

These were generally not allowed to have any external connectivity unless there was a specific application or business case that required this (The traditional model).įast forward a few years. Historically, specific server workloads are likely to have been protected behind a firewall within a physical datacenter location. Let's begin by focusing on the essential aspect: the "mental shift." The aim here is not to intimidate you, but rather to ensure that you grasp the "mental shift" and comprehend how various Microsoft 365 products work together to secure your disconnected devices.

Looking at how Defender for Endpoint is designed we can make a few observations: This requires a mental shift in our understanding of what “risk” means with a cloud-first product. The objective of this article, along with the two previous articles, is to provide you with a better understanding of Defender for Endpoint and how it works in a disconnected environment. The first two articles can be found here and here.

This article is part of a group of articles regarding Defender for Endpoint and disconnected environments.
