De4sec
De4sec Technology
de4sec.technology
๐ŸŒ AU + KE

Microsoft Defender Business Protection Guide

A complete guide to the Microsoft Defender product ecosystem โ€” Defender for Endpoint, Office 365, Identity, and Cloud Apps โ€” and how to use them together.

Prepared by
De4sec Technology
Contact
support@de4sec.technology
Edition
2026 ยท March
CONFIDENTIAL ยท FOR CLIENT USE ONLY
Contents
  1. The Microsoft Defender Ecosystem
  2. Defender for Endpoint
  3. Defender for Office 365
  4. Defender for Identity
  5. Defender for Cloud Apps
  6. Microsoft 365 Defender Portal: Unified Investigations
01

The Microsoft Defender Ecosystem

Microsoft Defender is not a single product โ€” it's a family of integrated security products that cover endpoints, email, identity, cloud apps, and cloud infrastructure. Together they form Microsoft Defender XDR: Extended Detection and Response โ€” a unified security platform.

ProductProtectsIncluded In
Defender for EndpointLaptops, desktops, serversBusiness Premium, E3+MDE addon
Defender for Office 365Email, Teams, SharePoint linksBusiness Premium, E3+MDO addon
Defender for IdentityActive Directory and Entra IDBusiness Premium, E5
Defender for Cloud AppsSaaS applicationsBusiness Premium, E5
Defender for CloudAzure workloadsSeparate Azure subscription

Microsoft 365 Business Premium includes Defender for Endpoint, Office 365 Plan 1, and Defender for Cloud Apps. For most SMBs this is the highest-value licence bundle available.

02

Defender for Endpoint

Core capabilities

โœ“Endpoint Detection and Response (EDR) โ€” behavioural detection of attack techniques, not just malware signatures
โœ“Automated Investigation and Remediation (AIR) โ€” automatically investigates and contains threats without manual intervention
โœ“Attack Surface Reduction (ASR) rules โ€” block specific attacker techniques at the OS level
โœ“Threat and Vulnerability Management โ€” continuous inventory of vulnerabilities on enrolled devices
โœ“Device isolation โ€” remotely isolate a compromised device from the network with a single click

Deployment

โœ“Onboard via Microsoft Intune โ€” policy-based deployment, no agent installation required
โœ“Applicable to Windows, macOS, iOS, and Android
โœ“Tamper protection โ€” prevents attackers from disabling Defender after compromise
โœ“Alert visibility in Microsoft 365 Defender portal (security.microsoft.com)
03

Defender for Office 365

Plan 1 (Business Premium)

โœ“Safe Links โ€” real-time URL detonation at click-time, including links in Teams and Office documents
โœ“Safe Attachments โ€” detonate attachments in a cloud sandbox before delivery
โœ“Anti-phishing with impersonation protection โ€” protect specific users (CEO, CFO) from spoof attempts
โœ“Spoof intelligence โ€” identify and block email spoofing

Plan 2 (E5 or addon)

โœ“Attack Simulator โ€” send simulated phishing emails to staff, measure click rates
โœ“Threat Explorer โ€” investigate and hunt for threats across all email in your tenancy
โœ“Automated investigation and response โ€” automatically investigate and contain email-based threats
โœ“Priority account protection โ€” enhanced protection for VIP users

Safe Links time-of-click protection catches attacks that traditional secure email gateways miss: links that are clean at delivery but weaponised before the user clicks.

04

Defender for Identity

Defender for Identity protects Active Directory and Entra ID from identity-based attacks โ€” credential theft, lateral movement, privilege escalation, and persistence techniques.

What it detects

โœ“Pass-the-Hash and Pass-the-Ticket credential theft
โœ“Kerberoasting โ€” offline cracking of service account credentials
โœ“DCSync attacks โ€” simulating domain controller replication to dump password hashes
โœ“Suspicious lateral movement โ€” using credentials on machines the user normally doesn't access
โœ“Reconnaissance activities โ€” enumeration of domain users, groups, and admin accounts
โœ“New suspicious admin account creation

Deployment

โœ“Install sensor on all domain controllers (on-premise AD)
โœ“Entra ID integration โ€” cloud identity signals automatically included
โœ“Alerts surface in Microsoft 365 Defender portal as part of unified incident view
05

Defender for Cloud Apps

Defender for Cloud Apps provides visibility into which SaaS applications are in use across your organisation โ€” including apps you haven't approved โ€” and controls over how corporate data is used in those apps.

Key capabilities

โœ“Shadow IT discovery โ€” identify all cloud apps in use from browser or network logs
โœ“App governance โ€” assess risk rating of each app, block or restrict high-risk apps
โœ“Session policies โ€” control what users can do in cloud apps (download, print, copy) from unmanaged devices
โœ“File scanning โ€” scan files in SharePoint, OneDrive, Box, Google Drive for sensitive data
โœ“Anomaly detection โ€” alert on impossible travel, mass download, suspicious admin activity

Most businesses are using 50โ€“150 SaaS applications they haven't formally approved. Defender for Cloud Apps identifies them and assesses risk โ€” you may find employees using file sharing services that violate your data handling policy.

06

Microsoft 365 Defender Portal: Unified Investigations

The Microsoft 365 Defender portal (security.microsoft.com) correlates alerts across all Defender products into unified incidents โ€” so a phishing email, the credential it stole, the lateral movement that followed, and the endpoint it landed on all appear as a single incident.

โœ“Incident queue โ€” prioritised view of all active incidents across all Defender products
โœ“Automated investigation graph โ€” visual representation of the attack chain with automated remediation actions
โœ“Advanced Hunting โ€” query across all security data using KQL for threat hunting
โœ“Threat analytics โ€” Microsoft intelligence reports on active attack campaigns relevant to your configuration
โœ“Secure Score โ€” aggregate posture metric across identity, devices, data, apps, and infrastructure

De4sec monitors the Microsoft 365 Defender portal as part of our managed security service โ€” reviewing incidents, triaging alerts, and responding to threats on behalf of clients.

// NEXT STEP

Ready to implement this?

De4sec provides hands-on implementation. Book a free discovery call โ€” we assess your environment at no cost.

Book a Free Discovery Call โ†’de4sec.technology
De4sec
ยฉ 2026 DE4SEC TECHNOLOGY. ALL RIGHTS RESERVED.