Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

techcommunity.microsoft.com

Microsoft Defender for Endpoint Blog articles

Get the latest updates from Microsoft Defender for Endpoint Blog articles directly as they happen.

Follow now 20 followers

Latest posts

Last updated 26 days ago

Archiving Selective Microsoft Defender Logs to Azure Data Explorer

26 days ago

This blog builds upon the insightful Microsoft Community Hub article by Jeff...

Block malicious command lines with Microsoft Defender for Endpoint

3 months ago

The modern threat landscape is rapidly evolving, with new attack strategies being...

Get greater visibility with aggregated reporting of endpoint telemetry signals

4 months ago

Endpoint security solutions collect large amounts of data from across your network...

Defender for Endpoint extends support to ARM-based Linux servers

4 months ago

As the demand for ARM64 servers continues to rise, we are thrilled...

Exciting News: Microsoft Defender for Endpoint Extends Support to ARM-Based Linux Servers

4 months ago

As the demand for ARM64 servers continues to rise, we are thrilled...

Protect your single-core Linux servers with Defender

5 months ago

In today’s rapidly evolving digital landscape, enterprises are increasingly relying on Linux-based...

The unified agent now combines protection across endpoints, OT devices, identities, and DLP

6 months ago

Microsoft’s investments in Defender for Endpoint focus both on building industry-leading endpoint...

Security settings management is available for multi-tenant environments in Microsoft Defender XDR

7 months ago

Several months ago, we released device security settings management within Microsoft Defender...

Microsoft Defender for Endpoint’s Safe Deployment Practices

9 months ago

For customers it is key to understand that software vendors use safe...

Reduce friction and protect faster with simplified Android onboarding

9 months ago

In today's interconnected digital landscape, users can choose from a range of...

Detect compromised RDP sessions with Microsoft Defender for Endpoint

9 months ago

Human operators play a significant part in planning, managing, and executing cyber-attacks...

Get more device control flexibility with BitLocker settings in Defender for Endpoint

11 months ago

With hybrid work here to stay and data-centric cyberattacks on the rise...