;ll explore using a network share, as WSUS isn&amp;rsquo;t always an option.&lt;/p&gt;
&lt;h2 id=&#34;set-up-the-network-share-for-updates&#34;&gt;Set up the network share for updates&lt;/h2&gt;
&lt;ol&gt;
&lt;li&gt;Create a directory on your file server with subdirectories for the different CPU architectures you&amp;rsquo;ll be supporting.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://campbell.scot/wp-content/uploads/2021/02/01-create-update-folders-on-server.png&#34;&gt;2. On the server, we&amp;rsquo;ll be installing a script provided by Microsoft.  In PowerShell with elevated rights:&lt;/p&gt;</description>
    </item>
    <item>
      <title>Block LSASS.exe using Attack Surface Reduction</title>
      <link>https://campbell.scot/block-lsass-exe-using-attack-surface-reduction/</link>
      <pubDate>Sat, 13 Feb 2021 21:10:23 +0000</pubDate>
      <guid>https://campbell.scot/block-lsass-exe-using-attack-surface-reduction/</guid>
      <description></description>
    </item>
  </channel>
</rss>
