https://store-images.s-microsoft.com/image/apps.28859.f7b76bc9-ea3d-4290-add1-b9813e34abaa.3a7f7141-b562-477b-aa3a-19688f971efd.e3ca80d7-0cc2-49ce-89b7-cd1a8aeafb3b

Microsoft Defender for Endpoint: Proof-of-Concept

Ascent Global, Inc.

Modernize endpoint security and reduce cost with Microsoft Defender for Endpoint

Traditional antivirus tools can’t detect and block breach indicators or compromised machines. Cybersecurity requires modernization. Ascent consultants’ deep Microsoft experience meets each client—regardless of size, maturity, and industry—where they’re at. Let Ascent guide your team through a Microsoft Defender for Endpoint proof of concept.

Proof-of-Concept Structure

  • Assess current data protection landscape during a discovery workshop
  • Gather and document environment-specific needs
  • Implement best practice configurations for each required platform
  • Evaluate Defender for Endpoint’s onboarding process for deployment
  • Initiate industry standard MITRE attack simulations for behavioral detection engineering

Timeline

  • Week 1: Discovery & Requirements
  • Week 2: Baseline Configurations
  • Week 3: Proof-of-Concept Deployment
  • Week 4: Final Documentation and Wrap Up

Scope and Customer Commitment

  • Products covered: Microsoft Defender for Endpoint
  • Customer size: 2500 endpoints or more
  • Customer commitment:
  • Defender for Endpoint Trial or
  • E3 licensing with E5 Security add-on or
  • E5 licensing
  • Defender for Servers P1
  • Microsoft Security and Intune Console Access
  • Network connectivity to required internet hosted services
  • Stakeholder availability

Deliverables

  • Implementation Plan
  • Test Case Documentation
  • Incident and Feature Testing
  • Final Report

Engagement cost is subject to project scoping

At a glance

https://store-images.s-microsoft.com/image/apps.54545.f7b76bc9-ea3d-4290-add1-b9813e34abaa.3a7f7141-b562-477b-aa3a-19688f971efd.a6e8e561-e298-4aab-a8da-6a2950fcba11