![]() ![]() To address scenarios like this we’re adding unmanaged endpoint discovery to Microsoft Defender for Endpoint to help customers discover and secure unmanaged endpoints on their corporate network. Unmanaged endpoint discovery in Microsoft Defender for Endpoint Those responsible for the security profiles and policies of these devices were basically unaware of its existence. This might have been easily addressed except for the fact that the server was unmanaged-no one knew it needed patching. ![]() In this case the breach originated via an unpatched vulnerability on an internet-facing server. There have been many examples where unmanaged devices were exploited and led to a breach, such as the Equifax breach. Smart attackers go there first. With work-from-home, the threat has grown exponentially, making discovering and applying security controls to these devices mission critical.” Unmanaged devices are literally one of your weakest links. “The riskiest threat is the one you don’t know about. You can't protect what you can't see!ĭavid Weston, Microsoft Director of Enterprise and OS Security, advises: To fully utilize these solutions to defend your environment, it's critical to have full visibility of all the devices in your organization. With the rise of unified SIEM and XDR (extended detection and response) solutions, like Microsoft 365 Defender , the level of efficacy that our customers are benefiting from continues to improve. In recent years, the efficacy of Endpoint Protection (EPP) and Endpoint Detection and Response (EDR) platforms has continued to increase. This blog provides more information on the unmanaged endpoint discovery feature while an additional blog provides more information on how to configure the network device discovery feature. ![]() This is especially critical in the new global hybrid working environment, which exposes the most challenging cybersecurity landscape we’ve ever encountered. Today (June 22nd), we released into GA a new set of capabilities for Microsoft Defender for Endpoint that empower organizations to discover and secure network devices and unmanaged endpoints. ![]()
0 Comments
Leave a Reply. |