Body
Zehadi Alam
Introduction
University of Georgia IT units have the ability to use Microsoft Intune to onboard their devices to Microsoft Defender for Endpoint. This is made possible by InfoSec's activation of the Microsoft Defender for Endpoint connector.

The following section demonstrates the process of configuring and deploying an endpoint security policy that onboards all targeted devices to Microsoft Defender for Endpoint.
Implementation
Navigate to Endpoint Security Endpoint detection and response
Select Create Policy

Select Windows 10, Windows 11, and Windows Server for Platform and Endpoint detection and response for Profile. Click Create at the bottom.

Configure the settings as follows

Once the configurations have been established, proceed through the remaining steps and assign the policy to the appropriate device groups.
After the policy has applied to the devices under the assigned groups, they will automatically be onboarded to Defender for Endpoint.
You can verify the onboarding status of your devices in the Microsoft Defender portal. If you do not have access to the portal, please see the Accessing the Microsoft Defender Portal article for instructions on how to request access.
