SOLVED

MDATP - Deployment Guide & Best Practices?

Iron Contributor

Hi All,

 

Is anyone aware of a Best Practices or Deployment guide?

Defender ATP has had a lot of changes in the last months and I'm guessing it doesn't exist, but asking the question anyway...

11 Replies

Thanks @Hesham Saad, understood, maybe I didn't phrase it very well?

 

What I was looking for was anything similar to "Deployment Guide" for Azure MFA for instance?

By this I mean, a very real and practical guide to a list of the the design decisions + various options, plus guidance on the consequences of those decisions - I'm going to assume that this doesn't exist as yet.

 

The on-boarding & off-boarding process is quite well documented in the Admin console under settings on the last two items - what I was looking for was any docs around these design decisions, but that's OK I've started creating it based on the latest high level slide deck. 

Thanks @Ryen Macababbad I've already provided some feedback on Yammer.

 

Question - there doesn't appear to be much focus on applying the "Audit Only" settings and collecting data before changing to enforced? Some of the settings will have the capacity to be disruptive to business if pushed too aggressively too quickly? Thoughts?

@David Caddick Are you talking about Attack Surface Reduction Rules? In the ASR section (https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/productio...) you'll see "In audit mode there is no end user impact all it does is collect additional telemetry and make it available in the Microsoft Defender Security Center. The goal with a deployment is to step by step move security controls into block mode."

What do you propose?   

Hi @Ryen Macababbad, I guess I'm hinting at the fact that it feels a bit like as a Deployment Guide it's a bit underdone? I'm not too worried as we have already run thru this ourselves and created our own.

But even the link in the Deployment Guide for ASR under rank = 3 is just a link to the overview of ASR Settings - I would have thought that it's not a bad idea to at least mention the Audit mode and some basic recommendation with a direct link would be an improvement?

 

Going slightly off topic - when we look at these specific settings in Intune they are all over the place, no grouping, not even in alphabetical order - that could really do with a clean up?

 

Dave C  

Direct messaged you to gain more clarity on the deployment guide feedback.

As far as Intune is concerned, I expect Microsoft Endpoint Manager (MEM) and the work on the DMAC portal at https://devicemanager.microsoft.com will address this "clean up" :) Stay tuned

Audit mode is not available for Automated Investigations unless you prompt user or auto-respond and EDR block mode also has to audit mode feature. Also ASR rules and EDR Block Mode can't be applied per group :( This looks like a beta version to be honest. Definitely desires better documentation.

David - I agree with your caution. I tried some deployment options on a R&D Subscription first and realised that it is easy to enable a blanket-wide enablement. This meant the deployment to each server would be in effect indeterminate and un-managed. I think there is a lot of complexity and confusion in this area. Especially for larger enterprises that desire a phased implementation.
Here is the guide that we use to configure Microsoft Defender for Endpoint best practices https://www.thecloudtechnologist.com/mdatp-best-practices/

If anyone reading this is looking for step-by-step guidance on how to install Microsoft Defender for Endpoint, be sure to review the Defender setup guide in the Microsoft 365 admin center.

 

The guide has a great feature where it can detect settings in your tenant to provide tailored guidance. Additionally, the setup guide is used to view and configure features as well as save time with automated investigation and response. Microsoft Defender for Endpoint enables enhanced security by protecting cyber threats, advanced attacks and data breaches, automate security incidents, and enhance the current level of security already in place.

 

Note: If you don't have Microsoft 365 admin permissions, open the guide in a test or POC tenant to get instructions.

1 best response