Defender Settings not applied?

Brass Contributor

We're using Intune with Microsoft Endpoint in Microsoft365/Azure for deploying apps, and configuring AzureAD Joined/MEM Managed devices; and Azure Security group containing Windows Client OS devices.

 

There are Defender settings, in a MEM Windows Device Configuration Profile, as well as Attack Surface Reduction profile; the settings were replicated from Intune Windows configuration after Security Recommendations indicated the settings needed to be applied in order to improve security. , Security recommendations state those setting is not enabled for 'all' the devices. I verified that Windows Device Configuration settings are applied to the workstations since Chrome Desktop browser and Edge Chromium browser settings are applied across the organization.

 

Any suggestion would be welcome. 

 

Thank you.

2 Replies
Security recommendations will give you a list of exposed devices. Did you check if those devices are target or not? Also, what are the recommendations for?

@rahuljindal-MVP  Thank you for your help. The configurations, from Defender, MEM, Amtivirus, and ASR, are applied to the Azure Security Group (dynamic) which includes Windows OS devices that are not Server.

Several recommendations (e.g. Block Office applications from creating child processes, Block Adobe from creating child processes, Setup PUA in Block mode, etc.) indicate 130/130 devices. While Google and Edge Chromium Uodate display 3/130 or 8/130 respectively.

 

When looking at configuration health, there are 4 policy conflicts (which are not listed in the recommendations. Each device, joined to AzureAD is dis-joined from WindowsAD, factory reset, and joined to AzureAD to precisely avoid Group Policy and Intune configuration conflicts. In the Windows configuration, MEM policy takes precedence over Group Policy; in case our tech decided to process his setup.