{"id":21217,"date":"2023-08-30T05:59:12","date_gmt":"2023-08-30T05:59:12","guid":{"rendered":"https:\/\/www.insentragroup.com\/nz\/?page_id=21217"},"modified":"2023-09-18T09:29:54","modified_gmt":"2023-09-18T09:29:54","slug":"lp-the-complete-guide-to-microsoft-defender-for-endpoint","status":"publish","type":"page","link":"https:\/\/www.insentragroup.com\/nz\/lp-the-complete-guide-to-microsoft-defender-for-endpoint\/","title":{"rendered":"The Complete Guide To Microsoft Defender For Endpoint"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"21217\" class=\"elementor elementor-21217\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-54fab60 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"54fab60\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c9b7413\" data-id=\"c9b7413\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-3e002b4 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3e002b4\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wide\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-4b059d7\" data-id=\"4b059d7\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-15dd8ac elementor-widget elementor-widget-heading\" data-id=\"15dd8ac\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">The Complete Guide to Microsoft Defender for Endpoint\u200b<\/h1>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-31df29a\" data-id=\"31df29a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2a9bcdd elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"2a9bcdd\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"600\" height=\"600\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/Microsoft_Defender_Fanout_v2.png\" class=\"attachment-large size-large wp-image-21118\" alt=\"New Zealand|The Complete Guide To Microsoft Defender For Endpoint\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/Microsoft_Defender_Fanout_v2.png 600w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/Microsoft_Defender_Fanout_v2-300x300.png 300w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/Microsoft_Defender_Fanout_v2-150x150.png 150w\" sizes=\"(max-width: 600px) 100vw, 600px\" style=\"width:100%;height:100%;max-width:600px\" title=\"Microsoft_Defender_Fanout_v2\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c674213 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c674213\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9ffb9e5\" data-id=\"9ffb9e5\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-cd15e72 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"cd15e72\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wider\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-fd83c35\" data-id=\"fd83c35\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9735e34 body-texts elementor-widget elementor-widget-text-editor\" data-id=\"9735e34\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>In today&#8217;s rapidly evolving digital landscape, the urgency to safeguard sensitive data and digital assets from sophisticated cyber threats has never been greater. Microsoft recognises this critical need and offers the ultimate defense through Microsoft 365 Defender. At the core of this suite is the formidable Microsoft Defender for Endpoint, a game-changing solution against cyber threats. This guide is your passport to an in-depth understanding of how this powerhouse security solution can revolutionise your cybersecurity strategy.\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:269,&quot;335559737&quot;:235,&quot;335559740&quot;:259}\">\u00a0<\/p><p>Inside this guide, you&#8217;ll find:<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:269,&quot;335559740&quot;:259}\">\u00a0<\/p><ul><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"32\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:629,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\">Deep insights into Microsoft Defender for Endpoint&#8217;s role against modern cyber threats.<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"32\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:629,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\">Learn its cutting-edge features, including behavioural sensors, cloud security analytics, and threat intelligence<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"32\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:629,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\">Uncover six ways Microsoft 365 Defender enhances your security stance<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"32\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:629,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\">Gain insights into threat detection and response strategies, reducing vulnerability through behavioural analysis, real-time monitoring, and cloud security intelligence.<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"32\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:629,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"5\" data-aria-level=\"1\">Discover real-world examples showcasing how Defender for Endpoint effectively thwarts cyber threats in action.<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"32\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:629,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"6\" data-aria-level=\"1\">Understand the process of transitioning to Microsoft Defender for Endpoint, ensuring seamless integration with existing security systems while bolstering your defense.<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"32\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:629,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"7\" data-aria-level=\"1\">Gain clarity on the licensing models that give you access to the full suite of Microsoft 365 Defender features, without additional costs.<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/li><\/ul><p>Equip yourself with the knowledge to combat cyber threats head-on. The Complete Guide to Microsoft Defender for Endpoint offers invaluable insights, strategic techniques, and real-world examples to ensure your digital assets remain impervious to evolving dangers. Download now.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-14aebef\" data-id=\"14aebef\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4400a18 elementor-widget elementor-widget-heading\" data-id=\"4400a18\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Download your copy to learn more about The Complete Guide To Microsoft Defender For Endpoint.  <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-42a7782 elementor-widget elementor-widget-html\" data-id=\"42a7782\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<script charset=\"utf-8\" type=\"text\/javascript\" src=\"\/\/js.hsforms.net\/forms\/v2.js?pre=1\"><\/script>\r\n<script>\r\njQuery(function($){\r\n    var curr_url_checker = window.location.href; var curr_url_splitter = curr_url_checker.split(\"?\"); var curr_url = curr_url_splitter[0];\r\n    hbspt.forms.create({\r\n        region: \"na1\",\r\n        portalId: \"20799536\",\r\n        formId: \"ec504498-09eb-4fec-860c-e9a2dcb6c81b\", \/\/Change to form ID\r\n        redirectUrl: curr_url + '\/thank-you', onBeforeFormSubmit($form, submissionValues){ for(var i=0; i<submissionValues.length; i++){ if(submissionValues[i].name=='email'){ createCookie('hsThankEmail', submissionValues[i].value, 1); }} },\r\n        css: \".hs_error_rollup {display:none !important;}\", onFormReady: function($form){\r\n            $form.find('input[name=\"referral_page\"]').val(curr_url).change();\r\n        }\r\n    });\r\n});\r\n<\/script>\r\n\r\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>The Complete Guide to Microsoft Defender for Endpoint\u200b In today&#8217;s rapidly evolving digital landscape, the urgency to safeguard sensitive data and digital assets from sophisticated cyber threats has never been greater. Microsoft recognises this critical need and offers the ultimate defense through Microsoft 365 Defender. At the core of this suite is the formidable Microsoft&hellip; <a class=\"more-link\" href=\"https:\/\/www.insentragroup.com\/nz\/lp-the-complete-guide-to-microsoft-defender-for-endpoint\/\">Continue reading <span class=\"screen-reader-text\">The Complete Guide To Microsoft Defender For Endpoint<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"content-type":"","footnotes":""},"class_list":["post-21217","page","type-page","status-publish","hentry","entry"],"_links":{"self":[{"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/pages\/21217","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/comments?post=21217"}],"version-history":[{"count":16,"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/pages\/21217\/revisions"}],"predecessor-version":[{"id":22233,"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/pages\/21217\/revisions\/22233"}],"wp:attachment":[{"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/media?parent=21217"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}