Skip to content

Commit b5f0648

Browse files
committed
Edits for GA of MDE sec config
1 parent f8f7068 commit b5f0648

5 files changed

Lines changed: 44 additions & 8 deletions

File tree

memdocs/intune/fundamentals/whats-new.md

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ keywords:
77
author: Erikre
88
ms.author: erikre
99
manager: dougeby
10-
ms.date: 04/29/2022
10+
ms.date: 05/04/2022
1111
ms.topic: conceptual
1212
ms.service: microsoft-intune
1313
ms.subservice: fundamentals
@@ -60,6 +60,16 @@ You can use RSS to be notified when this page is updated. For more information,
6060
### Scripts
6161
-->
6262

63+
## Week of May 2, 2022
64+
65+
### Device security
66+
67+
#### Security Management with Defender for Endpoint is generally available<!-- 13816763 -->
68+
69+
The Microsoft Endpoint Manager and Microsoft Defender for Endpoint (MDE) team are excited to announce the general availability of Security Management for MDE devices. As part of this general availability, support for *Antivirus*, *Endpoint Detection and Response*, as well as *Firewall* and *Firewall rules* are now generally available. This general availability applies to Windows Server 2012 R2 and Later, as well as Windows 10 and Windows 11 clients. In the future we will be adding support for additional platforms and profiles in a preview capacity.
70+
71+
For more information, see [Manage Microsoft Defender for Endpoint on devices with Microsoft Endpoint Manager](../protect/mde-security-integration.md).
72+
6373
## Week of April 25, 2022 (Service release 2204)
6474

6575
### App management

memdocs/intune/protect/includes/security-config-mgt-prerequisites.md

Lines changed: 26 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -4,43 +4,57 @@ description: include file
44
author: brenduns
55
ms.service: microsoft-intune
66
ms.author: brenduns
7-
ms.date: 04/20/2022
7+
ms.date: 05/04/2022
88
ms.topic: include
99
---
1010
## Prerequisites
11-
Review the following sections for requirements for the Security Management for Microsoft Defender for Endpoint Scenario:
11+
12+
Review the following sections for requirements for the Security Management for Microsoft Defender for Endpoint Scenario.
13+
1214
### Environment
15+
1316
When a device onboards to Microsoft Defender for Endpoint:
17+
1418
- The device is surveyed for an existing Endpoint Manager presence, which is a mobile device management (MDM) enrollment to Intune
1519
- Devices without an Endpoint Manager presence enable the Security Management feature
1620
- A trust is created with Azure Active Directory if one doesn't already exist
1721
- Azure Active Directory trust is used to communicate with Endpoint Manager (Intune) and retrieve policies
1822
- Policy retrieve from Endpoint Manager is enforced on the device by Microsoft Defender for Endpoint
23+
1924
### Active Directory requirements
25+
2026
When a device that is domain joined creates a trust with Azure Active Directory, this scenario is referred to as a *Hybrid Azure Active Directory Join* scenario. The Security Management for Microsoft Defender for Endpoint fully supports this scenario with the following requirements:
27+
2128
- Azure Active Directory Connect (AAD Connect) must be synchronized to the tenant that is used from Microsoft Defender for Endpoint
2229
- Hybrid Azure Active Directory Join must be configured in your environment (either through Federation or AAD Connect Sync)
2330
- AAD Connect Sync must include the device objects *in scope* for synchronization with Azure Active Directory (when needed for join)
2431
- AAD Connect rules for sync must be modified for Server 2012 R2 (when support for Server 2012 R2 is needed)
25-
- All devices must register in the Azure Active Directory of the tenant that hosts Microsoft Defender for Endpoint. Cross-tenant scenarios are not supported.
32+
- All devices must register in the Azure Active Directory of the tenant that hosts Microsoft Defender for Endpoint. Cross-tenant scenarios are not supported
33+
2634
### Connectivity requirements
35+
2736
Devices must have access to the following endpoints:
37+
2838
- `enterpriseregistration.windows.net` - For Azure AD registration.
2939
- `login.microsoftonline.com` - For Azure AD registration.
3040
- `*.dm.microsoft.com` - The use of a wildcard supports the cloud-service endpoints that are used for enrollment, check-in, and reporting, and which can change as the service scales.
41+
3142
> [!Note]
3243
> If your organization users Secure Socket Layer (SSL) inspection, the endpoints should be excluded from inspection.
3344
3445
### Supported platforms
3546

3647
Policies for Microsoft Defender for Endpoint security management are supported for the following device platforms:
48+
49+
- Windows 11 Professional/Enterprise
3750
- Windows 10 Professional/Enterprise (with [KB5006738](https://support.microsoft.com/topic/october-26-2021-kb5006738-os-builds-19041-1320-19042-1320-and-19043-1320-preview-ccbce6bf-ae00-4e66-9789-ce8e7ea35541))
3851
- Windows Server 2012 R2 with [Microsoft Defender for Down-Level Devices](/microsoft-365/security/defender-endpoint/configure-server-endpoints#new-functionality-in-the-modern-unified-solution-for-windows-server-2012-r2-and-2016-preview)
3952
- Windows Server 2016 with [Microsoft Defender for Down-Level Devices](/microsoft-365/security/defender-endpoint/configure-server-endpoints#new-functionality-in-the-modern-unified-solution-for-windows-server-2012-r2-and-2016-preview)
4053
- Windows Server 2019 (with [KB5006744](https://support.microsoft.com/topic/october-19-2021-kb5006744-os-build-17763-2268-preview-e043a8a3-901b-4190-bb6b-f5a4137411c0))
4154
- Windows Server 2022 (with [KB5006745](https://support.microsoft.com/topic/october-26-2021-kb5006745-os-build-20348-320-preview-8ff9319a-19e7-40c7-bbd1-cd70fcca066c))
4255

4356
### Licensing and subscriptions
57+
4458
To use security management for Microsoft Defender for Endpoint, you need:
4559

4660
- A subscription that grants licenses for Microsoft Defender for Endpoint, like Microsoft 365, or a standalone license for only Microsoft Defender for Endpoint. A subscription that grants Microsoft Defender for Endpoint licenses also grants your tenant access to the Endpoint security node of the Microsoft Endpoint Manager admin center.
@@ -53,12 +67,15 @@ To use security management for Microsoft Defender for Endpoint, you need:
5367
For current information about options, see [Minimum requirements for Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/minimum-requirements?view=o365-worldwide&preserve-view=true).
5468

5569
## Architecture
70+
5671
The following diagram is a conceptual representation of the Microsoft Defender for Endpoint security configuration management solution.
5772
:::image type="content" alt-text="Conceptual representation of the Microsoft Defender for Endpoint security configuration management solution" source="../media/mde-security-integration/mde-architecture.png":::
73+
5874
1. Devices onboard to Microsoft Defender for Endpoint.
5975
2. A trust is established between each device and Azure AD. When a device has an existing trust, that is used. When devices haven't registered, a new trust is created.
6076
3. Devices use their Azure AD Identity to communicate with Endpoint Manager. This identity enables Microsoft Endpoint Manager to distribute policies that are targeted to the devices when they check in.
6177
4. Defender for Endpoint reports the status of the policy back to Endpoint Manager.
78+
6279
## Which solution should I use?
6380

6481
Microsoft Endpoint Manager includes several methods and policy types to manage the configuration of Defender for Endpoint on devices.
@@ -94,6 +111,7 @@ The following table can help you understand which policies that can configure MD
94111
## Configure your tenant to support Microsoft Defender for Endpoint Security Configuration Management
95112

96113
To support Microsoft Defender for Endpoint security configuration management through the Microsoft Endpoint Manager admin center, you must enable communication between them from within each console.
114+
97115
1. Sign in to [Microsoft 365 Defender portal](https://security.microsoft.com/) and go to **Settings** > **Endpoints** > **Configuration Management** > **Enforcement Scope** and enable the platforms for security settings management:
98116
:::image type="content" source="../media/mde-security-integration/enable-mde-settings-management-defender.png" alt-text="Enable Microsoft Defender for Endpoint settings management in the Microsoft 365 Defender portal.":::
99117
1. Configure Pilot Mode and Configuration Manager authority settings to fit your organization needs:
@@ -112,7 +130,7 @@ To support Microsoft Defender for Endpoint security configuration management thr
112130
1. Select **Endpoint security** > **Microsoft Defender for Endpoint**, and set **Allow Microsoft Defender for Endpoint to enforce Endpoint Security Configurations** to **On**.
113131

114132
:::image type="content" source="../media/mde-security-integration/enable-mde-settings-management-mem.png" alt-text="Enable Microsoft Defender for Endpoint settings management in the Microsoft Endpoint Manager admin center.":::
115-
133+
116134
When you set this option to *On*, all devices in the platform scope in Microsoft Defender for Endpoint that aren't managed by Microsoft Endpoint Manager will qualify to onboard to Microsoft Defender for Endpoint.
117135

118136
> [!TIP]
@@ -130,6 +148,7 @@ When using Configuration Manager, the best path for management of security polic
130148

131149
After devices onboard to Defender for Endpoint, you'll need to create device groups to support deployment of policy for Microsoft Defender for Endpoint.
132150
To identify devices that have enrolled with Microsoft Defender for Endpoint but aren't managed by Intune or Configuration Manager:
151+
133152
1. Sign in to [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431).
134153
2. Go to **Devices** > **All devices**, and then select the column **Managed by** to sort the view of devices.
135154
Devices that onboard to Microsoft Defender for Endpoint and have registered but aren't managed by Intune display **Microsoft Defender for Endpoint** in the *Managed by* column. These are the devices that can receive policy for security management for Microsoft Defender for Endpoint.
@@ -142,14 +161,17 @@ You can create groups for these devices [in Azure AD](/azure/active-directory/fu
142161
## Deploy policy
143162

144163
After creating one or more Azure AD groups that contain devices managed by Microsoft Defender for Endpoint, you can create and deploy the following policies for Security Management for Microsoft Defender for Endpoint to those groups:
164+
145165
- Antivirus
146166
- Firewall
147167
- Firewall Rules
148168
- Endpoint Detection and Response
169+
149170
> [!TIP]
150171
> Avoid deploying multiple policies that manage the same setting to a device.
151172
>
152173
> Microsoft Endpoint Manager supports deploying multiple instances of each endpoint security policy type to the same device, with each policy instance being received by the device separately. Therefore, a device might receive separate configurations for the same setting from different policies, which results in a conflict. Some settings (like Antivirus Exclusions) will merge on the client and apply successfully.
174+
153175
1. Sign in to the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431).
154176
2. Go to **Endpoint security** and then select the type of policy you want to configure, either Antivirus or Firewall, and then select **Create Policy**.
155177
3. Enter the following properties or the policy type you selected:

memdocs/intune/protect/mde-security-integration.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ ms.reviewer: mattcall
2828

2929
---
3030

31-
# Manage Microsoft Defender for Endpoint on devices with Microsoft Endpoint Manager (Preview)
31+
# Manage Microsoft Defender for Endpoint on devices with Microsoft Endpoint Manager
3232

3333
With Microsoft Defender for Endpoint (MDE), you can now deploy security configurations from Microsoft Endpoint Manager directly to your onboarded devices without requiring a full Microsoft Endpoint Manager device enrollment. This capability is known as *Security Management for Microsoft Defender for Endpoint*. With this capability, devices that aren’t managed by a Microsoft Endpoint Manager service can receive security configurations for Microsoft Defender for Endpoint directly from Endpoint Manager.
3434

@@ -48,7 +48,11 @@ This scenario extends the Microsoft Endpoint Manager Endpoint Security surface t
4848

4949
Status and reports for policies targeted at devices in this channel are available from the policy node under Endpoint security in the Microsoft Endpoint Manager admin center.
5050

51-
Drill in to the policy type, Antivirus or Firewall, and then select the policy to view its status. Policies for MDE have a *Policy type* of either *Microsoft Defender Antivirus (Preview)* or *Microsoft Defender Firewall (Preview)*.
51+
Drill in to the policy type and then select the policy to view its status. The following policy types support MDE security configuration:
52+
53+
- Antivirus > *Microsoft Defender Antivirus*
54+
- Firewall > *Microsoft Defender Firewall* or *Microsoft Defender Firewall Rules*
55+
- Endpoint detection and response > *Endpoint detection and response*
5256

5357
When you select a policy, you'll see information about the device check-in status, and can select:
5458

-47 KB
Loading

memdocs/intune/protect/toc.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -113,7 +113,7 @@ items:
113113
href: advanced-threat-protection-manage-android.md
114114
- name: Monitor Defender for Endpoint
115115
href: advanced-threat-protection-monitor.md
116-
- name: MDE Security Configuration Management (Preview)
116+
- name: MDE Security Configuration Management
117117
href: mde-security-integration.md
118118
- name: Firewall rule migration
119119
href: endpoint-security-firewall-rule-tool.md

0 commit comments

Comments
 (0)