Note We recommend using Microsoft Endpoint Manager to manage your organization’s threat protection features for devices (also referred to as endpoints). Endpoint Manager includes Microsoft Intune and Microsoft Endpoint Configuration Manager. Learn more about Endpoint Manager. You can use Group Policy Objects in Azure Active Directory Domain Services to manage some settings in Microsoft Defender for Endpoint. Configure Microsoft Defender for […]
Category: Microsoft
Microsoft Business(496)
Microsoft Endpoint(310)
Microsoft Home(469)
Manage Microsoft Defender for Endpoint with Configuration Manager
We recommend using Microsoft Endpoint Manager, which includes Microsoft Intune (Intune) and Microsoft Endpoint Configuration Manager (Configuration Manager) to manage your organization’s threat protection features for devices (also referred to as endpoints). Learn more about Endpoint Manager Co-manage Microsoft Defender for Endpoint on Windows 10 and Windows 11 devices with Configuration Manager and Intune Configure Microsoft Defender for Endpoint with […]
Manage Microsoft Defender for Endpoint with Intune
We recommend using Microsoft Endpoint Manager, which includes Microsoft Intune (Intune) to manage your organization’s threat protection features for devices (also referred to as endpoints). Learn more about Endpoint Manager. This article describes how to find your Microsoft Defender for Endpoint settings in Intune, and lists various tasks you can perform. Find your Microsoft Defender for Endpoint […]
Manage Microsoft Defender for Endpoint, post migration
After you have moved from your previous endpoint protection and antivirus solution to Microsoft Defender for Endpoint, your next step is to manage your features and capabilities. We recommend using Microsoft Endpoint Manager, which includes Microsoft Intune and Microsoft Endpoint Configuration Manager, to manage your organization’s devices and security settings. However, you can use other tools/methods, such as Group Policy […]
Switch to Microsoft Defender for Endpoint – Phase 3: Onboard
Onboard devices to Microsoft Defender for Endpoint Go to the Microsoft 365 Defender portal (https://security.microsoft.com) and sign in. Choose Settings > Endpoints > Onboarding (under Device management). In the Select operating system to start onboarding process list, select an operating system. Under Deployment method, select an option. Follow the links and prompts to onboard your organization’s devices. Need help? See Onboarding methods (in this article). Note If […]
Switch to Microsoft Defender for Endpoint – Phase 2: Setup
Reinstall/enable Microsoft Defender Antivirus on your endpoints On certain versions of Windows, Microsoft Defender Antivirus was likely uninstalled or disabled when your non-Microsoft antivirus/antimalware solution was installed. When endpoints running Windows are onboarded to Defender for Endpoint, Microsoft Defender Antivirus can run in passive mode alongside a non-Microsoft antivirus solution. To learn more, see Antivirus protection […]
Switch to Microsoft Defender for Endpoint – Phase 1: Prepare
Get and deploy updates across your organization’s devices As a best practice, keep your organization’s devices and endpoints up to date. Make sure your existing endpoint protection and antivirus solution is up to date, and that the operating systems and apps your organization is also have the latest updates. Doing this now can help prevent […]
Make the switch from non-Microsoft endpoint protection to Microsoft Defender for Endpoint
When you make the switch to Defender for Endpoint, you begin with your non-Microsoft antivirus/antimalware protection in active mode. Then, you configure Microsoft Defender Antivirus in passive mode, and onboard your devices to Defender for Endpoint. Next, you configure your endpoint protection features, set Microsoft Defender Antivirus to active mode, and verify that everything is […]
Make the switch to Microsoft Defender for Endpoint
Migration guides If you’re considering moving to Defender for Endpoint, we have guidance to help. In the following table, review the scenarios. Select the scenario that best represents your situation, and see the recommended guidance. MIGRATION GUIDES Scenario Guidance You don’t have an endpoint protection solution in place yet, and you want to know more […]
Onboarding using Microsoft Endpoint Manager
This article is part of the Deployment guide and acts as an example onboarding method. In the Planning topic, there were several methods provided to onboard devices to the service. This topic covers the cloud-native architecture. Diagram of environment architectures While Defender for Endpoint supports onboarding of various endpoints and tools, this article does not cover them. […]