Skip to main content

This browser is no longer supported.

Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.

Download Microsoft Edge More info about Internet Explorer and Microsoft Edge
Read in English
Read in English Edit

Share via

Facebook x.com LinkedIn Email

Microsoft Defender for Endpoint documentation

Microsoft Defender for Endpoint delivers preventative protection, post-breach detection, automated investigation, and response.

Microsoft Defender for Endpoint

Overview

  • What is Microsoft Defender for Endpoint?
  • What is Defender for Endpoint plan 1?
  • Defender for Endpoint on Linux
  • Defender for Endpoint on Mac overview
  • Defender for Endpoint on Android
  • Defender for Endpoint on iOS

What's new

  • What's new in Microsoft Defender for Endpoint
  • Announcing Microsoft Defender for Endpoint Plan 1

video

  • Overview video

Evaluate & deploy the service

Get started

  • Evaluate Microsoft Defender for Endpoint
  • Plan your deployment

Deploy

  • Deployment guide
  • Onboard supported devices
  • Set up and configure Defender for Endpoint Plan 1

How-To Guide

  • Migration guide

video

  • Onboarding video

Security operations

Overview

  • Endpoint detection and response
  • Behavioral blocking and containment
  • Automated investigation and response (AIR)
  • Advanced hunting
  • Microsoft Threat Experts
  • Threat analytics

Reference

Reference

  • Management and APIs
  • Partner integration

Security administration

Overview

  • Microsoft Defender Vulnerability Management
  • Attack surface reduction
  • Next-generation protection
Your Privacy Choices
  • Previous Versions
  • Blog
  • Contribute
  • Privacy
  • Terms of Use
  • Trademarks
  • © Microsoft 2025
Your Privacy Choices
  • Previous Versions
  • Blog
  • Contribute
  • Privacy
  • Terms of Use
  • Trademarks
  • © Microsoft 2025