Onboard previous versions of Windows
- Windows 7 SP1 Enterprise
- Windows 7 SP1 Pro
- Windows 8.1 Pro
- Windows 8.1 Enterprise
- Windows Server 2008 R2 SP1
Want to experience Defender for Endpoint? Sign up for a free trial.
Defender for Endpoint extends support to include down-level operating systems, providing advanced attack detection and investigation capabilities on supported Windows versions.
To onboard down-level Windows client endpoints to Defender for Endpoint, you'll need to:
- Configure and update System Center Endpoint Protection clients
- Install and configure Microsoft Monitoring Agent (MMA) to report sensor data
For Windows Server 2008 R2 SP1, you have the option of onboarding through Microsoft Defender for Cloud.
Defender for Endpoint standalone server license is required, per node, in order to onboard a Windows server through Microsoft Monitoring Agent (Option 1). Alternatively, a Microsoft Defender for servers license is required, per node, in order to onboard a Windows server through Microsoft Defender for Cloud (Option 2), see Supported features available in Microsoft Defender for Cloud.
After onboarding the device, you can choose to run a detection test to verify that it is properly onboarded to the service. For more information, see Run a detection test on a newly onboarded Defender for Endpoint endpoint.
Configure and update System Center Endpoint Protection clients
This step is required only if your organization uses System Center Endpoint Protection (SCEP).
Defender for Endpoint integrates with System Center Endpoint Protection to provide visibility to malware detections and to stop propagation of an attack in your organization by banning potentially malicious files or suspected malware.
The following steps are required to enable this integration:
- Install the January 2017 anti-malware platform update for Endpoint Protection clients
- Configure the SCEP client Cloud Protection Service membership to the Advanced setting
- Configure your network to allow connections to the Microsoft Defender Antivirus cloud. For more information, see Configure and validate Microsoft Defender Antivirus network connections
Install and configure Microsoft Monitoring Agent (MMA)
Before you begin
Review the following details to verify minimum system requirements:
Only applicable for Windows Server 2008 R2, Windows 7 SP1 Enterprise, and Windows 7 SP1 Pro.
Installation of .NET 4.5 might require you to restart your computer after installation.
Meet the Azure Log Analytics agent minimum system requirements. For more information, see Collect data from computers in you environment with Log Analytics
Due to the deprecation of SHA-1 support by the MMA agent, the MMA agent needs to be version 10.20.18029 or newer.
Obtain the workspace ID:
- In the Defender for Endpoint navigation pane, select Settings > Device management > Onboarding
- Select the operating system
- Copy the workspace ID and workspace key
Using the Workspace ID and Workspace key choose any of the following installation methods to install the agent:
On the Agent Setup Options page, select Connect the agent to Azure Log Analytics (OMS)
If you are a US Government customer, under "Azure Cloud" you'll need to choose "Azure US Government" if using the setup wizard, or if using a command line or a script - set the "OPINSIGHTS_WORKSPACE_AZURE_CLOUD_TYPE" parameter to 1.
If you're using a proxy to connect to the Internet see the Configure proxy and Internet connectivity settings section.
Once completed, you should see onboarded endpoints in the portal within an hour.
Configure proxy and Internet connectivity settings
If your servers need to use a proxy to communicate with Defender for Endpoint, use one of the following methods to configure the MMA to use the proxy server:
If a proxy or firewall is in use, please ensure that servers can access all of the Microsoft Defender for Endpoint service URLs directly and without SSL interception. For more information, see enable access to Defender for Endpoint service URLs. Use of SSL interception will prevent the system from communicating with the Defender for Endpoint service.
Once completed, you should see onboarded Windows servers in the portal within an hour.
Onboard Windows servers through Microsoft Defender for Cloud
In the Microsoft 365 Defender navigation pane, select Settings > Device management > Onboarding.
Select Windows Server 2008 R2 SP1 as the operating system.
Click Onboard Servers in Microsoft Defender for Cloud.
Follow the onboarding instructions in Microsoft Defender for Endpoint with Microsoft Defender for Cloud and If you are using Azure ARC, follow the onboarding instructions in Enabling the Microsoft Defender for Endpoint integration.
After completing the onboarding steps, you'll need to Configure and update System Center Endpoint Protection clients.
- For onboarding via Microsoft Defender for servers to work as expected, the server must have an appropriate workspace and key configured within the Microsoft Monitoring Agent (MMA) settings.
- Once configured, the appropriate cloud management pack is deployed on the machine and the sensor process (MsSenseS.exe) will be deployed and started.
- This is also required if the server is configured to use an OMS Gateway server as proxy.
Verify that Microsoft Defender Antivirus and Microsoft Defender for Endpoint are running.
Running Microsoft Defender Antivirus is not required but it is recommended. If another antivirus vendor product is the primary endpoint protection solution, you can run Defender Antivirus in Passive mode. You can only confirm that passive mode is on after verifying that Microsoft Defender for Endpoint sensor (SENSE) is running.
Run the following command to verify that Microsoft Defender Antivirus is installed:
sc.exe query Windefend
If the result is 'The specified service doesn't exist as an installed service', then you'll need to install Microsoft Defender Antivirus. For more information, see Microsoft Defender Antivirus in Windows 10.
For information on how to use Group Policy to configure and manage Microsoft Defender Antivirus on your Windows servers, see Use Group Policy settings to configure and manage Microsoft Defender Antivirus.
Run the following command to verify that Microsoft Defender for Endpoint is running:
sc.exe query sense
The result should show it is running. If you encounter issues with onboarding, see Troubleshoot onboarding.
Run a detection test
Follow the steps in Run a detection test on a newly onboarded device to verify that the server is reporting to Defender for the Endpoint service.
Onboarding endpoints with no management solution
Using Group Policy
Step 1: Download the corresponding update for your endpoint.
Navigate to c:\windows\sysvol\domain\scripts (Change control could be needed on one of the domain controllers.)
Create a folder named MMA.
Download the following and place them in the MMA folder:
- Update for customer experience and diagnostic telemetry:
For Windows Server 2008 R2 SP1, following updates are also required:
February 2018 Monthly Roll up - KB4074598 (Windows Server 2008 R2)
Microsoft Update Catalog
Download updates for Windows Server 2008 R2 x64
.NET Framework 3.5.1 (KB315418)
For Windows Server 2008 R2 x64
This article assumes you are using x64-based servers (MMA Agent .exe x64 New SHA-2 compliant version).
Step 2: Create a file name DeployMMA.cmd (using notepad) Add the following lines to the cmd file. Note that you'll need your WORKSPACE ID and KEY.
The following command is an example. Replace the following values:
- KB - Use the applicable KB relevant to the endpoint you're onboarding
- Workspace ID and KEY - Use your ID and key
@echo off cd "C:" IF EXIST "C:\Program Files\Microsoft Monitoring Agent\Agent\MonitoringHost.exe" ( exit ) ELSE ( wusa.exe C:\Windows\MMA\Windows6.1-KB3080149-x64.msu /quiet /norestart wusa.exe C:\Windows\MMA\Windows6.1-KB4074598-x64.msu /quiet /norestart wusa.exe C:\Windows\MMA\Windows6.1-KB3154518-x64.msu /quiet /norestart wusa.exe C:\Windows\MMA\Windows8.1-KB3080149-x64.msu /quiet /norestart "c:\windows\MMA\MMASetup-AMD64.exe" /c /t:"C:\Windows\MMA" c:\windows\MMA\setup.exe /qn NOAPM=1 ADD_OPINSIGHTS_WORKSPACE=1 OPINSIGHTS_WORKSPACE_ID="<your workspace ID>" OPINSIGHTS_WORKSPACE_KEY="<your workspace key>" AcceptEndUserLicenseAgreement=1 )
Group Policy Configuration
Create a new group policy specifically for onboarding devices such as "Microsoft Defender for Endpoint Onboarding".
Create a Group Policy Folder named "c:\windows\MMA"
This will add a new folder on every server that gets the GPO applied, called MMA, and will be stored in c:\windows. This will contain the installation files for the MMA, prerequisites, and install script.
Create a Group Policy Files preference for each of the files stored in Net logon.
It copies the files from DOMAIN\NETLOGON\MMA\filename to C:\windows\MMA\filename - so the installation files are local to the server:
Repeat the process but create item level targeting on the COMMON tab, so the file only gets copied to the appropriate platform/Operating system version in scope:
For Windows Server 2008 R2 you'll need (and it will only copy down) the following:
Once this is done, you'll need to create a start-up script policy:
The name of the file to run here is c:\windows\MMA\DeployMMA.cmd. Once the server is restarted as part of the start-up process it will install the Update for customer experience and diagnostic telemetry KB, and then install the MMA Agent, while setting the Workspace ID and Key, and the server will be onboarded.
You could also use an immediate task to run the deployMMA.cmd if you don't want to reboot all the servers.
This could be done in two phases. First create the files and the folder in GPO - Give the system time to ensure the GPO has been applied, and all the servers have the install files. Then, add the immediate task. This will achieve the same result without requiring a reboot.
As the Script has an exit method and wont re-run if the MMA is installed, you could also use a daily scheduled task to achieve the same result. Similar to a Configuration Manager compliance policy it will check daily to ensure the MMA is present.
As mentioned in the onboarding documentation for Server specifically around Server 2008 R2 please see below: For Windows Server 2008 R2 SP1, ensure that you fulfill the following requirements:
- Install the February 2018 monthly update rollup
- Install either .NET framework 4.5 (or later) or KB3154518
Please check the KBs are present before onboarding Windows Server 2008 R2. This process allows you to onboard all the servers if you don't have Configuration Manager managing Servers.
You have two options to offboard Windows endpoints from the service:
- Uninstall the MMA agent
- Remove the Defender for Endpoint workspace configuration
Offboarding causes the Windows endpoint to stop sending sensor data to the portal but data from the endpoint, including reference to any alerts it has had will be retained for up to 6 months.
Uninstall the MMA agent
To offboard the Windows endpoint, you can uninstall the MMA agent or detach it from reporting to your Defender for Endpoint workspace. After offboarding the agent, the endpoint will no longer send sensor data to Defender for Endpoint. For more information, see To disable an agent.
Remove the Defender for Endpoint workspace configuration
You can use either of the following methods:
- Remove the Defender for Endpoint workspace configuration from the MMA agent
- Run a PowerShell command to remove the configuration
Remove the Defender for Endpoint workspace configuration from the MMA agent
In the Microsoft Monitoring Agent Properties, select the Azure Log Analytics (OMS) tab.
Select the Defender for Endpoint workspace, and click Remove.
Run a PowerShell command to remove the configuration
Get your Workspace ID:
In the navigation pane, select Settings > Onboarding.
Select the relevant operating system and get your Workspace ID.
Open an elevated PowerShell and run the following command. Use the Workspace ID you obtained and replacing
$AgentCfg = New-Object -ComObject AgentConfigManager.MgmtSvcCfg # Remove OMS Workspace $AgentCfg.RemoveCloudWorkspace("WorkspaceID") # Reload the configuration and apply changes $AgentCfg.ReloadConfiguration()
Submit and view feedback for