Microsoft Endpoint Protection License Overview
- Microsoft Endpoint Protection is licensed under the university’s CAL EES with Software Assurance, so all of the following university-owned devices are covered:
- Devices with Windows 8, 8.1, 10, and 11
- Devices with:
- Red Hat Enterprise Linux 6, 7, 8;
- SUSE Linux Enterprise 10, 11, 12;
- CentOS 6, 7, 8;
- Debian Linux 5, 6, 7, 8;
- Ubuntu Linux 16.04 – 20.04;
- Oracle Linux 5, 6, 7.
Please note that this client has not yet been tested.
- Servers with Windows Server 2012, 2012R2, 2016, 2019 and 2022.
- Going forward, the university will not be providing licenses for any personally-owned devices. See Recommendations for Personally-Owned Devices (below).
Recommendations for University-owned Devices
Windows Devices
NOTE: Until further notice, OIT recommends that MS Endpoint Protection be the standard for university-owned computers running Windows.
- Microsoft recommends upgrading older versions of the Windows operating system to version 11.
- Windows devices (versions 7 through 11) that are joined to Wolftech Active Directory (AD) should use MS Endpoint Protection available via SCCM.
- For Windows devices not joined to the Wolftech AD, OIT recommends using the standalone MS Endpoint Protection client.
- The MS Endpoint Protection Agent will need to be manually installed and will receive updates and definitions via Windows Update.
- The installers are available for download via the software.ncsu.edu website.
Macintosh Devices
- Macintosh devices may use DetectX or CrowdStrike software available via by enrolling in our campus endpoint management system, Jamf Pro, as required by the University Endpoint Protection standard. To enroll a device contact your local IT staff or the OIT Help Desk.
Linux Devices
An endpoint protection solution for the Linux devices will be investigated at a later time.
Recommendations for Personally-owned Devices
- NC State recommends using either of the following:
- The antivirus protection provided by the operating system vendor
- An approved alternative. For details, see Approved Alternate Antivirus Products.