Trace Id is missing
Skip to main content
Microsoft Security

Explore the latest in AI-powered cybersecurity capabilities announced at Microsoft Secure.  Watch on demand >  Read the announcement >

Microsoft Defender for Endpoint

Disrupt ransomware with industry-leading endpoint security on any platform.

Deliver multiplatform detection and response

Apply AI-powered endpoint security across Windows, macOS, Linux, Android, iOS, and IoT devices.

Outmaneuver sophisticated adversaries with AI

Stop cyberattacks such as ransomware and move at machine speed with industry-transforming AI that amplifies your security team’s strengths.

Boost prevention with global threat intelligence

Minimize vulnerabilities with a clear view of your cyberattack surface and adversaries, along with best practices for cyberthreat prevention.

Secure devices end to end

Protect your multiplatform and IoT devices with an end-to-end, industry-leading detection and response solution at the core of Microsoft Defender XDR.

Defender for Endpoint key capabilities

Operate security and IT teams in tandem

Simplify security and IT collaboration using unified endpoint management to prevent confusion, misconfigurations, and potential security gaps.

Leave no device undetected

See and manage your cyberattack surface from a single view across all managed and unmanaged Windows, macOS, Linux, iOS, Android, IoT, and network devices.

Device screen displaying Microsoft Defender for Endpoint investigation graph

Configure flexible controls for your enterprise

Balance protection and productivity with granular controls including settings, policies, web and network access, cyberthreat detection, and automated workflows.

Device screen displaying Windows Security protection history showing details about a blocked cyberthreat.

Elevate your security posture

Improve your security configuration with prioritized recommendations from Microsoft Secure Score.

Gain an unimpeded view of adversaries

Know your adversaries with over 65 trillion daily signals from the largest clouds, security organizations, 1.5 billion devices, internet graphs, and over 10 thousand experts in 72 countries.

Trick cyberattackers with auto-deployed deception

Only with Microsoft can you automatically generate and disperse deception techniques at scale to expose cyberattackers with early-stage, high-fidelity signals.

Device screen displaying Microsoft Defender service status.

Disrupt ransomware early in the cyberattack chain

Automatically disrupt ransomware cyberattacks by blocking lateral movement and remote encryption in a decentralized way across all of your devices.

Move at machine speed with Security Copilot

Use built-in, security-specific generative AI to rapidly investigate and respond to incidents, prioritize alerts, and learn new skills. Security Copilot is now embedded in Microsoft Defender XDR for early access customers.

Back to tabs

Discover new integrations with Microsoft Security Copilot

Use natural language queries to summarize investigations and explore built-in threat intelligence with Microsoft Security Copilot, now in early access.

Unified security operations platform

Secure your digital estate with the only security operations (SecOps) platform that unifies the full capabilities of extended detection and response (XDR) and security information and event management (SIEM).

Animation of microsoft defender dashboard homepage

Unified portal

Detect and disrupt cyberthreats in near real time and streamline investigation and response.

Back to tabs

Industry recognition

Microsoft Security is a recognized industry leader.

See what our customers are saying

G&J Pepsi logo

G&J Pepsi-Cola

HCA Healthcare Logo

HCA Healthcare

Back to tabs

Compare flexible purchase options

Explore the comprehensive security capabilities in Microsoft Defender for Endpoint P1, included with Microsoft 365 E3, and Microsoft Defender for Endpoint P2, included with Microsoft 365 E5, including versions of these suites that do not include Microsoft Teams.

Endpoint protection focused on prevention

Microsoft Defender for Endpoint P1

Microsoft Defender for Endpoint P1 offers a foundational set of capabilities, including industry-leading antimalware, cyberattack surface reduction, and device-based conditional access.

  • Unified security tools and centralized management

  • Next-generation antimalware

  • Cyberattack surface reduction rules

  • Device control (such as USB)

  • Endpoint firewall
  • Network protection

  • Web control / category-based URL blocking

  • Device-based conditional access

  • Controlled folder access
  • APIs, SIEM connector, custom cyberthreat intelligence

  • Application control

Endpoint protection with advanced detection and response

Microsoft Defender for Endpoint P2

Microsoft Defender for Endpoint P2 offers all the capabilities in P1, plus endpoint detection and response, automated investigation and incident response, and cyberthreat and vulnerability management.

  • Includes everything in Endpoint P1, plus:

  • Endpoint detection and response

  • Deception techniques

  • Automated investigation and remediation

  • Cyberthreat and vulnerability management

  • Threat intelligence (cyberthreat analytics)

  • Sandbox (deep analysis)

  • Endpoint attack notifications6

Related Microsoft Defender products

Protect against cyberthreats with best-in-class security from Microsoft.

A person using a touchscreen monitor.

Microsoft Defender XDR

Get integrated threat protection across devices, identities, apps, email, data, and cloud workloads.

Two people working together at a desk with a desktop monitor.

Microsoft Defender Vulnerability Management

Reduce risk with continuous vulnerability assessment, risk-based prioritization, and remediation.

A coffee shop employee.

Microsoft Defender for Business

Discover enterprise-grade endpoint protection for small and medium businesses that's cost effective and easy to use.

Mobile and desktop displays of Microsoft Defender.

Microsoft Defender for individuals

Get online security protection for individuals and families with one easy-to-use app.7

Additional resources

Blog

Become a Microsoft Defender for Endpoint expert

Get training for security operations and security admins, whether you’re a beginner or have experience.

Webcast

Watch episode one of The Defender’s Watch

Learn how to strengthen your security with evidence-based insights from experts protecting against modern threats.

News

Stay up to date

Get product news, configuration guidance, product tutorials, and tips.

Documentation

Dive deeper into the product

Get technical details on capabilities, minimum requirements, and deployment guidance.

Protect everything

Make your future more secure. Explore your security options today.

Frequently asked questions

  • Defender for Endpoint is a comprehensive, cloud-native endpoint security solution that delivers visibility and AI-powered cyberthreat protection to help stop cyberattacks across Windows, macOS, Linux, Android, iOS, and IoT devices. Built on the industry’s broadest cyberthreat and human intelligence insights, it can seamlessly evolve your security with XDR-level alert correlation to automatically disrupt sophisticated cyberthreats such as ransomware. Defender for Endpoint provides visibility into devices in your environment, offers vulnerability management to help you better understand your cyberattack surface, and delivers endpoint protection, endpoint detection and response (EDR), mobile cyberthreat protection, and managed hunting in a single platform. With Defender for Endpoint, customers can discover and secure endpoint devices across a multiplatform enterprise.

    Explore Defender for Endpoint documentation

  • As a comprehensive endpoint protection solution, Defender for Endpoint includes Microsoft Defender Antivirus—next-generation protection that reinforces the security perimeter of your network. It detects and blocks known and evolving cyberthreats in real time across Linux, macOS, Windows, and Android devices. Microsoft Defender Antivirus includes:

    • Real-time antivirus protection with always-on scanning that uses file and process-behavior monitoring and other heuristics. It also detects and blocks apps that are deemed unsafe but might not be detected as malware. 
    • Cloud-delivered protection with near-instant detection and blocking of new and emerging cyberthreats.
       

    Microsoft Defender Antivirus provides full coverage for all MITRE ATT&CK tactics and techniques. It was awarded Best Advanced Protection 2022 by AV-TEST and achieved the highest rating in all major industry antivirus tests across enterprise and consumer evaluations, including AV Comparatives, SE Labs, and MRG Effitas.

  • Defender for Endpoint provides cross-platform coverage across Windows, iOS, and Linux. New features or capabilities are typically provided on operating systems that haven't yet reached the end of their support lifecycle. In line with industry best practices, Microsoft recommends the installation of the latest available security patches for any operating system. 

    Explore supported Defender for Endpoint capabilities by platform

  • No. Security analysts manage Defender for Endpoint from the Microsoft Defender XDR portal—a single console for comprehensive endpoint protection, including vulnerability management, cyberthreat protection, and detection and response capabilities. 

    For customers wanting to operate their security and IT teams in tandem, Defender for Endpoint provides a consistent, single source of truth—mirrored in Intune—for managing endpoint security settings across Windows, macOS, and Linux.

    Customers who want to extend endpoint protection to multiple domains can avoid the extra integration steps often required by other endpoint protection vendors.

  • Microsoft Defender for Endpoint is a cloud-native endpoint security platform that provides visibility, cyberthreat protection, and EDR capabilities to stop cyberattacks across Windows, macOS, Linux, Android, iOS, and IoT devices. Microsoft Defender for Office 365 is a collaborative security solution that helps secure your email and Microsoft Teams environments with advanced protection against phishing, business email compromise, ransomware, and other cyberthreats. 

    Learn more about Microsoft Defender for Office 365

  • [1] IDC Market Shares: Worldwide Corporate Endpoint Security Market Shares, 2022. Michael Suby, June 2023.
  • [2] Gartner is a registered trademark and service mark and Magic Quadrant is a registered trademark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and are used herein with permission. All rights reserved.

    Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

    Gartner Magic Quadrant for Endpoint Protection Platforms, Peter Firstbrook, Chris Silva, 31 December 2022.
  • [3] Forrester, Forrester New Wave, and Forrester Wave are trademarks of Forrester Research, Inc.
  • [4] The Forrester Wave™: Endpoint Detection And Response Providers, Q2 2022, Allie Mellen with Stephanie Balaouras, Joseph Blankenship, Sarah Morana, Peggy Dostie, April 2022.
  • [5] The Forrester New Wave™: Extended Detection And Response (XDR) Providers, Q4 2021, Allie Mellen with Joseph Blankenship, Alexis Tatro, Peggy Dostie, October 2021.
  • [6] Endpoint attack notifications are available to Microsoft Defender for Endpoint P2 customers as a free, opt-in feature.
  • [7] App is available on Windows, macOS, Android™, and iOS in select Microsoft 365 Family or Personal billing regions.

Follow Microsoft