Edit

Share via


Deploy endpoint detection and response policy with Intune

When you integrate Microsoft Defender for Endpoint with Intune, you can use endpoint security policies for endpoint detection and response (EDR) to manage the EDR settings and onboard devices to Microsoft Defender for Endpoint.

Intune policies for EDR include platform-specific profiles that manage the onboarding (installation) of Microsoft Defender for Endpoint. Use of onboarding packages is how devices are configured to work with Microsoft Defender for Endpoint. Onboarding to Defender through Intune EDR policies configures devices to send security telemetry to Microsoft Defender for Endpoint, enabling advanced threat detection, investigation, and response capabilities.

This article covers EDR deployment scenarios, from automatic connector-based deployment to manual configuration for specialized environments.

Tip

In addition to EDR policy, you can use device configuration policy to onboard devices to Microsoft Defender for Endpoint. However, device configuration policies don't support tenant attached devices.

When using multiple policies or policy types like device configuration policy and endpoint detection and response policy to manage the same device settings (such as onboarding to Defender for Endpoint), you can create policy conflicts for devices. To learn more about conflicts, see Manage policy conflicts.

Understanding EDR onboarding

EDR onboarding configures devices so they can send security telemetry to your Defender for Endpoint tenant. The onboarding package is a platform-specific configuration file containing:

  • Tenant configuration: Identifies your specific Defender for Endpoint organization.
  • Service endpoints: URLs for communicating with Defender services.
  • Authentication material: Certificates and tokens for secure device-to-service communication.
  • Basic configuration: Device registration settings and initial communication parameters.

Key concepts:

  • Devices appear in the Defender portal shortly after successful onboarding and initial telemetry submission.
  • Onboarding enables telemetry flow, but doesn't configure advanced settings such as attack surface reduction, firewall, or antivirus policies.
  • EDR policies don't manage threat hunting rules, custom detection logic, response automation, or investigation workflows.

For technical details, see Onboard devices to Microsoft Defender for Endpoint.

Applies to:

  • Linux
  • macOS
  • Windows
  • Windows Server 2012 R2 and later is supported when devices are managed through one of the following:
    • Configuration Manager (tenant attach)
    • Microsoft Defender for Endpoint security settings management

Important

On October 14, 2025, Windows 10 reached end of support and won't receive quality and feature updates. Windows 10 is an allowed version in Intune. Devices running this version can still enroll in Intune and use eligible features, but functionality isn't guaranteed and can vary.

Prerequisites

Before you deploy EDR policies, confirm that your organization meets the licensing and permission requirements.

License

  • Microsoft Intune Plan 1

You need licenses for Microsoft Defender:

  • Defender for Endpoint Plan 1 license per user
  • Microsoft 365 E5/A5/G5 (includes Defender for Endpoint Plan 2)
  • Microsoft Defender XDR (standalone)

For detailed licensing information, see:

Role-based access control

To configure EDR policy, your account must be assigned an Intune role with sufficient role-based access control (RBAC) permissions:

  • Endpoint Security Manager: The Endpoint Security Manager role includes permissions to create and manage endpoint security policies.
  • Custom role: At minimum, Create/Read/Update/Delete permissions for Endpoint security.

You also need permissions in Microsoft Defender for Endpoint to establish the service connection:

  • Security Administrator role in Microsoft Entra ID, or
  • Custom role with equivalent permissions: microsoft.directory/applications/create, microsoft.directory/applications/delete, microsoft.directory/servicePrincipals/create

For detailed permission guidance, see Role-based access control for endpoint security.

Supported platforms and profiles

Windows:

  • Profile: Endpoint detection and response
    • Sample sharing: Choose how devices send file samples to Defender for Endpoint.
    • Onboarding options: Auto from connector (available when the service connection is configured) or manually add an Onboard or Offboard package.
      • Auto from connector (recommended when the service-to-service connection is configured).
      • Manual onboarding using an Onboard or Offboard package from the Defender portal.
    • Management: Intune-enrolled devices, or unenrolled devices through Defender for Endpoint security settings management.

macOS:

Linux:

Windows Server 2012 R2+:

  • Profile: Endpoint detection and response (ConfigMgr)
    • Management:
    • Collection targeting: Assign to Configuration Manager collections instead of Entra ID groups.
    • Requirements:
      • KB4563473 hotfix
      • Collections synchronized to Intune for assignments
      • Assignments are applied to Configuration Manager collections, not Entra ID groups

Configure the Intune–Defender for Endpoint connection

Intune requires a connection to Microsoft Defender for Endpoint to automatically retrieve onboarding packages and support EDR policy deployment.

When the connection is enabled:

  • Intune retrieves the latest onboarding package from Defender for Endpoint.
  • Policy creation uses the most recent onboarding configuration.
  • You can use Auto from connector in EDR profiles.

To configure the connection:

  1. In the Microsoft Intune admin center, go to Tenant administration > Connectors and tokens > Microsoft Defender for Endpoint.
  2. Select Connect Microsoft Defender for Endpoint to Intune.
  3. Enable the connection and configure data sharing preferences.
  4. Verify the connection status shows Connected.

Tip

Connection verification can take up to 15 minutes. If the connection fails, confirm that your account has Security Administrator permissions in both Intune and Defender for Endpoint.

For detailed setup instructions, see Connect Microsoft Defender for Endpoint to Intune.

Deploy EDR policy

About the Endpoint detection and response node:

In the Intune admin center, the Endpoint detection and response node includes the following tabs:

  • Summary - Lists all EDR policies, the connector status, and includes the "Windows devices onboarded to Defender for Endpoint" chart and Create Policy option.
  • EDR Onboarding Status - Shows the onboarding summary chart, device list with detailed status, and includes the Deploy preconfigured policy option. For detailed guidance on using this tab, see EDR Onboarding Status report.

Every device that reports security telemetry to Microsoft Defender for Endpoint must be onboarded using a configuration package (called an onboarding "blob"). This package contains:

  • Tenant-specific configuration - Tells the device which Defender for Endpoint organization to report to.
  • Authentication certificates - Enables secure communication with Defender services.
  • Reporting settings - Configures what data to send and how frequently.

Whether you use automatic or manual deployment, Intune applies the same onboarding configuration to devices. The difference is how Intune obtains that configuration:

  • Automatic (recommended) - Intune retrieves the onboarding package from Defender for Endpoint through the configured service connection.
  • Manual - Use an onboarding package downloaded from the Defender portal when automatic retrieval isn't available.

Note

The onboarding package is stable and only requires updating in rare scenarios, like when working with Microsoft to move your tenant to a new datacenter geography.

Choosing your deployment method:

Scenario Recommended Method Configuration Package Type
No service connection configured between Intune and Defender for Endpoint Manual EDR policy Onboard
Quick deployment to all Windows devices with service connection active Quick deployment with preconfigured policy Auto from connector
Targeted deployment with custom settings and active service connection Targeted remediation Auto from connector
Multiple Defender tenants or air-gapped environments Manual EDR policy Onboard
Strict change control requiring manual package management Manual EDR policy Onboard

Create an automatic EDR policy

Best for environments with standard Intune + Defender integration and a single Defender for Endpoint tenant.

Prerequisites: Active service-to-service connection between Intune and Defender for Endpoint.

Deploy the preconfigured Windows EDR policy

The fastest way to deploy EDR onboarding to all Windows devices is using the preconfigured policy option available from the EDR Onboarding Status tab. This method automatically uses the latest onboarding package from your Defender for Endpoint tenant and deploys with recommended settings.

For detailed step-by-step instructions, see Quick deployment with preconfigured policy in the EDR Onboarding Status report section.

Create custom EDR policy (all platforms)

When you need to deploy EDR policies to specific groups or platforms with customized settings, use the Create Policy option from the Summary tab. This approach gives you full control over platform selection, configuration settings, and group assignments.

Key configuration options include:

  • Microsoft Defender for Endpoint client configuration package type: Select Auto from connector when available
  • Sample Sharing: Choose based on your data sensitivity requirements
  • Device Tags (macOS and Linux): Configure for device filtering and grouping

For detailed policy creation guidance, see Targeted remediation in the EDR Onboarding Status report section.

Manual EDR policy creation

Use this method when your organization can't use the service connection (multiple tenants, air-gapped environments, or strict change control).

Download the onboarding package:

  1. In the Microsoft Defender portal, go to Settings > Endpoints > Device management > Onboarding.
  2. Select the operating system and choose Mobile Device Management / Microsoft Intune.
  3. Select Download package.

Create the policy:

  1. In Intune, go to Endpoint security > Endpoint detection and response > Create Policy.
  2. Select the platform and profile.
  3. For Package type, choose Onboard or Offboard.
  4. Paste the contents of the downloaded onboarding file.
  5. Configure remaining settings, then assign and create the policy.

Additional profiles for Linux devices

After creating your core EDR policies, you can deploy additional specialized profiles for enhanced security management.

Create a Linux Global Exclusions policy

Note

Linux Global Exclusions: For Linux devices managed through Microsoft Defender for Endpoint security settings management, you can create a separate Microsoft Defender Global Exclusions (AV+EDR) profile. This profile supports path and process name exclusions without wildcards.

  1. Go to Endpoint security > Endpoint detection and response > Create Policy.
  2. Select Linux for platform and Microsoft Defender Global Exclusions (AV+EDR) for profile.
  3. Configure exclusions by adding entries with:
    • Path: File or directory path to exclude (no wildcards supported).
    • Process name: Process name to exclude from EDR monitoring (no wildcards supported).
  4. Assign to Linux device groups managed through MDE security settings management.

Important

Global exclusions are combined with other exclusion sources and result in the union of all exclusions. Adding exclusions can reduce threat detection coverage.

Configuration Manager deployment

Tenant attach

Tenant attach enables Intune to deploy EDR policies to Configuration Manager–managed Windows devices.

Configuration Manager requirements:

  • Current Branch 2002 or later
  • For 2002, install KB4563473 (hotfix)

Tenant attach configuration:

  • Synchronize device collections to Intune (Cloud Sync).
  • Ensure All Desktop and Server Client is enabled and synchronized (required for preconfigured Windows EDR policies).

Permissions:

  • Intune Service Administrator Entra ID built-in role, or equivalent role for tenant attach and endpoint security policy management.

Set up Configuration Manager for EDR

  1. Install Configuration Manager update: Apply KB4563473 hotfix for Configuration Manager 2002.
  2. Configure tenant attach: Synchronize Configuration Manager collections to Intune.
  3. Verify connectivity: Confirm that collections appear in both Configuration Manager and Intune admin centers.

Deploy EDR policy to Configuration Manager collections

  1. In the Intune admin center, go to Endpoint security > Endpoint detection and response > Create Policy.
  2. Select Windows (ConfigMgr) platform and Endpoint detection and response (ConfigMgr) profile.
  3. Configure the same policy settings available for Intune-managed devices.
  4. On Assignments, select Configuration Manager collections instead of Entra ID groups.
  5. Create and deploy the policy.

After you deploy the policy, allow time for Intune-ConfigMgr synchronization and Configuration Manager client policy evaluation before devices show as onboarded.

For detailed tenant attach configuration, see Configure tenant attach to support endpoint protection policies.

EDR Onboarding Status report

The EDR Onboarding Status report provides administrators with a comprehensive view of device onboarding progress across your organization. This report helps you track which devices are successfully onboarded to Microsoft Defender for Endpoint and identify devices that may need attention.

Accessing the EDR Onboarding Status report

  1. In the Microsoft Intune admin center, go to Endpoint security > Endpoint detection and response.
  2. Select the EDR Onboarding Status tab.

Understanding the report

The EDR Onboarding Status tab includes the following:

  • Onboarding summary chart: Windows devices onboarded to Defender for Endpoint - This chart displays counts of devices that have onboarded and devices that have not onboarded.

  • Device list with detailed information: This device list includes the following columns of details:

    • Device name: The name of each device in your organization
    • Managed by: How the device is managed (Intune, Configuration Manager via tenant attach, or MDE Security Settings Management)
    • Defender sensor state: Current health status of the Defender for Endpoint sensor.
      • Active: Sensor is running and communicating normally
      • Inactive: Sensor hasn't reported recently
      • Impaired: Sensor is experiencing issues
    • Onboarding status: Current onboarding state for each device.
      • Onboarded: Device is successfully sending telemetry to Defender for Endpoint
      • Not onboarded: Device hasn't completed the onboarding process
      • Pending: Device is in the process of onboarding
      • Last check-in: The time and date of the most recent communication from the device to Intune
      • Primary UPN: The primary user principal name associated with the device

Using the report for EDR deployment

Quick deployment with preconfigured policy

For rapid deployment to all eligible Windows devices directly from the EDR Onboarding Status tab:

  1. From the EDR Onboarding Status tab, select Deploy preconfigured policy.

    Screen shot of the admin center that shows where to find the Deploy preconfigured policy option.

  2. Choose your deployment scope:

    • Windows + Endpoint detection and response: For Intune-managed devices
    • Windows (ConfigMgr) + Endpoint detection and response (ConfigMgr): For Configuration Manager collections
  3. Provide a policy name and optional description.

  4. Select Create to deploy immediately.

This preconfigured policy automatically:

  • Uses the latest onboarding package from your Defender for Endpoint tenant
  • Deploys to all applicable devices in your organization
  • Applies recommended security settings

Using the report for targeted remediation

The EDR Onboarding Status report helps identify devices that need attention, which you can then address with targeted policy deployment:

Identify problem devices

Use the device list on the EDR Onboarding Status tab to identify specific devices requiring attention:

  1. Filter devices by status: Focus on "Not onboarded" or "Pending" devices
  2. Review management methods: Ensure devices are being managed through the appropriate channel
  3. Check sensor health: Identify devices with inactive or impaired sensors

Create targeted policies

Once you've identified problem devices, create specific EDR policies using the Create Policy option from the Summary tab:

Screen shot of the admin center that shows where to find the Create Policy option.

Monitoring scenarios

The EDR Onboarding Status report supports several key administrative scenarios:

Initial deployment validation

After deploying EDR policies:

  • Monitor the onboarding summary chart for increasing "onboarded" counts
  • Review individual device progress in the device list
  • Identify devices that fail to onboard within expected timeframes

Ongoing compliance monitoring

For continuous security posture management:

  • Set up regular reviews of onboarding status.
  • Track sensor health across your device fleet.
  • Identify devices that become inactive or impaired over time.

Troubleshooting deployment issues

When devices fail to onboard:

  • Use the device list to identify problematic devices.
  • Review management methods to ensure proper policy targeting.
  • Check sensor status for devices showing "Not onboarded" status.
  • Cross-reference with EDR policy compliance reports.

Best practices for using the report

  • Regular monitoring: Review the EDR Onboarding Status report weekly to ensure continuous protection coverage.
  • Proactive remediation: Address "Not onboarded" devices promptly to maintain security posture.
  • Correlation with other reports: Use alongside individual EDR policy compliance reports for comprehensive deployment visibility.
  • Document baseline metrics: Track onboarding success rates over time to identify trends.

Additional onboarding visibility

Beyond the dedicated EDR Onboarding Status report, you can also view device onboarding status through Intune's Microsoft Defender Antivirus reports. These reports include onboarding status information for Windows MDM devices and provide another way to monitor your organization's Defender for Endpoint deployment:

These reports are available at in the admin center at the following lcoations:

  • Go to Reports > Endpoint security > Microsoft Defender Antivirus > Reports > Antivirus agent status tile.
  • Go to Endpoint security > Antivirus > Unhealthy endpoints tab.

Monitor and validate EDR deployment

Intune reporting:

You can review deployment and onboarding results in the Intune admin center at Endpoint security > Endpoint detection and response:

  • Policy compliance: On the Summary tab you can select your policy to view it's deployment status.
  • Device details: On EDR Onboarding Status tab, you view simple report showing device counts, review a list of devices with details for their onboarding status and sensor health, and then select devices to drill in further for more information.

For comprehensive device onboarding oversight, use the EDR Onboarding Status report.

Microsoft Defender portal validation:

In the Defender portal:

  1. Device inventory (Assets > Devices) lists onboarded devices shortly after telemetry is received.

  2. Sensor health shows last seen time, sensor version, and communication status.

  3. Risk assessment begins after devices submit their initial telemetry.

Ongoing monitoring

Review the following to ensure continued onboarding success:

  • Policy deployment success rates
  • Device onboarding status
  • Sensor health and communication
  • Failed deployments requiring remediation

Troubleshooting

Devices do not appear in the Defender portal

  • Confirm the device can reach required endpoints (for example, *.securitycenter.windows.com and *.protection.outlook.com).
  • Check the EDR policy compliance status in Intune and review device-specific details in the EDR Onboarding Status report.
  • Ensure the Microsoft Defender for Endpoint service is running on the device.

"Auto from connector" option isn't available

  • Verify that the Defender connection shows Connected under Tenant administration > Connectors and tokens.
  • Allow up to 15 minutes after enabling the connection for the option to appear.
  • Ensure your account has appropriate administrative permissions.

For more information, see Troubleshoot Microsoft Defender for Endpoint onboarding issues.

Offboarding devices

Intune EDR policy supports the option to use an offboarding blob to offboard devices. Offboarding devices from Defender for Endpoint is typically an uncommon but planned process. Some situations that require offboarding include but aren't limited to moving a device out of a test lab, part of device lifecycle management, or required during tenant consolidation.

To create an offboarding policy:

  1. Download a new offboarding package from the Microsoft Defender portal by going to Settings > Endpoints > Device management > Offboarding.
  2. Select the operating system and choose Mobile Device Management / Microsoft Intune.
  3. Select Download package.
  4. Either create a new EDR policy with Package type set to Offboard and paste the offboarding blob contents, or update an existing offboarding policy by replacing the blob content.

When deploying an offboarding EDR policy in Intune:

  • For security reasons, the offboarding blob, or package from Defender will expire seven days after being downloaded. Expired offboarding packages sent to devices are rejected.
  • When deployed to a device, the offboarding blob disables the Defender for Endpoint sensor but doesn't remove the Defender for Endpoint client.
  • Devices stop sending telemetry to the Defender for Endpoint portal.
  • Devices show as "inactive" in Defender after seven days.
  • The Intune EDR policy compliance status should show successful deployment.
  • Historical data remains in Defender until retention policies remove it.

When you offboard a device from Defender for Endpoint:

  • Telemetry stops: No new detections, vulnerability, or security data are sent to the Microsoft Defender portal.
  • Device status changes: Seven days after offboarding, the device's status changes to "inactive".
  • Data retention: Past data (alerts, vulnerabilities, device timeline) remains in the Defender portal until the configured retention period expires.
  • Device visibility: The device profile (without data) remains visible in the device inventory for up to 180 days.
  • Exposure score: Devices inactive for 30+ days don't factor into your organization's exposure score.

For more information, see the following subjects in the Microsoft Defender for Endpoint documentation:

After onboarding devices with EDR policies, consider deploying additional endpoint security controls: