Set up and configure Microsoft Defender for Business
Defender for Business provides a streamlined setup and configuration experience, designed especially for the small and medium-sized business. Use this article as a guide for the overall process.
If you used the setup wizard, then you've already completed several steps of your basic setup process. In this case, you can:
The setup and configuration process
The following diagram depicts the overall setup and configuration process for Defender for Business. If you used the setup wizard, then you've likely already completed steps 1-3, and possibly step 4.
|1||Review the requirements||Review the requirements, including supported operating systems, for Defender for Business. See Defender for Business requirements.|
|2||Assign roles and permissions||People on your security team need permissions to perform tasks, such as reviewing detected threats & remediation actions, viewing & editing policies, onboarding devices, and using reports. You can grant these permissions through certain roles. See Assign roles and permissions.|
|3||Set up email notifications||You can specify who should receive email notifications when alerts are triggered or new vulnerabilities are discovered. See Set up email notifications.|
|4||Onboard devices||You can choose from several options to onboard your company's devices, such as using a downloadable script or enrolling devices in Microsoft Intune. See Onboard devices to Defender for Business.|
|5||Configure your security settings and policies||You can choose from several options to configure your security settings and policies, such as the simplified configuration process in Defender for Business or Microsoft Intune. See Configure your security settings and policies.|
Submit and view feedback for