A Simple Guide to Microsoft Defender for Endpoint: Plans and Features

What is Microsoft Defender for Endpoint?

It’s surprising how often I speak to businesses about endpoint security, and many still see Microsoft Defender as just a “built-in antivirus” that couldn’t be all that good. But in reality, Microsoft Defender for Endpoint is a feature-packed, enterprise-grade security solution that many organizations already have access to through their Microsoft 365 subscription—often without realizing its full potential.

In this blog, we’ll explore why Defender for Endpoint stands out as more than just antivirus software. We’ll break down its plans, capabilities, and features to give you a better understanding of how this tool can strengthen your organization’s security posture.

A Powerful Security Solution Across Devices

Microsoft Defender for Endpoint works across multiple platforms—Windows, macOS, Linux, Android, and iOS—leveraging advanced technologies like machine learning, behavioural analytics, and cloud intelligence to safeguard your environment from a range of cyber threats.

One standout feature is how Defender integrates with Microsoft Secure Score, offering a clear snapshot of your organization’s security health. Secure Score provides actionable recommendations to help you enhance protection. The higher your score, the more secure your business is.

Microsoft Defender for Endpoint: The Plans

Microsoft Defender for Endpoint comes in two main versions: Plan 1 (P1) and Plan 2 (P2), with a special Defender for Servers option if you’re protecting server infrastructure. If you need even more advanced features, you can also add the Defender Vulnerability Management Add-on.

Which Plans Are Included in Your Microsoft 365 Subscription?

  • Microsoft 365 Business Standard: Doesn’t include any Defender for Endpoint features.
  • Microsoft 365 Business Premium: Comes with Plan 1 (P1), giving you essential protection like antivirus, attack surface reduction, web content filtering, and tamper protection.
  • Microsoft 365 E3: Comes with Plan 1 (P1), giving you essential protection like antivirus, attack surface reduction, web content filtering, and tamper protection.
  • Microsoft 365 E5: Offers the full package with Plan 2 (P2), which includes advanced capabilities like Endpoint Detection and Response, Threat and Vulnerability Management, and automated investigation and remediation.

1. Plan 1 (P1)

P1 is the essential package and perfect if you’re looking for strong, reliable security. Here’s what you get:

  • Next-Generation Protection: Built-in antivirus and anti-malware tools to protect you from new and known threats.
  • Tamper Protection: Stops anyone from messing with your security settings, so key protections stay on.
  • Attack Surface Reduction (ASR): Limits what apps, scripts, and macros can do, cutting down on risk from things like ransomware.
  • Web Content Filtering: Blocks unsafe websites to reduce the chance of malware or phishing.

Tamper Protection: Why ITamper Protection: Why It Matters

One of the most valuable features of Microsoft Defender for Endpoint is Tamper Protection. It makes sure that critical security settings—like real-time antivirus scanning and cloud-delivered protection—can’t be changed by unauthorized users or malware.

Key benefits of Tamper Protection:

  • Consistent Security: Keeps your security settings locked down, so they can’t be accidentally or maliciously altered.
  • Stops Attacks from Disabling Protections: Protects against malware that tries to switch off your defenses like antivirus or firewalls.
  • Peace of Mind: With Tamper Protection, you can rest easy knowing that your security setup stays as it should, with no surprises.

For example, if ransomware tries to disable your antivirus so malware can run, Tamper Protection steps in and blocks these changes, keeping your systems safe from potentially serious attacks.

https://learn.microsoft.com/en-gb/defender-endpoint/prevent-changes-to-security-settings-with-tamper-protection#requirements-for-managing-tamper-protection-in-the-microsoft-365-defender-portal

2. Plan 2 (P2)

Plan 2 takes things up a notch, adding advanced tools for those who need extra protection:

  • Endpoint Detection and Response (EDR): Real-time threat detection, investigations, and quick response to incidents.
  • Device Isolation: Remotely isolate infected devices to prevent malware from spreading across the network.
  • Automated Investigation and Remediation: Defender uses AI to investigate alerts and fix problems without needing manual intervention.
  • Device Grouping & High-Priority Devices: Organize your devices for better management, and mark key devices (like exec laptops) as high priority to get faster responses to alerts.
  • Threat and Vulnerability Management (TVM): Continuously scan for vulnerabilities and get recommendations for fixes, all tied into your Secure Score.


Defender for Servers: Protecting Your Server Environment

In addition to protecting personal devices like laptops and mobile phones, Microsoft Defender for Servers is specifically designed to secure your Windows and Linux servers. Servers often hold critical data, so it’s essential to keep them protected.

There are two plans for servers:

Defender for Servers Plan 1

Plan 1 offers solid protection for your servers with features like:

  • Next-Generation Protection: Antivirus and anti-malware for detecting malicious activity.
  • Attack Surface Reduction (ASR): Helps minimize attack opportunities by controlling risky behaviours.
  • Integration with Azure Security Centre: Get a central dashboard to manage and secure your servers.

Defender for Servers Plan 2

Plan 2 takes things to the next level, giving you advanced tools like:

  • Endpoint Detection and Response (EDR): Get real-time visibility and quickly respond to incidents on your servers.
  • Threat and Vulnerability Management (TVM): Scan your servers for vulnerabilities and get actionable steps to fix them.
  • File Integrity Monitoring (FIM): Track any unauthorized changes to critical system files.
  • Just-in-Time (JIT) VM Access: Reduce the time window for accessing VMs, limiting the chance of unauthorized access.

https://learn.microsoft.com/en-us/azure/defender-for-cloud/plan-defender-for-servers-select-plan


Defender Vulnerability Management: Plans and Capabilities

Microsoft Defender for Endpoint also provides robust Vulnerability Management capabilities through the Defender Vulnerability Management Add-on. It ensures continuous detection and mitigation of vulnerabilities in your devices and servers. Here’s a breakdown of what each plan offers:

CapabilityDefender for Endpoint Plan 2 (Core TVM Features)Defender Vulnerability Management Add-on (Premium)Defender Vulnerability Management Standalone (for any EDR)
Device discovery
Device inventory
Vulnerability assessment
Configuration assessment
Risk-based prioritization
Remediation tracking
Continuous monitoring
Software inventory
Software usage insights
Security baselines assessment
Block vulnerable applications
Browser extensions assessment
Digital certificate assessment
Network share analysis
Hardware and firmware assessment
Authenticated scan for Windows

https://learn.microsoft.com/en-us/defender-vulnerability-management/defender-vulnerability-management-capabilities

https://learn.microsoft.com/en-us/defender-vulnerability-management/tvm-browser-extensions


Why Many Customers Aren’t Fully Using Microsoft Defender for Endpoint

Despite Microsoft Defender for Endpoint consistently being recognized as a leader in the Gartner Magic Quadrant for the past five years, I’ve found that many customers don’t take full advantage of all the features it offers.

Microsoft Defender for Endpoint does so much more than just act as an antivirus. It’s packed with powerful tools like real-time threat detection, automated remediation, and vulnerability management. Despite all this, a lot of organizations still treat it as basic antivirus protection and miss out on everything it offers.

By leveraging all the features mentioned in this blog, businesses can take their security to the next level. Whether it’s better organizing devices, securing your network, or monitoring threats in real time, using these tools helps create a solid, proactive security strategy. That’s what makes Defender for Endpoint a true game-changer for companies today

https://www.microsoft.com/en-us/security/blog/2024/09/25/microsoft-is-named-a-leader-in-the-2024-gartner-magic-quadrant-for-endpoint-protection-platforms/


Key Features Across All Plans

Here’s a closer look at some of the top features available across the different Defender for Endpoint plans:

1. Attack Surface Reduction (ASR)

ASR helps reduce the number of ways attackers can get into your system by controlling how apps, scripts, and macros interact. This is particularly useful for stopping things like ransomware or fileless malware attacks before they can do damage.

https://learn.microsoft.com/en-us/defender-endpoint/attack-surface-reduction-rules-reference

2. Device Isolation

If you spot a compromised device, Device Isolation allows you to cut it off from the network remotely to stop any malware from spreading. This is a game-changer in the event of an attack.

Use Case: Let’s say a laptop starts acting strangely and showing signs of a ransomware attack. You can isolate it immediately, stopping the attack in its tracks while your team investigates.

3. Tamper Protection

Tamper Protection prevents unauthorized changes to key security settings, keeping your protections intact. This feature blocks both malware and unauthorized users from disabling critical protections like real-time antivirus, ensuring your defences stay in place.

Benefits:

  • Stops attackers from turning off security settings like antivirus or firewall protection.
  • Ensures consistent protection by preventing accidental or malicious changes.
  • Peace of mind knowing that your security settings are locked down.

Use Case: For example, if ransomware tries to disable antivirus protections, Tamper Protection steps in to block these changes, keeping your devices safe

4. Device Grouping

Grouping devices makes it easy to manage your security. You can organize devices by department, risk level, or role and apply specific policies to each group.

Use Case: You can group all devices in the finance department under stricter security policies since they handle sensitive financial data, while leaving general office devices under standard security measures.

5. Marking Devices as High Priority

This feature is super handy for ensuring that critical devices get the attention they need. Marking a device as high priority means it gets monitored more closely, and any security alerts for that device are flagged for faster responses.

Use Case: Marking the CEO’s laptop or key company servers as high priority means any security incidents related to those devices will be treated with extra urgency.

5. Threat and Vulnerability Management (TVM)

TVM is always on the lookout for vulnerabilities on your devices and servers. It ranks them based on how risky they are and gives you recommendations for how to fix them, all while helping you improve your Secure Score.


Final Thoughts

Microsoft Defender for Endpoint is a lot more than just antivirus software—it’s a full security platform that helps you stay on top of cyber threats. Whether you’re securing laptops, mobile devices, or critical servers, Defender gives you the tools you need to manage and monitor your entire environment.

With advanced features like Device Isolation, Threat and Vulnerability Management, and Attack Surface Reduction, Defender for Endpoint helps you take a proactive approach to security, ensuring your organization stays protected from modern cyber threats.

Enhancing Security with Azure Key Vault and Automated Password Rotation

Introduction

In the digital age, safeguarding your digital assets has never been more critical. Static passwords, especially when reused across multiple platforms, present a significant security risk. This blog post delves into how Azure Key Vault and automated password rotation can drastically reduce this risk, securing your environment against potential threats.

The Perils of Static Passwords

The use of a single password across your environment can significantly amplify the risk of cyber attacks. This practice not only increases your attack surface but also simplifies the job for cyber attackers, making it easier for them to compromise your systems.

Overview: Setting the Stage for Security

To embark on enhancing your security with automated password rotation, you’ll need the following Azure components:

  • Virtual Machine: For demonstration, a Windows 2019 VM deployed in Azure.
  • Azure Key Vault: Acts as the secure vault for your automated password secrets.
  • Automation Account: Hosts the runbook that will manage the password update process.

I’ll skip the details of setting up a virtual machine, assuming everyone is familiar with this process.

Azure Key Vault: Centralizing Digital Security

Azure Key Vault stands out as a pivotal tool in managing and securing digital secrets, including passwords. It centralizes the management of secret keys, reducing the chances of unauthorized access and exposure.

Setting Up Azure Key Vault

  1. Navigate to the Azure Portal: Log in to your account.
  2. Create a Key Vault: Search for “Key Vault” in the marketplace and fill in the necessary details like name, region, and resource group.
  3. Access Configuration: Under permissions, select “Vault Access Policy.” For Resource Access, choose “Azure Virtual Machines for deployment.”
  4. Managing Secrets: After creation, go to the “Secrets” section. Click “+ Generate/Import” to create a secret for the VM password. Add both a name and the secret value.

Automating Password Rotation: A Step-by-Step Guide

Automated password rotation is crucial for maintaining security, particularly for sensitive roles. Below is a PowerShell script tailored for Azure environments to automate this process, utilizing Azure Key Vault for secure password management.

Configuring Azure Automation

  1. Create an Automation Account: In the Azure Portal, create a new Automation Account, specifying the same subscription and, optionally, the same resource group as your Key Vault.
  2. Advanced: Under the advanced section ensure “System Assigned” identities is ticked, complete the creation of the Automation Account.
  3. Import Necessary Modules: Your Automation Account needs specific modules to interact with VMs and Key Vault. Ensure you import Az.Accounts, Az.Compute, and Az.KeyVault modules. Navigate to your Automation Account, select “Modules” under “Shared Resources”, and add these modules if they’re not already present.

Setting Permissions and Preparing the Runbook

After configuring the essential components, it’s crucial to establish the correct permissions to ensure secure and seamless operation between your Azure services.

Assigning Necessary Permissions

  1. Virtual Machine Access: Grant the “Virtual Machine Contributor” role to the Automation Account which will allow it management capabilities over the virtual machine.
  2. Enabling Automation from VM: Within the Virtual Machine’s security settings, locate the “Identity” option. Assign the “Automation Contributor” role to the Virtual Machine itself, enabling it to interact efficiently with the Automation Account.
  3. Securing Key Vault Access: Go to your Azure Key Vault and access the “Access Policies” section. Here, you’ll add a new policy. Ensure it includes “Get,” “List,” and “Set” permissions for secrets, and assign this policy to your Automation Account. This step is pivotal in securing and managing access to the passwords stored within the Key Vault.

Crafting the Runbook

With permissions in place, the next action is to create a runbook within your Automation Account. This runbook will be the engine behind the automated password rotation, executing the necessary scripts to update and secure your environment.

  1. Initiate Runbook Creation: In the Automation Account dashboard, look for the option to create a new runbook. Click on this to start the setup.
  2. Configure Runbook Settings:
    • Name: Assign a distinctive name to your runbook, making it easily identifiable.
    • Runbook Type: Select “Powershell” as the type, aligning with the scripting language of our automation script.
    • Runtime Version: Opt for the latest stable version, 7.2, to ensure compatibility and leverage the latest features.
    • Description: Provide a brief yet descriptive summary of the runbook’s purpose and its role in the password rotation process.

Script for Automated Password Rotation

The new automated password will be a 16 character alphanumeric password contains numbers, letters, and special characters.

# Authenticate using Managed Identity
Connect-AzAccount -Identity

# Define variables for your environment
$resourceGroupName = "YourResourceGroupName" # Your VM's resource group
$vmName = "YourVMName" # Your VM's name
$vaultName = "YourKeyVaultName" # Your Key Vault's name
$secretName = "YourSecretName" # Your secret's name for storing the VM password
$location = "YourVMLocation" # Your VM's location
$username = "localadmin" # The VM's admin username (change if different)

# Function to generate a new password
function Generate-Password {
param ([int]$length = 16)
$characters = 'ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789!@#$%^&*()'
$securePassword = New-Object System.Security.SecureString
1..$length | ForEach-Object {
$char = $characters[(Get-Random -Maximum $characters.Length)]
$securePassword.AppendChar($char)
}
return $securePassword
}

# Generate a new password and convert it to plaintext for VM extension
$securePassword = Generate-Password
$plaintextPassword = [Runtime.InteropServices.Marshal]::PtrToStringAuto([Runtime.InteropServices.Marshal]::SecureStringToBSTR($securePassword))

# Update the VM's local administrator password
try {
$protectedSettings = @{ "username" = $username; "password" = $plaintextPassword }
Set-AzVMExtension -ResourceGroupName $resourceGroupName -VMName $vmName `
-Location $location -Name 'VMAccessAgent' `
-Publisher 'Microsoft.Compute' -ExtensionType 'VMAccessAgent' `
-TypeHandlerVersion '2.4' -ProtectedSettings $protectedSettings
Write-Output "VM Access Extension set successfully."
} catch {
Write-Error "Failed to set VM Access Extension. Error: $_"
}

# Store the new password in Azure Key Vault
try {
$secretValue = ConvertTo-SecureString -String $plaintextPassword -AsPlainText -Force
Set-AzKeyVaultSecret -VaultName $vaultName -Name $secretName -SecretValue $secretValue
Write-Output "Key Vault secret updated successfully."
} catch {
Write-Error "

}

Ensure to replace the placeholder values with your actual environment details before running the script. This script automates the process of generating a secure password, updating the VM’s password, and securely storing the new password in Azure Key Vault.

Finalizing and Executing Your Automation Strategy

With your runbook configured and ready, the next steps involve saving your work, publishing the runbook, and initiating the password rotation process. These actions represent the culmination of your efforts to enhance your system’s security through automation.

Saving and Publishing the Runbook

  1. Save Your Work: After entering the script and configuring the runbook, ensure you save your progress. This action preserves the script for future adjustments or reviews.
  2. Publish the Runbook: Publishing makes your runbook active and ready for execution. This crucial step transitions your runbook from a draft to a live script capable of automating the password rotation process.

Executing the Runbook

  • Run the Runbook: Initiate the runbook to start the automated password rotation. This process will generate a new password, apply it to your virtual machine, and update the Azure Key Vault with the new password secret.

Monitoring Execution and Outputs

Upon running the runbook, monitor its execution status. Successful completion will be indicated by a ‘Completed’ status, confirming the password rotation has been effectively carried out.

  • Successful Execution: A ‘Completed’ status assures that the automated process has successfully updated the VM’s password and stored the new credential in Azure Key Vault without issues.
  • Troubleshooting Failures: If you encounter a ‘Failed’ status, it may be necessary to revisit the script and check for any inaccuracies in the placeholder variables or configuration settings. Ensuring all specified values accurately reflect your Azure environment is critical for a successful automation process.

Automating for Consistency

For full automation and to ensure continuous security enhancement, you can schedule the runbook to run on a scheduled basis. This step allows you to automate the password rotation process completely, ensuring that your virtual machine’s password is regularly updated without manual intervention.

Retrieving Your Updated Password from Azure Key Vault

  1. Navigate to Azure Key Vault: First, log into your Azure Portal and go to the Azure Key Vault that you’ve used to store the secret (the password).
  2. Access the Secrets Section: Inside your Key Vault, locate and click on the “Secrets” section found on the panel. This section lists all the secrets that your Key Vault is managing.
  3. Find Your Secret: Look for the secret name you designated for storing the VM’s password. This name was specified when you set up the Key Vault and the automation script.
  4. View the Secret Version: Click on the specific secret associated with your VM’s password. You may see multiple versions if the password has been rotated more than once. Each version corresponds to a password change, with the latest version representing the most current password.
  5. Show Secret Value: To view the password, select the latest version of the secret and then click on the “Show Secret Value” option. This action will reveal the password so that you can use it to access your VM or for other necessary purposes.

Conclusion: Elevating Security Through Automation

In an era where digital security breaches are not just probable but inevitable, taking proactive measures to safeguard our digital assets becomes paramount. Through the integration of Azure Key Vault and automated password rotation, we’ve explored a powerful strategy to enhance security infrastructure, making it more resilient against potential cyber threats. This approach not only mitigates the risk associated with static passwords but also aligns with best practices for identity and access management in the cloud.