Microsoft Defender for Endpoint — EDR and Device Protection

DEFENDER-FOR-ENDPOINT

How Microsoft Defender for Endpoint provides endpoint detection and response (EDR) across Windows, macOS, Linux, iOS, and Android — collecting behavioural telemetry, detecting threats post-breach, enabling investigation timelines, and automating remediation through the Microsoft 365 Defender portal.

defender-for-endpointedrendpoint-securitymd-101ms-102

Overview

Microsoft Defender for Endpoint (MDE) is Microsoft’s enterprise endpoint detection and response (EDR) platform. Unlike traditional antivirus that tries to block known-bad files at execution, EDR records everything that happens on a device — every process, network connection, file write, registry change — and analyses that telemetry to detect malicious behaviour after it has already started.

MDE has two licensing tiers:

PlanCapability focus
Plan 1Next-generation protection (antivirus), attack surface reduction, device control, web content filtering
Plan 2Everything in P1 plus EDR, device timeline, automated investigation, threat and vulnerability management, advanced hunting

Plan 2 is the full EDR product. Plan 1 is prevention-focused without post-breach investigation capabilities.


Onboarding

Devices must be onboarded before MDE can collect telemetry. Onboarding installs a sensor that runs as a kernel-level service and streams events to Microsoft’s cloud backend.

PlatformOnboarding method
Windows 10/11, Windows Server 2019+Microsoft Intune, Group Policy, SCCM, local script, or VDI script
Windows Server 2016, 2012 R2Requires the MDE unified agent (replaces the old MMA-based sensor)
macOSIntune MDM profile or manual package deployment
LinuxAnsible/Puppet scripts or manual package installation
iOS / AndroidIntune app deployment

Once onboarded, the device appears in the MDE device inventory within a few minutes.


What the Sensor Collects

The MDE sensor records and streams to the cloud:

This data is retained for 30 days and queryable via Advanced Hunting.


Detection Layers

MDE detects threats through multiple complementary mechanisms:

Behavioural EDR Detections

Correlates sequences of events (process hollowing, credential dumping, lateral movement) against attack patterns. These fire after activity has started — catching techniques that bypass prevention.

Next-Generation Protection (Microsoft Defender Antivirus)

Real-time file scanning, cloud-delivered protection (cloud block), and machine learning classifiers catch malware at execution. MDAV and MDE work together; disabling MDAV degrades MDE detection.

Attack Surface Reduction (ASR) Rules

Configurable rules that block specific high-risk behaviours independently of signature databases:

Web Content Filtering / Network Protection

Blocks connections to known malicious IPs and domains at the network level, regardless of which application made the request.


Device Timeline

Each onboarded device has a timeline — a chronological stream of all recorded events. The timeline is the primary investigation tool: an analyst can pivot from an alert to the device timeline, scroll backwards to find how the attacker gained access, and forwards to see what they did after.

The timeline supports filtering by event type, time range, and keyword search across process command lines.


Automated Investigation and Response

When high-confidence alerts fire, MDE can automatically:

  1. Collect additional evidence from the affected device (memory, filesystem, network)
  2. Analyse each piece of evidence and classify it (malicious / suspicious / clean)
  3. Determine whether remediation is warranted
  4. Execute remediation actions based on the configured automation level

Automation levels per device group:

Live Response

For manual investigation, Live Response provides an interactive shell to a device. From it, analysts can:

Live Response sessions are logged and auditable.


Threat and Vulnerability Management (TVM)

TVM continuously inventories software installed on onboarded devices and correlates that inventory against Microsoft’s vulnerability database. The result is:

TVM prioritises by exploitability and asset criticality, not just CVSS score — a vulnerability with active exploit code in the wild ranks higher than a theoretical high-CVSS flaw with no known exploit.


Integration with Intune

When MDE and Intune are connected (via the MDE connector in Intune), device risk level calculated by MDE can feed into Intune compliance policy. A device MDE classifies as High risk fails compliance, which can trigger Conditional Access to block that device from accessing corporate resources.

This creates the enforcement loop:


Key Exam Points