Microsoft Defender for Endpoint
Endpoint Security
Microsoft Defender for Endpoint
Description
Microsoft Defender for Endpoint is the enterprise endpoint protection platform built by the same team that ships the operating system it's defending. It fuses next-generation antivirus, EDR, XDR, attack surface reduction, and automated investigation into a single portal, then extends that view across Windows, macOS, Linux, iOS, Android, and IoT. For organizations already breathing Microsoft 365, the integration is less a feature bullet and more a gravitational pull.
Is Microsoft Defender an EDR?
Yes and no. The free Microsoft Defender Antivirus built into Windows is consumer-grade antivirus. Microsoft Defender for Endpoint is the paid enterprise product that layers full EDR on Plan 1 and XDR, automated investigation, and automatic attack disruption on Plan 2. Same brand, very different feature sets, and the confusion trips up procurement teams every quarter.
Defender for Endpoint ships in two plans. Plan 1 covers next-generation antivirus, attack surface reduction rules, device control, web content filtering, and a centralized management portal. Plan 2 adds the full EDR and XDR story: behavioral detection, a rich endpoint activity timeline (30 days by default), advanced hunting with Kusto Query Language, threat and vulnerability management, automated investigation and response, and on-demand access to Microsoft Threat Experts. Plan 2 also feeds the unified Microsoft Defender XDR portal, where endpoint signals correlate with identity, email, cloud app, and Azure alerts to surface end-to-end incidents instead of disconnected pings. If your organization has licensed Microsoft 365 E5 or E5 Security, Plan 2 is already in the box. A surprising number of enterprises own the license without knowing.
The ransomware story is where Defender earns the EDR label. Tamper protection keeps attackers from disabling the agent, controlled folder access walls off user data from untrusted processes, and cloud-delivered block-at-first-sight inspects new binaries against Microsoft's threat graph before they finish launching. In Plan 2, automatic attack disruption uses high-confidence XDR signals to contain compromised accounts and devices mid-intrusion, often within minutes, without waiting on a human analyst to approve containment. For organizations comparing Defender against CrowdStrike Falcon or Trellix Endpoint Security, the decision usually narrows to Microsoft's native Intune, Entra ID, and Sentinel integration versus the deeper managed-threat-hunting muscle of standalone EDR vendors.
Deployment sits on top of tools you probably already run. Intune pushes the Defender onboarding package to managed endpoints, Entra ID conditional access uses device risk signals to gate sensitive apps, and Microsoft Sentinel ingests Defender incidents for long-term analytics and cross-source correlation against SIEM data from elsewhere in the stack. That tight coupling is the core argument for Defender and the core objection against it: best-of-breed teams worry about platform lock-in, while Microsoft-centric shops see the coupling as a force multiplier.
Microsoft Defender Plans at a Glance
| Capability | Plan 1 | Plan 2 / M365 E5 |
|---|---|---|
| Next-generation antivirus | Yes | Yes |
| Attack surface reduction rules | Yes | Yes |
| Endpoint detection and response (EDR) | Basic alerts | Full device timeline, live response |
| Automated investigation and response (AIR) | No | Yes |
| Threat and vulnerability management | No | Yes |
| Advanced hunting (KQL) | No | Yes |
| Automatic attack disruption (XDR) | No | Yes |
| Microsoft Threat Experts | No | Available as add-on |
| Supported platforms | Windows, macOS, Linux, iOS, Android, IoT, network devices | |
| Typical list price (per user, per month) | $3.00 | $5.20, or included with M365 E5 |
Frequently asked questions about Microsoft Defender for Endpoint
What is Microsoft EDR, and is it the same thing as Defender for Endpoint?
Microsoft EDR is the colloquial name for the endpoint detection and response capabilities inside Defender for Endpoint Plan 2. It records process trees, network connections, file and registry activity, and user behavior in a searchable timeline (30 days by default) that analysts hunt across with KQL.
Does Windows 11 already include Defender for Endpoint?
No. Windows 11 includes Microsoft Defender Antivirus, which is the free consumer-grade AV. Defender for Endpoint is a separate licensed product, sold standalone or bundled in Microsoft 365 E5 and Microsoft 365 E5 Security.
How does Defender for Endpoint stop ransomware?
Layered controls do the work: cloud-delivered block-at-first-sight antivirus, attack surface reduction rules that block common initial-access techniques, controlled folder access, tamper protection to keep the agent itself running, and in Plan 2, automatic attack disruption that isolates compromised accounts and devices during an active intrusion.
Can Defender protect non-Microsoft platforms?
Yes. macOS, major Linux distributions, iOS, Android, and network devices are all supported. Management, policy, and hunting happen in the same Microsoft Defender portal regardless of operating system.
How does Defender for Endpoint fit alongside Microsoft Sentinel?
Defender is the sensor and local response engine; Sentinel is the cloud SIEM and SOAR layer. Most enterprises stream Defender incidents into Sentinel for long-term analytics, compliance reporting, and correlation across non-Microsoft data sources.
Sources: Microsoft Learn, Microsoft Defender for Endpoint overview, Microsoft Learn, Compare Defender for Endpoint Plan 1 and Plan 2, Microsoft, Defender for Endpoint product page, Microsoft Learn, Automatic attack disruption in Microsoft Defender XDR, Microsoft Learn, Attack surface reduction rules, Microsoft, Defender pricing.
Service Type
ProductAlternatives to Microsoft Defender for Endpoint
CrowdStrike Falcon Endpoint Protection, Trellix Endpoint Security, or Cybereason Defense Platform
About Endpoint Security
Visit Microsoft
Learn more about Microsoft Defender for Endpoint directly from Microsoft.
Microsoft Official SiteKey Capabilities
Related Resources
Documentations
Standards
Protecting Controlled Unclassified Information in nonfederal systems, including...
Learn how to baseline your workstations and prevent supply chain attacks — where...
Cloud VMs need hardening too — learn how to baseline Linux cloud instances and d...
Tools
Open-source host-based intrusion detection system for endpoint monitoring and se...
Verify package authenticity, pin repositories, and generate SBOMs on Linux works...
Protect Windows workstations with Authenticode verification, WDAC policies, and...
Explore the full suite of OS baselining tools and hardening guides for workstati...