%3CLINGO-SUB%20id%3D%22lingo-sub-1417736%22%20slang%3D%22en-US%22%3EUnified%20endpoint%20security%20using%20Microsoft%20Endpoint%20Manager%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1417736%22%20slang%3D%22en-US%22%3E%3CP%20style%3D%22margin-top%3A%2020px%3B%22%3EYou%20may%20have%20noticed%20the%20deep%20integration%20between%20endpoint%20security%20and%20endpoint%20management%2C%20both%20in%20your%20changing%20requirements%20and%20within%20the%20Microsoft%20365%20product%20experience.%20Microsoft%20Endpoint%20Manager%20now%20includes%20a%20single%20pane%20of%20glass%20for%20all%20endpoint%20security%20actions%2C%20such%20as%20endpoint%20configuration%2C%20deployment%2C%20and%20management.%20In%20this%20post%2C%20I%E2%80%99ll%20go%20deeper%20into%20the%20evolution%20of%20unified%20endpoint%20security%20and%20how%20Microsoft%20365%20keeps%20you%20ahead%20in%20the%20modern%20cybersecurity%20landscape.%3C%2FP%3E%0A%3CP%20style%3D%22margin-top%3A%2020px%3B%22%3EThe%20Microsoft%20Endpoint%20Manager%20team%20is%20working%20with%20our%20Microsoft%20365%20customers%20every%20day%2C%20and%20we%20consistently%20hear%20from%20them%20that%20there's%20a%20clear%20division%20between%20security%20and%20IT%20teams.%3C%2FP%3E%0A%3CP%20style%3D%22margin-top%3A%2020px%3B%22%3ESecurity%20teams%20aim%20to%20protect%20their%20organizations%20from%20malicious%20actors%2C%20and%20they%20employ%20specific%20tools%20and%20procedures%20to%20help%20them%20achieve%20protection.%3C%2FP%3E%0A%3CP%20style%3D%22margin-top%3A%2020px%3B%22%3EThe%20goal%20of%20IT%20teams%20is%20end-user%20productivity%20and%20helping%20%26nbsp%3Busers%20to%20be%20efficient%20and%20effective%20in%20their%20roles.%3C%2FP%3E%0A%3CP%20style%3D%22margin-top%3A%2020px%3B%22%3EIn%20many%20organizations%20these%20are%20disconnected%20objectives%20that%20can%20cause%20friction%20between%20teams.%20Security%20teams%20are%20deploying%20extra%20agents%2C%20slowing%20down%20boot%20times%20and%20impacting%20end-user%20experience%20.%20IT%20teams%20aren%E2%80%99t%20patching%20fast%20enough%20or%20securing%20their%20operating%20systems%20strongly%20enough%2C%20and%20they%20are%20deploying%20vulnerable%20applications.%3C%2FP%3E%0A%3CP%20style%3D%22margin-top%3A%2020px%3B%22%3EIt%20can%20seem%20as%20if%20there%E2%80%99s%20a%20brick%20wall%20between%20these%20teams%2C%20and%20that%20brick%20wall%20can%20interfere%20with%20effective%20enterprise%20security%20management.%3C%2FP%3E%0A%3CP%20style%3D%22margin-top%3A%2020px%3B%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%2201_security-it-wall.png%22%20style%3D%22width%3A%20351px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F194404iF37AD5C485161DD0%2Fimage-dimensions%2F351x140%3Fv%3D1.0%22%20width%3D%22351%22%20height%3D%22140%22%20title%3D%2201_security-it-wall.png%22%20alt%3D%2201_security-it-wall.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%20style%3D%22margin-top%3A%2020px%3B%22%3EThe%20Microsoft%20approach%20to%20security%20and%20IT%20management%20is%20different.%20With%20security%20and%20management%20integration%20across%20the%20entire%20Microsoft%20365%20product%20suite%2C%20we%E2%80%99re%20breaking%20down%20the%20brick%20wall%20between%20security%20and%20IT%20to%20help%20make%20both%20teams%20more%20effective%20for%20your%20organization.%3C%2FP%3E%0A%3CP%20style%3D%22margin-top%3A%2020px%3B%22%3EWith%20many%20customers%20moving%20to%20Microsoft%20Defender%20Advanced%20Threat%20Protection%20(ATP)%20as%20their%20primary%20endpoint%20security%20solution%2C%20we%20identified%20the%20need%20to%20provide%20dedicated%20security%20administrator%20experiences.%3C%2FP%3E%0A%3CP%20style%3D%22margin-top%3A%2020px%3B%22%3EA%20security%20administrator%20can%20work%20for%20the%20IT%20organization%20or%20the%20security%20organization%2C%20and%20day-to-day%20responsibilities%20include%20defining%20IT%20security%20policies%2C%20deploying%20security%20configuration%2C%20and%20running%20vulnerability%20assessments.%3C%2FP%3E%0A%3CP%20style%3D%22margin-top%3A%2020px%3B%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%2202_itadmin-secadmin-secops.png%22%20style%3D%22width%3A%20601px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F194405i9AFD30E3F96AABA2%2Fimage-dimensions%2F601x132%3Fv%3D1.0%22%20width%3D%22601%22%20height%3D%22132%22%20title%3D%2202_itadmin-secadmin-secops.png%22%20alt%3D%2202_itadmin-secadmin-secops.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%20style%3D%22margin-top%3A%2020px%3B%22%3ECustomers%20who%20purchase%20Microsoft%20365%20get%20best%20of%20breed%20security%20and%20management%20products%20with%20Microsoft%20Defender%20ATP%20and%20Microsoft%20Endpoint%20Manager%2C%20both%20of%20which%20have%20deep%20native%20integration%20into%20Windows%2010%20and%20Office%20365.%20There%20are%20no%20extra%20agents%20to%20deploy%2C%20no%20servers%20to%20stand%20up%2C%20and%20no%20additional%20licenses%20to%20purchase.%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--1329440047%22%20id%3D%22toc-hId--1329440044%22%20id%3D%22toc-hId--1329440044%22%3EMicrosoft%20Endpoint%20Manager%20and%20Microsoft%20Defender%20ATP%20are%20better%20together%3C%2FH2%3E%0A%3CP%20style%3D%22margin-top%3A%2020px%3B%22%3EBy%20using%20Microsoft%20Endpoint%20Manager%20and%20Microsoft%20Defender%20ATP%2C%20you%20can%20integrate%20endpoint%20management%20and%20endpoint%20security%20in%20a%20unified%20Microsoft%20365%20experience.%20This%20gives%20you%20powerful%20tools%20to%20help%20protect%20all%20your%20endpoints%20against%20today%E2%80%99s%20sophisticated%20cyberthreats.%3C%2FP%3E%0A%3CP%20style%3D%22margin-top%3A%2020px%3B%22%3ESecurity%20teams%20appreciate%20the%20integrated%20benefits%2C%20including%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%20style%3D%22margin-bottom%3A%208px%3B%20margin-top%3A%2020px%3B%22%3EA%20single%20security%20configuration%20experience%20without%20engaging%20the%20IT%20team%3C%2FLI%3E%0A%3CLI%20style%3D%22margin-bottom%3A%208px%3B%22%3EVisibility%20into%20every%20IT%20managed%20endpoint%20in%20the%20organization%3C%2FLI%3E%0A%3CLI%20style%3D%22margin-bottom%3A%208px%3B%22%3ERead-only%20access%20to%20configurations%20deployed%20by%20the%20IT%20team%3C%2FLI%3E%0A%3CLI%20style%3D%22margin-bottom%3A%208px%3B%22%3EConsolidated%20administrative%20experience%20for%20on-premises%2C%20cloud%2C%20and%20server%20endpoints%3C%2FLI%3E%0A%3CLI%20style%3D%22margin-bottom%3A%208px%3B%22%3ENo%20need%20to%20manage%20agent%2Fclient%20health%2C%20and%20no%20need%20to%20stand%20up%20new%20servers%3C%2FLI%3E%0A%3CLI%20style%3D%22margin-bottom%3A%208px%3B%22%3EOne%20license%20to%20manage%20the%20entire%20security%20posture%20of%20an%20endpoint%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%20style%3D%22margin-top%3A%2020px%3B%22%3EIT%20teams%20appreciate%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%20style%3D%22margin-bottom%3A%208px%3B%20margin-top%3A%2020px%3B%22%3EBuilt-in%20security%20that%20reduces%20performance%20degradation%20due%20to%20multiple%20conflicting%20agents%3C%2FLI%3E%0A%3CLI%20style%3D%22margin-bottom%3A%208px%3B%22%3EDelegated%20admin%20controls%20to%20share%20responsibilities%20with%20security%20peers%3C%2FLI%3E%0A%3CLI%20style%3D%22margin-bottom%3A%208px%3B%22%3ETools%20to%20help%20IT%20remediate%20vulnerabilities%20in%20a%20timely%20manner%3C%2FLI%3E%0A%3CLI%20style%3D%22margin-bottom%3A%208px%3B%22%3EVisibility%20into%20security%20changes%20that%20might%20affect%20users%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%20style%3D%22margin-top%3A%2020px%3B%22%3EAlong%20with%20these%20benefits%2C%20our%20integrated%20approach%20introduces%20several%20security%20and%20IT%20innovations%2C%20including%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%20style%3D%22margin-bottom%3A%208px%3B%20margin-top%3A%2020px%3B%22%3EMicrosoft%20Defender%20ATP%20security%20baselines%3C%2FLI%3E%0A%3CLI%20style%3D%22margin-bottom%3A%208px%3B%22%3EThreat%20and%20vulnerability%20management%20capabilities%3C%2FLI%3E%0A%3CLI%20style%3D%22margin-bottom%3A%208px%3B%22%3EStreamlined%20onboarding%20to%20Microsoft%20Defender%20ATP%20across%20device%20types%3C%2FLI%3E%0A%3CLI%20style%3D%22margin-bottom%3A%208px%3B%22%3EMicrosoft%20Defender%20ATP%20risk%20score%20integration%20into%20Conditional%20Access%3C%2FLI%3E%0A%3CLI%20style%3D%22margin-bottom%3A%208px%3B%22%3ESupport%20across%20platforms%20including%20Windows%2C%20macOS%2C%20iOS%2C%20and%20Android%3C%2FLI%3E%0A%3CLI%20style%3D%22margin-bottom%3A%208px%3B%22%3ETamper%20protection%20for%20Windows%20security%20configurations%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%20style%3D%22margin-top%3A%2020px%3B%22%3EAs%20our%20teams%20continue%20to%20innovate%2C%20we%E2%80%99re%20always%20looking%20for%20new%20ways%20to%20delight%20our%20customers%20with%20unique%20security%20and%20IT%20integrations.%3C%2FP%3E%0A%3CP%20style%3D%22margin-top%3A%2020px%3B%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%2203_security-it-handshake.png%22%20style%3D%22width%3A%20354px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F194406iF23237CB70E9D93D%2Fimage-dimensions%2F354x151%3Fv%3D1.0%22%20width%3D%22354%22%20height%3D%22151%22%20title%3D%2203_security-it-handshake.png%22%20alt%3D%2203_security-it-handshake.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-1158072786%22%20id%3D%22toc-hId-1158072789%22%20id%3D%22toc-hId-1158072789%22%3EEndpoint%20security%20in%20Microsoft%20Endpoint%20Manager%3C%2FH2%3E%0A%3CP%20style%3D%22margin-top%3A%2020px%3B%22%3EEarlier%20this%20year%20we%20announced%20the%20%3CSTRONG%3EEndpoint%20security%3C%2FSTRONG%3E%20node%20in%20Microsoft%20Endpoint%20Manager.%3C%2FP%3E%0A%3CP%20style%3D%22margin-top%3A%2020px%3B%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%2204_endpoint-security-in-mem.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F194407i45D3EA1B422BB639%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%2204_endpoint-security-in-mem.png%22%20alt%3D%2204_endpoint-security-in-mem.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%20style%3D%22margin-top%3A%2020px%3B%22%3EYou%20can%20browse%20to%20the%20%3CSTRONG%3EEndpoint%20security%3C%2FSTRONG%3E%20node%20directly%20by%20bookmarking%20%3CA%20href%3D%22https%3A%2F%2Faka.ms%2FEndpointSecurity%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Faka.ms%2FEndpointSecurity%3C%2FA%3E%2C%20access%20it%20from%20%3CSTRONG%3EMicrosoft%20Endpoint%20Manager%20%3C%2FSTRONG%3E(%3CA%20href%3D%22https%3A%2F%2Fendpoint.microsoft.com%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fendpoint.microsoft.com%3C%2FA%3E)%20under%20%3CSTRONG%3EEndpoint%20security%3C%2FSTRONG%3E%2C%20or%20access%20it%20from%20the%20%3CSTRONG%3EMicrosoft%20Defender%20Security%20Center%3C%2FSTRONG%3E%20(%3CA%20href%3D%22https%3A%2F%2Fsecuritycenter.windows.com%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fsecuritycenter.windows.com%3C%2FA%3E)%20under%3CSTRONG%3E%20Configuration%20Management%3C%2FSTRONG%3E.%3C%2FP%3E%0A%3CP%20style%3D%22margin-top%3A%2020px%3B%22%3EThe%20%3CSTRONG%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fmem%2Fintune%2Fprotect%2Fendpoint-security%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EEndpoint%20security%3C%2FA%3E%20%3C%2FSTRONG%3Enode%20is%20designed%20as%20a%20one-stop-shop%20for%20all%20tasks%20the%20security%20administrator%20persona%20needs%20to%20perform.%20This%20includes%20management%20of%20antivirus%20programs%2C%20firewalls%2C%20disk%20encryption%2C%20threat%20protection%2C%20identity%20protection%2C%20conditional%20access%20policies%2C%20security%20baselines%2C%20and%20more.%20Users%20added%20to%20the%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fmem%2Fintune%2Fprotect%2Fendpoint-security%23role-based-access-control-requirements%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EEndpoint%20Security%20Manager%20role%3C%2FA%3E%20in%20Endpoint%20Manager%20or%20the%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Factive-directory%2Fusers-groups-roles%2Fdirectory-assign-admin-roles%23security-administrator%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3ESecurity%20Administrator%20role%3C%2FA%3E%20in%20Azure%20Active%20Directory%20are%20granted%20permissions%20to%20manage%20endpoint%20security.%3C%2FP%3E%0A%3CP%20style%3D%22margin-top%3A%2020px%3B%22%3ESecurity%20administrators%20can%20view%20enterprise%20managed%20devices%20and%20device%20configuration%2C%20and%20they%20can%20perform%20remote%20actions%20like%20updating%20security%20definitions%20or%20rebooting%20endpoints.%3C%2FP%3E%0A%3CP%20style%3D%22margin-top%3A%2020px%3B%22%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fmem%2Fintune%2Fprotect%2Fsecurity-baselines%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3ESecurity%20baselines%3C%2FA%3E%20provide%20IT%20and%20security%20admins%20a%20starting%20point%20to%20secure%20Windows%2010%20devices.%20The%20Windows%2010%20security%20baseline%20provides%20a%20native%20mobile%20device%20management%20(MDM)%20implementation%20of%20the%20Microsoft%20defined%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fwindows%2Fsecurity%2Fthreat-protection%2Fwindows-security-baselines%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EWindows%20security%20baselines%3C%2FA%3E%2C%20and%20the%20Microsoft%20Defender%20ATP%20security%20baseline%20offers%20best%20practice%20configuration%20for%20Microsoft%20Defender%20ATP.%3C%2FP%3E%0A%3CP%20style%3D%22margin-top%3A%2020px%3B%22%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fmem%2Fintune%2Fprotect%2Fatp-manage-vulnerabilities%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3ESecurity%20tasks%3C%2FA%3E%20help%20IT%20and%20security%20admins%20work%20with%20their%20SecOps%20counterparts%20on%20app%20and%20configuration%20vulnerabilities.%20SecOps%20engineers%20can%20raise%20security%20flags%20to%20notify%20IT%20of%20apps%20that%20need%20to%20be%20updated%20and%20include%20the%20list%20of%20impacted%20devices%20without%20leaving%20their%20endpoint%20security%20console.%3C%2FP%3E%0A%3CP%20style%3D%22margin-top%3A%2020px%3B%22%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fmem%2Fintune%2Fprotect%2Fendpoint-security-policy%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EEndpoint%20security%20policies%3C%2FA%3E%20provide%20security%20admins%20granular%20control%20over%20security%20configurations.%20Security%20administrators%20can%20manage%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%20style%3D%22margin-bottom%3A%208px%3B%20margin-top%3A%2020px%3B%22%3EAntivirus%20programs%20for%20Windows%20and%20macOS%3C%2FLI%3E%0A%3CLI%20style%3D%22margin-bottom%3A%208px%3B%22%3EWindows%20Security%20experience%2C%20including%20Tamper%20Protection%3C%2FLI%3E%0A%3CLI%20style%3D%22margin-bottom%3A%208px%3B%22%3EDisk%20encryption%20for%20Windows%20and%20macOS%3C%2FLI%3E%0A%3CLI%20style%3D%22margin-bottom%3A%208px%3B%22%3EFirewall%20for%20Windows%20and%20macOS%2C%20including%20granular%20rule%20definitions%20for%20Windows%3C%2FLI%3E%0A%3CLI%20style%3D%22margin-bottom%3A%208px%3B%22%3EStreamlined%20onboarding%20for%20endpoint%20detection%20and%20response%3C%2FLI%3E%0A%3CLI%20style%3D%22margin-bottom%3A%208px%3B%22%3EAttack%20surface%20reduction%2C%20including%20rules%2C%20device%20control%2C%20exploit%20protection%2C%20application%20control%2C%20and%20more%3C%2FLI%3E%0A%3CLI%20style%3D%22margin-bottom%3A%208px%3B%22%3EAccount%20protection%2C%20including%20configuration%20of%20Windows%20Hello%20for%20Business%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%20style%3D%22margin-top%3A%2020px%3B%22%3EWe%E2%80%99ve%20even%20included%20the%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fmem%2Fintune%2Fprotect%2Fdevice-compliance-get-started%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EDevice%20compliance%3C%2FA%3E%20and%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fmem%2Fintune%2Fprotect%2Fconditional-access%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EConditional%20Access%3C%2FA%3E%20nodes%20into%20the%20%3CSTRONG%3EEndpoint%20security%3C%2FSTRONG%3E%20node%2C%20so%20security%20administrators%20can%20set%20access%20control%20rules%20for%20their%20cloud%20services%20based%20on%20their%20endpoint%20security%20posture.%3C%2FP%3E%0A%3CP%20style%3D%22margin-top%3A%2020px%3B%22%3EWe%E2%80%99re%20committed%20to%20building%20out%20even%20richer%20security%20administrator%20experiences%20in%20the%20future%2C%20including%20admin%20actions%2C%20reporting%2C%20and%20intelligent%20configuration%E2%80%94and%20expect%20to%20add%20value%20each%20month.%20New%20features%20this%20month%20include%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%20style%3D%22margin-bottom%3A%208px%3B%20margin-top%3A%2020px%3B%22%3ESplit%20firewall%20rule%20experience%3C%2FLI%3E%0A%3CLI%20style%3D%22margin-bottom%3A%208px%3B%22%3EUnhealthy%20Windows%20Antivirus%20report%20integrated%20into%20the%20Endpoint%20security%20node%3C%2FLI%3E%0A%3CLI%20style%3D%22margin-bottom%3A%208px%3B%22%3EPolicy%20duplication%20for%20change%20management%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CH2%20id%3D%22toc-hId--649381677%22%20id%3D%22toc-hId--649381674%22%20id%3D%22toc-hId--649381674%22%3ESupport%20for%20cross-platform%20security%3C%2FH2%3E%0A%3CP%20style%3D%22margin-top%3A%2020px%3B%22%3EOur%20endpoint%20security%20experiences%20aren%E2%80%99t%20limited%20to%20Windows%2010.%20Microsoft%20Endpoint%20Manager%20is%20a%20leader%20in%20cross-platform%20device%20management%2C%20and%20endpoint%20security%20is%20no%20different.%3C%2FP%3E%0A%3CP%20style%3D%22margin-top%3A%2020px%3B%22%3EMicrosoft%20Defender%20ATP%20Antivirus%2C%20FileVault%20disk%20encryption%2C%20and%20Firewall%20configuration%20are%20available%20for%20macOS%20devices%20that%20are%20managed%20by%20Endpoint%20Manager.%20Device%20compliance%20is%20available%20for%20all%20supported%20platforms%20including%20mobile.%3C%2FP%3E%0A%3CP%20style%3D%22margin-top%3A%2020px%3B%22%3EWe%E2%80%99re%20excited%20to%20extend%20our%20security%20and%20management%20experiences%20to%20mobile%20devices.%20In%20preview%2C%20we%20support%20device%20compliance%20signals%20from%20Microsoft%20Defender%20ATP%20for%20Android.%20To%20join%20the%20preview%2C%20see%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fintune-customer-success%2Fsupport-tip-how-to-test-microsoft-defender-atp-preview-based%2Fba-p%2F1334029%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EHow%20to%20test%20Microsoft%20Defender%20ATP%20(preview)%20based%20device%20compliance%20on%20Android%3C%2FA%3E.%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-1838131156%22%20id%3D%22toc-hId-1838131159%22%20id%3D%22toc-hId-1838131159%22%3ESupport%20for%20Microsoft%20Intune%2C%20Microsoft%20Endpoint%20Configuration%20Manager%2C%20and%20co-management%20scenarios%3C%2FH2%3E%0A%3CP%20style%3D%22margin-top%3A%2020px%3B%22%3EWe%20understand%20that%20security%20management%20is%20only%20effective%20if%20every%20endpoint%20has%20coverage.%20Our%20endpoint%20security%20experiences%20allow%20you%20to%20target%20security%20configuration%20for%20devices%20that%20are%20managed%20in%20three%20ways%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%20style%3D%22margin-bottom%3A%208px%3B%20margin-top%3A%2020px%3B%22%3E%3CSTRONG%3ECloud-only%20managed%20devices%3C%2FSTRONG%3E%3CBR%20%2F%3ECloud-only%20managed%20devices%20are%20devices%20born%20in%20the%20cloud%20and%20fully%20managed%20by%20Microsoft%20Intune.%20All%20endpoint%20security%20policies%20are%20applicable%20for%20both%20Windows%20and%20Mac%20endpoints.%3C%2FLI%3E%0A%3CLI%20style%3D%22margin-bottom%3A%208px%3B%22%3E%3CSTRONG%3ECloud%20and%20Configuration%20Manager%20managed%20devices%3C%2FSTRONG%3E%3CBR%20%2F%3EKnown%20as%20co-management%2C%20these%20devices%20are%20registered%20into%20Intune%20and%20%26nbsp%3Bmanaged%20by%20the%20full%20Configuration%20Manager%20client.%20When%20the%20Endpoint%20Protection%20workload%20has%20been%20moved%20to%20Configuration%20Manager%2C%20the%20Endpoint%20security%20policies%20will%20be%20honored%20over%20the%20Configuration%20Manager%20native%20Endpoint%20Protection%20policies.%20Features%20such%20as%20firewall%20rule%20management%20and%20tamper%20protection%20are%20unique%20to%20cloud%20only%20and%20comanaged%20devices.%3C%2FLI%3E%0A%3CLI%20style%3D%22margin-bottom%3A%208px%3B%22%3E%3CSTRONG%3EConfiguration%20Manager%20managed%20devices%3C%2FSTRONG%3E%20%3CBR%20%2F%3EThese%20devices%20are%20not%20registered%20into%20Intune%2C%20and%20they%20are%20fully%20managed%20by%20Configuration%20Manager.%20Policy%20is%20targeted%20from%20the%20Microsoft%20Endpoint%20Manager%20console%2C%20yet%20policy%20delivery%20is%20performed%20by%20on-premises%20Configuration%20Manager%20infrastructure.%20Our%20first%20supported%20policy%20type%20is%20the%20%3CSTRONG%3EEndpoint%20detection%20and%20response%3C%2FSTRONG%3E%20policy%2C%20with%20more%20policy%20types%20planned%20for%20future%20releases.%20(This%20management%20channel%20also%20allows%20policy%20targeting%20and%20application%20for%20server%20clients%20managed%20by%20Configuration%20Manager.)%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%20style%3D%22margin-top%3A%2020px%3B%22%3EWith%20these%20investments%20in%20cross-product%20integration%2C%20dedicated%20security%20administrator%20experiences%2C%20cross-platform%20support%2C%20and%20complete%20enterprise%20endpoint%20coverage%2C%20we%20believe%20Microsoft%20365%20customers%20are%20positioned%20to%20provide%20the%20security%20posture%20they%20require%20while%20empowering%20every%20employee%20to%20achieve%20more.%3C%2FP%3E%0A%3CP%20style%3D%22margin-top%3A%2020px%3B%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%2205_security-it-love.png%22%20style%3D%22width%3A%20350px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F194408i1A04F034509CFF38%2Fimage-dimensions%2F350x129%3Fv%3D1.0%22%20width%3D%22350%22%20height%3D%22129%22%20title%3D%2205_security-it-love.png%22%20alt%3D%2205_security-it-love.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%20style%3D%22margin-top%3A%2020px%3B%22%3ETo%20learn%20more%20about%20the%20Endpoint%20security%20experience%2C%20see%20our%20technical%20documentation%20at%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fmem%2Fintune%2Fprotect%2Fendpoint-security%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fdocs.microsoft.com%2Fmem%2Fintune%2Fprotect%2Fendpoint-security%3C%2FA%3E.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-1417736%22%20slang%3D%22en-US%22%3E%3CP%3EExplore%20the%20new%20single%20pane%20of%20glass%20for%20all%20endpoint%20security%20actions%3A%20from%20configuration%20and%20deployment%20to%20management.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%2204_endpoint-security-in-mem.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F194412i96F7A9681646EFA3%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%2204_endpoint-security-in-mem.png%22%20alt%3D%2204_endpoint-security-in-mem.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-1417736%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EConfiguration%20Manager%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EMicrosoft%20Endpoint%20Manager%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EMicrosoft%20Intune%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1438263%22%20slang%3D%22en-US%22%3ERe%3A%20Unified%20endpoint%20security%20using%20Microsoft%20Endpoint%20Manager%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1438263%22%20slang%3D%22en-US%22%3E%3CP%3EOne%20thing%20that%20would%20go%20a%20long%20way%20to%20help%20cooperation%20between%20security%20and%20it%20teams%20would%20be%20to%20re-use%20feature%20names%20that%20are%20already%20used%20and%20known%20in%20the%20it%20world%20as%20opposed%20to%20self%20invented%20or%20internal%20names.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ENext%20gen%20protection%20to%20talk%20about%20windows%20defender%20antivirus%2C%20app%20locker%20application%20control%20and%20smartlocker%20as%20opposed%20to%20Microsoft%20defender%20application%20control%20and%20managed%20installer%2C%20don't%20get%20me%20started%20on%20the%20re-use%20of%20attack%20surface%20reduction%20to%20mean%20something%20else.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20first%20thing%20it%20admins%20and%20security%20admins%20have%20to%20do%20to%20cooperate%20is%20learn%20each%20others%20lingo%20as%20different%20teams%20don't%20call%20features%20the%20same.%3C%2FP%3E%3C%2FLINGO-BODY%3E
Microsoft

You may have noticed the deep integration between endpoint security and endpoint management, both in your changing requirements and within the Microsoft 365 product experience. Microsoft Endpoint Manager now includes a single pane of glass for all endpoint security actions, such as endpoint configuration, deployment, and management. In this post, I’ll go deeper into the evolution of unified endpoint security and how Microsoft 365 keeps you ahead in the modern cybersecurity landscape.

The Microsoft Endpoint Manager team is working with our Microsoft 365 customers every day, and we consistently hear from them that there's a clear division between security and IT teams.

Security teams aim to protect their organizations from malicious actors, and they employ specific tools and procedures to help them achieve protection.

The goal of IT teams is end-user productivity and helping  users to be efficient and effective in their roles.

In many organizations these are disconnected objectives that can cause friction between teams. Security teams are deploying extra agents, slowing down boot times and impacting end-user experience . IT teams aren’t patching fast enough or securing their operating systems strongly enough, and they are deploying vulnerable applications.

It can seem as if there’s a brick wall between these teams, and that brick wall can interfere with effective enterprise security management.

01_security-it-wall.png

The Microsoft approach to security and IT management is different. With security and management integration across the entire Microsoft 365 product suite, we’re breaking down the brick wall between security and IT to help make both teams more effective for your organization.

With many customers moving to Microsoft Defender Advanced Threat Protection (ATP) as their primary endpoint security solution, we identified the need to provide dedicated security administrator experiences.

A security administrator can work for the IT organization or the security organization, and day-to-day responsibilities include defining IT security policies, deploying security configuration, and running vulnerability assessments.

02_itadmin-secadmin-secops.png

Customers who purchase Microsoft 365 get best of breed security and management products with Microsoft Defender ATP and Microsoft Endpoint Manager, both of which have deep native integration into Windows 10 and Office 365. There are no extra agents to deploy, no servers to stand up, and no additional licenses to purchase.

Microsoft Endpoint Manager and Microsoft Defender ATP are better together

By using Microsoft Endpoint Manager and Microsoft Defender ATP, you can integrate endpoint management and endpoint security in a unified Microsoft 365 experience. This gives you powerful tools to help protect all your endpoints against today’s sophisticated cyberthreats.

Security teams appreciate the integrated benefits, including:

  • A single security configuration experience without engaging the IT team
  • Visibility into every IT managed endpoint in the organization
  • Read-only access to configurations deployed by the IT team
  • Consolidated administrative experience for on-premises, cloud, and server endpoints
  • No need to manage agent/client health, and no need to stand up new servers
  • One license to manage the entire security posture of an endpoint

IT teams appreciate:

  • Built-in security that reduces performance degradation due to multiple conflicting agents
  • Delegated admin controls to share responsibilities with security peers
  • Tools to help IT remediate vulnerabilities in a timely manner
  • Visibility into security changes that might affect users

Along with these benefits, our integrated approach introduces several security and IT innovations, including:

  • Microsoft Defender ATP security baselines
  • Threat and vulnerability management capabilities
  • Streamlined onboarding to Microsoft Defender ATP across device types
  • Microsoft Defender ATP risk score integration into Conditional Access
  • Support across platforms including Windows, macOS, iOS, and Android
  • Tamper protection for Windows security configurations

As our teams continue to innovate, we’re always looking for new ways to delight our customers with unique security and IT integrations.

03_security-it-handshake.png

Endpoint security in Microsoft Endpoint Manager

Earlier this year we announced the Endpoint security node in Microsoft Endpoint Manager.

04_endpoint-security-in-mem.png

You can browse to the Endpoint security node directly by bookmarking https://aka.ms/EndpointSecurity, access it from Microsoft Endpoint Manager (https://endpoint.microsoft.com) under Endpoint security, or access it from the Microsoft Defender Security Center (https://securitycenter.windows.com) under Configuration Management.

The Endpoint security node is designed as a one-stop-shop for all tasks the security administrator persona needs to perform. This includes management of antivirus programs, firewalls, disk encryption, threat protection, identity protection, conditional access policies, security baselines, and more. Users added to the Endpoint Security Manager role in Endpoint Manager or the Security Administrator role in Azure Active Directory are granted permissions to manage endpoint security.

Security administrators can view enterprise managed devices and device configuration, and they can perform remote actions like updating security definitions or rebooting endpoints.

Security baselines provide IT and security admins a starting point to secure Windows 10 devices. The Windows 10 security baseline provides a native mobile device management (MDM) implementation of the Microsoft defined Windows security baselines, and the Microsoft Defender ATP security baseline offers best practice configuration for Microsoft Defender ATP.

Security tasks help IT and security admins work with their SecOps counterparts on app and configuration vulnerabilities. SecOps engineers can raise security flags to notify IT of apps that need to be updated and include the list of impacted devices without leaving their endpoint security console.

Endpoint security policies provide security admins granular control over security configurations. Security administrators can manage:

  • Antivirus programs for Windows and macOS
  • Windows Security experience, including Tamper Protection
  • Disk encryption for Windows and macOS
  • Firewall for Windows and macOS, including granular rule definitions for Windows
  • Streamlined onboarding for endpoint detection and response
  • Attack surface reduction, including rules, device control, exploit protection, application control, and more
  • Account protection, including configuration of Windows Hello for Business

We’ve even included the Device compliance and Conditional Access nodes into the Endpoint security node, so security administrators can set access control rules for their cloud services based on their endpoint security posture.

We’re committed to building out even richer security administrator experiences in the future, including admin actions, reporting, and intelligent configuration—and expect to add value each month. New features this month include:

  • Split firewall rule experience
  • Unhealthy Windows Antivirus report integrated into the Endpoint security node
  • Policy duplication for change management

Support for cross-platform security

Our endpoint security experiences aren’t limited to Windows 10. Microsoft Endpoint Manager is a leader in cross-platform device management, and endpoint security is no different.

Microsoft Defender ATP Antivirus, FileVault disk encryption, and Firewall configuration are available for macOS devices that are managed by Endpoint Manager. Device compliance is available for all supported platforms including mobile.

We’re excited to extend our security and management experiences to mobile devices. In preview, we support device compliance signals from Microsoft Defender ATP for Android. To join the preview, see How to test Microsoft Defender ATP (preview) based device compliance on Android.

Support for Microsoft Intune, Microsoft Endpoint Configuration Manager, and co-management scenarios

We understand that security management is only effective if every endpoint has coverage. Our endpoint security experiences allow you to target security configuration for devices that are managed in three ways:

  • Cloud-only managed devices
    Cloud-only managed devices are devices born in the cloud and fully managed by Microsoft Intune. All endpoint security policies are applicable for both Windows and Mac endpoints.
  • Cloud and Configuration Manager managed devices
    Known as co-management, these devices are registered into Intune and  managed by the full Configuration Manager client. When the Endpoint Protection workload has been moved to Configuration Manager, the Endpoint security policies will be honored over the Configuration Manager native Endpoint Protection policies. Features such as firewall rule management and tamper protection are unique to cloud only and comanaged devices.
  • Configuration Manager managed devices
    These devices are not registered into Intune, and they are fully managed by Configuration Manager. Policy is targeted from the Microsoft Endpoint Manager console, yet policy delivery is performed by on-premises Configuration Manager infrastructure. Our first supported policy type is the Endpoint detection and response policy, with more policy types planned for future releases. (This management channel also allows policy targeting and application for server clients managed by Configuration Manager.)

With these investments in cross-product integration, dedicated security administrator experiences, cross-platform support, and complete enterprise endpoint coverage, we believe Microsoft 365 customers are positioned to provide the security posture they require while empowering every employee to achieve more.

05_security-it-love.png

To learn more about the Endpoint security experience, see our technical documentation at https://docs.microsoft.com/mem/intune/protect/endpoint-security.

1 Comment

One thing that would go a long way to help cooperation between security and it teams would be to re-use feature names that are already used and known in the it world as opposed to self invented or internal names.

 

Next gen protection to talk about windows defender antivirus, app locker application control and smartlocker as opposed to Microsoft defender application control and managed installer, don't get me started on the re-use of attack surface reduction to mean something else.

 

The first thing it admins and security admins have to do to cooperate is learn each others lingo as different teams don't call features the same.