




Microsoft Defender for Endpoint

What is Microsoft Defender for Endpoint?
Microsoft Defender for Endpoint is an enterprise endpoint security platform designed to help enterprise networks prevent, detect, investigate, and respond to advanced threats. Defender for Endpoint customers need to apply for the Microsoft Threat Experts managed threat hunting service to get proactive Targeted Attack Notifications and to collaborate with experts on demand. Experts on Demand is an add-on service. Targeted Attack Notifications are always included after you have been accepted into Microsoft Threat Experts managed threat hunting service.
Company Details
Need Assistance?
We're here to help you with understanding our reports and the data inside to help you make decisions.
Get AssistanceMicrosoft Defender for Endpoint Ratings
Real user data aggregated to summarize the product performance and customer experience.
Download the entire Product Scorecard
to access more information on Microsoft Defender for Endpoint.
Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.
88 Likeliness to Recommend
100 Plan to Renew
84 Satisfaction of Cost Relative to Value
Emotional Footprint Overview
Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.
+90 Net Emotional Footprint
The emotional sentiment held by end users of the software based on their experience with the vendor. Responses are captured on an eight-point scale.
How much do users love Microsoft Defender for Endpoint?
Pros
- Respectful
- Helps Innovate
- Security Protects
- Reliable
How to read the Emotional Footprint
The Net Emotional Footprint measures high-level user sentiment towards particular product offerings. It aggregates emotional response ratings for various dimensions of the vendor-client relationship and product effectiveness, creating a powerful indicator of overall user feeling toward the vendor and product.
While purchasing decisions shouldn't be based on emotion, it's valuable to know what kind of emotional response the vendor you're considering elicits from their users.
Footprint
Negative
Neutral
Positive
Feature Ratings
IOC Consumption
Behavioural Analytics
Continuous Monitoring
Intrusion Detection Prevention
IOC Tools
Agent Efficiency
Malware Identification Accuracy
Task Prioritization
Automated Threat Response
Whitelisting Blacklisting
Machine Learning
Vendor Capability Ratings
Quality of Features
Breadth of Features
Business Value Created
Ease of Data Integration
Ease of Implementation
Ease of IT Administration
Usability and Intuitiveness
Availability and Quality of Training
Product Strategy and Rate of Improvement
Ease of Customization
Vendor Support
Also Featured in...
Microsoft Defender for Endpoint Reviews
Marisol M.
- Role: Information Technology
- Industry: Technology
- Involvement: IT Development, Integration, and Administration
Submitted Sep 2023
Fantastic product!
Likeliness to Recommend
What differentiates Microsoft Defender for Endpoint from other similar products?
The interface is very friendly and compatible with other OS.
What is your favorite aspect of this product?
Detection and response is very graphic and organized
What do you dislike most about this product?
It's being underestimated and people have the wrong idea just because of its price its not efficient compared to similar software.
What recommendations would you give to someone considering this product?
to have an open mind and research the capabilities of the product and compatibility
Pros
- Helps Innovate
- Continually Improving Product
- Reliable
- Performance Enhancing
Please tell us why you think this review should be flagged.

Terisa B.
- Role: Information Technology
- Industry: Technology
- Involvement: End User of Application
Submitted Aug 2023
"A secure solution!"
Likeliness to Recommend
What differentiates Microsoft Defender for Endpoint from other similar products?
Microsoft Defender for Endpoint is a powerful threat prevention software. It automatically detects Trojans, malware, and virus-infected files and quarantines them. It provides information about the performance and status of the device. It also keeps a record of connected family devices. In Microsoft Defender for Endpoint, advanced threat scanning, Threat Intelligence Insite, automated vulnerability investigation, and management are the best features.
What is your favorite aspect of this product?
Microsoft's powerful Advanced Threat Protection solution is designed to identify and prevent threats that can impact your organization's operations. Its endpoint detection and response component help users detect an attack in progress through alerts, as the platform features advanced engines for real-time attack detection, enabling IT security teams to execute.
What do you dislike most about this product?
The product must meet all of our basic components, but lacks several advanced analytical features. The user interface area has to be improved.
What recommendations would you give to someone considering this product?
Microsoft Defender for Endpoint provides the best security solution because it is not limited to any specific group or industry. It is suitable for both small and large enterprises. Its capabilities are extended in environments that use Microsoft technologies. It is also worth mentioning that Defender for Endpoint is small and easy to use.
Pros
- Helps Innovate
- Continually Improving Product
- Trustworthy
- Efficient Service
Please tell us why you think this review should be flagged.

Astrid O.
- Role: Finance
- Industry: Banking
- Involvement: End User of Application
Submitted Apr 2025
Defender: Cybersecurity's Vigilant Guardian Shield
Likeliness to Recommend
What differentiates Microsoft Defender for Endpoint from other similar products?
One factor for Microsoft Defender for Endpoint is the excellent coverage of endpoints, cloud services, and identity solution integration. It means that the behavioral sensors, on how the established software operates or not, capture arrays of activities and not isolated incidents, and this increases the probability of identifying fileless malware and living off the land attacks that signature-based products fail to detect.
What is your favorite aspect of this product?
I believe one of the greatest benefits of this solution is low performance reduction on the endpoints that accomplish the protection with no impact on the user interactions. The tools are also an interface, which makes it possible for beginner security analysts to independently perform Security Information and Event Management (SIEM) searches and gain a detailed understanding of attack paths and potential threats at an exceptional depth in minimal time, thus limiting exposures and resulting from security breaches considerably.
What do you dislike most about this product?
In terms of data forensic retention, there are some limitations with Microsoft Defender for Endpoint, which may sometimes complicate investigation of incidents that happened more than the standard retention time.
What recommendations would you give to someone considering this product?
Indeed, the program's capability to quarantine infected devices has been particularly useful, especially when operating the software remotely due to the limited IT team support. Once again, during a suspicious activity detection, I observed how the system pinpointed that the account was indeed suspicious, disconnected the workstation, and offered a detailed timeline of what happened, which makes it easier to close all the security breaches.
Pros
- Helps Innovate
- Continually Improving Product
- Performance Enhancing
- Enables Productivity
Please tell us why you think this review should be flagged.
Get Instant Access<br>to this Report
Get Instant Access
to this Report
Unlock your first report with just a business email. Register to access our entire library.
© 2025 SoftwareReviews.com. All rights reserved.
