Windows Defender Guide
Windows Defender Guide
Defender for Office 365: Protects Microsoft 365 (formerly Office 365), including
Exchange, Outlook, files, and attachments. Guards against malicious threats
entering from email messages, links (URLs), and collaboration tools.
Defender for Cloud Apps: Protects cloud applications by providing deep visibility
searches, robust data controls, and advanced threat protection.
Devices: See alerts, breach activity, and other threats on devices connected to the
organization’s network.
Apps: Observe how cloud apps are being used in your organization.
Alerts: View alerts compiled from across the Microsoft 365 suite.
Advanced hunting: Scan for suspicious files, malware, and risky activities.
Secure score: Get a calculated score for your security configuration and
recommendations on how to improve your score.
Learning hub: Easily access Microsoft 365 security tutorials and other learning
materials.
Microsoft 365 Defender aggregates and organizes this monitoring data to provide IT
Support professionals details on where attacks began, which malicious tactics were
used, the scope of the attacks, and other related incident information.
Malware enters through social media: An employee clicks on an enticing link posted
on their favorite social media app. The link triggers an automatic download of a
malware file to the employee’s laptop.
Microsoft Defender for Endpoint monitors the employee’s laptop for suspicious
malware signatures. Upon detecting the malware, Defender for Endpoint alerts the
employee and the organization’s IT Support team about the malware and discloses its
endpoint location.
A virus enters a cloud drive through a file upload: An employee unknowingly uploads
an file that is infected with a virus to their work cloud storage drive. When the
employee opens the file from the cloud drive, the virus is activated and begins
changing the security settings on the other files in the employees cloud drive.
Microsoft Defender for Cloud Apps detects the unusual pattern of activity and
alerts the employee and IT Support team of the suspicious activity in the cloud
account.
Microsoft Defender for Office 365 - Lists included services and tools for various
product levels, as well as the types of threats it protects against.
Microsoft Defender for Cloud Apps - Provides product overview, quickstart reference
guide, tutorials, best practices, and additional resources.
How User Account Control works - User Account Control (UAC) is a fundamental
component of Microsoft's overall security vision. UAC helps mitigate the impact of
malware.