Endpoint security for unenrolled Defender for Endpoint devices

Published Nov 02 2021 08:00 AM 9,244 Views
Microsoft

Today, Microsoft is introducing a unified way to manage security policies in Microsoft Endpoint Manager for unenrolled Windows devices onboarded to Microsoft Defender for Endpoint.

With this new functionality, Windows devices that are not currently managed by Endpoint Manager can still be protected with the security policies traditionally applied to enrolled devices.

Are you using multiple tools to manage your devices?

Consistent endpoint security policy configurations are core to an effective Zero Trust security strategy.

With Microsoft Defender for Endpoint and Endpoint Manager, we've already unified and integrated endpoint security management in a single console. Devices that are managed by Microsoft Endpoint Manager (Either Intune or Configuration Manager) retrieve policy and report status to a single console, simplifying security management.

However, not all devices within the enterprise digital estate may be managed by Endpoint Manager. Managing devices in multiple places adds complexity, slows IT productivity and may add additional overhead.

Unified management for consistent data protection and efficient security operations

We're starting to gradually roll out the public preview of the ability to manage security policies of devices onboarded to Microsoft Defender for Endpoint that are not managed in Endpoint Manager. With Microsoft Defender for Endpoint and Endpoint Manager, you can bring devices that have been traditionally unable to enroll in Endpoint Manager into the same security management control surface as your other managed devices to deploy and monitor your security management policies in a consistent, unified way.

Unified endpoint management includes Defender for Endpoint channelsUnified endpoint management includes Defender for Endpoint channels

This means that organizations don't have to manage these devices with separate tools. This new solution will greatly reduce the scenarios where additional tools are used to manage a device, making it easier to manage your devices from a single place, Microsoft Endpoint Manager. By having a single tool, data protection, compliance and threat reduction are all applied consistently. You'll no longer need to employ an additional security management tool to account for and protect the data on all devices.

Devices with Defender for Endpoint in Endpoint Manager device inventory with other management channelsDevices with Defender for Endpoint in Endpoint Manager device inventory with other management channels

Another benefit is enhanced IT and Security Operations collaboration. By using Microsoft Endpoint Manager as the single control plane and role-based access control (RBAC), the transparency and efficiencies help your organization collaborate and together move closer towards achieving a Zero Trust security model.

Easy set-up based on Microsoft's connected cloud.

To use this new scenario, organizations need to enable security management in both the Microsoft Endpoint Manager and Microsoft Defender for Endpoint consoles. Once enabled, Microsoft's management and security surfaces start working together, automatically determining which devices are onboarded to Microsoft Defender for Endpoint, and whether or not they are also enrolled in Microsoft Endpoint Manager. This new scenario complements existing integrations for conditional access and seamless onboarding scenarios for Microsoft Defender for Endpoint.

Devices that are not enrolled in Microsoft Endpoint Manager will automatically be configured with updated security management policies. There's no longer a need for security operations or IT Administrators to manually change the device state. The device will register with Azure Active Directory, either through existing hybrid processes or directly with Azure for workgroup devices. The device can then use that identity to start communicating with Microsoft Endpoint Manager.

These behind-the-scenes communications enable the device to be targeted to receive security management policies just like any other device. Azure Active Directory groups help to target policies, and the devices with Defender for Endpoint use their group membership to determine which policies are applied.

Learn more

You can find more information about this scenario with this documentation for Endpoint Manager. This week, please join us to find out more about Endpoint Manager at Microsoft Ignite 2021. We're also offering an on-demand technical session to help you learn about security management in Endpoint Manager.

Let us know about your Endpoint Manager experiences through comments on this blog post or reach out to @IntuneSuppTeam on Twitter. Tweet your feedback about Microsoft Endpoint using the hashtag #MEMpowered. If you're interested in ongoing developments on Endpoint Manager, we invite you to follow the Microsoft Endpoint Manager Blog and @MSIntune on Twitter.

 

1 Comment
%3CLINGO-SUB%20id%3D%22lingo-sub-2822656%22%20slang%3D%22en-US%22%3EEndpoint%20security%20for%20unenrolled%20Defender%20for%20Endpoint%20devices%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2822656%22%20slang%3D%22en-US%22%3E%3CP%20style%3D%22margin-top%3A%2020px%3B%22%3EToday%2C%20Microsoft%20is%20introducing%20a%20unified%20way%20to%20manage%20security%20policies%20in%20Microsoft%20Endpoint%20Manager%20for%20unenrolled%20Windows%20devices%20onboarded%20to%20Microsoft%20Defender%20for%20Endpoint.%3C%2FP%3E%0A%3CP%20style%3D%22margin-top%3A%2020px%3B%22%3EWith%20this%20new%20functionality%2C%20Windows%20devices%20that%20are%20not%20currently%20managed%20by%20Endpoint%20Manager%20can%20still%20be%20protected%20with%20the%20%3CA%20href%3D%22https%3A%2F%2Faka.ms%2FSecurityManagement%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Esecurity%20policies%20traditionally%20applied%20to%20enrolled%20devices%3C%2FA%3E.%3C%2FP%3E%0A%3CH2%20style%3D%22margin-top%3A%2036px%3B%20margin-bottom%3A%2020px%3B%20font-family%3A%20'Segoe%20UI'%2C%20Segoe%2C%20Tahoma%2C%20Geneva%2C%20sans-serif%3B%20font-weight%3A%20600%3B%20font-size%3A%2020px%3B%20color%3A%20%23333333%3B%22%20id%3D%22toc-hId--326646095%22%20id%3D%22toc-hId--325511996%22%20id%3D%22toc-hId--325511996%22%20id%3D%22toc-hId--325511996%22%3EAre%20you%20using%20multiple%20tools%20to%20manage%20your%20devices%3F%3C%2FH2%3E%0A%3CP%20style%3D%22margin-top%3A%2020px%3B%22%3EConsistent%20endpoint%20security%20policy%20configurations%20are%20core%20to%20an%20effective%20Zero%20Trust%20security%20strategy.%3C%2FP%3E%0A%3CP%20style%3D%22margin-top%3A%2020px%3B%22%3EWith%20Microsoft%20Defender%20for%20Endpoint%20and%20Endpoint%20Manager%2C%20we've%20already%20unified%20and%20integrated%20endpoint%20security%20management%20in%20a%20single%20console.%20Devices%20that%20are%20managed%20by%20Microsoft%20Endpoint%20Manager%20(Either%20Intune%20or%20Configuration%20Manager)%20retrieve%20policy%20and%20report%20status%20to%20a%20single%20console%2C%20simplifying%20security%20management.%3C%2FP%3E%0A%3CP%20style%3D%22margin-top%3A%2020px%3B%22%3EHowever%2C%20not%20all%20devices%20within%20the%20enterprise%20digital%20estate%20may%20be%20managed%20by%20Endpoint%20Manager.%20Managing%20devices%20in%20multiple%20places%20adds%20complexity%2C%20slows%20IT%20productivity%20and%20may%20add%20additional%20overhead.%3C%2FP%3E%0A%3CH2%20style%3D%22margin-top%3A%2036px%3B%20margin-bottom%3A%2020px%3B%20font-family%3A%20'Segoe%20UI'%2C%20Segoe%2C%20Tahoma%2C%20Geneva%2C%20sans-serif%3B%20font-weight%3A%20600%3B%20font-size%3A%2020px%3B%20color%3A%20%23333333%3B%22%20id%3D%22toc-hId--2134100558%22%20id%3D%22toc-hId--2132966459%22%20id%3D%22toc-hId--2132966459%22%20id%3D%22toc-hId--2132966459%22%3EUnified%20management%20for%20consistent%20data%20protection%20and%20efficient%20security%20operations%3C%2FH2%3E%0A%3CP%20style%3D%22margin-top%3A%2020px%3B%22%3EWe're%20starting%20to%20gradually%20roll%20out%20the%20public%20preview%20of%20the%20ability%20to%20manage%20security%20policies%20of%20devices%20onboarded%20to%20Microsoft%20Defender%20for%20Endpoint%20that%20are%20not%20managed%20in%20Endpoint%20Manager.%20With%20Microsoft%20Defender%20for%20Endpoint%20and%20Endpoint%20Manager%2C%20you%20can%20bring%20devices%20that%20have%20been%20traditionally%20unable%20to%20enroll%20in%20Endpoint%20Manager%20into%20the%20same%20security%20management%20control%20surface%20as%20your%20other%20managed%20devices%20to%20deploy%20and%20monitor%20your%20security%20management%20policies%20in%20a%20consistent%2C%20unified%20way.%3C%2FP%3E%0A%3CP%20style%3D%22margin-top%3A%2020px%3B%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Diagram%20showing%20how%20Microsoft%20Endpoint%20Manager%20enables%20unified%20endpoint%20management%2C%20including%20Defender%20for%20Endpoint%20channels%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F322348i48483BE0093D3BCF%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22MEM%20schematic%20with%20MDE%20Channels.png%22%20alt%3D%22Unified%20endpoint%20management%20includes%20Defender%20for%20Endpoint%20channels%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3EUnified%20endpoint%20management%20includes%20Defender%20for%20Endpoint%20channels%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%20style%3D%22margin-top%3A%2020px%3B%22%3EThis%20means%20that%20organizations%20don't%20have%20to%20manage%20these%20devices%20with%20separate%20tools.%20This%20new%20solution%20will%20greatly%20reduce%20the%20scenarios%20where%20additional%20tools%20are%20used%20to%20manage%20a%20device%2C%20making%20it%20easier%20to%20manage%20your%20devices%20from%20a%20single%20place%2C%20Microsoft%20Endpoint%20Manager.%20By%20having%20a%20single%20tool%2C%20data%20protection%2C%20compliance%20and%20threat%20reduction%20are%20all%20applied%20consistently.%20You'll%20no%20longer%20need%20to%20employ%20an%20additional%20security%20management%20tool%20to%20account%20for%20and%20protect%20the%20data%20on%20all%20devices.%3C%2FP%3E%0A%3CP%20style%3D%22margin-top%3A%2020px%3B%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Screenshot%20of%20the%20Microsoft%20Endpoint%20Manager%20admin%20center%20showing%20an%20inventory%20of%20devices%20with%20Defender%20for%20Endpoint%20and%20information%20on%20how%20they%20are%20managed.%22%20style%3D%22width%3A%20602px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F322349i35B82CD86E82940A%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22MDE%20attach%20schreenshot.png%22%20alt%3D%22Devices%20with%20Defender%20for%20Endpoint%20in%20Endpoint%20Manager%20device%20inventory%20with%20other%20management%20channels%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3EDevices%20with%20Defender%20for%20Endpoint%20in%20Endpoint%20Manager%20device%20inventory%20with%20other%20management%20channels%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%20style%3D%22margin-top%3A%2020px%3B%22%3EAnother%20benefit%20is%20enhanced%20IT%20and%20Security%20Operations%20collaboration.%20By%20using%20Microsoft%20Endpoint%20Manager%20as%20the%20single%20control%20plane%20and%20role-based%20access%20control%20(RBAC)%2C%20the%20transparency%20and%20efficiencies%20help%20your%20organization%20collaborate%20and%20together%20move%20closer%20towards%20achieving%20a%20Zero%20Trust%20security%20model.%3C%2FP%3E%0A%3CH2%20style%3D%22margin-top%3A%2036px%3B%20margin-bottom%3A%2020px%3B%20font-family%3A%20'Segoe%20UI'%2C%20Segoe%2C%20Tahoma%2C%20Geneva%2C%20sans-serif%3B%20font-weight%3A%20600%3B%20font-size%3A%2020px%3B%20color%3A%20%23333333%3B%22%20id%3D%22toc-hId-353412275%22%20id%3D%22toc-hId-354546374%22%20id%3D%22toc-hId-354546374%22%20id%3D%22toc-hId-354546374%22%3EEasy%20set-up%20based%20on%20Microsoft's%20connected%20cloud.%3C%2FH2%3E%0A%3CP%20style%3D%22margin-top%3A%2020px%3B%22%3ETo%20use%20this%20new%20scenario%2C%20organizations%20need%20to%20enable%20security%20management%20in%20both%20the%20Microsoft%20Endpoint%20Manager%20and%20Microsoft%20Defender%20for%20Endpoint%20consoles.%20Once%20enabled%2C%20Microsoft's%20management%20and%20security%20surfaces%20start%20working%20together%2C%20automatically%20determining%20which%20devices%20are%20onboarded%20to%20Microsoft%20Defender%20for%20Endpoint%2C%20and%20whether%20or%20not%20they%20are%20also%20enrolled%20in%20Microsoft%20Endpoint%20Manager.%20This%20new%20scenario%20complements%20existing%20integrations%20for%20conditional%20access%20and%20seamless%20onboarding%20scenarios%20for%20Microsoft%20Defender%20for%20Endpoint.%3C%2FP%3E%0A%3CP%20style%3D%22margin-top%3A%2020px%3B%22%3EDevices%20that%20are%20not%20enrolled%20in%20Microsoft%20Endpoint%20Manager%20will%20automatically%20be%20configured%20with%20updated%20security%20management%20policies.%20There's%20no%20longer%20a%20need%20for%20security%20operations%20or%20IT%20Administrators%20to%20manually%20change%20the%20device%20state.%20The%20device%20will%20register%20with%20Azure%20Active%20Directory%2C%20either%20through%20existing%20hybrid%20processes%20or%20directly%20with%20Azure%20for%20workgroup%20devices.%20The%20device%20can%20then%20use%20that%20identity%20to%20start%20communicating%20with%20Microsoft%20Endpoint%20Manager.%3C%2FP%3E%0A%3CP%20style%3D%22margin-top%3A%2020px%3B%22%3EThese%20behind-the-scenes%20communications%20enable%20the%20device%20to%20be%20targeted%20to%20receive%20security%20management%20policies%20just%20like%20any%20other%20device.%20Azure%20Active%20Directory%20groups%20help%20to%20target%20policies%2C%20and%20the%20devices%20with%20Defender%20for%20Endpoint%20use%20their%20group%20membership%20to%20determine%20which%20policies%20are%20applied.%3C%2FP%3E%0A%3CH2%20style%3D%22margin-top%3A%2036px%3B%20margin-bottom%3A%2020px%3B%20font-family%3A%20'Segoe%20UI'%2C%20Segoe%2C%20Tahoma%2C%20Geneva%2C%20sans-serif%3B%20font-weight%3A%20600%3B%20font-size%3A%2020px%3B%20color%3A%20%23333333%3B%22%20id%3D%22toc-hId--1454042188%22%20id%3D%22toc-hId--1452908089%22%20id%3D%22toc-hId--1452908089%22%20id%3D%22toc-hId--1452908089%22%3ELearn%20more%3C%2FH2%3E%0A%3CP%20style%3D%22margin-top%3A%2020px%3B%22%3EYou%20can%20find%20more%20information%20about%20this%20scenario%20with%20%3CA%20href%3D%22https%3A%2F%2Faka.ms%2Fsecuritymanagement%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ethis%20documentation%20for%20Endpoint%20Manager%3C%2FA%3E.%20This%20week%2C%20please%20join%20us%20to%20find%20out%20more%20about%20%3CA%20href%3D%22https%3A%2F%2Faka.ms%2FMEMatIgnite%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EEndpoint%20Manager%20at%20Microsoft%20Ignite%202021%3C%2FA%3E.%20We're%20also%20offering%20an%20%3CA%20href%3D%22https%3A%2F%2Faka.ms%2FEndpoint-security-mgmt%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%22%3Eon-demand%20technical%20session%3C%2FA%3E%20to%20help%20you%20learn%20about%20security%20management%20in%20Endpoint%20Manager.%3C%2FP%3E%0A%3CP%20style%3D%22margin-top%3A%2020px%3B%22%3ELet%20us%20know%20about%20your%20Endpoint%20Manager%20experiences%20through%20comments%20on%20this%20blog%20post%20or%20reach%20out%20to%20%3CA%20href%3D%22https%3A%2F%2Faka.ms%2FIntuneSuppTeam%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3E%40IntuneSuppTeam%3C%2FA%3E%20on%20Twitter.%20Tweet%20your%20feedback%20about%20Microsoft%20Endpoint%20using%20the%20hashtag%20%23MEMpowered.%20If%20you're%20interested%20in%20ongoing%20developments%20on%20Endpoint%20Manager%2C%20we%20invite%20you%20to%20follow%20the%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-endpoint-manager-blog%2Fbg-p%2FMicrosoftEndpointManagerBlog%22%20target%3D%22_blank%22%3EMicrosoft%20Endpoint%20Manager%20Blog%3C%2FA%3E%20and%20%3CA%20href%3D%22https%3A%2F%2Ftwitter.com%2Fmsintune%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3E%40MSIntune%3C%2FA%3E%20on%20Twitter.%3C%2FP%3E%0A%3CP%20style%3D%22margin-top%3A%2020px%3B%22%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-2822656%22%20slang%3D%22en-US%22%3E%3CP%3EManage%20devices%20centrally%20in%20Microsoft%20Endpoint%20Manager%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Photo%20of%20a%20woman%20sitting%20on%20the%20stairs%20holding%20and%20looking%20at%20a%20tablet%20device%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F322406i324998BD7BB73D80%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22CLO17_corporateOffice_004.jpg%22%20alt%3D%22CLO17_corporateOffice_004.jpg%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-2822656%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EMicrosoft%20Endpoint%20Manager%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EMicrosoft%20Intune%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2917898%22%20slang%3D%22en-US%22%3ERe%3A%20Endpoint%20security%20for%20unenrolled%20Defender%20for%20Endpoint%20devices%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2917898%22%20slang%3D%22en-US%22%3E%3CP%3ELooks%20promising%2C%20it%20would%20allow%20to%20get%20ride%20of%20GPO%20for%20servers%20and%20have%20unified%20configuration%20even%20for%20non%20AD%20joined%20devices.%3C%2FP%3E%3CP%3EI%20hope%20we%20will%20be%20able%20to%20test%20it%20soon.%3C%2FP%3E%3C%2FLINGO-BODY%3E
Co-Authors
Version history
Last update:
‎Nov 02 2021 06:50 AM
Updated by: