You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: intune/intune-service/protect/microsoft-defender-integrate.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,7 @@ ms.collection:
13
13
- sub-secure-endpoints
14
14
---
15
15
16
-
# Integrate Microsoft Defender for Endpoint with Intune and Onboard Devices
16
+
# Configure Microsoft Defender for Endpoint with Intune and Onboard Devices
17
17
18
18
Use the information and procedures in this article to connect Microsoft Defender for Endpoint with Intune and to then onboard and configure devices for Defender for Endpoint. Information in this article includes the following general steps:
title: Use Microsoft Defender for Endpoint in Microsoft Intune
3
-
description: Integrate Microsoft Defender for Endpoint with Microsoft Intune as a Mobile Threat Defense solution.
2
+
title: Integrate Microsoft Defender for Endpoint with Intune for Device Compliance
3
+
description: Integrate Microsoft Defender for Endpoint with Microsoft Intune as a Mobile Threat Defense (MTD) solution to enforce device compliance and prevent security breaches.
4
4
author: brenduns
5
5
ms.author: brenduns
6
-
ms.date: 08/28/2025
6
+
ms.date: 01/13/2026
7
7
ms.topic: article
8
8
ms.reviewer: aanavath
9
9
ms.collection:
@@ -12,83 +12,115 @@ ms.collection:
12
12
- sub-secure-endpoints
13
13
---
14
14
15
+
# Integrate Microsoft Defender for Endpoint with Intune for Device Compliance
15
16
16
-
# Use Microsoft Defender for Endpoint to enforce device compliance with Microsoft Intune
17
-
When you integrate Microsoft Defender for Endpoint with Microsoft Intune you can use Intune to enforce device compliance, configure devices to help prevent security breaches, and limit the impact of threats from devices that run Defender for Endpoint.
17
+
Learn how integrating Microsoft Defender for Endpoint with Microsoft Intune can protect your organization. This integration lets you assess device risk in real time and automatically block compromised devices from corporate resources to prevent security breaches and limit their impact by automatically marking risky devices as noncompliant.
18
18
19
-
To get started, implement the following configurations, which are detailed in depth in [Configure Microsoft Defender for Endpoint in Intune](../protect/microsoft-defender-integrate.md):
19
+
For example, if malware compromises a user's device, Microsoft Defender for Endpoint flags that device as high-risk and Intune can automatically cut off its access to corporate resources.
20
20
21
-
-**Establish a service-to-service connection between Intune and Microsoft Defender for Endpoint**. This connection lets Microsoft Defender for Endpoint collect data about machine risk from supported devices you manage with Intune. See [Connect Microsoft Defender for Endpoint to Intune](../protect/microsoft-defender-integrate.md#connect-microsoft-defender-for-endpoint-to-intune).
21
+
> [!TIP]
22
+
> Before you begin, ensure your account is assigned an Intune role with sufficient permissions to configure these settings. For example, the Intune built-in role of [Endpoint Security Manager](../fundamentals/role-based-access-control.md#built-in-roles) has the necessary permissions.
22
23
23
-
-**Use an Intune policy to onboard devices with Microsoft Defender for Endpoint**. You onboard devices to configure them to communicate with Microsoft Defender for Endpoint and to provide data that helps assess their risk level. See [Onboard devices](../protect/microsoft-defender-integrate.md#onboard-devices).
24
+
## Integration workflow
24
25
25
-
-**Use a device compliance policy to set the level of risk you want to allow**. Risk levels are reported by Microsoft Defender for Endpoint. Devices that exceed the allowed risk level are identified as noncompliant. See [Create and assign compliance policy to set device risk level](../protect/microsoft-defender-integrate.md#create-and-assign-compliance-policy-to-set-device-risk-level) and [Create and assign app protection policy to set device risk level](../protect/microsoft-defender-integrate.md#create-and-assign-app-protection-policy-to-set-device-risk-level).
26
+
The following workflow applies to devices enrolled with Intune. For detailed instructions, see [Configure Microsoft Defender for Endpoint in Intune](../protect/microsoft-defender-integrate.md):
26
27
27
-
-**Use a Conditional Access policy** to block users from accessing corporate resources from devices that are noncompliant. See [Create a Conditional Access policy](../protect/microsoft-defender-integrate.md#create-a-conditional-access-policy).
28
+
1.[Establish a service-to-service connection](../protect/microsoft-defender-integrate.md#connect-microsoft-defender-for-endpoint-to-intune) between Intune and Microsoft Defender for Endpoint.
29
+
2.[Onboard devices](../protect/microsoft-defender-integrate.md#onboard-devices) with Microsoft Defender for Endpoint using Intune policy.
30
+
3.[Create a device compliance policy](../protect/microsoft-defender-integrate.md#create-and-assign-compliance-policy-to-set-device-risk-level) to set acceptable risk levels.
31
+
4.[Configure Conditional Access policy](../protect/microsoft-defender-integrate.md#create-a-conditional-access-policy) to block noncompliant devices.
28
32
29
-
- Take advantage of Microsoft Defender for Endpoints Threat & Vulnerability Management (TVM) and [use Intune security tasks to remediate endpoint weakness identified by TVM](atp-manage-vulnerabilities.md).
33
+
**Extend the integration:** Once configured, you can [leverage Threat & Vulnerability Management (TVM)](atp-manage-vulnerabilities.md)to remediate endpoint weaknesses identified by Defender.
30
34
31
-
- Use [Intune endpoint security policies to manage Microsoft Defender for Endpoint on devices that are not enrolled with Intune](mde-security-integration.md).
35
+
### Additional integration options
32
36
33
-
When you integrate Intune with Microsoft Defender for Endpoint, you can take advantage of Microsoft Defender for Endpoints Threat & Vulnerability Management (TVM) and [use Intune to remediate endpoint weakness identified by TVM](../protect/atp-manage-vulnerabilities.md).
37
+
**App protection policies**: You can use [app protection policies](../protect/microsoft-defender-integrate.md#create-and-assign-app-protection-policy-to-set-device-risk-level) to set device risk levels for both enrolled and unenrolled devices. This provides app-level protection based on Defender threat assessments.
38
+
39
+
**Unenrolled devices**: For devices that aren't or can't enroll in Intune, use Intune's [security management for Microsoft Defender for Endpoint](mde-security-integration.md) to manage Defender settings via endpoint security policies without requiring full device enrollment.
40
+
41
+
Before you begin any of these integration workflows, ensure you have the required licenses and platform configurations.
34
42
35
43
## Prerequisites
36
44
37
-
### Intune
45
+
### Intune requirements
46
+
47
+
**Subscription**: Microsoft Intune Plan 1 subscription provides access to Intune and the Microsoft Intune admin center.
48
+
49
+
For licensing options, see [Microsoft Intune licensing](../fundamentals/licenses.md).
50
+
51
+
**Supported platforms**:
38
52
39
-
**Subscription**:
40
-
-**Microsoft Intune** – A *Microsoft Intune Plan 1* subscription provides access to Intune and the Microsoft Intune admin center.
53
+
| Platform | Requirements |
54
+
|----------|--------------|
55
+
| Android | Intune-managed devices |
56
+
| iOS/iPadOS | Intune-managed devices |
57
+
| Windows | Microsoft Entra ID hybrid joined or Microsoft Entra ID joined |
41
58
42
-
For Intune licensing options, see [Microsoft Intune licensing](../fundamentals/licenses.md).
59
+
### Microsoft Defender for Endpoint requirements
43
60
44
-
**Devices managed with Intune**:
45
-
The following platforms are supported for Intune with Microsoft Defender for Endpoint:
61
+
**Subscription**: Microsoft Defender for Endpoint subscription provides access to the [Microsoft Defender XDR portal](https://go.microsoft.com/fwlink/p/?linkid=2077139).
46
62
47
-
- Android
48
-
- iOS/iPadOS
49
-
- Windows (Microsoft Entra hybrid joined or Microsoft Entra joined)
63
+
For licensing and system requirements, see:
64
+
-[Licensing requirements in Microsoft Defender for Endpoint minimum requirements](/windows/security/threat-protection/microsoft-defender-atp/minimum-requirements)
-[Microsoft Defender for Endpoint system requirements](/defender-endpoint/minimum-requirements#hardware-and-software-requirements)
50
67
51
-
### Microsoft Defender
68
+
##Real-world scenario: Stopping a phishing attack
52
69
53
-
**Subscription**:
70
+
This example shows how Microsoft Defender for Endpoint and Intune work together to automatically contain threats. In this scenario, the integration is already configured.
54
71
55
-
-**Microsoft Defender for Endpoint** - This subscription provides you access to the Microsoft [Defender Security Center](https://go.microsoft.com/fwlink/p/?linkid=2077139).
72
+
### How the attack unfolds
56
73
57
-
For Defender for Endpoint licensing options, see **Licensing requirements** in [Minimum requirements for Microsoft Defender for Endpoint](/windows/security/threat-protection/microsoft-defender-atp/minimum-requirements) and [How to set up a Microsoft 365 E5 Trial Subscription](/microsoft-365/security/defender/setup-m365deval#enable-microsoft-365-trial-subscription).
74
+
1.**Initial compromise**: A user receives a Word document via email containing embedded malicious code.
75
+
2.**User action**: The user opens the attachment and enables macros.
76
+
3.**Privilege escalation**: The malware gains elevated privileges on the device.
77
+
4.**Lateral movement**: The attacker attempts to access other corporate resources through the compromised device.
58
78
59
-
For the list of operating systems and versions supported by Defender for Endpoint, see the Microsoft Defender for Endpoint [requirements](/defender-endpoint/minimum-requirements#hardware-and-software-requirements).
79
+
### How the integration prevents the breach
60
80
61
-
## Example of using Microsoft Defender for Endpoint with Intune
81
+
1.**Detection**: Microsoft Defender for Endpoint detects:
82
+
- Abnormal code execution
83
+
- Process privilege escalation
84
+
- Malicious code injection
85
+
- Suspicious remote shell activity
62
86
63
-
The following example helps explain how these solutions work together to help protect your organization. For this example, Microsoft Defender for Endpoint and Intune are already integrated.
87
+
2.**Risk assessment**: Based on these threat indicators, Microsoft Defender for Endpoint [classifies the device as high-risk](/windows/security/threat-protection/microsoft-defender-atp/alerts-queue#severity) and creates a detailed report in the Microsoft Defender XDR portal.
64
88
65
-
Consider an event where someone sends a Word attachment with embedded malicious code to a user within your organization.
89
+
3.**Compliance enforcement**: Your Intune device compliance policy automatically marks devices with *Medium* or *High* risk levels as noncompliant.
66
90
67
-
- The user opens the attachment, and enables the content.
68
-
- An elevated privilege attack starts, and an attacker from a remote machine has admin rights to the victim's device.
69
-
- The attacker then remotely accesses the user's other devices. This security breach can impact the entire organization.
91
+
4.**Access blocking**: Conditional Access policies immediately block the compromised device from accessing corporate resources.
70
92
71
-
Microsoft Defender for Endpoint can help resolve security events like this scenario.
93
+
5.**Containment**: The threat is contained while security teams investigate and remediate.
72
94
73
-
- In our example, Microsoft Defender for Endpoint detects that the device executed abnormal code, experienced a process privilege escalation, injected malicious code, and issued a suspicious remote shell.
74
-
- Based on these actions from the device, Microsoft Defender for Endpoint [classifies the device as high-risk](/windows/security/threat-protection/microsoft-defender-atp/alerts-queue#severity) and includes a detailed report of suspicious activity in the Microsoft Defender Security Center portal.
95
+
> [!NOTE]
96
+
> You can integrate Microsoft Defender for Endpoint with Microsoft Intune as a Mobile Threat Defense (MTD) solution, meaning Defender acts as the threat detection engine for Intune's compliance decisions.
75
97
76
-
You can integrate Microsoft Defender for Endpoint with Microsoft Intune as a Mobile Threat Defense solution. Integration can help you prevent security breaches and limit the impact of breaches within an organization.
98
+
### Platform-specific capabilities
77
99
78
-
Because you have an Intune device compliance policy to classify devices with a *Medium* or *High* level of risk as noncompliant, the compromised device is classified as noncompliant. This classification allows your Conditional Access policy to kick in and block access from that device to your corporate resources.
100
+
Different platforms offer unique configuration options when integrating with Microsoft Defender for Endpoint:
79
101
80
-
For devices that run Android, you can use Intune policy to modify the configuration of Microsoft Defender for Endpoint on Android. For more information, see [Microsoft Defender for Endpoint web protection](../protect/microsoft-defender-configure-android.md).
102
+
**Android**: Use Intune device configuration policies to configure [Microsoft Defender for Endpoint web protection](../protect/microsoft-defender-configure-android.md) settings, including the ability to enable or disable VPN-based scanning.
103
+
104
+
**iOS/iPadOS**: Enable [vulnerability assessment of apps](/microsoft-365/security/defender-endpoint/ios-configure-features#configure-vulnerability-assessment-of-apps) to allow Defender to analyze app metadata from Intune for enhanced threat detection.
105
+
106
+
**Windows**: Benefit from automatic onboarding capabilities and use [Microsoft Defender for Endpoint security baselines](../protect/security-baselines.md) for comprehensive, prescriptive security configurations.
81
107
82
108
## Next steps
83
109
84
-
- To connect Microsoft Defender for Endpoint to Intune, onboard devices, and configure Conditional Access policies, see [Configure Microsoft Defender for Endpoint in Intune](../protect/microsoft-defender-integrate.md).
110
+
**Ready to set this up?** Continue to the configuration guide that follows for step-by-step instructions.
111
+
112
+
### Configure the integration
113
+
114
+
**Primary guide**: [Configure Microsoft Defender for Endpoint in Intune](../protect/microsoft-defender-integrate.md) - Complete step-by-step instructions for connecting, onboarding devices, and configuring Conditional Access policies.
115
+
116
+
### Expand your knowledge
85
117
86
-
Learn more from the Intune documentation:
118
+
**Intune resources**:
87
119
88
-
-[Use security tasks with Defender for Endpoints Vulnerability Management to remediate issues on devices](atp-manage-vulnerabilities.md)
120
+
-[Use security tasks with Defender for Endpoint's Vulnerability Management to remediate device issues](atp-manage-vulnerabilities.md)
89
121
-[Get started with device compliance policies](device-compliance-get-started.md)
90
122
91
-
Learn more from the Microsoft Defender for Endpoint documentation:
123
+
**Microsoft Defender for Endpoint resources**:
92
124
93
125
-[Microsoft Defender for Endpoint Conditional Access](/defender-endpoint/conditional-access)
0 commit comments