Home
%3CLINGO-SUB%20id%3D%22lingo-sub-1271806%22%20slang%3D%22en-US%22%3ESecure%20your%20remote%20workforce%20with%20Microsoft%20Defender%20ATP%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1271806%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22WIN20_HOME_FAM_Samsung_Galaxy_Book_2_0075.jpg%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F181309iC9514897E0A9E468%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22WIN20_HOME_FAM_Samsung_Galaxy_Book_2_0075.jpg%22%20alt%3D%22WIN20_HOME_FAM_Samsung_Galaxy_Book_2_0075.jpg%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20style%3D%22font-family%3A%20inherit%3B%22%3EAs%20remote%20work%20has%20grown%20dramatically%20over%20the%20last%20few%20weeks%2C%20we%20want%20to%20make%20sure%20you%20have%20the%20information%20you%20need%2C%20as%20we%20work%20together%2C%20to%20help%20secure%20your%20organization%E2%80%99s%20remote%20workers.%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EExpanding%20to%20home-based%20worker%20scenarios%20introduces%20new%20challenges%20which%20include%20expanding%20deployment%20to%20additional%20devices%2C%20adjusting%20security%20policies%20to%20enable%20productivity%20from%20home%2C%20enabling%20BYOD%2C%20supporting%20broader%20SaaS%20application%20usage%2C%20securing%20sensitive%20data%2C%20and%20more.%20Our%20team%20is%20here%20to%20help%20secure%20your%20organizations%E2%80%99%20remote%20workers.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ETo%20help%20rapidly%20expand%20protection%20to%20the%20growing%20number%20of%20remote%20worker%20devices%2C%20we%E2%80%99re%20offering%20guidance%2C%20recommendations%2C%20and%20tips%20so%20that%20you%20can%20stay%20protected%2C%20get%20the%20most%20out%20of%20your%20investment%2C%20and%20unlock%20additional%20tools%20that%20are%20available%20for%20you.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EMicrosoft%20Defender%20ATP%20customers%20can%20expect%20the%20following%3A%20%26nbsp%3B%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3ECoverage%20for%20additional%20devices%20without%20requiring%20additional%20licenses%3C%2FLI%3E%0A%3CLI%3EGuidance%20and%20support%20services%20to%20rapidly%20expand%20deployment%3C%2FLI%3E%0A%3CLI%3EProactive%20and%20reactive%20assistance%20helping%20security%20teams%20identify%2C%20respond%20to%2C%20and%20remediate%20threats%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%3CFONT%20size%3D%225%22%3E%3CSTRONG%3ELicensing%20%E2%80%93%20what%20is%20available%20to%20you%20today%20%3C%2FSTRONG%3E%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3ERight%20now%2C%20you%20need%20to%20be%20able%20to%20quickly%20secure%20a%20greater%20number%20of%20endpoints%20than%20ever%20before.%20With%20Microsoft%20Defender%20ATP%2C%20this%20flexibility%20is%20included%20without%20the%20need%20to%20acquire%20additional%20licenses.%20Microsoft%20Defender%20ATP%20is%20purchased%20on%20a%20%3CEM%3Eper%20user%20basis%3C%2FEM%3E%20which%20covers%20users%20for%20up%20to%20%3CSTRONG%3E5%20concurrent%20devices%20%3C%2FSTRONG%3Eof%20the%20licensed%20user%2C%20allowing%20you%20to%20expand%20endpoint%20protection%20to%20additional%20devices%20used%20by%20licensed%20users%20with%20zero%20friction.%20If%20you%20have%20further%20questions%20or%20require%20additional%20assistance%2C%20please%20contact%20your%20Microsoft%20representative.%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%26nbsp%3B%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CFONT%20size%3D%225%22%3E%3CSTRONG%3EGuidance%20for%20rapid%20onboarding%3C%2FSTRONG%3E%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3EFor%20Windows%20environments%2C%20Microsoft%20Defender%20ATP%E2%80%99s%20built-in%20and%20cloud-powered%20architecture%20eliminates%20the%20need%20to%20deploy%20agents%20or%20infrastructure%2C%20enabling%20IT%20and%20Security%20teams%20to%20focus%20on%20mission-critical%20activities%20and%20minimizing%20potential%20disruption%20to%20end-user%20productivity.%20We%20also%20offer%20guidance%20on%20methods%20and%20deployment%20tools%20you%20can%20use%20to%20install%20and%20configure%20Microsoft%20Defender%20ATP%20for%20Mac.%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%26nbsp%3B%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EFor%20corporate%20managed%2Fowned%20devices%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EYou%20can%20onboard%20macOS%2C%20Windows%207%2C%20Windows%208.1%2C%20and%20Windows%2010%20devices.%20The%20onboarding%20wizard%20in%20the%20Microsoft%20Defender%20Security%20Center%20simplifies%20this%20process%20and%20guides%20you%20with%20the%20appropriate%20steps%20depending%20on%20the%20device.%20Our%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fthreat-protection%2Fmicrosoft-defender-atp%2Fonboard-configure%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3Edocumentation%3C%2FA%3E%20provides%20the%20steps%20you%20need%20to%20learn%20how%20to%20onboard%20a%20variety%20of%20devices.%20For%20devices%20with%20Windows%20Enterprise%20or%20Windows%20Pro%2C%20we%20recommend%20having%20your%20remote%20workers%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmem%2Fintune%2Fenrollment%2Fwindows-enroll%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3Eenroll%20the%20devices%20in%20MDM%3C%2FA%3E.%20This%20will%20allow%20you%20to%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fthreat-protection%2Fmicrosoft-defender-atp%2Fconfigure-machines-onboarding%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3Eenable%20Microsoft%20Defender%20ATP%3C%2FA%3E%20for%20these%20devices.%20If%20your%20remote%20workers%20are%20using%20Macs%20at%20home%2C%20you%20should%20deploy%20Microsoft%20Defender%20ATP%20for%20Mac%20with%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fthreat-protection%2Fmicrosoft-defender-atp%2Fmicrosoft-defender-atp-mac%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ethese%20steps%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EFor%20Virtual%20Desktop%20Infrastructure%20(VDI)%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EMicrosoft%20Defender%20ATP%20offers%20VDI%20support%20for%20customers%20choosing%20to%20enable%20remote%20workers%20via%20VDI.%20Our%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fthreat-protection%2Fmicrosoft-defender-atp%2Fconfigure-endpoints-vdi%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3Edocumentation%20for%20onboarding%20VDI%3C%2FA%3E%20has%20steps%20to%20guide%20you%20through%20the%20process%20and%20will%20highlight%20steps%20for%20supporting%20your%20VDI%20environment.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EFor%20home%20devices%20and%20BYOD%26nbsp%3B%3C%2FSTRONG%3E%3CBR%20%2F%3ENot%20every%20company%20is%20able%20to%20offer%20corporate%20devices%20for%20employees%20working%20from%20home%2C%20and%20sometimes%20the%20only%20option%20is%20to%20use%20a%20personal%20home%20device%20to%20get%20work%20done.%20Windows%20Home%20includes%20industry%20leading%2C%20built-in%20antivirus%20(AV).%20Its%20free%20and%20requires%20no%20additional%20licenses.%20When%20coupled%20with%20Microsoft%20Endpoint%20Manager%2C%20you%E2%80%99ll%20be%20able%20further%20secure%20end%20users%20and%20sensitive%20corporate%20information.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWe%20recommend%20that%20Microsoft%E2%80%99s%20antivirus%20be%20used%20as%20the%20primary%20AV%20and%20be%20kept%20up%20to%20date%20to%20ensure%20the%20best%20protection%20we%20can%20provide%2C%20additional%20configuration%20guidance%20can%20be%20found%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fthreat-protection%2Fwindows-defender-antivirus%2Fconfigure-windows-defender-antivirus-features%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehere%3C%2FA%3E.%20%3CBR%20%2F%3E%3CBR%20%2F%3EFor%20mobile%20devices%2C%20we%20recommend%20you%20have%20your%20remote%20workers%20enroll%20their%20mobile%20devices%20using%20Intune%20and%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmem%2Fintune%2Fprotect%2Fapp-based-conditional-access-intune%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3Eenable%20app%20based%20conditional%20access%3C%2FA%3E%20to%20protect%20sensitive%20data%20on%20these%20devices.%20Take%20a%20look%20at%20this%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fenterprise-mobility-security%2Fhelping-businesses-rapidly-set-up-to-work-securely-from-personal%2Fba-p%2F1239830%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3Eadditional%20help%3C%2FA%3E%20on%20securing%20personal%20PCs%20and%20mobile%20devices.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CFONT%20size%3D%225%22%3EAdditional%20deployment%20assistance%20and%3C%2FFONT%3E%20%3CFONT%20size%3D%225%22%3Eguidance%3C%2FFONT%3E%3C%2FSTRONG%3E%20%3CBR%20%2F%3EWe%20are%20here%20to%20help%20you!%20Microsoft%20FastTrack%20is%20included%20with%20Microsoft%20Defender%20ATP%20and%20is%20available%20to%20assist%20organizations%20setting%20up%20remote%20work.%26nbsp%3B%20Please%20sign%20in%20and%20%3CA%20href%3D%22https%3A%2F%2Fgo.microsoft.com%2Ffwlink%2Fp%2F%3FLinkId%3D2003903%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3Efill%20out%20a%20Request%20for%20Assistance%20form%3C%2FA%3E.%20If%20you%20have%20challenges%20signing%20in%20or%20need%20additional%20assistance%2C%20please%20send%20an%20email%20to%20%3CA%20href%3D%22mailto%3Aftcrfa%40microsoft.com%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3Eftcrfa%40microsoft.com%3C%2FA%3E.%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIf%20you%20encounter%20technical%20issues%2C%20you%20can%20reach%20out%20to%20customer%20support%20through%20the%20%3CA%20href%3D%22https%3A%2F%2Fsecuritycenter.microsoft.com%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EMicrosoft%20Defender%20Security%20Center%3C%2FA%3E%2C%20or%20directly%20through%20these%20links%3A%20%3CA%20href%3D%22http%3A%2F%2Fgo.microsoft.com%2Ffwlink%2F%3FLinkID%3D761093%26amp%3Bclcid%3D0x409%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EMicrosoft%20Support%3C%2FA%3E%20or%20%3CA%20href%3D%22http%3A%2F%2Fgo.microsoft.com%2Ffwlink%2F%3FLinkID%3D733758%26amp%3Bclcid%3D0x409%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EMicrosoft%20Premier%20Support%3C%2FA%3E%3CSPAN%3E.%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CFONT%20size%3D%225%22%3ESecurity%20best%20practices%20%E2%80%93%20our%20recommendations%3C%2FFONT%3E%20%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CBR%20%2F%3E%3CSTRONG%3EBest%20practices%20and%20configurations%20to%20consider%3C%2FSTRONG%3E%3CBR%20%2F%3ETo%20help%20configure%20devices%20in%20a%20secure%20way%20while%20assuring%20productivity%20we%E2%80%99ve%20created%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmem%2Fintune%2Fprotect%2Fsecurity-baselines%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3Esecurity%20baselines%3C%2FA%3E%2C%20these%20help%20you%20secure%20and%20protect%20your%20users%20and%20devices.%20Security%20baselines%20are%20basically%20pre-configured%20groups%20of%20settings%20that%20help%20you%20apply%20a%20known%20group%20of%20settings%20and%20default%20values%20that%20are%20recommended%20by%20Microsoft%E2%80%99s%20security%20teams.%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EKeep%20in%20mind%20that%20these%20configurations%20are%20designed%20for%20enterprise%20managed%20devices%2C%20If%20you%20are%20allowing%20BYOD%20for%20employees%20working%20remotely%2C%20you%20should%20review%20the%20settings%20to%20assure%20they%20are%20appropriate%20for%20an%20employee-owned%20device%2C%20you%20can%20also%20refer%20to%20the%20%3CA%20href%3D%22https%3A%2F%2Fgithub.com%2Fmicrosoft%2FSecCon-Framework%2Fblob%2Fmaster%2Fwindows-security-configuration-framework.md%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3Esecurity%20configuration%20framework%3C%2FA%3E%20for%20additional%20guidance.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EMicrosoft%20Defender%20ATP%3C%2FSTRONG%3E%3CSTRONG%3E%20capabilities%20to%20leverage%3C%2FSTRONG%3E%3CBR%20%2F%3EMicrosoft%20Defender%20ATP%E2%80%99s%20integrated%20suite%20of%20pre%20and%20post%20breach%20protection%20capabilities%20helps%20security%20teams%20to%20scale%20and%20operate%20effectively%20and%20efficiently.%20Making%20the%20%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2019%2F05%2F21%2Fstep-9-protect-your-os-top-10-actions-secure-your-environment%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ebest%20use%20of%20these%20capabilities%3C%2FA%3E%20can%20help%20to%20secure%20your%20environment.%20We%20recommend%20that%20customers%20take%20advantage%20of%20Threat%20%26amp%3B%20Vulnerability%20Management%20(TVM)%2C%20Attack%20Surface%20Reduction%20(ASR)%2C%20and%20Auto%20Investigation%20and%20Remediation%20(Auto-IR)%20today.%20These%20features%20require%20relatively%20low%20effort%20to%20leverage%20and%20can%20have%20the%20greatest%20impact%20in%20helping%20to%20drive%20better%20security%20and%20improved%20efficiencies.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CFONT%20size%3D%225%22%3E%3CSTRONG%3EWe%E2%80%99re%20here%20to%20help!%3C%2FSTRONG%3E%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%20data-unlink%3D%22true%22%3EIn%20case%20of%20a%20security%20incident%2C%20Microsoft%20incident%20response%20(IR)%20services%20are%20available%20through%20the%20%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2Fmicrosoft-detection-and-response-team-dart-blog-series%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EMicrosoft%20Detection%20and%20Response%20Team%20(DART)%3C%2FA%3E.%20DART%20provides%20both%20reactive%20incident%20response%20and%20pro-active%20cyber-resilient%20services%2C%20some%20delivered%20remotely%20and%20some%20on-site.%20The%20team%20responds%20to%20security%20incidents%20and%20helps%20customers%20and%20partners%20around%20the%20world.%20You%20can%20reach%20out%20to%20your%20Microsoft%20Account%20Manager%2C%20Technical%20Account%20Manager%2C%20or%20Premier%20Support%20contact%20if%20you%20need%20help%20from%20DART.%3C%2FP%3E%0A%3CP%3E%3CBR%20%2F%3EIn%20summary%2C%20we%20are%20committed%20in%20helping%20customers%20secure%20their%20remote%20workforce%2C%20support%20their%20security%20teams%2C%20and%20remove%20any%20obstacles%20and%20friction%20in%20the%20way.%3C%2FP%3E%0A%3CP%3E%3CEM%3E%26nbsp%3B%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%3CEM%3EAlon%20Rosental%2C%26nbsp%3BPrincipal%20Group%20Program%20Manager%2C%26nbsp%3BMicrosoft%20Defender%20ATP%3C%2FEM%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-1271806%22%20slang%3D%22en-US%22%3E%3CP%3ETo%20help%20rapidly%20expand%20protection%20to%20the%20growing%20number%20of%20remote%20worker%20devices%2C%20we%E2%80%99re%20offering%20guidance%2C%20recommendations%2C%20and%20tips.%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-1271806%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3ERemote%20Work%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Microsoft

WIN20_HOME_FAM_Samsung_Galaxy_Book_2_0075.jpg

 

As remote work has grown dramatically over the last few weeks, we want to make sure you have the information you need, as we work together, to help secure your organization’s remote workers.

 

Expanding to home-based worker scenarios introduces new challenges which include expanding deployment to additional devices, adjusting security policies to enable productivity from home, enabling BYOD, supporting broader SaaS application usage, securing sensitive data, and more. Our team is here to help secure your organizations’ remote workers.

 

To help rapidly expand protection to the growing number of remote worker devices, we’re offering guidance, recommendations, and tips so that you can stay protected, get the most out of your investment, and unlock additional tools that are available for you.

 

Microsoft Defender ATP customers can expect the following:  

  • Coverage for additional devices without requiring additional licenses
  • Guidance and support services to rapidly expand deployment
  • Proactive and reactive assistance helping security teams identify, respond to, and remediate threats

Licensing – what is available to you today

Right now, you need to be able to quickly secure a greater number of endpoints than ever before. With Microsoft Defender ATP, this flexibility is included without the need to acquire additional licenses. Microsoft Defender ATP is purchased on a per user basis which covers users for up to 5 concurrent devices of the licensed user, allowing you to expand endpoint protection to additional devices used by licensed users with zero friction. If you have further questions or require additional assistance, please contact your Microsoft representative.

 

Guidance for rapid onboarding

For Windows environments, Microsoft Defender ATP’s built-in and cloud-powered architecture eliminates the need to deploy agents or infrastructure, enabling IT and Security teams to focus on mission-critical activities and minimizing potential disruption to end-user productivity. We also offer guidance on methods and deployment tools you can use to install and configure Microsoft Defender ATP for Mac.

 

For corporate managed/owned devices

You can onboard macOS, Windows 7, Windows 8.1, and Windows 10 devices. The onboarding wizard in the Microsoft Defender Security Center simplifies this process and guides you with the appropriate steps depending on the device. Our documentation provides the steps you need to learn how to onboard a variety of devices. For devices with Windows Enterprise or Windows Pro, we recommend having your remote workers enroll the devices in MDM. This will allow you to enable Microsoft Defender ATP for these devices. If your remote workers are using Macs at home, you should deploy Microsoft Defender ATP for Mac with these steps.

 

For Virtual Desktop Infrastructure (VDI)

Microsoft Defender ATP offers VDI support for customers choosing to enable remote workers via VDI. Our documentation for onboarding VDI has steps to guide you through the process and will highlight steps for supporting your VDI environment.

 

For home devices and BYOD 
Not every company is able to offer corporate devices for employees working from home, and sometimes the only option is to use a personal home device to get work done. Windows Home includes industry leading, built-in antivirus (AV). Its free and requires no additional licenses. When coupled with Microsoft Endpoint Manager, you’ll be able further secure end users and sensitive corporate information.

 

We recommend that Microsoft’s antivirus be used as the primary AV and be kept up to date to ensure the best protection we can provide, additional configuration guidance can be found here.

For mobile devices, we recommend you have your remote workers enroll their mobile devices using Intune and enable app based conditional access to protect sensitive data on these devices. Take a look at this additional help on securing personal PCs and mobile devices.

 

Additional deployment assistance and guidance
We are here to help you! Microsoft FastTrack is included with Microsoft Defender ATP and is available to assist organizations setting up remote work.  Please sign in and fill out a Request for Assistance form. If you have challenges signing in or need additional assistance, please send an email to ftcrfa@microsoft.com

 

If you encounter technical issues, you can reach out to customer support through the Microsoft Defender Security Center, or directly through these links: Microsoft Support or Microsoft Premier Support.

 

Security best practices – our recommendations


Best practices and configurations to consider
To help configure devices in a secure way while assuring productivity we’ve created security baselines, these help you secure and protect your users and devices. Security baselines are basically pre-configured groups of settings that help you apply a known group of settings and default values that are recommended by Microsoft’s security teams. 

 

Keep in mind that these configurations are designed for enterprise managed devices, If you are allowing BYOD for employees working remotely, you should review the settings to assure they are appropriate for an employee-owned device, you can also refer to the security configuration framework for additional guidance.

 

Microsoft Defender ATP capabilities to leverage
Microsoft Defender ATP’s integrated suite of pre and post breach protection capabilities helps security teams to scale and operate effectively and efficiently. Making the best use of these capabilities can help to secure your environment. We recommend that customers take advantage of Threat & Vulnerability Management (TVM), Attack Surface Reduction (ASR), and Auto Investigation and Remediation (Auto-IR) today. These features require relatively low effort to leverage and can have the greatest impact in helping to drive better security and improved efficiencies.

 

We’re here to help!

In case of a security incident, Microsoft incident response (IR) services are available through the Microsoft Detection and Response Team (DART). DART provides both reactive incident response and pro-active cyber-resilient services, some delivered remotely and some on-site. The team responds to security incidents and helps customers and partners around the world. You can reach out to your Microsoft Account Manager, Technical Account Manager, or Premier Support contact if you need help from DART.


In summary, we are committed in helping customers secure their remote workforce, support their security teams, and remove any obstacles and friction in the way.

 

Alon Rosental, Principal Group Program Manager, Microsoft Defender ATP