disconnected environment
3 TopicsDefender for Endpoint and disconnected environments. Which proxy configuration wins?
This article is a follow-up to a previous one discussing conflicting proxy configurations and how Microsoft Defender for Endpoint behaves in these situations. The first article can be found in here. In this article we'll explore how Defender for Endpoint network traffic flows depending on which proxy configuration is in use, as well as what network traffic looks like when all three proxy configurations are set.Defender for Endpoint and disconnected environments. Cloud-centric networking decisions
This article provides guidance on understanding the functionality of Defender for Endpoint, a cloud-first product, and the need for a mental shift towards modern security services. The article outlines planning and deployment recommendations, such as involving stakeholders, understanding networking requirements, and reviewing the documentation. Additionally, the article covers considerations for other Microsoft products like Intune, Azure Active Directory, and Windows Updates in relation to Defender for Endpoint. Overall, this article offers an approach to deploying Defender for Endpoint and discusses the requirements of other Microsoft products in a disconnected environment.