Likelihood to Recommend I would say, where it's well suited as certainly any device where you know that either you're potentially running a Kickstarter device as your own personal unit, but maybe you want to try to connect it to some resource like, "Hey, you know what? This is a small community device. Maybe I'll try connecting my email on the go." You're protected from that perspective with the vendor, even if it's something that might be a bit suspicious from a hardware perspective. There's also the case where any device that you know are running Defender for endpoint that you're good to go. You don't really have to worry about all the other solutions out there because Defender has recovered.
Read full review With around 80 users and 150 devices (including 6 server instances), this solution served us very well, with instant admin notifications and scheduled overall reports. Detection appears extremely reliable, and the memory and CPU footprint of the service seemed less intrusive than Panda, which we had issues running on Terminal Services instances, as it seems to hog excessive memory allocation. Rollout was smooth and we never had an instance of a corrupt installation.
Read full review Pros It integrates perfectly with Azure Sentinel. I mean, that's great. We can have a single pane of class with other platforms, like Defender for Cloud, Defender for endpoints, and Defender for servers, which is awesome as well. The ease of deployment is because Microsoft made sure around a year ago that every single workstation with Microsoft Windows came with Defender for Endpoints embedded. Read full review Hybrid deployment, can be on-prem or cloud specific, we are using cloud based Central Control Manager capabilities to have control about what happens in the environment No need to have internal infrastructure to host further than your workstations or terminals No need to have dedicated team for security or endpoint protection Maintenance and updates are available just as released, no need to take actions on that side Great capabilities as a connected threat defense platform Endpoint protection features and quality for SMBs Cloud and collaboration platforms compatible including Office 365, Google Mail and On-Cloud Storage Read full review Cons While it's a very good product for auditing, it has a very hard time to distinguish what is malicious and is an attack, what is not. Very rarely we get indication of a real malicious attack. We got lots of hours for off the shelf malware that it cleans up automatically. So basically we never get to look at it, which is a positive thing, but threats are detected by the third party endpoint, so it will not be enough by itself. Read full review Price increases regularly. When you actually want to uninstall the agent, sometimes it will refuse to do so. Luckily TM has a special uninstall tool if needed. Can take awhile to dial in the thresholds against false positives. Read full review Usability Installation and administration tools are fantastic. I found the endpoint policies to be not intuitive and clunky. The endpoint client was difficult to disable when trying to troubleshoot Apple issues and I often had to uninstall and then reinstall which was very time-consuming. Reporting is very useful and I was impressed with the reports I received.
Read full review Support Rating The first time I tried to onboard my macOS endpoints to MDE I struggled for quite a bit. I had to reach out to Microsoft's MDE support team. The tech was very helpful in walking me through the steps during a screen share session
Read full review The few times I needed to contact support I was fully satisfied. They worked all the way through the issue, no matter how long it took, and made sure I had a permanent solution. I was pleased with the professionalism, courteousness, and knowledge of the product they were supporting.
Read full review Alternatives Considered Tenable Security Center was a fantastic exposure detection tool but there was always a lag and servers would hang alot when being scanned causing resource traffic. Microsoft Defender for Endpoint on the other hand does not use up most resources soo there is usually noo lag during scanning and it also provide more detailed insights on the network. Also Microsoft Defender for Endpoint integration power has helped us up our security game by delivering a smooth secure network.
Read full review Avast was clunky, difficult to roll out, missed loads of malware on machines, and required that we purchase a separate license to install AV on our servers. Trend Micro could not have been any different. You just contact their sales department and get a demo, or even ask for a trial of sorts to test policy creations and client installation. You'll be obsessed with the whole process and the admin dashboard you have access to.
Read full review Return on Investment Positive : Microsoft Defender for Endpoint offers sophisticated threat detection and response capabilities, putting it into use helps increase security. Reduced security incidents, data breaches, and related expenses may arise from this. Positive : A more secure environment means less time and effort spent by IT and security teams on remediation and incident response. False Positives: Like any security solution, false positives can occur, leading to unnecessary investigations and potential disruptions to business operations. This may require additional resources to manage. Read full review It has stopped several malicious items from getting into our system. It's also saved money over our previous Anti-Virus solution (Kaspersky) Ease of Setup/Use Read full review ScreenShots Microsoft Defender for Endpoint Screenshots