Microsoft Defender for Endpoint, the company’s endpoint security platform, is being updated to better protect organizations from ransomware and other cyberthreats.
in recent announcement (opens in a new tab)the company said that by enabling certain features by default, businesses will have a better chance of evolving cyberattacks with a feature it simply calls “built-in protection.”
“For the best protection against ransomware and other cyber threats, certain settings need to be configured,” explained the Redmond giant. “Built-in protection can help by providing default settings for better protection.”
Resignation
The built-in protection is described as a “set of defaults” that the company rolls out for Endpoint Defender. Anti-tampering is one such setting, but Microsoft said other defaults are coming soon.
Defender for Endpoint users can expect two types of notifications: a message center post announcing that built-in protection is imminent, and a banner in the Microsoft 365 Defender portal announcing that Tamper Protection is automatically activated.
In case you’re wondering, you can still opt out of the built-in protection by specifying your own security settings, Microsoft explained. However, the company does not recommend this.
“Tampering protection provides better protection against ransomware. You must be a Global Administrator or a Security Administrator to complete the following procedure,” it warns.
Still, those who want to disable this feature can go to the Microsoft 365 Defender portal, go to Settings > Endpoints > Advanced features and enable tamper protection (if it’s not already enabled), hit save, then set tamper protection Integrity Off (and save again).
Built-in protection began rolling out to Defender for Office 365 users last November, protecting users from suspicious links and attachments in emails.
By: Beeping Computer (opens in a new tab)