ASD's Blueprint for Secure Cloud

Microsoft Defender

This section describes the configuration of Microsoft Defender associated with systems built according to the guidance provided by ASD's Blueprint for Secure Cloud.

Estimated reading time: 2 minutes

Automated Configuration Deployment

Overview

Some of the Defender configuration can be automatically deployed

ConfigurationBlueprint Automation Provided
EndpointsYes (DSC)
SettingsNo

Desired State Configuration

Before using the below Microsoft 365 Desired State Configuration (DSC) file, please refer to Automated Deployment for instructions.

Desired State Configuration File
Download Defender DSC (.ps1)
Note: download the linked .txt file and rename to .ps1
Configuration Data File:
The Configuration Data File can be found on the Automated Deployment page.

Endpoints

This section describes the configuration of endpoints within Microsoft Defender associated with systems built according to the guidance provided by ASD's Blueprint for Secure Cloud.

Settings

This section describes the configuration of Microsoft Defender associated with systems built according to the guidance provided by ASD's Blueprint for Secure Cloud.

Do you have a suggestion on how the above page could be improved? Get in touch! ASD's Blueprint for Secure Cloud is an open source project, and we would love to get your input. Submit an issue on our GitHub, or send us an email at blueprint@asd.gov.au

Acknowledgement of Country icon

Acknowledgement of Country
We acknowledge the Traditional Owners and Custodians of Country throughout Australia and their continuing connections to land, sea and communities. We pay our respects to them, their cultures and their Elders; past, present and emerging. We also recognise Australia's First Peoples' enduring contribution to Australia's national security.

Authorised by the Australian Government, Canberra