<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Microsoft-Defender on Ru Campbell MVP</title>
    <link>https://campbell.scot/categories/microsoft-defender/</link>
    <description>Recent content in Microsoft-Defender on Ru Campbell MVP</description>
    <generator>Hugo</generator>
    <language>en-gb</language>
    <lastBuildDate>Fri, 28 Nov 2025 13:42:07 +0000</lastBuildDate>
    <atom:link href="https://campbell.scot/categories/microsoft-defender/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Microsoft 365: The Essential 10 Security Considerations</title>
      <link>https://campbell.scot/microsoft-365-the-essential-10-security-considerations/</link>
      <pubDate>Fri, 28 Nov 2025 13:42:07 +0000</pubDate>
      <guid>https://campbell.scot/microsoft-365-the-essential-10-security-considerations/</guid>
      <description>&lt;p&gt;When we talk about Microsoft 365 security, we are talking about two things:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Securing Microsoft 365 &lt;em&gt;the platform&lt;/em&gt;, such as Exchange Online, SharePoint Online, Microsoft 365 Copilot; ensuring they are hardened and monitored in proportion to risk appetite.&lt;/li&gt;
&lt;li&gt;Using Microsoft 365 &lt;em&gt;security tooling&lt;/em&gt;, such as Defender, Purview, Entra, and Intune; ensuring they are deployed, well configured, and you&amp;rsquo;re not paying for capabilities gathering dust.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The latter can be used to achieve the former, as well as other (non-Microsoft 365) platforms. For example, using Defender for Endpoint on a Linux server in AWS, or using Entra for single sign on to Salesforce.&lt;/p&gt;</description>
    </item>
    <item>
      <title>[Updated Feb 2024] Ultimate Comparison of Defender for Endpoint Features by OS</title>
      <link>https://campbell.scot/feb-2024-ultimate-comparison-of-defender-for-endpoint-features-by-os/</link>
      <pubDate>Fri, 16 Feb 2024 17:13:38 +0000</pubDate>
      <guid>https://campbell.scot/feb-2024-ultimate-comparison-of-defender-for-endpoint-features-by-os/</guid>
      <description>&lt;p&gt;Finally, it&amp;rsquo;s time for a refresh.  It&amp;rsquo;s been a while!  Due to personal circumstances, I haven&amp;rsquo;t been able to keep the Ultimate Comparison of MDE by OS updated.  I&amp;rsquo;ve had time to dive into the changes since v5 and it&amp;rsquo;s really been amazing to see MDE grow in scope.&lt;/p&gt;
&lt;h2 id=&#34;what-is-mde-and-why-do-we-need-an-ultimate-comparison&#34;&gt;What is MDE and why do we need an &amp;lsquo;ultimate comparison&amp;rsquo;?&lt;/h2&gt;
&lt;p&gt;Microsoft Defender for Endpoint (MDE) is a massive stack of endpoint protection and endpoint detection and response (EDR) capabilities.  It integrates with the broader Microsoft Defender XDR and is available for almost any OS you&amp;rsquo;ll find in an enterprise.  This cross-platform nature of MDE makes it difficult to understand and track what features and capabilities are available on each OS.  It&amp;rsquo;s not always intuitive, and you may be in for some surprises.  Hence by I began the &lt;strong&gt;Ultimate Comparison of Defender for Endpoint Features by OS&lt;/strong&gt; up to date to keep you aware of what you&amp;rsquo;re getting and what you need to go start implementing if you haven&amp;rsquo;t already.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Exchange Online Protection &amp; Defender for Office 365 - Common Microsoft 365 Security Mistakes Series</title>
      <link>https://campbell.scot/exchange-online-protection-defender-for-office-365-common-microsoft-365-security-mistakes-series/</link>
      <pubDate>Tue, 19 Dec 2023 08:26:45 +0000</pubDate>
      <guid>https://campbell.scot/exchange-online-protection-defender-for-office-365-common-microsoft-365-security-mistakes-series/</guid>
      <description>&lt;p&gt;Exchange Online Protection (EOP) and Microsoft Defender for Office 365 (MDO) are the email and collaboration security services native to Microsoft 365. EOP is included at all levels of licensing for Exchange Online, with MDO bringing additional security capabilities to license levels such as Business Premium, Microsoft 365 E3, and Microsoft 365 E5.&lt;/p&gt;
&lt;p&gt;In this blog, I&amp;rsquo;ll review five of the most common security mistakes I see in tenants regarding EOP and MDO. Realistically, this list could go to fifty mistakes, but I&amp;rsquo;ll focus on ones I think you can quickly convert into quick wins or just may have never crossed your mind.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Microsoft Improves and Simplifies Defender for Endpoint Management Capabilities</title>
      <link>https://campbell.scot/microsoft-improves-and-simplifies-defender-for-endpoint-management-capabilities/</link>
      <pubDate>Mon, 10 Jul 2023 20:47:03 +0000</pubDate>
      <guid>https://campbell.scot/microsoft-improves-and-simplifies-defender-for-endpoint-management-capabilities/</guid>
      <description>&lt;p&gt;In one of the biggest changes to Microsoft Defender for Endpoint (MDE) in its product history, you no longer need a separate management engine to configure endpoint settings.&lt;/p&gt;
&lt;p&gt;In this blog, we&amp;rsquo;ll look at what that change is, why it was necessary, initial impressions, and what you might want to do next.&lt;/p&gt;
&lt;h2 id=&#34;historic-management-architecture-needed-simplifying&#34;&gt;Historic management architecture needed simplifying&lt;/h2&gt;
&lt;p&gt;MDE (and it&amp;rsquo;s Windows client, Microsoft Defender Antivirus (MDAV)) always stood out from the crowd of endpoint protection platforms as being, well, a bit &lt;em&gt;weird&lt;/em&gt; in terms of management architecture. With most platforms, you get a central admin console which pushes out endpoint settings. Think scan schedules, quarantine rules, exclusions, CPU throttling, etc. MDE/MDAV, on the other hand, instead relied on an external management tool such as Intune (MDM), Configuration Manager, or Group Policy.&lt;/p&gt;</description>
    </item>
    <item>
      <title>[Feb 2023] Ultimate Comparison of Defender for Endpoint Features by OS</title>
      <link>https://campbell.scot/mde-comparison-feb-2023/</link>
      <pubDate>Sun, 19 Feb 2023 15:46:12 +0000</pubDate>
      <guid>https://campbell.scot/mde-comparison-feb-2023/</guid>
      <description>&lt;p&gt;Microsoft Defender for Endpoint (MDE) is a massive stack of endpoint protection and endpoint detection and response (EDR) capabilities.  It integrates with Microsoft 365 Defender (the broader XDR platform) and is available for almost any OS you&amp;rsquo;ll find in an enterprise.  This cross-platform nature of MDE makes it difficult to understand and track what features and capabilities are available on each OS.  It&amp;rsquo;s not always intuitive, and you may be in for some surprises.  I try to keep this &lt;strong&gt;Ultimate Comparison of Defender for Endpoint Features by OS&lt;/strong&gt; up to date to keep you aware of what you&amp;rsquo;re getting and what you need to go start implementing if you haven&amp;rsquo;t already.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Ultimate Comparison of Defender for Endpoint Features by OS [Updated August 2022]</title>
      <link>https://campbell.scot/mde-comparison-august-2022/</link>
      <pubDate>Fri, 26 Aug 2022 07:32:32 +0000</pubDate>
      <guid>https://campbell.scot/mde-comparison-august-2022/</guid>
      <description>&lt;p&gt;This is the updated &amp;ldquo;matrix&amp;rdquo; of OS supported for the almost 80 features, services, and important components that make up Microsoft Defender for Endpoint. This follows up on my March 2022 release of the comparison.&lt;/p&gt;
&lt;p&gt;What&amp;rsquo;s new?&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Now available in Excel format, which was the biggest request :)&lt;/li&gt;
&lt;li&gt;Added the new Microsoft Defender Vulnerability Management capabilities (add-on license required)&lt;/li&gt;
&lt;li&gt;Added macOS tamper protection support&lt;/li&gt;
&lt;li&gt;Added macOS network and web protection&lt;/li&gt;
&lt;li&gt;Added iOS and Android&amp;rsquo;s mobile network protection&lt;/li&gt;
&lt;li&gt;Added Linux cloud-delivered protection support&lt;/li&gt;
&lt;li&gt;Added Windows troubleshooting mode&lt;/li&gt;
&lt;li&gt;Added macOS, iOS, and Android support for network indicators of compromise&lt;/li&gt;
&lt;li&gt;Updated host firewall reporting supported OSs&lt;/li&gt;
&lt;li&gt;Updated attack surface reduction (ASR) rule supported Windows and Windows Server versions&lt;/li&gt;
&lt;li&gt;Updated block at first sight (BAFS) supported OSs (thanks Polle Vanhoof + Thomas Verheyden)&lt;/li&gt;
&lt;li&gt;Updated Windows Server support for indicators of compromise (thanks Polle Vanhoof + Thomas Verheyden)&lt;/li&gt;
&lt;li&gt;Removed preview references for the unified agent for Windows Server 2012 R2 and 2016&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Obligatory disclaimers:&lt;/p&gt;</description>
    </item>
    <item>
      <title>Exploring Microsoft 365&#39;s NOBELIUM Defence Capabilities</title>
      <link>https://campbell.scot/exploring-microsoft-365s-nobelium-defence-capabilities/</link>
      <pubDate>Fri, 24 Dec 2021 19:37:50 +0000</pubDate>
      <guid>https://campbell.scot/exploring-microsoft-365s-nobelium-defence-capabilities/</guid>
      <description>&lt;p&gt;I recently read through an &lt;a href=&#34;https://www.mandiant.com/resources/russian-targeting-gov-business&#34;&gt;excellent article by Mandiant&lt;/a&gt;, which recently split with FireEye, on their findings and analysis of the continued actions of suspected nation-state actor NOBELIUM.  This group appeared on most IT pro&amp;rsquo;s radar because of their SolarWinds&amp;rsquo; software supply chain.  You are probably familiar with it by now, but if not, the tl;dr is that SolarWinds&amp;rsquo; Orion IT software was &amp;ldquo;trojanised&amp;rdquo; via an attack on their software supply chain.  Orion is (probably now &amp;ldquo;was&amp;rdquo;) used by enterprise customers to monitor their servers, network, etc, so not only was SolarWinds compromised, so too potentially were its customers.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Microsoft Defender Antivirus – Schedule &amp; Install Updates via Network Shares</title>
      <link>https://campbell.scot/microsoft-defender-antivirus-schedule-install-updates-via-network-shares/</link>
      <pubDate>Sat, 13 Mar 2021 21:28:12 +0000</pubDate>
      <guid>https://campbell.scot/microsoft-defender-antivirus-schedule-install-updates-via-network-shares/</guid>
      <description>&lt;p&gt;Although not common, there are scenarios out where you will have LAN-only devices onboarded in Microsoft Defender for Endpoint (MDE), or at least using Microsoft Defender Antivirus (MDAV).  With no line of sight to the internet, you can use options such as WSUS, but in this blog, I&amp;rsquo;ll explore using a network share, as WSUS isn&amp;rsquo;t always an option.&lt;/p&gt;
&lt;h2 id=&#34;set-up-the-network-share-for-updates&#34;&gt;Set up the network share for updates&lt;/h2&gt;
&lt;ol&gt;
&lt;li&gt;Create a directory on your file server with subdirectories for the different CPU architectures you&amp;rsquo;ll be supporting.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://campbell.scot/wp-content/uploads/2021/02/01-create-update-folders-on-server.png&#34;&gt;2. On the server, we&amp;rsquo;ll be installing a script provided by Microsoft.  In PowerShell with elevated rights:&lt;/p&gt;</description>
    </item>
    <item>
      <title>Microsoft Defender for Endpoint - Offline Onboarding for Windows 10 via a Proxy</title>
      <link>https://campbell.scot/microsoft-defender-for-endpoint-offline-onboarding-for-windows-10-via-proxy/</link>
      <pubDate>Thu, 18 Feb 2021 07:30:40 +0000</pubDate>
      <guid>https://campbell.scot/microsoft-defender-for-endpoint-offline-onboarding-for-windows-10-via-proxy/</guid>
      <description>&lt;p&gt;Getting your devices into Defender for Endpoint is referred to as &lt;strong&gt;onboarding&lt;/strong&gt; and can be done in lots of different ways, depending on the scenario.  The tools you use for Windows Server 2008 R2, for example, are different from the tools you use for Windows Server 2019, which are different from the tools you use for Windows 10, and so on.&lt;/p&gt;
&lt;p&gt;The common denominator behind most onboarding methods is internet connectivity.  Your device connects directly to the cloud service and provides all that telemetry goodness via a direct line of sight.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Block LSASS.exe using Attack Surface Reduction</title>
      <link>https://campbell.scot/block-lsass-exe-using-attack-surface-reduction/</link>
      <pubDate>Sat, 13 Feb 2021 21:10:23 +0000</pubDate>
      <guid>https://campbell.scot/block-lsass-exe-using-attack-surface-reduction/</guid>
      <description></description>
    </item>
    <item>
      <title>Understanding Application Guard for Office, Now Generally Available</title>
      <link>https://campbell.scot/understanding-application-guard-for-office-now-generally-available/</link>
      <pubDate>Sat, 30 Jan 2021 22:13:50 +0000</pubDate>
      <guid>https://campbell.scot/understanding-application-guard-for-office-now-generally-available/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Application Guard&lt;/strong&gt; first appeared in Windows 10 1709 (&amp;ldquo;Fall Creators Update&amp;rdquo;) to isolate Edge browser activity within a Hyper V container.  Microsoft now extends that same idea to Word, Excel, and PowerPoint in Office 365 ProPlus Microsoft 365 Apps for Enterprise on Windows 10&amp;hellip;&lt;/p&gt;
&lt;p&gt;&amp;hellip; if you have Microsoft 365 E5 or E5 Security.  You knew that was coming!&lt;/p&gt;
&lt;p&gt;With &lt;strong&gt;Application Guard for Office&lt;/strong&gt;, your files can open in a sandbox without access local or network storage.  This provides an additional layer of protection against threats such as ransomware, for which Office apps are infamous as an attack surface.  There&amp;rsquo;s a significant catch: a standard configuration of Application Guard &lt;em&gt;will&lt;/em&gt; allow users to bypass it if they say they trust the file, therefore executing it in the normal way; resource access included.  You can change this default behaviour though, so keep reading.&lt;/p&gt;</description>
    </item>
    <item>
      <title>The Difference Between Cloud App Security Discovery (CAD), Office 365 Cloud App Security (OCAS), and Microsoft Cloud App Security (MCAS)</title>
      <link>https://campbell.scot/the-difference-between-cloud-app-security-discovery-cad-office-365-cloud-app-security-ocas-and-microsoft-cloud-app-security-mcas/</link>
      <pubDate>Mon, 07 Sep 2020 19:15:17 +0000</pubDate>
      <guid>https://campbell.scot/the-difference-between-cloud-app-security-discovery-cad-office-365-cloud-app-security-ocas-and-microsoft-cloud-app-security-mcas/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Microsoft Cloud App Security&lt;/strong&gt; (MCAS), Redmond&amp;rsquo;s cloud app security broker (CASB) offering, is a powerful tool for investigating and pro-actively controlling your SaaS estate.  It includes tools such as reverse proxying to control sessions and sits inside the &lt;strong&gt;Microsoft Threat Protection&lt;/strong&gt; stack alongside Defender ATP, Office 365 ATP, and Azure ATP.  MCAS started life as Adallom prior to Microsoft&amp;rsquo;s acquisition of that company in 2015.  It&amp;rsquo;s included in Microsoft 365 E5 and numerous other licensing subsets, including EMS E5, E5 Security (an add-on for Microsoft 365 E3), Information Protection &amp;amp; Governance, or standalone.  In all cases, you&amp;rsquo;d need to make sure it includes or you also get a license for Azure AD Premium for the reverse proxy benefits, delivered via &lt;strong&gt;Conditional Access App Control&lt;/strong&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Microsoft Defender for Endpoint Web Content Filtering - Migrate Rules from Existing Security Software</title>
      <link>https://campbell.scot/microsoft-defender-atp-web-content-filtering-migrate-rules-from-existing-security-software/</link>
      <pubDate>Sat, 04 Jul 2020 14:15:32 +0000</pubDate>
      <guid>https://campbell.scot/microsoft-defender-atp-web-content-filtering-migrate-rules-from-existing-security-software/</guid>
      <description>&lt;p&gt;In my &lt;a href=&#34;https://campbell.scot/microsoft-defender-atp-web-content-filtering-administration-limitations-and-user-experience/&#34;&gt;last blog&lt;/a&gt;, I wrote about web content filtering in MDATP and how it now allows you to block website categories on the client across all apps.  Category blockers are great because, with one easy checkbox, you ban hundreds of thousands of dangerous on inappropriate websites.  Nothing is perfect, though, and anyone who&amp;rsquo;s ever worked a helpdesk or SOC will attest that false positives and false negatives are common.&lt;/p&gt;
&lt;p&gt;The engine for MDATP web content filtering is &lt;a href=&#34;https://www.cyren.com/&#34;&gt;Cyren&lt;/a&gt;, and you can check if a website is caught by its category rules using their online &lt;a href=&#34;https://www.cyren.com/security-center/url-category-check&#34;&gt;category check tool&lt;/a&gt;.  This takes a bit of time, as each check is subject to a &lt;a href=&#34;https://developers.google.com/recaptcha/docs/v3&#34;&gt;Google reCAPTCHA test&lt;/a&gt;.  If you&amp;rsquo;re migrating anything of scale to MDATP, you don&amp;rsquo;t have the time to do this, and also do not want to risk important websites later being swept up by category rules even if they are fine for now.  When you allowed or blocked websites on your existing solution, it&amp;rsquo;s assumed you&amp;rsquo;ve done the due diligence, and you want to take the remediation you&amp;rsquo;ve applied against those (potential) false positives and false negatives with you.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Microsoft Defender for Endpoint Web Content Filtering - Administration, Limitations, and User Experience</title>
      <link>https://campbell.scot/microsoft-defender-atp-web-content-filtering-administration-limitations-and-user-experience/</link>
      <pubDate>Sun, 28 Jun 2020 16:37:29 +0000</pubDate>
      <guid>https://campbell.scot/microsoft-defender-atp-web-content-filtering-administration-limitations-and-user-experience/</guid>
      <description>&lt;p&gt;Historically, one of the big features missing &amp;ldquo;out of the box&amp;rdquo; with MDATP was web content filtering.  Customers typically look at MDATP as an option when their existing endpoint security is due for license renewal, and compare their existing solution against it.  They would be moving from one of the big security vendors such as Sophos, Norton, and McAfee, which all supported web content filtering.  Higher lever stakeholders often listed the ability to block websites as essential, and as Microsoft did not maintain such a categorisation database, if you wanted it with Defender ATP, you&amp;rsquo;d be looking at other solutions too.  This took away from Defender ATP&amp;rsquo;s &amp;ldquo;single pane of glass&amp;rdquo; selling point.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
