Microsoft Defender Antivirus Policies with Intune
Defender Antivirus is built into Windows and tightly integrated with Microsoft 365, but it’s not enough to just “have it installed.”
If you’re managing devices with Intune, you should be using Defender AV policies to enforce protection, control exclusions, and align with Microsoft’s recommended baselines.
In this guide, we’ll walk through:
- How Defender AV fits into the endpoint security stack
- Where to configure Defender policies in Intune
- What to include in your baseline
- Exclusion rules to be careful with
- How to monitor and audit results
Defender Antivirus vs. Defender for Endpoint
Let’s clarify the difference:
- Defender Antivirus: The anti-malware engine running locally on Windows. This is what you configure with Intune AV policies.
- Defender for Endpoint: The cloud-based XDR solution that analyzes alerts and reports risk.
Even if you don’t have Defender for Endpoint licenses, you can still manage Defender Antivirus centrally using Intune.
Where to Configure Defender Antivirus in Intune
Steps:
- Go to Intune Admin Center > Endpoint security > Antivirus
- Click + Create Policy
- Choose: Platform: Windows 10 and Later & Profile: Microsoft Defender Antivirus
- Configure settings such as:
- Real-time protection
- Cloud-delivered protection
- Automatic sample submission
- Scheduled scans
- Exclusions (files, folders, processes)
Assign the policy to your device groups and monitor deployment status.
Recommended Baseline Settings
If you want a secure starting point, Microsoft’s Security Baselines for Defender AV are a great reference.
Key settings to include:
- Enable real-time protection
- Enable behavior monitoring
- Enable cloud-based protection
- Disable scanning of mapped network drives
- Require daily quick scans
- Set scan time during off-hours
- Submit unknown samples automatically
- Turn off end-user tampering (e.g., disable settings changes)
You can also use the Security Baselines option in Intune for Defender if you want a pre-built profile to start with.
Exclusions: Be Intentional, Not Lazy
It’s tempting to exclude large folders (like entire C:\Program Files), but this can leave you exposed.
Safe exclusion practices:
- Only exclude specific processes or known safe paths
- Never exclude %TEMP%, user profiles, or external drives
- Regularly review and document all exclusions
- Don’t use wildcards unless absolutely necessary
If a line-of-business app requires exclusions, get details from the vendor and limit them as narrowly as possible.
Monitoring Defender Antivirus
You can monitor Defender AV health using:
- Device compliance status
- Windows Security Center integration (users see “Your device is being monitored by your organization”)
- Log Analytics or Endpoint analytics (if integrated)
- Event Viewer > Microsoft-Windows-Windows Defender/Operational
Also, consider enabling Defender Antivirus reports via the Microsoft Defender portal if your licensing includes it.
Don’t leave Defender Antivirus on default settings.
With just a few policy profiles in Intune, you can enforce Microsoft’s security recommendations, lock down your endpoints, and ensure malware protection stays active and up to date, even across remote fleets.
Start with a baseline. Then customize based on your business needs.
Comments
Post a Comment