{"id":19464,"date":"2023-08-03T02:15:02","date_gmt":"2023-08-03T02:15:02","guid":{"rendered":"https:\/\/www.insentragroup.com\/au\/insights\/uncategorized\/the-complete-guide-to-microsoft-defender-for-endpoint\/"},"modified":"2024-10-25T03:08:43","modified_gmt":"2024-10-25T03:08:43","slug":"the-complete-guide-to-microsoft-defender-for-endpoint","status":"publish","type":"post","link":"https:\/\/www.insentragroup.com\/au\/insights\/geek-speak\/secure-workplace\/the-complete-guide-to-microsoft-defender-for-endpoint\/","title":{"rendered":"The Complete Guide to Microsoft Defender for Endpoint"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"19464\" class=\"elementor elementor-19464\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1f6309b elementor-section-content-middle elementor-section-stretched elementor-hidden-tablet elementor-hidden-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1f6309b\" data-element_type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wider\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-ea48069\" data-id=\"ea48069\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-41dbb36 elementor-widget elementor-widget-heading\" data-id=\"41dbb36\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">The Complete Guide to Microsoft Defender for Endpoint<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-34b8293 elementor-widget elementor-widget-button\" data-id=\"34b8293\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#dpwnloadpdf\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download eBook<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-064bd0e\" data-id=\"064bd0e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ed2f8bb elementor-widget elementor-widget-image\" data-id=\"ed2f8bb\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"655\" height=\"501\" src=\"https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/design_heading_microsoft_defender_2.png\" class=\"attachment-large size-large wp-image-19468\" alt=\"Australia | The Complete Guide to Microsoft Defender for Endpoint\" srcset=\"https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/design_heading_microsoft_defender_2.png 655w, https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/design_heading_microsoft_defender_2-300x229.png 300w\" sizes=\"(max-width: 655px) 100vw, 655px\" style=\"width:100%;height:76.49%;max-width:655px\" title=\"design_heading_microsoft_defender_2.png\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c2847d1 elementor-section-content-middle elementor-section-stretched elementor-hidden-desktop elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c2847d1\" data-element_type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c111554\" data-id=\"c111554\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4ec2e29 elementor-widget elementor-widget-image\" data-id=\"4ec2e29\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"655\" height=\"501\" src=\"https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/design_heading_microsoft_defender_2.png\" class=\"attachment-medium_large size-medium_large wp-image-19468\" alt=\"Australia | The Complete Guide to Microsoft Defender for Endpoint\" srcset=\"https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/design_heading_microsoft_defender_2.png 655w, https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/design_heading_microsoft_defender_2-300x229.png 300w\" sizes=\"(max-width: 655px) 100vw, 655px\" style=\"width:100%;height:76.49%;max-width:655px\" title=\"design_heading_microsoft_defender_2.png\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0e26870 elementor-widget elementor-widget-heading\" data-id=\"0e26870\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">The Complete Guide to Microsoft Defender for Endpoint<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d04a532 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"d04a532\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#dpwnloadpdf\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download eBook<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5fe98a3 elementor-section-content-middle elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5fe98a3\" data-element_type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b067cef\" data-id=\"b067cef\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e255da1 elementor-widget elementor-widget-text-editor\" data-id=\"e255da1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In today\u2019s digital landscape, where cyber threats are constantly evolving and becoming increasingly sophisticated, the need for robust cybersecurity solutions has never been more critical. Organisations and individuals alike face the daunting task of safeguarding their sensitive data, digital assets and operations from the relentless onslaught of cybercrime.<\/p><p>To combat these challenges, Microsoft offers a comprehensive suite of security tools and features called Microsoft 365 Defender. At the heart of this suite lies a powerful weapon in the fight against cyber threats &#8211; Microsoft Defender for Endpoint.<\/p><p>Microsoft Defender for Endpoint is an enterprise endpoint security platform that goes beyond traditional antivirus protection. It is a cutting-edge, cloud-powered solution designed to proactively prevent, detect, investigate and respond to advanced threats across multiple platforms. By leveraging the latest in behavioural sensors, cloud security analytics, and threat intelligence, Defender for Endpoint empowers organisations to stay ahead of the curve and maintain a strong security posture.<\/p><p>In this comprehensive guide, we will take you on a journey through the world of Microsoft Defender for Endpoint. We will explore its inner workings, unveil its remarkable features, and showcase real-world examples of its efficacy in thwarting cyber threats. Additionally, we will delve into the migration process, helping organisations smoothly transition to this state-of-the-art security solution.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0a70443 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0a70443\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wider\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-b747b89\" data-id=\"b747b89\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ea6a44a elementor-widget elementor-widget-shortcode\" data-id=\"ea6a44a\" data-element_type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\"><div class=\"side-author\">\r\n\t\t\t<p><img decoding=\"async\" src=\"https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2022\/10\/Jonathan-Hazelden-150x150.png\" class=\"rounded-circle\" data-info=\"https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2022\/10\/Jonathan-Hazelden.png\" alt=\"\" title=\"\"><\/p>\r\n\t\t\t<h2 class=\"text-center\"><span class=\"author\">Jonathan Hazelden<\/span> - 03.08.2023<span class=\"publish-date d-none\">20230803<\/span><\/h2>\r\n\t\t\t\r\n\t\t\t<div class=\"mb-2\"><a href=\"https:\/\/www.insentragroup.com\/au\/about-insentra\/meet-the-crew\/jonathan-hazelden\/\" class=\"btn btn-primary btn-block btn-lg py-3 rounded-0 border-0\">View Insentra Profile<\/a><\/div>\r\n\t\t\t\r\n\t\t\t<div class=\"mb-2\"><a href=\"https:\/\/www.insentragroup.com\/au\/insights\/insights-search-results\/?author=Jonathan Hazelden\" class=\"btn btn-default btn-block btn-lg py-3 rounded-0 border-0\">View Insights<\/a><\/div>\r\n\t\t<\/div><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-7c583e4\" data-id=\"7c583e4\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fa2fc6d elementor-widget elementor-widget-heading\" data-id=\"fa2fc6d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Table of Contents<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-224aff4 elementor-widget elementor-widget-text-editor\" data-id=\"224aff4\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"#sectiontitle1\"><strong>WHAT IS MICROSOFT 365 DEFENDER?<\/strong><\/a><\/p><p><a href=\"#sectiontitle2\"><strong>HOW IT WORKS<\/strong><\/a><\/p><p><a href=\"#sectiontitle3\"><strong>FEATURES AND BENEFITS<\/strong><\/a><\/p><p><a href=\"#sectiontitle4\"><strong>CYBER CRIME STATISTICS<\/strong><\/a><\/p><p><a href=\"#sectiontitle5\"><strong>MICROSOFT DEFENDER FOR ENDPOINT<\/strong><\/a><\/p><p><a href=\"#sectiontitle6\"><strong>HOW IT WORKS<\/strong><\/a><\/p><p><a href=\"#sectiontitle7\"><strong>FEATURES AND BENEFITS<\/strong><\/a><\/p><p><a href=\"#sectiontitle8\"><strong>MIGRATING TO DEFENDER FOR ENDPOINT<\/strong><\/a><\/p><p><a href=\"#sectiontitle9\"><strong>REAL-WORLD EXAMPLE<\/strong><\/a><\/p><p><a href=\"#sectiontitle10\"><strong>LICENSING <\/strong><\/a><\/p><p><a href=\"#sectiontitle11\"><strong>CONCLUSION<\/strong><\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7f50e83 elementor-section-content-middle elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7f50e83\" data-element_type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8fc2236\" data-id=\"8fc2236\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-38bac99 elementor-widget elementor-widget-heading\" data-id=\"38bac99\" data-element_type=\"widget\" id=\"sectiontitle1\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">WHAT IS MICROSOFT 365 DEFENDER? <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-515b05c elementor-widget elementor-widget-text-editor\" data-id=\"515b05c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Microsoft 365 Defender is a unified pre- and post-breach enterprise defence suite that natively coordinates detection, prevention, investigation and response across endpoints, identities, email, and applications to provide integrated protection against sophisticated attacks. The following image displays the complete array of products within the Microsoft 365 Defender suite.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6dbe380 elementor-widget elementor-widget-image\" data-id=\"6dbe380\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"4500\" height=\"2099\" src=\"https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/Microsoft-Defender-Diagram-01.png\" class=\"attachment-full size-full wp-image-19469\" alt=\"Australia | The Complete Guide to Microsoft Defender for Endpoint\" srcset=\"https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/Microsoft-Defender-Diagram-01.png 4500w, https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/Microsoft-Defender-Diagram-01-300x140.png 300w, https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/Microsoft-Defender-Diagram-01-1024x478.png 1024w, https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/Microsoft-Defender-Diagram-01-768x358.png 768w, https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/Microsoft-Defender-Diagram-01-1536x716.png 1536w, https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/Microsoft-Defender-Diagram-01-2048x955.png 2048w, https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/Microsoft-Defender-Diagram-01-1568x731.png 1568w\" sizes=\"(max-width: 4500px) 100vw, 4500px\" style=\"width:100%;height:46.64%;max-width:4500px\" title=\"Microsoft-Defender-Diagram-01.png\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-a43df5d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a43df5d\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-d9b655e\" data-id=\"d9b655e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-b947bb6\" data-id=\"b947bb6\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c48ebad elementor-widget elementor-widget-html\" data-id=\"c48ebad\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<iframe width=\"1080\" height=\"570\" src=\"https:\/\/www.youtube.com\/embed\/JZxtLrQ1K0E\" title=\"Microsoft Defender Series: What is Microsoft Defender?\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-2934350\" data-id=\"2934350\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-04f4817 elementor-section-content-middle elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"04f4817\" data-element_type=\"section\" id=\"sectiontitle2\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-088c85b\" data-id=\"088c85b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-348c267 elementor-section-content-top elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"348c267\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-c32739f\" data-id=\"c32739f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-58dff95 elementor-widget elementor-widget-image\" data-id=\"58dff95\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"710\" height=\"533\" src=\"https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/UD_0823_img_1.png\" class=\"attachment-large size-large wp-image-19470\" alt=\"Australia | The Complete Guide to Microsoft Defender for Endpoint\" srcset=\"https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/UD_0823_img_1.png 710w, https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/UD_0823_img_1-300x225.png 300w\" sizes=\"(max-width: 710px) 100vw, 710px\" style=\"width:100%;height:75.07%;max-width:710px\" title=\"UD_0823_img_1.png\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-7734b9d\" data-id=\"7734b9d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-34bd323 elementor-widget elementor-widget-heading\" data-id=\"34bd323\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">HOW IT WORKS <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4f21941 elementor-widget elementor-widget-text-editor\" data-id=\"4f21941\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Microsoft 365 Defender uses behavioural sensors, cloud security analytics, and threat intelligence to prevent, detect, and respond to advanced threats on different platforms. It provides real-time protection against advanced threats on endpoints and helps detect and investigate identity-based attacks in real time. It also offers vulnerability management and assessment, attack surface reduction, automatic investigation and remediation and managed hunting services.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ba75bb9 elementor-section-content-middle elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ba75bb9\" data-element_type=\"section\" id=\"sectiontitle3\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-de7aeeb\" data-id=\"de7aeeb\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-d7d9562 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d7d9562\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-4713782\" data-id=\"4713782\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-1523cd0\" data-id=\"1523cd0\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b91211d elementor-widget elementor-widget-html\" data-id=\"b91211d\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<iframe width=\"1080\" height=\"570\" src=\"https:\/\/www.youtube.com\/embed\/hbc-aniqVE0\" title=\"Microsoft Defender Series: Defending all 360\u00b0 of M365\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-703e19c\" data-id=\"703e19c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-475b3e4 elementor-widget elementor-widget-heading\" data-id=\"475b3e4\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">FEATURES AND BENEFITS <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-45bfe7b elementor-widget elementor-widget-text-editor\" data-id=\"45bfe7b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Let us cover six ways organisations can use Microsoft 365 Defender to enhance their overall security posture.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-eb90a1d elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"eb90a1d\" data-element_type=\"section\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-8438565\" data-id=\"8438565\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6840a80 elementor-widget elementor-widget-image\" data-id=\"6840a80\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/UD_0823_img_3.png\" class=\"attachment-full size-full wp-image-19471\" alt=\"Australia | The Complete Guide to Microsoft Defender for Endpoint\" srcset=\"https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/UD_0823_img_3.png 200w, https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/UD_0823_img_3-150x150.png 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" style=\"width:100%;height:100%;max-width:200px\" title=\"UD_0823_img_3.png\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-506ead7\" data-id=\"506ead7\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-74571c9 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"74571c9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Threat Detection and Response:<\/strong> Microsoft 365 Defender utilises advanced threat intelligence and machine learning algorithms to detect and respond to various cyber threats. It continuously monitors and analyses data across endpoints, email, and cloud applications to identify suspicious activities, malware and other indicators of compromise. This enables organisations to quickly detect and respond to potential cyberattacks, minimising the impact of security incidents.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-4aba98d elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4aba98d\" data-element_type=\"section\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-791dfe8\" data-id=\"791dfe8\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-be22391 elementor-widget elementor-widget-image\" data-id=\"be22391\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/UD_0823_img_4.png\" class=\"attachment-full size-full wp-image-19472\" alt=\"Australia | The Complete Guide to Microsoft Defender for Endpoint\" srcset=\"https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/UD_0823_img_4.png 200w, https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/UD_0823_img_4-150x150.png 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" style=\"width:100%;height:100%;max-width:200px\" title=\"UD_0823_img_4.png\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-47fd890\" data-id=\"47fd890\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-59e4af4 elementor-widget elementor-widget-text-editor\" data-id=\"59e4af4\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Endpoints:<\/strong> Microsoft Defender for Endpoint (MDE), provides comprehensive endpoint protection against a wide range of threats on different device types, such as laptop and mobile devices. MDE runs Next Generation Protection on the local devices and provides real-time data to the Defender cloud service. By securing endpoints, organisations can significantly reduce the risk of successful cyberattacks.<\/p><p>Defender for Endpoint is already part of the Windows operating system which makes the devices easy to configure and onboard to the Defender cloud service, depending on how you manage your Windows endpoints, Defender can be integrated with Microsoft Intune to easily onboard and configure devices using relevant policies. MDE also supports macOS, Linux, iOS, and Android.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-649864f elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"649864f\" data-element_type=\"section\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-b957730\" data-id=\"b957730\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3abf71c elementor-widget elementor-widget-image\" data-id=\"3abf71c\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/UD_0823_img_5.png\" class=\"attachment-full size-full wp-image-19473\" alt=\"Australia | The Complete Guide to Microsoft Defender for Endpoint\" srcset=\"https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/UD_0823_img_5.png 200w, https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/UD_0823_img_5-150x150.png 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" style=\"width:100%;height:100%;max-width:200px\" title=\"UD_0823_img_5.png\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-f6208ce\" data-id=\"f6208ce\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d9c6582 elementor-widget elementor-widget-text-editor\" data-id=\"d9c6582\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Email and documents:<\/strong> Microsoft Defender for Office 365 safeguards organisations against email-based threats, including phishing attempts, malicious attachments, and business email compromise (BEC) attacks. It employs advanced threat intelligence, anti-phishing technologies, real-time link scanning to detect and block malicious emails, protecting users from falling victim to cybercrime through email-based attacks.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-fc02c5a elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"fc02c5a\" data-element_type=\"section\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-3f0ac63\" data-id=\"3f0ac63\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7b4b737 elementor-widget elementor-widget-image\" data-id=\"7b4b737\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/UD_0823_img_6.png\" class=\"attachment-full size-full wp-image-19474\" alt=\"Australia | The Complete Guide to Microsoft Defender for Endpoint\" srcset=\"https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/UD_0823_img_6.png 200w, https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/UD_0823_img_6-150x150.png 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" style=\"width:100%;height:100%;max-width:200px\" title=\"UD_0823_img_6.png\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-507d65d\" data-id=\"507d65d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2ba2299 elementor-widget elementor-widget-text-editor\" data-id=\"2ba2299\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Identities:<\/strong> Microsoft Defender for Identity and Entra ID (Azure Active Directory) help organisations enhance their identity and access management practices. It enables organisations to enforce strong authentication, implement multi-factor authentication (MFA) and manage access controls to prevent unauthorised access to sensitive resources. By securing user identities, organisations can thwart common cybercrime tactics, such as unauthorised access and credential theft. The Defender portal will receive signals from Entra ID and endpoints, as well as Active Directory domain controllers in a hybrid environment. This way Defender can alert to potential compromised accounts and behaviour anomalies from your Active Directory.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-7560581 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7560581\" data-element_type=\"section\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-48e1842\" data-id=\"48e1842\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c303f9f elementor-widget elementor-widget-image\" data-id=\"c303f9f\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/UD_0823_img_7.png\" class=\"attachment-full size-full wp-image-19475\" alt=\"Australia | The Complete Guide to Microsoft Defender for Endpoint\" srcset=\"https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/UD_0823_img_7.png 200w, https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/UD_0823_img_7-150x150.png 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" style=\"width:100%;height:100%;max-width:200px\" title=\"UD_0823_img_7.png\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-ed1e22c\" data-id=\"ed1e22c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4a1468c elementor-widget elementor-widget-text-editor\" data-id=\"4a1468c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Cloud Apps:<\/strong> Microsoft Defender for Cloud Apps (MDAC) provides visibility and control over 25,000 cloud applications, including Office 365, detecting and mitigating risks associated with cloud usage. It helps organisations identify and respond to potential data breaches, unauthorised access, and risky user behaviours within cloud services. MDAC is used with Conditional Access policies to manage what activities users can perform on their devices, for example blocking of downloads from the company OneDrive to a personal computer. By monitoring and securing cloud applications, organisations can better protect their data and mitigate cloud-related cyber risks.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-a6fb4e0 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a6fb4e0\" data-element_type=\"section\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-54aa6f7\" data-id=\"54aa6f7\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c595ee6 elementor-widget elementor-widget-image\" data-id=\"c595ee6\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/UD_0823_img_8.png\" class=\"attachment-full size-full wp-image-19476\" alt=\"Australia | The Complete Guide to Microsoft Defender for Endpoint\" srcset=\"https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/UD_0823_img_8.png 200w, https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/UD_0823_img_8-150x150.png 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" style=\"width:100%;height:100%;max-width:200px\" title=\"UD_0823_img_8.png\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-7d5511d\" data-id=\"7d5511d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6e765da elementor-widget elementor-widget-text-editor\" data-id=\"6e765da\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Unified Security Management:<\/strong> The Microsoft 365 Defender portal offers a centralised management console for monitoring and managing security across services within the Microsoft 365 Defender suite. It provides a unified view of security events, alerts, and recommendations, enabling organisations to streamline their security operations and respond effectively to cyber threats.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-c0e3d7a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c0e3d7a\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-753bd7b\" data-id=\"753bd7b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c61400e elementor-widget elementor-widget-image\" data-id=\"c61400e\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1195\" height=\"578\" src=\"https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/Microsoft-Defender-Insentra-Asset-2.jpg\" class=\"attachment-full size-full wp-image-19477\" alt=\"Australia | The Complete Guide to Microsoft Defender for Endpoint\" srcset=\"https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/Microsoft-Defender-Insentra-Asset-2.jpg 1195w, https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/Microsoft-Defender-Insentra-Asset-2-300x145.jpg 300w, https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/Microsoft-Defender-Insentra-Asset-2-1024x495.jpg 1024w, https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/Microsoft-Defender-Insentra-Asset-2-768x371.jpg 768w\" sizes=\"(max-width: 1195px) 100vw, 1195px\" style=\"width:100%;height:48.37%;max-width:1195px\" title=\"Microsoft-Defender-Insentra-Asset-2.jpg\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-304ea92 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"304ea92\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-978d82c\" data-id=\"978d82c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-a88ac21\" data-id=\"a88ac21\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d106e5d elementor-widget elementor-widget-html\" data-id=\"d106e5d\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<iframe width=\"1080\" height=\"570\" src=\"https:\/\/www.youtube.com\/embed\/V7rQF0IKdGo\" title=\"Microsoft Defender Series: Unraveling the Importance of Security\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-ef190b2\" data-id=\"ef190b2\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-20a7132 elementor-section-content-middle elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"20a7132\" data-element_type=\"section\" id=\"sectiontitle4\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f8a88d5\" data-id=\"f8a88d5\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c1658c3 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"c1658c3\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">CYBER CRIME STATISTICS<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-481deae elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"481deae\" data-element_type=\"section\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-6216c9d\" data-id=\"6216c9d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d66bb9f elementor-widget elementor-widget-image\" data-id=\"d66bb9f\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/UD_0823_img_9.png\" class=\"attachment-full size-full wp-image-19478\" alt=\"Australia | The Complete Guide to Microsoft Defender for Endpoint\" srcset=\"https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/UD_0823_img_9.png 200w, https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/UD_0823_img_9-150x150.png 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" style=\"width:100%;height:100%;max-width:200px\" title=\"UD_0823_img_9.png\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-a790b02\" data-id=\"a790b02\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-73d0700 elementor-widget elementor-widget-text-editor\" data-id=\"73d0700\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Global<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b8fb38d elementor-widget elementor-widget-text-editor\" data-id=\"b8fb38d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"23\" data-list-defn-props=\"{&quot;335551500&quot;:15884578,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\">The global annual cost of cybercrime is predicted to reach $8 trillion annually<br \/>in 2023<\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"23\" data-list-defn-props=\"{&quot;335551500&quot;:15884578,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\">The next five years are due to see a 15% increase in cybercrime costs reaching<br \/>10.5 trillion by 2025<\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"23\" data-list-defn-props=\"{&quot;335551500&quot;:15884578,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\">80% of reported cyber crimes are generally attributed to phishing attacks in<br \/>the technology sector<\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"23\" data-list-defn-props=\"{&quot;335551500&quot;:15884578,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\">Cybercrime earns cybercriminals $1.5 trillion every year. Small businesses<br \/>account for 43% of cyber attacks annually<\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"23\" data-list-defn-props=\"{&quot;335551500&quot;:15884578,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\">2021 was one of the costliest years in terms of data breaches through<br \/>phishing attacks in the last 17 years<\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"23\" data-list-defn-props=\"{&quot;335551500&quot;:15884578,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\">Ransomware will cost its victims around $265 billion annually by 2031<\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"23\" data-list-defn-props=\"{&quot;335551500&quot;:15884578,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\">Around 236 million ransomware attacks occurred globally in the first half of<br \/>2022.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-c076001 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c076001\" data-element_type=\"section\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-d42f955\" data-id=\"d42f955\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-65a484e elementor-widget elementor-widget-image\" data-id=\"65a484e\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/UD_0823_img_10.png\" class=\"attachment-full size-full wp-image-19479\" alt=\"Australia | The Complete Guide to Microsoft Defender for Endpoint\" srcset=\"https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/UD_0823_img_10.png 200w, https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/UD_0823_img_10-150x150.png 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" style=\"width:100%;height:100%;max-width:200px\" title=\"UD_0823_img_10.png\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-a8360a3\" data-id=\"a8360a3\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-78183d6 elementor-widget elementor-widget-text-editor\" data-id=\"78183d6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>US<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-801f5aa elementor-widget elementor-widget-text-editor\" data-id=\"801f5aa\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"23\" data-list-defn-props=\"{&quot;335551500&quot;:15884578,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\">Data breaches cost businesses an average of $4.35 million in 2022<\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"23\" data-list-defn-props=\"{&quot;335551500&quot;:15884578,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\">1 in 2 American internet users had their accounts breached in 2021<\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"23\" data-list-defn-props=\"{&quot;335551500&quot;:15884578,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\">53.35% of US citizens were affected by cybercrime in the first half of 2022<\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"23\" data-list-defn-props=\"{&quot;335551500&quot;:15884578,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\">Around 1 in 10 US organisations have no insurance against cyber-attacks<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-ed2b9a2 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ed2b9a2\" data-element_type=\"section\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-a28b4b9\" data-id=\"a28b4b9\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5431f03 elementor-widget elementor-widget-image\" data-id=\"5431f03\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/UD_0823_img_11.png\" class=\"attachment-full size-full wp-image-19480\" alt=\"Australia | The Complete Guide to Microsoft Defender for Endpoint\" srcset=\"https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/UD_0823_img_11.png 200w, https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/UD_0823_img_11-150x150.png 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" style=\"width:100%;height:100%;max-width:200px\" title=\"UD_0823_img_11.png\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-64ab3d2\" data-id=\"64ab3d2\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-762cd88 elementor-widget elementor-widget-text-editor\" data-id=\"762cd88\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>UK<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-00827a2 elementor-widget elementor-widget-text-editor\" data-id=\"00827a2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>39% of UK businesses reported suffering a cyber-attack in 2022<\/li><li>The average cost of a cyber-attack for a smaller business is \u00a34200 with the cost to medium and large businesses rising to \u00a319,400 and that doesn\u2019t take into account the potential damage to the businesses reputation and loss of confidence from clients and consumers<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-660b722 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"660b722\" data-element_type=\"section\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-657fbe0\" data-id=\"657fbe0\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d242f5a elementor-widget elementor-widget-image\" data-id=\"d242f5a\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/UD_0823_img_12.png\" class=\"attachment-full size-full wp-image-19481\" alt=\"Australia | The Complete Guide to Microsoft Defender for Endpoint\" srcset=\"https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/UD_0823_img_12.png 200w, https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/UD_0823_img_12-150x150.png 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" style=\"width:100%;height:100%;max-width:200px\" title=\"UD_0823_img_12.png\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-a5cfb02\" data-id=\"a5cfb02\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4f8b4a7 elementor-widget elementor-widget-text-editor\" data-id=\"4f8b4a7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>AUS<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:276}\">\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6ff1eb0 elementor-widget elementor-widget-text-editor\" data-id=\"6ff1eb0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"23\" data-list-defn-props=\"{&quot;335551500&quot;:15884578,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\">There is a rise in the average cost per cybercrime report to over $39,000 for small businesses, $88,000 for medium businesses, and over $62,000 for large businesses. An average increase of 14%<\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"23\" data-list-defn-props=\"{&quot;335551500&quot;:15884578,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\">Ransomware attacks have increased by nearly 500% since the start of the COVID-19 pandemic<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-bdd40b3 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"bdd40b3\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-5348950\" data-id=\"5348950\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5ffb056 elementor-widget elementor-widget-text-editor\" data-id=\"5ffb056\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>References:<\/strong><br \/><a href=\"https:\/\/www.getastra.com\/blog\/security-audit\/cyber-crime-statistics\/\" target=\"_blank\" rel=\"noopener nofollow\">Top Cyber Crime Statistics 2023<\/a><br \/><a href=\"https:\/\/eftsure.com\/statistics\/cyber-crime-statistics\/\" target=\"_blank\" rel=\"noopener nofollow\">Critical Cyber Crime Statistics in Australia 2023<\/a><br \/><a href=\"https:\/\/nbcc.police.uk\/crime-prevention\/cyber-and-fraud\" target=\"_blank\" rel=\"noopener nofollow\">National Business Crime Centre<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f571f24 elementor-section-content-middle elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f571f24\" data-element_type=\"section\" id=\"sectiontitle5\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e7059d3\" data-id=\"e7059d3\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3900045 elementor-widget elementor-widget-heading\" data-id=\"3900045\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">MICROSOFT DEFENDER FOR ENDPOINT <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-17bfd39 elementor-widget elementor-widget-text-editor\" data-id=\"17bfd39\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Earlier in the guide we discussed all the products in the Defender suite and this section will dive deeper into Microsoft Defender for Endpoint and its features and give some real-world examples.<\/p><p>Microsoft Defender for Endpoint is an enterprise endpoint security platform designed to help enterprise networks prevent, detect, investigate, and respond to advanced threats. It is an industry-leading, cloud-powered endpoint security solution that helps to secure against ransomware, file-less malware and other sophisticated attacks across platforms.<\/p><p>Defender for Endpoint uses a combination of technology built into Windows and Microsoft\u2019s robust cloud service. It offers advanced post-breach detection sensors collecting a vast array of behavioural signals from your machines. It also offers next-generation antimalware, attack surface reduction rules, device control (such as USB), endpoint firewall, network protection, web control \/ category-based URL blocking, device-based conditional access and controlled folder access.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6ffb127 elementor-section-content-middle elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6ffb127\" data-element_type=\"section\" id=\"sectiontitle6\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b41a493\" data-id=\"b41a493\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-19dc7f8 elementor-widget elementor-widget-heading\" data-id=\"19dc7f8\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">HOW IT WORKS <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-106be57 elementor-widget elementor-widget-image\" data-id=\"106be57\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"4501\" height=\"2099\" src=\"https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/Microsoft_Defender_for_Endpoint_Builtin_cloud-powered.png\" class=\"attachment-full size-full wp-image-19482\" alt=\"Australia | The Complete Guide to Microsoft Defender for Endpoint\" srcset=\"https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/Microsoft_Defender_for_Endpoint_Builtin_cloud-powered.png 4501w, https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/Microsoft_Defender_for_Endpoint_Builtin_cloud-powered-300x140.png 300w, https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/Microsoft_Defender_for_Endpoint_Builtin_cloud-powered-1024x478.png 1024w, https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/Microsoft_Defender_for_Endpoint_Builtin_cloud-powered-768x358.png 768w, https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/Microsoft_Defender_for_Endpoint_Builtin_cloud-powered-1536x716.png 1536w, https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/Microsoft_Defender_for_Endpoint_Builtin_cloud-powered-2048x955.png 2048w, https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/Microsoft_Defender_for_Endpoint_Builtin_cloud-powered-1568x731.png 1568w\" sizes=\"(max-width: 4501px) 100vw, 4501px\" style=\"width:100%;height:46.63%;max-width:4501px\" title=\"Microsoft_Defender_for_Endpoint_Builtin_cloud-powered.png\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4911268 elementor-widget elementor-widget-text-editor\" data-id=\"4911268\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Microsoft Defender for Endpoint uses behavioural sensors to monitor system activities and detect suspicious behaviour. It also uses cloud security analytics to identify potential threats in real time. Threat intelligence is used to identify known threats and provide insights into new ones. Microsoft Defender for Endpoint also offers vulnerability management and assessment capabilities that help businesses discover security vulnerabilities and prioritise them with security recommendations.<\/p><p>Microsoft Defender for Endpoint can operate as Microsoft Endpoint Detection and Response (EDR) to form a security solution that helps organisations detect and respond to advanced threats on their endpoints. It provides real-time visibility into security incidents and provides automated responses to remediate threats. Microsoft Defender for Endpoint is an EDR solution that uses behavioural sensors, cloud security analytics, and threat intelligence to prevent, detect, and respond to advanced threats on Windows, Linux, Mac, iOS, and Android devices. It also offers vulnerability management and assessment, attack surface reduction, automatic investigation and remediation, and managed hunting services.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ea739cb elementor-section-content-middle elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ea739cb\" data-element_type=\"section\" id=\"sectiontitle7\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-825c112\" data-id=\"825c112\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9bbe35e elementor-widget elementor-widget-heading\" data-id=\"9bbe35e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">FEATURES AND BENEFITS <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-3792bf9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3792bf9\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-1536a87\" data-id=\"1536a87\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-702cc2a\" data-id=\"702cc2a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-eb2d011 elementor-widget elementor-widget-html\" data-id=\"eb2d011\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<iframe width=\"1080\" height=\"570\" src=\"https:\/\/www.youtube.com\/embed\/b21uOQU6aFA\" title=\"Microsoft Defender Series: Defending What Matters\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-409a33b\" data-id=\"409a33b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-97c4c11 elementor-widget elementor-widget-text-editor\" data-id=\"97c4c11\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Microsoft Defender for Endpoint offers a wide range of features and benefits that help protect your organisation from advanced threats. It delivers preventive protection, post-breach detection, automated investigation and response for endpoints. It has two plans: Plan 1 and Plan 2.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-b4a2777 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b4a2777\" data-element_type=\"section\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-9325796\" data-id=\"9325796\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9f62cff elementor-widget elementor-widget-image\" data-id=\"9f62cff\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"250\" height=\"355\" src=\"https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/UD_0823_img_13.png\" class=\"attachment-full size-full wp-image-19483\" alt=\"Australia | The Complete Guide to Microsoft Defender for Endpoint\" srcset=\"https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/UD_0823_img_13.png 250w, https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/UD_0823_img_13-211x300.png 211w\" sizes=\"(max-width: 250px) 100vw, 250px\" style=\"width:100%;height:142%;max-width:250px\" title=\"UD_0823_img_13.png\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-cb40890\" data-id=\"cb40890\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d070ed0 elementor-widget elementor-widget-text-editor\" data-id=\"d070ed0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b>Plan 1 offers capabilities such as:<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:276}\">\u00a0<\/b><\/p><ul><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"23\" data-list-defn-props=\"{&quot;335551500&quot;:15884578,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"5\" data-aria-level=\"1\"><strong>Advance security features:<\/strong> Next-generation protection (includes<br \/>antimalware and antivirus)<\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"23\" data-list-defn-props=\"{&quot;335551500&quot;:15884578,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"5\" data-aria-level=\"1\"><strong>Attack surface reduction:<\/strong> Reduces the attack surface, for example<br \/>blocking MS office products from creating child processes<\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"23\" data-list-defn-props=\"{&quot;335551500&quot;:15884578,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"5\" data-aria-level=\"1\"><strong>Manual response actions:<\/strong> For example, isolating a device by disconnecting<br \/>it from the organisations network<\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"23\" data-list-defn-props=\"{&quot;335551500&quot;:15884578,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"5\" data-aria-level=\"1\">Centralised management in the Microsoft 365 Defender portal<\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"23\" data-list-defn-props=\"{&quot;335551500&quot;:15884578,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"5\" data-aria-level=\"1\"><strong>Security reports:<\/strong> Easy access to information about detected threats and<br \/>actions to address those threats<\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"23\" data-list-defn-props=\"{&quot;335551500&quot;:15884578,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"5\" data-aria-level=\"1\"><strong>Device Compatability:<\/strong> Support for Windows 10, Windows 11, iOS, Android,<br \/>macOS, and Linux devices<\/li><\/ul><div>The diagram below shows Plan 1 (orange) and Plan 2 features<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-f95f57c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f95f57c\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-00ab625\" data-id=\"00ab625\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ffd54c0 elementor-widget elementor-widget-image\" data-id=\"ffd54c0\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"4501\" height=\"2400\" src=\"https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/Microsoft_Defender_for_Endpoint_plan_1_capabilities.png\" class=\"attachment-full size-full wp-image-19484\" alt=\"Australia | The Complete Guide to Microsoft Defender for Endpoint\" srcset=\"https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/Microsoft_Defender_for_Endpoint_plan_1_capabilities.png 4501w, https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/Microsoft_Defender_for_Endpoint_plan_1_capabilities-300x160.png 300w, https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/Microsoft_Defender_for_Endpoint_plan_1_capabilities-1024x546.png 1024w, https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/Microsoft_Defender_for_Endpoint_plan_1_capabilities-768x410.png 768w, https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/Microsoft_Defender_for_Endpoint_plan_1_capabilities-1536x819.png 1536w, https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/Microsoft_Defender_for_Endpoint_plan_1_capabilities-2048x1092.png 2048w, https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/Microsoft_Defender_for_Endpoint_plan_1_capabilities-1568x836.png 1568w\" sizes=\"(max-width: 4501px) 100vw, 4501px\" style=\"width:100%;height:53.32%;max-width:4501px\" title=\"Microsoft_Defender_for_Endpoint_plan_1_capabilities.png\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-890046e elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"890046e\" data-element_type=\"section\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-e98d413\" data-id=\"e98d413\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a06b138 elementor-widget elementor-widget-image\" data-id=\"a06b138\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"250\" height=\"355\" src=\"https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/UD_0823_img_14.png\" class=\"attachment-full size-full wp-image-19485\" alt=\"Australia | The Complete Guide to Microsoft Defender for Endpoint\" srcset=\"https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/UD_0823_img_14.png 250w, https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/UD_0823_img_14-211x300.png 211w\" sizes=\"(max-width: 250px) 100vw, 250px\" style=\"width:100%;height:142%;max-width:250px\" title=\"UD_0823_img_14.png\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-94a8d9b\" data-id=\"94a8d9b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9a1c5f5 elementor-widget elementor-widget-text-editor\" data-id=\"9a1c5f5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b>Plan 2 has all of the Defender for Endpoint Plan 1 capabilities, plus:<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:360,&quot;335559739&quot;:60,&quot;335559740&quot;:276,&quot;335559991&quot;:360}\">\u00a0<\/b><\/p><ul><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"23\" data-list-defn-props=\"{&quot;335551500&quot;:15884578,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><strong>Threat and vulnerability management:<\/strong> Using sensors within the tool, Microsoft Defender for Endpoint will discover, prioritise and remediate misconfigurations within the endpoints in real-time. Using insight into application usage patterns, Microsoft Defender for Endpoint can prioritise the highest value assets, such as business-critical applications, confidential data and highest value users against these types of attacks<\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"23\" data-list-defn-props=\"{&quot;335551500&quot;:15884578,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><strong>Device discovery:<\/strong> Helps you find unmanaged devices connected to your corporate network without the need for extra appliances<\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"23\" data-list-defn-props=\"{&quot;335551500&quot;:15884578,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><strong>Device inventory:<\/strong> Shows a list of the devices in your network where alerts were generated. By default, the queue displays devices seen in the last 30 days. At a glance you\u2019ll see information such as domain, risk level, OS platform and other details for easy identification of devices most at risk<\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"23\" data-list-defn-props=\"{&quot;335551500&quot;:15884578,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><strong>Threat Analytics:<\/strong> A set of reports from expert Microsoft security researchers covering the most relevant threats. Each report provides a detailed analysis of a threat and extensive guidance on how to defend against that threat. It also incorporates data from your network, indicating whether the threat is active and if you have applicable protections in place<\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"23\" data-list-defn-props=\"{&quot;335551500&quot;:15884578,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><strong>Automated Investigation and Response (AIR)<\/strong>: AIR capabilities are designed to examine alerts and take immediate action to resolve breaches automatically and without the need for manual intervention by a security analyst. AIR capabilities significantly reduce alert volume, allowing security operations to focus on more sophisticated threats and other high-value initiatives<\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"23\" data-list-defn-props=\"{&quot;335551500&quot;:15884578,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><strong>Advanced hunting:<\/strong> Advanced hunting is a threat-hunting tool that uses specially constructed queries (using Kusto Query Language) to examine the past 30 days of event data in Microsoft 365 Defender. Organisations can use advanced hunting queries to inspect unusual activity, detect possible threats, and even respond to attacks. For example, lookup processes that performed LDAP authentication with clear text passwords on endpoints<\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"23\" data-list-defn-props=\"{&quot;335551500&quot;:15884578,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><strong>Endpoint Detection and Response (EDR):<\/strong> When a threat is detected, alerts are created in the system for an analyst to investigate. Alerts with the same attack techniques or attributed to the same attacker are aggregated into an entity called an incident. Aggregating alerts in this manner makes it easy for analysts to collectively investigate and respond to threats<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-eeee9e8 elementor-section-content-middle elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"eeee9e8\" data-element_type=\"section\" id=\"sectiontitle8\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c9821e2\" data-id=\"c9821e2\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-228a600 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"228a600\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-65fec95\" data-id=\"65fec95\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-c563f50\" data-id=\"c563f50\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8505124 elementor-widget elementor-widget-html\" data-id=\"8505124\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<iframe width=\"1080\" height=\"570\" src=\"https:\/\/www.youtube.com\/embed\/6KYVvvRC2xA\" title=\"Microsoft Defender Series: Endpoint Defense Demystified\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-a7ab33c\" data-id=\"a7ab33c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-ac3f631 elementor-widget elementor-widget-heading\" data-id=\"ac3f631\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">MIGRATING TO DEFENDER FOR ENDPOINT <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d96ec37 elementor-widget elementor-widget-text-editor\" data-id=\"d96ec37\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>At Insentra, we are working with many customers looking to migrate from third party endpoint protection products to Microsoft Defender to streamline and simplify their security solutions and operations.<\/p><p>By including Defender for Endpoint as part of the operating system in Windows, Microsoft have streamlined the migration and onboarding process.<\/p><p>Devices can be on-boarded into Microsoft Defender for Endpoint while running a third-party endpoint protection solution. This enables an organisation to run for a period of coexistence, while collecting security signals from endpoints and without reducing their security posture. When ready, the organisation can remove the third-party agent which automatically puts Microsoft Defender into active mode, leaving no gap in protection.<\/p><p>The high-level migration process from an existing 3rd part solution is broken down into 3 phases.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-69a10bf elementor-section-content-middle elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"69a10bf\" data-element_type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-93187d6\" data-id=\"93187d6\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-72b8d91\" data-id=\"72b8d91\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-76d9d72 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"76d9d72\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"185\" height=\"185\" src=\"https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/microsoft_d_num_1.png\" class=\"attachment-large size-large wp-image-19486\" alt=\"Australia | The Complete Guide to Microsoft Defender for Endpoint\" srcset=\"https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/microsoft_d_num_1.png 185w, https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/microsoft_d_num_1-150x150.png 150w\" sizes=\"(max-width: 185px) 100vw, 185px\" style=\"width:100%;height:100%;max-width:185px\" title=\"microsoft_d_num_1.png\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-b6dfe36\" data-id=\"b6dfe36\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1218dda elementor-widget elementor-widget-heading\" data-id=\"1218dda\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">PHASE 1 - PREPARE<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b860783 elementor-widget elementor-widget-text-editor\" data-id=\"b860783\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Update devices<\/li><li>Prepare you team<\/li><li>Configure device proxy and internet settings<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-2301011\" data-id=\"2301011\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4eb7e8a elementor-section-content-middle elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4eb7e8a\" data-element_type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-e89b873\" data-id=\"e89b873\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-9bcad27\" data-id=\"9bcad27\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a688aba elementor-widget elementor-widget-image\" data-id=\"a688aba\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"185\" height=\"185\" src=\"https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/microsoft_d_num_2.png\" class=\"attachment-large size-large wp-image-19487\" alt=\"Australia | The Complete Guide to Microsoft Defender for Endpoint\" srcset=\"https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/microsoft_d_num_2.png 185w, https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/microsoft_d_num_2-150x150.png 150w\" sizes=\"(max-width: 185px) 100vw, 185px\" style=\"width:100%;height:100%;max-width:185px\" title=\"microsoft_d_num_2.png\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-e10f8db\" data-id=\"e10f8db\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b27223e elementor-widget elementor-widget-heading\" data-id=\"b27223e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">PHASE 2 - SETUP<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d931ff1 elementor-widget elementor-widget-text-editor\" data-id=\"d931ff1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Re-install Microsoft Defender Antivirus (if<br \/>required) *MDE is part of the OS in Windows<br \/>10\/11, so typically is still installed but disabled<\/li><li>Onboard devices and enable Microsoft Defender<br \/>Antivirus in passive mode<\/li><li>Run a detection test to confirm that onboarding<br \/>was successful<\/li><li>Configure policies and settings<\/li><li>Get updates for Microsoft Defender Antivirus<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-5c7b126\" data-id=\"5c7b126\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7afbcd3 elementor-section-content-middle elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7afbcd3\" data-element_type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-232aadc\" data-id=\"232aadc\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-3f8932c\" data-id=\"3f8932c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2567607 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"2567607\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"185\" height=\"185\" src=\"https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/microsoft_d_num_3.png\" class=\"attachment-large size-large wp-image-19488\" alt=\"Australia | The Complete Guide to Microsoft Defender for Endpoint\" srcset=\"https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/microsoft_d_num_3.png 185w, https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/microsoft_d_num_3-150x150.png 150w\" sizes=\"(max-width: 185px) 100vw, 185px\" style=\"width:100%;height:100%;max-width:185px\" title=\"microsoft_d_num_3.png\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-2e8d4c6\" data-id=\"2e8d4c6\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c7751b9 elementor-widget elementor-widget-heading\" data-id=\"c7751b9\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">PHASE 3 - SWITCH <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a2456e9 elementor-widget elementor-widget-text-editor\" data-id=\"a2456e9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Uninstall non-Microsoft endpoint<br \/>protection product<\/li><li>Switch Defender Antivirus to active mode<\/li><li>Run a simulation to prove end-to-end<br \/>protection<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-6637ba0\" data-id=\"6637ba0\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-329798a elementor-section-content-middle elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"329798a\" data-element_type=\"section\" id=\"sectiontitle9\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f82fbd9\" data-id=\"f82fbd9\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-191c4da elementor-widget elementor-widget-heading\" data-id=\"191c4da\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">REAL-WORLD EXAMPLE <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-df0d8e7 elementor-widget elementor-widget-text-editor\" data-id=\"df0d8e7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Consider a medium-sized company using Microsoft Defender for Endpoint as part of their cybersecurity strategy. They have numerous endpoints (desktops and laptops) used by employees for day-to-day work. Let\u2019s look at a scenario where an employee at a company receives a malicious email containing a disguised link, which if clicked, will trigger a ransomware attack.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-420deb0 elementor-widget elementor-widget-text-editor\" data-id=\"420deb0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b style=\"font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-size: 1rem;\">Here\u2019s how Microsoft 365 Defender can intervene and stop the attack:<\/b><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-da262a8 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"da262a8\" data-element_type=\"section\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-066beb3\" data-id=\"066beb3\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ece8106 elementor-widget elementor-widget-image\" data-id=\"ece8106\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/UD_0823_img_15.png\" class=\"attachment-full size-full wp-image-19489\" alt=\"Australia | The Complete Guide to Microsoft Defender for Endpoint\" srcset=\"https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/UD_0823_img_15.png 200w, https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/UD_0823_img_15-150x150.png 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" style=\"width:100%;height:100%;max-width:200px\" title=\"UD_0823_img_15.png\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-af601c8\" data-id=\"af601c8\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0dd3429 elementor-widget elementor-widget-text-editor\" data-id=\"0dd3429\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Email Protection:<\/strong> Microsoft Defender for Office 365, the email security component of Microsoft Defender for Endpoint, scans incoming emails in realtime. It uses advanced anti-phishing technologies and threat intelligence to detect and block malicious emails, including those with suspicious links or attachments.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-076a494 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"076a494\" data-element_type=\"section\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-5ffc4ca\" data-id=\"5ffc4ca\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e5de4b7 elementor-widget elementor-widget-image\" data-id=\"e5de4b7\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/UD_0823_img_16.png\" class=\"attachment-full size-full wp-image-19490\" alt=\"Australia | The Complete Guide to Microsoft Defender for Endpoint\" srcset=\"https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/UD_0823_img_16.png 200w, https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/UD_0823_img_16-150x150.png 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" style=\"width:100%;height:100%;max-width:200px\" title=\"UD_0823_img_16.png\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-0a76cd6\" data-id=\"0a76cd6\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-eb8eae0 elementor-widget elementor-widget-text-editor\" data-id=\"eb8eae0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Link Scanning:<\/strong> When the employee receives the malicious email, Microsoft Defender for Office 365 scans the link embedded within it. It compares it against known malicious URLs and checks if it leads to a potentially harmful website.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-39ba65b elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"39ba65b\" data-element_type=\"section\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-acb92cf\" data-id=\"acb92cf\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-68f067f elementor-widget elementor-widget-image\" data-id=\"68f067f\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/UD_0823_img_17.png\" class=\"attachment-full size-full wp-image-19491\" alt=\"Australia | The Complete Guide to Microsoft Defender for Endpoint\" srcset=\"https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/UD_0823_img_17.png 200w, https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/UD_0823_img_17-150x150.png 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" style=\"width:100%;height:100%;max-width:200px\" title=\"UD_0823_img_17.png\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-0beac19\" data-id=\"0beac19\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b08f79a elementor-widget elementor-widget-text-editor\" data-id=\"b08f79a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Real-Time Analysis:<\/strong> Microsoft Defender for Endpoint analyses the behaviour of the suspicious link in real-time. It uses machine learning algorithms and heuristics to determine if the link poses a potential threat. It considers factors such as the website\u2019s reputation, previous encounters with similar links, and known patterns of malicious behaviour.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-166b1cc elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"166b1cc\" data-element_type=\"section\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-727316e\" data-id=\"727316e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5ce11c7 elementor-widget elementor-widget-image\" data-id=\"5ce11c7\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/UD_0823_img_18.png\" class=\"attachment-full size-full wp-image-19492\" alt=\"Australia | The Complete Guide to Microsoft Defender for Endpoint\" srcset=\"https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/UD_0823_img_18.png 200w, https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/UD_0823_img_18-150x150.png 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" style=\"width:100%;height:100%;max-width:200px\" title=\"UD_0823_img_18.png\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-ef53918\" data-id=\"ef53918\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-badd0a1 elementor-widget elementor-widget-text-editor\" data-id=\"badd0a1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Block and Alert:<\/strong> If Microsoft Defender for Endpoint determines the link is indeed malicious, it takes action. It can block the employee\u2019s access to the website, preventing them from clicking on the link and exposing their system to the ransomware attack. Simultaneously, it alerts the security team about the attempted attack, providing them with details and insights for further investigation.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-7fd85c5 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7fd85c5\" data-element_type=\"section\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-99043ab\" data-id=\"99043ab\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a42c188 elementor-widget elementor-widget-image\" data-id=\"a42c188\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/UD_0823_img_19.png\" class=\"attachment-full size-full wp-image-19493\" alt=\"Australia | The Complete Guide to Microsoft Defender for Endpoint\" srcset=\"https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/UD_0823_img_19.png 200w, https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/UD_0823_img_19-150x150.png 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" style=\"width:100%;height:100%;max-width:200px\" title=\"UD_0823_img_19.png\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-4ae99ce\" data-id=\"4ae99ce\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4e03ab4 elementor-widget elementor-widget-text-editor\" data-id=\"4e03ab4\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Incident Response:<\/strong> Upon receiving the alert, the security team can initiate incident response procedures. They can leverage the investigation capabilities of Microsoft Defender for Endpoint to analyse the attempted attack, identify any potential indicators of compromise, and take appropriate measures to contain and mitigate the threat.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-5c6bcab elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5c6bcab\" data-element_type=\"section\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-358f024\" data-id=\"358f024\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-851189d elementor-widget elementor-widget-image\" data-id=\"851189d\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/UD_0823_img_20.png\" class=\"attachment-full size-full wp-image-19494\" alt=\"Australia | The Complete Guide to Microsoft Defender for Endpoint\" srcset=\"https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/UD_0823_img_20.png 200w, https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/UD_0823_img_20-150x150.png 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" style=\"width:100%;height:100%;max-width:200px\" title=\"UD_0823_img_20.png\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-721a038\" data-id=\"721a038\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4cade57 elementor-widget elementor-widget-text-editor\" data-id=\"4cade57\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Automated Investigation:<\/strong> With Microsoft 365 E5 licencing or the Microsoft Defender for Endpoint Plan 2 add-on organisations can leverage Automated Investigation and Response (AIR) capabilities. Given the never-ending flow of threats, security teams often face the challenge of addressing the high volume of alerts. Imagine having a virtual analyst in your Tier 1 or Tier 2 security operations team. The virtual analyst mimics the ideal steps that security operations would take to investigate and remediate threats. The virtual analyst could work 24&#215;7, with unlimited capacity and take on a significant load of investigations and threat remediation.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4b1c92c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4b1c92c\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-d922b4d\" data-id=\"d922b4d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-e9ebc8f\" data-id=\"e9ebc8f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9a1f5b5 elementor-widget elementor-widget-html\" data-id=\"9a1f5b5\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<iframe width=\"1080\" height=\"570\" src=\"https:\/\/www.youtube.com\/embed\/s18JWN2anRM\" title=\"Microsoft Defender Series: Cloud Point Defense Explained\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-5767464\" data-id=\"5767464\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-85b1eed elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"85b1eed\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-b0e83ba\" data-id=\"b0e83ba\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-dc6d55d\" data-id=\"dc6d55d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9b796be elementor-widget elementor-widget-html\" data-id=\"9b796be\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<iframe width=\"1080\" height=\"570\" src=\"https:\/\/www.youtube.com\/embed\/iX-oGFP284I\" title=\"Microsoft Defender Series: Securing Cloud Apps\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-fa1d7d7\" data-id=\"fa1d7d7\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d937f02 elementor-section-content-middle elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d937f02\" data-element_type=\"section\" id=\"sectiontitle10\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e386dd7\" data-id=\"e386dd7\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5a9816c elementor-widget elementor-widget-heading\" data-id=\"5a9816c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">LICENSING <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e0bd16b elementor-widget elementor-widget-text-editor\" data-id=\"e0bd16b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Microsoft Defender for Endpoint licencing essentially comes in two flavours, Plan 1 and Plan 2 (see the above graphic on page 6\/7 for the feature comparison).<\/p><p><strong>Plan 1 is included with:<\/strong><\/p><ul><li>Microsoft 365 E3 with the Microsoft 365 E5 Security add-on<\/li><\/ul><p><strong>Plan 2 is included with:<\/strong><\/p><ul><li>Windows 11 Enterprise E5\/A5<\/li><li>Windows 10 Enterprise E5\/A5<\/li><li>Microsoft 365 E5\/A5\/G5 (which includes Windows 10 or Windows 11 Enterprise E5)<\/li><li>Microsoft 365 E5\/A5\/G5\/F5 Security<\/li><li>Microsoft 365 F5 Security &amp; Compliance<\/li><\/ul><div><a href=\"https:\/\/learn.microsoft.com\/en-us\/office365\/servicedescriptions\/microsoft-365-service-descriptions\/microsoft-365-tenantlevel-services-licensing-guidance\/microsoft-365-security-compliance-licensing-guidance\" target=\"_blank\" rel=\"noopener nofollow\">Which licenses provide the rights for users to benefit from the service?<\/a><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8dbb292 elementor-section-content-middle elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8dbb292\" data-element_type=\"section\" id=\"sectiontitle11\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-bf81919\" data-id=\"bf81919\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ae16413 elementor-widget elementor-widget-heading\" data-id=\"ae16413\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">CONCLUSION<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-94bc2f0 elementor-widget elementor-widget-text-editor\" data-id=\"94bc2f0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Microsoft Defender for Endpoint is a crucial component of the Microsoft 365 Defender suite, offering comprehensive endpoint protection against a wide range of cyber threats. By using behavioural sensors, cloud security analytics, and threat intelligence, Defender for Endpoint provides real-time detection and response capabilities, helping organisations quickly identify and mitigate potential security incidents.<\/p><p>With its advanced threat detection and response features, Microsoft Defender for Endpoint empowers organisations to safeguard their endpoints, prevent ransomware attacks, and protect against file-less malware. Its integration with other Microsoft Defender products, such as Defender for Office 365 and Defender for Identity, strengthens overall security posture by providing protection against email-based threats and enhancing identity and access management practices.<\/p><p>Moreover, Microsoft 365 Defender\u2019s centralised management console streamlines security operations, offering a unified view of security events, alerts, and recommendations.<\/p><p>As cybercrime continues to pose significant risks to organisations worldwide, the need for robust cybersecurity solutions offered by Microsoft Defender for Endpoint becomes increasingly evident. With its comprehensive features and benefits, coupled with seamless onboarding for existing Windows users, migrating to and adopting Defender for Endpoint can be a strategic move towards enhancing an organisation\u2019s cybersecurity resilience.<\/p><p>By leveraging the capabilities of Microsoft Defender for Endpoint, organisations can proactively detect, respond and mitigate cyber threats, ultimately safeguarding their sensitive data, digital assets, and operations from the ever evolving landscape of cybercrime.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-eb4de35 elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"eb4de35\" data-element_type=\"section\" id=\"dpwnloadpdf\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wider\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-776cd29\" data-id=\"776cd29\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3dbb154 elementor-widget elementor-widget-heading\" data-id=\"3dbb154\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">DOWNLOAD THE COMPLETE GUIDE<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-3fa658e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3fa658e\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-a2473d4\" data-id=\"a2473d4\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-63e51bf elementor-widget elementor-widget-image\" data-id=\"63e51bf\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"600\" src=\"https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/Microsoft_Defender_Fanout_v2.png\" class=\"attachment-large size-large wp-image-19311\" alt=\"Australia | The Complete Guide to Microsoft Defender for Endpoint\" srcset=\"https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/Microsoft_Defender_Fanout_v2.png 600w, https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/Microsoft_Defender_Fanout_v2-300x300.png 300w, https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/Microsoft_Defender_Fanout_v2-150x150.png 150w, https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/elementor\/thumbs\/Microsoft_Defender_Fanout_v2-qcaev7c3izcre4j8uj1likursmberzol67d3u2m00w.png 400w\" sizes=\"(max-width: 600px) 100vw, 600px\" style=\"width:100%;height:100%;max-width:600px\" title=\"Microsoft_Defender_Fanout_v2.png\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-5b35f93\" data-id=\"5b35f93\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e5e6e3b elementor-widget elementor-widget-spacer\" data-id=\"e5e6e3b\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bf638c0 elementor-widget elementor-widget-html\" data-id=\"bf638c0\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<script charset=\"utf-8\" type=\"text\/javascript\" src=\"\/\/js.hsforms.net\/forms\/v2.js?pre=1\"><\/script>\r\n<script>\r\njQuery(function($){\r\n    var curr_url_checker = window.location.href; var curr_url_splitter = curr_url_checker.split(\"?\"); var curr_url = curr_url_splitter[0];\r\n    hbspt.forms.create({\r\n        region: \"na1\",\r\n        portalId: \"20799536\",\r\n        formId: \"ec504498-09eb-4fec-860c-e9a2dcb6c81b\", \/\/Change to form ID\r\n        redirectUrl: curr_url + '?thank-you=yes', onBeforeFormSubmit($form, submissionValues){ for(var i=0; i<submissionValues.length; i++){ if(submissionValues[i].name=='email'){ createCookie('hsThankEmail', submissionValues[i].value, 1); }} },\r\n        css: \".hs_error_rollup {display:none !important;}\", onFormReady: function($form){\r\n            $form.find('input[name=\"referral_page\"]').val(curr_url).change();\r\n        }\r\n    });\r\n});\r\n<\/script>\r\n\r\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4a12abc elementor-section-full_width thank-you-section elementor-section-height-default elementor-section-height-default\" data-id=\"4a12abc\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c44f333\" data-id=\"c44f333\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-b387867 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b387867\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wider\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-d7caa34\" data-id=\"d7caa34\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f5403d2 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"f5403d2\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Thank you for downloading the Complete Guide to Microsoft Defender for Endpoint.\u202f<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-d8ac09f elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d8ac09f\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-067fca5\" data-id=\"067fca5\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2dde09e elementor-widget elementor-widget-text-editor\" data-id=\"2dde09e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>We\u2019ve sent a copy to your inbox. Remember to mark <a href=\"mailto:hello@insentragroup.com\"><b>hello@insentragroup.com<\/b><\/a> as a \u201csafe sender\u201d, and to check any junk or spam folders so you receive your copy.\u202f<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-62ac809\" data-id=\"62ac809\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-79d9386 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"79d9386\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"600\" src=\"https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/Microsoft_Defender_Fanout_v2-1-1.png\" class=\"attachment-large size-large wp-image-19495\" alt=\"Australia | The Complete Guide to Microsoft Defender for Endpoint\" srcset=\"https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/Microsoft_Defender_Fanout_v2-1-1.png 600w, https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/Microsoft_Defender_Fanout_v2-1-1-300x300.png 300w, https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/Microsoft_Defender_Fanout_v2-1-1-150x150.png 150w\" sizes=\"(max-width: 600px) 100vw, 600px\" style=\"width:100%;height:100%;max-width:600px\" title=\"Microsoft_Defender_Fanout_v2-1.png\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-6c7404e elementor-section-content-middle d-none elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6c7404e\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-20cd426\" data-id=\"20cd426\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c2db391 elementor-widget__width-initial thankyou-image elementor-widget elementor-widget-image\" data-id=\"c2db391\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"600\" src=\"https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/MicrosoftTeams-image-11-1.png\" class=\"attachment-full size-full wp-image-19314\" alt=\"Australia | The Complete Guide to Microsoft Defender for Endpoint\" srcset=\"https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/MicrosoftTeams-image-11-1.png 600w, https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/elementor\/thumbs\/MicrosoftTeams-image-11-1-qcaev97qosmwfcas4mzojhjby1uijmobyo2wn81znc.png 300w, https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/MicrosoftTeams-image-11-1-150x150.png 150w\" sizes=\"(max-width: 600px) 100vw, 600px\" style=\"width:100%;height:100%;max-width:600px\" title=\"MicrosoftTeams-image-11.png\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-17bc93e elementor-widget elementor-widget-text-editor\" data-id=\"17bc93e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>We\u2019ve sent a copy to your inbox. Remember to mark <b>hello@insentragroup.com<\/b> as a \u201csafe sender\u201d, and to check any junk or spam folders so you receive your copy.\u202f<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-cdfe023 booking-box\" data-id=\"cdfe023\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7aafd54 elementor-widget elementor-widget-html\" data-id=\"7aafd54\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<style>\r\n.booking-box .elementor-column.elementor-col-20 {\r\n    width: 10%;\r\n    padding-top: 11px;\r\n    background-color: #fff;\r\n    text-align:center !important;\r\n    border: solid 1px #ededed;\r\n    border-radius: 4px;\r\n    font-size: 12px;\r\n}\r\n.booking-box .elementor-column.elementor-col-80 {\r\n    width: 90%;\r\n}\r\n.booking-box .meeting-avatar {\r\n\ttransform: scale(1);\r\n\tanimation: pulse 1s infinite;\r\n}\r\n@keyframes pulse {\r\n\t0% {\r\n\t\ttransform: scale(0.95);\r\n\t\tbox-shadow: 0 0 0 0 rgba(0, 0, 0, 0.7);\r\n\t}\r\n\r\n\t70% {\r\n\t\ttransform: scale(1);\r\n\t\tbox-shadow: 0 0 0 10px rgba(0, 0, 0, 0);\r\n\t}\r\n\r\n\t100% {\r\n\t\ttransform: scale(0.95);\r\n\t\tbox-shadow: 0 0 0 0 rgba(0, 0, 0, 0);\r\n\t}\r\n}    \r\n<\/style>\r\n<div class=\"text-center mb-3\">\r\n    <img decoding=\"async\" src=\"https:\/\/avatars.hubspot.net\/2450d4f47b3e5475f6e6fb18cd74deb3-100\" class=\"rounded-circle shadow meeting-avatar\" style=\"max-height:72px;\" alt=\"\" title=\"\">\r\n<\/div>\r\n<script>\r\njQuery(function($){\r\n    var hsThankEmail = readCookie('hsThankEmail');\r\n    if(hsThankEmail != ''){\r\n        console.log(hsThankEmail);\r\n        $('#hsbookingform [type=\"email\"]').val(hsThankEmail);\r\n    }\r\n    $(document).on('submit', '#hsbookingform', function(e){\r\n        e.preventDefault();\r\n        var theForm = $(this);\r\n        theForm.find('[type=\"submit\"]').html('<i class=\"fa fa-spinner fa-spin\"><\/i> Processing...');\r\n        var data = {\r\n            action: 'submissionGuidCheck',\r\n            meeting_date: $(\"#form-field-date\").val(),\r\n            meeting_time: $(\"#form-field-time\").val(),\r\n            meeting_email: $(\"#form-field-email_address\").val()\r\n        }\r\n        $.post(ElementorProFrontendConfig.ajaxurl, data, function(response){\r\n            console.log(JSON.parse(response)); \r\n        });\r\n        return false;   \r\n    });\r\n});\r\n<\/script>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ac0e2c3 elementor-headline--style-rotate elementor-widget elementor-widget-animated-headline\" data-id=\"ac0e2c3\" data-element_type=\"widget\" data-settings=\"{&quot;headline_style&quot;:&quot;rotate&quot;,&quot;rotating_text&quot;:&quot;Consult\\nChat\\nDiscuss&quot;,&quot;rotate_iteration_delay&quot;:1000,&quot;animation_type&quot;:&quot;typing&quot;,&quot;loop&quot;:&quot;yes&quot;}\" data-widget_type=\"animated-headline.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<h3 class=\"elementor-headline elementor-headline-animation-type-typing elementor-headline-letters\">\n\t\t\t\t\t<span class=\"elementor-headline-plain-text elementor-headline-text-wrapper\"><i class=\"far fa-smile\"><\/i><\/span>\n\t\t\t\t<span class=\"elementor-headline-dynamic-wrapper elementor-headline-text-wrapper\">\n\t\t\t\t\t<span class=\"elementor-headline-dynamic-text elementor-headline-text-active\">\n\t\t\t\tConsult\t\t\t<\/span>\n\t\t\t\t\t<span class=\"elementor-headline-dynamic-text\">\n\t\t\t\tChat\t\t\t<\/span>\n\t\t\t\t\t<span class=\"elementor-headline-dynamic-text\">\n\t\t\t\tDiscuss\t\t\t<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<span class=\"elementor-headline-plain-text elementor-headline-text-wrapper\">with our experts!<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3aad5dd elementor-button-align-stretch elementor-widget elementor-widget-form\" data-id=\"3aad5dd\" data-element_type=\"widget\" data-settings=\"{&quot;step_next_label&quot;:&quot;Next&quot;,&quot;step_previous_label&quot;:&quot;Previous&quot;,&quot;button_width&quot;:&quot;100&quot;,&quot;step_type&quot;:&quot;number_text&quot;,&quot;step_icon_shape&quot;:&quot;circle&quot;}\" data-widget_type=\"form.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<form class=\"elementor-form\" method=\"post\" id=\"hsbookingform\" name=\"New Form\" aria-label=\"New Form\">\n\t\t\t<input type=\"hidden\" name=\"post_id\" value=\"19464\"\/>\n\t\t\t<input type=\"hidden\" name=\"form_id\" value=\"3aad5dd\"\/>\n\t\t\t<input type=\"hidden\" name=\"referer_title\" value=\"Complete Guide to Microsoft Defender for Endpoint eBook - Australia\" \/>\n\n\t\t\t\t\t\t\t<input type=\"hidden\" name=\"queried_id\" value=\"19464\"\/>\n\t\t\t\n\t\t\t<div class=\"elementor-form-fields-wrapper elementor-labels-above\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-html elementor-field-group elementor-column elementor-field-group-field_a6276d7 elementor-col-20\">\n\t\t\t\t\t<i class=\"fa fa-calendar\"><\/i>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-date elementor-field-group elementor-column elementor-field-group-date elementor-col-80 elementor-field-required\">\n\t\t\t\t\t\n\t\t<input type=\"date\" name=\"form_fields[date]\" id=\"form-field-date\" class=\"elementor-field elementor-size-sm  elementor-field-textual elementor-date-field\" placeholder=\"Meeting Date\" required=\"required\" pattern=\"[0-9]{4}-[0-9]{2}-[0-9]{2}\">\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-html elementor-field-group elementor-column elementor-field-group-field_c969df1 elementor-col-20\">\n\t\t\t\t\t<i class=\"fa fa-clock\"><\/i>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-time elementor-field-group elementor-column elementor-field-group-time elementor-col-80 elementor-field-required\">\n\t\t\t\t\t\t\t<input type=\"time\" name=\"form_fields[time]\" id=\"form-field-time\" class=\"elementor-field elementor-size-sm  elementor-field-textual elementor-time-field\" placeholder=\"Meeting Time\" required=\"required\">\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-html elementor-field-group elementor-column elementor-field-group-field_dd3a67c elementor-col-20\">\n\t\t\t\t\t<i class=\"fa fa-envelope\"><\/i>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-email elementor-field-group elementor-column elementor-field-group-email_address elementor-col-80 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"email\" name=\"form_fields[email_address]\" id=\"form-field-email_address\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Your Email Address\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-group elementor-column elementor-field-type-submit elementor-col-100 e-form__buttons\">\n\t\t\t\t\t<button class=\"elementor-button elementor-size-sm\" type=\"submit\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-calendar-check\"><\/i>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Book Now<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/button>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/form>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-b3b6524 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b3b6524\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-ccea2a8\" data-id=\"ccea2a8\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-423ddc7 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"423ddc7\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#relevantResources\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chevron-circle-down\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8dcd920 elementor-widget elementor-widget-text-editor\" data-id=\"8dcd920\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXP182018858 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-usefontface=\"false\" data-contrast=\"none\"><span class=\"NormalTextRun SCXP182018858 BCX0\">In the meantime, we thought you might find these resources useful\u00a0<span class=\"EOP SCXP182018858 BCX0\">\u200b<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-9b6bcaa relevant-resources elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9b6bcaa\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-4e2c1cb\" data-id=\"4e2c1cb\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-760d394 elementor-widget elementor-widget-image\" data-id=\"760d394\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.insentragroup.com\/nz\/insights\/resources\/ebooks-and-guides\/email-archive-pre-planning-assessment\/\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"561\" height=\"412\" src=\"https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/archive-migration-pre-planning-checklist.png\" class=\"attachment-full size-full wp-image-19458\" alt=\"Australia | The Complete Guide to Microsoft Defender for Endpoint\" srcset=\"https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/archive-migration-pre-planning-checklist.png 561w, https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/archive-migration-pre-planning-checklist-300x220.png 300w\" sizes=\"(max-width: 561px) 100vw, 561px\" style=\"width:100%;height:73.44%;max-width:561px\" title=\"archive-migration-pre-planning-checklist.png\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-40402af elementor-widget elementor-widget-heading\" data-id=\"40402af\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/www.insentragroup.com\/nz\/insights\/resources\/ebooks-and-guides\/email-archive-pre-planning-assessment\/\">Email Archive Pre-Planning Assessment<\/a><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b313fb0 elementor-widget elementor-widget-text-editor\" data-id=\"b313fb0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>With the understanding that not all email archive migration projects are the same, our Email Archive Pre-Planning Assessment supports the diverse conditions found in organisations of all sizes, from enterprise environments to small businesses.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d1bea84 elementor-widget__width-auto read-more elementor-widget elementor-widget-button\" data-id=\"d1bea84\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.insentragroup.com\/nz\/insights\/resources\/ebooks-and-guides\/email-archive-pre-planning-assessment\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-angle-double-right\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">READ MORE<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-5a8d4ba\" data-id=\"5a8d4ba\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7f58d91 elementor-widget elementor-widget-image\" data-id=\"7f58d91\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.insentragroup.com\/nz\/insights\/resources\/ebooks-and-guides\/master-movers-data-migrations-planning-guide\/\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"671\" height=\"651\" src=\"https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/master_movers_guide_img.png\" class=\"attachment-full size-full wp-image-19459\" alt=\"Australia | The Complete Guide to Microsoft Defender for Endpoint\" srcset=\"https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/master_movers_guide_img.png 671w, https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/master_movers_guide_img-300x291.png 300w\" sizes=\"(max-width: 671px) 100vw, 671px\" style=\"width:100%;height:97.02%;max-width:671px\" title=\"master_movers_guide_img.png\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c33a47c elementor-widget elementor-widget-heading\" data-id=\"c33a47c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/www.insentragroup.com\/nz\/insights\/resources\/ebooks-and-guides\/master-movers-data-migrations-planning-guide\/\">Master Movers Data Migrations Planning Guide<\/a><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-378c411 elementor-widget elementor-widget-text-editor\" data-id=\"378c411\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>What kind of data are you migrating? Whether you are still in the planning phase or have begun your migration journey, you face a complex task.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1b9751d elementor-widget__width-auto read-more elementor-widget elementor-widget-button\" data-id=\"1b9751d\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.insentragroup.com\/nz\/insights\/resources\/ebooks-and-guides\/master-movers-data-migrations-planning-guide\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-angle-double-right\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">READ MORE<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-43e470d\" data-id=\"43e470d\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7e47d24 elementor-widget elementor-widget-image\" data-id=\"7e47d24\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.insentragroup.com\/nz\/insights\/resources\/ebooks-and-guides\/master-movers-migration\/\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"3000\" height=\"2000\" src=\"https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/MicrosoftTeams-image-6.png\" class=\"attachment-full size-full wp-image-19254\" alt=\"Australia | The Complete Guide to Microsoft Defender for Endpoint\" srcset=\"https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/MicrosoftTeams-image-6.png 3000w, https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/MicrosoftTeams-image-6-300x200.png 300w, https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/MicrosoftTeams-image-6-1024x683.png 1024w, https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/MicrosoftTeams-image-6-768x512.png 768w, https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/MicrosoftTeams-image-6-1536x1024.png 1536w, https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/MicrosoftTeams-image-6-2048x1365.png 2048w, https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2023\/09\/MicrosoftTeams-image-6-1568x1045.png 1568w\" sizes=\"(max-width: 3000px) 100vw, 3000px\" style=\"width:100%;height:66.67%;max-width:3000px\" title=\"MicrosoftTeams-image-6.png\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-304eb81 elementor-widget elementor-widget-heading\" data-id=\"304eb81\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/www.insentragroup.com\/nz\/insights\/resources\/ebooks-and-guides\/master-movers-migration\/\">Master Movers Migration\n<\/a><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-11b556b elementor-widget elementor-widget-text-editor\" data-id=\"11b556b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>According to a\u00a0recent study conducted by Gartner, 83% of data migration projects either fail or exceed their budgets and schedules. It\u2019s not a hidden fact that data migrations can be complex and stressful, however careful preparations will prove invaluable during the migration.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-11a2dc6 elementor-widget__width-auto read-more elementor-widget elementor-widget-button\" data-id=\"11a2dc6\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.insentragroup.com\/nz\/insights\/resources\/ebooks-and-guides\/master-movers-migration\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-angle-double-right\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">READ MORE<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>The Complete Guide to Microsoft Defender for Endpoint Download eBook The Complete Guide to Microsoft Defender for Endpoint Download eBook In today\u2019s digital landscape, where cyber threats are constantly evolving and becoming increasingly sophisticated, the need for robust cybersecurity solutions has never been more critical. Organisations and individuals alike face the daunting task of safeguarding&hellip; <a class=\"more-link\" href=\"https:\/\/www.insentragroup.com\/au\/insights\/geek-speak\/secure-workplace\/the-complete-guide-to-microsoft-defender-for-endpoint\/\">Continue reading <span class=\"screen-reader-text\">The Complete Guide to Microsoft Defender for Endpoint<\/span><\/a><\/p>\n","protected":false},"author":177,"featured_media":19495,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"elementor_header_footer","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[20],"tags":[],"class_list":["post-19464","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-secure-workplace","entry"],"_links":{"self":[{"href":"https:\/\/www.insentragroup.com\/au\/wp-json\/wp\/v2\/posts\/19464","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.insentragroup.com\/au\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.insentragroup.com\/au\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.insentragroup.com\/au\/wp-json\/wp\/v2\/users\/177"}],"replies":[{"embeddable":true,"href":"https:\/\/www.insentragroup.com\/au\/wp-json\/wp\/v2\/comments?post=19464"}],"version-history":[{"count":33,"href":"https:\/\/www.insentragroup.com\/au\/wp-json\/wp\/v2\/posts\/19464\/revisions"}],"predecessor-version":[{"id":23030,"href":"https:\/\/www.insentragroup.com\/au\/wp-json\/wp\/v2\/posts\/19464\/revisions\/23030"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.insentragroup.com\/au\/wp-json\/wp\/v2\/media\/19495"}],"wp:attachment":[{"href":"https:\/\/www.insentragroup.com\/au\/wp-json\/wp\/v2\/media?parent=19464"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.insentragroup.com\/au\/wp-json\/wp\/v2\/categories?post=19464"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.insentragroup.com\/au\/wp-json\/wp\/v2\/tags?post=19464"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}