Threat protection for Windows clients: Microsoft Defender ATP

Microsoft Defender ATP

Threat Protectiom For Windows Clients

Threat Protection for Windows Clients: Microsoft Defender ATP

  • 21 October 2020
  • 3.06 minutes to read

Microsoft 365 provides a holistic approach to security, helping you to protect identities, data, applications, and devices across on-premises, cloud, and mobile. As an architect for Modern Workplace topics, customers often ask me to present the Microsoft Advanced Threat Protection (ATP) Suite in specific, so let’s take a look at what Microsoft Defender ATP really means.

Threat protection for Windows clients: Microsoft Defender ATP
ill. 1: Microsoft Threat Protection, source: Microsoft

How Good is Microsoft Defender Antivirus?

Let's start with the Microsoft Defender Antivirus (AV) that is integrated with Windows 10. This antivirus program has nothing in common with its predecessors from Microsoft like Microsoft Security Essentials. Independent institutes give the impressive AV performance top marks. This means that the Defender AV is Enterprise-ready, so to say. The Gartner Magic Quadrant for “Endpoint Protection Platforms” also confirms this assessment.

Threat protection for Windows clients: Microsoft Defender ATP
ill. 2: Gartner's Magic Quadrant for Endpoint Protection Platform, source: Gartner

Strengths and Weaknesses of the Microsoft Defender AV

There are other advantages to using Defender AV: It's free and the only AV solution that is so deeply embedded in the operating system that it's easy to use with the biannual feature upgrades. Furthermore, the use of deployment of additional security features within Windows 10 makes it possible to

  • reduce the attack surface, e.g. to block executable content from email clients and browser-based email services
  • control folder access, which means, for example, that all encryption Trojans like Petya are unable to access and therefore encrypt user libraries.

It is worth noting, however that the integrated Microsoft Defender AV is pattern-based, so it can only detect zero-day exploits if they have already been included in the security intelligence updates.

Greater Security With the Cloud: Microsoft Defender ATP

That’s why the cloud-based AV extension, Microsoft Defender ATP, makes things interesting and more coherent. For this purpose, Microsoft has extended the AV engine by adding the NextGen Protection Engine.

Threat protection for Windows clients: Microsoft Defender ATP
ill. 3: Microsoft Defender ATP next generation protection engines, source: Microsoft

The Microsoft Defender ATP Next Generation Protection Engine enables Microsoft Defender AV to protect the client against threats that are not yet detected or known. In addition, machine learning and artificial intelligence algorithms are used to identify and eliminate new and undetected threats.

Constantly Expanding Security: Threat Vulnerability Management (TVM)

Introduced at Ignite in November 2019, TVM for threat and vulnerability management is a fairly new module within Microsoft Defender ATP. It is the first solution to bridge the gap between Security Operations (Sec Ops) and IT Admins. Sec Ops uses the Microsoft Intelligent Security Graph and Application Analytics Knowledge Base to identify potential vulnerabilities within Windows and applications.

How Does TVM Work? An Example

We will use VLC as an example to emphasize the principles. The first step is that Security Operations receives notification of an available VLC update.

Threat protection for Windows clients: Microsoft Defender ATP
ill. 4: security recommendation, source: SoftwareONE

A ticket can now be opened to update VLC.

Threat protection for Windows clients: Microsoft Defender ATP
ill. 5: request remediation; source: SoftwareONE

Now it is possible to process the opened ticket as a ‘Security Task’ within Microsoft Endpoint Manager (formerly Intune) and to update VLC.

Threat protection for Windows clients: Microsoft Defender ATP
ill. 6: managing tickets within the Microsoft Endpoint Manager, source: SoftwareONE

Integration of TVM with Microsoft Endpoint Manager is a major simplification in eliminating threats and vulnerabilities, both in terms of Windows updates and within applications.

Advanced Hunting – Access Point to Digital Forensics

I believe that Advanced Hunting is the most interesting and exciting module. It enables a proactive, retrospective search and localization of threats within the network for up to 30 days, based on queries. This uses the “Kusto query language”, which is applied similarly in SQL. Advanced Hunting therefore allows a Security Operation Center (SOC) to identify malware paths within the network and even the point of entry, both before and after infection.


In conclusion, it is clearly evident that Gartner had good reason to name Microsoft's Advanced Threat Protection products – including their integration with other security software such as Endpoint Manager or Azure Sentinel – as “leaders” in the field of “Endpoint Protection Platforms”.

Security in Microsoft 365 – Exploring the Possible

We will walk you through the key pillars of Microsoft 365 and teach you on the different security features that are available per licensing type.

  • Managed Security
  • Security, Microsoft, ATP

Comment on this article

Leave a comment to let us know what you think about this topic!

Leave a comment

Related Articles

Cybersecurity Update October-November 2020
  • 03 December 2020
  • Bala Sethunathan
  • Managed Security, Cybersecurity
  • Cyber-Threats

Cybers Security Update October-November 2020

Be prepared! A data breach doesn’t strike only large enterprises. Read more about the latest attacks where hackers tried to steal personal data.


Multilayer EDR (XDR) is Next

Most organizations don’t want to work with EDR due to the huge number of alerts to manage. Cross-layer EDR (XDR) can be the solution. Find out how.

Endpoint Security: What you need to know about "Next-Gen" EDR

"Next-Gen" EDR

Combining EDR and SIEM might be the ideal way of fighting cyber security risks. But why isn’t EDR enough? Learn more about the challenges of standalone EDR and how it differs from SIEM.