top of page

Managing Windows Server Defender policies with Intune

  • Writer: Vlad Johansen
    Vlad Johansen
  • 5 hours ago
  • 5 min read

Hello folks,


I haven’t written blog posts for a while, so it’s about time now. Today’s blog post will be about managing Defender policies on Azure hosted Windows Servers using Intune. If you are already using Microsoft Intune as an endpoint management tool and have servers in Azure, then this blog post should be interesting for you.


Actually, this approach has existed for 2+years now. I have tested it on two of my Windows Servers hosted in Azure - and it works great.


Let’s start with licensing, as always.


You’ll need at least one Defender for Endpoint or Defender for Business license to activate this feature, and of course you’ll need:


  • Defender for Business for Servers, or

  • Defender for Endpoint for Servers, or

  • Defender for Servers P1 or P2 licenses on your server(s).


Only this Windows OS versions and scenarios are supported




Unsupported versions and scenarios


  • Windows Server Core 2016 and earlier

  • Non-persistent desktops, like Virtual Desktop Infrastructure (VDI) clients

  • Azure Virtual Desktop (AVD and formerly Windows Virtual Desktop, WVD)

  • 32-bit versions of Windows



In today’s demo, I’ll use my Windows Server 2022 with Defender for Servers P2, which is active on my Azure subscription.


First, we need to activate some features in the Defender portal and the Intune portal. Let’s start with the Defender portal:


Go to security.microsoft.com -> Settings -> Endpoints -> Configuration Management -> Enforcement Scope and enable the platforms for security settings management.


ree

Now, we'll need to choose which OS security settings we want to be able to manage from Intune under Enable configuration management. Choose between "On all devices" or "On tagged devices". If you go for method number 2 you'll need to tag them with "MDE-Management" tag.


ree

I choose to manage all OS on All devices


Important message regarding Domain controllers

ree


Now, turn ON "Security settings management for Microsoft Defender for Cloud onboarded devices" and press Save


ree

Now, let's go to Intune portal


Go to intune.microsott.com -> Endpoint Security -> Microsott Defender for Endpoint -> and set Allow Microsoft Defender for Endpoint to enforce Endpoint Security Configurations to On if it's not already ON.


ree

Now, if you have Windows Server devices onboarded to MDE directly or via Defender for Servers, they should start to appear in the Intune portal under Windows devices. Please allow up to 24 hours for this process. In my case, it took around an hour.


In the meantime, let’s create dynamic groups. I have already created mine for Windows Servers in MDE.


ree


You can also choose to create separate groups for each OS version—for example, one for 2016, one for 2019, one for 2022, and so on. Then, you’ll need to add an expression like DeviceOSVersion equals 10.0.20348, which corresponds to Windows Server 2022.


Here is a table showing all most used versions


Windows Server Version

OS Build

device.deviceOSVersion Value

Windows Server 2016

10.0.14393

10.0.14393

Windows Server 2019

10.0.17763

10.0.17763

Windows Server 2022

10.0.20348

10.0.20348

Windows Server 2025 (preview)

10.0.26100

10.0.26100


Now, let's check intune.microsoft.com -> Devices -> Windows


As you can see, here are my two Windows Server 2022 devices from Azure, and they show Managed by: MDE instead of Intune. This means the devices are not enrolled in Intune like Windows 10 or 11 devices can be. They are only onboarded to Defender and synchronized to Intune. With other words they are managed by Defender. But since we can push Defender policies from Intune as well and integration is set up, we are now able to manage those settings from here.


ree

You can also see, that I can't do anything with this device in Intune portal, only Delete button is available


ree

Now, when our devices are successfully synced from Defender to Intune, we can create our test policies and scope them to our new group(s). Remember- be very careful which policies you push to your Windows Servers, especially domain controllers. If you use GP, double check it before you apply them from Intune.


For this test, I’ll use some simple policies to show you how things work.


After scoping and deploying your policies, please allow up 90 minutes for them to sync to your devices. You can also trigger a manual sync by going to the Defender portal -> Assets -> Devices -> Find your device ->Open it -> Click the three dots in the upper right corner and choose Policy sync. The speed depends on many factors, but usually it does not take so long time.


ree

Wait for some minutes and you go back to Intune portal, find your device -> Device configuration and check status

ree

Status can also be checked in Defender portal -> Assets-> Devices -> Find your device -> Open it -> Security policies


ree


Fun fact: You can create a policy in the Defender portal, and it will be synced to Intune and the same goes if the policy is created in Intune. BUT, this only applies to policies that are available to create from the Defender portal.


So only those policies with some limitations


ree

If you have other policies in Intune which is not part of one of those policies mentioned above, they will not appear in policy list in Defender.



Now, let's take a look on our server and see if policies have applied as Intune states


AV settings

ree

ree

Let's check ASR rules with a bit customized powershell script


ree

Here is a table from learn which translates Rule GUID to Rule namings


ree


ree

Here we have a mismatch: PowerShell shows 19 rules in audit mode, but the Defender portal reports that we have 20, where only 16 are applicable to this server. Good to know!


By the way, I found a helpful table that shows which ASR rules are applicable for each operating system



ree

Source: https://learn.microsoft.com/en-us/defender-endpoint/attack-surface-reduction-rules-reference?utm_source=chatgpt.com#asr-rules-supported-operating-systems Another great fact: you can manage these settings on servers that aren’t even in Azure, as long as they’re onboarded to Defender using a local script, GPO, or MCM. We’ll take a closer look at this in another blog post.


Wrapping up


This is a great way to have a unified portal for managing Defender policies and overseeing the status of all your devices in Defender portal. Best of all, you can combine this method with your existing GPOs, which makes the approach even better!


For latest and updated info please check Microsoft Learn pages !


All the best








Latest Blog Posts

© 2024-2025 need4.cloud

bottom of page