Setup guides for Microsoft Defender XDR

Note

Want to experience Microsoft Defender XDR? Learn more about how you can evaluate and pilot Microsoft Defender XDR.

Applies to:

  • Microsoft Defender XDR

Setup guides for Microsoft Defender XDR deployment give you tailored guidance and resources for planning and deploying security controls for your tenant, apps, and services.

All deployment guides are available in the Microsoft 365 admin center and in the Microsoft 365 Setup portal.

Deployment Guides

Deployment guides in the admin center require authentication to a Microsoft 365 tenant as an administrator or other role with access to the admin center, but guides in the Microsoft 365 Setup portal can be accessed by anyone. We have provided links to both locations for each guide, where available, in the tables below.

Guide - Setup Portal Guide - Admin Center Description
Microsoft Defender for Endpoint setup guide Microsoft Defender for Endpoint setup guide The Microsoft Defender for Endpoint setup guide provides instructions that will help your enterprise network prevent, detect, investigate, and respond to advanced threats. Make an informed assessment of your organization's vulnerability and decide which deployment package and configuration methods are best.
Note: A Microsoft Volume License is required for Microsoft Defender for Endpoint.
Microsoft Defender for Office 365 setup guide Microsoft Defender for Office 365 setup guide The Microsoft Defender for Office 365 setup guide safeguards your organization against malicious threats that your environment might come across through email messages, links, and third party collaboration tools. This guide provides you with the resources and information to help you prepare and identify the Defender for Office 365 plan to fit your organization's needs.
Microsoft Defender for Cloud Apps setup guide Microsoft Defender for Cloud Apps setup guide The Microsoft Defender for Cloud Apps setup guide provides easy to follow deployment and management guidance to set up your Cloud Discovery solution. With Cloud Discovery, you'll integrate your supported security apps, and then you'll use traffic logs to dynamically discover and analyze the cloud apps that your organization uses. You'll also set up features available through the Defender for Cloud Apps solution, including threat detection policies to identify high-risk use, information protection policies to define access, and real-time session controls to monitor activity. With these features, your environment gets enhanced visibility, control over data movement, and analytics to identify and combat cyberthreats across all your Microsoft and third party cloud services.
Microsoft Defender for Identity setup guide Microsoft Defender for Identity setup guide The Microsoft Defender for Identity setup guide provides security solution set-up guidance to identify, detect, and investigate advanced threats that might compromise user identities. These include detecting suspicious user activities and malicious insider actions directed at your organization. You'll create a Defender for Identity instance, connect to your organization's Active Directory, and then set up sensors, alerts, notifications, and configure your unique portal preferences.

Tip

Do you want to learn more? Engage with the Microsoft Security community in our Tech Community: Microsoft Defender XDR Tech Community.