Microsoft 365 provides a holistic approach to security, helping you to protect identities, data, applications, and devices across on-premises, cloud, and mobile. As an architect for Modern Workplace topics, customers often ask me to present the Microsoft Advanced Threat Protection (ATP) Suite in specific, so let’s take a look at what Microsoft Defender ATP really means.
How Good is Microsoft Defender Antivirus?
Let's start with the Microsoft Defender Antivirus (AV) that is integrated with Windows 10. This antivirus program has nothing in common with its predecessors from Microsoft like Microsoft Security Essentials. Independent institutes give the impressive AV performance top marks. This means that the Defender AV is Enterprise-ready, so to say. The Gartner Magic Quadrant for “Endpoint Protection Platforms” also confirms this assessment.
Strengths and Weaknesses of the Microsoft Defender AV
There are other advantages to using Defender AV: It's free and the only AV solution that is so deeply embedded in the operating system that it's easy to use with the biannual feature upgrades. Furthermore, the use of deployment of additional security features within Windows 10 makes it possible to
reduce the attack surface, e.g. to block executable content from email clients and browser-based email services
control folder access, which means, for example, that all encryption Trojans like Petya are unable to access and therefore encrypt user libraries.
It is worth noting, however that the integrated Microsoft Defender AV is pattern-based, so it can only detect zero-day exploits if they have already been included in the security intelligence updates.
Greater Security With the Cloud: Microsoft Defender ATP
That’s why the cloud-based AV extension, Microsoft Defender ATP, makes things interesting and more coherent. For this purpose, Microsoft has extended the AV engine by adding the NextGen Protection Engine.
The Microsoft Defender ATP Next Generation Protection Engine enables Microsoft Defender AV to protect the client against threats that are not yet detected or known. In addition, machine learning and artificial intelligence algorithms are used to identify and eliminate new and undetected threats.
Introduced at Ignite in November 2019, TVM for threat and vulnerability management is a fairly new module within Microsoft Defender ATP. It is the first solution to bridge the gap between Security Operations (Sec Ops) and IT Admins. Sec Ops uses the Microsoft Intelligent Security Graph and Application Analytics Knowledge Base to identify potential vulnerabilities within Windows and applications.
How Does TVM Work? An Example
We will use VLC as an example to emphasize the principles. The first step is that Security Operations receives notification of an available VLC update.
A ticket can now be opened to update VLC.
Now it is possible to process the opened ticket as a ‘Security Task’ within Microsoft Endpoint Manager (formerly Intune) and to update VLC.
Integration of TVM with Microsoft Endpoint Manager is a major simplification in eliminating threats and vulnerabilities, both in terms of Windows updates and within applications.
Advanced Hunting – Access Point to Digital Forensics
I believe that Advanced Hunting is the most interesting and exciting module. It enables a proactive, retrospective search and localization of threats within the network for up to 30 days, based on queries. This uses the “Kusto query language”, which is applied similarly in SQL. Advanced Hunting therefore allows a Security Operation Center (SOC) to identify malware paths within the network and even the point of entry, both before and after infection.
In conclusion, it is clearly evident that Gartner had good reason to name Microsoft's Advanced Threat Protection products – including their integration with other security software such as Endpoint Manager or Azure Sentinel – as “leaders” in the field of “Endpoint Protection Platforms”.