As we have entered into new hybrid work environments, enterprises need to think about how they will proactively protect their organizations from the influx of new or “bring your own”( BYO) connected devices. This new normal has disclosed the most challenging cybersecurity landscape we’ve ever encountered. As defenders, we know that users are 71 percentage more likely to be infected on an unmanaged machine.

This is because security and IT teams don’t have the ability to set the right security fixes and configurations, can’t update and patch OS and software vulnerabilities, and can’t prevent darknes IT and shadow apps. These unmanaged machines that are connecting to company networks posed a huge opportunity for attackers to compromise these devices and launching broader attacks.

Microsoft is committed to staying ahead of this threat on behalf of our clients. Today, we announce a new decide of capabilities that empower organizations to discover and secure unmanaged workstations, mobile machines, servers, and network machines on their business networks. All this, without the need to deploy new hardware or software, or make changes to the network configuration. Now, it’s easier for organizations to lock down their network’s foundation as they monitor unmanaged machines, enabling them to execute on their Zero Trust strategy.

Customers enrolled in Microsoft Defender for Endpoint public preview can take advantage of the latest abilities that give them visibility into unmanaged endpoints( such as Windows, Linux, macOS, iOS, and Android) and network devices( such as routers, firewalls, WLAN controllers, and others) within minutes. From here, customers can use integrated workflows to onboard and secure the machines. These new Microsoft Defender for Endpoint features increase the security, productivity, efficiency, and safety of your environment.

The new complexity of hybrid domains

Unmanaged devices are prone to assaults and are easily breached because they are invisible to security teams. Bad actors use them to stealthily perform lateral motions, hop network bounds, and achieve persistence. Typically, few tracings are left behind, enabling attackers to evade early detecting and increase their dwell time.

Security researchers and industry experts equally recognize the health risks that unmanaged endpoints and network devices pose. Leaders at Red Canary, a provider of SaaS-based security functionings answers and penetration testing services, share this perspective 😛 TAGEND

” We often engage with organizations immediately following a breach. In many cases, the root cause isn’t novel or being conducted by highly skilled adversaries ,” says Keith McCammon, Chief Security Officer, Red Canary.” Organisations are being targeted by prolific adversaries that have streamlined the process of finding unmanaged assets, exploiting them, and operating with impunity within the victims’ networks until they achieve their objective .”

What prevents organizations from addressing the problem relates to a lack of tooling in security solutions, such as endpoint protection platforms( EPP ), that are most commonly deployed by organizations.

How Microsoft Defender for Endpoint delivers increased protection to hybrid fixeds

We believe our customers shouldn’t have to deploy additional tools to mitigate this trouble. Therefore, we have added the ability to discover and secure unmanaged endpoints and network devices to Microsoft Defender for Endpoint. No hardware deployment or software deployment is needed , no change process, all these capabilities are part of Microsoft Defender for Endpoint, and patrons can start benefiting from them right now. It’s that easy.

Once network machines are discovered, security administrators will receive the latest security recommendations and vulnerabilities on them. Discovered endpoints( such as workstations, servers, and mobile devices) can be onboarded to Microsoft Defender for Endpoints, permitting all its deep protection capabilities.

Screen view of security recommendations for network devices and the suggested remediation procedure. Here network device 3 has critical CVEs.

Figure 1. Security recommendations for network devices.

We’re aroused to share this news with you today, and we welcome your feedback as we work together to deliver discovery of unmanaged endpoints and network machines to Microsoft Defender for Endpoint. You can easily render feedback to our teams in the Microsoft 365 security middle. For those not already enrolled in the public preview, we encourage you to do so by turning on the preview features. Once enrolled, you’re able to secure your unmanaged network devices within minutes.

As defenders, we’re committed to security for all, helping organizations gain confidence in the security of their machines, data, and digital actions, regardless of where the work gets done.

Learn more

More detailed information on our new network and endpoint breakthrough features were available in our just-released blogs on Tech Community .:

New network device discovery and vulnerability ratings Endpoint discovery- navigating your behavior through unmanaged machines

To learn more about Microsoft Security answers visit our website . Bookmark the Security blog to keep up with our expert coverage on security matters. Also, follow us at @MSFTSecurity for the most recent developments and updates on cybersecurity.

The post Secure unmanaged devices with Microsoft Defender for Endpoint now appeared first on Microsoft Security .

Read more: