{"id":5970,"date":"2023-01-03T21:51:44","date_gmt":"2023-01-03T19:51:44","guid":{"rendered":"https:\/\/jeffreyappel.nl\/?p=5970"},"modified":"2024-01-03T18:28:05","modified_gmt":"2024-01-03T16:28:05","slug":"microsoft-defender-for-endpoint-series-validate-defender-protection-and-additional-troubleshooting-part6","status":"publish","type":"post","link":"https:\/\/jeffreyappel.nl\/microsoft-defender-for-endpoint-series-validate-defender-protection-and-additional-troubleshooting-part6\/","title":{"rendered":"Microsoft Defender for Endpoint series \u2013 Validate Defender protection and additional troubleshooting \u2013 Part6"},"content":{"rendered":"\n

It is time for part 6 of the Microsoft Defender for Endpoint (MDE) series. All previous parts were focused on onboarding and configuration and Microsoft Defender Vulnerability Management. Now it is time for the initial testing of the Defender for Endpoint component and check of all protection components are working correctly with some troubleshooting explanation. <\/p>\n\n\n\n

After onboarding and configuration, it is critical to validate all key features and protection states. Microsoft provides some test scripts, all there are some other ways of testing the protection capabilities. <\/p>\n\n\n\n

NOTE: The blog series focuses on features in Microsoft Defender for Endpoint P2<\/strong> all Microsoft Defender for Endpoint P1<\/strong> features are available in P2.<\/p>\n\n\n\n

Specific question or content idea part of Defender for Endpoint? Use the contact submission<\/a> form and share the post ideas.<\/strong><\/p>\n\n\n\n

Introduction<\/h2>\n\n\n\n

After the initial onboarding of Defender for Endpoint and configuration of Defender AV\/ NGP, it is important to make sure all Defender protections are in a good state and doing the job. Based on experience it is recommended to provide a good test plan for different types of computers and networks and confirm the state during the roll-out. In this part of the MDE series the Defender protection test capabilities will be explained. Part 6 contains more in-depth troubleshooting based on Defender AV and Defender for Endpoint. <\/p>\n\n\n\n

The following is part of the blog:<\/p>\n\n\n\n