Events
Nov 19, 11 PM - Nov 21, 11 PM
Gain in-demand skills with online sessions designed to meet the industry’s challenges head-on at Microsoft Ignite.
Register nowThis browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
You can integrate Microsoft Defender for Endpoint with Microsoft Intune as a Mobile Threat Defense solution. Integration can help you prevent security breaches and limit the impact of breaches within an organization.
See the Microsoft Defender for Endpoint requirements for the list of supported operating systems and versions.
To be successful, use the following configurations in concert, which are detailed in Configure Microsoft Defender for Endpoint in Intune:
Establish a service-to-service connection between Intune and Microsoft Defender for Endpoint. This connection lets Microsoft Defender for Endpoint collect data about machine risk from supported devices you manage with Intune. See Connect Microsoft Defender for Endpoint to Intune.
Use an Intune policy to onboard devices with Microsoft Defender for Endpoint. You onboard devices to configure them to communicate with Microsoft Defender for Endpoint and to provide data that helps assess their risk level. See Onboard devices.
Use a device compliance policy to set the level of risk you want to allow. Risk levels are reported by Microsoft Defender for Endpoint. Devices that exceed the allowed risk level are identified as noncompliant. See Create and assign compliance policy to set device risk level and Create and assign app protection policy to set device risk level.
Use a conditional access policy to block users from accessing corporate resources from devices that are noncompliant. See Create a conditional access policy.
When you integrate Intune with Microsoft Defender for Endpoint, you can take advantage of Microsoft Defender for Endpoints Threat & Vulnerability Management (TVM) and use Intune to remediate endpoint weakness identified by TVM.
The following example helps explain how these solutions work together to help protect your organization. For this example, Microsoft Defender for Endpoint and Intune are already integrated.
Consider an event where someone sends a Word attachment with embedded malicious code to a user within your organization.
Microsoft Defender for Endpoint can help resolve security events like this scenario.
You can integrate Microsoft Defender for Endpoint with Microsoft Intune as a Mobile Threat Defense solution. Integration can help you prevent security breaches and limit the impact of breaches within an organization.
Because you have an Intune device compliance policy to classify devices with a Medium or High level of risk as noncompliant, the compromised device is classified as noncompliant. This classification allows your conditional access policy to kick in and block access from that device to your corporate resources.
For devices that run Android, you can use Intune policy to modify the configuration of Microsoft Defender for Endpoint on Android. For more information, see Microsoft Defender for Endpoint web protection.
Subscriptions:
To use Microsoft Defender for Endpoint with Intune, you must have the following subscriptions:
Microsoft Defender for Endpoint - This subscription provides you access to the Microsoft Defender Security Center.
For Defender for Endpoint licensing options, see Licensing requirements in Minimum requirements for Microsoft Defender for Endpoint and How to set up a Microsoft 365 E5 Trial Subscription.
Microsoft Intune – A Microsoft Intune Plan 1 subscription provides access to Intune and the Microsoft Intune admin center.
For Intune licensing options, see Microsoft Intune licensing.
Devices managed with Intune:
The following platforms are supported for Intune with Microsoft Defender for Endpoint:
For the system requirements for Microsoft Defender for Endpoint, see Minimum requirements for Microsoft Defender for Endpoint.
Learn more from the Intune documentation:
Learn more from the Microsoft Defender for Endpoint documentation:
Events
Nov 19, 11 PM - Nov 21, 11 PM
Gain in-demand skills with online sessions designed to meet the industry’s challenges head-on at Microsoft Ignite.
Register nowTraining
Module
Enroll devices using Microsoft Intune - Training
Students will learn how to configure and setup Intune to more easily manage Windows, Android and iOS devices.
Certification
Microsoft 365 Certified: Endpoint Administrator Associate - Certifications
Plan and execute an endpoint deployment strategy, using essential elements of modern management, co-management approaches, and Microsoft Intune integration.