Skip to content

Commit b352e3e

Browse files
committed
True up MDE sec config with MDE docs
1 parent 74457ec commit b352e3e

1 file changed

Lines changed: 10 additions & 10 deletions

File tree

memdocs/intune/protect/mde-security-integration.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
---
22
# required metadata
33

4-
title: Use Microsoft Defender for Endpoint Security Configuration Management in Microsoft Endpoint manager
4+
title: Use Intune to manage Microsoft Defender for Endpoint Security on devices not enrolled with Microsoft Intune
55
description: Use Intune profiles to manage security settings for Microsoft Defender for Endpoint on devices that register in your Azure Active Directory.
66
keywords:
77
author: brenduns
88
ms.author: brenduns
99
manager: dougeby
10-
ms.date: 04/21/2022
10+
ms.date: 05/04/2022
1111
ms.topic: how-to
1212
ms.service: microsoft-intune
1313
ms.subservice: protect
@@ -46,7 +46,7 @@ This scenario extends the Microsoft Endpoint Manager Endpoint Security surface t
4646

4747
## Monitor status
4848

49-
Status and reports for policies targeted at devices in this channel are available from the policy node under Endpoint security in the Microsoft Endpoint Manager admin center.
49+
Status and reports for policies that target devices in this channel are available from the policy node under Endpoint security in the Microsoft Endpoint Manager admin center.
5050

5151
Drill in to the policy type, Antivirus or Firewall, and then select the policy to view its status. Policies for MDE have a *Policy type* of either *Microsoft Defender Antivirus (Preview)* or *Microsoft Defender Firewall (Preview)*.
5252

@@ -60,40 +60,40 @@ When you select a policy, you'll see information about the device check-in statu
6060

6161
### Assignment Filters and Security Management for Microsoft Defender for Endpoint
6262

63-
Assignment filters are not supported for devices communicating through the Microsoft Defender for Endpoint channel. While assignment filters can be added to a policy that could be targeted at these devices, the device will ignore assignment filters. For assignment filter support, the device must be enrolled in to Microsoft Endpoint Manager.
63+
Assignment filters aren't supported for devices communicating through the Microsoft Defender for Endpoint channel. While assignment filters can be added to a policy that could be targeted at these devices, the device will ignore assignment filters. For assignment filter support, the device must be enrolled in to Microsoft Endpoint Manager.
6464

6565
### Deleting and removing devices
6666

6767
Devices that are using this flow will be unable to be deleted from the Microsoft Endpoint Manager admin center. The enrollment state is driven from Microsoft Defender for Endpoint, and deleting them from the admin center would only cause them to be removed temporarily. If devices need to be removed from management, they should be removed from the scope of Configuration Management in the Security Center. Once removed, that change will be propagated across services.
6868

6969
### Unable to enable the Security Management for Microsoft Defender for Endpoint workload in Endpoint Security
7070

71-
Most initial provisioning flows are typically completed by an Administrator of both services (such as a Global Administrator). There are some scenarios where Role-based Administration is used to customize the permissions of administrators. Today, those delegated the *Endpoint Security Manager* role may not have the necessary permissions to enable this feature. We will address this in a future release.
71+
Most initial provisioning flows are typically completed by an Administrator of both services (such as a Global Administrator). There are some scenarios where Role-based Administration is used to customize the permissions of administrators. Today, individuals who are delegated the *Endpoint Security Manager* role might not have the necessary permissions to enable this feature.
7272

7373
### Co-existence with Microsoft Endpoint Configuration Manager
7474

75-
In some environments it may be desired to use Security Management for Microsoft Defender for Endpoint in conjunction with [Configuration Manager tenant attach](../../configmgr/tenant-attach/endpoint-security-get-started.md). To support this, you’ll need to control policy through a single channel, as using more than one channel creates the opportunity for conflicts and undesired results.
75+
In some environments it might be desired to use Security Management for Microsoft Defender for Endpoint with [Configuration Manager tenant attach](../../configmgr/tenant-attach/endpoint-security-get-started.md). If you use both, you’ll need to control policy through a single channel, as using more than one channel creates the opportunity for conflicts and undesired results.
7676

77-
This is possible by setting the *Manage Security settings using Configuration Manager* toggle to *Off*, in the [Microsoft 365 Defender portal](https://security.microsoft.com/). Sign in to the portal and go to **Settings** > **Endpoints** > **Configuration Management** > **Enforcement Scope**:
77+
To support this, configure the *Manage Security settings using Configuration Manager* toggle to *Off*. Sign in to the [Microsoft 365 Defender portal](https://security.microsoft.com/) and go to **Settings** > **Endpoints** > **Configuration Management** > **Enforcement Scope**:
7878

7979
:::image type="content" source="./media/mde-security-integration/disable-configuration-manager-toggle.png" alt-text="Screen shot of the Defender portal showing the Manage Security settings using Configuration Manager toggle set to Off.":::
8080

8181
### Active Directory joined devices
8282

83-
Devices that are joined to Active Directory will use their **existing infrastructure** to complete the Hybrid Azure Active Directory join process. While the Defender for Endpoint component will start this process, the join action uses your Federation provider or Azure Active Directory Connect (AAD Connect) to complete the join. Review [Plan your hybrid Azure Active Directory join implementation](/azure/active-directory/devices/hybrid-azuread-join-plan) to learn more about configuring your environment.
83+
Devices that are joined to Active Directory will use their **existing infrastructure** to complete the Hybrid Azure Active Directory join process. While the Defender for Endpoint component will start this process, the join action uses your Federation provider or Azure Active Directory Connect (Azure AD Connect) to complete the join. Review [Plan your hybrid Azure Active Directory join implementation](/azure/active-directory/devices/hybrid-azuread-join-plan) to learn more about configuring your environment.
8484

8585
To troubleshoot Azure Active Directory onboarding issues, see [Troubleshoot Security Configuration Management Azure Active Directory onboarding issues](/microsoft-365/security/defender-endpoint/troubleshoot-security-config-mgt).
8686

8787
### Unsupported security settings
8888

89-
The following security settings are pending deprecation. The Security Management for Microsoft Defender for Endpoint flow does not support these settings:
89+
The following security settings are pending deprecation. The Security Management for Microsoft Defender for Endpoint flow doesn't support these settings:
9090

9191
- Expedite telemetry reporting frequency (under **Endpoint Detection and Response**)
9292
- AllowIntrusionPreventionSystem (under **Antivirus**)
9393

9494
### Managing security configurations on domain controllers
9595

96-
Currently, devices are not supported to complete a Hybrid Join to Azure Active Directory. Since an Azure Active Directory trust is required, domain controllers aren't currently supported. We are looking at ways to add support in the future.
96+
Currently, devices are not supported to complete a Hybrid Join to Azure Active Directory. Since an Azure Active Directory trust is required, domain controllers aren't currently supported. We're looking at ways to add this support.
9797

9898
### Non-persistent VDI environments
9999

0 commit comments

Comments
 (0)