Azure, Cloud Computing

4 Mins Read

Microsoft Endpoint Security: Block Extensions of Google Chrome and Microsoft Edge

Voiced by Amazon Polly

Introduction

Microsoft Endpoint Security, formerly Microsoft Defender Advanced Threat Protection (ATP), is a comprehensive security solution designed to help organizations protect their devices, data, and identities from modern-day cyber threats. With increasing cyberattacks, malware, and advanced persistent threats (APTs), businesses must have a robust endpoint security solution to safeguard their systems.

Pioneers in Cloud Consulting & Migration Services

  • Reduced infrastructural costs
  • Accelerated application deployment
Get Started

What is Microsoft Endpoint Security?

Microsoft Endpoint Security is a cloud-based solution that provides real-time protection against cyber threats.

It combines multiple security technologies, including antivirus, firewall, and endpoint detection and response (EDR), to provide a comprehensive security solution for organizations.

How Does Microsoft Endpoint Security Work?

Microsoft Endpoint Security provides multiple layers of security to protect against various threats.

The following are some of the key features of Microsoft Endpoint Security:

  1. Antivirus and Anti-Malware – Microsoft Endpoint Security uses advanced antivirus and anti-malware technologies to detect and prevent malware from infecting devices. It can detect and remove viruses, spyware, and other malicious software that may compromise the security of an organization’s network.
  2. Firewall – The solution also includes a firewall that helps block unauthorized access to an organization’s network. The firewall monitors incoming and outgoing network traffic and blocks any suspicious activity that may indicate a cyber attack.
  3. Endpoint Detection and Response – Microsoft Endpoint Security also includes endpoint detection and response (EDR) capabilities, which allow security teams to investigate and respond to threats quickly. The EDR technology provides real-time visibility into threats across endpoints, allowing security teams to identify and contain threats before they cause significant damage.
  4. Cloud-based Protection – The solution is cloud-based, which can be deployed quickly and easily across an organization’s devices. It provides real-time threat intelligence and updates, protecting organizations against the latest threats.

Benefits of Microsoft Endpoint Security to Organization

  1. Improved Threat Detection and Response – The solution provides real-time visibility into threats across endpoints, identities, and cloud environments, allowing security teams to quickly identify and respond to threats. This helps to minimize the impact of cyberattacks and prevent data breaches.
  1. Centralized Management – Microsoft Endpoint Security provides a centralized management console that allows security teams to manage and monitor security across all devices and endpoints. This makes deploying security policies and updates easier, ensuring all devices are up-to-date and protected against the latest threats.
  2. Cloud-based Protection – The solution is cloud-based, which can be deployed quickly and easily across an organization’s devices. This helps to reduce the cost and complexity of managing multiple security solutions.
  3. Integration with Other Microsoft Products – Microsoft Endpoint Security integrates seamlessly with other Microsoft products, including Microsoft 365 and Azure Active Directory. This provides a holistic security solution for organizations that use multiple Microsoft products.
  4. Cost-Effective – Microsoft Endpoint Security is a cost-effective solution for organizations looking to improve their endpoint security. It offers a range of security technologies at a competitive price, making it accessible to organizations of all sizes. Pricing details: https://www.microsoft.com/en-in/microsoft-365/compare-microsoft-365-enterprise-plans

In this blog, you can understand how to control/block the browser extension to protect organization devices from the malware.

Steps to Block Browser Extensions

  1. Go to Intune portal: https://endpoint.microsoft.com/
  • In the left blade, click devices. In devices, search for Windows and click on it.

step1

2. Create a new profile in Windows on the left blade Inside configuration profiles.

step2

3. In the profile, choose “Windows 10 and later” and “setting catalog” for the profile type and create it.

step3

4. After creating a profile, configure all the basic details and click next.

step4

5. Click on Add setting, search extension, select the extension of Microsoft Edge & Chrome, and click next.

step5

step5b

6. Select the group to assign the policy to specific users or add all users.

step6

7. Review and create the profile.

step7

8. Now try to add any extension in the browser, and it won’t allow it.

step8

step8b

Conclusion

In today’s world, where cyber threats are becoming more sophisticated, organizations must have a comprehensive endpoint security solution. Microsoft Endpoint Security provides a range of security technologies, including antivirus, firewall, and endpoint detection and response, to protect against modern-day cyber threats. It also offers real-time visibility into threats across endpoints and identities.

Making IT Networks Enterprise-ready – Cloud Management Services

  • Accelerated cloud migration
  • End-to-end view of the cloud environment
Get Started

About CloudThat

CloudThat is also the official AWS (Amazon Web Services) Advanced Consulting Partner and Training partner and Microsoft gold partner, helping people develop knowledge of the cloud and help their businesses aim for higher goals using best in industry cloud computing practices and expertise. We are on a mission to build a robust cloud computing ecosystem by disseminating knowledge on technological intricacies within the cloud space. Our blogs, webinars, case studies, and white papers enable all the stakeholders in the cloud computing sphere.

Drop a query if you have any questions regarding Microsoft Endpoint Security and I will get back to you quickly.

To get started, go through our Consultancy page and Managed Services Package that is CloudThat’s offerings.

FAQs

1. Can we allow specific extensions to be installed?

ANS: – Yes, it can be done by specifying extension IDs in configure extensions allow list.

2. Do I need any license to implement this policy?

ANS: – Enterprise Mobility + Security E3 or above license is required. Ref. https://www.microsoft.com/en-in/microsoft-365/enterprise-mobility-security/compare-plans-and-pricing

3. Does it work for Windows 8?

ANS: – No, it does not support Windows 8. The minimum platform requirement is Windows 10.

WRITTEN BY Kashyap Nitinbhai Shani

Kashyap Nitinbhai Shani is a Research Associate at CloudThat. He is interested to learn advanced technologies and gain insights into new and upcoming cloud services. He likes writing tech blogs and learning new languages.

Share

Comments

    Click to Comment

Get The Most Out Of Us

Our support doesn't end here. We have monthly newsletters, study guides, practice questions, and more to assist you in upgrading your cloud career. Subscribe to get them all!