In a blog post, Microsoft reasons that it worked on the new functionality as the Bring Your Own Device (BYOD) paradigm has taken on new meaning in the new hybrid work environment.
"The riskiest threat is the one you don't know about. Unmanaged devices are literally one of your weakest links…With work-from-home, the threat has grown exponentially, making discovering and applying security controls to these devices mission critical," says David Weston, Microsoft's director of enterprise and OS security.
We're looking at how our readers use VPN for a forthcoming in-depth report. We'd love to hear your thoughts in the survey below. It won't take more than 60 seconds of your time.
- Check our list of the best firewall apps and services
- These are some of the best disaster recovery services
- Here's our choice of the best malware removal software on the market
Unmanaged no more
Threat actors see a huge opportunity in unmanaged end-user devices as a means to get inside corporate networks. A compromised unmanaged device can be used as a launchpad to unleash broader attacks.
In fact, according to Microsoft’s chief information security officer Bret Arsenault said that users are 71% more likely to be infected on an unmanaged device. It points to the Equifax breach that affected well over 100 million users arguing that it originated via an unpatched vulnerability on an internet-facing unmanaged server.
The new unmanaged endpoint discovery is designed to avoid situations like these. The functionality will help customers detect and report upon any device seen on a corporate network. These devices can then be on-boarded and secured by Microsoft Defender for Endpoint.
One of the interesting features of the new functionality is a built-in logic that can differentiate between corporate and personal networks to ensure it doesn’t accidentally show your private devices not controlled by the organization in the inventory list.
In addition to Windows 10, Microsoft Defender for Endpoint works across other popular desktop operating systems including Linux, and macOS as well as on portable devices powered by iOS and Android. Furthermore, you can also use it to protect network devices such as routers, firewalls, WLAN controllers, and others.
- Protect your devices with these best antivirus software
Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
With almost two decades of writing and reporting on Linux, Mayank Sharma would like everyone to think he’s TechRadar Pro’s expert on the topic. Of course, he’s just as interested in other computing topics, particularly cybersecurity, cloud, containers, and coding.