• Install & Activate
  • Troubleshooting
BEST Antivirus KBS : Largest Anti-Malware Knowlegde Base and Support
  • Install & Activate
  • Troubleshooting

Onboarding using Microsoft Endpoint Manager

/Download, Install & Active / Microsoft / Download, Install & Active / Microsoft / Microsoft Endpoint / Onboarding using Microsoft Endpoint Manager
  • December 23, 2021
  • BEST Antivirus Staff 2
  • Microsoft / Microsoft Endpoint

Contents

  1. Resources
  2. Step 1: Onboard devices by creating a group in MEM to assign configurations on
    1. Identify target devices or users
    2. Create a group
  3. Step 2: Create configuration policies to configure Microsoft Defender for Endpoint capabilities
    1. Endpoint detection and response
    2. Next-generation protection
    3. Attack Surface Reduction – Attack surface reduction rules
    4. Attack Surface Reduction – Web Protection
  4. Validate configuration settings
    1. Confirm policies have been applied
    2. Confirm endpoint detection and response
    3. Confirm next-generation protection
    4. Confirm Attack Surface Reduction – Attack surface reduction rules
    5. Confirm Attack Surface Reduction – Web Protection
  5. Feedback
    1. Source : Official Microsoft Brand Editor by : BEST Antivirus KBS Team
0
(0)

This article is part of the Deployment guide and acts as an example onboarding method.

In the Planning topic, there were several methods provided to onboard devices to the service. This topic covers the cloud-native architecture.

Image of cloud-native architecture. Diagram of environment architectures

While Defender for Endpoint supports onboarding of various endpoints and tools, this article does not cover them. For information on general onboarding using other supported deployment tools and methods, see Onboarding overview.

Microsoft Endpoint Manager is a solution platform that unifies several services. It includes Microsoft Intune

-based device management.

This topic guides users in:

  • Step 1: Onboarding devices to the service by creating a group in Microsoft Endpoint Manager (MEM) to assign configurations on
  • Step 2: Configuring Defender for Endpoint capabilities using Microsoft Endpoint Manager

This onboarding guidance will walk you through the following basic steps that you need to take when using Microsoft Endpoint Manager:

  • Identifying target devices or users
    • Creating an Azure Active Directory group (User or Device)
  • Creating a Configuration Profile
    • In Microsoft Endpoint Manager, we’ll guide you in creating a separate policy for each capability.

Resources

Here are the links you’ll need for the rest of the process:

  • MEM portal
  • Microsoft Defender for Endpoint
  • Intune Security baselines

For more information about Microsoft Endpoint Manager, check out these resources:

  • Microsoft Endpoint Manager page
  • Blog post on convergence of Intune and ConfigMgr
  • Introduction video on MEM

Step 1: Onboard devices by creating a group in MEM to assign configurations on

Identify target devices or users

In this section, we will create a test group to assign your configurations on.

 Note

Intune uses Azure Active Directory (Azure AD) groups to manage devices and users. As an Intune admin, you can set up groups to suit your organizational needs.

For more information, see Add groups to organize users and devices.

Create a group

  1. Open the MEM portal.
  2. Open Groups > New Group.

    Image of Microsoft Endpoint Manager portal1.

  3. Enter details and create a new group.

    Image of Microsoft Endpoint Manager portal2.

  4. Add your test user or device.
  5. From the Groups > All groups pane, open your new group.
  6. Select Members > Add members.
  7. Find your test user or device and select it.

    Image of Microsoft Endpoint Manager portal3.

  8. Your testing group now has a member to test.

Step 2: Create configuration policies to configure Microsoft Defender for Endpoint capabilities

In the following section, you’ll create a number of configuration policies.

First is a configuration policy to select which groups of users or devices will be onboarded to Defender for Endpoint:

  • Endpoint detection and response

Then you will continue by creating several different types of endpoint security policies:

  • Next-generation protection
  • Attack surface reduction

Endpoint detection and response

  1. Open the MEM portal.
  2. Navigate to Endpoint security > Endpoint detection and response. Click on Create Profile.

    Image of Microsoft Endpoint Manager portal4.

  3. Under Platform, select Windows 10 and Later, Profile – Endpoint detection and response > Create.
  4. Enter a name and description, then select Next.

    Image of Microsoft Endpoint Manager portal5.

  5. Select settings as required, then select Next.

    Image of Microsoft Endpoint Manager portal6.

     Note

    In this instance, this has been auto populated as Defender for Endpoint has already been integrated with Intune. For more information on the integration, see Enable Microsoft Defender for Endpoint in Intune.

    The following image is an example of what you’ll see when Microsoft Defender for Endpoint is NOT integrated with Intune:

    Image of Microsoft Endpoint Manager portal7.

  6. Add scope tags if necessary, then select Next.

    Image of Microsoft Endpoint Manager portal8.

  7. Add test group by clicking on Select groups to include and choose your group, then select Next.

    Image of Microsoft Endpoint Manager portal9.

  8. Review and accept, then select Create.

    Image of Microsoft Endpoint Manager portal10.

  9. You can view your completed policy.

    Image of Microsoft Endpoint Manager portal11.

Next-generation protection

  1. Open the MEM portal.
  2. Navigate to Endpoint security > Antivirus > Create Policy.

    Image of Microsoft Endpoint Manager portal12.

  3. Select Platform – Windows 10 and Later – Windows and Profile – Microsoft Defender Antivirus > Create.
  4. Enter name and description, then select Next.

    Image of Microsoft Endpoint Manager portal13.

  5. In the Configuration settings page: Set the configurations you require for Microsoft Defender Antivirus (Cloud Protection, Exclusions, Real-Time Protection, and Remediation).

    Image of Microsoft Endpoint Manager portal14.

  6. Add scope tags if necessary, then select Next.

    Image of Microsoft Endpoint Manager portal15.

  7. Select groups to include, assign to your test group, then select Next.

    Image of Microsoft Endpoint Manager portal16.

  8. Review and create, then select Create.

    Image of Microsoft Endpoint Manager portal17.

  9. You’ll see the configuration policy you created.

    Image of Microsoft Endpoint Manager portal18.

Attack Surface Reduction – Attack surface reduction rules

  1. Open the MEM portal.
  2. Navigate to Endpoint security > Attack surface reduction.
  3. Select Create Policy.
  4. Select Platform – Windows 10 and Later – Profile – Attack surface reduction rules > Create.

    Image of Microsoft Endpoint Manager portal19.

  5. Enter a name and description, then select Next.

    Image of Microsoft Endpoint Manager portal20.

  6. In the Configuration settings page: Set the configurations you require for Attack surface reduction rules, then select Next.

     Note

    We will be configuring all of the Attack surface reduction rules to Audit.

    For more information, see Attack surface reduction rules.

    Image of Microsoft Endpoint Manager portal21.

  7. Add Scope Tags as required, then select Next.

    Image of Microsoft Endpoint Manager portal22.

  8. Select groups to include and assign to test group, then select Next.

    Image of Microsoft Endpoint Manager portal23.

  9. Review the details, then select Create.

    Image of Microsoft Endpoint Manager portal24.

  10. View the policy.

    Image of Microsoft Endpoint Manager portal25.

Attack Surface Reduction – Web Protection

  1. Open the MEM portal.
  2. Navigate to Endpoint security > Attack surface reduction.
  3. Select Create Policy.
  4. Select Windows 10 and Later – Web protection > Create.

    Image of Microsoft Endpoint Manager portal26.

  5. Enter a name and description, then select Next.

    Image of Microsoft Endpoint Manager portal27.

  6. In the Configuration settings page: Set the configurations you require for Web Protection, then select Next.

     Note

    We are configuring Web Protection to Block.

    For more information, see Web Protection.

    Image of Microsoft Endpoint Manager portal28.

  7. Add Scope Tags as required > Next.

    Image of Microsoft Endpoint Manager portal29.

  8. Select Assign to test group > Next.

    Image of Microsoft Endpoint Manager portal30.

  9. Select Review and Create > Create.

    Image of Microsoft Endpoint Manager portal31.

  10. View the policy.

    Image of Microsoft Endpoint Manager portal32.

Validate configuration settings

Confirm policies have been applied

Once the Configuration policy has been assigned, it will take some time to apply.

For information on timing, see Intune configuration information.

To confirm that the configuration policy has been applied to your test device, follow the following process for each configuration policy.

  1. Open the MEM portal and navigate to the relevant policy as shown in the steps above. The following example shows the next generation protection settings.

    Image of Microsoft Endpoint Manager portal33.

  2. Select the Configuration Policy to view the policy status.

    Image of Microsoft Endpoint Manager portal34.

  3. Select Device Status to see the status.

    Image of Microsoft Endpoint Manager portal35.

  4. Select User Status to see the status.

    Image of Microsoft Endpoint Manager portal36.

  5. Select Per-setting status to see the status.

     Tip

    This view is very useful to identify any settings that conflict with another policy.

    Image of Microsoft Endpoint Manager portal37.

Confirm endpoint detection and response

  1. Before applying the configuration, the Defender for Endpoint Protection service should not be started.

    Image of Services panel1.

  2. After the configuration has been applied, the Defender for Endpoint Protection Service should be started.

    Image of Services panel2.

  3. After the services are running on the device, the device appears in Microsoft Defender Security Center.

    Image of Microsoft Defender Security Center.

Confirm next-generation protection

  1. Before applying the policy on a test device, you should be able to manually manage the settings as shown below.

    Image of setting page1.

  2. After the policy has been applied, you should not be able to manually manage the settings.

     Note

    In the following image Turn on cloud-delivered protection and Turn on real-time protection are being shown as managed.

    Image of setting page2.

Confirm Attack Surface Reduction – Attack surface reduction rules

  1. Before applying the policy on a test device, pen a PowerShell Window and type Get-MpPreference.
  2. This should respond with the following lines with no content:

    AttackSurfaceReductionOnlyExclusions:

    AttackSurfaceReductionRules_Actions:

    AttackSurfaceReductionRules_Ids:

    Image of command line1.

  3. After applying the policy on a test device, open a PowerShell Windows and type Get-MpPreference.
  4. This should respond with the following lines with content as shown below:

    Image of command line2.

Confirm Attack Surface Reduction – Web Protection

  1. On the test device, open a PowerShell Windows and type (Get-MpPreference).EnableNetworkProtection.
  2. This should respond with a 0 as shown below.

    Image of command line3.

  3. After applying the policy, open a PowerShell Windows and type (Get-MpPreference).EnableNetworkProtection.
  4. This should respond with a 1 as shown below.

    Image of command line4.

Feedback

Source : Official Microsoft Brand
Editor by : BEST Antivirus KBS Team

How useful was this post?

Click on a star to rate it!

Average rating 0 / 5. Vote count: 0

No votes so far! Be the first to rate this post.

(Visited 21 times, 1 visits today)
Tagged: MicrosoftMicrosoft for Endpoint

Related Articles

  • All about Microsoft

  • Overview of Microsoft 365 Lighthouse

  • Microsoft Defender for Business (preview) – Frequently asked questions and answers

  • Get help and support for Microsoft Defender for Business (preview)

  • Manage your custom rules for firewall policies in Microsoft Defender for Business (preview)

  • Firewall in Microsoft Defender for Business (preview)

ask or enter a search term

Top Rated Posts

5 (1)

Activate code Avast on Windows PC

5 (1)

[KB5699] Set the PIN in ESET Parental Control for Android

5 (2)

Getting started (app) (ESET)

5 (1)

[KB3239] How do I uninstall or reinstall ESET Cyber Security or ESET Cyber Security Pro?

5 (2)

[KB6842] Upgrade to ESET Cyber Security and ESET Cyber Security Pro version 6.6 fails on previous versions of macOS (10.6 – 10.8)

About

We are BEST Antivirus , Trusted Comparison and Cheap Antivirus Software 2020. KBS is Knowledge Base and Support : This page was created to guide customers through the installation and to resolve all the common errors of anti-virus software.

Partners

› Avast
› AVG
› BitDefender
› ESET
› Trend Micro
› All Partners

Resources

› Store
› Advertise
› Brand Reviews
› Review Platforms
› Contact Page
› Knowledge Base

  • Install & Activate
  • Troubleshooting
© Copyright by BEST Antivirus by SSG Limited