• About
  • Disclaimer
  • Privacy Policy
  • Contact
Sunday, June 15, 2025
Cyber Defense GO
  • Login
  • Home
  • Cyber Security
  • Artificial Intelligence
  • Machine Learning
  • Data Analysis
  • Computer Networking
  • Disaster Restoration
No Result
View All Result
  • Home
  • Cyber Security
  • Artificial Intelligence
  • Machine Learning
  • Data Analysis
  • Computer Networking
  • Disaster Restoration
No Result
View All Result
Cyber Defense Go
No Result
View All Result
Home Computer Networking

Microsoft Defender for Endpoint (MDE) Deployment and Configuration Steps with Safety Coverage Particulars – 51 Safety

Md Sazzad Hossain by Md Sazzad Hossain
0
Microsoft Defender for Endpoint (MDE) Deployment and Configuration Steps with Safety Coverage Particulars – 51 Safety
585
SHARES
3.2k
VIEWS
Share on FacebookShare on Twitter

You might also like

Addressing Vulnerabilities in Positioning, Navigation and Timing (PNT) Companies

Powering All Ethernet AI Networking

5G is Shifting Downstream to Enterprises


The next steps is barely used for a specific atmosphere to have a simplified deployments which is to focus on bringing MDE to all units as quick as we are able to (in every week for 1k units together with home windows, macOS, linux, servers, workstations, and so on), additionally take away current expired antimalware software program, on the identical time, has most potential safety on the top level units. 

The concept deployment will take 2-3 months with all thorough testing, planning and verifying. 

Background

Third Get together Antivirus / Bug already deployed into all Workstations and Servers.

Microsoft Defender for Endpoints (P2) and Defender for Servers (P1) has been chosen to interchange this third social gathering safety software program on all workstations (Home windows and Mac) and all servers (Home windows and Linux)

From Microsoft study, https://study.microsoft.com/en-us/defender-endpoint/mde-planning-guide,  the steps to deploy Defender for Endpoint are:

The deployment steps
  1. Step 1 – Arrange Microsoft Defender for Endpoint deployment: This step focuses on getting your atmosphere prepared for deployment.
  2. Step 2 – Assign roles and permissions: Establish and assign roles and permissions to view and handle Defender for Endpoint.
  3. Step 3 – Establish your structure and select your deployment methodology: Establish your structure and the deployment methodology that most accurately fits your group.
  4. Step 4 – Onboard units: Assess and onboard your units to Defender for Endpoint.
  5. Step 5 – Configure capabilities: You’re now able to configure Defender for Endpoint safety capabilities to guard your units.

Course of associated to MDE

Excessive Stage Deployment Steps for Workstation

1 Producing onboarding code

Onboard units to Microsoft Defender for Endpoint utilizing the onboarding configuration package deal that matches your most popular deployment methodology. For different machine preparation directions, learn Onboard and arrange.Deployment strategies:

You possibly can configure your units utilizing Group Coverage.
For extra data on the best way to configure and monitor Microsoft Defender for Endpoint units see Configure units utilizing Group Coverage part within the Microsoft Defender for Endpoint information.

  • Native Script (for as much as 10 units)

Native Script (for as much as 10 units)

You possibly can configure a single machine by working a script regionally.
Notice: This script has been optimized for utilization with a restricted variety of units (1-10). To deploy at scale, please see different deployment choices above.
For extra data on the best way to configure and monitor Microsoft Defender for Endpoint units, see Configure units utilizing a neighborhood script
part within the Microsoft Defender for Endpoint information. Obtain onboarding package deal

2 Deploy onboarding package deal (script) to all workstations 

It may be executed part by part, ranging from pilot machines, then departments by departments, or location by location.

Examine MDE portal https://safety.microsoft.com/ – Property – Gadgets web page to get the listing of all machines and get the standing of machines.

You need to use Group Coverage or third social gathering deployment instruments in your patching and software program set up to deploy this script. 

3 If there may be third social gathering XDR software program already put in on workstations, the MDE will run on passive mode.

Get-MpComputerStatus : 



PS C:UsersUser> get-mpcomputerstatus


AMEngineVersion                  : 1.1.25010.7
AMProductVersion                 : 4.18.24090.11
AMRunningMode                    : Regular
AMServiceEnabled                 : True
AMServiceVersion                 : 4.18.24090.11
AntispywareEnabled               : True
AntispywareSignatureAge          : 0
AntispywareSignatureLastUpdated  : 2/21/2025 11:24:41 AM
AntispywareSignatureVersion      : 1.423.36.0
AntivirusEnabled                 : True
AntivirusSignatureAge            : 0
AntivirusSignatureLastUpdated    : 2/21/2025 11:24:41 AM
AntivirusSignatureVersion        : 1.423.36.0
BehaviorMonitorEnabled           : True
ComputerID                       : C223A6B9-EE37-4983-B88D-09CC8C8BFA9F
ComputerState                    : 0
DefenderSignaturesOutOfDate      : False
DeviceControlDefaultEnforcement  :
DeviceControlPoliciesLastUpdated : 3/27/2023 10:12:31 AM
DeviceControlState               : Disabled

https://study.microsoft.com/en-us/powershell/module/defender/get-mpcomputerstatus?view=windowsserver2025-ps

Get-MpComputerStatus will get the antimalware standing of Defender AV. Use the command for validating the working mode. Examine the next gadgets:

  • AMRunningMode: Should be in regular mode for lively Defender safety
  • AMProductVersion: Should be one of many newest launched variations
  • AMServiceEnabled: Should be True
  • AntiSpywareEnabled: Should be True
  • BehaviorMonitorEnabled: Should be True
  • RealTimeProtectionEnabled: Should be True
  • IoavProtectionEnabled: Should be Tru

If the consumer is working MDE it is going to have processes like sensendr working

HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Superior Menace ProtectionStatus

+ I suppose you could possibly verify for mssense.exe

4 After uninstalled third social gathering XDR software program, MDE will grow to be lively mode.

Excessive Stage Deployment Steps for Servers

1. MDE normal deployment

Microsoft article: Onboard Home windows servers to the Microsoft Defender for Endpoint service

https://study.microsoft.com/en-us/defender-endpoint/configure-server-endpoints?view=o365-worldwide

You’ll want to full the next common steps to efficiently onboard servers.

An illustration of onboarding flow for Windows Servers and Windows 10 devices.

Applies to:

Examine the workflow in subsequent part.

2.  Join your non-azure machines to Microsoft Defender for Cloud with Defender for Endpoint

https://study.microsoft.com/en-us/azure/defender-for-cloud/plan-defender-for-servers

1. Join AWS / GCP machines

2. Join on-premises machines

3. Allow Defender for servers (Tenant degree or Powershell script for assigned assets)

4. Make the most of free information ingestion

5. Put together for OS evaluation (Defender for server plan 2)

6. Arrange File Integrity monitoring (Defender for server plan 2)

This tenant-level setting lets you routinely and natively onboard any non-Azure server working Defender for Endpoint to Defender for Cloud, with none further agent deployments. This onboarding path is good for patrons with blended and hybrid server property who want to consolidate server safety beneath Defender for Servers.

Enabling direct onboarding is an opt-in setting on the tenant degree. It impacts each current and new servers onboarded to Defender for Endpoint in the identical Microsoft Entra tenant. Shortly after you allow this setting, your server units will present beneath the designated subscription. 

  1. Go to Defender for Cloud > Setting Settings > Direct onboarding.
  2. Change the Direct onboarding toggle to On.
  3. Choose the subscription you want to use for servers onboarded straight with Defender for Endpoint.
  4. Choose Save.

https://study.microsoft.com/en-us/azure/defender-for-cloud/onboard-machines-with-defender-for-endpoint

Join your non-azure machines to Microsoft defender for cloud

  1. Join on-premises machines by utilizing Azure Arc
  2. Join on-premises machines by utilizing the Azure portal
  3. Microsoft Defender for Endpoint integration or agentless scanning

Pre-requirements

  • Servers is not going to be onboarded if the home windows defender AV part shouldn’t be put in on the machine
  • Defender AV shouldn’t be disabled by GPO
  • Ensure that your server is having newest safety updates
  • Required URLs are whitelisted – https://obtain.microsoft.com/obtain/6/b/f/6bfff670-47c3-4e45-b01b-64a2610eaefa/mde-urls-commercial.xlsx

To simplify server mgmt, use Azure Replace Administration Heart. watch this playlist: https://www.youtube.com/playlist?listing=PLboJ9yx0c_SUn_pQQrKfFUmk5mA0kC9MV

You may additionally need to configurare Azure Log Analytics and Antomation Account for Azure Arc and Replace Administration Heart: 

1 Generate Azure Arc Script

2 Run Particular PowerShell Script to Allow MDE 

Operating Powershell script to allow defender for servers

https://github.com/Azure/Microsoft-Defender-for-Cloud/tree/most important/Powershellpercent20scripts/Defenderpercent20forpercent20Serverspercent20onpercent20resourcepercent20level

3 Add ResourceLevelPricingAtScale.ps1 into your cloud shell

Ensure that use correct useful resource group or tag to allow MDE.

4 Put MDE in passive mode if you’re utilizing a third-party anti-malware answer.

You’ll want to apply the next Microsoft Defender Antivirus passive mode setting. Confirm that it was configured appropriately: Set the next registry entry:

  • Path: HKLMSOFTWAREPoliciesMicrosoftWindows Superior Menace Safety
  • Title: ForceDefenderPassiveMode
  • Kind: REG_DWORD
  • Worth: 1
Screenshot of the passive mode verification result.

5 Configure Defender Portal hook up with Intune

Defender Settings

6 Configure Intune to Join Home windows Gadgets to Microsoft Defender for Endpoint

Intune – Endpoint Safety – Setup – Microsoft Defender for Endpoints

7 Configure Antivirus and Expose Administration Coverage / Profiles in Intune

Workflow of Onboarding Servers 

This workflow is an instance utilizing onboarding script. In case you are utilizing Arc, it will likely be completely different in step 4.

1. Confirm AV service put in and working on the machines

  1. sc question windefend
  2. sc qc windefend
  3. hostname 

2. Examine the registries earlier than onboarding

3. Examine the occasion logs within the sense associated folders

  • sc qc sense
  • sc question sense

the service shouldn’t be working and no logs are in sense associated folders

4. Run onboarding script

5. confirm sense service is working

Offboard Home windows Servers

You possibly can offboard Home windows Server 2012 R2, Home windows Server 2016, Home windows Server (SAC), Home windows Server 2019, Home windows Server 2019 Core version, Home windows Server 2022, and Home windows Server 2025 (starting in February 2025 and rolling out over the subsequent a number of weeks) utilizing the identical methodology accessible for Home windows 10 consumer units.

After offboarding, you’ll be able to proceed to uninstall the unified answer package deal on Home windows Server 2016 and Home windows Server 2012 R2.

For different Home windows server variations, you’ve two choices to offboard Home windows servers from the service:

  • Uninstall the MMA agent
  • Take away the Defender for Endpoint workspace configuration

Offboarding units is a possible answer. This sounds fascinating at first, nevertheless it gained’t work in our case.

Two other ways exist to offboard units:

  • Regionally, by working an offboarding script on a tool (supported for macOS, Linux, and Home windows (Server)).
  • Via the offboarding API (supported for Home windows 10 and Home windows Server 2019).

It is very important perceive that offboarding a tool doesn’t take away a tool from the stock. As an alternative, the machine switches to an ‘inactive’ state 7 days after offboarding. Which means offboarding shouldn’t be an environment friendly option to handle reimaged/repurposed units.

The primary aim of offboarding is to sever the connection between Microsoft Defender and the machine. That is helpful in a number of situations, together with:

  • A tool encounters compatibility points as a result of the scanning course of impacts efficiency and the usual operation of the server or respectable processes are being blocked
  • You’re transferring away from Microsoft Defender to a distinct EDR answer.
  • The machine is now not in scope.

The final situation is one thing I frequently encounter with prospects: accidentally, the client onboarded private units into Microsoft Defender for Endpoint because of a misconfiguration. By utilizing the offboarding API, I might block the machine from sending information to Microsoft 365 Defender by transferring it out of scope for the corporate. So offboarding units do have a use case, however it’s not an answer for managing inactive units

Safety Insurance policies for Home windows Workstation

 Find out about utilizing Intune to handle Microsoft Defender settings on units that aren’t enrolled with Intune | Microsoft Be taught

Intune – Endpoint Safety –  Handle – AntiVirus

Safety Insurance policies for Home windows Servers

Configuration Setttings:

Intune – Endpoint Safety –  Handle – Assault floor discount

Safety Insurance policies for Mac

Safety Insurance policies for Linux

  • Linux servers onboarded by Microsoft Defender for Cloud have their preliminary configuration set to run Defender Antivirus in passive mode.

Microsoft Defender for Endpoint consumer analyzer

  1. The newest steady version is obtainable for obtain from following URL: https://aka.ms/MDEAnalyzer
  2. The newest preview version is obtainable for obtain from following URL: https://aka.ms/MDEClientAnalyzerPreview
  3. The newest steady version shall be built-in into the MDE for Endpoint agent. Guarantee that you’re working the most recent version for both macOS or Linux.
  4. The newest preview version is obtainable for direct obtain from following URL: https://aka.ms/XMDEClientAnalyzer

MDE VDI Deployments

https://study.microsoft.com/en-us/defender-endpoint/configure-endpoints-vdi

Onboard non-persistent digital desktop infrastructure (VDI) units in Microsoft Defender XDR

  1. Open the VDI configuration package deal file (WindowsDefenderATPOnboardingPackage.zip) that you simply downloaded from the service onboarding wizard. It’s also possible to get the package deal from the Microsoft Defender portal.
    1. Within the navigation pane, choose Settings > Endpoints > Machine administration > Onboarding.
    2. Choose the working system.
    3. Within the Deployment methodology subject, choose VDI onboarding scripts for non-persistent endpoints.
    4. Choose Obtain package deal and save the file.
  2. Copy the recordsdata from the WindowsDefenderATPOnboardingPackage folder extracted from the zipped folder into the golden/major picture beneath the trail C:WINDOWSSystem32GroupPolicyMachineScriptsStartup. (The folder shall be generated by native group coverage from subsequent step, if the folder shouldn’t be offered within the system)
    • In case you’re implementing a number of entries for every machine – one for every session, copy WindowsDefenderATPOnboardingScript.cmd.
    • In case you’re implementing a single entry for every machine, copy each Onboard-NonPersistentMachine.ps1 and WindowsDefenderATPOnboardingScript.cmd.
  3. Open a Native Group Coverage Editor window and navigate to Pc Configuration > Home windows Settings > Scripts > Startup. NoteDomain Group Coverage may additionally be used for onboarding non-persistent VDI units.
  4. Relying on the strategy you’d prefer to implement, comply with the suitable steps:Broaden tableMethodStepsSingle entry for every device1. Choose the PowerShell Scripts tab, then choose Add (Home windows Explorer opens straight within the path the place you copied the onboarding script earlier).
    2. Navigate to onboarding PowerShell script Onboard-NonPersistentMachine.ps1. There’s no must specify the opposite file, because it’s triggered routinely.A number of entries for every device1. Choose the Scripts tab, then choose Add (Home windows Explorer opens straight within the path the place you copied the onboarding script earlier).
    2. Navigate to the onboarding bash script WindowsDefenderATPOnboardingScript.cmd.
  5. Check your answer

For VDI Grasp picture, it is not going to be onboarded into MDE portal. To keep away from it to be onboarded, following scrip will verify the hostname of machines earlier than run VDI begin up script. 

Write-Host "INFO: Checking hostname towards a listing of identified grasp photographs... Please wait..."

# Get the present hostname
$CURRENT_HOSTNAME = (hostname)

# Outline the goal hostnames
$TARGET_HOSTNAMES = @("example1", "example2", "example3", "example4", "MDLT2")

Write-Host "INFO: Present hostname is $CURRENT_HOSTNAME"
Write-Host "INFO: Goal hostnames are $($TARGET_HOSTNAMES -join ', ')"

# Initialize a flag to point if a match is discovered
$MATCH_FOUND = $false

# Examine if the present hostname matches any of the goal hostnames
foreach ($TARGET_HOSTNAME in $TARGET_HOSTNAMES) {
    if ($CURRENT_HOSTNAME -eq $TARGET_HOSTNAME) {
        $MATCH_FOUND = $true
        Write-Host "INFO: Hostname matches one of many goal hostnames"
        Write-Host "WARNING: This machine is a grasp picture... Exiting..."
        exit
    }
}

if (-not $MATCH_FOUND) {
    Write-Host "INFO: Hostname doesn't match any of the goal hostnames"
    $script = $PSScriptRoot+"Onboard-NonPersistentMachine.ps1"
    & $script
}

For Home windows 2012 R2 and Home windows 2016, the onboarding script for VDI grasp picture shall be modified with :

@echo off
echo INFO: Checking hostname towards a listing of identified grasp photographs… Please wait… 
for /f “tokens=*” %%i in (‘hostname’) do set CURRENT_HOSTNAME=%%i
set TARGET_HOSTNAMES=example1 exampl2 example3 exampel4
echo INFO: Present hostname is %CURRENT_HOSTNAME%
echo INFO: Goal hostnames are %TARGET_HOSTNAMES%
set MATCH_FOUND=false
for %%h in (%TARGET_HOSTNAMES%) do (
    if “%CURRENT_HOSTNAME%”==”%%h” (
        set MATCH_FOUND=true
echo INFO: Hostname matches one of many goal hostnames¨C158C echo WARNING: This machine is a grasp picture… Exiting…¨C159C exit        ¨C160C    )¨C161C)

¨C162C

¨C357C¨C358C¨C359C¨C360C¨C361C¨C362C¨C363C¨C364C

RBAC

 4 Steps:

1. Create Azure AD Person Teams

2. Configure MDE RBAC

3. Create Machine Tags

4. Create Machine Teams

Examine Record Pattern:

Machine Teams / Person Teams

Many customers ask when to make use of consumer teams and when to make use of machine teams. The reply depends upon your aim. Right here’s some steering to get you began.

Machine teams

If you wish to apply settings on a tool, no matter who’s signed in, then assign your insurance policies to a units group. Settings utilized to machine teams all the time go along with the machine, not the consumer.

For instance:

  • Machine teams are helpful for managing units that don’t have a devoted consumer. For instance, you’ve units that print tickets, scan stock, are shared by shift staff, are assigned to a selected warehouse, and so forth. Put these units in a units group, and assign your insurance policies to this units group.
  • You create a Machine Firmware Configuration Interface (DFCI) Intune profile that updates settings within the BIOS. For instance, you configure this coverage to disable the machine digital camera, or lock down the boot choices to forestall customers from booting up one other OS. This coverage is an effective situation to assign to a units group.
  • On some particular Home windows units, you all the time need to management some Microsoft Edge settings, no matter who’s utilizing the machine. For instance, you need to block all downloads, restrict all cookies to the present looking session, and delete the looking historical past. For this situation, put these particular Home windows units in a units group. Then, create an Administrative Template in Intune, add these machine settings, after which assign this coverage to the units group.

To summarize, use machine teams if you don’t care who’s signed in on the machine, or if anybody indicators in. You need your settings to all the time be on the machine.

Person teams

Coverage settings utilized to consumer teams all the time go along with the consumer, and go along with the consumer when signed in to their many units. It’s regular for customers to have many units, corresponding to a Floor Professional for work, and a private iOS/iPadOS machine. And, it’s regular for an individual to entry electronic mail and different group assets from these units.

If a consumer has a number of units on the identical platform, then you should utilize filters on the group task. For instance, a consumer has a private iOS/iPadOS machine, and an organization-owned iOS/iPadOS. While you assign a coverage for that consumer, you should utilize filters to focus on solely the organization-owned machine.

Comply with this common rule: If a function belongs to a consumer, corresponding to electronic mail or consumer certificates, then assign to consumer teams.

For instance:

  • You need to put a Assist Desk icon for all customers on all their units. On this situation, put these customers in a customers group, and assign your Assist Desk icon coverage to this customers group.
  • A consumer receives a brand new organization-owned machine. The consumer indicators in to the machine with their area account. The machine is routinely registered in Microsoft Entra ID, and routinely managed by Intune. This coverage is an effective situation to assign to a customers group.
  • Every time a consumer indicators in to a tool, you need to management options in apps, corresponding to OneDrive or Workplace. On this situation, assign your OneDrive or Workplace coverage settings to a customers group.For instance, you need to block untrusted ActiveX controls in your Workplace apps. You possibly can create an Administrative Template in Intune, configure this setting, after which assign this coverage to a customers group.

To summarize, use consumer teams if you need your settings and guidelines to all the time go along with the consumer, no matter machine they use.

Pattern Machine Teams:

Create Customized Position:

Permissions:

Roles for Endpoints, Defender XDR, and Cloud Apps

Tags

https://www.matej.guru/p/microsoft-defender-for-endpoint-script?utm_source=publication-search

Right here’s an instance of the best way to add a TAG to units utilizing the onboarding script:

  1. Open the onboarding script file in a textual content editor
  2. Find the :SCRIPT_START part
  3. Add a command to assign a TAG to the machine. As an example, if we need to assign a TAG “Workgroup“, we are able to use the next command:
REG add "HKLMSOFTWAREPoliciesMicrosoftWindows Superior Menace ProtectionDeviceTagging" /v Group /t REG_SZ /f /d "Workgroup" >NUL 2>&1

By incorporating a command to assign TAGs throughout the onboarding script, we are able to streamline the method and routinely categorize the units throughout onboarding.

Machine Group and Machine Tag Examine Record Pattern:

Tagging by Group Coverage

Tagging by Defender Portal – Settings – XDR – Guidelines – Asset Rule Mgmt

Net Content material Filtering

References

Like this:

Like Loading…

Associated

Submit navigation

Tags: ConfigurationDefenderDeploymentDetailsEndpointMDEMicrosoftPolicySecuritySteps
Previous Post

Who may have imagined it? The IPCC working group 1 of us.

Next Post

Diese Unternehmen hat es schon erwischt

Md Sazzad Hossain

Md Sazzad Hossain

Related Posts

Addressing Vulnerabilities in Positioning, Navigation and Timing (PNT) Companies
Computer Networking

Addressing Vulnerabilities in Positioning, Navigation and Timing (PNT) Companies

by Md Sazzad Hossain
June 14, 2025
Powering All Ethernet AI Networking
Computer Networking

Powering All Ethernet AI Networking

by Md Sazzad Hossain
June 14, 2025
5G is Shifting Downstream to Enterprises
Computer Networking

5G is Shifting Downstream to Enterprises

by Md Sazzad Hossain
June 14, 2025
That is Extending to GreenOps – IT Connection
Computer Networking

AWS Summit Sydney – Accelerating AI from Prospects to Manufacturing – IT Connection

by Md Sazzad Hossain
June 13, 2025
Is WiFi 7 Value It? Evaluating Early Wi-Fi 7 Adoption Advantages, Community Throughput & Extra.
Computer Networking

Is WiFi 7 Value It? Evaluating Early Wi-Fi 7 Adoption Advantages, Community Throughput & Extra.

by Md Sazzad Hossain
June 13, 2025
Next Post

Diese Unternehmen hat es schon erwischt

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

The 2025 Sophos Lively Adversary Report – Sophos Information

The 2025 Sophos Lively Adversary Report – Sophos Information

April 3, 2025
Options, Advantages & Evaluate • AI Parabellum

Options, Advantages & Evaluate • AI Parabellum

March 11, 2025

Categories

  • Artificial Intelligence
  • Computer Networking
  • Cyber Security
  • Data Analysis
  • Disaster Restoration
  • Machine Learning

CyberDefenseGo

Welcome to CyberDefenseGo. We are a passionate team of technology enthusiasts, cybersecurity experts, and AI innovators dedicated to delivering high-quality, insightful content that helps individuals and organizations stay ahead of the ever-evolving digital landscape.

Recent

Dutch police determine customers as younger as 11-year-old on Cracked.io hacking discussion board

Dutch police determine customers as younger as 11-year-old on Cracked.io hacking discussion board

June 15, 2025

Ctrl-Crash: Ny teknik för realistisk simulering av bilolyckor på video

June 15, 2025

Search

No Result
View All Result

© 2025 CyberDefenseGo - All Rights Reserved

No Result
View All Result
  • Home
  • Cyber Security
  • Artificial Intelligence
  • Machine Learning
  • Data Analysis
  • Computer Networking
  • Disaster Restoration

© 2025 CyberDefenseGo - All Rights Reserved

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In