Microsoft Defender for Endpoint now generally available on Windows 10 on ARM devices
Apr 5, 2021 17:10 EDT with 2 comments
Microsoft announced today that it has expanded support for Microsoft Defender for Endpoint (formerly known as Microsoft Defender Advanced Threat Protection) to Windows 10 on ARM and the feature is now generally available on all such devices. Microsoft Defender for Endpoint (MDE) is a cloud-powered enterprise endpoint security solution provided by Microsoft for the protection and security of endpoint devices on an enterprise network.
Microsoft believes that the shift to ARM devices is essential as the inherent efficiency of the ARM architecture allows for various form factor devices and enables people to gradually adapt to a new hybrid work environment nowadays. Of course, the security of such devices, Microsoft feels, must be of utmost importance to the enterprises. Here s what the Redmond firm has to say:
MSRC Team / December 21, 2020 March 4, 2021
UPDATE: Microsoft continues to work with partners and customers to expand our knowledge of the threat actor behind the nation-state cyberattacks that compromised the supply chain of SolarWinds and impacted multiple other organizations. Microsoft previously used ‘Solorigate’ as the primary designation for the actor, but moving forward, we want to place appropriate focus on the actors behind the sophisticated attacks, rather than one of the examples of malware used by the actors. Microsoft Threat Intelligence Center (MSTIC) has named the actor behind the attack against SolarWinds, the SUNBURST backdoor, TEARDROP malware, and related components as NOBELIUM. As we release new content and analysis, we will use NOBELIUM to refer to the actor and the campaign of attacks and we have updated references appropriate in this document below.
December 18, 2020 Analyzing Solorigate, the compromised DLL file that started a sophisticated cyberattack, and how Microsoft Defender helps protect customers Microsoft 365 Defender Research Team Microsoft Threat Intelligence Center (MSTIC) Share
UPDATE: Microsoft continues to work with partners and customers to expand our knowledge of the threat actor behind the nation-state cyberattacks that compromised the supply chain of SolarWinds and impacted multiple other organizations. Microsoft previously used ‘Solorigate’ as the primary designation for the actor, but moving forward, we want to place appropriate focus on the actors behind the sophisticated attacks, rather than one of the examples of malware used by the actors. Microsoft Threat Intelligence Center (MSTIC) has named the actor behind the attack against SolarWinds, the SUNBURST backdoor, TEARDROP malware, and related components as NOBELIUM. As we release new content and analysis, we will use NOBELIUM to