AV Security – Introducing Windows Advanced Threat Protection

Malware should not be the only vector to determine compromised machines in an environment. According to Gartner, over 46% of machines that were compromised did not contain malware. Due to the emergence of the Endpoint Detection and Response market, continuous early identification of these attacks is possible. Enter the EDR solution from Microsoft – Windows Defender Advanced Threat Protection (ATP). This is a separate solution from the Windows Defender AV that falls under the Endpoint Protection (EPP). Here is a comparison of the two solutions:

The Windows Defender ATP requires no additional deployment and infrastructure as it is built into Windows 10 1607 or later with an E5 license. The ATP is cloud based and provides an in-depth timeline for breaches to fully understand the scope.

As attacks get more sophisticated, it helps to have several layers of protection. The forensic data the Windows Defender ATP can provide can help prevent major attacks and digitally prepare your company to be on the forefront of cybersecurity.


All content provided on this blog is for information purposes only. Windows Management Experts, Inc makes no representation as to accuracy or completeness of any information on this site. Windows Management Experts, Inc will not be liable for any errors or omission in this information nor for the availability of this information. It is highly recommended that you consult one of our technical consultants, should you need any further assistance.



Contact Us

On Key

More Posts

WME Cybersecurity Briefings No. 014
Cyber Security

WME Security Briefing 14 June 2024

LightSpy Spyware’s macOS Variant Detected with Advanced Surveillance Capabilities Overview Findings reveal a previously undocumented macOS variant of the LightSpy spyware. It was initially thought to target only iOS users. This spyware utilizes a plugin-based system

Read More »
WME Cybersecurity Briefings No. 013
Cyber Security

WME Security Briefing 10 June 2024

CISA Urges Patching of Actively Exploited Linux Kernel Vulnerability Overview CISA just issued an urgent advisory concerning a newly discovered security flaw in the Linux kernel. The flaw is being actively exploited to affect the netfilter component of

Read More »
3 Things to Consider Before You Enable Copilot for Microsoft 365
Microsoft Copilot

3 Things to Consider Before You Enable Copilot for Microsoft 365

In today’s digital landscape, any productivity tool that streamlines workflow and boosts performance is a pleasant addition. With its AI-powered productivity-enhancing capabilities, Microsoft Copilot has emerged as a game-changer for employees, particularly for organizations using Microsoft

Read More »
WME Cybersecurity Briefings No. 012
Cyber Security

WME Security Briefing 03 June 2024

Moroccan Cybercrime Group Exploits Gift Card Systems for Major Financial Gains Overview: Storm-0539, also called Atlas Lion, is a Moroccan cybercrime group that executes advanced email and SMS phishing attacks. They are committing fraud by utilizing

Read More »
Be assured of everything

Get WME Services

Stay ahead of the competition with our Professional IT offerings.