|
|
|||
|
||||
OverviewGain an up-to-date, practical understanding of Microsoft Defender for Endpoint and learn how to run it reliably in real environments with this expert-led practitioner's guide. Purchase of the print or Kindle book includes a free PDF eBook Key Features Understand and compare Defender endpoint security capabilities on all supported operating systems Learn how to deal with complex deployment and configuration scenarios Find new ways of tuning the product to your specific environment Set yourself up for success by preparing for incidents with recommendations from seasoned professionals Book DescriptionModern organizations run on constantly changing endpoints, yet many teams still struggle to get the most out of Defender endpoint security. Coverage gaps, noisy detections, mixed platforms, and unclear device behavior often get in the way of effective prevention, detection, and response. This second edition helps you tackle those challenges directly. Updated for today’s Defender endpoint security, and the broader Microsoft Defender ecosystem, it shows how MDE works across clients, servers, and now mobile devices, and how to align deployments with real-world constraints. New chapters on mobile threat defense, production rollout, and tuning provide practical guidance for moving beyond pilot environments, handling edge cases, and protecting critical and legacy assets. Throughout, the book brings together IT and SecOps viewpoints to help you operate Defender for Endpoint with more clarity and less friction. You’ll learn how to maintain sensor health, interpret incidents confidently, reduce noise without weakening protection, and troubleshoot recurring issues. Whether you’re refining an existing deployment or planning a new one, this edition gives you a clearer path to making Defender for Endpoint a reliable part of your security program.What you will learn Explore the current Defender for Endpoint architecture and capabilities Clarify how next-gen protection, ASR, and EDR work together Prepare a deployment plan that fits your estate, risk, and existing tools Roll out Defender for Endpoint to production in staged, testable phases Protect mobile devices using Defender for Endpoint and MTD Tune alerts, exclusions, and policies for different scenarios and assets Support SecOps investigations using incidents, hunting, and device data Diagnose common health, connectivity, and performance issues in live estates Who this book is forThis book is for cybersecurity professionals, security engineers, incident responders, endpoint administrators, and IT pros who are responsible for planning, deploying, or operating Microsoft Defender for Endpoint. It assumes a basic understanding of systems management, endpoint security, security baselines, and networking. Returning readers get updated, real-world guidance plus new coverage of mobile devices, production rollouts, and tuning. New readers get a structured introduction from core concepts to deployment, operations, and troubleshooting. Full Product DetailsAuthor: Paul Snow , Ru Campbell , Ian Hoyle , Joe AnichPublisher: Packt Publishing Limited Imprint: Packt Publishing Limited Edition: 2nd Revised edition ISBN: 9781837026111ISBN 10: 1837026114 Pages: 610 Publication Date: 30 April 2026 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: In Print This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us. Table of ContentsTable of Contents A Brief History of Microsoft Defender for Endpoint Exploring Next-Generation Protection Introduction to Attack Surface Reduction Understanding Endpoint Detection and Response Defending Mobile Devices Planning and Preparing for Deployment Considerations for Deployment and Configuration Rolling Out to Production Tuning and SItuational Optimizations Managing and Maintaining the Security Posture Establishing Security Operations Troubleshooting Common Issues Reference Guide, Tips, and TricksReviewsAuthor InformationWith more than 20 years of industry experience and relevant certifications, Paul (Huijbregts) Snow has a long history of working with customers across the world, leveraging his passion for (Microsoft) security solutions – and being brutally honest about them. Working at Microsoft as a Principal Product Manager, he remains a seasoned technologist and a subject matter expert in endpoint and cloud security. He currently spearheads a team of product managers developing endpoint security features and solutions across operating systems and environments, focusing primarily on management and deployment. His motto is: “I drink beer and I know Microsoft security things.” Ruairidh (Ru) Campbell is a Microsoft MVP and Microsoft Security Practice Lead at Threatscape. There, he heads up a team of award-winning Microsoft security pros, and development of Overwatch, a Microsoft 365-centric security posture platform addressing the challenges of Entra, Defender, Intune, Purview, and Copilot. In the cybersecurity community, Ru runs the Microsoft 365 Security & Compliance user group and his blog, regularly speaks at other user groups and conferences, and publishes technical deep dives on YouTube. Ru holds a B.Sc. (Distinction) in computer networking from the University of the West of Scotland and, away from cybersecurity, spends his time with his wife and daughter (who he's trying, with mixed results, to grow into a fellow metalhead). Ian Hoyle worked in the IT field for over 30 years, since the inception of the internet in Australia, as a research scientist, a principal infrastructure architect at the world's largest mining company, and more recently at Microsoft, holding a number of technical roles, finally as a senior security technical specialist. His interest in IT security was triggered by a visit to Israel in 2016 for the internal launch of Seville, called Windows Defender Advanced Threat Protection on release. That moment changed his working career, thereafter completely focusing on Defender security. He received two BSc (Hons) degrees in theoretical physics and geophysics too long ago (!!) and then went on to receive a Ph.D. in geophysics. Like so many people in engineering and science, he ended up in IT and in the security field, which he loves. Joe Anich has 15 years of experience in the IT industry ranging from endpoint management with a focus on SCCM and Intune to endpoint security and incident response. Currently working on Microsoft's Detection and Response Team (DART), he works closely with customers during critical moments. Working in incident response has given Joe insight into SOC operations and how to help teams around the world improve their security posture as a whole. Outside of work, Joe enjoys running around the house with his 2-year-old son playing “chase me.” Fun fact: During the late 90s, Joe could be found at the roller-skating rink most Friday nights, gliding around the rink with a super rope in hand, maybe in JNCOs or Lee Pipes, vibing to 90s hip hop. Justen Graves is a security engineer with 14 years of IT experience. Most of his career has been focused on endpoint enablement and security, with the last 4 years spent at Microsoft. Currently working in Microsoft's Cyber Defense Operations Center, their internal SOC, he uses tools such as Microsoft Defender for Endpoint every day to defend corporate Microsoft from attack. Justen has a BS in cybersecurity and an MBA. He holds many industry certifications, including CISSP, PMP, and GSEC, and several Microsoft certifications, including Azure Solutions Architect Expert and Enterprise Administrator Expert. Starting his career at Walmart and managing to never relocate, he resides in Northwest Arkansas with his wife and three children. Tab Content 6Author Website:Countries AvailableAll regions |
||||