This is my attempt on writing and learning about Microsoft Defender. I’ve been meaning to write about this since some time now and I guess this is the best time to do that as the importance of Security has been recognized than ever.
To start things off the main focus of the series is Microsoft Defender for Endpoint (MDE) as that has many features to talk about and many more are added literally everyday.
I would also like to focus on KQL (Kusto Query Language) as that is becoming the norm and able to provide more insights to Security admins.
I hope this series will be informative and will help you to learn something new.

Microsoft Defender for Identity – Install and Configure Sensors (Azure ATP Sensors)
I will cut to the chase. MDI or Microsoft Defender for Identity is a great tool for identifying Identity threats in the local AD environment. Once the sensor is setup, you can monitor for the behavior and have the ability … Continue reading Microsoft Defender for Identity – Install and Configure Sensors (Azure ATP Sensors)

How To Set Defender For Endpoint To Work In Parallel When Defender Is Not The Primary A/V In The Workstation/ Server
EDR in Block Mode EDR stands for Endpoint Detection and Response. MDE has the capability to work in parallel to the 3rd party A/V running in the device. While this will not provide 100% of the tasks done by an … Continue reading How To Set Defender For Endpoint To Work In Parallel When Defender Is Not The Primary A/V In The Workstation/ Server

How to Configure Attack Surface Reduction (ASR) Rules using MEM
In this section, I would like to discuss one of MDE’s important set of settings and how to set these up. Namely ASRs rules or Attarck Surface Reduction rules. As the name implies, it helps closes any security holes in … Continue reading How to Configure Attack Surface Reduction (ASR) Rules using MEM

I’ve completed the MDE Ninja Training and it was great!
It took me sometime, but finally completed the MDE Ninja training. I got to know about this course from a local user group meetup and it hit me. This certificate is not a standard Microsoft certificate, but I would say … Continue reading I’ve completed the MDE Ninja Training and it was great!

How to Onboard Windows Devices to Microsoft Defender for Endpoint
To start hunting for threats and act on alerts, first the devices in the organisation must be onboarded to MDE. There are few onboarding methods that suites the organisation and I will be showcasing the steps of the commonly used … Continue reading How to Onboard Windows Devices to Microsoft Defender for Endpoint

How to configure Microsoft Defender for Endpoint Advanced Features
In my previous article we saw how to enable roles and provide RBAC to specific groups. In this article I will explore on how to enable the advanced features in MDE so it will be on “God Mode” as I … Continue reading How to configure Microsoft Defender for Endpoint Advanced Features

Security Microsoft Defender for Endpoint Roles and Device Group Access
In this article of the Defender series, I would like to discuss about the MDE RBAC to reflect the least access principal. This will cover the Roles for MDE and Device Group Access As you may know the Least Privileged … Continue reading Security Microsoft Defender for Endpoint Roles and Device Group Access

Introduction to Microsoft Defender for Endpoint
To make things simpler I will be calling this as MDE. Of course that the industry level acronym for Defender for Endpoint. In an age where security is the very soul of the tech industry and basically any industry, Microsoft … Continue reading Introduction to Microsoft Defender for Endpoint