Windows endpoint security features and settings

Windows endpoint security features and settings

Local Admin Password Solution (LAPS)

LAPS is a Microsoft solution designed to enhance security by automatically managing and randomizing local administrator account passwords on Windows endpoints. This prevents the propagation of common passwords across multiple machines, reducing the risk of unauthorized access and lateral movement in the event of a compromised credential.

https://learn.microsoft.com/en-us/entra/identity/devices/howto-manage-local-admin-passwords

Defender Antivirus

Microsoft Defender Antivirus is a robust and integrated antivirus solution that provides real-time protection against various types of malware, including viruses, ransomware, and spyware. It helps safeguard endpoints by continuously monitoring and scanning for malicious activities, thereby reducing the likelihood of infections and protecting sensitive data.

https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/deploy-manage-report-microsoft-defender-antivirus?view=o365-worldwide

Defender for Endpoint

Defender for Endpoint is an advanced security platform that goes beyond traditional antivirus measures. It offers endpoint detection and response capabilities, threat analytics, and automated response features, providing comprehensive protection against sophisticated and targeted attacks.

https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/microsoft-defender-endpoint?view=o365-worldwide

Block Potentially Unwanted Applications (PUA)

This feature within Microsoft Defender Antivirus helps prevent the installation of potentially unwanted applications that may exhibit unwanted behavior or negatively impact system performance. By blocking PUAs, organizations can enhance security and maintain better control over their endpoint environments.

https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus?view=o365-worldwide

Block at First Sight

Microsoft Defender Antivirus utilizes machine learning and cloud-based threat intelligence to identify and block new and emerging threats "at first sight." This proactive approach helps prevent the execution of malicious code before traditional signatures are available, offering an additional layer of defense against zero-day attacks.

https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/configure-block-at-first-sight-microsoft-defender-antivirus?view=o365-worldwide

Tamper Protection

Tamper Protection is a security feature that prevents unauthorized changes to key security settings and configurations on Windows endpoints. It enhances the overall security posture by safeguarding against tampering attempts by malicious actors or unauthorized users.

https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/prevent-changes-to-security-settings-with-tamper-protection?view=o365-worldwide

Defender Credential Guard

Credential Guard is a security feature in Windows that helps protect against Pass-the-Hash (PtH) attacks by isolating and securing Kerberos authentication credentials. It leverages virtualization-based security to store sensitive credential information in a protected environment.

https://learn.microsoft.com/en-us/windows/security/identity-protection/credential-guard/

Defender Application Guard

This feature provides application isolation in Microsoft Edge, ensuring that potential threats encountered while browsing the web are contained and cannot impact the underlying system. It enhances endpoint security by isolating untrusted websites and minimizing the risk of compromise.

https://learn.microsoft.com/en-us/windows/security/application-security/application-isolation/microsoft-defender-application-guard/md-app-guard-overview

Defender SmartScreen

SmartScreen is a reputation-based security feature that helps protect users from phishing attacks and malicious websites. It analyzes website reputation and blocks access to known harmful sites, adding an additional layer of defense against online threats.

https://learn.microsoft.com/en-us/windows/security/operating-system-security/virus-and-threat-protection/microsoft-defender-smartscreen/

AppLocker

AppLocker is an application control feature that allows organizations to define and enforce policies regarding which applications are allowed to run on Windows endpoints. It helps prevent the execution of unauthorized or malicious software, reducing the attack surface.

https://learn.microsoft.com/en-us/windows/security/application-security/application-control/windows-defender-application-control/applocker/applocker-overview

Defender Application Control

Formerly known as Device Guard, this feature allows organizations to control which applications can run on their endpoints. It uses code integrity policies to ensure that only trusted and signed applications are allowed to execute.

https://learn.microsoft.com/en-us/windows/security/application-security/application-control/windows-defender-application-control/design/wdac-design-guide

BitLocker

BitLocker is a full-disk encryption feature that protects data on Windows endpoints by encrypting the entire disk. It helps safeguard against data theft and unauthorized access, especially in the event of a lost or stolen device.

https://learn.microsoft.com/en-us/windows/security/operating-system-security/data-protection/bitlocker/

UEFI scanning

UEFI scanning in Defender for Endpoint extends protection to the firmware level, detecting and mitigating threats that may target the Unified Extensible Firmware Interface (UEFI) during the system boot process.

https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/uefi-scanning-in-defender-for-endpoint?view=o365-worldwide

Behavioral Blocking and Containment

Defender for Endpoint employs behavioral analysis to detect and block suspicious activities indicative of malicious behavior. In the event of a confirmed threat, automated containment measures are triggered to isolate and remediate the affected endpoint.

https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/behavioral-blocking-containment?view=o365-worldwide

Windows Hello

Windows Hello is a biometric authentication feature that enables secure and password-less access to Windows devices. It enhances endpoint security by replacing traditional passwords with more secure authentication methods, such as facial recognition or fingerprint scanning.

https://learn.microsoft.com/en-us/windows-hardware/design/device-experiences/windows-hello

Attack Surface Reduction (ASR)

ASR is a set of security controls within Defender for Endpoint that helps organizations minimize their attack surface by controlling how certain processes and functionalities can be exploited. It mitigates common attack vectors and enhances overall endpoint security.

https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/overview-attack-surface-reduction?view=o365-worldwide

Exploit Protection

This feature in Defender for Endpoint helps protect against software vulnerabilities and exploits by applying advanced mitigation techniques. It reduces the risk of successful exploitation by addressing known vulnerabilities and vulnerabilities discovered post-deployment.

https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/exploit-protection?view=o365-worldwide

Device Control

Defender for Endpoint includes Device Control features that enable organizations to manage and control removable storage devices, reducing the risk of data leakage and preventing the introduction of malicious content through external devices.

https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/device-control-removable-storage-protection?view=o365-worldwide

Controlled Folder Access

This security feature prevents unauthorized access to sensitive files and folders by allowing organizations to define specific folders that are protected against ransomware and other malicious activities.

https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/controlled-folders?view=o365-worldwide

Network Protection

Network Protection in Defender for Endpoint helps safeguard endpoints by blocking outbound connections to malicious domains. It adds an additional layer of defense against malware attempting to communicate with command and control servers.

https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/network-protection?view=o365-worldwide

Web Protection

Defender for Endpoint includes web protection features that help block access to malicious websites and URLs. It enhances security while browsing the internet, reducing the risk of users encountering phishing sites or downloading malicious content.

https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/web-protection-overview?view=o365-worldwide

Security Baselines

Security baselines in Microsoft Endpoint Manager (Intune) provide recommended configurations to enhance the security posture of Windows devices. They include settings for Windows Defender Antivirus, BitLocker, Windows Firewall, and more.

https://learn.microsoft.com/en-us/mem/intune/protect/security-baselines

Endpoint Privilege Management

Endpoint Privilege Management features in Microsoft Endpoint Manager (Intune) help organizations manage and control user privileges on Windows devices. This includes defining least privilege access, limiting lateral movement, and enhancing overall security.

https://learn.microsoft.com/en-us/mem/intune/protect/epm-overview

To view or add a comment, sign in

More articles by Peter C.

Others also viewed

Explore content categories