Microsoft Defender ATP will be available on Linux in 2020

For more than 13 years, Microsoft Defender is still a familiar name for Windows users, even on Windows 10, and is likely to be Linux users soon.

Microsoft Defender is a free security software, developed based on the framework of GIANT AntiSpyware (GIANT Company Software, Inc.) and officially released in October 2006. Initially, Microsoft Defender only supported 2 systems. The popular operating system at the time was Windows XP and Microsoft 2003. It was then pre-installed and enabled by default in Windows Vista and Windows 7, and was also free to download for Windows XP and Windows Server. 2003.

For more than 13 years, Microsoft Defender is still a familiar name for Windows users, even on Windows 10, and is likely to be Linux users soon.

Indeed, Microsoft recently announced plans to bring its famous 13-year-old system security software to the Linux platform in 2020. Earlier in May this year, Microsoft rebranded its Windows software. Defender Advanced Threat Protection (ATP) is famous for its Microsoft Defender ATP, while adding a number of support features for macOS devices, besides the systems running on familiar Windows.

Microsoft Defender ATP will be available on Linux in 2020 Picture 1Microsoft Defender ATP will be available on Linux in 2020 Picture 1

As such, Linux systems will soon be protected by Microsoft Defender ATP like many other popular operating system platforms. However, Microsoft has not announced a specific release date for Microsoft Defender ATP on Linux, as well as which Linux distributions will be fully supported.

If the plan is implemented as expected, Microsoft Defender ATP will soon be able to provide a centralized security operation base for not only Windows platforms, but also for macOS and Linux platforms. via the Microsoft Defender Security Center.

In addition to familiar system security features, Microsoft Defender ATP will bring threat detection and endpoint feedback to Linux systems. This will enable security analysts to have a more detailed view of the security status of the system in real time, while facilitating the process of investigating breaches as well as troubleshooting. on the affected devices.

3.7 ★ | 3 Vote