We use it for Cloud Security and Endpoint Protection. We have offices in each country on the planet. And so we have many, many, many external people who work with this solution.
Operational Cyber Security Specialist at a non-profit with 1,001-5,000 employees
Highly scalable and stable solution
Pros and Cons
- "It is very scalable. There are approximately 2,000 endpoints and up to 200 servers in our company."
- "It's a bit complicated to manage because you have many dependencies of servers, many dependencies in queue, and so on. Entries or different endpoints, and you make different configuration topics for each one. So that's a major problem."
What is our primary use case?
What needs improvement?
It's a bit complicated to manage because you have many dependencies of servers, many dependencies in queue, and so on. Entries or different endpoints, and you make different configuration topics for each one. So that's a major problem.
I would like to see a feature that would allow us to easily manage our Defender configurations.
It needs high-level administration.
For how long have I used the solution?
We have been using it for about six months.
What do I think about the stability of the solution?
It is a very stable product.
Buyer's Guide
Microsoft Defender Threat Intelligence [EOL]
January 2026
Learn what your peers think about Microsoft Defender Threat Intelligence [EOL]. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
881,082 professionals have used our research since 2012.
What do I think about the scalability of the solution?
It is very scalable. There are approximately 2,000 endpoints and up to 200 servers in our company.
Which solution did I use previously and why did I switch?
I used Trend Micro. Trend Micro has an easier grid, but the functions are the same.
The advantage is to have only one vendor, which provides Office tickets, communication, storage, and cloud. It's just one solution from one end, from one provider.
How was the initial setup?
We have our documents and processes in the cloud, in the Microsoft cloud.
The maintenance is done by Microsoft. We are on-premises, and our configuration allows access outside the company's local data center.
What other advice do I have?
I would recommend using this solution. It works. We have no problems with it.
Overall, I would rate the solution an eight out of ten.
Which deployment model are you using for this solution?
Hybrid Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Microsoft Azure
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Head, Threat Intelligence & Incident Management at a financial services firm with 10,001+ employees
A solution to monitor endpoints for threats but need integrated pricing
What is our primary use case?
We use it to monitor endpoints for threats and duplicates on the server and defend identity and trust.
What is most valuable?
The solution monitors threat intelligence. It provides valuable insight and visibility into malicious activity at the endpoint.
What needs improvement?
The solution could have integrated pricing. We have an enterprise license. We still need to pay to activate Defender for Trend Micro Identity. The enhanced pricing model will empower organizations to manage their security costs effectively.
What do I think about the stability of the solution?
The product is stable.
What do I think about the scalability of the solution?
The solution is scalable. In our organization, ten users are using this solution.
How are customer service and support?
We use Microsoft resources for access-level support.
Which solution did I use previously and why did I switch?
We initially used Trend Micro to defend endpoints. It's a solution that runs concurrently with our EDR. The setup serves and trains Trend Micro and EDR so they can play complementary roles. We activate all the licenses for some activities. We're using a combination of Trend Micro EDR and Defender.
How was the initial setup?
The initial setup is straightforward, and takes three days to activate it.
Since it is a cloud-based solution, you must activate and continue using the license.
What's my experience with pricing, setup cost, and licensing?
If you want to activate beyond the starting threshold, you have to pay an additional fee. Combining this within the license would be more scalable, economical, and better for the organization.
What other advice do I have?
Three or four people are required for the solution’s maintenance. I recommend this solution.
Since Microsoft Defender Threat Intelligence provides a high volume of recommendations, there must be a methodology for prioritizing high-risk assets and sessions. Focusing on remediating these high-risk sessions is crucial.
Overall, I rate the solution a seven out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Microsoft Defender Threat Intelligence [EOL]
January 2026
Learn what your peers think about Microsoft Defender Threat Intelligence [EOL]. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
881,082 professionals have used our research since 2012.
Security Manager at a computer software company with 11-50 employees
Efficient threat detection capabilities and highly scalable solution
Pros and Cons
- "The solution is well integrated with other Microsoft security products."
- "I would like to see more integration with other solutions. For example, integration well with Microsoft but not with other solutions."
What is our primary use case?
It can be used as an API solution to sign and send threat intelligence to a security operations center (SOC). This allows the SOC to detect and respond to threats more effectively.
What is most valuable?
Detection is good—also, analytics based on Gartner. The solution is also well integrated with other Microsoft security products.
What needs improvement?
I would like to see more integration with other solutions. For example, integration well with Microsoft but not with other solutions.
For how long have I used the solution?
I have been providing this solution for one year.
What do I think about the stability of the solution?
I would rate the stability a nine out of ten. We do not have a large number of users using the solution because it is not the technician's preferred solution.
We have around ten end users using this solution.
What do I think about the scalability of the solution?
There is no problem with scalability. The solution has a capacity of up to 10,000.
How are customer service and support?
Customer service and support are very good.
How was the initial setup?
The initial setup is very easy. It just takes a few days.
What about the implementation team?
The deployment process is simple. We used Microsoft Intune, Microsoft's software distribution tool, to deploy the solution to our endpoints.
We only needed one technician for the deployment. One to manage without interrupting and to manage this solution. All our technicians manage the platform for accounts.
What was our ROI?
The ROI is good because the solution provides good protection. The solution can help you to prevent data breaches, which can save you a lot of money.
What's my experience with pricing, setup cost, and licensing?
Usually, the licensing cost is yearly. But we got the solution through a solution distributor's agreement which usually helps. There are no additional costs.
What other advice do I have?
I surely recommend using this solution. The strongest point is integration capability with other Microsoft products.
Overall, I would rate the solution a nine out of ten.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Computer Networks and Systems Support Engineer at a real estate/law firm with 11-50 employees
Provides email protection, threat intelligence, and vulnerability scanning
Pros and Cons
- "The solution is one suite covering everything from email protection to threat intelligence and vulnerability scanning."
- "I would like to see more frequent updates, which is always better for security because of daily threats."
What is most valuable?
The solution is one suite covering everything from email protection to threat intelligence and vulnerability scanning. Microsoft keeps adding more features to the tool, and through one interface, you can see the whole attack path, the assets involved, and the users involved. It's a very good product if you're using mainly Microsoft products. Most of our machines are Microsoft Windows and Microsoft Windows servers.
What needs improvement?
I would like to see more frequent updates, which is always better for security because of daily threats.
What do I think about the stability of the solution?
Since it's cloud-based, the tool is mostly available. If an on-premises solution goes down, it only affects a few people, but if a cloud solution is down, it affects most customers. So, Microsoft is investing a lot in the stability and resilience of the solution. Microsoft Defender Threat Intelligence is a very stable solution.
What do I think about the scalability of the solution?
Microsoft Defender Threat Intelligence is a scalable solution. You just keep installing agents on the extra new machines in your network, and it automatically starts working. Around 100 users are using the solution in our organization.
How are customer service and support?
We have a support structure not directly with Microsoft but with one local vendor who has partnered with Microsoft. Their knowledge base, information, and training are all very good.
Which solution did I use previously and why did I switch?
I have previously worked with Sophos.
How was the initial setup?
The solution's initial setup is straightforward.
What's my experience with pricing, setup cost, and licensing?
On a scale from one to ten, where one is cheap and ten is expensive, I rate the solution's pricing a six or seven out of ten.
What other advice do I have?
Since the solution is more linked with Microsoft products, it gives you notifications of vulnerabilities, threats, or attacks happening currently. It flags them, and you can break them down to learn which asset or process started it. You can configure the product to report the same situation or similar alerts as false positives and not flag them. They are part of the business application
You can apply these rules to all the machines in the network because you would have similar users on other machines doing the same thing. If you see a threat or suspicious action, you can configure the tool to block the whole thing and apply the same rule on all the machines.
Microsoft is the market leader, and it's already innovating, adding more features, and integrating everything with its other products. The solution provides value for money. Microsoft had a different version for small licenses and introduced a new licensing structure so that small companies could have additional features at less cost. Otherwise, they would have to buy a really expensive license for big organizations.
Microsoft brought additional features into a small license for small and medium businesses. Microsoft keeps adding value to its products.
With Microsoft Defender Threat Intelligence, you have one product and one console to see everything. You don't have to buy multiple products to look at different security aspects. Microsoft keeps adding features to the product that are more than enough to monitor your entire suite.
Users have to learn the product and get free training and certification. It's always better to have training provided by the vendor. Very few market leaders invest in providing training.
Overall, I rate the solution a nine out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Helps us with threat detection; and it just runs in the background
Pros and Cons
- "It just runs in the background. I don't have to worry about, making sure it's Intelligence. So, you know, this kind of makes it very easy, have to worry about installing. It is easy to use."
- "I would like for there to be extra confirmation that there aren't viruses. Even if the virus detection software is always running there could be hidden applications that are using the computer."
What is our primary use case?
We use Defender Threat Intelligence for threat detection.
What is most valuable?
The most valuable aspect is that it just runs in the background. I don't have to worry about its intelligence. It is easy to use.
What needs improvement?
I would like for there to be extra confirmation that there aren't viruses. Even if the virus detection software is always running there could be hidden applications that are using the computer.
For how long have I used the solution?
I have been using Microsoft Defender Threat Intelligence for three years.
What do I think about the stability of the solution?
It is a stable solution. I rate the stability nine out of ten.
How are customer service and support?
The technical support is good. They are good at fixing any issues we have.
How was the initial setup?
The initial setup is easy.
What's my experience with pricing, setup cost, and licensing?
The pricing of the solution is good.
What other advice do I have?
Overall I would rate the solution a nine out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
IT Security Manager at a non-profit with 11-50 employees
Stable software with valuable malware-scanning features
Pros and Cons
- "The product's anti-spam and malware-scanning features are useful. We scan email attachments, documents, and malicious codes."
- "The software is expensive."
What is our primary use case?
We use the software to scan malware for email attachments by identifying and blocking phishing emails.
What is most valuable?
The product's anti-spam and malware-scanning features are useful. We scan email attachments, documents, and malicious codes.
What needs improvement?
The software is expensive.
For how long have I used the solution?
We have been using Microsoft Defender Threat Intelligence for almost a year now.
What do I think about the stability of the solution?
The software is stable, similar to Office 365.
What do I think about the scalability of the solution?
We have 400 Microsoft Defender Threat Intelligence users. It is a scalable product. However, the cost increases as we increase the number of users.
How are customer service and support?
We receive technical support services via the integrator as well as the vendor.
How was the initial setup?
The software is deployed on the cloud. The setup requires technical knowledge or assistance from the integrators.
What was our ROI?
The product generates ROI for securing the company resources at minimum cost. We don't need to employ two to three analysts for this purpose.
What's my experience with pricing, setup cost, and licensing?
It is an expensive product. We purchase its yearly license.
Which other solutions did I evaluate?
We evaluated a few products before.
What other advice do I have?
I rate Microsoft Defender Threat Intelligence a ten out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Deputy Manager (Network & Security) at a construction company with 5,001-10,000 employees
Has efficient report-generating features and good stability
Pros and Cons
- "The technical support services are excellent."
- "There could be AI functionality included for features like reporting and dashboard preparation."
What is our primary use case?
We use the product to capture the logs, collect data, and understand patterns.
How has it helped my organization?
The product provides smooth functioning for our service desk and the technical team. It helps in efficiently generating reports to update the management.
What needs improvement?
There could be AI functionality included for features like reporting and dashboard preparation.
For how long have I used the solution?
We have been using Microsoft Defender Threat Intelligence for more than a year.
What do I think about the stability of the solution?
The product has high stability.
What do I think about the scalability of the solution?
The product has high scalability.
How are customer service and support?
The technical support services are excellent.
How was the initial setup?
The initial setup process is straightforward. It took us three months to deploy.
What about the implementation team?
We implemented the product with the help of an integrator.
What was our ROI?
Microsoft Defender Threat Intelligence generates a good return on investment.
What's my experience with pricing, setup cost, and licensing?
The product’s pricing is worth it.
What other advice do I have?
I recommend Microsoft Defender Threat Intelligence to others and rate it a nine out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Senior infrastructure engineer at a computer software company with 51-200 employees
Has efficient antivirus features and a simple setup process
Pros and Cons
- "The product provides efficient email security for sending links and file attachments."
- "We encounter problems connecting the product deployed on the user endpoints with the servers."
What is our primary use case?
We use the product as a defender for Office 365, endpoints, and security-dependable cloud apps.
What is most valuable?
The product provides efficient email security for sending links and file attachments. It has valuable features for anti-spam and antivirus. It integrates well with Microsoft Sentinel as well.
What needs improvement?
We encounter problems connecting the product deployed on the user endpoints with the servers. Additionally, the license model for the servers needs improvement.
For how long have I used the solution?
We have been using Microsoft Defender Threat Intelligence for two years.
What do I think about the stability of the solution?
It is a very stable product.
What do I think about the scalability of the solution?
Microsoft Defender Threat Intelligence is scalable.
How was the initial setup?
The initial setup is simple. However, it takes a lot of bandwidth to scan the device. It is challenging to deploy backups of thousands of computers. We have to configure the integration between the Defender for the endpoint and the server. The deployment and maintenance process requires one technical engineer to troubleshoot issues by reviewing PCs and setups.
What's my experience with pricing, setup cost, and licensing?
They offer two license plans: Microsoft Defender for endpoints and Microsoft Defender for businesses.
Which other solutions did I evaluate?
I have evaluated Kaspersky.
What other advice do I have?
I advise others to develop a good infrastructure and a vision for security before deploying any product. I rate Microsoft Defender Threat Intelligence a nine out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Download our free Microsoft Defender Threat Intelligence [EOL] Report and get advice and tips from experienced pros
sharing their opinions.
Updated: January 2026
Product Categories
Advanced Threat Protection (ATP) Threat Intelligence Platforms (TIP) Microsoft Security SuitePopular Comparisons
CrowdStrike Falcon
Microsoft Intune
Microsoft Defender for Endpoint
Microsoft Defender for Office 365
Microsoft Sentinel
Microsoft Purview Data Governance
Microsoft Defender for Cloud Apps
Microsoft Defender for Identity
Microsoft Defender Vulnerability Management
Palo Alto Networks VM-Series
Digital Guardian
Buyer's Guide
Download our free Microsoft Defender Threat Intelligence [EOL] Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- How much do independent test results affect your security purchases?
- Holding Security Vendors Accountable
- What can businesses do to improve their security posture?
- When evaluating Advanced Threat Protection, what aspect do you think is the most important to look for?
- What is your recommended cost-effective solution to detect and prevent APT attacks?
- Compromise Assessment vs Threat Hunting
- What are the main evaluation criteria for you when choosing the right vendor for brand protection services?
- Why is ATP (Advanced Threat Protection) important for companies?
![Microsoft Defender Threat Intelligence [EOL] Logo](https://images.peerspot.com/image/upload/c_scale,dpr_3.0,f_auto,q_100,w_80/GqfBeX9zWxZG3rC5hyrUo9Aq.jpeg?_a=BACAGSGT)










