You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# Onboard Windows devices to Defender for Endpoint using Intune
@@ -47,7 +47,6 @@ Follow the instructions from [Intune](/mem/intune/protect/advanced-threat-protec
47
47
For more information on using Defender for Endpoint CSP, see, [WindowsAdvancedThreatProtection CSP](https://msdn.microsoft.com/library/windows/hardware/mt723296(v=vs.85).aspx) and [WindowsAdvancedThreatProtection DDF file](https://msdn.microsoft.com/library/windows/hardware/mt723297(v=vs.85).aspx).
48
48
49
49
> [!NOTE]
50
-
>
51
50
> - The **Health Status for onboarded devices** policy uses read-only properties and can't be remediated.
52
51
> - Configuration of diagnostic data reporting frequency is only available for devices on Windows 10, version 1703.
53
52
> - Onboarding to Defender for Endpoint will onboard the device to [Data Loss Prevention (DLP)](/Microsoft-365/compliance/endpoint-dlp-learn-about), which is also a part of Microsoft 365 compliance.
@@ -57,13 +56,12 @@ For more information on using Defender for Endpoint CSP, see, [WindowsAdvancedTh
57
56
58
57
After onboarding the device, you can choose to run a detection test to verify that a device is properly onboarded to the service. For more information, see [Run a detection test on a newly onboarded Microsoft Defender for Endpoint device](run-detection-test.md).
59
58
60
-
61
59
## Offboard devices using Mobile Device Management tools
62
60
63
-
For security reasons, the package used to Offboard devices will expire 7 days after the date it was downloaded. Expired offboarding packages sent to a device will be rejected. When downloading an offboarding package you'll be notified of the packages expiry date and it will also be included in the package name.
61
+
For security reasons, the package used to Offboard devices expires seven days after the date it was downloaded. Expired offboarding packages sent to a device are rejected. When downloading an offboarding package, you're notified of the package's expiry date, and the date is included in the package name.
64
62
65
63
> [!NOTE]
66
-
> Onboarding and offboarding policies must not be deployed on the same device at the same time, otherwise this will cause unpredictable collisions.
64
+
> To avoid unpredictable policy collisions, onboarding and offboarding policies must not be deployed at the same time on a device.
67
65
68
66
1. Get the offboarding package from the [Microsoft Defender portal](https://security.microsoft.com) as follows:
69
67
@@ -73,25 +71,18 @@ For security reasons, the package used to Offboard devices will expire 7 days af
73
71
74
72
3. In the **Deployment method** field, select **Mobile Device Management / Microsoft Intune**.
75
73
76
-
4.Click**Download package**, and save the .zip file.
74
+
4.Select**Download package**, and save the .zip file.
77
75
78
-
2. Extract the contents of the .zip file to a shared, read-only location that can be accessed by the network administrators who will deploy the package. You should have a file named `WindowsDefenderATP_valid_until_YYYY-MM-DD.offboarding`.
76
+
2. Extract the contents of the `.zip` file to a shared, read-only location that can be accessed by the network administrators who'll deploy the package. You should have a file named `WindowsDefenderATP_valid_until_YYYY-MM-DD.offboarding`.
79
77
80
-
3. In Microsoft Intune admin center, create a custom configuration policy.
78
+
3. In the [Microsoft Intune admin center](https://intune.microsoft.com), you can use a custom configuration policy or an EDR policy.
81
79
82
-
1. In the navigation pane, select **Devices**\>**By platform**\>**Windows**\>**Manage Devices**\>**Configuration**.
83
-
2. Under **Policies** click **Create**\>**New Policy**.
84
-
3. In the **Create a profile** slide out, select **Windows 10 and later** as **Platform** and **Templates** as **Profile Type**.
85
-
4. Under **Template Name**, click the **Custom** template and click **Create**.
86
-
5. Enter a value for **Name** and click **Next**.
87
-
6. Under **Configuration settings**, click **Add** and use the following OMA-URI settings.
- Value: *Copy and paste the value from the content of the WindowsDefenderATP_valid_until_YYYY-MM-DD.offboarding file*
92
-
7. Make the appropriate group assignments, applicability rules, and on the **Review + create** step, click the **Create** button to finish the policy.
80
+
| Method | Procedure |
81
+
|---|---|
82
+
| Custom configuration policy | 1. In the navigation pane, select **Devices**\>**By platform**\>**Windows**\>**Manage Devices**\>**Configuration**. <br/><br/>2. Under **Policies** select **Create**\>**New Policy**.<br/><br/>3. In the **Create a profile** slide out, select **Windows 10 and later** as **Platform** and **Templates** as **Profile Type**.<br/><br/>4. Under **Template Name**, select the **Custom** template and select **Create**.<br/><br/>5. Enter a value for **Name** and select **Next**. <br/><br/>6. Under **Configuration settings**, select **Add** and use the following OMA-URI settings: <br/>- Name: Provide a name <br/>- OMA-URI: `./Device/Vendor/MSFT/WindowsAdvancedThreatProtection/Offboarding` <br/> - Date type: String<br/>- Value: Copy and paste the value from the content of the `WindowsDefenderATP_valid_until_YYYY-MM-DD` offboarding file. <br/><br/>7. Make the appropriate group assignments, applicability rules, and on the **Review + create** step, select **Create**. |
83
+
| EDR policy | 1. In the navigation pane, select **Endpoint security**\>**Manage**\>**Endpoint detection and response**.<br/><br/>2. Under **Endpoint detection and response (EDR) policies**, select **Create policy**.<br/><br/>3. In the **Create a profile** slide out, select **Windows** as **Platform** and **Endpoint detection and response** and select **Create**.<br/><br/>5. Enter a value for **Name** and select **Next**. <br/><br/>6. Under **Configuration settings**, select **Offboard** for the setting **Microsoft Defender for Endpoint client configuration package type**.<br/><br/>7. Copy the value from the content of the `WindowsDefenderATP_valid_until_YYYY-MM-DD` offboarding file and paste it in the **Offboarding (Device)** setting. Then select **Next**.<br/><br/>8. Specify any scope tags if needed, make the appropriate group assignments and on the **Review + create** step, select **Create**. |
93
84
94
-
For more information on Microsoft Intune policy settings, see [Windows 10 policy settings in Microsoft Intune](/mem/intune/configuration/custom-settings-windows-10).
85
+
For more information on Microsoft Intune policy settings, see [Windows 10 policy settings in Microsoft Intune](/mem/intune/configuration/custom-settings-windows-10).
95
86
96
87
> [!NOTE]
97
88
> The **Health Status for offboarded devices** policy uses read-only properties and can't be remediated.
0 commit comments