Reviewed and updated May 8, 2026. Initial operational guide based on current Microsoft Defender for Endpoint, Microsoft Intune endpoint security, Windows onboarding, antivirus, firewall, attack surface reduction, EDR, assignment, reporting, compatibility, and troubleshooting guidance checked on May 8, 2026.

Endpoint SecurityAdvanced

Rolling Out Microsoft Defender for Endpoint with Intune in a Managed Windows Fleet

Jack30 min read

Why This Rollout Needs a Proper Plan

Microsoft Defender for Endpoint looks simple to deploy from Intune because the main onboarding policy can be created in a few clicks. That is only one part of the job. A reliable rollout also needs tenant connection checks, licensing decisions, endpoint security policy ownership, pilot rings, device health validation, reporting, and a rollback path that does not leave devices half managed.

This guide is for administrators rolling out Microsoft Defender for Endpoint to an Intune managed Windows fleet. It assumes that Windows devices already enrol into Intune and that the organisation wants Defender for Endpoint onboarding and related security controls managed through Intune Endpoint security policies.

Use these AdminSignal resources while planning the wider change:

Official Microsoft references used for this guide:

When to Use This Guide

Use this guide when you need to onboard and configure Microsoft Defender for Endpoint across a managed Windows estate using Intune. It fits these scenarios:

ScenarioUse this guide
New Defender for Endpoint rolloutBuild the tenant connection, onboarding policy, endpoint security policies, and pilot rings
Replacing a third party endpoint productPlan coexistence, passive mode expectations, exclusions, and staged cutover
Moving Defender settings from Group Policy or Configuration Manager to IntuneCheck setting ownership and avoid policy conflicts
Improving an existing partial rolloutValidate onboarding state, Sense service health, antivirus mode, and assignment scope
Preparing Conditional Access based on device riskConfirm Defender risk reporting before enforcing access rules

Do not use this guide as a licence entitlement document. Microsoft licensing changes over time and can vary by agreement, geography and product bundle. Use this guide to identify the decisions you need to confirm, then check Microsoft Product Terms, the Microsoft 365 admin centre, and your licensing partner.

Do not start by assigning Defender policies to all devices. Start with a lab and pilot ring so you can prove onboarding, security settings, reporting, application compatibility and rollback.

Tested Environment Note

This guide was reviewed against Microsoft Learn guidance on May 8, 2026. It is written for Windows 10 and Windows 11 devices managed by Microsoft Intune, with Microsoft Defender for Endpoint onboarding and security policy delivered through Intune Endpoint security.

The operational checks assume:

  • Devices are already present in Intune as managed Windows devices.
  • Microsoft Entra ID groups are used for Intune assignments.
  • The operator can use Microsoft Graph PowerShell for read checks.
  • Endpoint security policies are created in Intune rather than local scripts.
  • Pilot devices are available for forced sync, restart, local PowerShell checks and event log review.

The PowerShell examples show expected output shapes only. They do not include real tenant IDs, device names, policy IDs, group names, user names, alert counts, health scores or production values.

Prerequisites

Collect these items before creating policies:

  • Confirmed Intune enrolment for the target Windows devices.
  • A current list of Windows device groups, dynamic group rules, assignment filters and scope tags.
  • A Microsoft Defender for Endpoint tenant that has been provisioned.
  • Agreement on whether Defender for Endpoint Plan 1 or Plan 2 features are in scope.
  • A decision on third party antivirus or EDR coexistence during rollout.
  • A lab device group with devices that can be restarted and inspected locally.
  • A pilot device group with real user devices and known support contacts.
  • A rollback owner who can change Intune assignments quickly.
  • A clear change window for the first production ring.
  • A list of existing Group Policy, Configuration Manager, Intune, security baseline and local scripts that set Defender, firewall, ASR or EDR values.

Install the Microsoft Graph PowerShell modules on an admin workstation if you plan to run the assignment checks:

PowerShell
Install-Module Microsoft.Graph -Scope CurrentUser
Install-Module Microsoft.Graph.Beta -Scope CurrentUser

Import-Module Microsoft.Graph.Authentication
Import-Module Microsoft.Graph.DeviceManagement
Import-Module Microsoft.Graph.Beta.DeviceManagement

Connect with read permissions first:

PowerShell
Connect-MgGraph -Scopes @(
    "DeviceManagementConfiguration.Read.All",
    "DeviceManagementManagedDevices.Read.All",
    "Group.Read.All"
)

Get-MgContext | Select-Object Account, TenantId, Scopes

Expected output shape:

Account  : admin@domain.example
TenantId : <tenant-id>
Scopes   : {DeviceManagementConfiguration.Read.All, DeviceManagementManagedDevices.Read.All, Group.Read.All...}

Use write permissions only when you are ready to create, assign, change or remove policy.

Licensing and Roles

Confirm licensing before rollout. At a minimum, the project usually has two separate licensing questions:

AreaWhat to confirm
Intune managementTarget users or devices are licensed for Intune management
Defender for EndpointTarget users or devices are covered by Defender for Endpoint Plan 1, Plan 2, Defender for Business, or another valid entitlement
ServersServer onboarding is not covered by normal Defender for Endpoint Plan 1 or Plan 2 user licences, so confirm separate server licensing if servers are in scope
Vulnerability managementConfirm whether core or premium vulnerability management is required
Conditional AccessConfirm the Entra licensing needed for Conditional Access if device risk or compliance will control access

Microsoft's current service description states that Defender for Endpoint Plan 1 provides core endpoint protection capabilities. Defender for Endpoint Plan 2 includes Plan 1 capabilities and adds broader detection, investigation and response capabilities such as EDR, automated investigation and remediation, threat and vulnerability management, threat analytics, deep analysis and Microsoft Threat Experts.

For roles, separate setup from reporting and support:

TaskTypical role or permission area
Enable the Intune and Defender for Endpoint connectionEndpoint Security Manager in Intune plus Security Administrator in Microsoft Entra ID, or equivalent Defender permission to manage security settings
Create Endpoint security policiesIntune role with create, update, assign and view report permissions for the relevant Endpoint security workload
Review Defender portal device inventorySecurity Reader, Security Operator, Security Administrator, or a scoped Defender role depending on your RBAC model
Review Intune assignmentsIntune role with read access to device configuration and Endpoint security policies
Change Conditional Access laterConditional Access Administrator, Security Administrator, or another approved identity role

Keep emergency access accounts out of normal pilot groups. If device risk or compliance will later drive Conditional Access, review Conditional Access Microsoft 365 Policy Map before enforcing access rules.

Defender for Endpoint Plan 1 vs Plan 2 Considerations

Plan choice changes both the rollout objective and the validation evidence.

AreaPlan 1 considerationPlan 2 consideration
Core protectionFocus on next generation protection, Defender Antivirus, ASR, network protection, firewall and device control where licensedSame base controls, plus deeper investigation and response workflows
EDRConfirm exact entitlement and feature availability before promising EDR workflowsEDR is a central part of the operating model
Advanced huntingDo not rely on hunting queries unless your licence includes the featureUse hunting and custom detections where appropriate
Vulnerability managementConfirm available vulnerability management capabilityCore vulnerability management is part of Plan 2, with premium capability available as an add-on
Automated investigation and remediationDo not design the process around AIR unless entitlement is confirmedInclude AIR settings and operational ownership
SOC processPortal visibility and endpoint protection may be the main focusTriage, alert ownership, remediation, isolation and live response procedures become part of the design

For a managed Windows fleet, the safer rollout question is not only "can we onboard the sensor?". Ask:

  • Who responds to Defender alerts after devices appear?
  • Which team owns antivirus exclusions?
  • Which team owns firewall rules?
  • Which team owns ASR exceptions?
  • Is EDR in block mode in scope?
  • Are response actions such as isolate device, collect investigation package or live response allowed?
  • Will device risk feed compliance and Conditional Access?

Do not enable response features without an owner and a support path. A technically successful rollout can still fail operationally if alerts, exclusions and user impact have no route to resolution.

Intune and Defender Tenant Connection

The Intune to Defender connection is a tenant level integration. Microsoft documents it as the service to service connection that lets Intune interact with Defender for Endpoint, including onboarding and risk reporting for supported devices.

Check the connection before policy creation:

  1. Open the Microsoft Intune admin centre.
  2. Go to Endpoint security > Microsoft Defender for Endpoint.
  3. Check Connection status.
  4. If it is not enabled, open the Microsoft Defender portal.
  5. Go to System > Settings > Endpoints > General > Advanced features.
  6. Turn on Microsoft Intune connection.
  7. Return to Intune and allow time for the connection status to update.

After the connection is enabled, configure Windows integration for compliance policy evaluation only if you intend Defender risk to feed device compliance. Do not combine onboarding with immediate Conditional Access enforcement unless that is part of a tested identity change.

Record these values:

ItemExpected evidence
Intune connection statusEnabled
Windows compliance policy evaluation settingOn only if device risk will be used
Defender portal accessAdmin can open device inventory and configuration management areas
Scope tagsConfirm whether Endpoint security policies need scope tags
RBACConfirm who can create, assign, report and troubleshoot

If the connection is not enabled, the EDR onboarding policy may require manual onboarding blob handling rather than the recommended automatic package from the connector. Treat that as a setup problem, not as a reason to rush a manual workaround.

Onboarding Methods

Microsoft supports several onboarding methods. For cloud native Intune managed Windows devices, Intune is the recommended path. Other methods still matter in mixed estates.

MethodUse whenCaution
Intune Endpoint security EDR policyWindows devices are enrolled and managed by IntuneBest fit for this guide
Defender deployment toolYou are using Microsoft's deployment tool path for supported devicesConfirm preview or general availability status before relying on it
Configuration Manager or tenant attachDevices are managed through Configuration Manager or co-managementCheck workload ownership and avoid duplicate policies
Group PolicyDomain joined devices are not managed by IntuneNot the target design for a cloud managed fleet
Local onboarding scriptSmall pilot or break glass troubleshootingNot suitable as the normal fleet rollout method
Security settings management for Defender for EndpointDevices are not enrolled in Intune but need security settings management through DefenderSeparate design from Intune enrolment

For this guide, create a custom Intune EDR onboarding policy rather than using broad quick setup. Microsoft documents a preconfigured quick setup option, but it assigns broadly. A custom policy gives better control over pilot groups, scope tags and change review.

Endpoint Security Policy Ownership

Use Intune Endpoint security policies for the security workloads where they fit. They are purpose built and easier to report on than a mixed device configuration profile.

WorkloadIntune pathPrimary purpose
EDR onboardingEndpoint security > Endpoint detection and responseOnboard devices to Defender for Endpoint and configure EDR settings
AntivirusEndpoint security > AntivirusConfigure Microsoft Defender Antivirus settings and exclusions
FirewallEndpoint security > FirewallConfigure Windows Firewall global settings and rules
Attack surface reductionEndpoint security > Attack surface reductionConfigure ASR rules, controlled folder access, device control and related controls
Security baselinesEndpoint security > Security baselinesApply a Microsoft recommended baseline, then customise for your environment

Before you create new policies, inventory existing sources:

SourceWhy it matters
Group PolicyMay already set Defender Antivirus, firewall or ASR values
Configuration ManagerMay own endpoint protection settings in co-managed environments
Intune device configurationMay duplicate Endpoint security settings
Security baselinesMay set overlapping Defender, firewall or attack surface controls
Local scriptsMay set Set-MpPreference, registry values or firewall rules
Third party security toolingMay expect Defender AV to be passive or disabled

One setting should have one policy owner. If Endpoint security owns firewall state, do not also configure the same firewall state in Settings Catalog or Group Policy unless you have a documented migration plan.

Build the EDR Onboarding Policy

Create the first onboarding policy for lab devices only.

  1. Open the Microsoft Intune admin centre.
  2. Go to Endpoint security > Endpoint detection and response.
  3. Select Create Policy.
  4. Choose Windows as the platform.
  5. Choose Endpoint detection and response as the profile.
  6. Name the policy clearly, for example WIN - MDE - EDR Onboarding - Lab.
  7. Set the Defender for Endpoint client configuration package type to Auto from connector where available.
  8. Configure sample sharing according to your organisation's data handling policy.
  9. Add scope tags if required.
  10. Assign to the lab device group only.
  11. Review and create.

Good description shape:

Onboards lab Windows devices to Microsoft Defender for Endpoint through the Intune connector. Do not broaden assignment until Sense service, Defender portal inventory, Intune EDR onboarding status and local Defender checks are clean.

Record:

  • Policy name.
  • Policy ID.
  • Assignment group object ID.
  • Assignment filter ID and mode if used.
  • Scope tags.
  • Sample sharing decision.
  • Rollback owner.
  • Planned next ring.

Do not combine onboarding, antivirus hardening, firewall changes and ASR block mode in the same first action. Onboard first, confirm device health, then harden in controlled steps.

Antivirus Policy

Create a separate antivirus policy so Defender Antivirus settings have a clear owner.

Start with settings that improve protection without surprising users:

AreaCheck before enforcing
Real time protectionThird party antivirus coexistence and passive mode expectations
Cloud delivered protectionNetwork access to Microsoft cloud protection services
Behaviour monitoringApplication compatibility in pilot devices
IOAV protectionBrowser and download workflows
Script scanningAdmin scripts, logon scripts and line of business automation
PUA protectionWhether audit mode is needed first
Network protectionBrowser and proxy compatibility
ExclusionsApproved change process and expiry review
Security intelligence updatesUpdate source, proxy, WSUS or Windows Update for Business design

For exclusions, keep the default answer as no exclusion. Add exclusions only when there is a documented business reason, vendor guidance, detection evidence or performance evidence. Record who approved the exclusion and when it should be reviewed.

Local check:

PowerShell
Get-MpComputerStatus |
    Select-Object `
        AMRunningMode,
        AntivirusEnabled,
        AMServiceEnabled,
        RealTimeProtectionEnabled,
        BehaviorMonitorEnabled,
        IoavProtectionEnabled,
        NISEnabled,
        IsTamperProtected,
        AntivirusSignatureLastUpdated,
        AntivirusSignatureVersion

Expected output shape:

AMRunningMode                  : Normal
AntivirusEnabled               : True
AMServiceEnabled               : True
RealTimeProtectionEnabled      : True
BehaviorMonitorEnabled         : True
IoavProtectionEnabled          : True
NISEnabled                     : True
IsTamperProtected              : True
AntivirusSignatureLastUpdated  : <date/time>
AntivirusSignatureVersion      : <version>

If a third party antivirus product is active, AMRunningMode may show passive mode rather than normal. That is not automatically a failure. It must match the coexistence design.

Check effective preferences:

PowerShell
Get-MpPreference |
    Select-Object `
        DisableRealtimeMonitoring,
        DisableBehaviorMonitoring,
        DisableIOAVProtection,
        DisableScriptScanning,
        DisableArchiveScanning,
        PUAProtection,
        EnableNetworkProtection,
        ExclusionPath,
        ExclusionProcess,
        ExclusionExtension

Expected output shape:

DisableRealtimeMonitoring : False
DisableBehaviorMonitoring : False
DisableIOAVProtection     : False
DisableScriptScanning     : False
DisableArchiveScanning    : False
PUAProtection             : <0, 1 or 2 depending on policy>
EnableNetworkProtection   : <0, 1 or 2 depending on policy>
ExclusionPath             : {<approved paths only>}
ExclusionProcess          : {<approved processes only>}
ExclusionExtension        : {<approved extensions only>}

If the values do not match Intune, check for Group Policy, Configuration Manager, local Set-MpPreference, tamper protection, or another security management channel.

Firewall Policy

Use a dedicated Endpoint security firewall policy for global Windows Firewall state and a separate firewall rules policy for granular app, port and protocol rules.

Recommended rollout pattern:

  1. Inventory current firewall state on lab devices.
  2. Inventory existing Group Policy and local firewall rules.
  3. Create one global firewall policy for domain, private and public profiles.
  4. Create separate firewall rule policies by application or service owner.
  5. Pilot rules with business owners who can confirm application behaviour.
  6. Review Intune firewall reports after each ring.

Local checks:

PowerShell
Get-NetFirewallProfile |
    Select-Object Name, Enabled, DefaultInboundAction, DefaultOutboundAction, NotifyOnListen

Expected output shape:

Name    Enabled DefaultInboundAction DefaultOutboundAction NotifyOnListen
----    ------- -------------------- --------------------- --------------
Domain  True    Block                Allow                 <value>
Private True    Block                Allow                 <value>
Public  True    Block                Allow                 <value>

Check a rule by display name or application:

PowerShell
Get-NetFirewallRule |
    Where-Object DisplayName -like "*<application-or-rule-name>*" |
    Select-Object DisplayName, Enabled, Direction, Action, Profile, PolicyStoreSource

Expected output shape:

DisplayName  : <rule name>
Enabled      : True
Direction    : Inbound
Action       : Allow
Profile      : Domain, Private
PolicyStoreSource : <policy source>

For firewall issues, avoid changing the global profile state just to make one application work. Fix the specific rule and confirm ports, protocol, app path and profile.

Attack Surface Reduction Rules

Attack surface reduction rules can prevent common malware behaviours, but they can also expose old application habits. Treat ASR rollout as its own project inside the Defender rollout.

Use this staged approach:

StagePurpose
InventoryFind existing ASR settings from GPO, Intune, baselines or scripts
AuditTurn on audit where supported to see likely impact
WarnUse warn mode for rules where user override is acceptable and supported
Block pilotApply block mode to lab and pilot groups
Block productionExpand only after reviewing events and business app compatibility

Common ASR controls to review include Office child process creation, executable content from email and webmail, credential stealing from LSASS, JavaScript and VBScript execution of downloaded executables, and abuse of vulnerable signed drivers. Do not enable every rule in block mode on day one. The right target state depends on device role, user type and application compatibility.

Check local ASR settings:

PowerShell
$Preference = Get-MpPreference

[PSCustomObject]@{
    AttackSurfaceReductionRulesIds = $Preference.AttackSurfaceReductionRules_Ids
    AttackSurfaceReductionRulesActions = $Preference.AttackSurfaceReductionRules_Actions
    ControlledFolderAccess = $Preference.EnableControlledFolderAccess
    NetworkProtection = $Preference.EnableNetworkProtection
}

Expected output shape:

AttackSurfaceReductionRulesIds     : {<rule-guid>, <rule-guid>, <rule-guid>}
AttackSurfaceReductionRulesActions : {AuditMode, Enabled, Warn}
ControlledFolderAccess             : <value>
NetworkProtection                  : <value>

Review Microsoft Defender Antivirus events for ASR activity:

PowerShell
Get-WinEvent -LogName "Microsoft-Windows-Windows Defender/Operational" -MaxEvents 50 |
    Where-Object Id -in 1121, 1122 |
    Select-Object TimeCreated, Id, LevelDisplayName, Message

Expected output shape:

TimeCreated          Id   LevelDisplayName Message
-----------          --   ---------------- -------
<date/time>          1121 <level>          <ASR block event text>
<date/time>          1122 <level>          <ASR audit event text>

Use audit evidence to identify real application impact. Do not create broad ASR exclusions for a whole directory tree unless a narrow exclusion has been tested and approved.

EDR Policy and Sense Service Checks

The EDR onboarding policy should result in a healthy Sense service and a device that appears in the Defender portal inventory.

Check the service:

PowerShell
Get-Service -Name Sense |
    Select-Object Name, DisplayName, Status, StartType

Expected output shape:

Name        : Sense
DisplayName : Windows Defender Advanced Threat Protection Service
Status      : Running
StartType   : <not disabled>

You can also use the command Microsoft includes in onboarding troubleshooting:

PowerShell
sc.exe query sense

Expected output shape:

SERVICE_NAME: sense
        TYPE               : <service type>
        STATE              : 4  RUNNING
        WIN32_EXIT_CODE    : 0  (0x0)
        SERVICE_EXIT_CODE  : 0  (0x0)

If the service is missing, stopped or stuck in a pending state, check onboarding status, operating system support, proxy access, endpoint connectivity, tamper protection and event logs before changing policy.

Defender and Sense Event Logs

Use local event logs to confirm what the device actually did.

LogUse it for
Microsoft-Windows-SENSE/OperationalDefender for Endpoint onboarding, sensor and communication events
Microsoft-Windows-Windows Defender/OperationalMicrosoft Defender Antivirus, ASR, remediation and configuration events
Microsoft-Windows-DeviceManagement-Enterprise-Diagnostics-Provider/AdminMDM and Intune policy processing evidence

Check recent Sense events:

PowerShell
Get-WinEvent -LogName "Microsoft-Windows-SENSE/Operational" -MaxEvents 30 |
    Select-Object TimeCreated, Id, LevelDisplayName, ProviderName, Message

Expected output shape:

TimeCreated          Id   LevelDisplayName ProviderName            Message
-----------          --   ---------------- ------------            -------
<date/time>          <id> <level>          Microsoft-Windows-SENSE <event text>

Check recent Defender Antivirus events:

PowerShell
Get-WinEvent -LogName "Microsoft-Windows-Windows Defender/Operational" -MaxEvents 30 |
    Select-Object TimeCreated, Id, LevelDisplayName, ProviderName, Message

Expected output shape:

TimeCreated          Id   LevelDisplayName ProviderName                         Message
-----------          --   ---------------- ------------                         -------
<date/time>          <id> <level>          Microsoft-Windows-Windows Defender   <event text>

For onboarding script errors, Microsoft documents specific SENSE event IDs such as failed service start and registry write failures. Intune onboarding normally gives you policy and device status first, but local logs are still useful when a device does not appear in the Defender portal after policy applies.

Security Baseline Considerations

Security baselines can help enforce a recommended posture, but they are not a substitute for policy ownership. They can include settings that overlap with antivirus, firewall, ASR, BitLocker, browser and general Windows hardening controls.

Before assigning a baseline:

CheckWhy it matters
Baseline versionBaseline defaults change across versions
Existing endpoint security policiesAvoid duplicate Defender, firewall and ASR settings
Existing CIS or custom hardeningAvoid conflicting values
Device typeMicrosoft notes that the Defender baseline is optimised for physical devices and may not suit all virtual or VDI endpoints
Rollback routeRemoving a profile may not revert every CSP setting
Reporting ownerSomeone must review conflict and error states

Use baselines to complement a controlled design, not to hide unknown settings behind a template. For detailed Windows hardening planning, see Hardening Windows 11 Endpoints with CIS Benchmark Level 1.

Pilot Ring Design

A good pilot proves technical onboarding and operational support.

Use these rings:

RingScopeExit criteria
LabIT owned devices that can be restarted and inspectedEDR onboarding succeeds, Sense runs, device appears in Defender portal, local Defender checks match design
Friendly pilotReal users from IT and one or two low risk business teamsNo blocking application issues, support path works, reports are clean enough to expand
Compatibility pilotDevices with VPN, legacy apps, developer tools, finance tools, remote workers and unusual peripheralsKnown exceptions documented and approved
Early productionOne department, location or device model groupIntune and Defender reports remain stable for a full reporting cycle
Broad productionMain managed Windows fleetExpansion occurs in scheduled waves with daily checks
Exception ringDevices that cannot move yetOwner, reason and review date are recorded

Prefer static device groups for the first lab and pilot assignments. Dynamic groups and filters are useful, but they add evaluation timing. Microsoft recommends care with dynamic device group exclusions in latency sensitive scenarios.

Assignment pattern:

PolicyFirst assignmentExpansion
EDR onboardingLab device groupAdd pilot, then production rings
AntivirusLab device groupAdd pilot after onboarding health is clean
FirewallLab device groupExpand only after app owner validation
ASRAudit in lab and pilot firstMove selected rules to block in rings
Security baselineLab onlyExpand after conflict review

Avoid assigning endpoint security policies to all devices during creation. Create them unassigned or assigned only to lab, then expand deliberately.

Intune Endpoint Security Assignment Checks

Check assignments in the Intune admin centre first:

  1. Go to Endpoint security.
  2. Open Endpoint detection and response, Antivirus, Firewall or Attack surface reduction.
  3. Select the policy.
  4. Open Properties > Assignments.
  5. Confirm included groups, excluded groups and filters.
  6. Open Device status and Per-setting status where available.

Use Graph PowerShell to record assignment evidence:

PowerShell
$EndpointSecurityPolicies = Get-MgBetaDeviceManagementConfigurationPolicy -All |
    Where-Object {
        $_.TemplateReference.TemplateFamily -like "endpointSecurity*" -or
        $_.Name -match "Defender|EDR|Antivirus|Firewall|ASR"
    } |
    Select-Object `
        Id,
        Name,
        IsAssigned,
        SettingCount,
        Platforms,
        Technologies,
        @{Name="TemplateFamily";Expression={$_.TemplateReference.TemplateFamily}},
        @{Name="TemplateDisplayName";Expression={$_.TemplateReference.TemplateDisplayName}}

$EndpointSecurityPolicies |
    Sort-Object Name |
    Format-Table Name, IsAssigned, SettingCount, Platforms, Technologies, TemplateFamily

Expected output shape:

Name                                  IsAssigned SettingCount Platforms Technologies TemplateFamily
----                                  ---------- ------------ --------- ------------ --------------
WIN - MDE - EDR Onboarding - Lab      True       <n>          windows   mdm          endpointSecurityEndpointDetectionAndResponse
WIN - Defender Antivirus - Lab        True       <n>          windows   mdm          endpointSecurityAntivirus
WIN - Firewall - Global - Lab         True       <n>          windows   mdm          endpointSecurityFirewall
WIN - ASR - Audit - Lab               True       <n>          windows   mdm          endpointSecurityAttackSurfaceReduction

Check one policy's assignments:

PowerShell
$PolicyId = "<endpoint-security-policy-id>"

$Assignments = Invoke-MgGraphRequest `
    -Method GET `
    -Uri "https://graph.microsoft.com/beta/deviceManagement/configurationPolicies/$PolicyId/assignments"

$Assignments.value |
    ForEach-Object {
        [PSCustomObject]@{
            AssignmentId = $_.id
            TargetType = $_.target.'@odata.type'
            GroupId = $_.target.groupId
            FilterId = $_.target.deviceAndAppManagementAssignmentFilterId
            FilterType = $_.target.deviceAndAppManagementAssignmentFilterType
        }
    } |
    Format-Table AssignmentId, TargetType, GroupId, FilterId, FilterType

Expected output shape:

AssignmentId TargetType                             GroupId    FilterId    FilterType
------------ ----------                             -------    --------    ----------
<id>         #microsoft.graph.groupAssignmentTarget <group-id> <filter-id> include

Resolve the group name:

PowerShell
$GroupId = "<group-id>"

Get-MgGroup -GroupId $GroupId |
    Select-Object Id, DisplayName, SecurityEnabled, GroupTypes, MembershipRule

Expected output shape:

Id              : <group-id>
DisplayName     : <pilot group name>
SecurityEnabled : True
GroupTypes      : {DynamicMembership} or {}
MembershipRule  : <dynamic rule or blank>

If the policy is assigned to a user group, remember that user sign-in can affect when settings apply. For device level security controls, use device groups unless there is a clear reason to target users.

Reporting and Device Health Checks

Use both service side and local checks. Intune can say a policy applied while local state still needs a restart, a user sign-in, a signature update or a service recovery.

Service side checks:

LocationWhat to check
Intune > Endpoint security > Endpoint detection and response > EDR Onboarding StatusSuccessfully onboarded, failed, pending and not applicable devices
Intune policy > Device statusDevice level policy result
Intune policy > Per-setting statusSetting level errors and conflicts
Intune > Devices > Monitor > Assignment failuresCross policy assignment failures
Defender portal > Endpoints > Device inventoryDevice appears after onboarding
Defender portal > Endpoints > Configuration management > DashboardOnboarding coverage for Intune managed Windows devices
Defender portal device pageSensor health, exposure, risk and recent activity where licensed

Local health pack for a pilot device:

PowerShell
$ComputerStatus = Get-MpComputerStatus
$Preference = Get-MpPreference
$Sense = Get-Service -Name Sense -ErrorAction SilentlyContinue

[PSCustomObject]@{
    ComputerName = $env:COMPUTERNAME
    AMRunningMode = $ComputerStatus.AMRunningMode
    AntivirusEnabled = $ComputerStatus.AntivirusEnabled
    RealTimeProtectionEnabled = $ComputerStatus.RealTimeProtectionEnabled
    IsTamperProtected = $ComputerStatus.IsTamperProtected
    AntivirusSignatureLastUpdated = $ComputerStatus.AntivirusSignatureLastUpdated
    SenseStatus = $Sense.Status
    SenseStartType = $Sense.StartType
    NetworkProtection = $Preference.EnableNetworkProtection
    PUAProtection = $Preference.PUAProtection
}

Expected output shape:

ComputerName                  : <device-name>
AMRunningMode                 : Normal
AntivirusEnabled              : True
RealTimeProtectionEnabled     : True
IsTamperProtected             : True
AntivirusSignatureLastUpdated : <date/time>
SenseStatus                   : Running
SenseStartType                : <not disabled>
NetworkProtection             : <value>
PUAProtection                 : <value>

If the device is missing from Defender inventory after Intune reports success, wait for normal reporting delay, then check Sense events, proxy and endpoint connectivity, service state, operating system support and whether the device was previously offboarded.

Common Rollout Failures

FailureWhat to check
EDR policy created before Intune connector is healthyConfirm Intune connection status and automatic onboarding package availability
Policy assigned to users but expected to apply before sign-inUse device groups for device level controls
Device stuck pending in IntuneCheck last check-in and use Intune Device Not Syncing
Device not in pilot groupConfirm Entra group membership and dynamic rule timing
Assignment filter excludes the deviceCheck associated assignments and filter evaluation
Sense service not runningReview SENSE operational log, service state, onboarding errors and OS support
Defender Antivirus disabledCheck third party antivirus state, onboarding state and policy conflicts
Local values do not match IntuneCheck GPO, Configuration Manager, local scripts, security settings management and tamper protection
ASR blocks a business workflowReview Defender events, use audit evidence, then create a narrow approved exception if needed
Firewall rule breaks an appConfirm app path, protocol, local port, remote port, profile and rule precedence
Device appears in Intune but not Defender portalCheck onboarding policy, Sense events, proxy, service health and reporting delay
Offboarding does not workConfirm the offboarding package has not expired and that the correct management channel is used
Remediation script does not runUse Intune Remediation Script Not Running before assuming Defender is at fault

Do not treat a single clean lab device as proof that the fleet is ready. Include remote users, shared devices, devices with VPN, devices with developer tools, devices with finance software, and devices with any third party endpoint product still installed.

Coexistence with Third Party AV or EDR

Coexistence needs an explicit decision, not hope.

Microsoft documents that when an onboarded Windows device is protected by a non-Microsoft anti-malware client, Microsoft Defender Antivirus can run in passive mode. In passive mode, Defender Antivirus is not the primary antivirus product. Defender for Endpoint capabilities and EDR in block mode have separate behaviour and exclusions do not map exactly to Defender Antivirus exclusions.

Plan coexistence like this:

DecisionWhy it matters
Which product is primary antivirus during each ringDetermines whether Defender Antivirus should be normal or passive
Whether EDR in block mode is enabledCan remediate threats even when Defender Antivirus is passive
Mutual exclusionsHelps reduce performance and compatibility issues
Uninstall orderDetermines when Defender Antivirus changes state
Support ownershipPrevents two vendors or teams blaming each other
Rollback routeAvoids devices with no effective protection

Client device checks:

PowerShell
Get-MpComputerStatus |
    Select-Object AMRunningMode, AntivirusEnabled, RealTimeProtectionEnabled, AMServiceEnabled

Expected output shape during Defender active phase:

AMRunningMode             : Normal
AntivirusEnabled          : True
RealTimeProtectionEnabled : True
AMServiceEnabled          : True

Expected output shape during approved third party antivirus coexistence:

AMRunningMode             : Passive
AntivirusEnabled          : True
RealTimeProtectionEnabled : False
AMServiceEnabled          : True

Do not copy this output into your rollout report as a target for every device. The expected mode depends on the product that is meant to be active at that point in the migration.

For servers, do not assume the same passive mode behaviour as Windows clients. Server onboarding and passive mode require separate planning, licensing and testing.

Rollback and Recovery Notes

Rollback must be prepared before broad assignment.

For onboarding:

  1. Stop expanding to the next ring.
  2. Remove the affected group from the EDR onboarding assignment.
  3. Sync a small number of affected devices.
  4. Confirm whether devices should remain onboarded or need formal offboarding.
  5. If formal offboarding is needed, use the Microsoft supported offboarding package for the correct management channel.
  6. Remember that Microsoft states offboarding packages expire after seven days from download.
  7. Confirm device state in the Defender portal and local Sense service state.

For antivirus, firewall, ASR and baseline settings:

  1. Stop expansion.
  2. Export the current policy and assignments.
  3. Remove the affected ring from the new policy.
  4. Restore the previous policy owner if one was removed.
  5. Sync pilot devices and restart where required.
  6. Check local state with PowerShell.
  7. Check Intune per-setting status.
  8. Check event logs for errors and blocks.
  9. Record whether any CSP setting remained in place after policy removal.

Rollback warning:

  • Removing a policy assignment does not guarantee every Windows setting immediately returns to its previous value.
  • Devices must check in before Intune changes apply.
  • Some settings may need restart or user sign-in.
  • Dynamic group changes may not be quick enough for urgent rollback.
  • If Conditional Access depends on Defender risk or compliance, access recovery may also require compliance re-evaluation.

Keep the first production wave small enough that rollback is a practical support task, not a crisis.

Prevention Checklist

Use this checklist before each rollout wave:

  • The Intune and Defender for Endpoint connection is enabled.
  • Defender for Endpoint licensing has been confirmed.
  • Intune licensing has been confirmed.
  • Server licensing has been checked if servers are in scope.
  • The required Intune and Defender roles are assigned.
  • Existing GPO, Configuration Manager, Intune and script based Defender settings have been inventoried.
  • The EDR onboarding policy uses the automatic connector package where available.
  • The EDR policy is assigned only to the current ring.
  • Antivirus, firewall and ASR policies are separate.
  • Security baseline overlap has been reviewed.
  • ASR rules have been piloted in audit or warn mode where appropriate.
  • Firewall rules have named business owners.
  • Antivirus exclusions are narrow, approved and reviewable.
  • Third party antivirus or EDR coexistence has a written plan.
  • Lab devices have passed local checks.
  • Pilot devices appear in Defender portal inventory.
  • Sense service is running on pilot devices.
  • Defender Antivirus mode matches the design.
  • Intune device status and per-setting status have been reviewed.
  • Assignment groups, exclusions and filters have been checked.
  • Device sync problems have been separated from Defender policy problems.
  • Rollback ownership is clear.
  • Offboarding is understood but not used casually.
  • Conditional Access enforcement is not enabled until Defender risk reporting is proven.

Final Operational Pattern

The safest pattern is:

  1. Confirm licensing and roles.
  2. Enable the Intune and Defender connection.
  3. Inventory existing security policy owners.
  4. Create a lab only EDR onboarding policy.
  5. Confirm Sense service, event logs, Defender portal inventory and Intune EDR status.
  6. Add antivirus policy in lab.
  7. Add firewall policy in lab.
  8. Add ASR in audit or warn mode.
  9. Review security baseline overlap.
  10. Expand to friendly pilot.
  11. Resolve application and coexistence issues.
  12. Expand in production rings.
  13. Keep reporting and rollback active until the broad fleet is stable.

The goal is not just to get devices onboarded. The goal is to make Defender for Endpoint a managed security service inside your Windows fleet, with clear ownership, reliable reporting and a supportable path when something goes wrong.

Microsoft Intune

Recommended

Manage, secure, and report on all your endpoints from a single cloud-native console.

Try it

Senior Enterprise Sysadmin · 12+ Years Windows & Intune

I've spent 12+ years managing Windows fleets, Intune tenants, and Active Directory environments for enterprise clients across finance, logistics, and professional services. AdminSignal exists because I got tired of docs that stop at "click Apply." Everything here is tested in production before it goes on the page.

AdminSignal content is produced independently. Editorial policy