{"id":4460,"date":"2022-04-06T14:21:00","date_gmt":"2022-04-06T14:21:00","guid":{"rendered":"https:\/\/cobweb.com\/ae\/?p=4460"},"modified":"2022-09-27T15:25:49","modified_gmt":"2022-09-27T15:25:49","slug":"microsoft-defender-for-endpoint-what-is-it-and-why-do-you-need-it","status":"publish","type":"post","link":"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/microsoft-defender-for-endpoint-what-is-it-and-why-do-you-need-it\/","title":{"rendered":"Microsoft Defender for Endpoint \u2013 what is it and why do you need it"},"content":{"rendered":"\n<div class=\"wp-block-cover\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim\"><\/span><img loading=\"lazy\" decoding=\"async\" width=\"1921\" height=\"561\" class=\"wp-block-cover__image-background wp-image-1664\" alt=\"\" src=\"https:\/\/cobweb.com\/ae\/wp-content\/uploads\/2022\/07\/Teal-Lined-Circle-Background.png\" style=\"object-position:100% 100%\" data-object-fit=\"cover\" data-object-position=\"100% 100%\" srcset=\"https:\/\/cobweb.com\/ae\/wp-content\/uploads\/sites\/2\/2022\/07\/Teal-Lined-Circle-Background.png 1921w, https:\/\/cobweb.com\/ae\/wp-content\/uploads\/sites\/2\/2022\/07\/Teal-Lined-Circle-Background-300x88.png 300w, https:\/\/cobweb.com\/ae\/wp-content\/uploads\/sites\/2\/2022\/07\/Teal-Lined-Circle-Background-1024x299.png 1024w, https:\/\/cobweb.com\/ae\/wp-content\/uploads\/sites\/2\/2022\/07\/Teal-Lined-Circle-Background-768x224.png 768w, https:\/\/cobweb.com\/ae\/wp-content\/uploads\/sites\/2\/2022\/07\/Teal-Lined-Circle-Background-1536x449.png 1536w\" sizes=\"auto, (max-width: 1921px) 100vw, 1921px\" \/><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<h1 class=\"wp-block-heading\" style=\"font-size:60px\">Microsoft Defender for Endpoint \u2013 what is it and why do you need it<\/h1>\n<\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<section id='content-container-block_fcd74e2615ed92df0aea8310809f9ace' class='content-container pt-none pb-none' style=\"background-color: #def3f5;\">\n\t\t<div class=\"full-width\">\n\t\n\t\t\t    \t\n\n<div class=\"wp-block-columns are-vertically-aligned-center is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\"><div class=\"yoast-breadcrumbs\"><span><span><a href=\"https:\/\/cobweb.com\/ae\/\">Home<\/a><\/span> \u00bb <span class=\"breadcrumb_last\" aria-current=\"page\">Microsoft Defender for Endpoint \u2013 what is it and why do you need it<\/span><\/span><\/div><\/div>\n<\/div>\n\n\n\t\t\t\t<\/div>\n\n\t\t<\/div>\n<\/section>\n\n\n<section id='post-info-block_8c3007c41d75701609c56985d17ba9b2' class='post-info'>\n    <div class=\"grid-container\">\n    \t<div class=\"grid-x\">\n    \t\t<div class=\"small-12 medium-12 large-12 cell\">\n    \t\t\t<div class=\"post-info-container\">\n\t    \t\t\t\t    \t\t\t<div class=\"post-info-author\">\n\t    \t\t\t\t<p class=\"post-info-title\">Written By<\/p>\n\t    \t\t\t\t<p class=\"post-info-detail\">\n\t    \t\t\t\t\tPratik Vig\t    \t\t\t\t\t\t    \t\t\t\t<\/p>\n\t    \t\t\t<\/div>\n\t    \t\t\t<div class=\"post-info-date\">\n\t    \t\t\t\t<p class=\"post-info-title\">Publish Date<\/p>\n\t    \t\t\t\t<p class=\"post-info-detail\">\n\t    \t\t\t\t\t06\/04\/2022\t    \t\t\t\t<\/p>\n\t    \t\t\t<\/div>\n\t    \t\t\t\t    \t\t\t\t<div class=\"post-info-category\">\n\t\t    \t\t\t\t<p class=\"post-info-title\">Categories<\/p>\n\t\t    \t\t\t\t<p class=\"post-info-categories\">\n\t\t    \t\t\t\t\t\t\t    \t\t\t\t\t\t<span>Blogs<\/span>\t\n\t\t    \t\t\t\t\t\t\t    \t\t\t\t<\/p>\n\t\t    \t\t\t<\/div>\n\t    \t\t\t\t    \t\t<\/div>\n    \t\t<\/div>\n    \t<\/div>\n    <\/div>\n<\/section>\n\n\n\n\n<section id='content-container-block_b4e48dd4e221fbea63e57e9874415363' class='content-container'>\n\t\t\n\t<div class=\"grid-container\">\n\t\t<div class=\"inner-content grid-x grid-margin-x\">\n\t\t\t<div class=\"large-8 large-offset-2 cell\">\n\t\t\t    \t\n\n<h2 class=\"wp-block-heading\">Discover the single, unified platform that has your network covered!<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Endpoint management \u2013 are you secure?<\/strong><\/h3>\n\n\n\n<p>Endpoint management is essential for any successful organization\u2019s tech strategy, so why is it that more than 30% of businesses don\u2019t even know how many endpoints they have? Because there are so many out there and many believe that if they have an anti-virus, anti-malware solution, they\u2019re safe \u2013 they might be for some solutions but that that was then, this is now. In today\u2019s hybrid and remote working world, you have more endpoints than ever \u2013 servers, workstations, point-of-sale devices, mobile and IoT devices \u2013 and all are vulnerable gateways in an era where we access documents and data from multiple devices enabling threats within and without.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>The threat within:<\/strong><\/h3>\n\n\n\n<p>Most data breaches are insider jobs which can quite simply be employee negligence. As endpoints are potential access pathways to your corporate network, a single wrong click on an unsecured device can unwittingly lead to a serious security breach and installing malware on a single machine won\u2019t raise the drawbridge.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Stop malware in its tracks:<\/strong><\/h3>\n\n\n\n<p>Any digital storage device can be compromised by viruses, worms, Trojans, and ransomwares so it\u2019s vital to have a defense solution that scans constantly and has central access control to protect you from the ever-widening attack arsenal.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Go Safely:<\/strong><\/h3>\n\n\n\n<p>You are in the mobile commerce era, yet mobile devices including smartphones and tablets are connected to your network so need to be included in endpoint security. Think of cloud storage as your Fort Knox against data breaches.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>React or prevent?<\/strong><\/h3>\n\n\n\n<p>Traditional antivirus software is reactive. It jumps into action when an endpoint is infected to halt further damage. What you need is something that stops it in it tracks before it ever reaches the endpoint which requires web intrusion detection, prevention, and web filtering.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Regulatory reporting:<\/strong><\/h3>\n\n\n\n<p>With today\u2019s comprehensive data regulations, such as the recently implemented UAE Personal Data Protection Law, you need an audit trail on any data breach to defend you against crushing penalties. Microsoft\u2019s Cloud-hosted endpoint security software logs all activities.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Microsoft to the Defense:<\/strong><\/h3>\n\n\n\n<p>Microsoft\u2019s Defender for Endpoint is an endpoint security solution that is built into Windows 10 and Microsoft\u2019s robust cloud service. It offers vulnerability management, endpoint protection, detection and response, mobile threat defense, and managed services in a single, unified platform \u2013 which means unified billing, less administration, single renewal timelines and the \u2018sleep at night\u2019 awareness that you\u2019ll receive regular product auto-updates so as the threat landscape evolves, so too will your protection. This enterprise endpoint security product supports Mac, Linux, and Windows operating systems, along with Android and iOS and helps networks prevent, detect, investigate as well as respond to threats for end-user devices such as tablets, mobiles, laptops, servers and more.<\/p>\n\n\n\n<p>Being Cloud-based Microsoft Defender for Endpoint does not need any additional hardware, software or infrastructure deployment while also supporting auto-updates meaning your endpoints are protected and updated 24\/7.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>For Your Eyes Only:<\/strong><\/h3>\n\n\n\n<p>Microsoft\u2019s Defender for Endpoint provides advanced threat protection that includes antivirus, antimalware, ransomware mitigation, and more, along with centralized management and reporting. Built on Microsoft\u2019s powerful Azure cloud, every customer gets a dedicated tenant which secures their data making it only available through Azure Active Directory Authentication. Microsoft Defender for Endpoint\u2019s core features offer preventative protection, post-breach detection, automated investigation, and responses to possible breaches. Network is secured through the product\u2019s unrivalled capabilities including threat and vulnerability management; attack surface protection; next-generation protection; endpoint detection and response; attack surface reduction abilities; automated investigation and remediation; Microsoft Secure Score for Devices which assesses network security and Microsoft Threat Experts \u2013 the all-new managed threat hunting service. Defender for Endpoint also delivers protection to hybrid settings. When network devices are identified, security administrators receive the latest security vulnerabilities and recommendations to address them.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Speed Up Response:<\/strong><\/h3>\n\n\n\n<p>Defender for Endpoint\u2019s automated investigation response capability enables you to respond quickly to incoming threats. Its automated investigation response provides automatic remediation enabling complex threats to be addressed within minutes.<\/p>\n\n\n\n<p>If you\u2019d like to streamline your network endpoints with a unified approach, call us for advice now on +97144553100 or email: sales.uae@cobweb.com<\/p>\n\n\n\t\t\t\t<\/div>\n\n\t\t\t\t<\/div>\n    \t<\/div>\n\t\t<\/div>\n<\/section>","protected":false},"excerpt":{"rendered":"","protected":false},"author":4,"featured_media":4476,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3],"tags":[],"class_list":["post-4460","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Microsoft Defender for Endpoint \u2013 what is it and why do you need it - Cobweb MENA<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/microsoft-defender-for-endpoint-what-is-it-and-why-do-you-need-it\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft Defender for Endpoint \u2013 what is it and why do you need it - Cobweb MENA\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/microsoft-defender-for-endpoint-what-is-it-and-why-do-you-need-it\/\" \/>\n<meta property=\"og:site_name\" content=\"Cobweb MENA\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-06T14:21:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-09-27T15:25:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cobweb.com\/ae\/wp-content\/uploads\/sites\/2\/2022\/09\/Blog-image-7-350x300-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"350\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Becky\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@rebecca.griffin@cobweb.com\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Becky\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/cobweb.com\\\/ae\\\/content-hub\\\/blogs\\\/microsoft-defender-for-endpoint-what-is-it-and-why-do-you-need-it\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cobweb.com\\\/ae\\\/content-hub\\\/blogs\\\/microsoft-defender-for-endpoint-what-is-it-and-why-do-you-need-it\\\/\"},\"author\":{\"name\":\"Becky\",\"@id\":\"https:\\\/\\\/cobweb.com\\\/ae\\\/#\\\/schema\\\/person\\\/9770bbe8477785321dfec27948f35e20\"},\"headline\":\"Microsoft Defender for Endpoint \u2013 what is it and why do you need it\",\"datePublished\":\"2022-04-06T14:21:00+00:00\",\"dateModified\":\"2022-09-27T15:25:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/cobweb.com\\\/ae\\\/content-hub\\\/blogs\\\/microsoft-defender-for-endpoint-what-is-it-and-why-do-you-need-it\\\/\"},\"wordCount\":727,\"image\":{\"@id\":\"https:\\\/\\\/cobweb.com\\\/ae\\\/content-hub\\\/blogs\\\/microsoft-defender-for-endpoint-what-is-it-and-why-do-you-need-it\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cobweb.com\\\/ae\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2022\\\/09\\\/Blog-image-7-350x300-1.png\",\"articleSection\":[\"Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cobweb.com\\\/ae\\\/content-hub\\\/blogs\\\/microsoft-defender-for-endpoint-what-is-it-and-why-do-you-need-it\\\/\",\"url\":\"https:\\\/\\\/cobweb.com\\\/ae\\\/content-hub\\\/blogs\\\/microsoft-defender-for-endpoint-what-is-it-and-why-do-you-need-it\\\/\",\"name\":\"Microsoft Defender for Endpoint \u2013 what is it and why do you need it - Cobweb MENA\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cobweb.com\\\/ae\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cobweb.com\\\/ae\\\/content-hub\\\/blogs\\\/microsoft-defender-for-endpoint-what-is-it-and-why-do-you-need-it\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cobweb.com\\\/ae\\\/content-hub\\\/blogs\\\/microsoft-defender-for-endpoint-what-is-it-and-why-do-you-need-it\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cobweb.com\\\/ae\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2022\\\/09\\\/Blog-image-7-350x300-1.png\",\"datePublished\":\"2022-04-06T14:21:00+00:00\",\"dateModified\":\"2022-09-27T15:25:49+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/cobweb.com\\\/ae\\\/#\\\/schema\\\/person\\\/9770bbe8477785321dfec27948f35e20\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cobweb.com\\\/ae\\\/content-hub\\\/blogs\\\/microsoft-defender-for-endpoint-what-is-it-and-why-do-you-need-it\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cobweb.com\\\/ae\\\/content-hub\\\/blogs\\\/microsoft-defender-for-endpoint-what-is-it-and-why-do-you-need-it\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/cobweb.com\\\/ae\\\/content-hub\\\/blogs\\\/microsoft-defender-for-endpoint-what-is-it-and-why-do-you-need-it\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cobweb.com\\\/ae\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2022\\\/09\\\/Blog-image-7-350x300-1.png\",\"contentUrl\":\"https:\\\/\\\/cobweb.com\\\/ae\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2022\\\/09\\\/Blog-image-7-350x300-1.png\",\"width\":350,\"height\":300,\"caption\":\"Cobweb tells you how to safeguard from ransomware attacks\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cobweb.com\\\/ae\\\/content-hub\\\/blogs\\\/microsoft-defender-for-endpoint-what-is-it-and-why-do-you-need-it\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/cobweb.com\\\/ae\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Microsoft Defender for Endpoint \u2013 what is it and why do you need it\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cobweb.com\\\/ae\\\/#website\",\"url\":\"https:\\\/\\\/cobweb.com\\\/ae\\\/\",\"name\":\"Cobweb MENA\",\"description\":\"Cobweb MENA\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cobweb.com\\\/ae\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cobweb.com\\\/ae\\\/#\\\/schema\\\/person\\\/9770bbe8477785321dfec27948f35e20\",\"name\":\"Becky\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/681853ad699aa8ca4006965a7bcd9b189f1024310a86dda5ca70051e3403cb4b?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/681853ad699aa8ca4006965a7bcd9b189f1024310a86dda5ca70051e3403cb4b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/681853ad699aa8ca4006965a7bcd9b189f1024310a86dda5ca70051e3403cb4b?s=96&d=mm&r=g\",\"caption\":\"Becky\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/rebecca.griffin@cobweb.com\"],\"url\":\"https:\\\/\\\/cobweb.com\\\/ae\\\/content-hub\\\/author\\\/becky\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft Defender for Endpoint \u2013 what is it and why do you need it - Cobweb MENA","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/microsoft-defender-for-endpoint-what-is-it-and-why-do-you-need-it\/","og_locale":"en_US","og_type":"article","og_title":"Microsoft Defender for Endpoint \u2013 what is it and why do you need it - Cobweb MENA","og_url":"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/microsoft-defender-for-endpoint-what-is-it-and-why-do-you-need-it\/","og_site_name":"Cobweb MENA","article_published_time":"2022-04-06T14:21:00+00:00","article_modified_time":"2022-09-27T15:25:49+00:00","og_image":[{"width":350,"height":300,"url":"https:\/\/cobweb.com\/ae\/wp-content\/uploads\/sites\/2\/2022\/09\/Blog-image-7-350x300-1.png","type":"image\/png"}],"author":"Becky","twitter_card":"summary_large_image","twitter_creator":"@rebecca.griffin@cobweb.com","twitter_misc":{"Written by":"Becky","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/microsoft-defender-for-endpoint-what-is-it-and-why-do-you-need-it\/#article","isPartOf":{"@id":"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/microsoft-defender-for-endpoint-what-is-it-and-why-do-you-need-it\/"},"author":{"name":"Becky","@id":"https:\/\/cobweb.com\/ae\/#\/schema\/person\/9770bbe8477785321dfec27948f35e20"},"headline":"Microsoft Defender for Endpoint \u2013 what is it and why do you need it","datePublished":"2022-04-06T14:21:00+00:00","dateModified":"2022-09-27T15:25:49+00:00","mainEntityOfPage":{"@id":"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/microsoft-defender-for-endpoint-what-is-it-and-why-do-you-need-it\/"},"wordCount":727,"image":{"@id":"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/microsoft-defender-for-endpoint-what-is-it-and-why-do-you-need-it\/#primaryimage"},"thumbnailUrl":"https:\/\/cobweb.com\/ae\/wp-content\/uploads\/sites\/2\/2022\/09\/Blog-image-7-350x300-1.png","articleSection":["Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/microsoft-defender-for-endpoint-what-is-it-and-why-do-you-need-it\/","url":"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/microsoft-defender-for-endpoint-what-is-it-and-why-do-you-need-it\/","name":"Microsoft Defender for Endpoint \u2013 what is it and why do you need it - Cobweb MENA","isPartOf":{"@id":"https:\/\/cobweb.com\/ae\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/microsoft-defender-for-endpoint-what-is-it-and-why-do-you-need-it\/#primaryimage"},"image":{"@id":"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/microsoft-defender-for-endpoint-what-is-it-and-why-do-you-need-it\/#primaryimage"},"thumbnailUrl":"https:\/\/cobweb.com\/ae\/wp-content\/uploads\/sites\/2\/2022\/09\/Blog-image-7-350x300-1.png","datePublished":"2022-04-06T14:21:00+00:00","dateModified":"2022-09-27T15:25:49+00:00","author":{"@id":"https:\/\/cobweb.com\/ae\/#\/schema\/person\/9770bbe8477785321dfec27948f35e20"},"breadcrumb":{"@id":"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/microsoft-defender-for-endpoint-what-is-it-and-why-do-you-need-it\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cobweb.com\/ae\/content-hub\/blogs\/microsoft-defender-for-endpoint-what-is-it-and-why-do-you-need-it\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/microsoft-defender-for-endpoint-what-is-it-and-why-do-you-need-it\/#primaryimage","url":"https:\/\/cobweb.com\/ae\/wp-content\/uploads\/sites\/2\/2022\/09\/Blog-image-7-350x300-1.png","contentUrl":"https:\/\/cobweb.com\/ae\/wp-content\/uploads\/sites\/2\/2022\/09\/Blog-image-7-350x300-1.png","width":350,"height":300,"caption":"Cobweb tells you how to safeguard from ransomware attacks"},{"@type":"BreadcrumbList","@id":"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/microsoft-defender-for-endpoint-what-is-it-and-why-do-you-need-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cobweb.com\/ae\/"},{"@type":"ListItem","position":2,"name":"Microsoft Defender for Endpoint \u2013 what is it and why do you need it"}]},{"@type":"WebSite","@id":"https:\/\/cobweb.com\/ae\/#website","url":"https:\/\/cobweb.com\/ae\/","name":"Cobweb MENA","description":"Cobweb MENA","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cobweb.com\/ae\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/cobweb.com\/ae\/#\/schema\/person\/9770bbe8477785321dfec27948f35e20","name":"Becky","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/681853ad699aa8ca4006965a7bcd9b189f1024310a86dda5ca70051e3403cb4b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/681853ad699aa8ca4006965a7bcd9b189f1024310a86dda5ca70051e3403cb4b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/681853ad699aa8ca4006965a7bcd9b189f1024310a86dda5ca70051e3403cb4b?s=96&d=mm&r=g","caption":"Becky"},"sameAs":["https:\/\/x.com\/rebecca.griffin@cobweb.com"],"url":"https:\/\/cobweb.com\/ae\/content-hub\/author\/becky\/"}]}},"_links":{"self":[{"href":"https:\/\/cobweb.com\/ae\/wp-json\/wp\/v2\/posts\/4460","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cobweb.com\/ae\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cobweb.com\/ae\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cobweb.com\/ae\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/cobweb.com\/ae\/wp-json\/wp\/v2\/comments?post=4460"}],"version-history":[{"count":0,"href":"https:\/\/cobweb.com\/ae\/wp-json\/wp\/v2\/posts\/4460\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cobweb.com\/ae\/wp-json\/wp\/v2\/media\/4476"}],"wp:attachment":[{"href":"https:\/\/cobweb.com\/ae\/wp-json\/wp\/v2\/media?parent=4460"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cobweb.com\/ae\/wp-json\/wp\/v2\/categories?post=4460"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cobweb.com\/ae\/wp-json\/wp\/v2\/tags?post=4460"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}