Skip to content

Commit 61bb614

Browse files
authored
Merge pull request #19406 from Brenduns/content-improvement-defender-udpate
Intune > CP - Content improvement for Defender integration content
2 parents ac97655 + b39abb5 commit 61bb614

2 files changed

Lines changed: 77 additions & 45 deletions

File tree

intune/intune-service/protect/microsoft-defender-integrate.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.collection:
1313
- sub-secure-endpoints
1414
---
1515

16-
# Integrate Microsoft Defender for Endpoint with Intune and Onboard Devices
16+
# Configure Microsoft Defender for Endpoint with Intune and Onboard Devices
1717

1818
Use the information and procedures in this article to connect Microsoft Defender for Endpoint with Intune and to then onboard and configure devices for Defender for Endpoint. Information in this article includes the following general steps:
1919

Lines changed: 76 additions & 44 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
11
---
2-
title: Use Microsoft Defender for Endpoint in Microsoft Intune
3-
description: Integrate Microsoft Defender for Endpoint with Microsoft Intune as a Mobile Threat Defense solution.
2+
title: Integrate Microsoft Defender for Endpoint with Intune for Device Compliance
3+
description: Integrate Microsoft Defender for Endpoint with Microsoft Intune as a Mobile Threat Defense (MTD) solution to enforce device compliance and prevent security breaches.
44
author: brenduns
55
ms.author: brenduns
6-
ms.date: 08/28/2025
6+
ms.date: 01/13/2026
77
ms.topic: article
88
ms.reviewer: aanavath
99
ms.collection:
@@ -12,83 +12,115 @@ ms.collection:
1212
- sub-secure-endpoints
1313
---
1414

15+
# Integrate Microsoft Defender for Endpoint with Intune for Device Compliance
1516

16-
# Use Microsoft Defender for Endpoint to enforce device compliance with Microsoft Intune
17-
When you integrate Microsoft Defender for Endpoint with Microsoft Intune you can use Intune to enforce device compliance, configure devices to help prevent security breaches, and limit the impact of threats from devices that run Defender for Endpoint.
17+
Learn how integrating Microsoft Defender for Endpoint with Microsoft Intune can protect your organization. This integration lets you assess device risk in real time and automatically block compromised devices from corporate resources to prevent security breaches and limit their impact by automatically marking risky devices as noncompliant.
1818

19-
To get started, implement the following configurations, which are detailed in depth in [Configure Microsoft Defender for Endpoint in Intune](../protect/microsoft-defender-integrate.md):
19+
For example, if malware compromises a user's device, Microsoft Defender for Endpoint flags that device as high-risk and Intune can automatically cut off its access to corporate resources.
2020

21-
- **Establish a service-to-service connection between Intune and Microsoft Defender for Endpoint**. This connection lets Microsoft Defender for Endpoint collect data about machine risk from supported devices you manage with Intune. See [Connect Microsoft Defender for Endpoint to Intune](../protect/microsoft-defender-integrate.md#connect-microsoft-defender-for-endpoint-to-intune).
21+
> [!TIP]
22+
> Before you begin, ensure your account is assigned an Intune role with sufficient permissions to configure these settings. For example, the Intune built-in role of [Endpoint Security Manager](../fundamentals/role-based-access-control.md#built-in-roles) has the necessary permissions.
2223
23-
- **Use an Intune policy to onboard devices with Microsoft Defender for Endpoint**. You onboard devices to configure them to communicate with Microsoft Defender for Endpoint and to provide data that helps assess their risk level. See [Onboard devices](../protect/microsoft-defender-integrate.md#onboard-devices).
24+
## Integration workflow
2425

25-
- **Use a device compliance policy to set the level of risk you want to allow**. Risk levels are reported by Microsoft Defender for Endpoint. Devices that exceed the allowed risk level are identified as noncompliant. See [Create and assign compliance policy to set device risk level](../protect/microsoft-defender-integrate.md#create-and-assign-compliance-policy-to-set-device-risk-level) and [Create and assign app protection policy to set device risk level](../protect/microsoft-defender-integrate.md#create-and-assign-app-protection-policy-to-set-device-risk-level).
26+
The following workflow applies to devices enrolled with Intune. For detailed instructions, see [Configure Microsoft Defender for Endpoint in Intune](../protect/microsoft-defender-integrate.md):
2627

27-
- **Use a Conditional Access policy** to block users from accessing corporate resources from devices that are noncompliant. See [Create a Conditional Access policy](../protect/microsoft-defender-integrate.md#create-a-conditional-access-policy).
28+
1. [Establish a service-to-service connection](../protect/microsoft-defender-integrate.md#connect-microsoft-defender-for-endpoint-to-intune) between Intune and Microsoft Defender for Endpoint.
29+
2. [Onboard devices](../protect/microsoft-defender-integrate.md#onboard-devices) with Microsoft Defender for Endpoint using Intune policy.
30+
3. [Create a device compliance policy](../protect/microsoft-defender-integrate.md#create-and-assign-compliance-policy-to-set-device-risk-level) to set acceptable risk levels.
31+
4. [Configure Conditional Access policy](../protect/microsoft-defender-integrate.md#create-a-conditional-access-policy) to block noncompliant devices.
2832

29-
- Take advantage of Microsoft Defender for Endpoints Threat & Vulnerability Management (TVM) and [use Intune security tasks to remediate endpoint weakness identified by TVM](atp-manage-vulnerabilities.md).
33+
**Extend the integration:** Once configured, you can [leverage Threat & Vulnerability Management (TVM)](atp-manage-vulnerabilities.md) to remediate endpoint weaknesses identified by Defender.
3034

31-
- Use [Intune endpoint security policies to manage Microsoft Defender for Endpoint on devices that are not enrolled with Intune](mde-security-integration.md).
35+
### Additional integration options
3236

33-
When you integrate Intune with Microsoft Defender for Endpoint, you can take advantage of Microsoft Defender for Endpoints Threat & Vulnerability Management (TVM) and [use Intune to remediate endpoint weakness identified by TVM](../protect/atp-manage-vulnerabilities.md).
37+
**App protection policies**: You can use [app protection policies](../protect/microsoft-defender-integrate.md#create-and-assign-app-protection-policy-to-set-device-risk-level) to set device risk levels for both enrolled and unenrolled devices. This provides app-level protection based on Defender threat assessments.
38+
39+
**Unenrolled devices**: For devices that aren't or can't enroll in Intune, use Intune's [security management for Microsoft Defender for Endpoint](mde-security-integration.md) to manage Defender settings via endpoint security policies without requiring full device enrollment.
40+
41+
Before you begin any of these integration workflows, ensure you have the required licenses and platform configurations.
3442

3543
## Prerequisites
3644

37-
### Intune
45+
### Intune requirements
46+
47+
**Subscription**: Microsoft Intune Plan 1 subscription provides access to Intune and the Microsoft Intune admin center.
48+
49+
For licensing options, see [Microsoft Intune licensing](../fundamentals/licenses.md).
50+
51+
**Supported platforms**:
3852

39-
**Subscription**:
40-
- **Microsoft Intune** – A *Microsoft Intune Plan 1* subscription provides access to Intune and the Microsoft Intune admin center.
53+
| Platform | Requirements |
54+
|----------|--------------|
55+
| Android | Intune-managed devices |
56+
| iOS/iPadOS | Intune-managed devices |
57+
| Windows | Microsoft Entra ID hybrid joined or Microsoft Entra ID joined |
4158

42-
For Intune licensing options, see [Microsoft Intune licensing](../fundamentals/licenses.md).
59+
### Microsoft Defender for Endpoint requirements
4360

44-
**Devices managed with Intune**:
45-
The following platforms are supported for Intune with Microsoft Defender for Endpoint:
61+
**Subscription**: Microsoft Defender for Endpoint subscription provides access to the [Microsoft Defender XDR portal](https://go.microsoft.com/fwlink/p/?linkid=2077139).
4662

47-
- Android
48-
- iOS/iPadOS
49-
- Windows (Microsoft Entra hybrid joined or Microsoft Entra joined)
63+
For licensing and system requirements, see:
64+
- [Licensing requirements in Microsoft Defender for Endpoint minimum requirements](/windows/security/threat-protection/microsoft-defender-atp/minimum-requirements)
65+
- [Microsoft 365 E5 trial subscription setup](/microsoft-365/security/defender/setup-m365deval#enable-microsoft-365-trial-subscription)
66+
- [Microsoft Defender for Endpoint system requirements](/defender-endpoint/minimum-requirements#hardware-and-software-requirements)
5067

51-
### Microsoft Defender
68+
## Real-world scenario: Stopping a phishing attack
5269

53-
**Subscription**:
70+
This example shows how Microsoft Defender for Endpoint and Intune work together to automatically contain threats. In this scenario, the integration is already configured.
5471

55-
- **Microsoft Defender for Endpoint** - This subscription provides you access to the Microsoft [Defender Security Center](https://go.microsoft.com/fwlink/p/?linkid=2077139).
72+
### How the attack unfolds
5673

57-
For Defender for Endpoint licensing options, see **Licensing requirements** in [Minimum requirements for Microsoft Defender for Endpoint](/windows/security/threat-protection/microsoft-defender-atp/minimum-requirements) and [How to set up a Microsoft 365 E5 Trial Subscription](/microsoft-365/security/defender/setup-m365deval#enable-microsoft-365-trial-subscription).
74+
1. **Initial compromise**: A user receives a Word document via email containing embedded malicious code.
75+
2. **User action**: The user opens the attachment and enables macros.
76+
3. **Privilege escalation**: The malware gains elevated privileges on the device.
77+
4. **Lateral movement**: The attacker attempts to access other corporate resources through the compromised device.
5878

59-
For the list of operating systems and versions supported by Defender for Endpoint, see the Microsoft Defender for Endpoint [requirements](/defender-endpoint/minimum-requirements#hardware-and-software-requirements).
79+
### How the integration prevents the breach
6080

61-
## Example of using Microsoft Defender for Endpoint with Intune
81+
1. **Detection**: Microsoft Defender for Endpoint detects:
82+
- Abnormal code execution
83+
- Process privilege escalation
84+
- Malicious code injection
85+
- Suspicious remote shell activity
6286

63-
The following example helps explain how these solutions work together to help protect your organization. For this example, Microsoft Defender for Endpoint and Intune are already integrated.
87+
2. **Risk assessment**: Based on these threat indicators, Microsoft Defender for Endpoint [classifies the device as high-risk](/windows/security/threat-protection/microsoft-defender-atp/alerts-queue#severity) and creates a detailed report in the Microsoft Defender XDR portal.
6488

65-
Consider an event where someone sends a Word attachment with embedded malicious code to a user within your organization.
89+
3. **Compliance enforcement**: Your Intune device compliance policy automatically marks devices with *Medium* or *High* risk levels as noncompliant.
6690

67-
- The user opens the attachment, and enables the content.
68-
- An elevated privilege attack starts, and an attacker from a remote machine has admin rights to the victim's device.
69-
- The attacker then remotely accesses the user's other devices. This security breach can impact the entire organization.
91+
4. **Access blocking**: Conditional Access policies immediately block the compromised device from accessing corporate resources.
7092

71-
Microsoft Defender for Endpoint can help resolve security events like this scenario.
93+
5. **Containment**: The threat is contained while security teams investigate and remediate.
7294

73-
- In our example, Microsoft Defender for Endpoint detects that the device executed abnormal code, experienced a process privilege escalation, injected malicious code, and issued a suspicious remote shell.
74-
- Based on these actions from the device, Microsoft Defender for Endpoint [classifies the device as high-risk](/windows/security/threat-protection/microsoft-defender-atp/alerts-queue#severity) and includes a detailed report of suspicious activity in the Microsoft Defender Security Center portal.
95+
> [!NOTE]
96+
> You can integrate Microsoft Defender for Endpoint with Microsoft Intune as a Mobile Threat Defense (MTD) solution, meaning Defender acts as the threat detection engine for Intune's compliance decisions.
7597
76-
You can integrate Microsoft Defender for Endpoint with Microsoft Intune as a Mobile Threat Defense solution. Integration can help you prevent security breaches and limit the impact of breaches within an organization.
98+
### Platform-specific capabilities
7799

78-
Because you have an Intune device compliance policy to classify devices with a *Medium* or *High* level of risk as noncompliant, the compromised device is classified as noncompliant. This classification allows your Conditional Access policy to kick in and block access from that device to your corporate resources.
100+
Different platforms offer unique configuration options when integrating with Microsoft Defender for Endpoint:
79101

80-
For devices that run Android, you can use Intune policy to modify the configuration of Microsoft Defender for Endpoint on Android. For more information, see [Microsoft Defender for Endpoint web protection](../protect/microsoft-defender-configure-android.md).
102+
**Android**: Use Intune device configuration policies to configure [Microsoft Defender for Endpoint web protection](../protect/microsoft-defender-configure-android.md) settings, including the ability to enable or disable VPN-based scanning.
103+
104+
**iOS/iPadOS**: Enable [vulnerability assessment of apps](/microsoft-365/security/defender-endpoint/ios-configure-features#configure-vulnerability-assessment-of-apps) to allow Defender to analyze app metadata from Intune for enhanced threat detection.
105+
106+
**Windows**: Benefit from automatic onboarding capabilities and use [Microsoft Defender for Endpoint security baselines](../protect/security-baselines.md) for comprehensive, prescriptive security configurations.
81107

82108
## Next steps
83109

84-
- To connect Microsoft Defender for Endpoint to Intune, onboard devices, and configure Conditional Access policies, see [Configure Microsoft Defender for Endpoint in Intune](../protect/microsoft-defender-integrate.md).
110+
**Ready to set this up?** Continue to the configuration guide that follows for step-by-step instructions.
111+
112+
### Configure the integration
113+
114+
**Primary guide**: [Configure Microsoft Defender for Endpoint in Intune](../protect/microsoft-defender-integrate.md) - Complete step-by-step instructions for connecting, onboarding devices, and configuring Conditional Access policies.
115+
116+
### Expand your knowledge
85117

86-
Learn more from the Intune documentation:
118+
**Intune resources**:
87119

88-
- [Use security tasks with Defender for Endpoints Vulnerability Management to remediate issues on devices](atp-manage-vulnerabilities.md)
120+
- [Use security tasks with Defender for Endpoint's Vulnerability Management to remediate device issues](atp-manage-vulnerabilities.md)
89121
- [Get started with device compliance policies](device-compliance-get-started.md)
90122

91-
Learn more from the Microsoft Defender for Endpoint documentation:
123+
**Microsoft Defender for Endpoint resources**:
92124

93125
- [Microsoft Defender for Endpoint Conditional Access](/defender-endpoint/conditional-access)
94-
- [Microsoft Defender portal](/defender-xdr/microsoft-365-defender-portal)
126+
- [Microsoft Defender XDR portal](/defender-xdr/microsoft-365-defender-portal)

0 commit comments

Comments
 (0)