1.1 Defender for Endpoint
Defender for Endpoint is an endpoint detection and response (EDR) platform for Windows, macOS, Linux, iOS, and Android. It is not just antivirus. It is a full sensor platform that captures device telemetry, detects threats, enables investigation, and supports automated response. Think of it as the eyes on the device — everything happening on a workstation or server flows through Defender for Endpoint.
Figure 1.1: Defender for Endpoint components and the data tables they populate in Advanced Hunting.
Core components
Endpoint Sensor. A lightweight agent built into Windows 10/11 and Server 2016+. On macOS and Linux it is deployed as a separate package. The sensor captures process creation, network connections, file activity, registry changes, and more. This sensor is what populates the Device* tables in advanced hunting — the tables you will query in almost every investigation module.
Threat and Vulnerability Management (TVM). Continuous vulnerability assessment of every onboarded device. It identifies missing patches, insecure configurations, and software vulnerabilities without requiring a separate scanning tool. The output feeds into the DeviceTvmSoftwareVulnerabilities table and into the Exposure Management dashboard (covered in Module 12).
Attack Surface Reduction (ASR) Rules. Preventive controls that block specific high-risk behaviours: Office macro execution, credential stealing from LSASS, executable content from email attachments. These are not detections — they are active blocks configured as policies.
When properly tuned, ASR rules stop entire categories of attack before any investigation is needed. A rule blocking Office macros from creating child processes eliminates a huge portion of the malware delivery chain. Module 7 covers ASR rule configuration and tuning in detail.
Endpoint Detection and Response (EDR). The investigation engine. EDR captures a rolling 30-day device timeline showing every process, network connection, file event, and registry modification. This timeline is what analysts use to reconstruct what happened on a compromised device. When you need to know exactly which process ran cmd.exe /c whoami at 14:32 on a Tuesday, the device timeline is where you look.
Automated Investigation and Response (AIR). When an alert fires, AIR can automatically investigate the alert, determine scope, and take remediation actions — quarantine a file, isolate a device — subject to analyst approval or configured for full automation.
Device Isolation. A containment capability that cuts a device’s network access while maintaining the management channel to Defender. Used during active incidents to prevent lateral movement. You will use this in the ransomware pre-encryption scenario (Module 17).
Key data tables for investigation
DeviceProcessEvents — every process executionDeviceNetworkEvents — every network connectionDeviceFileEvents — file creation, modification, deletionDeviceRegistryEvents — registry changesDeviceLogonEvents — local and remote logonsDeviceEvents — catch-all for other device activityDeviceInfo — device inventory and properties
How it connects to the ecosystem
Alerts feed into the Defender XDR unified incident queue. Data tables are queryable in Defender XDR advanced hunting and in Sentinel via the M365 Defender connector. Device isolation can be triggered manually, via AIR, or via Sentinel playbooks. TVM findings feed into Exposure Management (Module 12).
Licensing
| Tier | What you get | Included in |
|---|---|---|
| P1 | Basic threat protection, ASR rules, manual response | M365 E3, Business Premium |
| P2 | Full EDR, device timeline, advanced hunting, AIR, TVM | M365 E5 (or add-on) |
Key takeaways
- Defender for Endpoint is an EDR platform, not just antivirus — it captures a full device timeline for investigation
- The
Device*tables are the primary data source for endpoint investigation in KQL - ASR rules are preventive controls that block attack behaviours before detection is needed
- Device isolation is a critical containment action during active incidents
- P2 is required for the full investigation capabilities used in this course
Try it yourself
| |
arg_max function picks the most recent row per device, avoiding duplicates.Check your understanding
1. What is the primary difference between ASR rules and EDR?
2. Which data table would you query to find every process that executed on a specific device?