Defender for Endpoint: Onboard and Protect
Onboard devices to Microsoft Defender for Endpoint, configure endpoint security settings, and establish your device protection baseline.
Bringing devices into the fight
Defender for Endpoint turns every device into a security sensor.
Think of it like installing a black-box recorder in every company car. The car still drives normally, but now every journey, every harsh brake, and every near-miss is logged and sent to a central control room. If something dangerous happens β a crash, a theft attempt β the control room can react in real time: lock the engine, sound the alarm, alert the fleet manager.
Thatβs what onboarding does. Until a device is onboarded, itβs invisible to your security team. Once onboarded, Defender for Endpoint watches processes, network connections, file changes, and user behavior β and responds automatically when threats appear.
Plan 1 vs Plan 2 β what you actually get
Marcus is evaluating licensing for Oakwood Financial. The distinction between Plan 1 and Plan 2 appears on the exam regularly.
| Feature | Plan 1 | Plan 2 |
|---|---|---|
| Next-generation protection (antimalware) | true | true |
| Attack surface reduction rules | true | true |
| Device-based Conditional Access | true | true |
| Controlled folder access | true | true |
| Web content filtering | true | true |
| Endpoint Detection and Response (EDR) | false | true |
| Automated investigation and remediation | false | true |
| Threat and Vulnerability Management | false | true |
| Advanced hunting (KQL queries) | false | true |
| Sandbox detonation (deep analysis) | false | true |
| Endpoint Attack Notifications | false | true |
| Included with | Microsoft 365 E3/A3 | Microsoft 365 E5/A5 Security |
Exam tip: Plan 1 vs Plan 2 boundary
The exam tests whether you know which capabilities require Plan 2. The key dividing line: Plan 1 is prevention-focused (ASR, antimalware, web filtering). Plan 2 adds detection and response (EDR, automated investigation, vulnerability management, advanced hunting). If a question describes investigating an alert timeline or running a KQL hunt query β thatβs Plan 2 territory.
Onboarding methods β matching method to environment
Marcus needs to onboard 800 devices at Oakwood Financial. Choosing the right onboarding method is critical β the wrong approach means manual effort multiplied across every device.
Windows devices
| Method | Best for | How it works |
|---|---|---|
| Local script | Testing, POC, small batches under 10 | Download the onboarding script from Defender portal, run locally on each device |
| Intune (Microsoft Endpoint Manager) | Cloud-managed devices at any scale | Deploy MDE configuration profile via Intune β fully automated, zero touch |
| Group Policy | Domain-joined devices in on-premises AD | Deploy onboarding script via GPO β targets OUs or security groups |
| Configuration Manager (MECM/SCCM) | Large enterprises with existing MECM infrastructure | Use the MDE onboarding task sequence or client settings |
| VDI onboarding script | Non-persistent virtual desktops (AVD, Citrix) | Modified script designed for session-based environments that re-image frequently |
Cross-platform support
MDE isnβt Windows-only. The exam expects you to know supported platforms and their onboarding mechanisms.
| Platform | Onboarding method | Key limitation |
|---|---|---|
| macOS | Intune, JAMF, manual script | Requires system extensions approval and full disk access |
| Linux | Package manager (apt/yum), Puppet, Ansible | Supported distros: RHEL, Ubuntu, Debian, SLES, Oracle Linux, Amazon Linux, Fedora, Rocky, Alma |
| iOS | Intune via managed app (Microsoft Defender app) | Supervised mode recommended (enables web protection without local VPN) |
| Android | Intune via managed app (Microsoft Defender app) | Requires Android 10.0 or later |
Marcus's onboarding decision at Oakwood Financial
Marcus has 800 devices: 650 Windows laptops (Intune-managed), 80 macOS devices (JAMF-managed), 50 iPads (Intune-managed), and 20 Linux servers (Ansible-managed). His onboarding plan:
- Windows laptops β Intune endpoint detection and response policy (zero touch, auto-deploys)
- macOS β JAMF integration with MDE (handles system extension approval)
- iPads β Intune app deployment (push Microsoft Defender app as required)
- Linux servers β Ansible playbook using the MDE package repository
No local scripts needed. Every method is automated and reportable. Marcus can track onboarding status from the Defender portalβs device inventory.
Endpoint security settings β the protection baseline
Once devices are onboarded, you configure four core protection capabilities.
Attack Surface Reduction (ASR) rules
ASR rules block specific behaviors that malware commonly exploits. They donβt detect threats β they prevent attack techniques from working in the first place.
Key ASR rules for the exam:
| Rule | What it blocks |
|---|---|
| Block executable content from email and webmail | Stops executables, scripts, and Office macros downloaded via email from running |
| Block Office applications from creating child processes | Prevents Word/Excel from spawning PowerShell or cmd.exe |
| Block credential stealing from LSASS | Prevents processes from reading credentials from the LSASS memory |
| Block untrusted and unsigned processes from USB | Prevents execution of unsigned executables from removable media |
| Use advanced protection against ransomware | Applies heuristic checks to block files that resemble ransomware behavior |
ASR rules can run in audit mode (log only) or block mode (enforce). Always deploy in audit mode first to identify false positives.
Controlled folder access
Protects designated folders (Documents, Desktop, Pictures, and any custom folders you add) from unauthorized changes. Only trusted applications can modify files in protected folders. This is the primary anti-ransomware capability β ransomware that tries to encrypt files in protected folders gets blocked.
Exploit protection
System-level and per-application mitigations against memory corruption exploits. Replaces the legacy EMET tool. Configurable via Intune, GPO, or PowerShell XML export/import. Key mitigations include DEP, ASLR, and Control Flow Guard.
Network protection
Extends SmartScreen protection beyond the browser to all HTTP/HTTPS traffic on the device. Blocks connections to known-malicious domains and IP addresses. Works at the network layer β catches threats that web filtering alone would miss.
Device groups and role-based access
In the Defender portal, device groups let you segment your fleet for targeted policies and assign investigation responsibilities to specific security teams.
Marcus creates device groups at Oakwood Financial:
| Device group | Criteria | Assigned team |
|---|---|---|
| Executive devices | Device tag: βVIPβ | Tier 2 analysts |
| Finance workstations | AD domain group membership | Tier 1 analysts, Finance IT |
| BYOD mobile | OS: iOS, Android | Mobile security team |
| Servers | OS: Windows Server, Linux | Infrastructure security |
Device groups control:
- Automated remediation level β which device groups allow full auto-remediation vs requiring analyst approval
- Role-based access β security analysts only see devices in groups assigned to their role
- Policy targeting β ASR rules, antivirus settings, and other configurations can target specific groups
Exam tip: Automated remediation levels
Each device group has a remediation level: No automated response, Semi (require approval for core folders), or Full (auto-remediate everything). The exam tests whether you understand that newly onboarded devices fall into the default device group β and whatever remediation level is set there applies until you move devices to a custom group. Configure your default group conservatively.
Knowledge check
Marcus onboards Oakwood Financial's 650 Windows laptops to Defender for Endpoint via Intune. A week later, the security team reports they cannot see EDR alert timelines or run advanced hunting queries β they only see basic antivirus detections. What is the most likely cause?
Elena is configuring ASR rules for MedGuard Health's clinical workstations. The medical records application requires Microsoft Word to launch a helper process (child process) for document generation. Elena enables the 'Block Office applications from creating child processes' ASR rule. What should she do to prevent disruption?
Priya is planning MDE onboarding for GlobalReach Corp's 200 macOS devices managed by JAMF. Which additional step is required for macOS onboarding that is NOT needed for Windows?
π¬ Video coming soon
Next up: Vulnerability Management β use the TVM dashboard to find and fix weaknesses before attackers exploit them.