Skip to content

Latest commit

 

History

History
73 lines (55 loc) · 4.2 KB

mde-planning-guide.md

File metadata and controls

73 lines (55 loc) · 4.2 KB
title description ms.service ms.author author ms.localizationpriority manager audience ms.collection ms.custom ms.topic ms.subservice search.appverid ms.date
Get started with your Microsoft Defender for Endpoint deployment
Learn how to get started with the deploy, setup, licensing validation, tenant configuration, network configuration stages.
defender-endpoint
siosulli
siosulli
medium
deniseb
ITPro
m365-security
m365solution-endpointprotect
m365solution-scenario
highpri
tier1
essentials-get-started
admindeeplinkDEFENDER
conceptual
onboard
met150
06/26/2024

Get started with your Microsoft Defender for Endpoint deployment

Applies to:

Want to experience Microsoft Defender for Endpoint? Sign up for a free trial.

[!Include defender-endpoint-setup-guide.md]

Maximize available security capabilities and better protect your enterprise from cyber threats by deploying Microsoft Defender for Endpoint and onboarding your devices. Onboarding your devices enables you to identify and stop threats quickly, prioritize risks, and evolve your defenses across operating systems and network devices.

This guide provides five steps to help deploy Defender for Endpoint as your multi-platform endpoint protection solution. It helps you choose the best deployment tool, onboard devices, and configure capabilities. Each step corresponds to a separate article.

The steps to deploy Defender for Endpoint are:

:::image type="content" source="/defender/media/defender-endpoint/onboard-mde.png" alt-text="The deployment steps" lightbox="/defender/media/defender-endpoint/onboard-mde.png":::

  1. Step 1 - Set up Microsoft Defender for Endpoint deployment: This step focuses on getting your environment ready for deployment.
  2. Step 2 - Assign roles and permissions: Identify and assign roles and permissions to view and manage Defender for Endpoint.
  3. Step 3 - Identify your architecture and choose your deployment method: Identify your architecture and the deployment method that best suits your organization.
  4. Step 4 - Onboard devices: Assess and onboard your devices to Defender for Endpoint.
  5. Step 5 - Configure capabilities: You're now ready to configure Defender for Endpoint security capabilities to protect your devices.

Important

Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.

Requirements

Here's a list of prerequisites required to deploy Defender for Endpoint:

  • You're a Global Administrator
  • Your environment meets the minimum requirements
  • You have a full inventory of your environment. The following table provides a starting point to gather information and ensure that stakeholders understand your environment. The inventory helps identify potential dependencies and/or changes required in technologies or processes.
What Description
Endpoint count Total count of endpoints by operating system.
Server count Total count of Servers by operating system version.
Management engine Management engine name and version (for example, System Center Configuration Manager Current Branch 1803).
CDOC distribution High level CDOC structure (for example, Tier 1 outsourced to Contoso, Tier 2 and Tier 3 in-house distributed across Europe and Asia).
Security information and event (SIEM) SIEM technology in use.

Next step

Start your deployment with Step 1 - Set up Microsoft Defender for Endpoint deployment

[!INCLUDE Microsoft Defender for Endpoint Tech Community]