{"id":20658,"date":"2023-08-03T02:15:02","date_gmt":"2023-08-03T02:15:02","guid":{"rendered":"https:\/\/www.insentragroup.com\/nz\/?p=20658"},"modified":"2024-10-25T03:08:50","modified_gmt":"2024-10-25T03:08:50","slug":"the-complete-guide-to-microsoft-defender-for-endpoint","status":"publish","type":"post","link":"https:\/\/www.insentragroup.com\/nz\/insights\/geek-speak\/secure-workplace\/the-complete-guide-to-microsoft-defender-for-endpoint\/","title":{"rendered":"The Complete Guide to Microsoft Defender for Endpoint"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"20658\" class=\"elementor elementor-20658\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a611882 elementor-section-content-middle elementor-section-stretched elementor-hidden-tablet elementor-hidden-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a611882\" data-element_type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wider\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-b967002\" data-id=\"b967002\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-49eb92a elementor-widget elementor-widget-heading\" data-id=\"49eb92a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">The Complete Guide to Microsoft Defender for Endpoint<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1c61a20 elementor-widget elementor-widget-button\" data-id=\"1c61a20\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#dpwnloadpdf\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download eBook<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-3f90e9a\" data-id=\"3f90e9a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fab5c63 elementor-widget elementor-widget-image\" data-id=\"fab5c63\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"655\" height=\"501\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/design_heading_microsoft_defender_2.png\" class=\"attachment-large size-large wp-image-21044\" alt=\"New Zealand | The Complete Guide to Microsoft Defender for Endpoint\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/design_heading_microsoft_defender_2.png 655w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/design_heading_microsoft_defender_2-300x229.png 300w\" sizes=\"(max-width: 655px) 100vw, 655px\" style=\"width:100%;height:76.49%;max-width:655px\" title=\"design_heading_microsoft_defender_2\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-34653ff elementor-section-content-middle elementor-section-stretched elementor-hidden-desktop elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"34653ff\" data-element_type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-fb3295f\" data-id=\"fb3295f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c91b4e0 elementor-widget elementor-widget-image\" data-id=\"c91b4e0\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"655\" height=\"501\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/design_heading_microsoft_defender_2.png\" class=\"attachment-medium_large size-medium_large wp-image-21044\" alt=\"New Zealand | The Complete Guide to Microsoft Defender for Endpoint\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/design_heading_microsoft_defender_2.png 655w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/design_heading_microsoft_defender_2-300x229.png 300w\" sizes=\"(max-width: 655px) 100vw, 655px\" style=\"width:100%;height:76.49%;max-width:655px\" title=\"design_heading_microsoft_defender_2\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-77bf51e elementor-widget elementor-widget-heading\" data-id=\"77bf51e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">The Complete Guide to Microsoft Defender for Endpoint<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bb5fcca elementor-align-center elementor-widget elementor-widget-button\" data-id=\"bb5fcca\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#dpwnloadpdf\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download eBook<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2c22b11 elementor-section-content-middle elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2c22b11\" data-element_type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-982663e\" data-id=\"982663e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-211f32b elementor-widget elementor-widget-text-editor\" data-id=\"211f32b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>In today\u2019s digital landscape, where cyber threats are constantly evolving and becoming increasingly sophisticated, the need for robust cybersecurity solutions has never been more critical. Organisations and individuals alike face the daunting task of safeguarding their sensitive data, digital assets and operations from the relentless onslaught of cybercrime.<\/p><p>To combat these challenges, Microsoft offers a comprehensive suite of security tools and features called Microsoft 365 Defender. At the heart of this suite lies a powerful weapon in the fight against cyber threats &#8211; Microsoft Defender for Endpoint.<\/p><p>Microsoft Defender for Endpoint is an enterprise endpoint security platform that goes beyond traditional antivirus protection. It is a cutting-edge, cloud-powered solution designed to proactively prevent, detect, investigate and respond to advanced threats across multiple platforms. By leveraging the latest in behavioural sensors, cloud security analytics, and threat intelligence, Defender for Endpoint empowers organisations to stay ahead of the curve and maintain a strong security posture.<\/p><p>In this comprehensive guide, we will take you on a journey through the world of Microsoft Defender for Endpoint. We will explore its inner workings, unveil its remarkable features, and showcase real-world examples of its efficacy in thwarting cyber threats. Additionally, we will delve into the migration process, helping organisations smoothly transition to this state-of-the-art security solution.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c6d0243 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c6d0243\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wider\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-98ee2cf\" data-id=\"98ee2cf\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-376750b elementor-widget elementor-widget-shortcode\" data-id=\"376750b\" data-element_type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\"><div class=\"side-author\">\r\n\t\t\t<p><img decoding=\"async\" src=\"https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2022\/10\/Jonathan-Hazelden-150x150.png\" class=\"rounded-circle\" data-info=\"https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2022\/10\/Jonathan-Hazelden.png\" ><\/p>\r\n\t\t\t<h2 class=\"text-center\"><span class=\"author\">Jonathan Hazelden<\/span> - 03.08.2023<span class=\"publish-date d-none\">20230803<\/span><\/h2>\r\n\t\t\t\r\n\t\t\t<div class=\"mb-2\"><a href=\"https:\/\/www.insentragroup.com\/nz\/about-insentra\/meet-the-crew\/jonathan-hazelden\/\" class=\"btn btn-primary btn-block btn-lg py-3 rounded-0 border-0\">View Insentra Profile<\/a><\/div>\r\n\t\t\t\r\n\t\t\t<div class=\"mb-2\"><a href=\"https:\/\/www.insentragroup.com\/nz\/insights\/insights-search-results\/?author=Jonathan Hazelden\" class=\"btn btn-default btn-block btn-lg py-3 rounded-0 border-0\">View Insights<\/a><\/div>\r\n\t\t<\/div><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-1d47e9d\" data-id=\"1d47e9d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ff14220 elementor-widget elementor-widget-heading\" data-id=\"ff14220\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Table of Contents<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-84eaa8c elementor-widget elementor-widget-text-editor\" data-id=\"84eaa8c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"#sectiontitle1\"><strong>WHAT IS MICROSOFT 365 DEFENDER?<\/strong><\/a><\/p><p><a href=\"#sectiontitle2\"><strong>HOW IT WORKS<\/strong><\/a><\/p><p><a href=\"#sectiontitle3\"><strong>FEATURES AND BENEFITS<\/strong><\/a><\/p><p><a href=\"#sectiontitle4\"><strong>CYBER CRIME STATISTICS<\/strong><\/a><\/p><p><a href=\"#sectiontitle5\"><strong>MICROSOFT DEFENDER FOR ENDPOINT<\/strong><\/a><\/p><p><a href=\"#sectiontitle6\"><strong>HOW IT WORKS<\/strong><\/a><\/p><p><a href=\"#sectiontitle7\"><strong>FEATURES AND BENEFITS<\/strong><\/a><\/p><p><a href=\"#sectiontitle8\"><strong>MIGRATING TO DEFENDER FOR ENDPOINT<\/strong><\/a><\/p><p><a href=\"#sectiontitle9\"><strong>REAL-WORLD EXAMPLE<\/strong><\/a><\/p><p><a href=\"#sectiontitle10\"><strong>LICENSING <\/strong><\/a><\/p><p><a href=\"#sectiontitle11\"><strong>CONCLUSION<\/strong><\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-00c750a elementor-section-content-middle elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"00c750a\" data-element_type=\"section\" id=\"#sectiontitle1\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3f265a9\" data-id=\"3f265a9\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7f9f968 elementor-widget elementor-widget-heading\" data-id=\"7f9f968\" data-element_type=\"widget\" id=\"sectiontitle1\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">WHAT IS MICROSOFT 365 DEFENDER? <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ba0d1ff elementor-widget elementor-widget-text-editor\" data-id=\"ba0d1ff\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Microsoft 365 Defender is a unified pre- and post-breach enterprise defence suite that natively coordinates detection, prevention, investigation and response across endpoints, identities, email, and applications to provide integrated protection against sophisticated attacks. The following image displays the complete array of products within the Microsoft 365 Defender suite.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6016cb8 elementor-widget elementor-widget-image\" data-id=\"6016cb8\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"4500\" height=\"2099\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/Microsoft-Defender-Diagram-01.png\" class=\"attachment-full size-full wp-image-21948\" alt=\"New Zealand | The Complete Guide to Microsoft Defender for Endpoint\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/Microsoft-Defender-Diagram-01.png 4500w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/Microsoft-Defender-Diagram-01-300x140.png 300w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/Microsoft-Defender-Diagram-01-1024x478.png 1024w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/Microsoft-Defender-Diagram-01-768x358.png 768w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/Microsoft-Defender-Diagram-01-1536x716.png 1536w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/Microsoft-Defender-Diagram-01-2048x955.png 2048w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/Microsoft-Defender-Diagram-01-1568x731.png 1568w\" sizes=\"(max-width: 4500px) 100vw, 4500px\" style=\"width:100%;height:46.64%;max-width:4500px\" title=\"Microsoft-Defender-Diagram-01\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-faaa301 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"faaa301\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-0ddcce1\" data-id=\"0ddcce1\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-bf0145d\" data-id=\"bf0145d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5a5eb86 elementor-widget elementor-widget-html\" data-id=\"5a5eb86\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<iframe width=\"1080\" height=\"570\" src=\"https:\/\/www.youtube.com\/embed\/JZxtLrQ1K0E\" title=\"Microsoft Defender Series: What is Microsoft Defender?\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-b187f67\" data-id=\"b187f67\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-caa9b0b elementor-section-content-middle elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"caa9b0b\" data-element_type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-bb01f04\" data-id=\"bb01f04\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-9468d9c elementor-section-content-top elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9468d9c\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-d3ec97f\" data-id=\"d3ec97f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-911a267 elementor-widget elementor-widget-image\" data-id=\"911a267\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"710\" height=\"533\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/UD_0823_img_1.png\" class=\"attachment-large size-large wp-image-20892\" alt=\"New Zealand | The Complete Guide to Microsoft Defender for Endpoint\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/UD_0823_img_1.png 710w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/UD_0823_img_1-300x225.png 300w\" sizes=\"(max-width: 710px) 100vw, 710px\" style=\"width:100%;height:75.07%;max-width:710px\" title=\"UD_0823_img_1\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-01bfd26\" data-id=\"01bfd26\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a3139bf elementor-widget elementor-widget-heading\" data-id=\"a3139bf\" data-element_type=\"widget\" id=\"sectiontitle2\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">HOW IT WORKS <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f1e1aea elementor-widget elementor-widget-text-editor\" data-id=\"f1e1aea\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Microsoft 365 Defender uses behavioural sensors, cloud security analytics, and threat intelligence to prevent, detect, and respond to advanced threats on different platforms. It provides real-time protection against advanced threats on endpoints and helps detect and investigate identity-based attacks in real time. It also offers vulnerability management and assessment, attack surface reduction, automatic investigation and remediation and managed hunting services.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-55b2d23 elementor-section-content-middle elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"55b2d23\" data-element_type=\"section\" id=\"#sectiontitle3\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b0f483e\" data-id=\"b0f483e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-ca7b99f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ca7b99f\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-bf4256b\" data-id=\"bf4256b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-07fd86e\" data-id=\"07fd86e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-16058f5 elementor-widget elementor-widget-html\" data-id=\"16058f5\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<iframe width=\"1080\" height=\"570\" src=\"https:\/\/www.youtube.com\/embed\/hbc-aniqVE0\" title=\"Microsoft Defender Series: Defending all 360\u00b0 of M365\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-4a7550b\" data-id=\"4a7550b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-50244b1 elementor-widget elementor-widget-spacer\" data-id=\"50244b1\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2f44ffa elementor-widget elementor-widget-heading\" data-id=\"2f44ffa\" data-element_type=\"widget\" id=\"sectiontitle3\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">FEATURES AND BENEFITS <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-673f207 elementor-widget elementor-widget-text-editor\" data-id=\"673f207\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Let us cover six ways organisations can use Microsoft 365 Defender to enhance their overall security posture.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-f43c242 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f43c242\" data-element_type=\"section\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-0d37409\" data-id=\"0d37409\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e26794c elementor-widget elementor-widget-image\" data-id=\"e26794c\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/UD_0823_img_3.png\" class=\"attachment-full size-full wp-image-20913\" alt=\"New Zealand | The Complete Guide to Microsoft Defender for Endpoint\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/UD_0823_img_3.png 200w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/UD_0823_img_3-150x150.png 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" style=\"width:100%;height:100%;max-width:200px\" title=\"UD_0823_img_3\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-d1932df\" data-id=\"d1932df\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-10977e7 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"10977e7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><strong>Threat Detection and Response:<\/strong> Microsoft 365 Defender utilises advanced threat intelligence and machine learning algorithms to detect and respond to various cyber threats. It continuously monitors and analyses data across endpoints, email, and cloud applications to identify suspicious activities, malware and other indicators of compromise. This enables organisations to quickly detect and respond to potential cyberattacks, minimising the impact of security incidents.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-f94a979 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f94a979\" data-element_type=\"section\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-75c5631\" data-id=\"75c5631\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-89ae020 elementor-widget elementor-widget-image\" data-id=\"89ae020\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/UD_0823_img_4.png\" class=\"attachment-full size-full wp-image-20917\" alt=\"New Zealand | The Complete Guide to Microsoft Defender for Endpoint\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/UD_0823_img_4.png 200w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/UD_0823_img_4-150x150.png 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" style=\"width:100%;height:100%;max-width:200px\" title=\"UD_0823_img_4\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-dec6e55\" data-id=\"dec6e55\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-59ce150 elementor-widget elementor-widget-text-editor\" data-id=\"59ce150\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><strong>Endpoints:<\/strong> Microsoft Defender for Endpoint (MDE), provides comprehensive endpoint protection against a wide range of threats on different device types, such as laptop and mobile devices. MDE runs Next Generation Protection on the local devices and provides real-time data to the Defender cloud service. By securing endpoints, organisations can significantly reduce the risk of successful cyberattacks.<\/p><p>Defender for Endpoint is already part of the Windows operating system which makes the devices easy to configure and onboard to the Defender cloud service, depending on how you manage your Windows endpoints, Defender can be integrated with Microsoft Intune to easily onboard and configure devices using relevant policies. MDE also supports macOS, Linux, iOS, and Android.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-3a93c25 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3a93c25\" data-element_type=\"section\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-469fcd3\" data-id=\"469fcd3\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-964823d elementor-widget elementor-widget-image\" data-id=\"964823d\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/UD_0823_img_5.png\" class=\"attachment-full size-full wp-image-20928\" alt=\"New Zealand | The Complete Guide to Microsoft Defender for Endpoint\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/UD_0823_img_5.png 200w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/UD_0823_img_5-150x150.png 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" style=\"width:100%;height:100%;max-width:200px\" title=\"UD_0823_img_5\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-46a2652\" data-id=\"46a2652\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c6e8b42 elementor-widget elementor-widget-text-editor\" data-id=\"c6e8b42\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><strong>Email and documents:<\/strong> Microsoft Defender for Office 365 safeguards organisations against email-based threats, including phishing attempts, malicious attachments, and business email compromise (BEC) attacks. It employs advanced threat intelligence, anti-phishing technologies, real-time link scanning to detect and block malicious emails, protecting users from falling victim to cybercrime through email-based attacks.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-2537f43 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2537f43\" data-element_type=\"section\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-0d4ec03\" data-id=\"0d4ec03\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-464328d elementor-widget elementor-widget-image\" data-id=\"464328d\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/UD_0823_img_6.png\" class=\"attachment-full size-full wp-image-20950\" alt=\"New Zealand | The Complete Guide to Microsoft Defender for Endpoint\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/UD_0823_img_6.png 200w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/UD_0823_img_6-150x150.png 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" style=\"width:100%;height:100%;max-width:200px\" title=\"UD_0823_img_6\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-c910590\" data-id=\"c910590\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-013a711 elementor-widget elementor-widget-text-editor\" data-id=\"013a711\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><strong>Identities:<\/strong> Microsoft Defender for Identity and Entra ID (Azure Active Directory) help organisations enhance their identity and access management practices. It enables organisations to enforce strong authentication, implement multi-factor authentication (MFA) and manage access controls to prevent unauthorised access to sensitive resources. By securing user identities, organisations can thwart common cybercrime tactics, such as unauthorised access and credential theft. The Defender portal will receive signals from Entra ID and endpoints, as well as Active Directory domain controllers in a hybrid environment. This way Defender can alert to potential compromised accounts and behaviour anomalies from your Active Directory.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-be46a52 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"be46a52\" data-element_type=\"section\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-f6818f3\" data-id=\"f6818f3\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6f82804 elementor-widget elementor-widget-image\" data-id=\"6f82804\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/UD_0823_img_7.png\" class=\"attachment-full size-full wp-image-20954\" alt=\"New Zealand | The Complete Guide to Microsoft Defender for Endpoint\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/UD_0823_img_7.png 200w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/UD_0823_img_7-150x150.png 150w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/elementor\/thumbs\/UD_0823_img_7-qaqra7b1tq298rtmfclvi4mq1li35t9hv20vpxgv8g.png 80w\" sizes=\"(max-width: 200px) 100vw, 200px\" style=\"width:100%;height:100%;max-width:200px\" title=\"UD_0823_img_7\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-99d9b00\" data-id=\"99d9b00\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3b80119 elementor-widget elementor-widget-text-editor\" data-id=\"3b80119\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><strong>Cloud Apps:<\/strong> Microsoft Defender for Cloud Apps (MDAC) provides visibility and control over 25,000 cloud applications, including Office 365, detecting and mitigating risks associated with cloud usage. It helps organisations identify and respond to potential data breaches, unauthorised access, and risky user behaviours within cloud services. MDAC is used with Conditional Access policies to manage what activities users can perform on their devices, for example blocking of downloads from the company OneDrive to a personal computer. By monitoring and securing cloud applications, organisations can better protect their data and mitigate cloud-related cyber risks.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-0f4983f elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0f4983f\" data-element_type=\"section\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-83ef4c4\" data-id=\"83ef4c4\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0836910 elementor-widget elementor-widget-image\" data-id=\"0836910\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/UD_0823_img_8.png\" class=\"attachment-full size-full wp-image-20955\" alt=\"New Zealand | The Complete Guide to Microsoft Defender for Endpoint\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/UD_0823_img_8.png 200w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/UD_0823_img_8-150x150.png 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" style=\"width:100%;height:100%;max-width:200px\" title=\"UD_0823_img_8\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-7bafa3e\" data-id=\"7bafa3e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6643522 elementor-widget elementor-widget-text-editor\" data-id=\"6643522\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><strong>Unified Security Management:<\/strong> The Microsoft 365 Defender portal offers a centralised management console for monitoring and managing security across services within the Microsoft 365 Defender suite. It provides a unified view of security events, alerts, and recommendations, enabling organisations to streamline their security operations and respond effectively to cyber threats.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-2de373d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2de373d\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-4624a2f\" data-id=\"4624a2f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ce8b484 elementor-widget elementor-widget-image\" data-id=\"ce8b484\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1195\" height=\"578\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/Microsoft-Defender-Insentra-Asset-2.jpg\" class=\"attachment-full size-full wp-image-20687\" alt=\"New Zealand | The Complete Guide to Microsoft Defender for Endpoint\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/Microsoft-Defender-Insentra-Asset-2.jpg 1195w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/Microsoft-Defender-Insentra-Asset-2-300x145.jpg 300w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/Microsoft-Defender-Insentra-Asset-2-1024x495.jpg 1024w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/Microsoft-Defender-Insentra-Asset-2-768x371.jpg 768w\" sizes=\"(max-width: 1195px) 100vw, 1195px\" style=\"width:100%;height:48.37%;max-width:1195px\" title=\"Microsoft-Defender-Insentra-Asset-2\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-46785ec elementor-widget elementor-widget-spacer\" data-id=\"46785ec\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-1b839f0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1b839f0\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-9fedc89\" data-id=\"9fedc89\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-3ec0b57\" data-id=\"3ec0b57\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9e283c7 elementor-widget elementor-widget-html\" data-id=\"9e283c7\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<iframe width=\"1080\" height=\"570\" src=\"https:\/\/www.youtube.com\/embed\/V7rQF0IKdGo\" title=\"Microsoft Defender Series: Unraveling the Importance of Security\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-202d390\" data-id=\"202d390\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-fa8a07b elementor-widget elementor-widget-spacer\" data-id=\"fa8a07b\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-54ddc10 elementor-section-content-middle elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"54ddc10\" data-element_type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6a66c28\" data-id=\"6a66c28\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8a5705b elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"8a5705b\" data-element_type=\"widget\" id=\"sectiontitle4\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">TOP CYBER CRIME STATISTICS<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-10fb51e elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"10fb51e\" data-element_type=\"section\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-84a8751\" data-id=\"84a8751\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-badc335 elementor-widget elementor-widget-image\" data-id=\"badc335\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/UD_0823_img_9.png\" class=\"attachment-full size-full wp-image-20959\" alt=\"New Zealand | The Complete Guide to Microsoft Defender for Endpoint\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/UD_0823_img_9.png 200w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/UD_0823_img_9-150x150.png 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" style=\"width:100%;height:100%;max-width:200px\" title=\"UD_0823_img_9\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-cc46903\" data-id=\"cc46903\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ab28f9b elementor-widget elementor-widget-text-editor\" data-id=\"ab28f9b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Global<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-423318e elementor-widget elementor-widget-text-editor\" data-id=\"423318e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"23\" data-list-defn-props=\"{&quot;335551500&quot;:15884578,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\">The global annual cost of cybercrime is predicted to reach $8 trillion annually<br \/>in 2023<\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"23\" data-list-defn-props=\"{&quot;335551500&quot;:15884578,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\">The next five years are due to see a 15% increase in cybercrime costs reaching<br \/>10.5 trillion by 2025<\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"23\" data-list-defn-props=\"{&quot;335551500&quot;:15884578,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\">80% of reported cyber crimes are generally attributed to phishing attacks in<br \/>the technology sector<\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"23\" data-list-defn-props=\"{&quot;335551500&quot;:15884578,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\">Cybercrime earns cybercriminals $1.5 trillion every year. Small businesses<br \/>account for 43% of cyber attacks annually<\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"23\" data-list-defn-props=\"{&quot;335551500&quot;:15884578,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\">2021 was one of the costliest years in terms of data breaches through<br \/>phishing attacks in the last 17 years<\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"23\" data-list-defn-props=\"{&quot;335551500&quot;:15884578,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\">Ransomware will cost its victims around $265 billion annually by 2031<\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"23\" data-list-defn-props=\"{&quot;335551500&quot;:15884578,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\">Around 236 million ransomware attacks occurred globally in the first half of<br \/>2022.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-11ccc8f elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"11ccc8f\" data-element_type=\"section\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-b550316\" data-id=\"b550316\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3a21353 elementor-widget elementor-widget-image\" data-id=\"3a21353\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/UD_0823_img_10.png\" class=\"attachment-full size-full wp-image-20960\" alt=\"New Zealand | The Complete Guide to Microsoft Defender for Endpoint\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/UD_0823_img_10.png 200w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/UD_0823_img_10-150x150.png 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" style=\"width:100%;height:100%;max-width:200px\" title=\"UD_0823_img_10\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-bac9ee6\" data-id=\"bac9ee6\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-eecf7a3 elementor-widget elementor-widget-text-editor\" data-id=\"eecf7a3\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>US<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-db11d6b elementor-widget elementor-widget-text-editor\" data-id=\"db11d6b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"23\" data-list-defn-props=\"{&quot;335551500&quot;:15884578,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\">Data breaches cost businesses an average of $4.35 million in 2022<\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"23\" data-list-defn-props=\"{&quot;335551500&quot;:15884578,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\">1 in 2 American internet users had their accounts breached in 2021<\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"23\" data-list-defn-props=\"{&quot;335551500&quot;:15884578,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\">53.35% of US citizens were affected by cybercrime in the first half of 2022<\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"23\" data-list-defn-props=\"{&quot;335551500&quot;:15884578,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\">Around 1 in 10 US organisations have no insurance against cyber-attacks<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-71a0de1 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"71a0de1\" data-element_type=\"section\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-6a7e176\" data-id=\"6a7e176\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-de60cd8 elementor-widget elementor-widget-image\" data-id=\"de60cd8\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/UD_0823_img_11.png\" class=\"attachment-full size-full wp-image-20961\" alt=\"New Zealand | The Complete Guide to Microsoft Defender for Endpoint\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/UD_0823_img_11.png 200w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/UD_0823_img_11-150x150.png 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" style=\"width:100%;height:100%;max-width:200px\" title=\"UD_0823_img_11\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-ecd84ab\" data-id=\"ecd84ab\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bd3be21 elementor-widget elementor-widget-text-editor\" data-id=\"bd3be21\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>UK<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b17f430 elementor-widget elementor-widget-text-editor\" data-id=\"b17f430\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul><li>39% of UK businesses reported suffering a cyber-attack in 2022<\/li><li>The average cost of a cyber-attack for a smaller business is \u00a34200 with the cost to medium and large businesses rising to \u00a319,400 and that doesn\u2019t take into account the potential damage to the businesses reputation and loss of confidence from clients and consumers<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-844da12 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"844da12\" data-element_type=\"section\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-732b5e5\" data-id=\"732b5e5\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e2d0542 elementor-widget elementor-widget-image\" data-id=\"e2d0542\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/UD_0823_img_12.png\" class=\"attachment-full size-full wp-image-20962\" alt=\"New Zealand | The Complete Guide to Microsoft Defender for Endpoint\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/UD_0823_img_12.png 200w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/UD_0823_img_12-150x150.png 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" style=\"width:100%;height:100%;max-width:200px\" title=\"UD_0823_img_12\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-01aacd2\" data-id=\"01aacd2\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0fd4fe6 elementor-widget elementor-widget-text-editor\" data-id=\"0fd4fe6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>AUS<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:276}\">\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-037183c elementor-widget elementor-widget-text-editor\" data-id=\"037183c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"23\" data-list-defn-props=\"{&quot;335551500&quot;:15884578,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\">There is a rise in the average cost per cybercrime report to over $39,000 for small businesses, $88,000 for medium businesses, and over $62,000 for large businesses. An average increase of 14%<\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"23\" data-list-defn-props=\"{&quot;335551500&quot;:15884578,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\">Ransomware attacks have increased by nearly 500% since the start of the COVID-19 pandemic<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-06c8f07 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"06c8f07\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-07eade7\" data-id=\"07eade7\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3d77dc0 elementor-widget elementor-widget-text-editor\" data-id=\"3d77dc0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><strong>References:<\/strong><br \/><a href=\"https:\/\/www.getastra.com\/blog\/security-audit\/cyber-crime-statistics\/\" target=\"_blank\" rel=\"noopener nofollow\">Top Cyber Crime Statistics 2023<\/a><br \/><a href=\"https:\/\/eftsure.com\/statistics\/cyber-crime-statistics\/\" target=\"_blank\" rel=\"noopener nofollow\">Critical Cyber Crime Statistics in Australia 2023<\/a><br \/><a href=\"https:\/\/nbcc.police.uk\/crime-prevention\/cyber-and-fraud\" target=\"_blank\" rel=\"noopener nofollow\">National Business Crime Centre<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d198928 elementor-section-content-middle elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d198928\" data-element_type=\"section\" id=\"#sectiontitle5\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-011e17d\" data-id=\"011e17d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-41d02b2 elementor-widget elementor-widget-heading\" data-id=\"41d02b2\" data-element_type=\"widget\" id=\"sectiontitle5\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">MICROSOFT DEFENDER FOR ENDPOINT <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bedcf71 elementor-widget elementor-widget-text-editor\" data-id=\"bedcf71\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Earlier in the guide we discussed all the products in the Defender suite and this section will dive deeper into Microsoft Defender for Endpoint and its features and give some real-world examples.<\/p><p>Microsoft Defender for Endpoint is an enterprise endpoint security platform designed to help enterprise networks prevent, detect, investigate, and respond to advanced threats. It is an industry-leading, cloud-powered endpoint security solution that helps to secure against ransomware, file-less malware and other sophisticated attacks across platforms.<\/p><p>Defender for Endpoint uses a combination of technology built into Windows and Microsoft\u2019s robust cloud service. It offers advanced post-breach detection sensors collecting a vast array of behavioural signals from your machines. It also offers next-generation antimalware, attack surface reduction rules, device control (such as USB), endpoint firewall, network protection, web control \/ category-based URL blocking, device-based conditional access and controlled folder access.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4554457 elementor-section-content-middle elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4554457\" data-element_type=\"section\" id=\"#sectiontitle6\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-227181f\" data-id=\"227181f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b6cb93a elementor-widget elementor-widget-heading\" data-id=\"b6cb93a\" data-element_type=\"widget\" id=\"sectiontitle6\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">HOW IT WORKS <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2ed2051 elementor-widget elementor-widget-image\" data-id=\"2ed2051\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"4501\" height=\"2099\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/Microsoft_Defender_for_Endpoint_Builtin_cloud-powered.png\" class=\"attachment-full size-full wp-image-22027\" alt=\"New Zealand | The Complete Guide to Microsoft Defender for Endpoint\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/Microsoft_Defender_for_Endpoint_Builtin_cloud-powered.png 4501w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/Microsoft_Defender_for_Endpoint_Builtin_cloud-powered-300x140.png 300w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/Microsoft_Defender_for_Endpoint_Builtin_cloud-powered-1024x478.png 1024w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/Microsoft_Defender_for_Endpoint_Builtin_cloud-powered-768x358.png 768w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/Microsoft_Defender_for_Endpoint_Builtin_cloud-powered-1536x716.png 1536w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/Microsoft_Defender_for_Endpoint_Builtin_cloud-powered-2048x955.png 2048w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/Microsoft_Defender_for_Endpoint_Builtin_cloud-powered-1568x731.png 1568w\" sizes=\"(max-width: 4501px) 100vw, 4501px\" style=\"width:100%;height:46.63%;max-width:4501px\" title=\"Microsoft_Defender_for_Endpoint_Builtin_cloud-powered\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-477aeb7 elementor-widget elementor-widget-text-editor\" data-id=\"477aeb7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Microsoft Defender for Endpoint uses behavioural sensors to monitor system activities and detect suspicious behaviour. It also uses cloud security analytics to identify potential threats in real time. Threat intelligence is used to identify known threats and provide insights into new ones. Microsoft Defender for Endpoint also offers vulnerability management and assessment capabilities that help businesses discover security vulnerabilities and prioritise them with security recommendations.<\/p><p>Microsoft Defender for Endpoint can operate as Microsoft Endpoint Detection and Response (EDR) to form a security solution that helps organisations detect and respond to advanced threats on their endpoints. It provides real-time visibility into security incidents and provides automated responses to remediate threats. Microsoft Defender for Endpoint is an EDR solution that uses behavioural sensors, cloud security analytics, and threat intelligence to prevent, detect, and respond to advanced threats on Windows, Linux, Mac, iOS, and Android devices. It also offers vulnerability management and assessment, attack surface reduction, automatic investigation and remediation, and managed hunting services.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-588aeee elementor-section-content-middle elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"588aeee\" data-element_type=\"section\" id=\"#sectiontitle7\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a76ead3\" data-id=\"a76ead3\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ccc7d66 elementor-widget elementor-widget-heading\" data-id=\"ccc7d66\" data-element_type=\"widget\" id=\"sectiontitle7\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">FEATURES AND BENEFITS<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-4d6e870 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4d6e870\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-c66bb22\" data-id=\"c66bb22\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-9b81a82\" data-id=\"9b81a82\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-86a463b elementor-widget elementor-widget-html\" data-id=\"86a463b\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<iframe width=\"1080\" height=\"570\" src=\"https:\/\/www.youtube.com\/embed\/b21uOQU6aFA\" title=\"Microsoft Defender Series: Defending What Matters\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-c4d60fb\" data-id=\"c4d60fb\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-39c39d2 elementor-widget elementor-widget-spacer\" data-id=\"39c39d2\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3562058 elementor-widget elementor-widget-text-editor\" data-id=\"3562058\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Microsoft Defender for Endpoint offers a wide range of features and benefits that help protect your organisation from advanced threats. It delivers preventive protection, post-breach detection, automated investigation and response for endpoints. It has two plans: Plan 1 and Plan 2.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-58cd09c elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"58cd09c\" data-element_type=\"section\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-1b6843c\" data-id=\"1b6843c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-eefc355 elementor-widget elementor-widget-image\" data-id=\"eefc355\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"250\" height=\"355\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/UD_0823_img_13.png\" class=\"attachment-full size-full wp-image-20986\" alt=\"New Zealand | The Complete Guide to Microsoft Defender for Endpoint\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/UD_0823_img_13.png 250w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/UD_0823_img_13-211x300.png 211w\" sizes=\"(max-width: 250px) 100vw, 250px\" style=\"width:100%;height:142%;max-width:250px\" title=\"UD_0823_img_13\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-77686b0\" data-id=\"77686b0\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-988f22c elementor-widget elementor-widget-text-editor\" data-id=\"988f22c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><b>Plan 1 offers capabilities such as:<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:276}\">\u00a0<\/b><\/p><ul><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"23\" data-list-defn-props=\"{&quot;335551500&quot;:15884578,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"5\" data-aria-level=\"1\"><strong>Advance security features:<\/strong> Next-generation protection (includes<br \/>antimalware and antivirus)<\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"23\" data-list-defn-props=\"{&quot;335551500&quot;:15884578,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"5\" data-aria-level=\"1\"><strong>Attack surface reduction:<\/strong> Reduces the attack surface, for example<br \/>blocking MS office products from creating child processes<\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"23\" data-list-defn-props=\"{&quot;335551500&quot;:15884578,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"5\" data-aria-level=\"1\"><strong>Manual response actions:<\/strong> For example, isolating a device by disconnecting<br \/>it from the organisations network<\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"23\" data-list-defn-props=\"{&quot;335551500&quot;:15884578,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"5\" data-aria-level=\"1\">Centralised management in the Microsoft 365 Defender portal<\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"23\" data-list-defn-props=\"{&quot;335551500&quot;:15884578,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"5\" data-aria-level=\"1\"><strong>Security reports:<\/strong> Easy access to information about detected threats and<br \/>actions to address those threats<\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"23\" data-list-defn-props=\"{&quot;335551500&quot;:15884578,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"5\" data-aria-level=\"1\"><strong>Device Compatability:<\/strong> Support for Windows 10, Windows 11, iOS, Android,<br \/>macOS, and Linux devices<\/li><\/ul><div>The diagram below shows Plan 1 (orange) and Plan 2 features<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-a9382b8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a9382b8\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-35fac8a\" data-id=\"35fac8a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c6c784b elementor-widget elementor-widget-image\" data-id=\"c6c784b\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"4501\" height=\"2400\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/Microsoft_Defender_for_Endpoint_plan_1_capabilities.png\" class=\"attachment-full size-full wp-image-22031\" alt=\"New Zealand | The Complete Guide to Microsoft Defender for Endpoint\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/Microsoft_Defender_for_Endpoint_plan_1_capabilities.png 4501w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/Microsoft_Defender_for_Endpoint_plan_1_capabilities-300x160.png 300w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/Microsoft_Defender_for_Endpoint_plan_1_capabilities-1024x546.png 1024w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/Microsoft_Defender_for_Endpoint_plan_1_capabilities-768x410.png 768w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/Microsoft_Defender_for_Endpoint_plan_1_capabilities-1536x819.png 1536w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/Microsoft_Defender_for_Endpoint_plan_1_capabilities-2048x1092.png 2048w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/Microsoft_Defender_for_Endpoint_plan_1_capabilities-1568x836.png 1568w\" sizes=\"(max-width: 4501px) 100vw, 4501px\" style=\"width:100%;height:53.32%;max-width:4501px\" title=\"Microsoft_Defender_for_Endpoint_plan_1_capabilities\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-aaa91a2 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"aaa91a2\" data-element_type=\"section\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-e27d68e\" data-id=\"e27d68e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5ae39a2 elementor-widget elementor-widget-image\" data-id=\"5ae39a2\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"250\" height=\"355\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/UD_0823_img_14.png\" class=\"attachment-full size-full wp-image-20987\" alt=\"New Zealand | The Complete Guide to Microsoft Defender for Endpoint\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/UD_0823_img_14.png 250w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/UD_0823_img_14-211x300.png 211w\" sizes=\"(max-width: 250px) 100vw, 250px\" style=\"width:100%;height:142%;max-width:250px\" title=\"UD_0823_img_14\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-04acf37\" data-id=\"04acf37\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-aab157e elementor-widget elementor-widget-text-editor\" data-id=\"aab157e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><b>Plan 2 has all of the Defender for Endpoint Plan 1 capabilities, plus:<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:360,&quot;335559739&quot;:60,&quot;335559740&quot;:276,&quot;335559991&quot;:360}\">\u00a0<\/b><\/p><ul><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"23\" data-list-defn-props=\"{&quot;335551500&quot;:15884578,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><strong>Threat and vulnerability management:<\/strong> Using sensors within the tool, Microsoft Defender for Endpoint will discover, prioritise and remediate misconfigurations within the endpoints in real-time. Using insight into application usage patterns, Microsoft Defender for Endpoint can prioritise the highest value assets, such as business-critical applications, confidential data and highest value users against these types of attacks<\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"23\" data-list-defn-props=\"{&quot;335551500&quot;:15884578,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><strong>Device discovery:<\/strong> Helps you find unmanaged devices connected to your corporate network without the need for extra appliances<\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"23\" data-list-defn-props=\"{&quot;335551500&quot;:15884578,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><strong>Device inventory:<\/strong> Shows a list of the devices in your network where alerts were generated. By default, the queue displays devices seen in the last 30 days. At a glance you\u2019ll see information such as domain, risk level, OS platform and other details for easy identification of devices most at risk<\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"23\" data-list-defn-props=\"{&quot;335551500&quot;:15884578,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><strong>Threat Analytics:<\/strong> A set of reports from expert Microsoft security researchers covering the most relevant threats. Each report provides a detailed analysis of a threat and extensive guidance on how to defend against that threat. It also incorporates data from your network, indicating whether the threat is active and if you have applicable protections in place<\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"23\" data-list-defn-props=\"{&quot;335551500&quot;:15884578,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><strong>Automated Investigation and Response (AIR)<\/strong>: AIR capabilities are designed to examine alerts and take immediate action to resolve breaches automatically and without the need for manual intervention by a security analyst. AIR capabilities significantly reduce alert volume, allowing security operations to focus on more sophisticated threats and other high-value initiatives<\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"23\" data-list-defn-props=\"{&quot;335551500&quot;:15884578,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><strong>Advanced hunting:<\/strong> Advanced hunting is a threat-hunting tool that uses specially constructed queries (using Kusto Query Language) to examine the past 30 days of event data in Microsoft 365 Defender. Organisations can use advanced hunting queries to inspect unusual activity, detect possible threats, and even respond to attacks. For example, lookup processes that performed LDAP authentication with clear text passwords on endpoints<\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"23\" data-list-defn-props=\"{&quot;335551500&quot;:15884578,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><strong>Endpoint Detection and Response (EDR):<\/strong> When a threat is detected, alerts are created in the system for an analyst to investigate. Alerts with the same attack techniques or attributed to the same attacker are aggregated into an entity called an incident. Aggregating alerts in this manner makes it easy for analysts to collectively investigate and respond to threats<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-12be8a2 elementor-section-content-middle elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"12be8a2\" data-element_type=\"section\" id=\"#sectiontitle8\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c4c7316\" data-id=\"c4c7316\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-b8782c0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b8782c0\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-5948f3f\" data-id=\"5948f3f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-2de6339\" data-id=\"2de6339\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-eb0a6f3 elementor-widget elementor-widget-html\" data-id=\"eb0a6f3\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<iframe width=\"1080\" height=\"570\" src=\"https:\/\/www.youtube.com\/embed\/6KYVvvRC2xA\" title=\"Microsoft Defender Series: Endpoint Defense Demystified\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-77ac016\" data-id=\"77ac016\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-f6299f0 elementor-widget elementor-widget-spacer\" data-id=\"f6299f0\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3a4ddbd elementor-widget elementor-widget-heading\" data-id=\"3a4ddbd\" data-element_type=\"widget\" id=\"sectiontitle8\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">MIGRATING TO DEFENDER FOR ENDPOINT <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d4dece5 elementor-widget elementor-widget-text-editor\" data-id=\"d4dece5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>At Insentra, we are working with many customers looking to migrate from third party endpoint protection products to Microsoft Defender to streamline and simplify their security solutions and operations.<\/p><p>By including Defender for Endpoint as part of the operating system in Windows, Microsoft have streamlined the migration and onboarding process.<\/p><p>Devices can be on-boarded into Microsoft Defender for Endpoint while running a third-party endpoint protection solution. This enables an organisation to run for a period of coexistence, while collecting security signals from endpoints and without reducing their security posture. When ready, the organisation can remove the third-party agent which automatically puts Microsoft Defender into active mode, leaving no gap in protection.<\/p><p>The high-level migration process from an existing 3rd part solution is broken down into 3 phases.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-868979e elementor-section-content-middle elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"868979e\" data-element_type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-527b55b\" data-id=\"527b55b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-cb1ee13\" data-id=\"cb1ee13\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c096970 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"c096970\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"185\" height=\"185\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/09\/microsoft_d_num_1.png\" class=\"attachment-large size-large wp-image-22000\" alt=\"New Zealand | The Complete Guide to Microsoft Defender for Endpoint\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/09\/microsoft_d_num_1.png 185w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/09\/microsoft_d_num_1-150x150.png 150w\" sizes=\"(max-width: 185px) 100vw, 185px\" style=\"width:100%;height:100%;max-width:185px\" title=\"microsoft_d_num_1\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-3c26f56\" data-id=\"3c26f56\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1f706e8 elementor-widget elementor-widget-heading\" data-id=\"1f706e8\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">PHASE 1 - PREPARE<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2785b22 elementor-widget elementor-widget-text-editor\" data-id=\"2785b22\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul><li>Update devices<\/li><li>Prepare you team<\/li><li>Configure device proxy and internet settings<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-30dedcb\" data-id=\"30dedcb\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a46cf5e elementor-section-content-middle elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a46cf5e\" data-element_type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-afe73e4\" data-id=\"afe73e4\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-d9b7d9a\" data-id=\"d9b7d9a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e6b8ae8 elementor-widget elementor-widget-image\" data-id=\"e6b8ae8\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"185\" height=\"185\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/microsoft_d_num_2.png\" class=\"attachment-large size-large wp-image-22001\" alt=\"New Zealand | The Complete Guide to Microsoft Defender for Endpoint\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/microsoft_d_num_2.png 185w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/microsoft_d_num_2-150x150.png 150w\" sizes=\"(max-width: 185px) 100vw, 185px\" style=\"width:100%;height:100%;max-width:185px\" title=\"microsoft_d_num_2\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-ec07e9a\" data-id=\"ec07e9a\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-05d0f21 elementor-widget elementor-widget-heading\" data-id=\"05d0f21\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">PHASE 2 - SETUP<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-905d94f elementor-widget elementor-widget-text-editor\" data-id=\"905d94f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul><li>Re-install Microsoft Defender Antivirus (if<br \/>required) *MDE is part of the OS in Windows<br \/>10\/11, so typically is still installed but disabled<\/li><li>Onboard devices and enable Microsoft Defender<br \/>Antivirus in passive mode<\/li><li>Run a detection test to confirm that onboarding<br \/>was successful<\/li><li>Configure policies and settings<\/li><li>Get updates for Microsoft Defender Antivirus<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-483eb5d\" data-id=\"483eb5d\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5547afc elementor-section-content-middle elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5547afc\" data-element_type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-13a83ce\" data-id=\"13a83ce\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-d77643c\" data-id=\"d77643c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3354e29 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"3354e29\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"185\" height=\"185\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/microsoft_d_num_3.png\" class=\"attachment-large size-large wp-image-22002\" alt=\"New Zealand | The Complete Guide to Microsoft Defender for Endpoint\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/microsoft_d_num_3.png 185w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/microsoft_d_num_3-150x150.png 150w\" sizes=\"(max-width: 185px) 100vw, 185px\" style=\"width:100%;height:100%;max-width:185px\" title=\"microsoft_d_num_3\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-ae02daf\" data-id=\"ae02daf\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6bf0140 elementor-widget elementor-widget-heading\" data-id=\"6bf0140\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">PHASE 3 - SWITCH <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fd799c7 elementor-widget elementor-widget-text-editor\" data-id=\"fd799c7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul><li>Uninstall non-Microsoft endpoint<br \/>protection product<\/li><li>Switch Defender Antivirus to active mode<\/li><li>Run a simulation to prove end-to-end<br \/>protection<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-3d53978\" data-id=\"3d53978\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a7535d3 elementor-section-content-middle elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a7535d3\" data-element_type=\"section\" id=\"#sectiontitle9\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-db5ecce\" data-id=\"db5ecce\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0a68b2e elementor-widget elementor-widget-heading\" data-id=\"0a68b2e\" data-element_type=\"widget\" id=\"sectiontitle9\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">REAL-WORLD EXAMPLE <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2cc283f elementor-widget elementor-widget-text-editor\" data-id=\"2cc283f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Consider a medium-sized company using Microsoft Defender for Endpoint as part of their cybersecurity strategy. They have numerous endpoints (desktops and laptops) used by employees for day-to-day work. Let\u2019s look at a scenario where an employee at a company receives a malicious email containing a disguised link, which if clicked, will trigger a ransomware attack.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-edb1b61 elementor-widget elementor-widget-text-editor\" data-id=\"edb1b61\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><b style=\"font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-size: 1rem;\">Here\u2019s how Microsoft 365 Defender can intervene and stop the attack:<\/b><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-4c5b62a elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4c5b62a\" data-element_type=\"section\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-e9faccc\" data-id=\"e9faccc\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-aaee061 elementor-widget elementor-widget-image\" data-id=\"aaee061\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/UD_0823_img_15.png\" class=\"attachment-full size-full wp-image-20995\" alt=\"New Zealand | The Complete Guide to Microsoft Defender for Endpoint\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/UD_0823_img_15.png 200w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/UD_0823_img_15-150x150.png 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" style=\"width:100%;height:100%;max-width:200px\" title=\"UD_0823_img_15\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-8aaa459\" data-id=\"8aaa459\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-29b5ec1 elementor-widget elementor-widget-text-editor\" data-id=\"29b5ec1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><strong>Email Protection:<\/strong> Microsoft Defender for Office 365, the email security component of Microsoft Defender for Endpoint, scans incoming emails in realtime. It uses advanced anti-phishing technologies and threat intelligence to detect and block malicious emails, including those with suspicious links or attachments.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-9de1d67 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9de1d67\" data-element_type=\"section\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-4b7e8f7\" data-id=\"4b7e8f7\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-84dc98a elementor-widget elementor-widget-image\" data-id=\"84dc98a\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/UD_0823_img_16.png\" class=\"attachment-full size-full wp-image-20996\" alt=\"New Zealand | The Complete Guide to Microsoft Defender for Endpoint\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/UD_0823_img_16.png 200w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/UD_0823_img_16-150x150.png 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" style=\"width:100%;height:100%;max-width:200px\" title=\"UD_0823_img_16\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-007a799\" data-id=\"007a799\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-05d0550 elementor-widget elementor-widget-text-editor\" data-id=\"05d0550\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><strong>Link Scanning:<\/strong> When the employee receives the malicious email, Microsoft Defender for Office 365 scans the link embedded within it. It compares it against known malicious URLs and checks if it leads to a potentially harmful website.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-a91af6c elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a91af6c\" data-element_type=\"section\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-8950746\" data-id=\"8950746\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6c8e5c9 elementor-widget elementor-widget-image\" data-id=\"6c8e5c9\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/UD_0823_img_17.png\" class=\"attachment-full size-full wp-image-20997\" alt=\"New Zealand | The Complete Guide to Microsoft Defender for Endpoint\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/UD_0823_img_17.png 200w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/UD_0823_img_17-150x150.png 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" style=\"width:100%;height:100%;max-width:200px\" title=\"UD_0823_img_17\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-5402f76\" data-id=\"5402f76\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1e85e04 elementor-widget elementor-widget-text-editor\" data-id=\"1e85e04\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><strong>Real-Time Analysis:<\/strong> Microsoft Defender for Endpoint analyses the behaviour of the suspicious link in real-time. It uses machine learning algorithms and heuristics to determine if the link poses a potential threat. It considers factors such as the website\u2019s reputation, previous encounters with similar links, and known patterns of malicious behaviour.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-1aebcf7 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1aebcf7\" data-element_type=\"section\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-c2f15f2\" data-id=\"c2f15f2\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1e7a0f8 elementor-widget elementor-widget-image\" data-id=\"1e7a0f8\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/UD_0823_img_18.png\" class=\"attachment-full size-full wp-image-20998\" alt=\"New Zealand | The Complete Guide to Microsoft Defender for Endpoint\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/UD_0823_img_18.png 200w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/UD_0823_img_18-150x150.png 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" style=\"width:100%;height:100%;max-width:200px\" title=\"UD_0823_img_18\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-1e61ab8\" data-id=\"1e61ab8\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9699f72 elementor-widget elementor-widget-text-editor\" data-id=\"9699f72\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><strong>Block and Alert:<\/strong> If Microsoft Defender for Endpoint determines the link is indeed malicious, it takes action. It can block the employee\u2019s access to the website, preventing them from clicking on the link and exposing their system to the ransomware attack. Simultaneously, it alerts the security team about the attempted attack, providing them with details and insights for further investigation.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-d89e72c elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d89e72c\" data-element_type=\"section\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-e167462\" data-id=\"e167462\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a09e6b3 elementor-widget elementor-widget-image\" data-id=\"a09e6b3\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/UD_0823_img_19.png\" class=\"attachment-full size-full wp-image-20999\" alt=\"New Zealand | The Complete Guide to Microsoft Defender for Endpoint\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/UD_0823_img_19.png 200w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/UD_0823_img_19-150x150.png 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" style=\"width:100%;height:100%;max-width:200px\" title=\"UD_0823_img_19\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-1d6360b\" data-id=\"1d6360b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-78000b8 elementor-widget elementor-widget-text-editor\" data-id=\"78000b8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><strong>Incident Response:<\/strong> Upon receiving the alert, the security team can initiate incident response procedures. They can leverage the investigation capabilities of Microsoft Defender for Endpoint to analyse the attempted attack, identify any potential indicators of compromise, and take appropriate measures to contain and mitigate the threat.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-94c72d9 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"94c72d9\" data-element_type=\"section\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-59037c9\" data-id=\"59037c9\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f02e7a7 elementor-widget elementor-widget-image\" data-id=\"f02e7a7\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/UD_0823_img_20.png\" class=\"attachment-full size-full wp-image-21000\" alt=\"New Zealand | The Complete Guide to Microsoft Defender for Endpoint\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/UD_0823_img_20.png 200w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/UD_0823_img_20-150x150.png 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" style=\"width:100%;height:100%;max-width:200px\" title=\"UD_0823_img_20\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-3710dd3\" data-id=\"3710dd3\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a7e628c elementor-widget elementor-widget-text-editor\" data-id=\"a7e628c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><strong>Automated Investigation:<\/strong> With Microsoft 365 E5 licencing or the Microsoft Defender for Endpoint Plan 2 add-on organisations can leverage Automated Investigation and Response (AIR) capabilities. Given the never-ending flow of threats, security teams often face the challenge of addressing the high volume of alerts. Imagine having a virtual analyst in your Tier 1 or Tier 2 security operations team. The virtual analyst mimics the ideal steps that security operations would take to investigate and remediate threats. The virtual analyst could work 24&#215;7, with unlimited capacity and take on a significant load of investigations and threat remediation.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c409d1b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c409d1b\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-253467e\" data-id=\"253467e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-8b4152b\" data-id=\"8b4152b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-57fac98 elementor-widget elementor-widget-html\" data-id=\"57fac98\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<iframe width=\"1080\" height=\"570\" src=\"https:\/\/www.youtube.com\/embed\/s18JWN2anRM\" title=\"Microsoft Defender Series: Cloud Point Defense Explained\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-2465af1\" data-id=\"2465af1\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4222595 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4222595\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-150f5d3\" data-id=\"150f5d3\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-cf40f93\" data-id=\"cf40f93\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-63e8440 elementor-widget elementor-widget-html\" data-id=\"63e8440\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<iframe width=\"1080\" height=\"570\" src=\"https:\/\/www.youtube.com\/embed\/iX-oGFP284I\" title=\"Microsoft Defender Series: Securing Cloud Apps\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-24cb9bf\" data-id=\"24cb9bf\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1b2d0de elementor-section-content-middle elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1b2d0de\" data-element_type=\"section\" id=\"#sectiontitle10\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b434a5f\" data-id=\"b434a5f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4cd26dc elementor-widget elementor-widget-heading\" data-id=\"4cd26dc\" data-element_type=\"widget\" id=\"sectiontitle10\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">LICENSING <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5f2b694 elementor-widget elementor-widget-text-editor\" data-id=\"5f2b694\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Microsoft Defender for Endpoint licencing essentially comes in two flavours, Plan 1 and Plan 2 (see the above graphic on page 6\/7 for the feature comparison).<\/p><p><strong>Plan 1 is included with:<\/strong><\/p><ul><li>Microsoft 365 E3 with the Microsoft 365 E5 Security add-on<\/li><\/ul><p><strong>Plan 2 is included with:<\/strong><\/p><ul><li>Windows 11 Enterprise E5\/A5<\/li><li>Windows 10 Enterprise E5\/A5<\/li><li>Microsoft 365 E5\/A5\/G5 (which includes Windows 10 or Windows 11 Enterprise E5)<\/li><li>Microsoft 365 E5\/A5\/G5\/F5 Security<\/li><li>Microsoft 365 F5 Security &amp; Compliance<\/li><\/ul><div><a href=\"https:\/\/learn.microsoft.com\/en-us\/office365\/servicedescriptions\/microsoft-365-service-descriptions\/microsoft-365-tenantlevel-services-licensing-guidance\/microsoft-365-security-compliance-licensing-guidance\" target=\"_blank\" rel=\"noopener nofollow\">Which licenses provide the rights for users to benefit from the service?<\/a><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-618c751 elementor-section-content-middle elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"618c751\" data-element_type=\"section\" id=\"#sectiontitle11\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6549d5d\" data-id=\"6549d5d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-dd409db elementor-widget elementor-widget-heading\" data-id=\"dd409db\" data-element_type=\"widget\" id=\"sectiontitle11\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">CONCLUSION<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7aac905 elementor-widget elementor-widget-text-editor\" data-id=\"7aac905\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Microsoft Defender for Endpoint is a crucial component of the Microsoft 365 Defender suite, offering comprehensive endpoint protection against a wide range of cyber threats. By using behavioural sensors, cloud security analytics, and threat intelligence, Defender for Endpoint provides real-time detection and response capabilities, helping organisations quickly identify and mitigate potential security incidents.<\/p><p>With its advanced threat detection and response features, Microsoft Defender for Endpoint empowers organisations to safeguard their endpoints, prevent ransomware attacks, and protect against file-less malware. Its integration with other Microsoft Defender products, such as Defender for Office 365 and Defender for Identity, strengthens overall security posture by providing protection against email-based threats and enhancing identity and access management practices.<\/p><p>Moreover, Microsoft 365 Defender\u2019s centralised management console streamlines security operations, offering a unified view of security events, alerts, and recommendations.<\/p><p>As cybercrime continues to pose significant risks to organisations worldwide, the need for robust cybersecurity solutions offered by Microsoft Defender for Endpoint becomes increasingly evident. With its comprehensive features and benefits, coupled with seamless onboarding for existing Windows users, migrating to and adopting Defender for Endpoint can be a strategic move towards enhancing an organisation\u2019s cybersecurity resilience.<\/p><p>By leveraging the capabilities of Microsoft Defender for Endpoint, organisations can proactively detect, respond and mitigate cyber threats, ultimately safeguarding their sensitive data, digital assets, and operations from the ever evolving landscape of cybercrime.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f9daaff elementor-section-content-middle elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f9daaff\" data-element_type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-eb7fd49\" data-id=\"eb7fd49\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ed6be13 elementor-widget elementor-widget-heading\" data-id=\"ed6be13\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">HELPING YOU DEFEND YOUR ORGANISATION<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-11bc4f2 elementor-widget elementor-widget-text-editor\" data-id=\"11bc4f2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>With cyber threats becoming smarter every day, some organisations struggle to keep their security measures robust and up-to-date. If you need assistance in leveraging the full potential of Microsoft Defender for Endpoint, Insentra is here to be your partner.<\/p><p>Our <a href=\"https:\/\/www.insentragroup.com\/nz\/services\/managed-services\/managed-defender\/\" target=\"_blank\" rel=\"noopener\">Managed Defender<\/a> services cover servers, Windows devices and mobile devices, securing all your endpoints to minimise the risk of breaches and data. With our advanced detection, rapid response and 24\u00d77 monitoring, you can rest assured that your digital assets are well-protected<\/p><p><a href=\"https:\/\/www.insentragroup.com\/nz\/contact\/\" target=\"_blank\" rel=\"noopener\">Contact us<\/a> today to start bolstering your security posture.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-18f8f08 elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"18f8f08\" data-element_type=\"section\" id=\"dpwnloadpdf\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wider\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-cfab6d8\" data-id=\"cfab6d8\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4fe0353 elementor-widget elementor-widget-heading\" data-id=\"4fe0353\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">DOWNLOAD THE COMPLETE GUIDE<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-c0aee48 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c0aee48\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-f8913ce\" data-id=\"f8913ce\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4124e6f elementor-widget elementor-widget-image\" data-id=\"4124e6f\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"600\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/Microsoft_Defender_Fanout_v2.png\" class=\"attachment-large size-large wp-image-21118\" alt=\"New Zealand | The Complete Guide to Microsoft Defender for Endpoint\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/Microsoft_Defender_Fanout_v2.png 600w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/Microsoft_Defender_Fanout_v2-300x300.png 300w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/08\/Microsoft_Defender_Fanout_v2-150x150.png 150w\" sizes=\"(max-width: 600px) 100vw, 600px\" style=\"width:100%;height:100%;max-width:600px\" title=\"Microsoft_Defender_Fanout_v2\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-6784a7b\" data-id=\"6784a7b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b7ead77 elementor-widget elementor-widget-spacer\" data-id=\"b7ead77\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-465f04c elementor-widget elementor-widget-html\" data-id=\"465f04c\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<script charset=\"utf-8\" type=\"text\/javascript\" src=\"\/\/js.hsforms.net\/forms\/v2.js?pre=1\"><\/script>\r\n<script>\r\njQuery(function($){\r\n    var curr_url_checker = window.location.href; var curr_url_splitter = curr_url_checker.split(\"?\"); var curr_url = curr_url_splitter[0];\r\n    hbspt.forms.create({\r\n        region: \"na1\",\r\n        portalId: \"20799536\",\r\n        formId: \"ec504498-09eb-4fec-860c-e9a2dcb6c81b\", \/\/Change to form ID\r\n        redirectUrl: curr_url + '?thank-you=yes', onBeforeFormSubmit($form, submissionValues){ for(var i=0; i<submissionValues.length; i++){ if(submissionValues[i].name=='email'){ createCookie('hsThankEmail', submissionValues[i].value, 1); }} },\r\n        css: \".hs_error_rollup {display:none !important;}\", onFormReady: function($form){\r\n            $form.find('input[name=\"referral_page\"]').val(curr_url).change();\r\n        }\r\n    });\r\n});\r\n<\/script>\r\n\r\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f64c18c elementor-section-full_width thank-you-section elementor-section-height-default elementor-section-height-default\" data-id=\"f64c18c\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6e21a6f\" data-id=\"6e21a6f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-4cf1bfa elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4cf1bfa\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wider\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-d6cdbde\" data-id=\"d6cdbde\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9bffda0 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"9bffda0\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Thank you for downloading the Complete Guide to Microsoft Defender for Endpoint.\u202f<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-807b91d elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"807b91d\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-23ea359\" data-id=\"23ea359\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5c1a8df elementor-widget elementor-widget-text-editor\" data-id=\"5c1a8df\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>We\u2019ve sent a copy to your inbox. Remember to mark <a href=\"mailto:hello@insentragroup.com\"><b>hello@insentragroup.com<\/b><\/a> as a \u201csafe sender\u201d, and to check any junk or spam folders so you receive your copy.\u202f<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-645a523\" data-id=\"645a523\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7b2b2af elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"7b2b2af\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"600\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/09\/Microsoft_Defender_Fanout_v2-1.png\" class=\"attachment-large size-large wp-image-22255\" alt=\"New Zealand | The Complete Guide to Microsoft Defender for Endpoint\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/09\/Microsoft_Defender_Fanout_v2-1.png 600w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/09\/Microsoft_Defender_Fanout_v2-1-300x300.png 300w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/09\/Microsoft_Defender_Fanout_v2-1-150x150.png 150w\" sizes=\"(max-width: 600px) 100vw, 600px\" style=\"width:100%;height:100%;max-width:600px\" title=\"Microsoft_Defender_Fanout_v2-1.png\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-56f802b elementor-section-content-middle d-none elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"56f802b\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-8b5c65f\" data-id=\"8b5c65f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-28d385e elementor-widget__width-initial thankyou-image elementor-widget elementor-widget-image\" data-id=\"28d385e\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"600\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/09\/MicrosoftTeams-image-11.png\" class=\"attachment-full size-full wp-image-21263\" alt=\"New Zealand | The Complete Guide to Microsoft Defender for Endpoint\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/09\/MicrosoftTeams-image-11.png 600w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/09\/elementor\/thumbs\/MicrosoftTeams-image-11-qbqv5jsavmp9rkx66i62yuy5xigmcem8kgpud0le48.png 300w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/09\/MicrosoftTeams-image-11-150x150.png 150w\" sizes=\"(max-width: 600px) 100vw, 600px\" style=\"width:100%;height:100%;max-width:600px\" title=\"MicrosoftTeams-image-11.png\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b050b42 elementor-widget elementor-widget-text-editor\" data-id=\"b050b42\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>We\u2019ve sent a copy to your inbox. Remember to mark <b>hello@insentragroup.com<\/b> as a \u201csafe sender\u201d, and to check any junk or spam folders so you receive your copy.\u202f<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-c581cab booking-box\" data-id=\"c581cab\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-00a19ee elementor-widget elementor-widget-html\" data-id=\"00a19ee\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<style>\r\n.booking-box .elementor-column.elementor-col-20 {\r\n    width: 10%;\r\n    padding-top: 11px;\r\n    background-color: #fff;\r\n    text-align:center !important;\r\n    border: solid 1px #ededed;\r\n    border-radius: 4px;\r\n    font-size: 12px;\r\n}\r\n.booking-box .elementor-column.elementor-col-80 {\r\n    width: 90%;\r\n}\r\n.booking-box .meeting-avatar {\r\n\ttransform: scale(1);\r\n\tanimation: pulse 1s infinite;\r\n}\r\n@keyframes pulse {\r\n\t0% {\r\n\t\ttransform: scale(0.95);\r\n\t\tbox-shadow: 0 0 0 0 rgba(0, 0, 0, 0.7);\r\n\t}\r\n\r\n\t70% {\r\n\t\ttransform: scale(1);\r\n\t\tbox-shadow: 0 0 0 10px rgba(0, 0, 0, 0);\r\n\t}\r\n\r\n\t100% {\r\n\t\ttransform: scale(0.95);\r\n\t\tbox-shadow: 0 0 0 0 rgba(0, 0, 0, 0);\r\n\t}\r\n}    \r\n<\/style>\r\n<div class=\"text-center mb-3\">\r\n    <img decoding=\"async\" src=\"https:\/\/avatars.hubspot.net\/2450d4f47b3e5475f6e6fb18cd74deb3-100\" class=\"rounded-circle shadow meeting-avatar\" style=\"max-height:72px;\" \/>\r\n<\/div>\r\n<script>\r\njQuery(function($){\r\n    var hsThankEmail = readCookie('hsThankEmail');\r\n    if(hsThankEmail != ''){\r\n        console.log(hsThankEmail);\r\n        $('#hsbookingform [type=\"email\"]').val(hsThankEmail);\r\n    }\r\n    $(document).on('submit', '#hsbookingform', function(e){\r\n        e.preventDefault();\r\n        var theForm = $(this);\r\n        theForm.find('[type=\"submit\"]').html('<i class=\"fa fa-spinner fa-spin\"><\/i> Processing...');\r\n        var data = {\r\n            action: 'submissionGuidCheck',\r\n            meeting_date: $(\"#form-field-date\").val(),\r\n            meeting_time: $(\"#form-field-time\").val(),\r\n            meeting_email: $(\"#form-field-email_address\").val()\r\n        }\r\n        $.post(ElementorProFrontendConfig.ajaxurl, data, function(response){\r\n            console.log(JSON.parse(response)); \r\n        });\r\n        return false;   \r\n    });\r\n});\r\n<\/script>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8b2d589 elementor-headline--style-rotate elementor-widget elementor-widget-animated-headline\" data-id=\"8b2d589\" data-element_type=\"widget\" data-settings=\"{&quot;headline_style&quot;:&quot;rotate&quot;,&quot;rotating_text&quot;:&quot;Consult\\nChat\\nDiscuss&quot;,&quot;rotate_iteration_delay&quot;:1000,&quot;animation_type&quot;:&quot;typing&quot;,&quot;loop&quot;:&quot;yes&quot;}\" data-widget_type=\"animated-headline.default\">\n\t\t\t\t\t\t\t<h3 class=\"elementor-headline elementor-headline-animation-type-typing elementor-headline-letters\">\n\t\t\t\t\t<span class=\"elementor-headline-plain-text elementor-headline-text-wrapper\"><i class=\"far fa-smile\"><\/i><\/span>\n\t\t\t\t<span class=\"elementor-headline-dynamic-wrapper elementor-headline-text-wrapper\">\n\t\t\t\t\t<span class=\"elementor-headline-dynamic-text elementor-headline-text-active\">\n\t\t\t\tConsult\t\t\t<\/span>\n\t\t\t\t\t<span class=\"elementor-headline-dynamic-text\">\n\t\t\t\tChat\t\t\t<\/span>\n\t\t\t\t\t<span class=\"elementor-headline-dynamic-text\">\n\t\t\t\tDiscuss\t\t\t<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<span class=\"elementor-headline-plain-text elementor-headline-text-wrapper\">with our experts!<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fc61f8e elementor-button-align-stretch elementor-widget elementor-widget-form\" data-id=\"fc61f8e\" data-element_type=\"widget\" data-settings=\"{&quot;step_next_label&quot;:&quot;Next&quot;,&quot;step_previous_label&quot;:&quot;Previous&quot;,&quot;button_width&quot;:&quot;100&quot;,&quot;step_type&quot;:&quot;number_text&quot;,&quot;step_icon_shape&quot;:&quot;circle&quot;}\" data-widget_type=\"form.default\">\n\t\t\t\t\t\t\t<form class=\"elementor-form\" method=\"post\" id=\"hsbookingform\" name=\"New Form\" aria-label=\"New Form\">\n\t\t\t<input type=\"hidden\" name=\"post_id\" value=\"20658\"\/>\n\t\t\t<input type=\"hidden\" name=\"form_id\" value=\"fc61f8e\"\/>\n\t\t\t<input type=\"hidden\" name=\"referer_title\" value=\"Complete Guide to Microsoft Defender for Endpoint eBook - New Zealand\" \/>\n\n\t\t\t\t\t\t\t<input type=\"hidden\" name=\"queried_id\" value=\"20658\"\/>\n\t\t\t\n\t\t\t<div class=\"elementor-form-fields-wrapper elementor-labels-above\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-html elementor-field-group elementor-column elementor-field-group-field_a6276d7 elementor-col-20\">\n\t\t\t\t\t<i class=\"fa fa-calendar\"><\/i>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-date elementor-field-group elementor-column elementor-field-group-date elementor-col-80 elementor-field-required\">\n\t\t\t\t\t\n\t\t<input type=\"date\" name=\"form_fields[date]\" id=\"form-field-date\" class=\"elementor-field elementor-size-sm  elementor-field-textual elementor-date-field\" placeholder=\"Meeting Date\" required=\"required\" pattern=\"[0-9]{4}-[0-9]{2}-[0-9]{2}\">\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-html elementor-field-group elementor-column elementor-field-group-field_c969df1 elementor-col-20\">\n\t\t\t\t\t<i class=\"fa fa-clock\"><\/i>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-time elementor-field-group elementor-column elementor-field-group-time elementor-col-80 elementor-field-required\">\n\t\t\t\t\t\t\t<input type=\"time\" name=\"form_fields[time]\" id=\"form-field-time\" class=\"elementor-field elementor-size-sm  elementor-field-textual elementor-time-field\" placeholder=\"Meeting Time\" required=\"required\">\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-html elementor-field-group elementor-column elementor-field-group-field_dd3a67c elementor-col-20\">\n\t\t\t\t\t<i class=\"fa fa-envelope\"><\/i>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-email elementor-field-group elementor-column elementor-field-group-email_address elementor-col-80 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"email\" name=\"form_fields[email_address]\" id=\"form-field-email_address\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Your Email Address\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-group elementor-column elementor-field-type-submit elementor-col-100 e-form__buttons\">\n\t\t\t\t\t<button class=\"elementor-button elementor-size-sm\" type=\"submit\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-calendar-check\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M400 64h-48V12c0-6.627-5.373-12-12-12h-40c-6.627 0-12 5.373-12 12v52H160V12c0-6.627-5.373-12-12-12h-40c-6.627 0-12 5.373-12 12v52H48C21.49 64 0 85.49 0 112v352c0 26.51 21.49 48 48 48h352c26.51 0 48-21.49 48-48V112c0-26.51-21.49-48-48-48zm-6 400H54a6 6 0 0 1-6-6V160h352v298a6 6 0 0 1-6 6zm-52.849-200.65L198.842 404.519c-4.705 4.667-12.303 4.637-16.971-.068l-75.091-75.699c-4.667-4.705-4.637-12.303.068-16.971l22.719-22.536c4.705-4.667 12.303-4.637 16.97.069l44.104 44.461 111.072-110.181c4.705-4.667 12.303-4.637 16.971.068l22.536 22.718c4.667 4.705 4.636 12.303-.069 16.97z\"><\/path><\/svg>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Book Now<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/button>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/form>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-cefccb7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"cefccb7\" data-element_type=\"section\" id=\"relevantResources\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-354ea00\" data-id=\"354ea00\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-870ff2f elementor-align-center elementor-widget elementor-widget-button\" data-id=\"870ff2f\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#relevantResources\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-chevron-circle-down\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256c0 137-111 248-248 248S8 393 8 256 119 8 256 8s248 111 248 248zM273 369.9l135.5-135.5c9.4-9.4 9.4-24.6 0-33.9l-17-17c-9.4-9.4-24.6-9.4-33.9 0L256 285.1 154.4 183.5c-9.4-9.4-24.6-9.4-33.9 0l-17 17c-9.4 9.4-9.4 24.6 0 33.9L239 369.9c9.4 9.4 24.6 9.4 34 0z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-caa966f elementor-widget elementor-widget-text-editor\" data-id=\"caa966f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXP182018858 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-usefontface=\"false\" data-contrast=\"none\"><span class=\"NormalTextRun SCXP182018858 BCX0\">In the meantime, we thought you might find these resources useful\u00a0<span class=\"EOP SCXP182018858 BCX0\">\u200b<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-d6c72d3 relevant-resources elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d6c72d3\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-f13323d\" data-id=\"f13323d\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-28670a1 elementor-widget elementor-widget-image\" data-id=\"28670a1\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.insentragroup.com\/nz\/insights\/resources\/ebooks-and-guides\/email-archive-pre-planning-assessment\/\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"561\" height=\"412\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/archive-migration-pre-planning-checklist.png\" class=\"attachment-full size-full wp-image-21753\" alt=\"New Zealand | The Complete Guide to Microsoft Defender for Endpoint\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/archive-migration-pre-planning-checklist.png 561w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/archive-migration-pre-planning-checklist-300x220.png 300w\" sizes=\"(max-width: 561px) 100vw, 561px\" style=\"width:100%;height:73.44%;max-width:561px\" title=\"archive-migration-pre-planning-checklist\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eb944c6 elementor-widget elementor-widget-heading\" data-id=\"eb944c6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/www.insentragroup.com\/nz\/insights\/resources\/ebooks-and-guides\/email-archive-pre-planning-assessment\/\">Email Archive Pre-Planning Assessment<\/a><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f9c01e7 elementor-widget elementor-widget-text-editor\" data-id=\"f9c01e7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>With the understanding that not all email archive migration projects are the same, our Email Archive Pre-Planning Assessment supports the diverse conditions found in organisations of all sizes, from enterprise environments to small businesses.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a67be96 elementor-widget__width-auto read-more elementor-widget elementor-widget-button\" data-id=\"a67be96\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.insentragroup.com\/nz\/insights\/resources\/ebooks-and-guides\/email-archive-pre-planning-assessment\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-double-right\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34zm192-34l-136-136c-9.4-9.4-24.6-9.4-33.9 0l-22.6 22.6c-9.4 9.4-9.4 24.6 0 33.9l96.4 96.4-96.4 96.4c-9.4 9.4-9.4 24.6 0 33.9l22.6 22.6c9.4 9.4 24.6 9.4 33.9 0l136-136c9.4-9.2 9.4-24.4 0-33.8z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">READ MORE<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-6441d47\" data-id=\"6441d47\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-83029e8 elementor-widget elementor-widget-image\" data-id=\"83029e8\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.insentragroup.com\/nz\/insights\/resources\/ebooks-and-guides\/master-movers-data-migrations-planning-guide\/\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"671\" height=\"651\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/master_movers_guide_img.png\" class=\"attachment-full size-full wp-image-13902\" alt=\"\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/master_movers_guide_img.png 671w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/09\/master_movers_guide_img-300x291.png 300w\" sizes=\"(max-width: 671px) 100vw, 671px\" style=\"width:100%;height:97.02%;max-width:671px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d15799 elementor-widget elementor-widget-heading\" data-id=\"2d15799\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/www.insentragroup.com\/nz\/insights\/resources\/ebooks-and-guides\/master-movers-data-migrations-planning-guide\/\">Master Movers Data Migrations Planning Guide<\/a><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c8bf98c elementor-widget elementor-widget-text-editor\" data-id=\"c8bf98c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>What kind of data are you migrating? Whether you are still in the planning phase or have begun your migration journey, you face a complex task.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-657bb1d elementor-widget__width-auto read-more elementor-widget elementor-widget-button\" data-id=\"657bb1d\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.insentragroup.com\/nz\/insights\/resources\/ebooks-and-guides\/master-movers-data-migrations-planning-guide\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-double-right\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34zm192-34l-136-136c-9.4-9.4-24.6-9.4-33.9 0l-22.6 22.6c-9.4 9.4-9.4 24.6 0 33.9l96.4 96.4-96.4 96.4c-9.4 9.4-9.4 24.6 0 33.9l22.6 22.6c9.4 9.4 24.6 9.4 33.9 0l136-136c9.4-9.2 9.4-24.4 0-33.8z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">READ MORE<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-5400f3a\" data-id=\"5400f3a\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-77e1fa8 elementor-widget elementor-widget-image\" data-id=\"77e1fa8\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.insentragroup.com\/nz\/insights\/resources\/ebooks-and-guides\/master-movers-migration\/\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"3000\" height=\"2000\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/08\/MicrosoftTeams-image-6.png\" class=\"attachment-full size-full wp-image-13075\" alt=\"New Zealand | The Complete Guide to Microsoft Defender for Endpoint\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/08\/MicrosoftTeams-image-6.png 3000w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/08\/MicrosoftTeams-image-6-300x200.png 300w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/08\/MicrosoftTeams-image-6-1024x683.png 1024w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/08\/MicrosoftTeams-image-6-768x512.png 768w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/08\/MicrosoftTeams-image-6-1536x1024.png 1536w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/08\/MicrosoftTeams-image-6-2048x1365.png 2048w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2022\/08\/MicrosoftTeams-image-6-1568x1045.png 1568w\" sizes=\"(max-width: 3000px) 100vw, 3000px\" style=\"width:100%;height:66.67%;max-width:3000px\" title=\"MicrosoftTeams-image (6)\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3b6f0c3 elementor-widget elementor-widget-heading\" data-id=\"3b6f0c3\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/www.insentragroup.com\/nz\/insights\/resources\/ebooks-and-guides\/master-movers-migration\/\">Master Movers Migration\n<\/a><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1043f8b elementor-widget elementor-widget-text-editor\" data-id=\"1043f8b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>According to a\u00a0recent study conducted by Gartner, 83% of data migration projects either fail or exceed their budgets and schedules. It\u2019s not a hidden fact that data migrations can be complex and stressful, however careful preparations will prove invaluable during the migration.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-284de40 elementor-widget__width-auto read-more elementor-widget elementor-widget-button\" data-id=\"284de40\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.insentragroup.com\/nz\/insights\/resources\/ebooks-and-guides\/master-movers-migration\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-double-right\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34zm192-34l-136-136c-9.4-9.4-24.6-9.4-33.9 0l-22.6 22.6c-9.4 9.4-9.4 24.6 0 33.9l96.4 96.4-96.4 96.4c-9.4 9.4-9.4 24.6 0 33.9l22.6 22.6c9.4 9.4 24.6 9.4 33.9 0l136-136c9.4-9.2 9.4-24.4 0-33.8z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">READ MORE<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>The Complete Guide to Microsoft Defender for Endpoint Download eBook The Complete Guide to Microsoft Defender for Endpoint Download eBook In today\u2019s digital landscape, where cyber threats are constantly evolving and becoming increasingly sophisticated, the need for robust cybersecurity solutions has never been more critical. Organisations and individuals alike face the daunting task of safeguarding&hellip; <a class=\"more-link\" href=\"https:\/\/www.insentragroup.com\/nz\/insights\/geek-speak\/secure-workplace\/the-complete-guide-to-microsoft-defender-for-endpoint\/\">Continue reading <span class=\"screen-reader-text\">The Complete Guide to Microsoft Defender for Endpoint<\/span><\/a><\/p>\n","protected":false},"author":177,"featured_media":22255,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"elementor_header_footer","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[20],"tags":[],"class_list":["post-20658","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-secure-workplace","entry"],"_links":{"self":[{"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/posts\/20658","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/users\/177"}],"replies":[{"embeddable":true,"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/comments?post=20658"}],"version-history":[{"count":358,"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/posts\/20658\/revisions"}],"predecessor-version":[{"id":31865,"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/posts\/20658\/revisions\/31865"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/media\/22255"}],"wp:attachment":[{"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/media?parent=20658"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/categories?post=20658"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/tags?post=20658"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}