Question How good is Microsoft Defender for Endpoint?

Please provide comments and solutions that are helpful to the author of this topic.

Bot

AI-powered Bot
Apr 21, 2016
4,694
Microsoft Defender for Endpoint is considered a top-tier EDR solution. It leverages AI and automation for threat detection, provides a comprehensive view of threats across endpoints, and integrates well with other Microsoft products. However, its effectiveness can depend on your specific needs and environment.
 

Victor M

Level 15
Verified
Top Poster
Well-known
Oct 3, 2022
730
I tried it 2 yrs ago. The only thing it did was recommend some group policy settings and grade your security based on completing them. Things would have to have changed. It did not even have a execution tree if I remember correctly. Both Kaspersky and Bitdefender had it.

Let me clarify it a little for you. Competent hackers are those that can code. With that skill, they can tweak an exploit to bypass your firewall and detections mechanisms. Competent ones also collect a wide range of up to date arsenals; if one fails, they can try another, or they could tweak it again. So, that one week old Chrome could be a vector. When they read about a vulnerability, they can code for it. Not everyone is that good, some just buy kits from the dark web - one trick pony so to speak.
 
Last edited:

Vitali Ortzi

Level 29
Verified
Top Poster
Well-known
Dec 12, 2016
1,886
I tried it 2 yrs ago. The only thing it did was recommend some group policy settings and grade your security based on completing them. Things would have to have changed. It did not even have a execution tree if I remember correctly. Both Kaspersky and Bitdefender had it.

Let me clarify it a little for you. Competent hackers are those that can code. With that skill, they can tweak an exploit to bypass your firewall and detections mechanisms. Competent ones also collect a wide range of up to date arsenals; if one fails, they can try another, or they could tweak it again. So, that one week old Chrome could be a vector. When they read about a vulnerability, they can code for it. Not everyone is that good, some just buy kits from the dark web - one trick pony so to speak.
Windows S is nearly as secure as an Xbox even if you exploit blink there are extra sandboxes you have to deal with and all kinds of memory checks that will make your life inconvenient especially if you enable security mitigations for a more secure browser experience (disables v8 and enables mitigations that aren't supported by jit as it disables jit )
In windows S everything comes from Microsoft store and is sandboxed by default and software will always be updated there just like on Android,Ios


It will take a highly skilled person to bypass windows S from some link they sent you as it will require a zero day exploit chain
 

Marko :)

Level 24
Verified
Top Poster
Well-known
Aug 12, 2015
1,347
I've read somewhere that nowadays, antivirus are not good enough, especially against tough hackers.
If hacker wants to attack you, there's nothing that will protect you. Fortunately for you, hackers never attack typical (home) users; they only attack enterprises because that's where money is. Why attack you, the average user when there's a company with millions in their bank account?

So people need to stop pretending like they are center of the world and that everyone is coming for them. Windows Defender, even in basic configuration is enough for all of you. Just update Windows regularly, update your software, add ad blocker into your web browser and you are protected.

All those antivirus tests you see on YouTube are pointless bullshit and doesn't represent the real picture. If you want to infect your PC, you'll infect it doesn't matter if you used Windows Defender, Bitdefender or Kaspersky.
 
Last edited:

oldschool

Level 85
Verified
Top Poster
Well-known
Mar 29, 2018
7,826
So people need to stop pretending like they are center of the world and that everyone is coming for them.
Indeed. Unless you have very sophisticated enemies.
Windows Defender, even in basic configuration is enough for all of you. Just update Windows regularly, update your software, add ad blocker into your web browser and you are protected.
Precisely this, with the addition of safe surfing habits. And remember to stay safe, not paranoid.
If your really serious about security you run a Windows 2000 VM using the latest version of Netscape Navigator inside a Tails VM inside of Qubes using a Fortinet router.
And don't forget about the Faraday Cage to house all of it! :LOL: :LOL: :LOL:
 

Victor M

Level 15
Verified
Top Poster
Well-known
Oct 3, 2022
730
Nothing at all? And yes in the case of being targeted. Absolutely nothing?
Some of us are a bit of a defeatist when it comes to dealing with hackers. You put in your defense layers and he tries to break thru. If you have an EDR you may catch the attack upon reviewing your alerts, but he's already inside. So then you re-image, add a block to block his attack. And add some more defense configs. He will notice that his C2 component is gone, and try again. The game goes on. The problem for the defender is that he has to spend time to review + investigate the EDR alerts, the alerts are just suspicous things, and may mean nothing. And for the defender, all it takes is one mis-configuration, one vulnerability, one human error; that is if the attacker finds and exploits it. The attacker does not have a guarranteed win, but he has a good chance. You have to be dilligent, always learning, always looking for improvements, thinking like an attacker and ways to twart him and always monitoring for attacks. Knowing all the various methods of attacks helps, pick up a book on the Comptia Security+ certification, Amazon.ca it provides good coverage on that and more. Easy read. It also has a chapter on defense frameworks that teaches you where to find guidance to get good defense coverage.Those frameworks can be used as a checklist of what to implement. Better to spend money on knowing the whole picture than just jumping onto an AV and praying. After learning the Security+ curriculum, you will be spending money more wisely.

IMHO, what matters most is determination to defend your turf.
 
Last edited:

Digmor Crusher

Level 25
Verified
Top Poster
Well-known
Jan 27, 2018
1,482
Some of us are a bit of a defeatist when it comes to dealing with hackers. You put in your defense layers and he tries to break thru. If you have an EDR you may catch the attack upon reviewing your alerts, but he's already inside. So then you re-image, add a block to block his attack. And add some more defense configs. He will notice that his C2 component is gone, and try again. The game goes on. The problem for the defender is that he has to spend time to review + investigate the EDR alerts, the alerts are just suspicous things, and may mean nothing. And for the defender, all it takes is one mis-configuration, one vulnerability, one human error; that is if the attacker finds and exploits it. The attacker does not have a guarranteed win, but he has a good chance. You have to be dilligent, always learning, always looking for improvements, thinking like an attacker and ways to twart him and always monitoring for attacks. Knowing all the various methods of attacks helps, pick up a book on the Comptia Security+ certification, Amazon.ca it provides good coverage on that and more. Easy read. It also has a chapter on defense frameworks that teaches you where to find guidance to get good defense coverage.Those frameworks can be used as a checklist of what to implement. Better to spend money on knowing the whole picture than just jumping onto an AV and praying. After learning the Security+ curriculum, you will be spending money more wisely.

IMHO, what matters most is determination to defend your turf.
Unfortunately 99.9 % of computer users cannot do what you just described.
 

Victor M

Level 15
Verified
Top Poster
Well-known
Oct 3, 2022
730
Unfortunately 99.9 % of computer users cannot do what you just described.
The OP asks for what to do if he is a target. The answer is that he has got to be able to defend himself. Corp security analysts do these things. They have also studied got the certifications. It is not impossible. But, it is usually team work. So what the OP has to do is scale it down and schedule the work. Come home from work, cook, eat dinner, wash dishes, then sit down and do 45 mins of EDR alerts. If his PC's are turned off while at work, then maybe he could do EDR reviews every other day. Every weekend, schedule 2-3 hrs for security improvements or research. And depending on which framework he chooses to follow, he would have to schedule to do security audits lets say every 6 months or so. It's perfectly doable, it would become a regular thing, especially if he is already interested in security. It's either that or get pwned.
 
Last edited:

Victor M

Level 15
Verified
Top Poster
Well-known
Oct 3, 2022
730
And remember, sometimes your protection wins. Like @Sandbox Breaker - DFIR says, the game is about secure configuration. But sometimes you have to scramble to save your ass. And get to know when that is when you monitor your boxes and monitor your EDR's.

By the way, he was talking about the Lockheed Martin cyber kill chain Cyber kill chain - Wikipedia
 
Last edited:

Acadia

Level 2
Sep 25, 2020
67
... and don't forget to put credit freezes at all four (yes, there are four not three) credit reporting agencies. Not too long ago Congress (they can occasionally do something right) passed a law which now makes it free to do so.
Acadia
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top