Skip to main content

This browser is no longer supported.

Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.

Download Microsoft Edge More info about Internet Explorer and Microsoft Edge
Read in English
Read in English Edit
Twitter LinkedIn Facebook Email

Microsoft Defender for Endpoint documentation

Microsoft Defender for Endpoint delivers preventative protection, post-breach detection, automated investigation, and response.

Microsoft Defender for Endpoint

Overview

  • What is Microsoft Defender for Endpoint?
  • What is Defender for Endpoint plan 1?
  • Compare Defender for Endpoint plans

What's new

  • What's new in Microsoft Defender for Endpoint
  • Announcing Microsoft Defender for Endpoint Plan 1

video

  • Overview video

Evaluate & deploy the service

Get Started

  • Evaluate Microsoft Defender for Endpoint
  • Plan your deployment

Deploy

  • Deployment guide
  • Onboard supported devices
  • Set up and configure Defender for Endpoint Plan 1

How-To Guide

  • Migration guide

video

  • Onboarding video

Security operations

Overview

  • Endpoint detection and response
  • Behavioral blocking and containment
  • Automated investigation and response (AIR)
  • Advanced hunting
  • Microsoft Threat Experts
  • Threat analytics

Use Microsoft Defender for Endpoint on other platforms

Overview

  • Microsoft Defender for Endpoint on Mac
  • Microsoft Defender for Endpoint on iOS
  • Microsoft Defender for Endpoint on Linux
  • Microsoft Defender for Endpoint on Android

Reference

Reference

  • Management and APIs
  • Partner integration

Security administration

Overview

  • Microsoft Defender Vulnerability Management
  • Attack surface reduction
  • Next-generation protection
  • Previous Versions
  • Blog
  • Contribute
  • Privacy
  • Terms of Use
  • Trademarks
  • © Microsoft 2023
  • Previous Versions
  • Blog
  • Contribute
  • Privacy
  • Terms of Use
  • Trademarks
  • © Microsoft 2023