Determine Onboarding Methods in Defender for Endpoint - Part 1
edgarus71 details approaches for onboarding devices to Defender for Endpoint, distinguishing between methods like Intune, GPO, and MCM, and providing troubleshooting advice.
Summary
In this article, edgarus71 provides a comprehensive overview of the methods available for onboarding Windows devices into Microsoft Defender for Endpoint. The author discusses the practical distinctions between onboarding via Local Script, Group Policy Objects (GPO), Microsoft Configuration Manager (MCM), and Mobile Device Management (MDM) tools such as Microsoft Intune. The importance of determining and tracking which method was used—primarily for troubleshooting and streamlining large deployments—is emphasized throughout the article.
Onboarding Methods
- Local Script: Useful for small-scale or PoC deployments. Presents a license prompt on the device, making it unsuitable for large-scale automation.
- Group Policy (GPO): Designed for on-premises environments; avoids the license prompt and is more scalable for domain-joined devices.
- Microsoft Configuration Manager (MCM): Preferred in organizations with established device management via MCM, especially for servers and complex, automated environments.
- MDM/Intune: Ideal for modern device management, enabling simple, policy-driven, bulk onboarding for client devices, but not Windows Server.
- VDI Scripts: Mentioned but not discussed in this part.
Why Track the Onboarding Method?
Tracking the onboarding method is valuable for:
- Easing future deployments and migrations.
- Gaining visibility into the types of managed devices and associated platforms.
- Improving troubleshooting by narrowing focus on the platform and potential conflicting policies.
Where to Find Method Indicators
The article provides practical guidance on identifying onboarding methods:
- Intune: Presence of the
MdmSubscriberIds
registry key atHKLM\SOFTWARE\Microsoft\Windows Defender
. - Local Script: Look for the
latency
key (value ‘demo’) atHKLM\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection
. - MCM: Checks for the existence of
C:\Windows\CCM\Logs\EndpointProtectionAgent.log
. - GPO: OnboardingState at
HKLM\SOFTWARE\Microsoft\Windows Advanced Threat Protection\Status
should be 1, latency key absent at the relevant location.
Co-management Scenarios
For Windows clients managed by both Intune and MCM (co-management), both indicators may appear: the Intune registry key, and the presence of MCM log files. Conflicting or overlapping indicators are detailed, stressing the need to carefully evaluate which platform handled onboarding versus ongoing management.
Troubleshooting Considerations
- Each method leaves specific traces, such as registry keys or log files, but overlaps can occur—especially if management responsibilities are split or have shifted over time.
- PowerShell and automation can be used for discovery at scale, which will be explored in a follow-up article.
- The article also lists tips and official resources for further troubleshooting onboarding issues.
Key Takeaways
- Distinguishing onboarding methods is crucial for diagnosing device registration issues within Defender for Endpoint.
- Each onboarding route is recommended for certain environments or scenarios.
- Careful tracking, leveraging system indicators, simplifies troubleshooting and supports effective device management.
References & Further Reading
- Log file reference for MCM
- MDMDiagReport_RegistryDump.reg review
- Onboard devices in Defender for Endpoint using a GPO
- Onboard devices using Microsoft Intune
- Troubleshooting Defender for Endpoint onboarding
This post appeared first on “Microsoft Tech Community”. Read the entire article here