Microsoft Defender for Endpoint (MDE) is Microsoft's enterprise EDR platform - it sits on top of Windows Defender Antivirus and adds threat detection, investigation, and response capabilities across your entire device estate. If you're on Microsoft 365 Business Premium or any of the E3/E5 plans, you already have the licence. The question is just whether you've turned it on.
Intune is the right deployment method for cloud-managed environments. Devices start reporting to the Defender portal within a few hours of the policy syncing.
Prerequisites and Licensing
📋 Before You StartBefore creating any policy, confirm you have the right licence and that your devices are in scope. MDE is included in the following plans:
- Microsoft 365 Business Premium - includes MDE Plan 1
- Microsoft 365 E3 - includes MDE Plan 1
- Microsoft 365 E5 / Defender for Endpoint Plan 2 - full EDR, threat hunting, and auto-investigation
- Microsoft Defender for Business - standalone SMB-focused plan
You'll also need devices that are:
- Running Windows 10 1709 or later (Windows 11 fully supported)
- Enrolled in Intune (Entra ID joined or Hybrid joined)
- Not already onboarded to MDE via another method (SCCM, GPO, script)
Connect Intune to MDE
🔗 Integration SetupThe first step is enabling the connector between Intune and the Defender portal. This is a one-time tenant-level setting.
On this page you'll see the connection status between Intune and the Defender portal. Click Open the Microsoft Defender for Endpoint admin console - this takes you to security.microsoft.com. Once in the Defender portal:
-
1Open Settings in Defender PortalGo to Settings → Endpoints → Advanced Features in the Microsoft Defender portal (security.microsoft.com).
-
2Enable Microsoft Intune ConnectionFind Microsoft Intune connection in the list and toggle it to On. Click Save preferences at the bottom of the page.
-
3Return to Intune and RefreshGo back to the Intune Admin Centre. The connection status should now show Enabled. This may take a minute or two to update.
Create the Onboarding Policy
📋 Policy CreationWith the connector active, create the onboarding configuration profile in Intune. This is what actually deploys the MDE sensor to your devices.
Select the following when prompted:
- Platform: Windows 10, Windows 11, and Windows Server
- Profile: Endpoint Detection and Response
Give the policy a clear name - something like CORP-MDE-Onboarding. On the configuration page you'll see the key settings below.
Configure Security Settings
⚙️ ConfigurationAttack Surface Reduction Rules
ASR rules are worth deploying alongside the onboarding policy. They block common attack vectors - Office macro abuse, credential theft, malicious script execution. Create a separate policy under:
Assign and Verify
✅ VerificationAssign the onboarding policy to your target device group. For most environments this will be all Windows devices or a specific corporate device group. Click Review + Create to save and deploy.
Once synced, devices will appear in the Defender portal within a few hours of the policy applying. You can verify onboarding status from two places:
From the Defender Portal
Onboarded devices appear here with their onboarding status, risk level, and last seen timestamp. A device showing Active status with a recent check-in time is successfully onboarded.
From Intune
This page shows a count of devices onboarded to MDE vs total enrolled Intune devices. Aim to get this as close to 100% as possible.