Manage Windows Servers with Defender for Endpoint and Intune

Manage Windows Servers with Defender for Endpoint and Intune

Windows Server devices can’t be enrolled into Intune, but Intune is a very neat way to deploy Defender for Endpoint configuration such as Attack Surface Reduction and stuff.

Luckily we can simply manage Windows Servers via Intune via Defender for Endpoint using a clever technique called Security Management for Microsoft Defender for Endpoint.

With this capability, devices that aren’t managed by a Microsoft Intune service can receive security configurations for Microsoft Defender for Endpoint directly from Intune.

This has been possible for over a year - I made a video of it back then - but it was only possible for devices that were Hybrid or Azure AD joined, meaning some devices such as kiosks or even Domain Controllers weren’t possible to manage.

Last week, Microsoft announced that they have updated the enrollment requirements - and Azure AD Join is no longer required. They’ve done some magic in the background so that the Defender for Endpoint agent itself is joining Azure AD in some stealthy way, which means the device doesn’t need to.

It’s in preview at the moment, but let’s jump in and take a look. I started recording a video for the channel covering this, but the portals took over an hour to update and confirm the onboarding, so I ran out of time before I had to catch my train to InfoSec London. Watch out for the video coming on Friday.

Once you’ve enrolled to the public preview and onboarded some devices (check out my upcoming video on how to do that!), we’ll see the devices appear in the various portals after a few minutes, and sometimes hours.

Here’s what the Azure AD (or Entra) experience will be:

No alt text provided for this image

Notice the devices (AVM-055500-6 and AVM-055500-7) sow up as Azure AD joined, even though they are not at all Azure AD Joined. The MDM is showing as Intune, but they are not enrolled in Intune.

It’s a different story from the Intune portal perspective:

No alt text provided for this image

Here, we see that the devices (6 and 7) are managed by MDE, not Intune, and Ownership, Compliance and Primary User information is not populated.

From Security portal it’s still not very clear what state these devices are in:

No alt text provided for this image

They’re showing as Azure AD Joined (they’re not, although technically the MDE component of them is). We see that the exposure level has been assessed, we we are shown the OS version. These devices are fully onboarded to MDE, as shown in the detailed device screen:

No alt text provided for this image

The removal of the Azure AD Join enrollment requirement for this feature is a game-changer, and is a big step forward to allow organizations to secure all their devices with Defender for Endpoint.

Tommy Nielsen

Copilot, Endpoint Architecture and Cloud Security specialist

1 年

Great Dean. I'm working for a customer with this and we now have a test server listed as device in Intune but it says it is managed by ConfigMgr. I cant find out to switch the server to be managed by MDE. Do you know how? (The server is hybrid joined)

回复
Leif Davisson

Mentoring Next-gen Network security professionals

1 年

Can you deploy mde without intune?

Love it! Thanks for the information!!

Dean Ellerby

wpninjas.uk | robopack.com | learn.alpenshield.io | Speaker | Author | Microsoft MVP | MCT

1 年

Aaaand here is the video... https://www.youtube.com/watch?v=O9Ee1N8b068

要查看或添加评论,请登录

Dean Ellerby的更多文章

  • Ignite Seattle - Day 2 wrap-up

    Ignite Seattle - Day 2 wrap-up

    So that's that. Which, I have to admit, has come as a surprise to many Seattle attendees that I've spoken to.

    5 条评论
  • 50% off Defender for Endpoint? Too good to be true? Nope!

    50% off Defender for Endpoint? Too good to be true? Nope!

    UPDATE: October 13th Huge thanks to Michael Shalev, Principal PM Manager for Microsoft Defender for Endpoint. Michael…

    5 条评论
  • M365 Defender - Attack Disruption at "Machine Speed"

    M365 Defender - Attack Disruption at "Machine Speed"

    According to the Ignite Book of News, "Microsoft 365 Defender now automatically disrupts ransomware attacks". So what…

  • Ignite Seattle - Day 1

    Ignite Seattle - Day 1

    With an event seemingly organized at the very last moment - opening for registration just 1 month before the event…

    2 条评论
  • Endpoint Privilege Management add-on - Part of Intune Premium

    Endpoint Privilege Management add-on - Part of Intune Premium

    With the Preview Release of Intune's Endpoint Privilege Management add-on (part of Intune Premium) in line with the…

  • Windows 11's Smart App Control feature is AppLocker for the masses

    Windows 11's Smart App Control feature is AppLocker for the masses

    For a many years, AppLocker and then Windows Defender Application Control have allowed business customers to protect…

  • Some awesome community tools - Part 1

    Some awesome community tools - Part 1

    In preparation for a series of talks I'll be giving over the next couple of months, I've been researching some of my…

  • What is Microsoft Entra?

    What is Microsoft Entra?

    I'm sure you'll agree, the one thing Microsoft 365 needs is another portal. That's where Entra can help! If you don't…

  • A first look at Windows Autopatch enrolment

    A first look at Windows Autopatch enrolment

    Windows Autopatch, as the name suggests, is a service that manages the automated patching of Windows Devices. With that…

  • Is Windows Autopilot worth the effort?

    Is Windows Autopilot worth the effort?

    This week I was asked a very simple question..

    6 条评论

社区洞察

其他会员也浏览了