Microsoft Defender for Endpoint can now protect all devices
New functionality is currently available in the Public Preview of Defender for Endpoint
When you purchase through links on our site, we may earn an affiliate commission.Here’s how it works.
In its bid to further bolsterendpoint protection, the latest public preview ofMicrosoftDefender for Endpoint can now be used to protect unmanaged devices as well.
In a blog post, Microsoft reasons that it worked on the new functionality as the Bring Your Own Device (BYOD) paradigm has taken on new meaning in the new hybrid work environment.
“The riskiest threat is the one you don’t know about. Unmanaged devices are literally one of your weakest links…With work-from-home, the threat has grown exponentially, making discovering and applying security controls to these devices mission critical,” says David Weston, Microsoft’s director of enterprise and OS security.
We’re looking at how our readers use VPN for a forthcoming in-depth report. We’d love to hear your thoughts in the survey below. It won’t take more than 60 seconds of your time.
Click here to start the survey in a new window«
Unmanaged no more
Threat actors see a huge opportunity in unmanaged end-user devices as a means to get inside corporate networks. A compromised unmanaged device can be used as a launchpad to unleash broader attacks.
In fact, according to Microsoft’s chief information security officer Bret Arsenault said that users are 71% more likely to be infected on an unmanaged device. It points to theEquifax breachthat affected well over 100 million users arguing that it originated via an unpatched vulnerability on an internet-facing unmanaged server.
The new unmanaged endpoint discovery is designed to avoid situations like these. The functionality will help customers detect and report upon any device seen on a corporate network. These devices can then be on-boarded and secured by Microsoft Defender for Endpoint.
One of the interesting features of the new functionality is a built-in logic that can differentiate between corporate and personal networks to ensure it doesn’t accidentally show your private devices not controlled by the organization in the inventory list.
Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
In addition toWindows 10, Microsoft Defender for Endpoint works across other popular desktopoperating systemsincludingLinux, andmacOSas well as on portable devices powered byiOSandAndroid. Furthermore, you can also use it to protect network devices such asrouters, firewalls, WLAN controllers, and others.
Via:ZDNet
With almost two decades of writing and reporting on Linux, Mayank Sharma would like everyone to think he’sTechRadar Pro’sexpert on the topic. Of course, he’s just as interested in other computing topics, particularly cybersecurity, cloud, containers, and coding.
Phishing attacks surge in 2024 as cybercriminals adopt AI tools and multi-channel tactics
This new phishing strategy utilizes GitHub comments to distribute malware
Arcane season 2 finally gave us the huge Caitlyn and Vi moment we’ve been waiting for – and its creators say ‘we couldn’t have done it in season one’