This browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
Note
Access to this page requires authorization. You can trysigning in orchanging directories.
Access to this page requires authorization. You can trychanging directories.
When you integrate Microsoft Intune with Microsoft Defender for Endpoint, you can use Intune endpoint security policies to manage the Defender security settings on devices that aren't enrolled with Intune. This capability is known asDefender for Endpoint security settings management.
When you manage devices through security settings management:
You can use theMicrosoft Intune admin center or theMicrosoft 365 Defender portal to manage Intune endpoint security policies for Defender for Endpoint and assign those policies to Microsoft Entra ID groups. The Defender portal includes the user interface for device views, policy management, and reports for security settings management.
To manage policies from within the Defender portal, seeManage endpoint security policies in Microsoft Defender for Endpoint in the Defender content.
Devices get their assigned policies based on their Microsoft Entra ID device object. A device that isn't already registered in Microsoft Entra is joined as part of this solution.
When a device receives a policy, the Defender for Endpoint components on the device enforce the policy and report on the device's status. The device's status is available in the Microsoft Intune admin center and the Microsoft Defender portal.
This scenario extends the Microsoft Intune Endpoint Security surface to devices that aren't capable of enrolling in Intune. When a device is managed by Intune (enrolled to Intune) the device doesn't process policies for Defender for Endpoint security settings management. Instead, use Intune to deploy policy for Defender for Endpoint to your devices.
Applies to:
Review the following sections for requirements for the Defender for Endpoint security settings management Scenario.
When a supported device onboards to Microsoft Defender for Endpoint:
The Defender for Endpoint security settings management scenario is supported in the following government tenants:
For more information, see:
Devices must have access to the following endpoint:
*.dm.microsoft.com - The use of a wildcard supports the cloud-service endpoints that are used for enrollment, check-in, and reporting, and which can change as the service scales.Note
Endpoints for government customers are located atNetwork endpoints for US government deployments
Policies for Microsoft Defender for Endpoint security management are supported for the following device platforms:
Linux:
WithMicrosoft Defender for Endpoint for Linux agent version101.23052.0009 or later, security settings management is supported across all Linux distributions listed atSupported Linux distributions.
You can find the version of your Defender agents using these methods from within theMicrosoft Defender portal:
You can investigate a single device by browsing toAssets > Devices > Overview and reviewing theDefender engine version field.
You can view a summary report and export a full inventory list showing platform versions atReports > Endpoints > Device health > Microsoft Defender Antivirus health.
You can use the following query inHunting > Advanced hunting and review theSoftwareVersion data:
DeviceTvmSoftwareInventory| where SoftwareName == "defender_for_linux"For guidance on updating the agent version, seeDeploy updates for Microsoft Defender for Endpoint on Linux.
Known issues
With Defender agent version101.23052.0009, Linux devices fail to enroll if the following file path is absent:/sys/class/dmi/id/board_vendor.
When a Linux device performs synthetic registration, the Device Entra ID (formerly known as Device AAD ID) isn't visible in the Defender portal. This information can be viewed from the Intune or Microsoft Entra portals. Administrators can still manage devices with policies in this manner.
macOS:
WithMicrosoft Defender for Endpoint for macOS agent version101.23052.0004 or later, security settings management is supported on the macOS versions listed in theSystem requirements
You can find the versions of your Defender agents using these methods from within theMicrosoft Defender portal:
You can investigate a single device by browsing toAssets > Devices > Overview and reviewing theDefender engine version field.
You can view a summary report and export a full inventory list showing platform versions atReports > Endpoints > Device health > Microsoft Defender Antivirus health.
You can use the following query inHunting > Advanced hunting and review theSoftwareVersion data:
DeviceTvmSoftwareInventory| where SoftwareName == "defender_for_mac"For guidance on updating the agent version, seeDeploy updates for Microsoft Defender for Endpoint on macOS.
Known issues
Windows:
Windows 10 Professional/Enterprise (withKB5023773)
Important
On October 14, 2025,Windows 10 reached end of support and won't receive quality and feature updates. Windows 10 is anallowed version in Intune. Devices running this version can still enroll in Intune and use eligible features, but functionality won't be guaranteed and can vary.
Windows 11 Professional/Enterprise (withKB5023778)
Windows Server 2012 R2 withMicrosoft Defender for Down-Level Devices
Windows Server 2016 withMicrosoft Defender for Down-Level Devices
Windows Server 2019 (withKB5025229)
Windows Server 2019 Core (with theServer Core App Compatibility Feature on Demand installed)
Windows Server 2022, including Server Core (withKB5025230)
Windows Server 2025
Domain controllers. See important information inUse of security settings management on domain controllers (in this article).
Security settings management doesn't work on and isn't supported with the following devices:
To use security settings management, you need:
A subscription that grants licenses for Microsoft Defender for Endpoint, like Microsoft 365, or a standalone license for only Microsoft Defender for Endpoint. A subscription that grants Microsoft Defender for Endpoint licenses also grants your tenant access to the Endpoint security node of the Microsoft Intune admin center.
Note
Exception: If you have access to Microsoft Defender for Endpointonly through Microsoft Defender for servers (part of Microsoft Defender for Cloud, formerly Azure Security Center), the security settings management functionality isn't available. You must have at least one Microsoft Defender for Endpoint (user) subscription license active.
The Endpoint security node is where you configure and deploy policies to manage Microsoft Defender for Endpoint for your devices and monitor device status.
For current information about options, seeMinimum requirements for Microsoft Defender for Endpoint.
For guidance on assigning the right level of permissions and rights to administrators who manage Intune endpoint security policies from within the Intune admin center, seeAssign role-based access controls for endpoint security policy.
The following diagram is a conceptual representation of the Microsoft Defender for Endpoint security configuration management solution.
Important
Security settings management uses a synthetic registration for devices that don't fully register in Microsoft Entra ID, and drops the Microsoft Entra hybrid join prerequisite. With this change, Windows devices that previously had enrollment errors begin onboarding to Defender and then receive and process the security settings management policies.
To filter for devices that were unable to enroll due to failing to meet the Microsoft Entra hybrid join prerequisite, navigate to theDevices list in the Microsoft Defender portal, and filter by enrollment status. Because these devices aren't fully registered, their device attributes showMDM =Intune andJoin Type =Blank. These devices now enroll with security settings management using the synthetic registration.
After enrolling these devices appear in the device lists for Microsoft Defender, Microsoft Intune, and Microsoft Entra portals. While the devices don't fully register with Microsoft Entra, their synthetic registration counts as one device object.
You can use the Microsoft Defender for EndpointDevice inventory to confirm a device is using the security settings management capability in Defender for Endpoint, by reviewing the devices status in theManaged by column. TheManaged by information is also available on the devices side-panel or device page.Managed by should consistently indicate that its managed byMDE.
You can also confirm a device is enrolled insecurity settings management successfully by confirming that the device-side panel or device page displayMDE Enrollment status asSuccess.
If theMDE Enrollment status doesn't displaySuccess, make sure you're looking at a device that was updated and is in scope for security settings management. (You configure the scope on the Enforcement scope page while configuring security settings management.)
In the Microsoft Intune admin center, go to the All Devices page. Devices enrolled with security settings management appear here as in the Defender portal. In the admin center, the devices Managed by field should display MDE.
Tip
In June 2023, security settings management began using synthetic registration for devices that don't fully register in Microsoft Entra. With this change, devices that previously had enrollment errors begin onboarding to Defender and then receive and process the security settings management policies.
On theAll devices page In the Microsoft Azure portal, you can view device details.
To ensure that all devices enrolled in Defender for Endpoint security settings management receive policies, we recommend creating adynamic Microsoft Entra group based on the devices' OS Type. With a dynamic group, devices that are managed by Defender for Endpoint are automatically added to the group without requiring admins to perform other tasks, like creating a new policy.
Important
From July 2023 to September 25, 2023, security settings management ran an opt-in public preview that introduced new behavior for devices that were managed and enrolled to the scenario. Starting on September 25, 2023, the public preview behavior became generally available and now applies to all tenants that use security settings management.
If you used security settings management prior to September 25, 2023, and didn't join the opt-in public preview that ran from July 2023 to September 25, 2023, review your Microsoft Entra groups that rely on system labels to make changes that will identify new devices you manage with security settings management. This is because prior to September 25, 2023, devices not managed through the opt-in public preview would use the following system labels (tags) ofMDEManaged andMDEJoined to identify managed devices. These two system labels are no longer supported and are no longer added to devices that enroll.
Use the following guidance for your Dynamic groups:
(Recommended) When targeting policy, use dynamic groups based on the device platform by using thedeviceOSType attribute (Windows, Windows Server, macOS, Linux) to ensure policy continues to be delivered for devices that change management types, for example during MDM enrollment.
If necessary, dynamic groups containing exclusively devices that are managed by Defender for Endpoint can be targeted by defining a dynamic group using themanagementType attributeMicrosoftSense. Use of this attribute targets all devices that are managed by Defender for Endpoint via the security settings management functionality, and devices remain in this group only while managed by Defender for Endpoint.
Also, when configuring security settings management, if you intend to manage entire OS platform fleets using Microsoft Defender for Endpoint, by selectingall devices instead oftagged devices in the Microsoft Defender for Endpoint Enforcement Scope page, understand that any synthetic registrations are counted against Microsoft Entra ID quotas the same as full registrations.
Microsoft Intune includes several methods and policy types to manage the configuration of Defender for Endpoint on devices. The following table identifies the Intune policies and profiles that support deployment to devices managed by Defender for Endpoint security settings management and can help you identify if this solution is right for your needs.
When you deploy an endpoint security policy that's supported for bothDefender for Endpoint security settings management andMicrosoft Intune, a single instance of that policy is processed by:
Profiles for theWindows 10 and later platform aren't supported for devices managed by security settings management.
Following profiles are supported for each device type:
The following policy types support theLinux platform.
| Endpoint security policy | Profile | Defender for Endpoint security settings management | Microsoft Intune |
|---|---|---|---|
| Antivirus | Microsoft Defender Antivirus | ![]() | ![]() |
| Antivirus | Microsoft Defender Antivirus exclusions | ![]() | ![]() |
| Endpoint detection and response | Endpoint detection and response | ![]() | ![]() |
| Endpoint detection and response | Microsoft Defender Global Exclusions (AV+EDR) | ![]() | ![]() |
The following policy types support themacOS platform.
| Endpoint security policy | Profile | Defender for Endpoint security settings management | Microsoft Intune |
|---|---|---|---|
| Antivirus | Microsoft Defender Antivirus | ![]() | ![]() |
| Antivirus | Microsoft Defender Antivirus exclusions | ![]() | ![]() |
| Endpoint detection and response | Endpoint detection and response | ![]() | ![]() |
To support use with Microsoft Defender security settings management, your policies for Windows devices must use theWindows platform. Each profile for theWindows platform can apply to devices that are managed by Intune and to devices that are managed by security settings management.
| Endpoint security policy | Profile | Defender for Endpoint security settings management | Microsoft Intune |
|---|---|---|---|
| Antivirus | Defender Update controls | ![]() | ![]() |
| Antivirus | Microsoft Defender Antivirus | ![]() | ![]() |
| Antivirus | Microsoft Defender Antivirus exclusions | ![]() | ![]() |
| Antivirus | Windows Security Experience | ![]() | ![]() |
| Attack Surface Reduction | Attack Surface Reduction Rules | ![]() | ![]() |
| Attack Surface Reduction | Device Control | Note1 | ![]() |
| Endpoint detection and response | Endpoint detection and response | ![]() | ![]() |
| Firewall | Firewall | ![]() | ![]() |
| Firewall | Firewall Rules | ![]() | ![]() |
1 - This profile is visible in the Defender portal but isn't supported for devices managed only by Microsoft Defender through the Microsoft Defender security settings management scenario. This profile is supported only for devices managed by Intune.
Each Intune endpoint security profile is a discrete group of settings intended for use by security admins who focus on protecting devices in your organization. The following are descriptions of the profiles that are supported by the security settings management scenario:
Antivirus policies manage the security configurations found in Microsoft Defender for Endpoint.
Note
While endpoints don't require a restart in order to apply modified settings or new policies, there's an issue where theAllowOnAccessProtection andDisableLocalAdminMerge settings might at times require end users to restart their devices for these settings to update. This issue is under investigation in order to provide a resolution.
Attack surface reduction (ASR) policies focus on minimizing the places where your organization is vulnerable to cyberthreats and attacks. With security settings management, ASR rules apply to devices that runWindows 10,Windows 11, andWindows Server.
Important
On October 14, 2025,Windows 10 reached end of support and won't receive quality and feature updates. Windows 10 is anallowed version in Intune. Devices running this version can still enroll in Intune and use eligible features, but functionality won't be guaranteed and can vary.
For current guidance about which settings apply to the different platforms and versions, seeASR rules supported operating systems in the Windows Threat protection documentation.
Tip
To help keep supported endpoints up to date, consider using themodern unified solution for Windows Server 2012 R2 and 2016.
Also see:
Endpoint detection and response (EDR) policies manage the Defender for Endpoint capabilities that provide advanced attack detections that are near real-time and actionable. Based on EDR configurations, security analysts can prioritize alerts effectively, gain visibility into the full scope of a breach, and take response actions to remediate threats.
Firewall policies focus on the Defender firewall on your devices.
Firewall Rules are a type of profile forFirewall policy that is comprised of granular rules for Firewalls, including specific ports, protocols, applications, and networks.
To support security settings management through the Microsoft Intune admin center, you must enable communication between them from within each console.
The following sections guide you through that process.
In the Microsoft Defender portal, as a security administrator:
Sign in to theMicrosoft Defender portal and go toSettings >Endpoints >Configuration Management >Enforcement Scope and enable the platforms for security settings management.
Note
If you have theManage security settings in Security Center permission in the Microsoft Defender portal, and are simultaneously enabled to view devices from all Device Groups (norole-based access control limits on your user permissions), you can also perform this action.
Initially, we recommend testing the feature for each platform by selecting the platforms option forOn tagged devices, and then tagging the devices with theMDE-Management tag.
Tip
Use the proper device tags to test and validate your rollout on a small number of devices.
When you deploy to theAll devices group, any device that falls into the scope configured will automatically be enrolled.
While most devices complete enrollment and apply assigned policy within a few minutes, a device can sometimes take up to 24 hours to complete enrollment.
Important
As of July 3rd, 2025, dynamic asset rules are supported for defining the devices in the MDE-Management tag in public preview.
Configure the feature for Microsoft Defender for Cloud onboarded devices and Configuration Manager authority settings to fit your organization's needs:
Tip
To ensure your Microsoft Defender portal users have consistent permissions across portals, if not already provided, request that your IT administrator grants them the Microsoft IntuneEndpoint Security Managerbuilt-in RBAC role.
In the Microsoft Intune admin center, your account needs permissions equal to Endpoint Security Manager built-in Role based access control (RBAC) role.
Sign in to theMicrosoft Intune admin center.
SelectEndpoint security >Microsoft Defender for Endpoint, and setAllow Microsoft Defender for Endpoint to enforce Endpoint Security Configurations toOn.
When you set this option toOn, all devices in the platform scope for Microsoft Defender for Endpoint that aren't managed by Microsoft Intune qualify to onboard to Microsoft Defender for Endpoint.
Microsoft Defender for Endpoint supports several options to onboard devices. For current guidance, seeOnboard to Microsoft Defender for Endpoint in the Defender for Endpoint documentation.
In some environments, it might be desired to use security settings management with devices managed by Configuration Manager. If you use both, you need to control policy through a single channel. Use of more than one channel creates the opportunity for conflicts and undesired results.
To support this, configure theManage Security settings using Configuration Manager toggle toOff. Sign in to theMicrosoft Defender portal and go toSettings >Endpoints >Configuration Management >Enforcement Scope:
After devices onboard to Defender for Endpoint, you'll need to create device groups to support deployment of policy for Microsoft Defender for Endpoint. To identify devices that have enrolled with Microsoft Defender for Endpoint but aren't managed by Intune or Configuration Manager:
Sign in toMicrosoft Intune admin center.
Go toDevices >All devices, and then select the columnManaged by to sort the view of devices.
Devices that onboard to Microsoft Defender for Endpoint and are registered but aren't managed by Intune displayMicrosoft Defender for Endpoint in theManaged by column. These are the devices that can receive policy for security management for Microsoft Defender for Endpoint.
Starting on September 25, 2023, devices that use security management for Microsoft Defender for Endpoint can no longer be identified by using the following system labels:
Instead of using system labels, you can use the management type attribute, and configure it toMicrosoftSense.
You can create groups for these devicesin Microsoft Entra orfrom within the Microsoft Intune admin center. When creating groups, you can use theOS value for a device if you're deploying policies to devices running Windows Server vs devices that run a client version of Windows:
Windows Workstations:
Windows Servers:
Linux Devices:
Important
In May 2023,deviceOSType updated to distinguish betweenWindows clients andWindows Servers.
Custom scripts andMicrosoft Entra dynamic device groups created before this change that specify rules that reference onlyWindows might excludeWindows Servers when used with the Security Management for Microsoft Defender for Endpoint solution. For example:
equals ornot equals operator to identifyWindows, this change affects your rule. That is because previously bothWindows andWindows Server were reported asWindows. To continue to include both, you must update the rule to also referenceWindows Server.contains orlike operator to specifyWindows, then your rule isn't affected by this change. These operators can find bothWindows andWindows Server.Tip
Users that are delegated the ability to manage endpoint security settings might not have the ability to implement tenant-wide configurations in Microsoft Intune. Check with your Intune administrator for more information on roles and permissions in your organization.
After creating one or more Microsoft Entra groups that contain devices managed by Microsoft Defender for Endpoint, you can create and deploy the following policies for security settings management to those groups. The policies and profiles available vary by platform.
For the list of policy and profile combinations supported for security settings management, see the chart inWhich solution should I use, found in this article.
Tip
Avoid deploying multiple policies that manage the same setting to a device.
Microsoft Intune supports deploying multiple instances of each endpoint security policy type to the same device, with each policy instance being received by the device separately. Therefore, a device might receive separate configurations for the same setting from different policies, which results in a conflict. Some settings (like Antivirus Exclusions) merge on the client and apply successfully.
Sign in to theMicrosoft Intune admin center.
Go toEndpoint security, select the type of policy you want to configure, and then selectCreate Policy.
For the policy, select the Platform and the Profile that you want to deploy. For a list of the Platforms and Profiles that support security settings management, see the chart inWhich solution should I use? earlier in this article.
Note
The supported profiles apply to devices that communicate through Mobile Device Management (MDM) with Microsoft Intune and devices that communicate using the Microsoft Defender for Endpoint client.
Ensure you review your targeting and groups as necessary.
SelectCreate.
On theBasics page, enter a name and description for the profile, then chooseNext.
On theConfiguration settings page, select the settings you want to manage with this profile.
To learn more about a setting, expand itsinformation dialog and select theLearn more link to view the on-line Configuration Service Provider (CSP) documentation or related details, for that setting.
When you're done configuring settings, selectNext.
On theAssignments page, select the Microsoft Entra groups that receive this profile. For more information on assigning profiles, seeAssign user and device profiles.
SelectNext to continue.
Tip
Complete the policy creation process and then on theReview + create page, selectCreate. The new profile is displayed in the list when you select the policy type for the profile you created.
Wait for the policy to be assigned and view a success indication that policy was applied.
You can validate that settings were applied locally on the client by using theGet-MpPreference command utility.
Intune:
Status and reports for policies that target devices in this channel are available from the policy node under Endpoint security in the Microsoft Intune admin center.
Drill in to the policy type and then select the policy to view its status. You can view the list of platforms, policy types, and profiles that support security settings management in the table inWhich solution should I use, earlier in this article.
When you select a policy, you can view information about the device check-in status, and can select:
Defender Portal:
You can also monitor the Intune policies that are applied from within theMicrosoft Defender portal. Within the portal, go toEndpoints, expandconfiguration management and selectEndpoint security policies. Select a policy to view its status, and then select:
For more information, seeManage endpoint security policies in Microsoft Defender for Endpoint in the Defender content.
Devices managed by this capability check-in with Microsoft Intune every 90 minutes to update policy.
You can manually sync a device on-demand from theMicrosoft Defender portal. Sign-in to the portal and go toDevices. Select a device that is managed by Microsoft Defender for Endpoint, and then select thePolicy sync button:
The Policy sync button only appears for devices that are successfully managed by Microsoft Defender for Endpoint.
If a device has tamper protection turned on, it isn't possible to edit the values ofTamper-protected settings without disabling Tamper Protection first.
Assignment filters aren't supported for devices communicating through the Microsoft Defender for Endpoint channel. While assignment filters can be added to a policy that could target these devices, the devices ignore assignment filters. For assignment filter support, the device must be enrolled in to Microsoft Intune.
You can delete devices that use this flow using one of two methods:
Once a device is removed from either location, that change propagates to the other service.
While an Administrator with permissions in both services can complete initial provisioning flows, the following roles are sufficient to complete configurations in each separate service:
Devices that are joined to Active Directory use theirexisting infrastructure to complete the Microsoft Entra hybrid join process.
The following security settings are pending deprecation. The Defender for Endpoint security settings management flow doesn't support these settings:
Expedite telemetry reporting frequency (underEndpoint Detection and Response)
AllowIntrusionPreventionSystem (underAntivirus)
AllowLocalPolicyMerge
Security settings management is supported on domain controllers. To manage security settings on domain controllers, you must enable it in the enforcement scope page (go toSettings >EndpointsEnforcement scope). Windows Server devices must be enabled before you can enable configuration of domain controllers. Additionally, if theon tagged devices option is selected for Windows Servers, configuration of domain controllers is limited to tagged devices, too.
Caution
Some Microsoft Defender for Endpoint client functions use PowerShell. For example, Live Response can execute custom scripts from an approved library. These functions run in an instance of PowerShell executed by the Defender for Endpoint client.
Troubleshooting device issues is more difficult if administrators are blocked from executing PowerShell. Performance and communications problems can be diagnosed more easily with PowerShell scripts.
Microsoft Defender for Endpoint security settings management will not work for a device that has PowerShell configured to run inConstrained Language Mode. For more information, seeabout_Language_Modes in the PowerShell documentation.
If you previously had a third-party security tool on the machine and are now managing it with Defender for Endpoint, you might see some impact on Defender for Endpoint's capability to manage Security settings in rare cases. In such cases, as a troubleshooting measure, uninstall and reinstall the latest version of Defender for Endpoint on your machine.
Manage endpoint security policies in Microsoft Defender for Endpoint in the Defender documentation.
Was this page helpful?
Need help with this topic?
Want to try using Ask Learn to clarify or guide you through this topic?
Was this page helpful?
Want to try using Ask Learn to clarify or guide you through this topic?