Package image for Microsoft Defender for Endpoint

Microsoft Defender for Endpoint

Endpoint Security

Microsoft Defender for Endpoint

Endpoint Security

Description

Microsoft Defender for Endpoint is the enterprise endpoint protection platform built by the same team that ships the operating system it's defending. It fuses next-generation antivirus, EDR, XDR, attack surface reduction, and automated investigation into a single portal, then extends that view across Windows, macOS, Linux, iOS, Android, and IoT. For organizations already breathing Microsoft 365, the integration is less a feature bullet and more a gravitational pull.




Is Microsoft Defender an EDR?


Yes and no. The free Microsoft Defender Antivirus built into Windows is consumer-grade antivirus. Microsoft Defender for Endpoint is the paid enterprise product that layers full EDR on Plan 1 and XDR, automated investigation, and automatic attack disruption on Plan 2. Same brand, very different feature sets, and the confusion trips up procurement teams every quarter.




Defender for Endpoint ships in two plans. Plan 1 covers next-generation antivirus, attack surface reduction rules, device control, web content filtering, and a centralized management portal. Plan 2 adds the full EDR and XDR story: behavioral detection, a rich endpoint activity timeline (30 days by default), advanced hunting with Kusto Query Language, threat and vulnerability management, automated investigation and response, and on-demand access to Microsoft Threat Experts. Plan 2 also feeds the unified Microsoft Defender XDR portal, where endpoint signals correlate with identity, email, cloud app, and Azure alerts to surface end-to-end incidents instead of disconnected pings. If your organization has licensed Microsoft 365 E5 or E5 Security, Plan 2 is already in the box. A surprising number of enterprises own the license without knowing.



The ransomware story is where Defender earns the EDR label. Tamper protection keeps attackers from disabling the agent, controlled folder access walls off user data from untrusted processes, and cloud-delivered block-at-first-sight inspects new binaries against Microsoft's threat graph before they finish launching. In Plan 2, automatic attack disruption uses high-confidence XDR signals to contain compromised accounts and devices mid-intrusion, often within minutes, without waiting on a human analyst to approve containment. For organizations comparing Defender against CrowdStrike Falcon or Trellix Endpoint Security, the decision usually narrows to Microsoft's native Intune, Entra ID, and Sentinel integration versus the deeper managed-threat-hunting muscle of standalone EDR vendors.



Deployment sits on top of tools you probably already run. Intune pushes the Defender onboarding package to managed endpoints, Entra ID conditional access uses device risk signals to gate sensitive apps, and Microsoft Sentinel ingests Defender incidents for long-term analytics and cross-source correlation against SIEM data from elsewhere in the stack. That tight coupling is the core argument for Defender and the core objection against it: best-of-breed teams worry about platform lock-in, while Microsoft-centric shops see the coupling as a force multiplier.



Microsoft Defender Plans at a Glance



Capability Plan 1 Plan 2 / M365 E5
Next-generation antivirus Yes Yes
Attack surface reduction rules Yes Yes
Endpoint detection and response (EDR) Basic alerts Full device timeline, live response
Automated investigation and response (AIR) No Yes
Threat and vulnerability management No Yes
Advanced hunting (KQL) No Yes
Automatic attack disruption (XDR) No Yes
Microsoft Threat Experts No Available as add-on
Supported platforms Windows, macOS, Linux, iOS, Android, IoT, network devices
Typical list price (per user, per month) $3.00 $5.20, or included with M365 E5



Frequently asked questions about Microsoft Defender for Endpoint


What is Microsoft EDR, and is it the same thing as Defender for Endpoint?
Microsoft EDR is the colloquial name for the endpoint detection and response capabilities inside Defender for Endpoint Plan 2. It records process trees, network connections, file and registry activity, and user behavior in a searchable timeline (30 days by default) that analysts hunt across with KQL.

Does Windows 11 already include Defender for Endpoint?
No. Windows 11 includes Microsoft Defender Antivirus, which is the free consumer-grade AV. Defender for Endpoint is a separate licensed product, sold standalone or bundled in Microsoft 365 E5 and Microsoft 365 E5 Security.

How does Defender for Endpoint stop ransomware?
Layered controls do the work: cloud-delivered block-at-first-sight antivirus, attack surface reduction rules that block common initial-access techniques, controlled folder access, tamper protection to keep the agent itself running, and in Plan 2, automatic attack disruption that isolates compromised accounts and devices during an active intrusion.

Can Defender protect non-Microsoft platforms?
Yes. macOS, major Linux distributions, iOS, Android, and network devices are all supported. Management, policy, and hunting happen in the same Microsoft Defender portal regardless of operating system.

How does Defender for Endpoint fit alongside Microsoft Sentinel?
Defender is the sensor and local response engine; Sentinel is the cloud SIEM and SOAR layer. Most enterprises stream Defender incidents into Sentinel for long-term analytics, compliance reporting, and correlation across non-Microsoft data sources.




Sources: Microsoft Learn, Microsoft Defender for Endpoint overview, Microsoft Learn, Compare Defender for Endpoint Plan 1 and Plan 2, Microsoft, Defender for Endpoint product page, Microsoft Learn, Automatic attack disruption in Microsoft Defender XDR, Microsoft Learn, Attack surface reduction rules, Microsoft, Defender pricing.

Service Type

Product

About Endpoint Security

Advanced endpoint protection solutions featuring EDR (Endpoint Detection and Response), anti-malware, and device management. Secure all devices accessing your network including laptops, desktops, mobile devices, and IoT endpoints.
Explore Endpoint Security