Microsoft Defender
This section describes the configuration of Microsoft Defender associated with systems built according to the guidance provided by ASD's Blueprint for Secure Cloud.
Estimated reading time: 2 minutes
Instruction
The below pages outline the as built configuration for ASD’s Blueprint for Secure Cloud (the Blueprint) for the Defender portal blade at the following URL:
https://security.microsoft.com/
The settings described on these pages should be used to provide reference to a baseline implementation for a system configured using the Blueprint. Any implementation implied by these pages should not be considered as prescriptive as to how an organisation must scope, build, document, or assess a system.
Implementation of the guidance provided by the Blueprint will differ depending on an organisation’s operating context and organisational culture. Organisations should implement the Blueprint in alignment with their existing change management, business processes and frameworks.
When using automated configuration files, organisations should note they will configure the relevant settings in a Microsoft 365 tenancy exactly as outlined in the Configuration pages of the Blueprint. Organisations should ensure they customise configuration of their Microsoft 365 tenancies in accordance with their own design decisions and requirements, deviating from the Blueprint (including automated configuration files) where appropriate.
Placeholders such as <ORGANISATION.GOV.AU>
, <BLUEPRINT.GOV.AU>
and <TENANT-NAME>
should be replaced with the relevant details as required.
Automated Configuration Deployment
Overview
Some of the Defender configuration can be automatically deployed
Configuration | Blueprint Automation Provided |
---|---|
Endpoints | Yes (DSC) |
Settings | No |
Desired State Configuration
Before using the below Microsoft 365 Desired State Configuration (DSC) file, please refer to Automated Deployment for instructions.
Desired State Configuration File |
---|
Download Defender DSC (.ps1) Note: download the linked .txt file and rename to .ps1 |
Configuration Data File: |
The Configuration Data File can be found on the Automated Deployment page. |
Endpoints
This section describes the configuration of endpoints within Microsoft Defender associated with systems built according to the guidance provided by ASD's Blueprint for Secure Cloud.
Settings
This section describes the configuration of Microsoft Defender associated with systems built according to the guidance provided by ASD's Blueprint for Secure Cloud.