Intune Compliance Policy: Device not compliant because of missing machine risk score: deactivated?

Copper Contributor

Dear all,

 

I have this curious compliance issue for which I cannot find any information online or on docs.microsoft.com. Any help or suggestions are appreciated.

 

We are testing Windows Defender ATP in combination with Intune compliance policies on a limited amount of devices. We had a first test group of three devices, and a second test group of four devices. So 7 in total.

 

In Intune our 'second wave' of test devices is somehow marked as "non compliant" because a violation of our rule that "Require the device to be at or under the machine risk score = clean, low,...".  However, these machines are onboarded in Windows Defender ATP and are showing to have no issues. In Intune the table in Device Compliance -> Device Compliance shows that for these machines the Device Threat Level is "Deactivated".  (Our other test machines report "Secured", machines outside the test group are reporting "Unknown".)

 

deactivated.JPG

 

I cannot find any documentation where this state of "deactivated" is discussed. 

 

We identified three other differences between or first test group and the second test group:

- License level was on Microsoft E3 for the non-compliant machines, instead of E5 

- Windows version was 1803 for the non-compliant machines, instead of 1809

- The very first test group was onboarded in Windows Defender ATP using a script. The second non-comliant group was onboarded using a configuration policy in Intune.

 

To test if any of these three differences could have caused the issue I did three separate tests:

1) I moved one user to Microsoft E5, as I understand for Windows Defender ATP this is required.

2) I had one other machine upgraded to Windows 10 1809

3) I ran the manual onboarding script once more on a third machine

But none of these machines would be compliant afterwards.

 

I onboarded the first test group to ATP using a script downloaded from ATP. They were active for a few weeks with just the ATP link. I then assigned both the compliance policy and the final ATP configuration at the same time to this first group.

 

The second group was onboarded by the ATP configuration policy in Intune.  I assigned the identical compliance policy a day later. 

 

I assume that the compliance check fails because the machines do not communicate their threat level (shown as "deactivated" in the Intune portal) properly.

 

One widget in the device compliance screen does show 5 of the 7 devices to be clean:

clean.JPG

 

I do not understand why it counts 5 devices. What with the remaining two?  And if these 5 are indeed clean, why do at least two of them (7 minus 5) report as having a threat level "deactivated" and "non-compliant"?

 

Does anyone know why the Device Threat Level of the second test group is "deactivated"? What causes this? How can I solve this?

 

Thanks for your help!

 

Best regards,

Wim

38 Replies
No, same ambiguity. It just states --

OS
Windows 10 x64
Version 1903
Build 18362

@Philip Kluss 

 

Hi Philip, I was able to reproduce the issue.  I edited my first reply on this e-mail thread w/ details on how to make it work.  At least in my lab.  Give it a try, and hopefully that will help you in your environment too.

I am the OP of this thread.  Just checked the compliance state again and for us it seems the issue is transient. All our machines are Hybrid Azure AD joined. 

 

We do still see machines being reported as 'not compliant'. Some of them have no compliance issue if you look at the policies in detail on the device level, but in the overview list they are still 'not compliant'.

 

Other are not compliant because one of the policies is not compliant for the system users.  Still very confusing. It messes up all the reports and we cannot work with the compliance level at all in policies. :(

@Wim Borgers Thanks for checking back in.  I've been working with support and the Intune team verified that everything is configured correctly on our end.  We, too, are dealing with hybrid Azure AD joined devices that have tons of inexplicable, transient issues regarding device compliance.  As of yesterday evening, the Intune team agreed to reach out to the Windows Defender ATP team to figure out why the services aren't talking to each other successfully.  The WD ATP dashboard shows all of these devices as healthy, but still our devices are marked Deactivated under Device Threat Level in Intune.  I'll report back with any useful findings.  Until this works, the whole Zero Trust model of secure network design will remain out of reach for us which is a shame.

Even though the ATP <--> Intune connector claims to be healthy and working fine, I had a thought to try to recreate it and have gotten some troubling results.  When I toggled off the Connect Windows devices version 10.0.15063 and above to Microsoft Defender ATP option in the Intune settings and I received an error stating "An error occurred.  Couldn't establish the connector. Try again later."  I receive this error whether I'm toggling it On or Off.  Toggling on and off the connector from the Defender ATP portal gives me no errors.

 

Is anyone else willing to see if they get a similar error when toggling in the Intune portal?

@Philip Kluss I dont want to try that but I am having issues onboarding Windows 10 1903 devices to the Microsoft Security Defender Center.  I have tried local script, GPO and Intune to try to join the devices and I have had not luck.   I tried an 1809 device and it showed up in the Defense Center within 5 minutes.   It seems like there are some issues with ATP.  All my devices show as Successful for the Microsoft Defender ATP configuration profile- none of the 1903 devices I have tried to add in the last week have made it.

 

A quick update --

 

After a few false starts and transfers to different teams, we've learned a few things.  Firstly, my configuration is correct.  I'm being assured that Microsoft is looking at this issue internally and will provide guidance -- the case will remain open until then.  We have a workaround that we can apply which simply involves running a test detection for Defender ATP (link) for any of the machines experiencing this issue.  Within about 15 minutes of running this, they shift to a compliant state.  I've never had a machine return to the non-compliant, deactivated state after running this test so it seems the workaround is permanent.

 

I'm hoping there is something that Microsoft can do that would obviate the need to run this test detection on every affected machine and I'll try to report back when the case is closed.

@Philip Kluss Thanks for the update.  That is useful info. Those who are experience the issue can now at least fix it.

 

I did mention this issue to Microsoft at the Defender ATP or Intune (forgot which) booth at Microsoft Ignite 2019.  They told me that there were some synchronisation issues between Intune and Defender ATP and that they worked hard with both teams to resolve the sync issues.  I was told some new code was released just before Ignite that should fix most issues.  He did not reference or confirm this specific issue though.

 

Another Belgian consultant had the same issue, by the way. So we are certainly not the only ones who are battling with this.

 

The strange thing is that your test was after Ignite, so it is still unclear if it is fixed or not....

@Wim Borgers  Well, I'm fixed.  They ran some sort of back-end sync and and all of my machines are reporting properly.  I asked whether or not this fix was applied only to my tenant or whether it was a platform-wide change and I received the following response --

 

"Actually I was checking from the backend team whether the fix was only for specific to your tenant or there were other tenants on which this fix was deployed .

 

I got a confirmation that they have  deployed a fix for the ATP service to get it working again over the weekend 12/7-8 and it was only for your tenant ."

 

So anyone else that is having this issue has two options:

  1. Start a support case to beg and plead that they run whatever back-end sync it is that fixes this. Keep in mind this took 2(!) months for me as the passed me back and forth between Intune and ATP support and ruled out all of the things that I may have mucked up.
  2. Run the WD ATP detection test script on all affected machines.

In fact, I would probably run the detection test script on a machine or two first to make sure that it resolved the problem and that you didn't have an entirely different issue at play.  After verifying that this resolves it, you might pursue the support case for a back-end sync.

@Philip Kluss  Thanks for the info! Glad the issue got solved for you. I think the info will be useful for others in this thread as well. I will relay this info to our sysadmin and we will check our own tenant as well. :)

@Wim Borgers I might have found a way to fix this issue without getting Microsoft involved.  I had the same issue with new machines showing Non-Compliant and Deactivated in InTune but found that shortly after running the detection test against a machine (found in Microsoft Defender Security Center --> Settings --> Machine Management --> Onboarding) it checked into ATP and was then marked Compliant.  Tested this with 3 machines so far and it worked for all of them.  

@TeknaDan Thanks for the info. That is good to know. We will check it on our systems as well. That is indeed an elegant solution!  Although in the end Microsoft still needs to fix this. :)

This issue still exists today..

 

Device: Setup with personal (offline or Microsoft account)

Added Work or School Account

Intune: Made corporate and assigned policies / apps

Defender for Enpoint: Enrolled

Azure AD shows: AAD Registered

 

AAD Registered machines don't get compliant in Intune because of their risk Score. The devices are Active in the Microsoft Security Portal (Defender for Endpoint).

The company portal says: "Enroll your device in Microsoft Defender for Endpoint" --> It is!

When I test it with eicar.com it detects and show that on the Defender for Endpoint portal. 

 

What else to do.. 

Joining the device to AAD is not an option at this moment.

@molislaegers 

 

I have exact same issue as you are describing. Were you able to somehow overcome this? I needed to deploy some BYOD devices, Azure AD Joined devices are not an option. ( we already have that for company-owned devices, and it is working just fine )

Devices are properly AD Registered, Intune Managed, onboarded into Microsoft Defender for Endpoint, but in the Endpoint manager admin center, the computer is failing at compliance policy with "Require the device to be at or under the machine risk score: Not Compliant."

 

In the Company portal, I am receiving the same error message "Enroll your device in Microsoft Defender for Endpoint".

 

In the defender portal, I can see, that the Device is Onboarded properly, Active but at the Exporuse level, there is: "No data available".

It seems like the portal is not able to somehow properly get the data from the device, to calculate exposure level.

 

I have tried re-deploying defender manually with no luck ( currently deploying with policy ).  I have re-imaged the testing device and re-enrolled into the system countless times.

 

Thank you for any hint.

The answer I've got on my service ticket:

A machine has to be AAD / HAAD Joined to detect the risk score. It's in the prerequisites on: https://docs.microsoft.com/en-us/mem/intune/protect/advanced-threat-protection#prerequisites

What I've done is making a second Compliance Policy for registered devices without the Risk Score component.
Thank you for the fast reply. Oh, hmm, I completely missed this prerequisite.

Well, it is strange, because everything else is working, so it is not that "totally not supported", just Risk Score is not working, everything else seems to be connected and active. Very missleading.

I will create the same workaround as you.

Thank you once more.

@molislaegers Thanks for the info. When we originally had this issue and created this thread our machines were already HAAD joined, and we had the issue nevertheless. I would need to check on the current status with my colleague, but it is odd that the ticket mentions that as a solution.

@Wim Borgers 

Atulpal2490_0-1649344846489.png

I have few questions Did you configure all these policies ? Did you connect endpoint to intune through connector (toggle button ). Did you create any conditional policies that states the device to be non compliant if they are at certain risk level ?

 

 

We have a similar issue with one device that is failing compliance due to an AAD error. We are cloud only and all devices are joined to AAD and MDM enrolled. However, one device shows as AAD registered when viewed in AAD, but shows as AAD joined on the device. It is enrolled in MDM. Defender for Endpoint returns a low risk score, but the compliance policy think it is non-compliant for reason of the risk score being high. I have tried various fixes, but the only solution seems to be a complete reset (MDM fresh start, or wipe) because the error seems to stem from the AAD joining process.