microsoft endpoint manager best practices


Intune includes all the relevant settings in the Intune security baseline. We are excited to share that the lab has been updated and now contains the latest evaluation versions of the following products: The Endpoint Manager evaluation kit lab guide provides step-by-step guidance for many scenarios, including: The lab environment that runs with this lab kit contains evaluation software that is designed for IT professionals interested in evaluating Microsoft Endpoint Manager and related products on behalf of their organization. Do you have questions about Endpoint Manager? Connect your Configuration Manager tenant to the cloud. The Microsoft Defender for Endpoint security baseline has been optimized for physical devices and is currently not recommended for use on virtual machines (VMs) or VDI endpoints. RSVP to save your spot and add this event to the calendar: https://aka.ms/TCL/EndpointManager. This list also includes the most recent and active version of the baseline. This type of assignment only supported for Android Enterprise fully managed and corporate-owned personally enabled (COPE). As an example, Apple Volume Purchase Program (VPP) apps deployed as Required wont show as Available in the Company Portal app. Device groups are used for applying applications and policies to a set of devices, regardless of the user. Example of a device restriction policy configured to block personal enrollment for Android Enterprise. With a few clicks, they create a security task for Intune that identifies the devices at risk, the vulnerability, and provides guidance on how to mitigate that risk. On the Configuration settings page, expand each group of settings, and configure the settings you want to manage with this profile. With RBAC, youre setting the administrators permissions and the type of users they can work with. Microsoft doesn't recommend using preview versions of security baselines in a production environment. This requires planning which methods you'll use to deploy configurations to different devices. AppleID is. Attack surface reduction - When Defender antivirus is in use on your Windows 10/11 devices, use Intune endpoint security policies for Attack surface reduction to manage those settings for your devices. Currently, it's available for Windows and will eventually include iOS/iPadOS and Android. Users can still see which applications have been recommended by their administrators if they assigned apps using this intent. The following sections of this article discuss the different tasks you can do from the endpoint security node of the admin center, and the role-based access control (RBAC) permissions that are required to use them. Each type of configuration policy supports identifying and resolving conflicts should they arise: You'll find endpoint security policies under Manage in the Endpoint security node of the Microsoft Endpoint Manager admin center. In this case, the administrator would use a device group to ensure that all these devices, regardless of who is using them, can receive the correct applications and policies. Join us on Wednesday, April 27th for four hours of back-to-back Ask Microsoft Anything (AMA) live streams. This account should only be used for this purpose. Use Intune endpoint security policies to manage security settings on devices. The Intune Admins review security tasks and then act within Intune to remediate those tasks. The same Microsoft security team chose and organized the settings for each baseline. Interactive guides are a hands-on technical experience where you can experience product scenarios using in-depth, step-by-step guidance. When you use multiple methods or instances of the same method to configure the same setting, ensure your different methods either agree or aren't deployed to the same devices. It can also display alerts. You can learn more in this article about incomplete user enrollment. AppleIDis required to deploy user licenseVPP apps. Example screenshot of Connector status details under the Tenant admin blade. These recommendations are based on guidance and extensive experience. This blog post describes best practices to enroll users, set up certificates, assign access and permissions, and multiple applications assignments. These organizations also have their own recommendations that closely mirror Microsoft's recommendations. Use the All devices view where you can view device compliance from a high level. They closed the Company Portal during an enrollment. Use of Defender for Endpoint device risk signals in Intune compliance policies and app protection policies. When your done configuring settings, select Next. Next, select. The following sections apply to all of the endpoint security policies. Migrating from on-premises Active Directory group policies to a pure cloud solution using Azure Active Directory (AD) with Microsoft Intune is a journey. After that youll be able to create your policy by attaching the specific application to your policy. Admins can take advantage of Intune to monitor, report, and troubleshoot their environments. When you integrate with Azure Active Directory (Azure AD) conditional access policies to enforce compliance policies, you can gate access to corporate resources for both managed devices, and devices that arent managed yet. Therefore, remain aware of and consider your additional policies and profiles for settings when seeking to avoid or resolve conflicts. But, there isn't a one-to-one mapping between "CIS-compliant" and Microsoft baselines. We share our recommendations and baselines with these organizations. Use the links to view the settings for recent instances of each baseline. These policies types aren't focused security policies for configuring endpoints, but are important tools for managing devices and access to your corporate resources. Security baselines in Intune are pre-configured groups of settings that are best practice recommendations from the relevant Microsoft security teams for the product. Android users encounter similar messages: Common error messages users might see when enrolling an Android device. Never disconnect the connection you build with Google. Understanding who needs the devices and what they will be used for will help you determine if you should deploy a policy or application to a user group or device group. To learn more about why and when you might want to deploy security baselines, see Windows security baselines in the Windows security documentation. The details include the most recent and current baseline version. Today I'm sharing a quick list of technical resources and upcoming live events that you may find valuable in increasing your knowledge and skills around Microsoft Endpoint Manager, a unified endpoint management platform including Microsoft Intune and Configuration Manager. When you change the version, you don't have to create a new baseline profile to take advantage of updated versions. Sign in to the Microsoft Endpoint Manager admin center. This is likely due to an enrollment restriction. When creating a duplicate, you'll give the copy a new name. Account protection - Account protection policies help you protect the identity and accounts of your users. On the Assignments page, select the groups that will receive this profile. NoteWhen working with assignment groups, its important to remember that you cant add multiple application assignments to devices. Following are brief descriptions of each endpoint security policy type. View the settings in the latest versions of the available baselines: Increase compliance to the Microsoft Defender for Endpoint security baseline, September 2020 (Edge version 85 and later), Preview: October 2019 (Edge version 77 and later), Windows 365 Security Baseline version 2101, Change the baseline version for a profile, Troubleshoot policies and profiles in Intune. Once mitigated, they set the task to complete, which communicates that status back to the Microsoft Defender for Endpoint team. Deploy security baselines that establish best practice security configurations for devices. Device configuration profiles and baselines include a large body of diverse settings outside the scope of securing endpoints. Not all failures are due to policy configurations. For example, say you created an OEMConfig policy. We developed a new reporting section to make it easier to access these new types of reports, enhance the structure of existing reports, and improve functionality so you can better monitor the health of your devices and apps across the organization. Intune works with companies such as Apple and Google, and you can check the status of third-party relationships in the Microsoft Endpoint Manager admin center. Remote help is a cloud service integrated into Endpoint Manager that enables users to get assistance when needed over a remote connection. Instead you can select a baseline profile and use the built-in option to change the instance version for that profile to a new one. Read more about RBAC with Intune here. Find out about connectors for Intune here. See Change the baseline version for a profile in the Manage security baseline profiles article. When you use multiple security baselines, review the settings in each one to identify when your different baseline configurations introduce conflicting values for the same setting. Select Endpoint security and then select the type of policy you want to configure, and then select Create Policy. Enrollment failures occur if theres a misconfiguration during set up by the administrator or the end user didnt follow the enrollment process correctly. You can also customize each baseline you deploy to enforce only those settings and values you require. Actions include sending email or notifications to alert device users about non-compliance, remotely locking devices, or even retiring non-compliant devices and removing any company data that might be on it. For more information, see Increase compliance to the Microsoft Defender for Endpoint security baseline in the Windows documentation. When you add the OEM Config application, the application will automatically inherit the default scope tag. Enrollment failures can happen. When you integrate Intune with Azure AD conditional access policies to enforce compliance policies, Conditional access can use the compliance data to gate access to corporate resources for both managed devices, and from devices that you don't manage. Secure IT support from anywhere with real-time remote help. Endpoint security policies support duplication to create a copy of the original policy. If you've already registered, sign in. You can also use access from this view to remediate issues for a device, including, restarting a device, start a scan for malware, or rotate BitLocker keys on a Window 10 device. We will be hosting four AMA sessions on the following topics: Linux managementJamie Silvestri & Ileana Wu, Manage endpoint security in Microsoft Endpoint ManagerMahyar Ghadiali, Matt Call, Arnab Biswas, Mike Danoski, Charlotte Maguire, Endpoint analytics and the user experienceAvi Prasad, Zach Dvorak, Albert Cabello Serrano, Windows device and application managementRob York, Jason Githens, Aria Carley, Bryan Keller, David Guyer. Strictly speaking, no. To manage tasks in the Endpoint security node of the Microsoft Endpoint Manager admin center, an account must: For more information, see Role-based access control (RBAC) with Microsoft Intune. You must be a registered user to add a comment. We recommend enabling multi-factor authentication (MFA) for both users and administrators. You're then prompted to download a CSV file that details those differences. It might be that a conditional access policy has been set up requiring devices to be enrolled in Intune and compliant. You can get to these reports by navigating to the Microsoft Endpoint Manager admin center>Devices > Monitor and select the report you want to generate. For more information on assigning profiles, see Assign user and device profiles. With these policies, you can configure device security without having to navigate the larger body and range of settings in device configuration profiles or security baselines. For further resources on this subject, please see the links below. You need to renew the APNs every 365 days with the same Apple ID you used to create the certificate. Manage security configurations on devices through tightly focused policies. These profiles are similar in concept to a device configuration policy template, a logical group of related settings. Streamlined onboarding for Microsoft Defender for Endpoint on clients. Available with or without enrollment can be used when devices only have Intune app protection policies. Connectors are connections that you configure to external services such as Apple Volume Purchase Program (VPP) or certificates or credential required to connect to an external service like Google Play App Sync. To configure what happens to managed apps when devices are no longer managed, you can select the intended setting under, To configure whether a required iOS/iPadOS app is installed as a removable app by end users, you can select the setting under, AppleID is required to deploy Apple Store Apps. For this scenario, the user needs to upgrade their device from version 13.7 to 14.0 to complete the enrollment. You can use security baselines to rapidly deploy a best practice configuration of device and application settings to protect your users and devices. To navigate the large number of controls, organizations often seek guidance on configuring various security features. Otherwise, register and sign in. Submit your questions during the live AMAs for our engineering and product experts to answeror help shape the direction of the discussion by posting your questions ahead of time in the Comments section of each AMA page (click the direct links in the table above). In this example, the admin has configured a policy to block personal enrollment for Android Enterprise. You can choose to change of the version of a baseline that's in use with a given profile. The Enrollment failures report lets you monitor activity for all users or for a specific user. To protect your devices and corporate resources, you can use Azure Active Directory (Azure AD) Conditional Access policies with Intune. Troubleshooting a delegated access scenario. The example also shows that devices can have a range of OS versions, especially iOS devices. To learn more, please visit the Endpoint Manager product documentation. Some of the benefits include: The following security baseline instances are available for use with Intune. This mismatch causes the unauthorized access screen message. As a security admin, use the security policies that are found under Manage in the Endpoint security node. The user might use multiple devices. You cant modify the settings from this view, but you can review how they're configured. Through Security tasks both teams remain in synch as to which devices are at risk, and how and when those risks are remediated. Find out more about the Microsoft MVP Award Program. Join the conversation on Twitter at@MSIntuneand at #EndpointManager on LinkedIn. Intune supports security baselines for Windows 10/11 device settings, Microsoft Edge, Microsoft Defender for Endpoint Protection, and more. A user halts an action during an enrollment. When you integrate Intune with Microsoft Defender for Endpoint, you can review Security tasks in Intune that identify at-risk devices and provide steps to mitigate that risk. Security baselines are pre-configured groups of Windows settings that help you apply a configuration that's recommended by the relevant security teams. What makes this innovation in Endpoint Manager possible is the native integration with Configuration Manager to cloud attach your Windows 11 devices. For example, the MDM Security Baseline automatically enables BitLocker for removable drives, automatically requires a password to unlock a device, automatically disables basic authentication, and more. These features include but aren't limited to: For example, the settings found in Endpoint security policies are a subset of the settings that are found in endpoint protection and device restriction profiles in device configuration policy, and which are also managed through various security baselines. User groups are set up with the end user in mind. These baselines are used by many organizations. Have role-based access control (RBAC) permissions equal to the permissions provided by the built-in Intune role of. Many of the settings you can configure for devices can be managed by different features in Intune. There are some settings in the group policy baseline that are specific to an on-premises domain controller. You must be a registered user to add a comment. For example, as new Windows settings become available with new versions of Windows 10/11, the MDM Security Baseline might receive a new version instance that includes the newest settings. The iOS devices that failed do not meet this requirement because they are running version 13.7. Theres a lot to learn when starting out with Intune. When you create a security baseline profile in Intune, you're creating a template that consists of multiple device configuration profiles. Otherwise, register and sign in. Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support. When youre deciding whether to deploy to users or devices, the answer often depends on the circumstances. Security baselines are supported for devices that run Windows 10 version 1809 and later, and Windows 11. It's important to understand the defaults in the baselines you choose to use, and to then modify each baseline to fit your organizational needs. Heres a curated list of all Microsoft Endpoint Manager technical resources that are frequently updated: Keep up with the latest Microsoft Endpoint Manager announcements and resources. You can quickly create and deploy a secure profile, knowing that you're helping protect your organization's resources and data. Find out more about OEMConfig policies and how they work with Intune here. Renew the certificate with the Apple ID you used to initially create the certificate. For example, in the report below, an end user has tried to enroll several iOS and Android devices. The second option is to get permission to read all the mobile applications that have been added to the environment. In this interactive guide, you will learn how to configure, deploy, and use remote help in the Endpoint Manager console. To configure this type of policy, first you need to add the OEM application. To learn more about using these security policies, see Manage device security with endpoint security policies. The new profile is displayed in the list when you select the policy type for the profile you created. In addition, security baselines often manage the same settings you might set with device configuration profiles or other types of policy. Details also include the default value for the setting by version, and if the setting was added to the more recent version, or removed from the more recent version. The information at the following links can help you identify and resolve conflicts: Troubleshoot policies and profiles in Intune, Select the policy that you want to copy. Your Microsoft Defender for Endpoint team determines what devices are at risk and pass that information to your Intune team as a security task. If conflicts happen, you can use Intune's built-in tools to identify and resolve the source of those conflicts. Establish device and user requirements through compliance policy. Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type. Tips and tricks for managing Microsoft Endpoint Manager, Let us know if you have any additional questions by replying to this post or reaching out to, Features and licenses for Azure AD Multi-Factor Authentication. Microsoft Defender for Endpoint baseline Bookmark the Microsoft Endpoint Manager Blog. This baseline is built as a generic infrastructure that allows customers to eventually import other security baselines based on CIS, NIST, and other standards. Microsoft Endpoint Manager lets you manage a wide set of endpoint platforms by configuring and deploying policies and applications to users and devices from the cloud. Resolution options: Your local administrator can reach out to central administration and ask them to attach the scope tag to your relevant application. You can continue using those older profiles, including editing their name, description, and assignments, but you won't be able to edit settings for them or create new profiles based on the older versions. These settings are excluded from Intune's recommendations. See Avoid policy conflicts later in this article. The account protection policy is focused on settings for Windows Hello and Credential Guard, which is part of Windows identity and access management. A scenario when duplicating a policy is useful, is if you need to assign similar policies to different groups but don't want to manually recreate the entire policy. Microsoft continues to publish security baselines for group policies (GPOs) and the Security Compliance Toolkit, as it has for many years. Disk encryption - Endpoint security Disk encryption profiles focus on only the settings that are relevant for a devices built-in encryption method, like FileVault or BitLocker. With a personal Apple ID, you run the risk of losing access to an account when someone leaves the organization. You can then use the tasks to report back to Microsoft Defender for Endpoint when those risks are successfully mitigated. If you deploy applications and policies to multiple user groups, take into consideration what will happen if the same user is in both groups: This table describes how conflicts are resolved. They took longer than 30 minutes between each section of the enrollment process. The settings in this baseline are considered the most relevant security-related configuration options. In each new build of Windows, the team adjusts its recommendations based on newly released features. To understand what's changed between versions, select the checkboxes for two different versions, and then select Compare baselines. These additional baselines are built in to Microsoft Intune, and include compliance reports on users, groups, and devices that follow (or don't follow) the baseline. The list includes: To view more information about the baseline versions you use, select a baseline type, like MDM Security Baseline to open its Profiles pane, and then select Versions. Sharing best practices for building any app with .NET. We recently published two new interactive guides that will help you boost your endpoint management skills even further. When managing settings, it's important to understand what other methods are in use in your environment that can configure your devices, and avoid conflicts. The report includes a graphical overview where you can see failed enrollments over time. Security baselines can help you to have an end-to-end secure workflow when working with Microsoft 365. Regardless of the policy method, managing the same setting on the same device through multiple policy types, or through multiple instances of the same policy type can result in conflicts that should be avoided. Enroll iOS/iPadOS devices in Intune in Microsoft Intune, Enroll Android Enterprise personally-owned work profile devices in Intune, Device management capabilities in Microsoft Intune, Use role-based access control (RBAC) and scope tags for distributed IT in Intune. (To use this baseline your environment must meet the prerequisites for using Microsoft Defender for Endpoint). A security baseline includes the best practices and recommendations on settings that impact security. To help, use the various tools from the Security Compliance Toolkit that can help you identify cloud-based options from security baselines that can replace your on-premises GPO configurations. The Endpoint security policies are designed to help you focus on the security of your devices and mitigate risk. Intune has extensive configuration settings and comprehensive security policies that can be applied on each platform to help you customize to meet your organizations needs.