Microsoft Defender offers your enterprise a welcome security boost

Hand increasing the protection level by turning a knob
(Image credit: Shutterstock)

Microsoft’s Defender for Endpoint, the company’s endpoint security platform, is being updated to better help protect organizations from ransomware and other cyberthreats. 

In a recent announcement, the company said that by having some features on by default, businesses will stand a better chance against evolving cyberattacks with a feature it simply calls “Built-in protection”.

“In order for the best protection from ransomware and other cyberthreats to be in place, certain settings must be configured,” the Redmond giant explained. “Built-in protection can help by providing you with default settings for better protection.”

Opting out 

Built-in protection is described as a “set of default settings” the company is rolling out for Defender for Endpoint. Tamper Protection is one such setting, but Microsoft said other default settings would be coming soon.

Defender for Endpoint users can expect to receive two types of notifications: a message center post announcing the imminent arrival of Built-in protection, and a banner in the Microsoft 365 Defender portal announcing the automatic activation of Tamper Protection.

In case you were wondering, you can still opt-out of Built-in protection by specifying your own security settings, Microsoft explained. However, the company does not recommend it.

“Tamper Protection provides you with better ransomware protection. You must be a global administrator or security administrator to perform the following procedure,” it warns. 

Still, those wishing to turn the feature off can head over to the Microsoft 365 Defender portal, navigate to Settings > Endpoints > Advanced features, and set Tamper Protection to On (if it’s not On already), hit Save, and then set Tamper Protection to Off (and save, again).

The built-in protection feature began rolling out to Defender for Office 365 users November last year, which protects users from suspicious links and attachments in emails

Via: BleepingComputer

TOPICS

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.