11 - Microsoft Defender Platform + Endpoint Configuration¶
1. Defender for Endpoint¶
Onboard Devices to Defender ATP & Configure Connection¶
-
Within the Security Portal (security.microsoft.us) head to Settings > Endpoints > Advanced Features (default landing page)
-
Scroll down and find the 'Microsoft Intune Connection' option and toggle it ON
-
Save settings
Download Onboarding Package¶
-
Go to the Onboarding area within the same settings area under 'Device management'
-
Set the Operating System to Windows 10 and 11
-
Deployment Method: MDM and Intune
-
Download Onboarding Package
Configure Intune Connection¶
-
Head to the Intune Portal (intune.microsoft.us) head to Endpoint Security > Microsoft Defender for Endpoint
-
Verify it says 'Available' at the top for Connection Status
-
Under the 'Compliance Policy evaluation' section enable Connect Windows Devices
-
Under the 'Endpoint Security Profile Settings' section enable Allow Defender to Enforce Configs
-
Save up the top, the Connection Status should now change to Enabled
Create Defender for Endpoint Onboarding Policy¶
-
Head to Devices > Windows > Configuration > Create > New Policy > Windows 10 or later > Templates > Microsoft Defender for Endpoint
-
Configure the policy:
- Name: Microsoft Defender for Endpoint Onboarding
- Description: Enrolls and configures Cloud PCs to be managed by MS Defender ATP
- Configuration type: Onboard
- Extract the ZIP file you downloaded earlier (onboarding package)
- Upload the extracted '.onboarding' file
- Leave sample sharing set to 'Not configured'
- Enable Expedite Telemetry
- Assign Policy to the 'Devices - Cloud PCs - Dynamic' group
-
Create policy
Configure Advanced Features¶
-
Go to Settings > Endpoints > Advanced Features (default landing page)
-
Ensure the following settings are Enabled:
- Enable EDR in block mode
- Allow or Block file
- Tamper Protection
- Microsoft Defender for Cloud Apps
- Live Response
- Web Content Filtering
-
Save Settings
-
Then go to Web Content Filtering underneath the 'Rules' section on the side and add a policy:
- Name: Web Content Filtering Baseline
- Select the Adult Content & Legal Liability categories fully and apply to all machines
2. CloudApp Security Enablement¶
Enable File Monitoring¶
-
Go to Security Portal (security.microsoft.us)
-
Settings > Cloud Apps > Information Protection Section > Files
-
Turn on and save
Enable User Enrichment¶
-
Go to the Cloud Discovery section > User enrichment
-
Turn on and save
Enable Defender for Endpoint App Access¶
-
Go to the Cloud Discovery section > Microsoft Defender for Endpoint
-
Turn on Enforce app access and save
Enable MS Information Protection Inspection¶
-
Go to Information Protection section > Microsoft Information Protection
-
Tick the first box and save
-
Grant permission for it to inspect protected files
Connect Microsoft 365 for Monitoring¶
-
Go to the Connected Apps section > App Connectors > Connect an App > Microsoft 365
-
Tick ALL options and connect Microsoft 365
Connect Microsoft Azure for Monitoring¶
-
Connected Apps section > App Connectors > Connect an App > Microsoft Azure
-
Connect Microsoft Azure