

- #Microsoft enable security defaults update
- #Microsoft enable security defaults registration
- #Microsoft enable security defaults windows
If policies were assigned to devices that had previous enrollment errors, then policies will apply as these devices start to onboard via the updated infrastructure. The device should appear here as well, with the Managed by field set to MDE.Ī screenshot of the device page in the Intune admin center with the Managed by status of the device highlighted. In the Intune admin center, search for the device name on the All Devices page. What to expect in the Microsoft Intune admin center If the MDE Enrollment status is not “Success,” make sure you’re looking at a device that was updated and is in scope for settings management (based on how you configured the feature in the 'enforcement scope’ page). On the device side panel or device page, you can also confirm it’s successfully enrolled by checking the MDE Enrollment status is Success.Ī screenshot of a device’s MDE Enrollment status on the device page in the Microsoft 365 Defender portal. This is also available on the device side panel or device page and should consistently indicate managed by MDE. In the Microsoft 365 Defender device inventory, you can confirm that the device is using the security settings management capability in Defender for Endpoint by checking its status in the Managed by column. What to expect in the Microsoft 365 Defender portal With the new release, these will begin to successfully enroll. Since these devices are still not fully registered, they’ll show the device attributes where MDM = Intune and Join Type = Blank. To filter for devices that were previously unable to enroll in Defender for Endpoint due to not meeting the Azure AD join or Hybrid Azure AD join pre-requisite, navigate to the Microsoft 365 Defender portal > Devices list and filter by enrollment status. Note that while the device won’t be fully registered with Azure AD it'll still count as one device object. Once enrolled, the device will appear in the device lists for Microsoft 365 Defender, Microsoft Intune, and Azure AD portals.
#Microsoft enable security defaults windows
Important: If a Windows device was managed by Defender for Endpoint via security settings management for Defender for Endpoint but was unable to enroll due to not being Azure AD joined or Hybrid Azure AD joined, these devices will now succeed enrollment and policies targeted to the device will apply. Any new devices enrolled into security settings management for Defender for Endpoint will use the updated infrastructure.
#Microsoft enable security defaults registration
Additionally, there will be no changes to the device, its identity, or registration type.

Endpoint security policies will continue to apply as expected. Ensure your Windows device is up to date to take advantage of these enhancements.Ĭustomers already using this functionality will seamlessly transition to the updated infrastructure with no impact for their existing Windows devices managed by Defender for Endpoint that are using this functionality. To opt in, go to the Microsoft Defender for Endpoint portal, and select Settings > Endpoints > Advanced features > Preview features. Customers that don’t use public preview features will continue with the existing settings management experience.
#Microsoft enable security defaults update
This update applies to customers that are opted into public preview functionality for Defender for Endpoint. To learn more about this capability, see Manage Microsoft Defender for Endpoint on devices with Microsoft Intune. The updates include remov ing Azure Active Directory (AD) join or Hybrid Azure AD join as a pre-requisite for onboarding Windows devices that use security settings management in Defender for Endpoint. In early July, w e ' ll be making architectural updates to the security settings management capabilities in Microsoft Defender for Endpoint that simplify the device enrollment process.
