Career upgrade: Learn practical AI skills for better jobs and higher pay.
Level up

6.2 Defender for Endpoint Integration and Onboarding

Key Takeaways

  • Defender for Endpoint integration starts with a service-to-service connector between Intune and Microsoft Defender for Endpoint; device onboarding is a separate step.
  • Onboarding configures devices to communicate with Defender for Endpoint and send security telemetry that supports detection, investigation, response, and risk reporting.
  • Risk-based access control requires three links: Defender for Endpoint reports machine risk, Intune compliance evaluates that risk, and Conditional Access requires compliant devices.
  • Endpoint detection and response policies are the Intune endpoint security policy type used for Defender for Endpoint onboarding and EDR configuration.
  • Security tasks and Defender response actions support operational follow-through after onboarding, but they do not replace compliance and Conditional Access design.
Last updated: May 2026

The integration chain

Microsoft Defender for Endpoint is not just another app assignment. In MD-102 scenarios, Defender for Endpoint usually matters because its risk signal can flow into Intune compliance and then into Microsoft Entra Conditional Access.

The complete chain is: connect Intune to Defender for Endpoint, onboard devices, evaluate risk in a compliance policy, and enforce the compliant-device result with Conditional Access. Missing any link leaves a gap. A device can be enrolled in Intune but not onboarded to Defender. A device can be onboarded to Defender but still not affect access if no compliance policy evaluates the Defender risk level.

Integration workflow

StepConfigurationResultExam trap
1Enable the Microsoft Defender for Endpoint connector in IntuneIntune and Defender establish service-to-service communicationAssuming device enrollment alone creates Defender telemetry
2Deploy endpoint detection and response onboarding policyDevices receive onboarding configuration and report to Defender for EndpointConfusing onboarding with installing Company Portal
3Configure device compliance to use Defender machine riskIntune can mark devices noncompliant when risk exceeds the allowed levelOnboarding devices but not using risk in compliance
4Configure Conditional Access to require compliant devicesMicrosoft 365 access can be blocked when risk makes the device noncompliantCreating compliance without access enforcement
5Monitor onboarding, device risk, and remediationAdmins can verify coverage and act on findingsTreating assignment status as proof of protection

Onboarding facts to remember

Onboarding is the action that makes a device communicate with the Defender for Endpoint service. For Windows devices managed by Intune, this commonly uses an endpoint security Endpoint detection and response profile. The onboarding package contains tenant-specific configuration so the device knows which Defender for Endpoint tenant to report to.

Onboarding is separate from these related controls:

  • Microsoft Defender Antivirus policy configures AV behavior. It is not the same as EDR onboarding.
  • Security baseline deploys recommended settings. It can improve posture but does not automatically complete the full risk-to-access chain.
  • Compliance policy evaluates state and risk. It does not install the EDR sensor by itself.
  • Conditional Access enforces access decisions. It consumes compliance, not raw Intune assignment status.

Risk, compliance, and response

The exam likes cause-and-effect scenarios. If Defender for Endpoint reports a device as high risk, Intune can mark the device noncompliant when compliance policy includes the machine risk rule. Microsoft Entra Conditional Access can then block access to resources that require a compliant device.

For incident response, Defender for Endpoint actions such as device isolation help contain a compromised device while investigation continues. For remediation coordination, security tasks can turn Defender vulnerability findings into work that Intune admins can act on. Those features are operational follow-through; the access-control design still depends on compliance and Conditional Access.

What to monitor

Monitor more than whether the policy is assigned. Check onboarding status, devices missing Defender telemetry, compliance state, Defender risk level, security tasks, and Conditional Access outcomes. A common failure pattern is "Defender is onboarded, but access is not blocked" because the compliance policy never references Defender risk or Conditional Access does not require compliance.

Test Your Knowledge

A Windows device is enrolled in Intune and onboarded to Defender for Endpoint, but high device risk does not block Exchange Online access. What is the most likely missing configuration?

A
B
C
D
Test Your KnowledgeMulti-Select

Which items are part of a complete Defender for Endpoint risk-based access design? Select all that apply.

Select all that apply

Enable the Intune and Defender for Endpoint connector.
Onboard devices to Defender for Endpoint.
Use Defender device risk in an Intune compliance policy.
Require a compliant device in Conditional Access.
Create only a feature updates policy.
Test Your Knowledge

A security analyst suspects ransomware activity on a Defender for Endpoint onboarded Windows device and wants to cut off most network communication while preserving investigation capability. Which action best fits?

A
B
C
D