Cybersecurity Demystify How to Onboard a Device into Microsoft Defender for Endpoint: A Step-by-Step Guide

How to Onboard a Device into Microsoft Defender for Endpoint: A Step-by-Step Guide

How to Onboard a Device into Microsoft Defender for Endpoint

When securing your organization’s network, it is essential to ensure that all devices are protected by advanced endpoint security solutions like Microsoft Defender for Endpoint. This comprehensive security tool helps protect against diverse cyber threats, including malware, ransomware, phishing, and more. In this guide, I will walk you through the process of onboarding a new device into Microsoft Defender for Endpoint, ensuring seamless integration and robust protection.

Prerequisites

Before you begin the onboarding process, there are a few requirements you need to fulfill:

Network Connectivity: The device must have internet access to communicate with the Defender for Endpoint service.

Microsoft Defender for Endpoint Subscription: Ensure your organization has an active subscription to Microsoft Defender for Endpoint.

Admin Permissions: You need to have administrative rights in the Microsoft 365 Defender portal.

Supported OS Versions: Microsoft Defender for Endpoint supports a wide range of operating systems, including Windows 10, Windows 11, macOS, Linux, and mobile devices. Make sure your devices meet the system requirements.

Sign in to Microsoft Defender

Sign in to the Microsoft Defender portal with your global administrator or security administrator account.

Once logged in, In the left-hand side navigation pane, click on System > Settings > Endpoints.

Cybersecurity Demystify How to Onboard a Device into Microsoft Defender for Endpoint: A Step-by-Step Guide

Download the Onboarding Package

Click on Device management > Onboarding. Based on your organization’s needs, choose an operating system to onboard to Microsoft Defender. Choose the Connectivity type and Deployment method. For this example, I will choose Windows 10 and 11, Streamlined, and Local Script (for up to 10 devices). Click on the Download onboarding package button to download it.

Cybersecurity Demystify How to Onboard a Device into Microsoft Defender for Endpoint: A Step-by-Step Guide

Click on Device management > Onboarding. Based on your organization’s needs, choose an operating system to onboard to Microsoft Defender. Choose the Connectivity type and Deployment method. For this example, I will choose Windows 10 and 11, Streamlined, and Local Script (for up to 10 devices). Click on the Download onboarding package button to download it.

Extract the file, then right-click and click on Run as Administrator.

Cybersecurity Demystify How to Onboard a Device into Microsoft Defender for Endpoint: A Step-by-Step Guide

Press Y for yes to confirm and continue. Press any key to proceed.

Cybersecurity Demystify How to Onboard a Device into Microsoft Defender for Endpoint: A Step-by-Step Guide

Next, confirm if the installation was successful. To do this, open a Command Prompt window on the newly onboarded device. At the prompt, copy the command below and run it. The Command Prompt window will close automatically when done. This verifies that the device is properly onboarded and reported to the service.

powershell.exe -NoExit -ExecutionPolicy Bypass -WindowStyle Hidden $ErrorActionPreference= 'silentlycontinue';(New-Object System.Net.WebClient).DownloadFile('http://127.0.0.1/1.exe', 'C:\\test-WDATP-test\\invoice.exe');Start-Process 'C:\\test-WDATP-test\\invoice.exe'

Now login to Microsoft Defender to verify that the device was added successfully. On the left-hand side blade, click on Assets > Devices.

Cybersecurity Demystify How to Onboard a Device into Microsoft Defender for Endpoint: A Step-by-Step Guide

You should see your device listed, as shown in the screenshot below.

Cybersecurity Demystify How to Onboard a Device into Microsoft Defender for Endpoint: A Step-by-Step Guide

Conclusion

Onboarding a new device into Microsoft Defender for Endpoint is an essential step in ensuring your organization’s cybersecurity posture is strong and up-to-date. By following this guide, you can quickly onboard new devices into the system, apply necessary configurations, and continuously monitor them for threats.

About The Author

Help someone out! Share this post with those who might need it.
0 0 votes
Article Rating
Subscribe
Notify of
guest
0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x
CHAT