Try our new research platform with insights from 80,000+ expert users
Nim Nadarajah - PeerSpot reviewer
Partner & Director Advisory Services at a consultancy with 11-50 employees
Reseller
Sep 8, 2022
A native Microsoft solution the provides great ROI and continuously improves its offering
Pros and Cons
  • "They have a very transparent roadmap for the product."
  • "The price point is something they can improve slightly for those who don't have an M 365 E5."

What is our primary use case?

We've used it in many different scenarios, including enterprise and SMB - all kinds of different situations.

It really depends on how people want to receive their threat intel. Most people want to keep it in Microsoft using the Defender console. Some people just ask to fill in Sentinel and integrate it with Azure Sentinel. Some people want those events going into their SIM. We've had all of the above use cases.

What is most valuable?

One of the most valuable aspects is that Defender is a native Microsoft solution. 

You own your own data. With CrowdStrike and Rapid7, and other products, your log data leaves your tenant, it goes into their system, and they produce the analysis on their technology. Therefore, although you're running the agent instead of giving them the signals, you're really giving up a lot of your data for their own personal gain. Defender's biggest competitive advantage is that your data stays within your tenant, and you own it.

It naturally keeps getting better and better. They have a very transparent roadmap for the product. We don't have any concerns or complaints. Defender exceeds expectations, especially for someone who's flipping from CrowdStrike or Falcon XR. This is night and day.

What needs improvement?

We have Microsoft bias. We generally don't have any significant negative feedback or improvement points around Defender, EDR and CMDR platforms. It does a good job across the board. 

The price point is something they can improve slightly for those who don't have an M 365 E5. I believe it's a $2.80 cents add-on. In Canadian, that's expensive. If they can drop it to a dollar, for those who don't have M 365 E5, they're going to open up market share and increase affordability for an entire market segment in the medium business category. Other than that, we have no major negative feedback.

For how long have I used the solution?

We've been a security company since 2007. Since the day Defender was born, we've been dealing with it.

Buyer's Guide
Microsoft Defender Threat Intelligence [EOL]
January 2026
Learn what your peers think about Microsoft Defender Threat Intelligence [EOL]. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
881,733 professionals have used our research since 2012.

What do I think about the stability of the solution?

I have not met a more stable product before.

What do I think about the scalability of the solution?

The clients we deal with are big, many with 33,000 to 50,000 endpoints.

It is fantastically scalable. 

How are customer service and support?

We're a premier partner with premier support and we're a Premier Gold Partner. We bought Microsoft Premier Support. We have zero complaints. We pick up the phone a hundred percent of the time and get the help we need.

Which solution did I use previously and why did I switch?

We've dealt with solutions such as CrowdStrike and Rapid7.

How was the initial setup?

You need to have a partner install it. Microsoft is a partner-to-partner-driven ecosystem. It is complex. You need depth and knowledge of understanding of security, as well as Microsoft technology. It's not something you can right-click, install, and go next, next, next, and it just works. And nor should any security product be that way. If you don't know what you're doing, you shouldn't be installing it.

It requires a proper design, and it requires a proper thought process before you can just roll it out.

You have to have a proper implementation strategy and a backup plan. Typically, we like to use SCCM or Intune to push and manage deployments with proper scripts since we're usually uninstalling a Carbon Black or a McAfee or a Symantec while we're putting in Defender. And we're touching servers and users, so we want to minimize the number of times we touch these things. The more times you touch a server, the chances are you will run into a problem. So we like to group our uninstall and install scripts, reboot all at once, and streamline the installation. 

There's a lot of testing that goes on. In an organization with 50,000 endpoints, we're testing 5,000 devices before rolling anything out. The rollout is scheduled. It's complicated. It happens at night. There's a batch. You do them in batches as you don't want to go straight at it. We will turn it on for 5,000 things at the same time. The average implementation for a 200-user company should take between three to four months.

The beauty of Microsoft, if you have a Microsoft environment, is you just need Microsoft people to maintain it. Your existing IT department can keep the product up to date with Patch Tuesday. There is not an out-of-cycle update required. That's what I keep driving home to people, how many third-party products do you want to maintain, patch, secure, troubleshoot, and bug fix for? Pick one platform, put all your eggs in that basket, and do an outstanding job at securing that basket. That's what Defender helps you do.

What was our ROI?

From a client perspective,  the return on investment comes by streamlining on one platform like Microsoft. By eliminating third-party platforms, you save about 62% on your technology or your security budget. Then you also broaden the depth of your security intelligence since Microsoft is the only system with 1.3 trillion security signals daily. You're getting a more comprehensive threat intel, plus you're getting it on a single pane of glass.

What other advice do I have?

We're a Microsoft partner and reseller.

I'd rate the product ten out of ten. 

It aligns with the best practice philosophy of proper security organizations. It is cost-effective. It flattens your threat plane to a single pane of glass. It allows you to manage your environment with a standard, generally available skill set in the marketplace. Therefore, you're saving money on staffing your IT team as well. You get those savings of 62% by moving to an all-in-one Microsoft solution.

Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
PeerSpot user
IT infrastructure lead at a wellness & fitness company with 1-10 employees
Real User
Top 5
Jun 9, 2024
Provides an ease of deployment and efficient security features
Pros and Cons
  • "The product is stable."
  • "There could be a better notification system."

What is our primary use case?

The product helps us monitor business devices for authentication and response on all endpoints, servers, passwords, and plans.

How has it helped my organization?

The primary value is enhanced security and efficient incident response. The integration with Microsoft infrastructure provides a seamless experience.

What is most valuable?

The product's ease of deployment is a major advantage, as it integrates seamlessly with our existing systems. The dashboard and backend profile provide comprehensive visibility into user activities and potential threats. Additionally, the product offers valuable security insights and advice on areas for improvement.

What needs improvement?

There could be a better notification system. Currently, the user sees an icon, but it would be beneficial to have messages prompting them to contact IT immediately or take their device offline if necessary.

I would like to see more system automation actions, such as user-initiated tests or more proactive alerts.

For how long have I used the solution?

I have been using Microsoft Threat Intelligence for a few years now. 

What do I think about the stability of the solution?

The product is stable. 

What do I think about the scalability of the solution?

Scalability is quite flexible and depends on purchasing the appropriate licenses for the company.

How was the initial setup?

The setup is straightforward, typically taking about 15 minutes to an hour. The system allows for smooth switching between devices, whether online or offline.

What's my experience with pricing, setup cost, and licensing?

The product is a part of my Microsoft 365 subscription, so there is no additional cost. It is cost-effective.

What other advice do I have?

Unless you have very complex requirements, if you are already paying for a Microsoft subscription, you should take advantage of Microsoft Defender.

I rate it a nine out of ten. 

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Microsoft Defender Threat Intelligence [EOL]
January 2026
Learn what your peers think about Microsoft Defender Threat Intelligence [EOL]. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
881,733 professionals have used our research since 2012.
Siddhant  Upadhyay - PeerSpot reviewer
Risk Operations at a tech services company with 1,001-5,000 employees
Real User
Top 20
May 30, 2024
The intuitive user interface and reporting are positive features
Pros and Cons
  • "The most valuable aspects are its integration capabilities with other Microsoft products like Intune, Office 365, and Azure cloud applications."
  • "While the current setup meets our needs, Microsoft can constantly improve customization and adaptability to rapidly evolving cybersecurity threats."

What is our primary use case?

We employ this solution within our Office 365 environment, focusing primarily on email security through features like application guard, safe attachments, and safe URLs. This setup significantly aids our cybersecurity operations, helping us mitigate various threats. The team is designing a couple of policies and will revise the usage depending on the threat.

How has it helped my organization?

The solution has notably improved our IT operations by facilitating seamless integration with other Microsoft tools like Intune and Azure. This integration simplifies our IT management process and enhances our overall cybersecurity framework.

What is most valuable?

The most valuable aspects are its integration capabilities with other Microsoft products like Intune, Office 365, and Azure cloud applications. The intuitive user interface and reporting are also positive features of the solution. These features provide a unified experience, making it easier for our IT team to manage and navigate between screens efficiently.

What needs improvement?

While the current setup meets our needs, Microsoft can constantly improve customization and adaptability to rapidly evolving cybersecurity threats. 

The stability of the solution also requires some improvement. 

Future releases could benefit from enhanced predictive analytics tools and deeper AI integration to better predict and mitigate potential threats.

For how long have I used the solution?

I have been using Microsoft Defender Threat Intelligence for six months. My company has a partnership with Microsoft, giving us access to their latest security enhancements.

What do I think about the stability of the solution?

The solution is stable, scoring an eight out of ten, indicating a reliable performance with room for minor improvements.

What do I think about the scalability of the solution?

Due to limited endpoints, scalability is not our primary concern currently. But as of now, the endpoints and the infrastructure we have are covered with the tools we already have. The existing setup adequately supports our needs without requiring significant scaling. Regularly, two hundred and fifty users use the solution.

How are customer service and support?

We already have competent engineers on our team. While we rarely need external support or have raised a ticket, our interactions with Microsoft's customer service have generally been satisfactory, fulfilling most of our technical needs, if not all and the answers that we were seeking.

How would you rate customer service and support?

Positive

How was the initial setup?

The setup was straightforward, aligning with our move towards cloud-based operations and authentication of our users and policies, thus simplifying the overall deployment process.

What's my experience with pricing, setup cost, and licensing?

The solution is relatively expensive; however, our status as a gold partner provides us with several complimentary licenses, which offsets the cost.

What other advice do I have?

Currently, we are only using Office 365 and Defender for Endpoint 32-bit. Previously, one from our management was a part of the trial, but not anymore. As we have layers of policies placed, they cover everything. 

Microsoft is very dynamic, and when it comes to their products, sometimes they change the licensing cost or the features. So, I think the product should have a license model. Since we read about Micorosft daily as users, we should be aware of the changes they bring. 

I rate the overall solution an eight out of ten. 

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer2000751 - PeerSpot reviewer
IT Manager at a energy/utilities company with 10,001+ employees
Real User
Top 20
Dec 14, 2023
The tool enables us to detect potential breaches and react to them proactively
Pros and Cons
  • "The tool can proactively detect potential incidents."
  • "The price could be improved."

What is our primary use case?

The solution is used for threat intelligence. The tool enables us to detect potential breaches and react to them proactively. Alerts are sent to our SOC team. Our SOC team investigates whether it's a positive or a negative alert. Depending on the result, a playbook is started.

What is most valuable?

The product runs so smoothly in the back end that we don't experience a hands-on. There is no performance degradation. It does what it is supposed to do. It detects what it is supposed to detect. We are happy with the tool. We didn't have an active incident for the last couple of years. The tool can proactively detect potential incidents.

What needs improvement?

The price could be improved.

For how long have I used the solution?

I have been using the solution for five years. We've always tried to use the latest version, which the vendor recommends.

What do I think about the stability of the solution?

I rate the tool’s stability a ten out of ten.

What do I think about the scalability of the solution?

I rate the tool’s scalability an eight out of ten. We have more than 10,000 users. Occasionally, we have some complaints about the performance, but those are unique cases. We have a 90% positive experience with the solution. We can manage the security with a global team of less than 30 people.

How was the initial setup?

I am a technical person, and it is simple for me to handle the deployment. It is a major project. We assess the potential impact in the analysis phase. It takes a couple of months since we're a global company. We have to rely on external sources. From analysis to implementation, it took about six months to replace and implement a new security tool fully.

What was our ROI?

We are proactively detecting attacks. A few of them were real targeted attacks, and we were able to avoid them. The fact that we could deliver it to the business gives value to the product.

What's my experience with pricing, setup cost, and licensing?

The price is reasonable for the quality that the tool provides. Every given product with an ecosystem has a very low price to attract customers. Once people are satisfied, the vendors tend to increase the prices. It's a closed ecosystem, and they benefit from the ecosystem. They tend to mention that the price rise is due to inflation, but we all know it's about revenue.

Which other solutions did I evaluate?

We evaluate several vendors and products. Microsoft Defender Threat Intelligence’s integrity with our existing ecosystem was a big benefit. We evaluated the tool with a red team/blue team approach. It was the best product evaluated by our teams.

What other advice do I have?

I contact Microsoft when we have to do negotiations or technical improvements. People considering buying security tools must take their time and not rush. They must consider their business requirements and what they want to achieve. They must ensure that they have considered everything that impacts the user experience. Overall, I rate the product an eight out of ten.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer2398542 - PeerSpot reviewer
Founder & CEO at a consultancy with 1-10 employees
Reseller
Top 20
May 22, 2024
Offers effortless integration with cloud-based infrastructure and can mitigate attacks with actionable insights
Pros and Cons
  • "Offers easy integration with a cloud-based infrastructure"
  • "A stable licensing model is absent"

What is our primary use case?

At our company, we use Microsoft Defender Threat Intelligence for vulnerability management. The solution's infrastructure and overall software are improving. 

What is most valuable?

A new valuable feature from the solution allows an user to close all tickets from a single console. At our company, we are also working on the CM side to analyze the solution's behavior and we have noticed that our customers prefer to use a single console. 

What needs improvement?

A stable licensing model is absent with Microsoft Defender Threat Intelligence. Implementation of the product can be difficult if the team on the customer's end is not willing to work on pilots. 

For how long have I used the solution?

I have been using the solution for five years. 

How are customer service and support?

I am satisfied with the technical support provided for the solution. I would rate technical support an eight out of ten. 

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I find the Sentinel solution, its Hunting feature, automation rules, and customization rules valuable. Our company sometimes recommends Carbon Black, CrowdStrike, and Fidelis instead of Microsoft Defender Threat Intelligence because there have been fewer security incidents. 

How was the initial setup?

The product can be easily implemented for customers who are already using Microsoft Cloud. For hybrid or on-prem customers of our organization, deployment is difficult. 

What's my experience with pricing, setup cost, and licensing?

With Microsoft, at our company, we have one or three-year TCO, and we have to renew the license for this solution two times per year. I am looking to integrate a CRM product from Microsoft with the solution so that the pricing is more reasonable and transparent.

At our company, we are willing to integrate multiple Microsoft solutions: EDR for infrastructure and server end, another for vulnerability, and Microsoft Defender Threat Intelligence for endpoint security, and we offer the same to our customers.

The implementation cost versus the license cost needs to be analyzed for Microsoft Defender Threat Intelligence. When some of our company's customers are not comfortable with Microsoft products, we provide them with a different option. 

What other advice do I have?

Real-time threat detection usage of the solution depends upon the varying strategies and maturity of our organization's customers. At our company, we are implementing the mesh as well as cybersecurity laws. Our company is focusing on implementing observations instead of threat hunting with Microsoft Defender Threat Intelligence.  

At our company, we are offering Sentinel solutions to Tier-1 customers. The integration capabilities of the solution have improved the security posture of our customers but it also depends upon the maturity. Few of the customers of our company are using an in-house solution so they are aware of the posture and the rating. Our organization offers solutions to the customers, but often, they develop their own road map for expansion. 

The actionable insights of the solution have aided in incident response by mitigating major attacks. Our company rarely utilizes customization options for the solution, as customers can start using the product comfortably in the default configuration. For vulnerability management with Microsoft Defender Threat Intelligence, our company needs to adapt and apply the processes followed by the customer's organization; there are limited opportunities for customization.

I would recommend the product to others. But as part of our company offerings, a pilot can also be provided to the customers for comparison on the KPIs. I am satisfied with the product as it meets all the expectations on the infrastructure and security aspects. A user should choose between Microsoft Defender Threat Intelligence and other competitive products after verifying the feature expectations. 

I would overall rate the product an eight out of ten. The product can be effortlessly integrated with the existing system of cloud based customers. 

Disclosure: My company has a business relationship with this vendor other than being a customer. Reseller
PeerSpot user
DineshKumar25 - PeerSpot reviewer
Solution architect at a tech vendor with 5,001-10,000 employees
MSP
Top 5Leaderboard
Mar 5, 2024
Provides threat detection capabilities and protects the environment from zero-day attacks
Pros and Cons
  • "The product’s most valuable feature is the ability to provide threat detection and protection simultaneously."
  • "One area where Microsoft Defender could be improved is in its support for non-Microsoft products, particularly for systems running Linux or other open-source platforms across ecosystems."

What is our primary use case?

We use the product for endpoint security of machines. It includes threat detection, defining compliance rules, and governance policies. It helps us with extracting reports as well.

How has it helped my organization?

The platform ensures that the environment is fully protected. Its operational excellence helps us reduce resource costs. We do not need a large team to manage security. The subscription models provide monthly and short-term -plans. We can the number of items scale according to the requirements, and dynamically adjust resources during lean periods. It doesn’t require us to purchase long-term licensing plans.

What is most valuable?

The product’s most valuable feature is the ability to provide threat detection and protection simultaneously. It doesn’t require additional power for processing similar to other products.

What needs improvement?

One area where Microsoft Defender could be improved is in its support for non-Microsoft products, particularly for systems running Linux or other open-source platforms across ecosystems.

For how long have I used the solution?

We have been using Microsoft Defender Threat Intelligence for five years.

What do I think about the scalability of the solution?

We have 7000 Microsoft Defender Threat Intelligence users. It scales automatically depending on the requirements. It is a highly available application.

How are customer service and support?

The technical support team responds immediately to the queries.

How would you rate customer service and support?

Positive

How was the initial setup?

The initial setup is straightforward. It has a good amount of documentation available to refer to the steps. It is a cloud-based application and thus, easy to implement compared to an out-of-the-box version. It can be deployed on endpoint devices as well.

What's my experience with pricing, setup cost, and licensing?

The product has multiple subscription models. The pricing is expensive, but it is justifiable considering the amount of threat-related information it provides.

What other advice do I have?

The platform is built for threat detection and protection. It saves the environment from zero-day attacks. It offers an intermittent mechanism for new operating system updates. It can be integrated with many enterprise-grade solutions. We can build APIs and explore the logs as well.

Microsoft Defender has played a crucial role in addressing security incidents related to auditing and compliance within our organization. During audits, a common requirement is to ensure that the environment is fully patched, updated, and compliant with all necessary security measures. With Defender in place, it allows auditors direct access to relevant reports, and verify them.

I advise others to use the product if they are planning to move to a cloud environment. It gives a sufficient amount of information or threat intelligence data.

I rate it a nine out of ten.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Deputy Manager - Radio Frequency Planning at a tech services company with 201-500 employees
Real User
Top 5Leaderboard
Feb 6, 2024
Highly effective safeguarding against cyber threats with robust security features, timely threat intelligence and efficient performance
Pros and Cons
  • "Its user-friendliness is its most valuable aspect."
  • "It would be beneficial to enhance the pricing structure and make it more affordable."

What is our primary use case?

The protection provided by Microsoft Defender Threat Intelligence is robust and effective.

How has it helped my organization?

It efficiently helped us in threat hunting.

The malware virus posed significant security challenges, but Microsoft played a pivotal role in addressing and resolving the incident.

The timeliness and accuracy of Threat Intelligence are commendable.

The primary advantage lies in its robust security and overall performance.

What is most valuable?

Its user-friendliness is its most valuable aspect. I am satisfied with its performance in general.

What needs improvement?

It would be beneficial to enhance the pricing structure and make it more affordable.

For how long have I used the solution?

I have been using it for six months.

What do I think about the stability of the solution?

It provides good stability capabilities with occasional delays. I would rate it eight out of ten.

What do I think about the scalability of the solution?

I would rate its scalability abilities eight out of ten.

Which solution did I use previously and why did I switch?

I used Norton previously, but that was quite some time ago.

How was the initial setup?

The initial setup was straightforward.

What about the implementation team?

Deployment is quick, typically ranging from five to ten minutes. I was responsible for the deployment. First, you need to install the antivirus software on the system. Then proceed with the installation process.

What's my experience with pricing, setup cost, and licensing?

It's reasonably priced, though there's room for further improvement.

What other advice do I have?

I would recommend it because of its strong security and user-friendly interface. Overall, I would rate it eight out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer2311968 - PeerSpot reviewer
Assistant Vice President at a financial services firm with 10,001+ employees
Real User
Nov 28, 2023
Though the tool offers threat prevention and blocking capabilities, it needs to improve its stability
Pros and Cons
  • "The product's initial setup phase was straightforward."
  • "The stability of the product is an area of concern where improvements are required."

What is our primary use case?

I use Microsoft Defender Threat Intelligence at my home for its threat prevention and blocking capabilities.

What is most valuable?

I can't comment on the valuable features offered by Microsoft Defender Threat Intelligence as the PC at my home is currently used by my family while I use my office laptop.

What needs improvement?

In Microsoft Defender Threat Intelligence, automatic threat blocking and in-memory attacks are areas of concern where improvements are required.

The stability of the product is an area of concern where improvements are required.

For how long have I used the solution?

I have been using Microsoft Defender Threat Intelligence for a couple of years. I am a user of the product.

What do I think about the stability of the solution?

It is a stable solution. I rate the product's stability a six out of ten.

What do I think about the scalability of the solution?

It is not a scalable solution since I use it on a PC at home, so per PC, a license amount is paid.

Only one person uses the solution at my home.

How was the initial setup?

The product's initial setup phase was straightforward.

The product's installation phase just requires me to enable it on my system, as Microsoft Defender Threat Intelligence is a product that came along when I purchased my laptop.

The product is deployed based on the product's licenses, so it doesn't matter whether it is deployed on an on-premises model or on the cloud.

What was our ROI?

The basic requirements offered by the product are good enough for home-based PCs.

What's my experience with pricing, setup cost, and licensing?

I use the product's default version, which is a free one and not the licensed version.

What other advice do I have?

I rate the overall product a six to seven out of ten.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Microsoft Defender Threat Intelligence [EOL] Report and get advice and tips from experienced pros sharing their opinions.
Updated: January 2026
Buyer's Guide
Download our free Microsoft Defender Threat Intelligence [EOL] Report and get advice and tips from experienced pros sharing their opinions.