Setup guides for Microsoft Defender XDR
Applies to:
- Microsoft Defender XDR
Setup guides for Microsoft Defender XDR deployment give you tailored guidance and resources for planning and deploying security controls for your tenant, apps, and services.
All setup guides are available in the Microsoft 365 admin center and in the Microsoft 365 Setup portal.
Setup guides
Setup guides in the admin center require authentication to a Microsoft 365 tenant as an administrator or other role with access to the admin center, but guides in the Microsoft 365 Setup portal can be accessed by anyone. The following table provides links to both locations for each guide, where available.
Defender | Deployment guide description | Link in the Setup Portal | Link in the Admin Center |
---|---|---|---|
Microsoft Defender for Endpoint | Provides instructions that will help your enterprise network prevent, detect, investigate, and respond to advanced threats. Make an informed assessment of your organization's vulnerability and decide which deployment package and configuration methods are best. Note: A Microsoft Volume License is required for Microsoft Defender for Endpoint. |
Link | Link (may require sign-in) |
Microsoft Defender for Office 365 | Provides you with the resources and information to help you prepare and identify the Defender for Office 365 plan to fit your organization's needs. | Link | Link (may require sign-in) |
Microsoft Defender for Cloud Apps | Provides easy to follow deployment and management guidance to set up your Cloud Discovery solution. With Cloud Discovery, you'll integrate your supported security apps, and then you'll use traffic logs to dynamically discover and analyze the cloud apps that your organization uses. You'll also set up features available through the Defender for Cloud Apps solution, including threat detection policies to identify high-risk use, information protection policies to define access, and real-time session controls to monitor activity. With these features, your environment gets enhanced visibility, control over data movement, and analytics to identify and combat cyberthreats across all your Microsoft and third-party cloud services. | Link | Link (may require sign-in) |
Microsoft Defender for Identity | Provides security solution set-up guidance to identify, detect, and investigate advanced threats that might compromise your on-premises user identities. These include detecting suspicious user activities and malicious insider actions directed at your organization. You'll create a Defender for Identity instance, connect to your organization's on-premises Active Directory, and then set up sensors, alerts, notifications, and configure your unique portal preferences. | Link | Link (may require sign-in) |
Related topics
- Microsoft Defender XDR overview
- Turn on Microsoft Defender XDR
- Deploy supported services
- Microsoft Defender for Endpoint overview
- Microsoft Defender for Office 365 overview
- Microsoft Defender for Cloud Apps overview
- Microsoft Defender for Identity overview
Tip
Do you want to learn more? Engage with the Microsoft Security community in our Tech Community: Microsoft Defender XDR Tech Community.