Defender Onboarding using Intune - Windows

Summary

This article explains how to onboard Windows devices to Defender for Endpoint using Intune

Body

Zehadi Alam

Introduction


University of Georgia IT units have the ability to use Microsoft Intune to onboard their devices to Microsoft Defender for Endpoint. This is made possible by InfoSec's activation of the Microsoft Defender for Endpoint connector.

The following section demonstrates the process of configuring and deploying an endpoint security policy that onboards all targeted devices to Microsoft Defender for Endpoint.

Implementation


Navigate to Endpoint Security Endpoint detection and response
Select Create Policy

Select Windows 10, Windows 11, and Windows Server for Platform and Endpoint detection and response for Profile. Click Create at the bottom.

Configure the settings as follows

Once the configurations have been established, proceed through the remaining steps and assign the policy to the appropriate device groups.

After the policy has applied to the devices under the assigned groups, they will automatically be onboarded to Defender for Endpoint.

You can verify the onboarding status of your devices in the Microsoft Defender portal. If you do not have access to the portal, please see the Accessing the Microsoft Defender Portal article for instructions on how to request access.

Details

Details

Article ID: 161684
Created
Sun 4/28/24 7:07 PM
Modified
Sun 6/9/24 7:41 PM

Related Articles

Related Articles (4)

This article explains how to request access to the Microsoft Defender portal
This article explains how to customize Windows Defender with company name and contact info using Microsoft Intune.
This article explains the process for Defender deployment and onboarding for macOS using Intune
This article explains how to onboard Windows devices to Defender for Endpoint using Group Policy.