{"id":233,"date":"2026-05-01T08:40:27","date_gmt":"2026-05-01T16:40:27","guid":{"rendered":"https:\/\/rainier-it.com\/blog\/?p=233"},"modified":"2026-05-01T08:40:27","modified_gmt":"2026-05-01T16:40:27","slug":"defender-is-free-configuring-it-correctly-is-the-work","status":"publish","type":"post","link":"https:\/\/rainier-it.com\/blog\/defender-is-free-configuring-it-correctly-is-the-work\/","title":{"rendered":"Defender Is Free. Configuring It Correctly Is the Work."},"content":{"rendered":"\n<p>Walk into any small business in Pierce County and ask the owner what&#8217;s protecting their computers. They&#8217;ll usually say &#8220;we have antivirus.&#8221; Press a little: <em>which<\/em> antivirus? &#8220;I think it&#8217;s the Microsoft one.&#8221; Yes \u2014 that&#8217;s <strong>Microsoft Defender<\/strong>, and it&#8217;s been built into every Windows machine since Windows 10. It&#8217;s free. It&#8217;s already running on every PC they own.<\/p>\n\n\n\n<p>And yet small business breach rates keep climbing. <a href=\"https:\/\/rainier-it.com\/small-business\/#breach-stats\">88% of SMB breaches in 2025 involved ransomware<\/a> \u2014 versus just 39% at large enterprises. So what&#8217;s going wrong?<\/p>\n\n\n\n<p>The short version: <strong>Microsoft Defender ships with permissive defaults.<\/strong> Microsoft built it to be polite \u2014 to not break legacy software, to not pop alerts that confuse users, to play nicely with whatever weird apps a business might still be running from 2014. The defaults are tuned for &#8220;first, do no harm.&#8221; That&#8217;s a reasonable choice for a product that has to ship to a billion machines. It&#8217;s a terrible choice for a security baseline.<\/p>\n\n\n\n<p>Out of the box, Defender catches roughly half of what it <em>could<\/em> catch. The product isn&#8217;t the weak link. <strong>The configuration is.<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What &#8220;good configuration&#8221; actually means<\/h2>\n\n\n\n<p>This is the gap that matters: anyone can install antivirus. The work \u2014 the part you&#8217;re paying a managed IT provider for \u2014 is making sure it&#8217;s actually configured to do its job. There are two layers to that work:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>The CIS Level 1 baseline<\/strong> \u2014 turning every Defender knob to the security industry&#8217;s recommended setting.<\/li>\n\n\n\n<li><strong>16 Attack Surface Reduction (ASR) rules<\/strong> \u2014 Microsoft&#8217;s specific &#8220;block this attack pattern&#8221; toggles, deployed in Block mode (not just Audit).<\/li>\n<\/ol>\n\n\n\n<p>Let&#8217;s walk through both.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Microsoft Defender \u2014 what the product actually is<\/h2>\n\n\n\n<p>Defender is Microsoft&#8217;s built-in endpoint protection. It ships with Windows 10 and Windows 11 at no additional cost. Under the hood, it includes:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Antivirus + anti-malware (signature + heuristic)<\/li>\n\n\n\n<li>Behavior monitoring (catches malicious patterns even with no signature match)<\/li>\n\n\n\n<li>Network protection (blocks connections to known-malicious destinations)<\/li>\n\n\n\n<li>Exploit protection (mitigates memory-corruption attacks)<\/li>\n\n\n\n<li>EDR sensor capability (telemetry suitable for managed-detection layering)<\/li>\n\n\n\n<li>Cloud-delivered protection (samples submitted to Microsoft for behavioral analysis)<\/li>\n<\/ul>\n\n\n\n<p>Defender consistently ranks in the top quadrant of independent endpoint-protection tests (AV-Comparatives, AV-TEST, MITRE ATT&amp;CK evaluations). It&#8217;s a serious enterprise product. The same Microsoft that runs LinkedIn, GitHub, half the world&#8217;s cloud infrastructure, and the largest threat-intelligence telemetry on the planet built it.<\/p>\n\n\n\n<p>The product is not the problem. Configuration is.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">CIS Level 1 hardening \u2014 the configuration recipe<\/h2>\n\n\n\n<p><strong>CIS<\/strong> = Center for Internet Security. A US-based nonprofit. They publish the most-cited security configuration baselines in the industry. Used by:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The federal government (FedRAMP, NIST 800-53)<\/li>\n\n\n\n<li>The Department of Defense (DISA STIGs reference CIS)<\/li>\n\n\n\n<li>Cyber-insurance underwriters (the questionnaire you fill out at renewal)<\/li>\n\n\n\n<li>Every major compliance framework \u2014 HIPAA, PCI-DSS, SOC 2, CMMC<\/li>\n<\/ul>\n\n\n\n<p>CIS publishes <strong>Benchmarks<\/strong> \u2014 versioned recipe books that say &#8220;here is how to configure X securely, with the exact settings, in plain language, with rationale for each one.&#8221; There&#8217;s a benchmark for Microsoft Windows, one for Microsoft 365, one for Linux distros, one for AWS, one for Microsoft Defender specifically.<\/p>\n\n\n\n<p>The Windows benchmark has two levels:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Level 1 (L1)<\/strong> \u2014 &#8220;every business should have this on. No compatibility tradeoffs. No good reason not to.&#8221;<\/li>\n\n\n\n<li><strong>Level 2 (L2)<\/strong> \u2014 &#8220;more aggressive. May break some legacy software. For compliance-driven environments.&#8221;<\/li>\n<\/ul>\n\n\n\n<p>We deploy <strong>L1<\/strong> by default for every client. L2 we layer on for clients with regulated data (HIPAA-adjacent practices, contractors with CMMC obligations, etc.).<\/p>\n\n\n\n<p>For Defender specifically, the L1 benchmark enforces things like:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Real-time protection ON<\/li>\n\n\n\n<li>Cloud-delivered protection ON (samples submitted for behavioral analysis)<\/li>\n\n\n\n<li><strong>Tamper protection ON<\/strong> \u2014 prevents users <em>or<\/em> malware from disabling Defender<\/li>\n\n\n\n<li>Network protection in <strong>Block<\/strong> mode (not Audit \u2014 actually blocking, not just logging)<\/li>\n\n\n\n<li>Controlled Folder Access ON (ransomware mitigation)<\/li>\n\n\n\n<li>Scan removable drives, scan archive files<\/li>\n\n\n\n<li>PUA (potentially unwanted application) protection ON<\/li>\n\n\n\n<li>SmartScreen for Microsoft Edge ON<\/li>\n\n\n\n<li>Specific scan schedules, signature update intervals, sample submission policies<\/li>\n<\/ul>\n\n\n\n<p>None of this is exotic. None of it costs extra. It&#8217;s all already in Defender. The question is whether anyone has actually flipped the switches.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The 16 Attack Surface Reduction (ASR) rules<\/h2>\n\n\n\n<p>ASR is a specific Defender feature \u2014 a set of rules where each one blocks one specific attacker technique. Microsoft maintains them, updates them, and ships them with Windows. They have to be explicitly enabled, and each rule has three modes: Off, Audit (log but don&#8217;t block), and <strong>Block<\/strong> (actually stop the behavior).<\/p>\n\n\n\n<p>We deploy <strong>16 ASR rules in Block mode<\/strong> on every endpoint we manage. Here&#8217;s what each one does, in plain English:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><thead><tr><th>Rule (plain English)<\/th><th>What it blocks<\/th><\/tr><\/thead><tbody><tr><td>Block executables from email\/webmail<\/td><td>The classic &#8220;open this attachment&#8221; malware vector<\/td><\/tr><tr><td>Block Office apps from creating child processes<\/td><td>Word\/Excel can&#8217;t spawn cmd.exe \/ powershell.exe \u2014 kills macro-based attacks<\/td><\/tr><tr><td>Block Office apps from creating executable content<\/td><td>Stops Office from writing .exe files to disk<\/td><\/tr><tr><td>Block Office apps from injecting code into other processes<\/td><td>Process injection \u2014 common malware persistence<\/td><\/tr><tr><td>Block JS\/VBScript from launching downloaded executables<\/td><td>Drive-by download protection<\/td><\/tr><tr><td>Block execution of obfuscated scripts<\/td><td>Obfuscation = &#8220;I&#8217;m trying to hide what I&#8217;m doing&#8221;<\/td><\/tr><tr><td>Block Win32 API calls from Office macros<\/td><td>The technique behind 90% of &#8220;open the doc, get pwned&#8221; attacks<\/td><\/tr><tr><td>Block credential stealing from LSASS<\/td><td>Defends against Mimikatz-style password dumping<\/td><\/tr><tr><td>Block process creation from PSExec \/ WMI commands<\/td><td>Lateral movement (how attackers spread between PCs after first foothold)<\/td><\/tr><tr><td>Block untrusted\/unsigned processes from USB<\/td><td>&#8220;Found a USB stick in the parking lot&#8221; attack<\/td><\/tr><tr><td>Block Outlook\/communication apps from creating child processes<\/td><td>Outlook can&#8217;t be tricked into launching attached payloads<\/td><\/tr><tr><td>Block Adobe Reader from creating child processes<\/td><td>PDF-borne malware<\/td><\/tr><tr><td>Block persistence through WMI event subscription<\/td><td>Persistent malware that survives reboots<\/td><\/tr><tr><td>Use advanced ransomware protection<\/td><td>Behavioral heuristics on file-mass-encryption patterns<\/td><\/tr><tr><td>Block exploited vulnerable signed drivers<\/td><td>The &#8220;Bring Your Own Vulnerable Driver&#8221; technique<\/td><\/tr><tr><td>Block rebooting machine in Safe Mode (newest addition)<\/td><td>Prevents attackers from booting around your security<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Inside one rule: what enabling &#8220;Block Office apps from creating child processes&#8221; actually looks like<\/h2>\n\n\n\n<p>For the technically inclined \u2014 here&#8217;s the actual PowerShell one of our TacticalRMM scripts runs to enable that rule on a managed endpoint:<\/p>\n\n\n\n<div class=\"wp-block-kevinbatdorf-code-block-pro\" data-code-block-pro-font-family=\"Code-Pro-JetBrains-Mono\" style=\"font-size:.875rem;font-family:Code-Pro-JetBrains-Mono,ui-monospace,SFMono-Regular,Menlo,Monaco,Consolas,monospace;line-height:1.25rem;--cbp-tab-width:2;tab-size:var(--cbp-tab-width, 2)\"><span style=\"display:block;padding:16px 0 0 16px;margin-bottom:-1px;width:100%;text-align:left;background-color:#2e3440ff\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"54\" height=\"14\" viewBox=\"0 0 54 14\"><g fill=\"none\" fill-rule=\"evenodd\" transform=\"translate(1 1)\"><circle cx=\"6\" cy=\"6\" r=\"6\" fill=\"#FF5F56\" stroke=\"#E0443E\" stroke-width=\".5\"><\/circle><circle cx=\"26\" cy=\"6\" r=\"6\" fill=\"#FFBD2E\" stroke=\"#DEA123\" stroke-width=\".5\"><\/circle><circle cx=\"46\" cy=\"6\" r=\"6\" fill=\"#27C93F\" stroke=\"#1AAB29\" stroke-width=\".5\"><\/circle><\/g><\/svg><\/span><span role=\"button\" tabindex=\"0\" style=\"color:#d8dee9ff;display:none\" aria-label=\"Copy\" class=\"code-block-pro-copy-button\"><pre class=\"code-block-pro-copy-button-pre\" aria-hidden=\"true\"><textarea class=\"code-block-pro-copy-button-textarea\" tabindex=\"-1\" aria-hidden=\"true\" readonly># Enable \"Block all Office applications from creating child processes\" in Block mode\n# Microsoft GUID for this rule: D4F940AB-401B-4EFC-AADC-AD5F3C50688A\n\nSet-MpPreference -AttackSurfaceReductionRules_Ids D4F940AB-401B-4EFC-AADC-AD5F3C50688A `\n                 -AttackSurfaceReductionRules_Actions Enabled\n\n# Verify the rule is enabled (1 = Block, 2 = Audit, 0 = Disabled)\n(Get-MpPreference).AttackSurfaceReductionRules_Ids\n(Get-MpPreference).AttackSurfaceReductionRules_Actions<\/textarea><\/pre><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" style=\"width:24px;height:24px\" fill=\"none\" viewBox=\"0 0 24 24\" stroke=\"currentColor\" stroke-width=\"2\"><path class=\"with-check\" stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M9 5H7a2 2 0 00-2 2v12a2 2 0 002 2h10a2 2 0 002-2V7a2 2 0 00-2-2h-2M9 5a2 2 0 002 2h2a2 2 0 002-2M9 5a2 2 0 012-2h2a2 2 0 012 2m-6 9l2 2 4-4\"><\/path><path class=\"without-check\" stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M9 5H7a2 2 0 00-2 2v12a2 2 0 002 2h10a2 2 0 002-2V7a2 2 0 00-2-2h-2M9 5a2 2 0 002 2h2a2 2 0 002-2M9 5a2 2 0 012-2h2a2 2 0 012 2\"><\/path><\/svg><\/span><pre class=\"shiki nord\" style=\"background-color: #2e3440ff\" tabindex=\"0\"><code><span class=\"line\"><span style=\"color: #616E88\"># Enable &quot;Block all Office applications from creating child processes&quot; in Block mode<\/span><\/span>\n<span class=\"line\"><span style=\"color: #616E88\"># Microsoft GUID for this rule: D4F940AB-401B-4EFC-AADC-AD5F3C50688A<\/span><\/span>\n<span class=\"line\"><\/span>\n<span class=\"line\"><span style=\"color: #88C0D0\">Set-MpPreference<\/span><span style=\"color: #D8DEE9FF\"> <\/span><span style=\"color: #81A1C1\">-<\/span><span style=\"color: #D8DEE9FF\">AttackSurfaceReductionRules_Ids D4F940AB<\/span><span style=\"color: #81A1C1\">-<\/span><span style=\"color: #D8DEE9FF\">401B<\/span><span style=\"color: #81A1C1\">-<\/span><span style=\"color: #D8DEE9FF\">4EFC<\/span><span style=\"color: #81A1C1\">-<\/span><span style=\"color: #D8DEE9FF\">AADC<\/span><span style=\"color: #81A1C1\">-<\/span><span style=\"color: #D8DEE9FF\">AD5F3C50688A <\/span><span style=\"color: #81A1C1\">`<\/span><\/span>\n<span class=\"line\"><span style=\"color: #D8DEE9FF\">                 <\/span><span style=\"color: #81A1C1\">-<\/span><span style=\"color: #D8DEE9FF\">AttackSurfaceReductionRules_Actions Enabled<\/span><\/span>\n<span class=\"line\"><\/span>\n<span class=\"line\"><span style=\"color: #616E88\"># Verify the rule is enabled (1 = Block, 2 = Audit, 0 = Disabled)<\/span><\/span>\n<span class=\"line\"><span style=\"color: #ECEFF4\">(<\/span><span style=\"color: #88C0D0\">Get-MpPreference<\/span><span style=\"color: #ECEFF4\">)<\/span><span style=\"color: #D8DEE9FF\">.AttackSurfaceReductionRules_Ids<\/span><\/span>\n<span class=\"line\"><span style=\"color: #ECEFF4\">(<\/span><span style=\"color: #88C0D0\">Get-MpPreference<\/span><span style=\"color: #ECEFF4\">)<\/span><span style=\"color: #D8DEE9FF\">.AttackSurfaceReductionRules_Actions<\/span><\/span><\/code><\/pre><\/div>\n\n\n\n<p>The whole rule comes down to a single PowerShell command. We bake all 16 into a TacticalRMM script that runs at onboarding, then runs again weekly to drift-correct anything a user might have toggled off. The &#8220;configuration is the work&#8221; part is doing this consistently across every endpoint, every week, for every client \u2014 and having the audit logs to prove it when the cyber-insurance auditor asks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The full 16 GUIDs (for the technically curious or your auditor)<\/h2>\n\n\n\n<p>Each ASR rule has a Microsoft-assigned GUID. Here are the 16 we deploy:<\/p>\n\n\n\n<div class=\"wp-block-kevinbatdorf-code-block-pro\" data-code-block-pro-font-family=\"Code-Pro-JetBrains-Mono\" style=\"font-size:.875rem;font-family:Code-Pro-JetBrains-Mono,ui-monospace,SFMono-Regular,Menlo,Monaco,Consolas,monospace;line-height:1.25rem;--cbp-tab-width:2;tab-size:var(--cbp-tab-width, 2)\"><span style=\"display:block;padding:16px 0 0 16px;margin-bottom:-1px;width:100%;text-align:left;background-color:#2e3440ff\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"54\" height=\"14\" viewBox=\"0 0 54 14\"><g fill=\"none\" fill-rule=\"evenodd\" transform=\"translate(1 1)\"><circle cx=\"6\" cy=\"6\" r=\"6\" fill=\"#FF5F56\" stroke=\"#E0443E\" stroke-width=\".5\"><\/circle><circle cx=\"26\" cy=\"6\" r=\"6\" fill=\"#FFBD2E\" stroke=\"#DEA123\" stroke-width=\".5\"><\/circle><circle cx=\"46\" cy=\"6\" r=\"6\" fill=\"#27C93F\" stroke=\"#1AAB29\" stroke-width=\".5\"><\/circle><\/g><\/svg><\/span><span role=\"button\" tabindex=\"0\" style=\"color:#d8dee9ff;display:none\" aria-label=\"Copy\" class=\"code-block-pro-copy-button\"><pre class=\"code-block-pro-copy-button-pre\" aria-hidden=\"true\"><textarea class=\"code-block-pro-copy-button-textarea\" tabindex=\"-1\" aria-hidden=\"true\" readonly>BE9BA2D9-53EA-4CDC-84E5-9B1EEEE46550  Block executable content from email + webmail\nD4F940AB-401B-4EFC-AADC-AD5F3C50688A  Block all Office apps from creating child processes\n3B576869-A4EC-4529-8536-B80A7769E899  Block Office apps from creating executable content\n75668C1F-73B5-4CF0-BB93-3ECF5CB7CC84  Block Office apps from injecting code into other processes\nD3E037E1-3EB8-44C8-A917-57927947596D  Block JS\/VBScript from launching downloaded executable content\n5BEB7EFE-FD9A-4556-801D-275E5FFC04CC  Block execution of potentially obfuscated scripts\n92E97FA1-2EDF-4476-BDD6-9DD0B4DDDC7B  Block Win32 API calls from Office macros\n9E6C4E1F-7D60-472F-BA1A-A39EF669E4B2  Block credential stealing from LSASS\nD1E49AAC-8F56-4280-B9BA-993A6D77406C  Block process creations from PSExec + WMI commands\nB2B3F03D-6A65-4F7B-A9C7-1C7EF74A9BA4  Block untrusted\/unsigned processes from USB\n26190899-1602-49E8-8B27-EB1D0A1CE869  Block Office communication apps from creating child processes\n7674BA52-37EB-4A4F-A9A1-F0F9A1619A2C  Block Adobe Reader from creating child processes\nE6DB77E5-3DF2-4CF1-B95A-636979351E5B  Block persistence through WMI event subscription\nC1DB55AB-C21A-4637-BB3F-A12568109D35  Use advanced ransomware protection\n56A863A9-875E-4185-98A7-B882C64B5CE5  Block abuse of exploited vulnerable signed drivers\n33DDEDF1-C6E0-47CB-833E-DE6133960387  Block rebooting machine in Safe Mode (newest)<\/textarea><\/pre><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" style=\"width:24px;height:24px\" fill=\"none\" viewBox=\"0 0 24 24\" stroke=\"currentColor\" stroke-width=\"2\"><path class=\"with-check\" stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M9 5H7a2 2 0 00-2 2v12a2 2 0 002 2h10a2 2 0 002-2V7a2 2 0 00-2-2h-2M9 5a2 2 0 002 2h2a2 2 0 002-2M9 5a2 2 0 012-2h2a2 2 0 012 2m-6 9l2 2 4-4\"><\/path><path class=\"without-check\" stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M9 5H7a2 2 0 00-2 2v12a2 2 0 002 2h10a2 2 0 002-2V7a2 2 0 00-2-2h-2M9 5a2 2 0 002 2h2a2 2 0 002-2M9 5a2 2 0 012-2h2a2 2 0 012 2\"><\/path><\/svg><\/span><pre class=\"shiki nord\" style=\"background-color: #2e3440ff\" tabindex=\"0\"><code><span class=\"line\"><span style=\"color: #d8dee9ff\">BE9BA2D9-53EA-4CDC-84E5-9B1EEEE46550  Block executable content from email + webmail\nD4F940AB-401B-4EFC-AADC-AD5F3C50688A  Block all Office apps from creating child processes\n3B576869-A4EC-4529-8536-B80A7769E899  Block Office apps from creating executable content\n75668C1F-73B5-4CF0-BB93-3ECF5CB7CC84  Block Office apps from injecting code into other processes\nD3E037E1-3EB8-44C8-A917-57927947596D  Block JS\/VBScript from launching downloaded executable content\n5BEB7EFE-FD9A-4556-801D-275E5FFC04CC  Block execution of potentially obfuscated scripts\n92E97FA1-2EDF-4476-BDD6-9DD0B4DDDC7B  Block Win32 API calls from Office macros\n9E6C4E1F-7D60-472F-BA1A-A39EF669E4B2  Block credential stealing from LSASS\nD1E49AAC-8F56-4280-B9BA-993A6D77406C  Block process creations from PSExec + WMI commands\nB2B3F03D-6A65-4F7B-A9C7-1C7EF74A9BA4  Block untrusted\/unsigned processes from USB\n26190899-1602-49E8-8B27-EB1D0A1CE869  Block Office communication apps from creating child processes\n7674BA52-37EB-4A4F-A9A1-F0F9A1619A2C  Block Adobe Reader from creating child processes\nE6DB77E5-3DF2-4CF1-B95A-636979351E5B  Block persistence through WMI event subscription\nC1DB55AB-C21A-4637-BB3F-A12568109D35  Use advanced ransomware protection\n56A863A9-875E-4185-98A7-B882C64B5CE5  Block abuse of exploited vulnerable signed drivers\n33DDEDF1-C6E0-47CB-833E-DE6133960387  Block rebooting machine in Safe Mode (newest)<\/span><\/span><\/code><\/pre><\/div>\n\n\n\n<p>Drop those into a script, push them via your RMM, drift-correct weekly. That&#8217;s the whole baseline.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What this means for your business<\/h2>\n\n\n\n<p>If you take nothing else from this post, take this: <strong>&#8220;we have antivirus&#8221; is not a security strategy.<\/strong> Defender on its defaults catches half of what it could. Defender configured to CIS L1 + 16 ASR rules in Block mode catches a meaningful chunk of what your cyber-insurance carrier asks about at renewal \u2014 and what your business needs to not become next quarter&#8217;s breach statistic.<\/p>\n\n\n\n<p>This is the foundation that ships with every plan we offer \u2014 from <a href=\"https:\/\/rainier-it.com\/small-business\/\">Business Watch at $99\/month<\/a> for a 3-device shop, all the way through Enterprise. On top of that foundation, Shield, Fortress, and our per-user plans layer on Huntress 24\/7 SOC, Managed ITDR, and the rest of our defense-in-depth stack.<\/p>\n\n\n\n<p>If you&#8217;re a Pierce County small business and want to know whether your endpoints are actually configured this way \u2014 or if you just want a free 30-minute conversation about what your security posture looks like today \u2014 we&#8217;d love to talk.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-vivid-green-cyan-background-color has-background wp-element-button\" href=\"https:\/\/rainier-it.com\/contact\" style=\"color:#000000;\">Book a free 30-minute assessment \u2192<\/a><\/div>\n<\/div>\n\n\n\n<p class=\"has-small-font-size\"><em>Sources: <a href=\"https:\/\/www.cisecurity.org\/benchmark\/microsoft_windows_desktop\" target=\"_blank\" rel=\"noopener\">CIS Microsoft Windows Desktop Benchmark<\/a>; <a href=\"https:\/\/learn.microsoft.com\/en-us\/defender-endpoint\/attack-surface-reduction-rules-reference\" target=\"_blank\" rel=\"noopener\">Microsoft Defender ASR rules reference<\/a>; <a href=\"https:\/\/www.verizon.com\/business\/resources\/reports\/dbir\/\" target=\"_blank\" rel=\"noopener\">Verizon 2025 Data Breach Investigations Report (SMB Snapshot)<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Windows ships with Microsoft Defender. Every PC you own already has it. So why do small businesses still get breached at record rates? Because Microsoft ships Defender with permissive defaults, and most IT shops never tune them. Here&#8217;s exactly how we configure it for every client we manage.<\/p>\n","protected":false},"author":2,"featured_media":240,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6,8,15],"tags":[],"class_list":["post-233","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-managed-it-services","category-microsoft-windows"],"_links":{"self":[{"href":"https:\/\/rainier-it.com\/blog\/wp-json\/wp\/v2\/posts\/233","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rainier-it.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rainier-it.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rainier-it.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/rainier-it.com\/blog\/wp-json\/wp\/v2\/comments?post=233"}],"version-history":[{"count":6,"href":"https:\/\/rainier-it.com\/blog\/wp-json\/wp\/v2\/posts\/233\/revisions"}],"predecessor-version":[{"id":239,"href":"https:\/\/rainier-it.com\/blog\/wp-json\/wp\/v2\/posts\/233\/revisions\/239"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/rainier-it.com\/blog\/wp-json\/wp\/v2\/media\/240"}],"wp:attachment":[{"href":"https:\/\/rainier-it.com\/blog\/wp-json\/wp\/v2\/media?parent=233"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rainier-it.com\/blog\/wp-json\/wp\/v2\/categories?post=233"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rainier-it.com\/blog\/wp-json\/wp\/v2\/tags?post=233"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}