How to Protect Your Endpoints with Microsoft Intune

Published:16 May 2023 - 6 min. read

Need to simplify your device management, increase security, and streamline IT operations? With the sudden spike in remote work policies, IT admins faced a significant challenge in managing devices that used to stay on-premise. Fear not, and let Microsoft Intune deal with the obstacles!

With Microsoft Intune, you can manage your organization’s mobile devices, PCs, and apps from a single platform in the cloud. And in this tutorial, you will learn how to set up Microsoft Intune and how it works with policies for increased security.

Read on and start protecting your endpoints with Microsoft Intune!

Prerequisites

This tutorial comprises hands-on demonstrations. To follow along, there are a few things you need as follows:

Setting Up and Configuring Microsoft Intune

Microsoft Intune needs some settings and customizations to fit an organization’s needs as a cloud-based solution platform for managing devices. You must assign user licenses and onboard devices.

Each Azure AD user who needs to use Intune requires a license, and you can use either the Microsoft Intune admin center or the Azure Portal. But in this example, you will assign a user license via the Microsoft Intune admin center.

To assign a user license, follow these steps:

1. Open your favorite web browser, and log in to the Microsoft Intune admin center.

2. Once logged in, navigate to Users (left navigate pane) → All Users → and select a user (i.e., Test), as shown below, to access the user information page.

Accessing a user’s information page
Accessing a user’s information page

3. Next, navigate to Licenses, and click Assignments to see the list of available licenses you can assign to the selected user.

Accessing the list of available licenses
Accessing the list of available licenses

4. Now, select the license you got, for example, Microsoft 365 E5 and Microsoft Intune Plan 1, as the license option, then click on Save.

Alternatively, using Azure AD, you can use Azure Portal to assign Intune licenses to users.

The user account now has permission to use Intune and enroll devices into management.

Selecting user licenses
Selecting user licenses

You can set up dynamic groups and assign licenses based on device attributes and user roles. This setup automates the provisioning and de-provisioning of licenses and policies based on changing conditions.

Enabling Automatic Device Enrollment

While devices do not appear at risk on the surface, ensuring risks are mitigated is crucial, which is where Microsoft Endpoint Protection comes in handy. The good news is that Azure AD-joined devices are automatically joined to Microsoft Endpoint Protection if Auto-Enrollment is enabled.

To enable Auto-Enrollment, follow these steps:

Navigate to Azure Active DirectoryMobility (MDM and MAM)Microsoft Intune. This opens up the Microsoft Intune enrollment setting page.

Accessing the Microsoft Intune enrollment setting page
Accessing the Microsoft Intune enrollment setting page

Enable auto-enrollment for All devices, as shown below, so that new Azure AD-joined devices are automatically enrolled to Microsoft Endpoint Protection.

By enrolling your devices into Microsoft Intune, you can enforce security policies, manage device configurations, and deploy applications to your users.

Note that you can select Some to test the auto-enrollment on some devices and see the impact before going full blast on all devices.

Enabling auto-enrollment
Enabling auto-enrollment

You can also enforce mobile application management (MAM) policies on apps to protect app data and control app features. Doing so prevents data leakage and unauthorized access to your apps.

Configuring Device Policies

More than joining your devices to Microsoft Endpoint Protection is required to protect your endpoints; configuration policies play a big part too. In this example, you will configure Antivirus settings, but you can configure as much configuration as you wish.

In Intune, you can push configurations to a device using configuration policies that allow you to configure a wide range of settings. These settings include but are not limited to security settings, device features, network settings, and app settings.

To create a device policy, follow the steps below:

1. On the Microsoft Intune admin center, navigate to Devices (left navigation pane) → Configuration profiles, and click Create profile to initiate creating a device profile.

A panel on the right side of your browser appears, where you can configure the device profile (step two).

Creating a device profile
Creating a device profile

2. Configure the device profile with the following:

  • Platform – Select the OS to which you wish to target the policy, which in this case, Windows 10 and later.
  • Profile type – select Templates, and a list of default templates appears below.
  • Search for and select Device restrictions.

Once configured, click Create to finalize creating the device profile.

Use security baselines to deploy best practice security configurations for devices and applications. This way, you can apply a consistent and recommended level of security across your devices and apps.

Configuring a new device profile
Configuring a new device profile

3. Name the new policy (i.e., My Org Windows Defender Settings), and click Next.

Naming the new policy
Naming the new policy

4. Now, expand Microsoft Defender Antivirus, Enable the Real-time monitoring option, as shown below, and click Next.

The policies shown below are all related to the device restrictions template. And enabling Real-time monitoring activates Windows Defender and sets it to monitor and protect the computer.

Enabling real-time monitoring
Enabling real-time monitoring

5. Under the Assignments settings, click Add all devices to include all devices as a group in the policy and click Next.

But if you are unwilling to apply this policy to all devices, click Add Groups and add a particular group that contains the users you want to target the policy to.

Use Azure AD groups to manage access and assign policies to devices. This way, you can easily control who can access your resources and what they can do with them.

Adding custom groups for the user scope
Adding custom groups for the user scope

6. In the Application Rules settings, leave the fields empty, and click Next.

Perhaps you added all devices in the Assignments tab but still need to apply the policy to Windows 11 devices only. In that case, you can set a rule to which OS the policy applies on this page.

Skipping adding applicability rules
Skipping adding applicability rules

7. Lastly, review the summary of your selected settings, and click Create to finalize creating the policy.

Excellent! You have configured an Intune policy to enable Windows Defender in your organization. This policy ensures your devices are protected against viruses and malware.

But still, regularly monitoring and updating your Intune policies ensure your devices are up-to-date and secure.

Creating the new device policy
Creating the new device policy

Configuring Compliance Policies

You now have a device configured with a policy for an antivirus to be enabled, which adds a layer of security. But what if the policy failed to enable the antivirus for some reason? One reason is that the antivirus configured in the policy could conflict with another outdated antivirus.

But the good news is that compliance policies in Intune allow you to monitor and manage device compliance. These policies ensure that only compliant devices can access your organization’s resources.

To create a compliance policy in the Microsoft Intune admin center, follow these steps:

1. Navigate to Devices (left navigation panel) → Compliance policies, redirecting your browser to a page where you can manage compliance policies.

Accessing the Compliance policies page
Accessing the Compliance policies page

2. In the Compliance policies page, click Create policy to initiate creating a new policy.

Initiating creating a new compliance policy
Initiating creating a new compliance policy

3. Next, select the Windows 10 and later platform, and click Create to continue configuring the policy.

Choosing a platform for the new policy
Choosing a platform for the new policy

4. Name the new policy (i.e., My Org Compliance Policy), **and click Next.

Naming the new compliance policy
Naming the new compliance policy

5. Now, expand System Security, select the Require option for the following compliance settings, and click Next.

Compliance SettingsDetails
Microsoft Defender AntimalwareChecks if Windows Defender is enabled in the system or not.
Real-time protectionChecks and confirms that Real-Time scanning is also enabled in Windows Defender.
Configuring the System Security
Configuring the System Security

Compliance policies also allow you to set up rules and requirements for devices, such as requiring encryption, a minimum version of the OS, and specific security settings.

6. Click Next to skip specifying actions for noncompliance for now.

But when necessary, this page lets you choose an action to set for devices that do not match the compliance policy.

If a device is non-compliant, Intune can try to remediate it. Intune can also set the status of the device as non-compliant. As a result, conditional access can take action and block the device from accessing the organization’s resources.

Skipping configuring actions for noncompliance
Skipping configuring actions for noncompliance

7. Set the Assignments as you did with the device compliance, and click Next.

Adding devices to include in the policy
Adding devices to include in the policy

8. Finally, review the policy configuration’s summary, and click Create to finalize creating the compliance policy.

Finalizing creating the new compliance policy
Finalizing creating the new compliance policy

Conclusion

Microsoft Intune is essential for effective device management and security in any organization. And in this tutorial, you have learned to set up and configure Microsoft Intune to protect your endpoints with Microsoft Intune by configuring policies.

At this point, you can confidently ensure your organization’s devices and data are secure, and users can work productively from anywhere.

Now, why not dive deeper into Microsoft Intune fundamentals? Continue the journey, and minimize the risk of data breaches and unauthorized access to your organization’s resources!

Hate ads? Want to support the writer? Get many of our tutorials packaged as an ATA Guidebook.

Explore ATA Guidebooks

Looks like you're offline!