Tenant attach: Create and deploy firewall policies from the admin center
Applies to: Configuration Manager (current branch)
Create Windows Firewall policies in the Microsoft Intune admin center and deploy them to Configuration Manager collections.
Prerequisites
- Access to the Microsoft Intune admin center.
- An environment that's tenant attached with uploaded devices.
- A supported version of Configuration Manager and the corresponding version of the console installed.
- Upgrade the target devices to the latest version of the Configuration Manager client.
- At least one Configuration Manager collection that's available for assigning Endpoint security policies
- Windows Devices that support this profile for tenant attached devices
Assign firewall policies to a collection
Go to the Microsoft Intune admin center.
Select Endpoint security > Firewall then Create Policy.
Create a profile with the following settings:
- Platform: Windows 10 and later
- Only Windows 10 clients can be targeted with firewall policies currently.
- Profile: Microsoft Defender Firewall (ConfigMgr)
- Platform: Windows 10 and later
Select Create then give the profile a Name and a Description.
On the Configuration settings page, set the firewall settings for the devices. For more information about the available settings, see Settings for firewall policy for tenant attached devices
On the Assignments page, select the collections to include for the policy assignment then choose Next.
Review the settings on the Review + Create page and select Create when you're done.
Device Status
You can review the status of endpoint security policies for tenant attached devices. The Device Status page can be accessed for all endpoint security policy types for tenant-attached clients. To display the Device Status page:
- Select a policy that's targeted to ConfigMgr devices to display the Overview page for the policy.
- Select Device Status to display a list of devices targeted by the policy.
- The Device Name, Compliance State, and SMS ID are displayed for each of the devices on the Device Status page.
Next steps
- Settings for firewall policy for tenant attached devices
- Create and deploy endpoint security Antivirus policy to tenant attached devices
- Create and deploy endpoint security Attack surface reduction policy to tenant attached devices
- Create and deploy endpoint security Endpoint Detection and Response policy to tenant attached devices