In this post, I will show you how to onboard Windows devices to Defender for Endpoint using Intune. You can manually create a EDR Policy or deploy a preconfigured EDR policy in Intune to onboard your Windows devices to Microsoft Defender Portal.

Microsoft Defender for Endpoint is an enterprise endpoint security platform designed to help enterprise networks prevent, detect, investigate, and respond to advanced threats.

When you onboard a Windows device to Defender for Endpoint via Intune, new detections, vulnerability, or security data are sent to the Microsoft Defender portal. You can then prioritize alerts effectively, gain visibility into the full scope of a breach, and take response actions to remediate threats.

Install and Update Third Party Applications with Patch My PC
Install and Update Third Party Applications with Patch My PC

Prerequisites

To onboard your Windows devices and manage them from Defender for Endpoint console, the following are the requirements. These prerequisites are provided by Microsoft.

Licensing Requirements

  • Defender for Endpoint Plan 1 and Plan 2.
  • Microsoft Defender for Business (for small and medium-sized businesses)
  • To onboard servers to Defender for Endpoint, any of the following server licences are required.
    • Microsoft Defender for Servers Plan 1 or Plan 2
    • Microsoft Defender for Endpoint Server
    • Microsoft Defender for Business servers

Supported Windows Versions

  • Windows 11 Enterprise, Education, Pro, Pro Education, IoT Enterprise
  • Windows 10 and 11 on ARM
  • Windows 10 Enterprise, Education, Pro, Pro Education, IoT Enterprise, LTSC 2016 (or later).
  • Windows Server
  • Azure Virtual Desktop (AVD)
  • Windows 365 Cloud PCs running one of the previously listed operating systems/versions.

Other Supported Operating Systems

  • Mac (client devices)
  • Linux
  • Windows Subsystem for Linux
  • Android
  • iOS

Enable Microsoft Defender Antivirus ELAM driver

If you’re running Microsoft Defender Antivirus as the primary anti-malware product on your devices, the Defender for Endpoint agent successfully onboards without any problems.

If you’re using a non-Microsoft anti-malware solution alongside Mobile Device Management tools or Microsoft Configuration Manager (current branch), ensure that the Microsoft Defender Antivirus ELAM driver is activated.

Ways Onboard devices in Defender for Endpoint

Any of the supported management tools listed below can be used to onboard devices to Defender for Endpoint Portal.

  • Windows Local script (up to 10 devices)
  • Using Group Policy
  • Microsoft Intune
  • Microsoft Endpoint Configuration Manager
  • Using VDI scripts
  • Integration with Azure Defender

Step 1: Connect Microsoft Defender for Endpoint to Intune

Before you start to onboard the devices in Microsoft Defender for Endpoint, you need to first configure Defender for Endpoint integration for Intune. Note that this is a one-time action per tenant.

Sign in to the Microsoft Intune admin center. Go to Endpoint security > Microsoft Defender for Endpoint. Select the link Open the Microsoft Defender Security Center.

Connect Microsoft Defender for Endpoint to Intune
Connect Microsoft Defender for Endpoint to Intune

In the Microsoft Defender for Endpoint console, select Settings > Endpoints > Advanced features. Scroll down to locate the entry for Microsoft Intune connection and set the toggle to On. Click Save Preferences to complete the connection between Intune and Defender for Endpoint.

Connect Defender for Endpoint with Intune
Connect Defender for Endpoint with Intune

Step 2: Create an EDR Policy to onboard Windows Devices

Let’s create an Endpoint detection and response policy (EDR Policy) to onboard Windows devices to Microsoft Defender for Endpoint in Intune. Manually creating the EDR Policy is usually preferred for more granular deployments, which requires you to complete a few additional steps. If you wish to deploy a preconfigured EDR policy for onboarding devices to MDE, jump to Step 3.

Sign in to the Microsoft Intune Admin center. Go to Endpoint security and select Endpoint detection and response. Click Create Policy.

Create an EDR Policy to onboard Windows Devices
Create an EDR Policy to onboard Windows Devices

On Create a profile window, select Platform as Windows 10 and later and profile as Endpoint detection and response. Click Create.

Create an EDR Policy to onboard Windows Devices
Create an EDR Policy to onboard Windows Devices

In the Basics section, specify the profile name as “Onboard Windows Devices to Defender for Endpoint“. You may add a brief description as well. Click Next.

Onboard Windows Devices to Defender for Endpoint using Intune
Create an EDR Policy to onboard Windows Devices

In the Configuration Settings section, select Endpoint Detection and Response. There are three settings available for Windows devices.

  • Microsoft Defender for Endpoint client configuration package type: Choose the client package type. Select Auto from connector.
  • Sample sharing for all files: Choose the Windows Defender Advanced Threat Protection Sample Sharing configuration parameter. Select Not Configured.
  • Telemetry Reporting Frequency: Choose Windows Defender Advanced Threat Protection telemetry reporting frequency. Select Expedite.

Click Next.

EDR policy for windows devices in Intune
EDR policy for windows devices in Intune

On the Scope tags section, click Next.

Onboard Windows Devices to Defender for Endpoint using Intune
Onboard Windows Devices to Defender for Endpoint using Intune

Add your groups under the Assignments section. I would recommend adding Entra ID groups containing pilot devices and see if they enroll correctly. Once you see it working, you can add more groups later by editing the policy. Click Next.

Onboard Windows Devices to Defender for Endpoint using Intune
Onboard Windows Devices to Defender for Endpoint using Intune

Finally, review the profile settings on Review + Create section and click Create.

Onboard Windows Devices to Defender for Endpoint using Intune
Onboard Windows Devices to Defender for Endpoint using Intune

You should also see the newly created EDR policy under Endpoint Security > Endpoint detection and response.

EDR Policy created in Intune
EDR Policy created in Intune

Step 3: Deploy Preconfigured policy for Onboarding Windows devices

In this step, I will deploy a preconfigured EDR policy for onboarding Windows devices to MDE. Deploying a preconfigured policy is significantly easier and faster for onboarding devices compared to creating your own EDR policy.

Open the Microsoft Intune admin center and go to Endpoint security > Endpoint detection and response > and select the EDR Onboarding Status tab. On this tab, select Deploy preconfigured policy.

Deploy Preconfigured policy for Onboarding Windows devices
Deploy Preconfigured policy for Onboarding Windows devices

For Platform, select Windows for devices managed directly by Intune, or Windows (ConfigMgr) for devices managed through the Tenant Attach scenario. For Profile, select Endpoint detection and response. Click Create.

Deploy Preconfigured policy for Onboarding Windows devices
Deploy Preconfigured policy for Onboarding Windows devices

Specify a Name for the policy. Click Next.

Using Preconfigured EDR Policy for Onboarding Windows Devices to MDE
Using Preconfigured EDR Policy for Onboarding Windows Devices to MDE

On the Review and Create page, you can review the policy configuration. When ready, select Save to save this policy, which immediately begins to deploy to the All Devices group.

Using Preconfigured EDR Policy for Onboarding Windows Devices to MDE
Using Preconfigured EDR Policy for Onboarding Windows Devices to MDE

Step 4: Sync Intune Policies

After assigning the EDR policy to the device groups, the devices will get the policy settings after they check in with the Intune service. You can also force sync Intune policies on your computers in case you don’t find the policy settings applied to these devices.

Step 5: Monitor EDR Policy assignments

If you’ve manually created a EDR policy and assigned it to your Windows devices, the policy assignments can be monitored from the Intune admin center. To do that, go to Endpoint Security > Endpoint Detection and response. Select the Windows onboarding EDR Policy to see the count of devices that received the policy. To find the device names that successfully received the policy, click on View report.

Monitor EDR Policy assignments in Intune
Monitor EDR Policy assignments in Intune

Step 6: Verify the onboarding status of the device

In this step, I will show you how to check if the Windows devices are successfully onboarded to Defender for Endpoint. You can verify the Windows device onboarding status from the Intune admin center or from Microsoft Defender Portal.

Method 1: In the Intune admin center, go to Endpoint security > Endpoint detection and response > and select the EDR Onboarding Status tab. At the bottom, look for the device names along with the onboarding status column. The onboarding status column shows whether the device is successfully onboarded or not.

Verify the onboarding status of Windows devices in Intune
Verify the onboarding status of Windows devices in Intune

Method 2: Sign in to Microsoft Defender admin console and go to Assets > Devices. Here you should find the same set of Windows devices that were onboarded through Intune.

Verify the onboarding status of Windows devices in MDE
Verify the onboarding status of Windows devices in MDE

After onboarding the endpoints, the next step is where you’ll configure the various capabilities such as endpoint detection and response, next-generation protection, and attack surface reduction. All such interesting topics will be covered in the upcoming guides. I hope this device onboarding guide helped you. Thanks for reading👍

Still Need Help?

If you need further assistance on the above article or want to discuss other technical issues, check out some of these options.

Prajwal Desai

Prajwal Desai is a technology expert and 10 time Dual Microsoft MVP (Most Valuable Professional) with a strong focus on Microsoft Intune, SCCM, Windows 365, Enterprise Mobility, and Windows. He is a renowned author, speaker, & community leader, known for sharing his expertise & knowledge through his blog, YouTube, conferences, webinars etc.