Endpoint Security: Antivirus, Firewall & Encryption
The three pillars of endpoint security through Intune: antivirus policies for threat protection, firewall policies for network defense, and disk encryption for data at rest.
The three pillars of endpoint security
Think of endpoint security like protecting a house.
- Antivirus = the alarm system β detects and removes intruders (malware) that get inside
- Firewall = the locked doors and windows β controls what comes in and goes out of the network
- Disk encryption = a safe for your valuables β if someone steals the laptop, they canβt read the hard drive
All three are configured and enforced through Intuneβs Endpoint Security node β Chen Wei at Meridian Bank manages all 10,000 devices from one dashboard.
Antivirus policies
What you configure
| Setting | Options | Chen Weiβs Choice |
|---|---|---|
| Real-time protection | On/Off | On (always) |
| Cloud-delivered protection | On/Off | On β uses Microsoftβs cloud intelligence |
| Cloud protection level | Not configured / High / High+ / Zero tolerance | High+ (banking requires aggressive detection) |
| Scan type | Quick / Full | Quick scan daily, Full scan weekly |
| Scheduled scan | Time and frequency | Daily at 12:00 PM (lunch break) |
| Exclusions | File/folder/process/extension | Exclude banking app data folder (performance) |
| PUA detection | On/Off | On β block potentially unwanted applications |
| Tamper protection | On/Off | On β prevent users from disabling Defender |
Where to create antivirus policies
Intune admin center β Endpoint security β Antivirus β Create policy
| Platform | Profile Types |
|---|---|
| Windows | Microsoft Defender Antivirus, Microsoft Defender Antivirus Exclusions, Windows Security Experience |
| macOS | Microsoft Defender Antivirus (requires Defender for Endpoint on Mac) |
| Linux | Microsoft Defender Antivirus (requires Defender for Endpoint on Linux) |
Exam tip: tamper protection
Tamper protection prevents users and malware from disabling Microsoft Defender Antivirus settings. When enabled:
- Users canβt turn off real-time protection
- Malware canβt disable Defender via registry changes
- Third-party security tools canβt override Defender settings
The exam may describe a scenario where Defender keeps getting disabled β the answer is enable tamper protection. Itβs managed through the Microsoft Defender portal (security.microsoft.com), not just Intune.
Firewall policies
Windows Defender Firewall via Intune
| Setting | Options | Purpose |
|---|---|---|
| Domain profile | On/Off + rules | Applies when connected to corporate network |
| Private profile | On/Off + rules | Applies on home/trusted networks |
| Public profile | On/Off + rules | Applies on public Wi-Fi (most restrictive) |
| Block inbound connections | Yes/No per profile | Block unsolicited incoming traffic |
| Firewall rules | Allow/Block specific ports, protocols, apps | Custom rules for LOB apps, remote management |
Firewall rule configuration
| Rule Setting | Example |
|---|---|
| Name | Allow banking app port 8443 |
| Direction | Inbound |
| Action | Allow |
| Protocol | TCP |
| Local port | 8443 |
| Remote address | 10.0.0.0/8 (corporate network only) |
| Application | C:\Program Files\BankApp\bank.exe |
Disk encryption policies
BitLocker (Windows)
| Setting | Options | Chen Weiβs Choice |
|---|---|---|
| Require encryption | Yes/No | Yes β all corporate devices |
| Encryption method | XTS-AES 128, XTS-AES 256 | XTS-AES 256 (banking standard) |
| OS drive encryption | Required | Required |
| Fixed drive encryption | Required / Not required | Required |
| Recovery key escrow | Save to Entra ID | Yes β recovery keys stored in Entra |
| Startup authentication | TPM only, TPM + PIN, TPM + key | TPM only (seamless for users) |
| Silent encryption | Yes/No | Yes β encrypt without user interaction |
FileVault (macOS)
For macOS devices, disk encryption uses FileVault (covered in Module 13). Intune manages FileVault through endpoint security or device configuration profiles.
Deep dive: BitLocker recovery key management
When BitLocker encrypts a drive, a recovery key is generated. This 48-digit key unlocks the drive if the normal unlock method fails (TPM issue, forgotten PIN, motherboard replacement).
Intune workflow:
- BitLocker encrypts the drive β recovery key generated
- Key is automatically escrowed to Entra ID (attached to the device object)
- Helpdesk views the key in Intune admin center β Devices β select device β Recovery keys
- After use, the key should be rotated (see Module 17)
Exam tip: If a user gets a BitLocker recovery prompt after a hardware change, the helpdesk retrieves the key from Entra ID/Intune β not from a file on the device or a USB drive.
π¬ Video walkthrough
π¬ Video coming soon
Endpoint Security: Antivirus, Firewall & Encryption β MD-102 Module 23
Endpoint Security: Antivirus, Firewall & Encryption β MD-102 Module 23
~12 minFlashcards
Knowledge Check
Chen Wei discovers that a malware strain at another bank disabled Microsoft Defender before executing its payload. How can he prevent this at Meridian Bank?
A user's laptop at Meridian Bank has a motherboard replacement and now shows a BitLocker recovery screen on boot. How should the helpdesk retrieve the recovery key?
Next up: Attack Surface Reduction & Security Baselines β hardening devices with ASR rules and Microsoft-recommended security configurations.