{"id":19190,"date":"2023-08-03T02:15:02","date_gmt":"2023-08-03T02:15:02","guid":{"rendered":"https:\/\/www.insentragroup.com\/gb\/insights\/uncategorized\/the-complete-guide-to-microsoft-defender-for-endpoint\/"},"modified":"2024-10-25T03:08:07","modified_gmt":"2024-10-25T03:08:07","slug":"the-complete-guide-to-microsoft-defender-for-endpoint","status":"publish","type":"post","link":"https:\/\/www.insentragroup.com\/gb\/insights\/geek-speak\/secure-workplace\/the-complete-guide-to-microsoft-defender-for-endpoint\/","title":{"rendered":"The Complete Guide to Microsoft Defender for Endpoint"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"19190\" class=\"elementor elementor-19190\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-dd8b51b elementor-section-content-middle elementor-section-stretched elementor-hidden-tablet elementor-hidden-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"dd8b51b\" data-element_type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wider\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-b06fc51\" data-id=\"b06fc51\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4bbddc4 elementor-widget elementor-widget-heading\" data-id=\"4bbddc4\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">The Complete Guide to Microsoft Defender for Endpoint<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7bf11f0 elementor-widget elementor-widget-button\" data-id=\"7bf11f0\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#dpwnloadpdf\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download eBook<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-39ed601\" data-id=\"39ed601\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-427a760 elementor-widget elementor-widget-image\" data-id=\"427a760\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"655\" height=\"501\" src=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/design_heading_microsoft_defender_2.png\" class=\"attachment-large size-large wp-image-19194\" alt=\"\" srcset=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/design_heading_microsoft_defender_2.png 655w, https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/design_heading_microsoft_defender_2-300x229.png 300w\" sizes=\"(max-width: 655px) 100vw, 655px\" style=\"width:100%;height:76.49%;max-width:655px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-20d1726 elementor-section-content-middle elementor-section-stretched elementor-hidden-desktop elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"20d1726\" data-element_type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-98afb3d\" data-id=\"98afb3d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-830c747 elementor-widget elementor-widget-image\" data-id=\"830c747\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"655\" height=\"501\" src=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/design_heading_microsoft_defender_2.png\" class=\"attachment-medium_large size-medium_large wp-image-19194\" alt=\"\" srcset=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/design_heading_microsoft_defender_2.png 655w, https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/design_heading_microsoft_defender_2-300x229.png 300w\" sizes=\"(max-width: 655px) 100vw, 655px\" style=\"width:100%;height:76.49%;max-width:655px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bc8f054 elementor-widget elementor-widget-heading\" data-id=\"bc8f054\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">The Complete Guide to Microsoft Defender for Endpoint<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a1c79d3 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"a1c79d3\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#dpwnloadpdf\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download eBook<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d0b16cc elementor-section-content-middle elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d0b16cc\" data-element_type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-65ef5d4\" data-id=\"65ef5d4\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-43f637e elementor-widget elementor-widget-text-editor\" data-id=\"43f637e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In today\u2019s digital landscape, where cyber threats are constantly evolving and becoming increasingly sophisticated, the need for robust cybersecurity solutions has never been more critical. Organisations and individuals alike face the daunting task of safeguarding their sensitive data, digital assets and operations from the relentless onslaught of cybercrime.<\/p><p>To combat these challenges, Microsoft offers a comprehensive suite of security tools and features called Microsoft 365 Defender. At the heart of this suite lies a powerful weapon in the fight against cyber threats &#8211; Microsoft Defender for Endpoint.<\/p><p>Microsoft Defender for Endpoint is an enterprise endpoint security platform that goes beyond traditional antivirus protection. It is a cutting-edge, cloud-powered solution designed to proactively prevent, detect, investigate and respond to advanced threats across multiple platforms. By leveraging the latest in behavioural sensors, cloud security analytics, and threat intelligence, Defender for Endpoint empowers organisations to stay ahead of the curve and maintain a strong security posture.<\/p><p>In this comprehensive guide, we will take you on a journey through the world of Microsoft Defender for Endpoint. We will explore its inner workings, unveil its remarkable features, and showcase real-world examples of its efficacy in thwarting cyber threats. Additionally, we will delve into the migration process, helping organisations smoothly transition to this state-of-the-art security solution.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-56ba88e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"56ba88e\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wider\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-5ec9a0d\" data-id=\"5ec9a0d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-493bc08 elementor-widget elementor-widget-shortcode\" data-id=\"493bc08\" data-element_type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\"><div class=\"side-author\">\r\n\t\t\t<p><img decoding=\"async\" src=\"https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2022\/10\/Jonathan-Hazelden-150x150.png\" class=\"rounded-circle\" data-info=\"https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2022\/10\/Jonathan-Hazelden.png\" ><\/p>\r\n\t\t\t<h2 class=\"text-center\"><span class=\"author\">Jonathan Hazelden<\/span> - 03.08.2023<span class=\"publish-date d-none\">20230803<\/span><\/h2>\r\n\t\t\t\r\n\t\t\t<div class=\"mb-2\"><a href=\"https:\/\/www.insentragroup.com\/gb\/about-insentra\/meet-the-crew\/jonathan-hazelden\/\" class=\"btn btn-primary btn-block btn-lg py-3 rounded-0 border-0\">View Insentra Profile<\/a><\/div>\r\n\t\t\t\r\n\t\t\t<div class=\"mb-2\"><a href=\"https:\/\/www.insentragroup.com\/gb\/insights\/insights-search-results\/?author=Jonathan Hazelden\" class=\"btn btn-default btn-block btn-lg py-3 rounded-0 border-0\">View Insights<\/a><\/div>\r\n\t\t<\/div><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-56ff988\" data-id=\"56ff988\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5f61068 elementor-widget elementor-widget-heading\" data-id=\"5f61068\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Table of Contents<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5465aeb elementor-widget elementor-widget-text-editor\" data-id=\"5465aeb\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"#sectiontitle1\" data-wplink-edit=\"true\"><strong>WHAT IS MICROSOFT 365 DEFENDER?<\/strong><\/a><\/p><p><a href=\"#sectiontitle2\"><strong>HOW IT WORKS<\/strong><\/a><\/p><p><a href=\"#sectiontitle3\"><strong>FEATURES AND BENEFITS<\/strong><\/a><\/p><p><a href=\"#sectiontitle4\"><strong>CYBER CRIME STATISTICS<\/strong><\/a><\/p><p><a href=\"#sectiontitle5\"><strong>MICROSOFT DEFENDER FOR ENDPOINT<\/strong><\/a><\/p><p><a href=\"#sectiontitle6\"><strong>HOW IT WORKS<\/strong><\/a><\/p><p><a href=\"#sectiontitle7\"><strong>FEATURES AND BENEFITS<\/strong><\/a><\/p><p><a href=\"#sectiontitle8\"><strong>MIGRATING TO DEFENDER FOR ENDPOINT<\/strong><\/a><\/p><p><a href=\"#sectiontitle9\"><strong>REAL-WORLD EXAMPLE<\/strong><\/a><\/p><p><a href=\"#sectiontitle10\"><strong>LICENSING <\/strong><\/a><\/p><p><a href=\"#sectiontitle11\"><strong>CONCLUSION<\/strong><\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9649a38 elementor-section-content-middle elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9649a38\" data-element_type=\"section\" id=\"sectiontitle1\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2c46477\" data-id=\"2c46477\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-df7dc6c elementor-widget elementor-widget-heading\" data-id=\"df7dc6c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">WHAT IS MICROSOFT 365 DEFENDER? <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6641832 elementor-widget elementor-widget-text-editor\" data-id=\"6641832\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Microsoft 365 Defender is a unified pre- and post-breach enterprise defence suite that natively coordinates detection, prevention, investigation and response across endpoints, identities, email, and applications to provide integrated protection against sophisticated attacks. The following image displays the complete array of products within the Microsoft 365 Defender suite.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cef0f4e elementor-widget elementor-widget-image\" data-id=\"cef0f4e\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"4500\" height=\"2099\" src=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/Microsoft-Defender-Diagram-01.png\" class=\"attachment-full size-full wp-image-19195\" alt=\"\" srcset=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/Microsoft-Defender-Diagram-01.png 4500w, https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/Microsoft-Defender-Diagram-01-300x140.png 300w, https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/Microsoft-Defender-Diagram-01-1024x478.png 1024w, https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/Microsoft-Defender-Diagram-01-768x358.png 768w, https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/Microsoft-Defender-Diagram-01-1536x716.png 1536w, https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/Microsoft-Defender-Diagram-01-2048x955.png 2048w, https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/Microsoft-Defender-Diagram-01-1568x731.png 1568w\" sizes=\"(max-width: 4500px) 100vw, 4500px\" style=\"width:100%;height:46.64%;max-width:4500px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-73740c2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"73740c2\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-d79dfde\" data-id=\"d79dfde\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-17aa9f6\" data-id=\"17aa9f6\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-279d8fc elementor-widget elementor-widget-html\" data-id=\"279d8fc\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<iframe width=\"1080\" height=\"570\" src=\"https:\/\/www.youtube.com\/embed\/JZxtLrQ1K0E\" title=\"Microsoft Defender Series: What is Microsoft Defender?\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-383d661\" data-id=\"383d661\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4e9ba04 elementor-section-content-middle elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4e9ba04\" data-element_type=\"section\" id=\"sectiontitle2\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8eeb0ec\" data-id=\"8eeb0ec\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-0d0df39 elementor-section-content-top elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0d0df39\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-c8920c9\" data-id=\"c8920c9\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-54ad6d2 elementor-widget elementor-widget-image\" data-id=\"54ad6d2\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"710\" height=\"533\" src=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/UD_0823_img_1.png\" class=\"attachment-large size-large wp-image-19196\" alt=\"\" srcset=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/UD_0823_img_1.png 710w, https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/UD_0823_img_1-300x225.png 300w\" sizes=\"(max-width: 710px) 100vw, 710px\" style=\"width:100%;height:75.07%;max-width:710px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-de9ef01\" data-id=\"de9ef01\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4308e81 elementor-widget elementor-widget-heading\" data-id=\"4308e81\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">HOW IT WORKS <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f54682d elementor-widget elementor-widget-text-editor\" data-id=\"f54682d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Microsoft 365 Defender uses behavioural sensors, cloud security analytics, and threat intelligence to prevent, detect, and respond to advanced threats on different platforms. It provides real-time protection against advanced threats on endpoints and helps detect and investigate identity-based attacks in real time. It also offers vulnerability management and assessment, attack surface reduction, automatic investigation and remediation and managed hunting services.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8657a87 elementor-section-content-middle elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8657a87\" data-element_type=\"section\" id=\"sectiontitle3\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9b4cb8a\" data-id=\"9b4cb8a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-1860abe elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1860abe\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-37f2c9b\" data-id=\"37f2c9b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-bebfd12\" data-id=\"bebfd12\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-987c8a2 elementor-widget elementor-widget-html\" data-id=\"987c8a2\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<iframe width=\"1080\" height=\"570\" src=\"https:\/\/www.youtube.com\/embed\/hbc-aniqVE0\" title=\"Microsoft Defender Series: Defending all 360\u00b0 of M365\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-13013a6\" data-id=\"13013a6\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-a66d177 elementor-widget elementor-widget-heading\" data-id=\"a66d177\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">FEATURES AND BENEFITS <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-de0df5c elementor-widget elementor-widget-text-editor\" data-id=\"de0df5c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Let us cover six ways organisations can use Microsoft 365 Defender to enhance their overall security posture.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-46bac07 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"46bac07\" data-element_type=\"section\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-6fecc7e\" data-id=\"6fecc7e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d2ab23f elementor-widget elementor-widget-image\" data-id=\"d2ab23f\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/UD_0823_img_3.png\" class=\"attachment-full size-full wp-image-19197\" alt=\"\" srcset=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/UD_0823_img_3.png 200w, https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/UD_0823_img_3-150x150.png 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" style=\"width:100%;height:100%;max-width:200px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-67d633b\" data-id=\"67d633b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ba530c1 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"ba530c1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Threat Detection and Response:<\/strong> Microsoft 365 Defender utilises advanced threat intelligence and machine learning algorithms to detect and respond to various cyber threats. It continuously monitors and analyses data across endpoints, email, and cloud applications to identify suspicious activities, malware and other indicators of compromise. This enables organisations to quickly detect and respond to potential cyberattacks, minimising the impact of security incidents.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-b7d8eed elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b7d8eed\" data-element_type=\"section\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-19dc482\" data-id=\"19dc482\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1f20d56 elementor-widget elementor-widget-image\" data-id=\"1f20d56\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/UD_0823_img_4.png\" class=\"attachment-full size-full wp-image-19198\" alt=\"\" srcset=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/UD_0823_img_4.png 200w, https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/UD_0823_img_4-150x150.png 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" style=\"width:100%;height:100%;max-width:200px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-6d6000d\" data-id=\"6d6000d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ccfff57 elementor-widget elementor-widget-text-editor\" data-id=\"ccfff57\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Endpoints:<\/strong> Microsoft Defender for Endpoint (MDE), provides comprehensive endpoint protection against a wide range of threats on different device types, such as laptop and mobile devices. MDE runs Next Generation Protection on the local devices and provides real-time data to the Defender cloud service. By securing endpoints, organisations can significantly reduce the risk of successful cyberattacks.<\/p><p>Defender for Endpoint is already part of the Windows operating system which makes the devices easy to configure and onboard to the Defender cloud service, depending on how you manage your Windows endpoints, Defender can be integrated with Microsoft Intune to easily onboard and configure devices using relevant policies. MDE also supports macOS, Linux, iOS, and Android.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-03ea494 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"03ea494\" data-element_type=\"section\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-027e4b9\" data-id=\"027e4b9\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3bae727 elementor-widget elementor-widget-image\" data-id=\"3bae727\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/UD_0823_img_5.png\" class=\"attachment-full size-full wp-image-19199\" alt=\"\" srcset=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/UD_0823_img_5.png 200w, https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/UD_0823_img_5-150x150.png 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" style=\"width:100%;height:100%;max-width:200px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-b520891\" data-id=\"b520891\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d414f0b elementor-widget elementor-widget-text-editor\" data-id=\"d414f0b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Email and documents:<\/strong> Microsoft Defender for Office 365 safeguards organisations against email-based threats, including phishing attempts, malicious attachments, and business email compromise (BEC) attacks. It employs advanced threat intelligence, anti-phishing technologies, real-time link scanning to detect and block malicious emails, protecting users from falling victim to cybercrime through email-based attacks.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-c494f74 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c494f74\" data-element_type=\"section\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-347d404\" data-id=\"347d404\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e6ba482 elementor-widget elementor-widget-image\" data-id=\"e6ba482\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/UD_0823_img_6.png\" class=\"attachment-full size-full wp-image-19200\" alt=\"\" srcset=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/UD_0823_img_6.png 200w, https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/UD_0823_img_6-150x150.png 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" style=\"width:100%;height:100%;max-width:200px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-6f7baf7\" data-id=\"6f7baf7\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bbc4346 elementor-widget elementor-widget-text-editor\" data-id=\"bbc4346\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Identities:<\/strong> Microsoft Defender for Identity and Entra ID (Azure Active Directory) help organisations enhance their identity and access management practices. It enables organisations to enforce strong authentication, implement multi-factor authentication (MFA) and manage access controls to prevent unauthorised access to sensitive resources. By securing user identities, organisations can thwart common cybercrime tactics, such as unauthorised access and credential theft. The Defender portal will receive signals from Entra ID and endpoints, as well as Active Directory domain controllers in a hybrid environment. This way Defender can alert to potential compromised accounts and behaviour anomalies from your Active Directory.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-2cd3b5f elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2cd3b5f\" data-element_type=\"section\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-e96feaf\" data-id=\"e96feaf\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a8d5ded elementor-widget elementor-widget-image\" data-id=\"a8d5ded\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/UD_0823_img_7.png\" class=\"attachment-full size-full wp-image-19201\" alt=\"\" srcset=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/UD_0823_img_7.png 200w, https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/UD_0823_img_7-150x150.png 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" style=\"width:100%;height:100%;max-width:200px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-0a2c589\" data-id=\"0a2c589\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7bf9ffb elementor-widget elementor-widget-text-editor\" data-id=\"7bf9ffb\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Cloud Apps:<\/strong> Microsoft Defender for Cloud Apps (MDAC) provides visibility and control over 25,000 cloud applications, including Office 365, detecting and mitigating risks associated with cloud usage. It helps organisations identify and respond to potential data breaches, unauthorised access, and risky user behaviours within cloud services. MDAC is used with Conditional Access policies to manage what activities users can perform on their devices, for example blocking of downloads from the company OneDrive to a personal computer. By monitoring and securing cloud applications, organisations can better protect their data and mitigate cloud-related cyber risks.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-220730a elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"220730a\" data-element_type=\"section\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-139bba9\" data-id=\"139bba9\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-dc2c2dd elementor-widget elementor-widget-image\" data-id=\"dc2c2dd\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/UD_0823_img_8.png\" class=\"attachment-full size-full wp-image-19202\" alt=\"\" srcset=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/UD_0823_img_8.png 200w, https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/UD_0823_img_8-150x150.png 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" style=\"width:100%;height:100%;max-width:200px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-02a03b9\" data-id=\"02a03b9\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-12640b9 elementor-widget elementor-widget-text-editor\" data-id=\"12640b9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Unified Security Management:<\/strong> The Microsoft 365 Defender portal offers a centralised management console for monitoring and managing security across services within the Microsoft 365 Defender suite. It provides a unified view of security events, alerts, and recommendations, enabling organisations to streamline their security operations and respond effectively to cyber threats.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-e71299e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e71299e\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-022b15e\" data-id=\"022b15e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-115567e elementor-widget elementor-widget-image\" data-id=\"115567e\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1195\" height=\"578\" src=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/Microsoft-Defender-Insentra-Asset-2.jpg\" class=\"attachment-full size-full wp-image-19203\" alt=\"\" srcset=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/Microsoft-Defender-Insentra-Asset-2.jpg 1195w, https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/Microsoft-Defender-Insentra-Asset-2-300x145.jpg 300w, https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/Microsoft-Defender-Insentra-Asset-2-1024x495.jpg 1024w, https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/Microsoft-Defender-Insentra-Asset-2-768x371.jpg 768w\" sizes=\"(max-width: 1195px) 100vw, 1195px\" style=\"width:100%;height:48.37%;max-width:1195px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-f1798b2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f1798b2\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-3d61684\" data-id=\"3d61684\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-fb76f26\" data-id=\"fb76f26\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fa4aef7 elementor-widget elementor-widget-html\" data-id=\"fa4aef7\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<iframe width=\"1080\" height=\"570\" src=\"https:\/\/www.youtube.com\/embed\/V7rQF0IKdGo\" title=\"Microsoft Defender Series: Unraveling the Importance of Security\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-396ba18\" data-id=\"396ba18\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1be6c65 elementor-section-content-middle elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1be6c65\" data-element_type=\"section\" id=\"sectiontitle4\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b8a6170\" data-id=\"b8a6170\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d56fc0e elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"d56fc0e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">CYBER CRIME STATISTICS<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-e897c70 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e897c70\" data-element_type=\"section\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-c1960ff\" data-id=\"c1960ff\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-dbb73de elementor-widget elementor-widget-image\" data-id=\"dbb73de\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/UD_0823_img_9.png\" class=\"attachment-full size-full wp-image-19204\" alt=\"\" srcset=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/UD_0823_img_9.png 200w, https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/UD_0823_img_9-150x150.png 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" style=\"width:100%;height:100%;max-width:200px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-9e29610\" data-id=\"9e29610\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-24d56cc elementor-widget elementor-widget-text-editor\" data-id=\"24d56cc\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Global<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e12ddeb elementor-widget elementor-widget-text-editor\" data-id=\"e12ddeb\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"23\" data-list-defn-props=\"{&quot;335551500&quot;:15884578,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\">The global annual cost of cybercrime is predicted to reach $8 trillion annually<br \/>in 2023<\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"23\" data-list-defn-props=\"{&quot;335551500&quot;:15884578,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\">The next five years are due to see a 15% increase in cybercrime costs reaching<br \/>10.5 trillion by 2025<\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"23\" data-list-defn-props=\"{&quot;335551500&quot;:15884578,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\">80% of reported cyber crimes are generally attributed to phishing attacks in<br \/>the technology sector<\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"23\" data-list-defn-props=\"{&quot;335551500&quot;:15884578,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\">Cybercrime earns cybercriminals $1.5 trillion every year. Small businesses<br \/>account for 43% of cyber attacks annually<\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"23\" data-list-defn-props=\"{&quot;335551500&quot;:15884578,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\">2021 was one of the costliest years in terms of data breaches through<br \/>phishing attacks in the last 17 years<\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"23\" data-list-defn-props=\"{&quot;335551500&quot;:15884578,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\">Ransomware will cost its victims around $265 billion annually by 2031<\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"23\" data-list-defn-props=\"{&quot;335551500&quot;:15884578,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\">Around 236 million ransomware attacks occurred globally in the first half of<br \/>2022.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-32785be elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"32785be\" data-element_type=\"section\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-619b5d6\" data-id=\"619b5d6\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3b0e26d elementor-widget elementor-widget-image\" data-id=\"3b0e26d\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/UD_0823_img_10.png\" class=\"attachment-full size-full wp-image-19205\" alt=\"\" srcset=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/UD_0823_img_10.png 200w, https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/UD_0823_img_10-150x150.png 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" style=\"width:100%;height:100%;max-width:200px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-5e9f160\" data-id=\"5e9f160\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7e28e83 elementor-widget elementor-widget-text-editor\" data-id=\"7e28e83\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>US<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-99d7c77 elementor-widget elementor-widget-text-editor\" data-id=\"99d7c77\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"23\" data-list-defn-props=\"{&quot;335551500&quot;:15884578,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\">Data breaches cost businesses an average of $4.35 million in 2022<\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"23\" data-list-defn-props=\"{&quot;335551500&quot;:15884578,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\">1 in 2 American internet users had their accounts breached in 2021<\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"23\" data-list-defn-props=\"{&quot;335551500&quot;:15884578,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\">53.35% of US citizens were affected by cybercrime in the first half of 2022<\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"23\" data-list-defn-props=\"{&quot;335551500&quot;:15884578,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\">Around 1 in 10 US organisations have no insurance against cyber-attacks<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-cfc0805 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"cfc0805\" data-element_type=\"section\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-e3b24f6\" data-id=\"e3b24f6\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cff0a1c elementor-widget elementor-widget-image\" data-id=\"cff0a1c\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/UD_0823_img_11.png\" class=\"attachment-full size-full wp-image-19206\" alt=\"\" srcset=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/UD_0823_img_11.png 200w, https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/UD_0823_img_11-150x150.png 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" style=\"width:100%;height:100%;max-width:200px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-708c98b\" data-id=\"708c98b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b6df1a1 elementor-widget elementor-widget-text-editor\" data-id=\"b6df1a1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>UK<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-07c2758 elementor-widget elementor-widget-text-editor\" data-id=\"07c2758\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>39% of UK businesses reported suffering a cyber-attack in 2022<\/li><li>The average cost of a cyber-attack for a smaller business is \u00a34200 with the cost to medium and large businesses rising to \u00a319,400 and that doesn\u2019t take into account the potential damage to the businesses reputation and loss of confidence from clients and consumers<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-f648568 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f648568\" data-element_type=\"section\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-0dd0f27\" data-id=\"0dd0f27\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4869ea2 elementor-widget elementor-widget-image\" data-id=\"4869ea2\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/UD_0823_img_12.png\" class=\"attachment-full size-full wp-image-19207\" alt=\"\" srcset=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/UD_0823_img_12.png 200w, https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/UD_0823_img_12-150x150.png 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" style=\"width:100%;height:100%;max-width:200px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-e7c1174\" data-id=\"e7c1174\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-abcea00 elementor-widget elementor-widget-text-editor\" data-id=\"abcea00\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>AUS<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:276}\">\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-763c3a7 elementor-widget elementor-widget-text-editor\" data-id=\"763c3a7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"23\" data-list-defn-props=\"{&quot;335551500&quot;:15884578,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\">There is a rise in the average cost per cybercrime report to over $39,000 for small businesses, $88,000 for medium businesses, and over $62,000 for large businesses. An average increase of 14%<\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"23\" data-list-defn-props=\"{&quot;335551500&quot;:15884578,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\">Ransomware attacks have increased by nearly 500% since the start of the COVID-19 pandemic<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-f68cf45 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f68cf45\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-e468eac\" data-id=\"e468eac\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ffc45bd elementor-widget elementor-widget-text-editor\" data-id=\"ffc45bd\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>References:<\/strong><br \/><a href=\"https:\/\/www.getastra.com\/blog\/security-audit\/cyber-crime-statistics\/\" target=\"_blank\" rel=\"noopener nofollow\">Top Cyber Crime Statistics 2023<\/a><br \/><a href=\"https:\/\/eftsure.com\/statistics\/cyber-crime-statistics\/\" target=\"_blank\" rel=\"noopener nofollow\">Critical Cyber Crime Statistics in Australia 2023<\/a><br \/><a href=\"https:\/\/nbcc.police.uk\/crime-prevention\/cyber-and-fraud\" target=\"_blank\" rel=\"noopener nofollow\">National Business Crime Centre<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-bea1632 elementor-section-content-middle elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"bea1632\" data-element_type=\"section\" id=\"sectiontitle5\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-978aadf\" data-id=\"978aadf\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9431817 elementor-widget elementor-widget-heading\" data-id=\"9431817\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">MICROSOFT DEFENDER FOR ENDPOINT <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2267024 elementor-widget elementor-widget-text-editor\" data-id=\"2267024\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Earlier in the guide we discussed all the products in the Defender suite and this section will dive deeper into Microsoft Defender for Endpoint and its features and give some real-world examples.<\/p><p>Microsoft Defender for Endpoint is an enterprise endpoint security platform designed to help enterprise networks prevent, detect, investigate, and respond to advanced threats. It is an industry-leading, cloud-powered endpoint security solution that helps to secure against ransomware, file-less malware and other sophisticated attacks across platforms.<\/p><p>Defender for Endpoint uses a combination of technology built into Windows and Microsoft\u2019s robust cloud service. It offers advanced post-breach detection sensors collecting a vast array of behavioural signals from your machines. It also offers next-generation antimalware, attack surface reduction rules, device control (such as USB), endpoint firewall, network protection, web control \/ category-based URL blocking, device-based conditional access and controlled folder access.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-30cddba elementor-section-content-middle elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"30cddba\" data-element_type=\"section\" id=\"sectiontitle6\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3f422f9\" data-id=\"3f422f9\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1df96e2 elementor-widget elementor-widget-heading\" data-id=\"1df96e2\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">HOW IT WORKS <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-21a39e0 elementor-widget elementor-widget-image\" data-id=\"21a39e0\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"4501\" height=\"2099\" src=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/Microsoft_Defender_for_Endpoint_Builtin_cloud-powered.png\" class=\"attachment-full size-full wp-image-19208\" alt=\"\" srcset=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/Microsoft_Defender_for_Endpoint_Builtin_cloud-powered.png 4501w, https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/Microsoft_Defender_for_Endpoint_Builtin_cloud-powered-300x140.png 300w, https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/Microsoft_Defender_for_Endpoint_Builtin_cloud-powered-1024x478.png 1024w, https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/Microsoft_Defender_for_Endpoint_Builtin_cloud-powered-768x358.png 768w, https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/Microsoft_Defender_for_Endpoint_Builtin_cloud-powered-1536x716.png 1536w, https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/Microsoft_Defender_for_Endpoint_Builtin_cloud-powered-2048x955.png 2048w, https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/Microsoft_Defender_for_Endpoint_Builtin_cloud-powered-1568x731.png 1568w\" sizes=\"(max-width: 4501px) 100vw, 4501px\" style=\"width:100%;height:46.63%;max-width:4501px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bb524f0 elementor-widget elementor-widget-text-editor\" data-id=\"bb524f0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Microsoft Defender for Endpoint uses behavioural sensors to monitor system activities and detect suspicious behaviour. It also uses cloud security analytics to identify potential threats in real time. Threat intelligence is used to identify known threats and provide insights into new ones. Microsoft Defender for Endpoint also offers vulnerability management and assessment capabilities that help businesses discover security vulnerabilities and prioritise them with security recommendations.<\/p><p>Microsoft Defender for Endpoint can operate as Microsoft Endpoint Detection and Response (EDR) to form a security solution that helps organisations detect and respond to advanced threats on their endpoints. It provides real-time visibility into security incidents and provides automated responses to remediate threats. Microsoft Defender for Endpoint is an EDR solution that uses behavioural sensors, cloud security analytics, and threat intelligence to prevent, detect, and respond to advanced threats on Windows, Linux, Mac, iOS, and Android devices. It also offers vulnerability management and assessment, attack surface reduction, automatic investigation and remediation, and managed hunting services.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ef2b184 elementor-section-content-middle elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ef2b184\" data-element_type=\"section\" id=\"sectiontitle7\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e0225af\" data-id=\"e0225af\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9836f32 elementor-widget elementor-widget-heading\" data-id=\"9836f32\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">FEATURES AND BENEFITS <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-ba703e5 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ba703e5\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-b2bebf5\" data-id=\"b2bebf5\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-19ea2c2\" data-id=\"19ea2c2\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d72b42f elementor-widget elementor-widget-html\" data-id=\"d72b42f\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<iframe width=\"1080\" height=\"570\" src=\"https:\/\/www.youtube.com\/embed\/b21uOQU6aFA\" title=\"Microsoft Defender Series: Defending What Matters\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-7bdbaf6\" data-id=\"7bdbaf6\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-450b627 elementor-widget elementor-widget-text-editor\" data-id=\"450b627\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Microsoft Defender for Endpoint offers a wide range of features and benefits that help protect your organisation from advanced threats. It delivers preventive protection, post-breach detection, automated investigation and response for endpoints. It has two plans: Plan 1 and Plan 2.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-b8cbe4c elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b8cbe4c\" data-element_type=\"section\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-371cf79\" data-id=\"371cf79\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d0a330b elementor-widget elementor-widget-image\" data-id=\"d0a330b\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"250\" height=\"355\" src=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/UD_0823_img_13.png\" class=\"attachment-full size-full wp-image-19209\" alt=\"\" srcset=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/UD_0823_img_13.png 250w, https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/UD_0823_img_13-211x300.png 211w\" sizes=\"(max-width: 250px) 100vw, 250px\" style=\"width:100%;height:142%;max-width:250px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-6e35091\" data-id=\"6e35091\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-13c4615 elementor-widget elementor-widget-text-editor\" data-id=\"13c4615\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b>Plan 1 offers capabilities such as:<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:276}\">\u00a0<\/b><\/p><ul><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"23\" data-list-defn-props=\"{&quot;335551500&quot;:15884578,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"5\" data-aria-level=\"1\"><strong>Advance security features:<\/strong> Next-generation protection (includes<br \/>antimalware and antivirus)<\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"23\" data-list-defn-props=\"{&quot;335551500&quot;:15884578,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"5\" data-aria-level=\"1\"><strong>Attack surface reduction:<\/strong> Reduces the attack surface, for example<br \/>blocking MS office products from creating child processes<\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"23\" data-list-defn-props=\"{&quot;335551500&quot;:15884578,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"5\" data-aria-level=\"1\"><strong>Manual response actions:<\/strong> For example, isolating a device by disconnecting<br \/>it from the organisations network<\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"23\" data-list-defn-props=\"{&quot;335551500&quot;:15884578,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"5\" data-aria-level=\"1\">Centralised management in the Microsoft 365 Defender portal<\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"23\" data-list-defn-props=\"{&quot;335551500&quot;:15884578,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"5\" data-aria-level=\"1\"><strong>Security reports:<\/strong> Easy access to information about detected threats and<br \/>actions to address those threats<\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"23\" data-list-defn-props=\"{&quot;335551500&quot;:15884578,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"5\" data-aria-level=\"1\"><strong>Device Compatability:<\/strong> Support for Windows 10, Windows 11, iOS, Android,<br \/>macOS, and Linux devices<\/li><\/ul><div>The diagram below shows Plan 1 (orange) and Plan 2 features<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-b5e00d9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b5e00d9\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-78e99fb\" data-id=\"78e99fb\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-348c11f elementor-widget elementor-widget-image\" data-id=\"348c11f\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"4501\" height=\"2400\" src=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/Microsoft_Defender_for_Endpoint_plan_1_capabilities.png\" class=\"attachment-full size-full wp-image-19210\" alt=\"\" srcset=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/Microsoft_Defender_for_Endpoint_plan_1_capabilities.png 4501w, https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/Microsoft_Defender_for_Endpoint_plan_1_capabilities-300x160.png 300w, https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/Microsoft_Defender_for_Endpoint_plan_1_capabilities-1024x546.png 1024w, https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/Microsoft_Defender_for_Endpoint_plan_1_capabilities-768x410.png 768w, https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/Microsoft_Defender_for_Endpoint_plan_1_capabilities-1536x819.png 1536w, https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/Microsoft_Defender_for_Endpoint_plan_1_capabilities-2048x1092.png 2048w, https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/Microsoft_Defender_for_Endpoint_plan_1_capabilities-1568x836.png 1568w\" sizes=\"(max-width: 4501px) 100vw, 4501px\" style=\"width:100%;height:53.32%;max-width:4501px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-c114331 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c114331\" data-element_type=\"section\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-6932a53\" data-id=\"6932a53\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9e387a6 elementor-widget elementor-widget-image\" data-id=\"9e387a6\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"250\" height=\"355\" src=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/UD_0823_img_14.png\" class=\"attachment-full size-full wp-image-19211\" alt=\"\" srcset=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/UD_0823_img_14.png 250w, https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/UD_0823_img_14-211x300.png 211w\" sizes=\"(max-width: 250px) 100vw, 250px\" style=\"width:100%;height:142%;max-width:250px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-69b7d33\" data-id=\"69b7d33\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-dc68445 elementor-widget elementor-widget-text-editor\" data-id=\"dc68445\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b>Plan 2 has all of the Defender for Endpoint Plan 1 capabilities, plus:<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:360,&quot;335559739&quot;:60,&quot;335559740&quot;:276,&quot;335559991&quot;:360}\">\u00a0<\/b><\/p><ul><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"23\" data-list-defn-props=\"{&quot;335551500&quot;:15884578,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><strong>Threat and vulnerability management:<\/strong> Using sensors within the tool, Microsoft Defender for Endpoint will discover, prioritise and remediate misconfigurations within the endpoints in real-time. Using insight into application usage patterns, Microsoft Defender for Endpoint can prioritise the highest value assets, such as business-critical applications, confidential data and highest value users against these types of attacks<\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"23\" data-list-defn-props=\"{&quot;335551500&quot;:15884578,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><strong>Device discovery:<\/strong> Helps you find unmanaged devices connected to your corporate network without the need for extra appliances<\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"23\" data-list-defn-props=\"{&quot;335551500&quot;:15884578,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><strong>Device inventory:<\/strong> Shows a list of the devices in your network where alerts were generated. By default, the queue displays devices seen in the last 30 days. At a glance you\u2019ll see information such as domain, risk level, OS platform and other details for easy identification of devices most at risk<\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"23\" data-list-defn-props=\"{&quot;335551500&quot;:15884578,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><strong>Threat Analytics:<\/strong> A set of reports from expert Microsoft security researchers covering the most relevant threats. Each report provides a detailed analysis of a threat and extensive guidance on how to defend against that threat. It also incorporates data from your network, indicating whether the threat is active and if you have applicable protections in place<\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"23\" data-list-defn-props=\"{&quot;335551500&quot;:15884578,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><strong>Automated Investigation and Response (AIR)<\/strong>: AIR capabilities are designed to examine alerts and take immediate action to resolve breaches automatically and without the need for manual intervention by a security analyst. AIR capabilities significantly reduce alert volume, allowing security operations to focus on more sophisticated threats and other high-value initiatives<\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"23\" data-list-defn-props=\"{&quot;335551500&quot;:15884578,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><strong>Advanced hunting:<\/strong> Advanced hunting is a threat-hunting tool that uses specially constructed queries (using Kusto Query Language) to examine the past 30 days of event data in Microsoft 365 Defender. Organisations can use advanced hunting queries to inspect unusual activity, detect possible threats, and even respond to attacks. For example, lookup processes that performed LDAP authentication with clear text passwords on endpoints<\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"23\" data-list-defn-props=\"{&quot;335551500&quot;:15884578,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><strong>Endpoint Detection and Response (EDR):<\/strong> When a threat is detected, alerts are created in the system for an analyst to investigate. Alerts with the same attack techniques or attributed to the same attacker are aggregated into an entity called an incident. Aggregating alerts in this manner makes it easy for analysts to collectively investigate and respond to threats<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-12824c4 elementor-section-content-middle elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"12824c4\" data-element_type=\"section\" id=\"sectiontitle8\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-32748b9\" data-id=\"32748b9\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-7de53fd elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7de53fd\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-dde0933\" data-id=\"dde0933\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-16369d6\" data-id=\"16369d6\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2f498fc elementor-widget elementor-widget-html\" data-id=\"2f498fc\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<iframe width=\"1080\" height=\"570\" src=\"https:\/\/www.youtube.com\/embed\/6KYVvvRC2xA\" title=\"Microsoft Defender Series: Endpoint Defense Demystified\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-0a647e6\" data-id=\"0a647e6\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-736644a elementor-widget elementor-widget-heading\" data-id=\"736644a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">MIGRATING TO DEFENDER FOR ENDPOINT <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-21fbaec elementor-widget elementor-widget-text-editor\" data-id=\"21fbaec\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>At Insentra, we are working with many customers looking to migrate from third party endpoint protection products to Microsoft Defender to streamline and simplify their security solutions and operations.<\/p><p>By including Defender for Endpoint as part of the operating system in Windows, Microsoft have streamlined the migration and onboarding process.<\/p><p>Devices can be on-boarded into Microsoft Defender for Endpoint while running a third-party endpoint protection solution. This enables an organisation to run for a period of coexistence, while collecting security signals from endpoints and without reducing their security posture. When ready, the organisation can remove the third-party agent which automatically puts Microsoft Defender into active mode, leaving no gap in protection.<\/p><p>The high-level migration process from an existing 3rd part solution is broken down into 3 phases.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1e44a65 elementor-section-content-middle elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1e44a65\" data-element_type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-9d907d2\" data-id=\"9d907d2\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-adffb45\" data-id=\"adffb45\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-33cba00 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"33cba00\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"185\" height=\"185\" src=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/microsoft_d_num_1.png\" class=\"attachment-large size-large wp-image-19212\" alt=\"\" srcset=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/microsoft_d_num_1.png 185w, https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/microsoft_d_num_1-150x150.png 150w\" sizes=\"(max-width: 185px) 100vw, 185px\" style=\"width:100%;height:100%;max-width:185px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-401fe3b\" data-id=\"401fe3b\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-80b41fe elementor-widget elementor-widget-heading\" data-id=\"80b41fe\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">PHASE 1 - PREPARE<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6cd1095 elementor-widget elementor-widget-text-editor\" data-id=\"6cd1095\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Update devices<\/li><li>Prepare you team<\/li><li>Configure device proxy and internet settings<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-ac3dd48\" data-id=\"ac3dd48\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0d8db3f elementor-section-content-middle elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0d8db3f\" data-element_type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-c0985b2\" data-id=\"c0985b2\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-8853028\" data-id=\"8853028\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-907d6db elementor-widget elementor-widget-image\" data-id=\"907d6db\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"185\" height=\"185\" src=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/microsoft_d_num_2.png\" class=\"attachment-large size-large wp-image-19213\" alt=\"\" srcset=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/microsoft_d_num_2.png 185w, https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/microsoft_d_num_2-150x150.png 150w\" sizes=\"(max-width: 185px) 100vw, 185px\" style=\"width:100%;height:100%;max-width:185px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-0193503\" data-id=\"0193503\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3701214 elementor-widget elementor-widget-heading\" data-id=\"3701214\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">PHASE 2 - SETUP<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f4c5a78 elementor-widget elementor-widget-text-editor\" data-id=\"f4c5a78\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Re-install Microsoft Defender Antivirus (if<br \/>required) *MDE is part of the OS in Windows<br \/>10\/11, so typically is still installed but disabled<\/li><li>Onboard devices and enable Microsoft Defender<br \/>Antivirus in passive mode<\/li><li>Run a detection test to confirm that onboarding<br \/>was successful<\/li><li>Configure policies and settings<\/li><li>Get updates for Microsoft Defender Antivirus<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-35d98fe\" data-id=\"35d98fe\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4b4d05d elementor-section-content-middle elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4b4d05d\" data-element_type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-429c593\" data-id=\"429c593\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-90963f3\" data-id=\"90963f3\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-393adc6 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"393adc6\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"185\" height=\"185\" src=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/microsoft_d_num_3.png\" class=\"attachment-large size-large wp-image-19214\" alt=\"\" srcset=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/microsoft_d_num_3.png 185w, https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/microsoft_d_num_3-150x150.png 150w\" sizes=\"(max-width: 185px) 100vw, 185px\" style=\"width:100%;height:100%;max-width:185px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-9b44097\" data-id=\"9b44097\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9be2c67 elementor-widget elementor-widget-heading\" data-id=\"9be2c67\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">PHASE 3 - SWITCH <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d2e9efa elementor-widget elementor-widget-text-editor\" data-id=\"d2e9efa\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Uninstall non-Microsoft endpoint<br \/>protection product<\/li><li>Switch Defender Antivirus to active mode<\/li><li>Run a simulation to prove end-to-end<br \/>protection<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-83094b9\" data-id=\"83094b9\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-81e0531 elementor-section-content-middle elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"81e0531\" data-element_type=\"section\" id=\"sectiontitle9\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-13bbea3\" data-id=\"13bbea3\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-567eaf8 elementor-widget elementor-widget-heading\" data-id=\"567eaf8\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">REAL-WORLD EXAMPLE <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-83f7f98 elementor-widget elementor-widget-text-editor\" data-id=\"83f7f98\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Consider a medium-sized company using Microsoft Defender for Endpoint as part of their cybersecurity strategy. They have numerous endpoints (desktops and laptops) used by employees for day-to-day work. Let\u2019s look at a scenario where an employee at a company receives a malicious email containing a disguised link, which if clicked, will trigger a ransomware attack.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-912dba8 elementor-widget elementor-widget-text-editor\" data-id=\"912dba8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b style=\"font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-size: 1rem;\">Here\u2019s how Microsoft 365 Defender can intervene and stop the attack:<\/b><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-457bb6a elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"457bb6a\" data-element_type=\"section\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-79716d5\" data-id=\"79716d5\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0a4ba46 elementor-widget elementor-widget-image\" data-id=\"0a4ba46\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/UD_0823_img_15.png\" class=\"attachment-full size-full wp-image-19215\" alt=\"\" srcset=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/UD_0823_img_15.png 200w, https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/UD_0823_img_15-150x150.png 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" style=\"width:100%;height:100%;max-width:200px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-27e084a\" data-id=\"27e084a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-802bb55 elementor-widget elementor-widget-text-editor\" data-id=\"802bb55\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Email Protection:<\/strong> Microsoft Defender for Office 365, the email security component of Microsoft Defender for Endpoint, scans incoming emails in realtime. It uses advanced anti-phishing technologies and threat intelligence to detect and block malicious emails, including those with suspicious links or attachments.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-a95c2e1 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a95c2e1\" data-element_type=\"section\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-60af709\" data-id=\"60af709\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a57a7cd elementor-widget elementor-widget-image\" data-id=\"a57a7cd\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/UD_0823_img_16.png\" class=\"attachment-full size-full wp-image-19216\" alt=\"\" srcset=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/UD_0823_img_16.png 200w, https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/UD_0823_img_16-150x150.png 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" style=\"width:100%;height:100%;max-width:200px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-9caefab\" data-id=\"9caefab\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-57103ed elementor-widget elementor-widget-text-editor\" data-id=\"57103ed\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Link Scanning:<\/strong> When the employee receives the malicious email, Microsoft Defender for Office 365 scans the link embedded within it. It compares it against known malicious URLs and checks if it leads to a potentially harmful website.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-699f3f4 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"699f3f4\" data-element_type=\"section\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-61d0b2b\" data-id=\"61d0b2b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-250d5c5 elementor-widget elementor-widget-image\" data-id=\"250d5c5\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/UD_0823_img_17.png\" class=\"attachment-full size-full wp-image-19217\" alt=\"\" srcset=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/UD_0823_img_17.png 200w, https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/UD_0823_img_17-150x150.png 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" style=\"width:100%;height:100%;max-width:200px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-41ecbe0\" data-id=\"41ecbe0\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-19e8ecf elementor-widget elementor-widget-text-editor\" data-id=\"19e8ecf\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Real-Time Analysis:<\/strong> Microsoft Defender for Endpoint analyses the behaviour of the suspicious link in real-time. It uses machine learning algorithms and heuristics to determine if the link poses a potential threat. It considers factors such as the website\u2019s reputation, previous encounters with similar links, and known patterns of malicious behaviour.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-4ac9902 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4ac9902\" data-element_type=\"section\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-4079a22\" data-id=\"4079a22\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3df4486 elementor-widget elementor-widget-image\" data-id=\"3df4486\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/UD_0823_img_18.png\" class=\"attachment-full size-full wp-image-19218\" alt=\"\" srcset=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/UD_0823_img_18.png 200w, https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/UD_0823_img_18-150x150.png 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" style=\"width:100%;height:100%;max-width:200px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-a139f5b\" data-id=\"a139f5b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2fa1f56 elementor-widget elementor-widget-text-editor\" data-id=\"2fa1f56\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Block and Alert:<\/strong> If Microsoft Defender for Endpoint determines the link is indeed malicious, it takes action. It can block the employee\u2019s access to the website, preventing them from clicking on the link and exposing their system to the ransomware attack. Simultaneously, it alerts the security team about the attempted attack, providing them with details and insights for further investigation.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-f81378e elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f81378e\" data-element_type=\"section\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-3d7d6bd\" data-id=\"3d7d6bd\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c3ba8e0 elementor-widget elementor-widget-image\" data-id=\"c3ba8e0\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/UD_0823_img_19.png\" class=\"attachment-full size-full wp-image-19219\" alt=\"\" srcset=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/UD_0823_img_19.png 200w, https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/UD_0823_img_19-150x150.png 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" style=\"width:100%;height:100%;max-width:200px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-23071bb\" data-id=\"23071bb\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f698c02 elementor-widget elementor-widget-text-editor\" data-id=\"f698c02\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Incident Response:<\/strong> Upon receiving the alert, the security team can initiate incident response procedures. They can leverage the investigation capabilities of Microsoft Defender for Endpoint to analyse the attempted attack, identify any potential indicators of compromise, and take appropriate measures to contain and mitigate the threat.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-ad5a54f elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ad5a54f\" data-element_type=\"section\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-4a7bf62\" data-id=\"4a7bf62\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6cf2d11 elementor-widget elementor-widget-image\" data-id=\"6cf2d11\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/UD_0823_img_20.png\" class=\"attachment-full size-full wp-image-19220\" alt=\"\" srcset=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/UD_0823_img_20.png 200w, https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/UD_0823_img_20-150x150.png 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" style=\"width:100%;height:100%;max-width:200px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-d5c1bbe\" data-id=\"d5c1bbe\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-775ad99 elementor-widget elementor-widget-text-editor\" data-id=\"775ad99\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Automated Investigation:<\/strong> With Microsoft 365 E5 licencing or the Microsoft Defender for Endpoint Plan 2 add-on organisations can leverage Automated Investigation and Response (AIR) capabilities. Given the never-ending flow of threats, security teams often face the challenge of addressing the high volume of alerts. Imagine having a virtual analyst in your Tier 1 or Tier 2 security operations team. The virtual analyst mimics the ideal steps that security operations would take to investigate and remediate threats. The virtual analyst could work 24&#215;7, with unlimited capacity and take on a significant load of investigations and threat remediation.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7d705cd elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7d705cd\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-f3bae7c\" data-id=\"f3bae7c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-97fd363\" data-id=\"97fd363\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6ca5b81 elementor-widget elementor-widget-html\" data-id=\"6ca5b81\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<iframe width=\"1080\" height=\"570\" src=\"https:\/\/www.youtube.com\/embed\/s18JWN2anRM\" title=\"Microsoft Defender Series: Cloud Point Defense Explained\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-e0aab03\" data-id=\"e0aab03\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-dad210b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"dad210b\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-9d1c45b\" data-id=\"9d1c45b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-1f8b62b\" data-id=\"1f8b62b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e49e435 elementor-widget elementor-widget-html\" data-id=\"e49e435\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<iframe width=\"1080\" height=\"570\" src=\"https:\/\/www.youtube.com\/embed\/iX-oGFP284I\" title=\"Microsoft Defender Series: Securing Cloud Apps\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-136b926\" data-id=\"136b926\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-93fac45 elementor-section-content-middle elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"93fac45\" data-element_type=\"section\" id=\"sectiontitle10\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1f4da48\" data-id=\"1f4da48\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a7f03e5 elementor-widget elementor-widget-heading\" data-id=\"a7f03e5\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">LICENSING <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-956dfc5 elementor-widget elementor-widget-text-editor\" data-id=\"956dfc5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Microsoft Defender for Endpoint licencing essentially comes in two flavours, Plan 1 and Plan 2 (see the above graphic on page 6\/7 for the feature comparison).<\/p><p><strong>Plan 1 is included with:<\/strong><\/p><ul><li>Microsoft 365 E3 with the Microsoft 365 E5 Security add-on<\/li><\/ul><p><strong>Plan 2 is included with:<\/strong><\/p><ul><li>Windows 11 Enterprise E5\/A5<\/li><li>Windows 10 Enterprise E5\/A5<\/li><li>Microsoft 365 E5\/A5\/G5 (which includes Windows 10 or Windows 11 Enterprise E5)<\/li><li>Microsoft 365 E5\/A5\/G5\/F5 Security<\/li><li>Microsoft 365 F5 Security &amp; Compliance<\/li><\/ul><div><a href=\"https:\/\/learn.microsoft.com\/en-us\/office365\/servicedescriptions\/microsoft-365-service-descriptions\/microsoft-365-tenantlevel-services-licensing-guidance\/microsoft-365-security-compliance-licensing-guidance\" target=\"_blank\" rel=\"noopener nofollow\">Which licenses provide the rights for users to benefit from the service?<\/a><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a8dac97 elementor-section-content-middle elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a8dac97\" data-element_type=\"section\" id=\"sectiontitle11\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-23e76e1\" data-id=\"23e76e1\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3860fd6 elementor-widget elementor-widget-heading\" data-id=\"3860fd6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">CONCLUSION<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d8c8dd8 elementor-widget elementor-widget-text-editor\" data-id=\"d8c8dd8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Microsoft Defender for Endpoint is a crucial component of the Microsoft 365 Defender suite, offering comprehensive endpoint protection against a wide range of cyber threats. By using behavioural sensors, cloud security analytics, and threat intelligence, Defender for Endpoint provides real-time detection and response capabilities, helping organisations quickly identify and mitigate potential security incidents.<\/p><p>With its advanced threat detection and response features, Microsoft Defender for Endpoint empowers organisations to safeguard their endpoints, prevent ransomware attacks, and protect against file-less malware. Its integration with other Microsoft Defender products, such as Defender for Office 365 and Defender for Identity, strengthens overall security posture by providing protection against email-based threats and enhancing identity and access management practices.<\/p><p>Moreover, Microsoft 365 Defender\u2019s centralised management console streamlines security operations, offering a unified view of security events, alerts, and recommendations.<\/p><p>As cybercrime continues to pose significant risks to organisations worldwide, the need for robust cybersecurity solutions offered by Microsoft Defender for Endpoint becomes increasingly evident. With its comprehensive features and benefits, coupled with seamless onboarding for existing Windows users, migrating to and adopting Defender for Endpoint can be a strategic move towards enhancing an organisation\u2019s cybersecurity resilience.<\/p><p>By leveraging the capabilities of Microsoft Defender for Endpoint, organisations can proactively detect, respond and mitigate cyber threats, ultimately safeguarding their sensitive data, digital assets, and operations from the ever evolving landscape of cybercrime.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1fd2af5 elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1fd2af5\" data-element_type=\"section\" id=\"dpwnloadpdf\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wider\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-88bfc1f\" data-id=\"88bfc1f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6ba8eff elementor-widget elementor-widget-heading\" data-id=\"6ba8eff\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">DOWNLOAD THE COMPLETE GUIDE<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-5c70cf7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5c70cf7\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-e31fa7a\" data-id=\"e31fa7a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-73d5999 elementor-widget elementor-widget-image\" data-id=\"73d5999\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"600\" src=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/Microsoft_Defender_Fanout_v2.png\" class=\"attachment-large size-large wp-image-19135\" alt=\"\" srcset=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/Microsoft_Defender_Fanout_v2.png 600w, https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/Microsoft_Defender_Fanout_v2-300x300.png 300w, https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/Microsoft_Defender_Fanout_v2-150x150.png 150w\" sizes=\"(max-width: 600px) 100vw, 600px\" style=\"width:100%;height:100%;max-width:600px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-0112652\" data-id=\"0112652\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-35da028 elementor-widget elementor-widget-spacer\" data-id=\"35da028\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-78dd189 elementor-widget elementor-widget-html\" data-id=\"78dd189\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<script charset=\"utf-8\" type=\"text\/javascript\" src=\"\/\/js.hsforms.net\/forms\/v2.js?pre=1\"><\/script>\r\n<script>\r\njQuery(function($){\r\n    var curr_url_checker = window.location.href; var curr_url_splitter = curr_url_checker.split(\"?\"); var curr_url = curr_url_splitter[0];\r\n    hbspt.forms.create({\r\n        region: \"na1\",\r\n        portalId: \"20799536\",\r\n        formId: \"ec504498-09eb-4fec-860c-e9a2dcb6c81b\", \/\/Change to form ID\r\n        redirectUrl: curr_url + '?thank-you=yes', onBeforeFormSubmit($form, submissionValues){ for(var i=0; i<submissionValues.length; i++){ if(submissionValues[i].name=='email'){ createCookie('hsThankEmail', submissionValues[i].value, 1); }} },\r\n        css: \".hs_error_rollup {display:none !important;}\", onFormReady: function($form){\r\n            $form.find('input[name=\"referral_page\"]').val(curr_url).change();\r\n        }\r\n    });\r\n});\r\n<\/script>\r\n\r\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-66e32bd elementor-section-full_width thank-you-section elementor-section-height-default elementor-section-height-default\" data-id=\"66e32bd\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5412d38\" data-id=\"5412d38\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-c89de80 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c89de80\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wider\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-e5af7f8\" data-id=\"e5af7f8\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8fc2e34 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"8fc2e34\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Thank you for downloading the Complete Guide to Microsoft Defender for Endpoint.\u202f<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-bdbb31a elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"bdbb31a\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-e5a069a\" data-id=\"e5a069a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-52e4ce1 elementor-widget elementor-widget-text-editor\" data-id=\"52e4ce1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>We\u2019ve sent a copy to your inbox. Remember to mark <a href=\"mailto:hello@insentragroup.com\"><b>hello@insentragroup.com<\/b><\/a> as a \u201csafe sender\u201d, and to check any junk or spam folders so you receive your copy.\u202f<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-fa9d7e9\" data-id=\"fa9d7e9\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-dfe6d0e elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"dfe6d0e\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"600\" src=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/Microsoft_Defender_Fanout_v2-1-1.png\" class=\"attachment-large size-large wp-image-19221\" alt=\"\" srcset=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/Microsoft_Defender_Fanout_v2-1-1.png 600w, https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/Microsoft_Defender_Fanout_v2-1-1-300x300.png 300w, https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/Microsoft_Defender_Fanout_v2-1-1-150x150.png 150w\" sizes=\"(max-width: 600px) 100vw, 600px\" style=\"width:100%;height:100%;max-width:600px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-fb866fb elementor-section-content-middle d-none elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"fb866fb\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-6fe2109\" data-id=\"6fe2109\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3b12595 elementor-widget__width-initial thankyou-image elementor-widget elementor-widget-image\" data-id=\"3b12595\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"600\" src=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/MicrosoftTeams-image-11-2.png\" class=\"attachment-full size-full wp-image-19160\" alt=\"\" srcset=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/MicrosoftTeams-image-11-2.png 600w, https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/MicrosoftTeams-image-11-2-300x300.png 300w, https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/MicrosoftTeams-image-11-2-150x150.png 150w\" sizes=\"(max-width: 600px) 100vw, 600px\" style=\"width:100%;height:100%;max-width:600px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-364e56c elementor-widget elementor-widget-text-editor\" data-id=\"364e56c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>We\u2019ve sent a copy to your inbox. Remember to mark <b>hello@insentragroup.com<\/b> as a \u201csafe sender\u201d, and to check any junk or spam folders so you receive your copy.\u202f<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-6e3714c booking-box\" data-id=\"6e3714c\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d6142d1 elementor-widget elementor-widget-html\" data-id=\"d6142d1\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<style>\r\n.booking-box .elementor-column.elementor-col-20 {\r\n    width: 10%;\r\n    padding-top: 11px;\r\n    background-color: #fff;\r\n    text-align:center !important;\r\n    border: solid 1px #ededed;\r\n    border-radius: 4px;\r\n    font-size: 12px;\r\n}\r\n.booking-box .elementor-column.elementor-col-80 {\r\n    width: 90%;\r\n}\r\n.booking-box .meeting-avatar {\r\n\ttransform: scale(1);\r\n\tanimation: pulse 1s infinite;\r\n}\r\n@keyframes pulse {\r\n\t0% {\r\n\t\ttransform: scale(0.95);\r\n\t\tbox-shadow: 0 0 0 0 rgba(0, 0, 0, 0.7);\r\n\t}\r\n\r\n\t70% {\r\n\t\ttransform: scale(1);\r\n\t\tbox-shadow: 0 0 0 10px rgba(0, 0, 0, 0);\r\n\t}\r\n\r\n\t100% {\r\n\t\ttransform: scale(0.95);\r\n\t\tbox-shadow: 0 0 0 0 rgba(0, 0, 0, 0);\r\n\t}\r\n}    \r\n<\/style>\r\n<div class=\"text-center mb-3\">\r\n    <img decoding=\"async\" src=\"https:\/\/avatars.hubspot.net\/2450d4f47b3e5475f6e6fb18cd74deb3-100\" class=\"rounded-circle shadow meeting-avatar\" style=\"max-height:72px;\" \/>\r\n<\/div>\r\n<script>\r\njQuery(function($){\r\n    var hsThankEmail = readCookie('hsThankEmail');\r\n    if(hsThankEmail != ''){\r\n        console.log(hsThankEmail);\r\n        $('#hsbookingform [type=\"email\"]').val(hsThankEmail);\r\n    }\r\n    $(document).on('submit', '#hsbookingform', function(e){\r\n        e.preventDefault();\r\n        var theForm = $(this);\r\n        theForm.find('[type=\"submit\"]').html('<i class=\"fa fa-spinner fa-spin\"><\/i> Processing...');\r\n        var data = {\r\n            action: 'submissionGuidCheck',\r\n            meeting_date: $(\"#form-field-date\").val(),\r\n            meeting_time: $(\"#form-field-time\").val(),\r\n            meeting_email: $(\"#form-field-email_address\").val()\r\n        }\r\n        $.post(ElementorProFrontendConfig.ajaxurl, data, function(response){\r\n            console.log(JSON.parse(response)); \r\n        });\r\n        return false;   \r\n    });\r\n});\r\n<\/script>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-32d7811 elementor-headline--style-rotate elementor-widget elementor-widget-animated-headline\" data-id=\"32d7811\" data-element_type=\"widget\" data-settings=\"{&quot;headline_style&quot;:&quot;rotate&quot;,&quot;rotating_text&quot;:&quot;Consult\\nChat\\nDiscuss&quot;,&quot;rotate_iteration_delay&quot;:1000,&quot;animation_type&quot;:&quot;typing&quot;,&quot;loop&quot;:&quot;yes&quot;}\" data-widget_type=\"animated-headline.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<h3 class=\"elementor-headline elementor-headline-animation-type-typing elementor-headline-letters\">\n\t\t\t\t\t<span class=\"elementor-headline-plain-text elementor-headline-text-wrapper\"><i class=\"far fa-smile\"><\/i><\/span>\n\t\t\t\t<span class=\"elementor-headline-dynamic-wrapper elementor-headline-text-wrapper\">\n\t\t\t\t\t<span class=\"elementor-headline-dynamic-text elementor-headline-text-active\">\n\t\t\t\tConsult\t\t\t<\/span>\n\t\t\t\t\t<span class=\"elementor-headline-dynamic-text\">\n\t\t\t\tChat\t\t\t<\/span>\n\t\t\t\t\t<span class=\"elementor-headline-dynamic-text\">\n\t\t\t\tDiscuss\t\t\t<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<span class=\"elementor-headline-plain-text elementor-headline-text-wrapper\">with our experts!<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a356508 elementor-button-align-stretch elementor-widget elementor-widget-form\" data-id=\"a356508\" data-element_type=\"widget\" data-settings=\"{&quot;step_next_label&quot;:&quot;Next&quot;,&quot;step_previous_label&quot;:&quot;Previous&quot;,&quot;button_width&quot;:&quot;100&quot;,&quot;step_type&quot;:&quot;number_text&quot;,&quot;step_icon_shape&quot;:&quot;circle&quot;}\" data-widget_type=\"form.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<form class=\"elementor-form\" method=\"post\" id=\"hsbookingform\" name=\"New Form\" aria-label=\"New Form\">\n\t\t\t<input type=\"hidden\" name=\"post_id\" value=\"19190\"\/>\n\t\t\t<input type=\"hidden\" name=\"form_id\" value=\"a356508\"\/>\n\t\t\t<input type=\"hidden\" name=\"referer_title\" value=\"\" \/>\n\n\t\t\t\n\t\t\t<div class=\"elementor-form-fields-wrapper elementor-labels-above\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-html elementor-field-group elementor-column elementor-field-group-field_a6276d7 elementor-col-20\">\n\t\t\t\t\t<i class=\"fa fa-calendar\"><\/i>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-date elementor-field-group elementor-column elementor-field-group-date elementor-col-80 elementor-field-required\">\n\t\t\t\t\t\n\t\t<input type=\"date\" name=\"form_fields[date]\" id=\"form-field-date\" class=\"elementor-field elementor-size-sm  elementor-field-textual elementor-date-field\" placeholder=\"Meeting Date\" required=\"required\" pattern=\"[0-9]{4}-[0-9]{2}-[0-9]{2}\">\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-html elementor-field-group elementor-column elementor-field-group-field_c969df1 elementor-col-20\">\n\t\t\t\t\t<i class=\"fa fa-clock\"><\/i>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-time elementor-field-group elementor-column elementor-field-group-time elementor-col-80 elementor-field-required\">\n\t\t\t\t\t\t\t<input type=\"time\" name=\"form_fields[time]\" id=\"form-field-time\" class=\"elementor-field elementor-size-sm  elementor-field-textual elementor-time-field\" placeholder=\"Meeting Time\" required=\"required\">\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-html elementor-field-group elementor-column elementor-field-group-field_dd3a67c elementor-col-20\">\n\t\t\t\t\t<i class=\"fa fa-envelope\"><\/i>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-email elementor-field-group elementor-column elementor-field-group-email_address elementor-col-80 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"email\" name=\"form_fields[email_address]\" id=\"form-field-email_address\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Your Email Address\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-group elementor-column elementor-field-type-submit elementor-col-100 e-form__buttons\">\n\t\t\t\t\t<button class=\"elementor-button elementor-size-sm\" type=\"submit\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-calendar-check\"><\/i>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Book Now<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/button>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/form>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-7b29e5d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7b29e5d\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-7544895\" data-id=\"7544895\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-92ae3f3 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"92ae3f3\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#relevantResources\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chevron-circle-down\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d4722a6 elementor-widget elementor-widget-text-editor\" data-id=\"d4722a6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXP182018858 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-usefontface=\"false\" data-contrast=\"none\"><span class=\"NormalTextRun SCXP182018858 BCX0\">In the meantime, we thought you might find these resources useful\u00a0<span class=\"EOP SCXP182018858 BCX0\">\u200b<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-f04ec96 relevant-resources elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f04ec96\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-77ff32a\" data-id=\"77ff32a\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2989a15 elementor-widget elementor-widget-image\" data-id=\"2989a15\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.insentragroup.com\/nz\/insights\/resources\/ebooks-and-guides\/email-archive-pre-planning-assessment\/\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"561\" height=\"412\" src=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/archive-migration-pre-planning-checklist.png\" class=\"attachment-full size-full wp-image-19183\" alt=\"\" srcset=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/archive-migration-pre-planning-checklist.png 561w, https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/archive-migration-pre-planning-checklist-300x220.png 300w\" sizes=\"(max-width: 561px) 100vw, 561px\" style=\"width:100%;height:73.44%;max-width:561px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-19a7e08 elementor-widget elementor-widget-heading\" data-id=\"19a7e08\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/www.insentragroup.com\/nz\/insights\/resources\/ebooks-and-guides\/email-archive-pre-planning-assessment\/\">Email Archive Pre-Planning Assessment<\/a><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0021906 elementor-widget elementor-widget-text-editor\" data-id=\"0021906\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>With the understanding that not all email archive migration projects are the same, our Email Archive Pre-Planning Assessment supports the diverse conditions found in organisations of all sizes, from enterprise environments to small businesses.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6b5990e elementor-widget__width-auto read-more elementor-widget elementor-widget-button\" data-id=\"6b5990e\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.insentragroup.com\/nz\/insights\/resources\/ebooks-and-guides\/email-archive-pre-planning-assessment\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-angle-double-right\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">READ MORE<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-2cdc2a8\" data-id=\"2cdc2a8\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-edf8875 elementor-widget elementor-widget-image\" data-id=\"edf8875\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.insentragroup.com\/nz\/insights\/resources\/ebooks-and-guides\/master-movers-data-migrations-planning-guide\/\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"671\" height=\"651\" src=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/master_movers_guide_img.png\" class=\"attachment-full size-full wp-image-19184\" alt=\"\" srcset=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/master_movers_guide_img.png 671w, https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/master_movers_guide_img-300x291.png 300w\" sizes=\"(max-width: 671px) 100vw, 671px\" style=\"width:100%;height:97.02%;max-width:671px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f584006 elementor-widget elementor-widget-heading\" data-id=\"f584006\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/www.insentragroup.com\/nz\/insights\/resources\/ebooks-and-guides\/master-movers-data-migrations-planning-guide\/\">Master Movers Data Migrations Planning Guide<\/a><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a44e977 elementor-widget elementor-widget-text-editor\" data-id=\"a44e977\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>What kind of data are you migrating? Whether you are still in the planning phase or have begun your migration journey, you face a complex task.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cb4d0b3 elementor-widget__width-auto read-more elementor-widget elementor-widget-button\" data-id=\"cb4d0b3\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.insentragroup.com\/nz\/insights\/resources\/ebooks-and-guides\/master-movers-data-migrations-planning-guide\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-angle-double-right\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">READ MORE<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-b996dda\" data-id=\"b996dda\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6eb9803 elementor-widget elementor-widget-image\" data-id=\"6eb9803\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.insentragroup.com\/nz\/insights\/resources\/ebooks-and-guides\/master-movers-migration\/\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"3000\" height=\"2000\" src=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/MicrosoftTeams-image-6.png\" class=\"attachment-full size-full wp-image-19185\" alt=\"\" srcset=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/MicrosoftTeams-image-6.png 3000w, https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/MicrosoftTeams-image-6-300x200.png 300w, https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/MicrosoftTeams-image-6-1024x683.png 1024w, https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/MicrosoftTeams-image-6-768x512.png 768w, https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/MicrosoftTeams-image-6-1536x1024.png 1536w, https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/MicrosoftTeams-image-6-2048x1365.png 2048w, https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2023\/09\/MicrosoftTeams-image-6-1568x1045.png 1568w\" sizes=\"(max-width: 3000px) 100vw, 3000px\" style=\"width:100%;height:66.67%;max-width:3000px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3b3f19d elementor-widget elementor-widget-heading\" data-id=\"3b3f19d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/www.insentragroup.com\/nz\/insights\/resources\/ebooks-and-guides\/master-movers-migration\/\">Master Movers Migration\n<\/a><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e1a3db6 elementor-widget elementor-widget-text-editor\" data-id=\"e1a3db6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>According to a\u00a0recent study conducted by Gartner, 83% of data migration projects either fail or exceed their budgets and schedules. It\u2019s not a hidden fact that data migrations can be complex and stressful, however careful preparations will prove invaluable during the migration.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-87e022b elementor-widget__width-auto read-more elementor-widget elementor-widget-button\" data-id=\"87e022b\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.insentragroup.com\/nz\/insights\/resources\/ebooks-and-guides\/master-movers-migration\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-angle-double-right\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">READ MORE<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>The Complete Guide to Microsoft Defender for Endpoint Download eBook The Complete Guide to Microsoft Defender for Endpoint Download eBook In today\u2019s digital landscape, where cyber threats are constantly evolving and becoming increasingly sophisticated, the need for robust cybersecurity solutions has never been more critical. Organisations and individuals alike face the daunting task of safeguarding&hellip; <a class=\"more-link\" href=\"https:\/\/www.insentragroup.com\/gb\/insights\/geek-speak\/secure-workplace\/the-complete-guide-to-microsoft-defender-for-endpoint\/\">Continue reading <span class=\"screen-reader-text\">The Complete Guide to Microsoft Defender for Endpoint<\/span><\/a><\/p>\n","protected":false},"author":177,"featured_media":19191,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"elementor_header_footer","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[20],"tags":[],"class_list":["post-19190","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-secure-workplace","entry"],"_links":{"self":[{"href":"https:\/\/www.insentragroup.com\/gb\/wp-json\/wp\/v2\/posts\/19190","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.insentragroup.com\/gb\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.insentragroup.com\/gb\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.insentragroup.com\/gb\/wp-json\/wp\/v2\/users\/177"}],"replies":[{"embeddable":true,"href":"https:\/\/www.insentragroup.com\/gb\/wp-json\/wp\/v2\/comments?post=19190"}],"version-history":[{"count":33,"href":"https:\/\/www.insentragroup.com\/gb\/wp-json\/wp\/v2\/posts\/19190\/revisions"}],"predecessor-version":[{"id":22301,"href":"https:\/\/www.insentragroup.com\/gb\/wp-json\/wp\/v2\/posts\/19190\/revisions\/22301"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.insentragroup.com\/gb\/wp-json\/wp\/v2\/media\/19191"}],"wp:attachment":[{"href":"https:\/\/www.insentragroup.com\/gb\/wp-json\/wp\/v2\/media?parent=19190"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.insentragroup.com\/gb\/wp-json\/wp\/v2\/categories?post=19190"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.insentragroup.com\/gb\/wp-json\/wp\/v2\/tags?post=19190"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}