2.1 MDE Architecture and Deployment Planning

10-14 hours · Module 2

MDE Architecture and Deployment Planning

SC-200 Exam Objective

Domain 1 — Manage a SOC Environment: "Configure Microsoft Defender for Endpoint advanced features" and "Configure and manage device groups, permissions, and automation levels in Microsoft Defender for Endpoint."

Introduction

Before you onboard your first device, you need to understand what Defender for Endpoint actually is at an architectural level — not the marketing description, but the technical architecture that determines how data flows, where decisions are made, and what fails when components are misconfigured.

Defender for Endpoint is not a single agent. It is a distributed system with three layers: the endpoint sensor that captures telemetry on each device, the cloud backend service that processes and analyzes that telemetry, and the management portal where you configure policies, investigate alerts, and take response actions. Understanding these three layers is essential because troubleshooting — which you will do regularly — requires knowing which layer is responsible for the behavior you are observing. When a device does not appear in the portal, is the problem the sensor (not installed or not running), the network (connectivity to the cloud service is blocked), or the backend (license not assigned, onboarding not processed)? Each layer has different diagnostic tools and different failure modes.

This subsection teaches you the complete MDE architecture, the deployment planning decisions you must make before onboarding devices, the licensing differences between Plan 1 and Plan 2 that determine which features are available, and the integration points with Intune, Configuration Manager, and Group Policy that control how you manage the platform at scale.


The three-layer architecture

MICROSOFT DEFENDER FOR ENDPOINT — THREE-LAYER ARCHITECTURELAYER 3: MANAGEMENT PORTALsecurity.microsoft.com — Configure, Investigate, RespondREST APILAYER 2: CLOUD BACKEND SERVICEML ClassificationCorrelation EngineThreat IntelligenceAIR EngineAzure Infrastructure — *.securitycenter.windows.comHTTPS (443)Windows 10/11Built-in sensorIntune / GPO / SCCM / ScriptServer 2012 R2–2025Unified solution (2012/2016)Built-in (2019+)macOS / Linux / MobileSeparate agent packageIntune / JAMF / apt/yumLAYER 1: ENDPOINT SENSORS
Figure 2.1: MDE's three-layer architecture. The sensor (Layer 1) captures telemetry on each device. The cloud backend (Layer 2) processes it with ML, correlation, and threat intelligence. The portal (Layer 3) is where you configure, investigate, and respond. Troubleshooting starts by identifying which layer is failing.

Layer 1: The endpoint sensor. On Windows 10 and 11, the MDE sensor is built into the operating system — it is the Microsoft Defender for Endpoint service that runs as part of the Windows Security stack. It does not require a separate agent installation. On Windows Server 2016+, the sensor is also built-in but requires explicit onboarding. On Windows Server 2012 R2, macOS, and Linux, the sensor is a separate package that must be installed. On iOS and Android, the sensor runs as a mobile app (Microsoft Defender) that provides web protection and network-level threat detection.

The sensor captures comprehensive telemetry from the device. Process creation events record every executable that launches, including the parent process, command line, file hash, and the user account. Network connection events record every outbound and inbound connection with destination IP, port, and the process that initiated it. File events record creation, modification, deletion, and rename operations with file path, hash, and size. Registry events record key creation and value modification. Logon events record interactive and network logons with account and source information. AMSI events capture scripts evaluated by the Antimalware Scan Interface, including PowerShell, VBScript, and JavaScript content.

This telemetry is what populates the Device tables in Advanced Hunting: DeviceProcessEvents, DeviceNetworkEvents, DeviceFileEvents, DeviceRegistryEvents, DeviceLogonEvents, DeviceImageLoadEvents, and DeviceEvents. Every investigation query you wrote in Module 6 and every cross-product correlation in Module 1 depends on the sensor capturing complete, accurate telemetry. If the sensor is not running, not configured correctly, or blocked from communicating with the cloud service, those tables are empty for that device — and your detections are blind.

Layer 2: The cloud backend service. The sensor sends telemetry to the MDE cloud backend, which runs in Microsoft’s Azure infrastructure. The backend performs the computationally intensive analysis that would be impractical to run on each endpoint: machine learning models that classify process behaviors as malicious or benign, correlation engines that connect related events across devices, behavioral analytics that establish per-device baselines and detect deviations, and threat intelligence matching that compares observed indicators against Microsoft’s global threat intelligence.

The cloud backend is also where automated investigation and response (AIR) operates. When the backend identifies a suspicious event, it launches an automated investigation that examines related artifacts, builds an attack narrative, and determines remediation actions — all without analyst intervention. The investigation results and recommended actions are then presented in the portal for analyst review (or executed automatically, depending on your automation level configuration).

The sensor-to-cloud communication uses HTTPS to specific Microsoft endpoints. Devices must be able to reach URLs in the *.securitycenter.windows.com and *.security.microsoft.com domains. If your network blocks outbound HTTPS to these destinations (common in environments with restrictive proxy configurations), the sensor cannot send telemetry and the device appears as offline or unhealthy in the portal. Diagnosing connectivity issues is covered in subsection 2.2.

Layer 3: The management portal. The Defender XDR portal at security.microsoft.com is where you configure MDE settings, manage device inventory, investigate alerts, take response actions, and monitor the health of your deployment. From an MDE perspective, the key areas in the portal are:

Settings → Endpoints → Advanced features, where you enable or disable platform capabilities like live response, automated investigation, custom network indicators, web content filtering, and attack surface reduction rule reporting. Settings → Endpoints → Onboarding, where you download onboarding packages for each deployment method and operating system. Assets → Devices, where you view the complete inventory of onboarded devices with their health state, risk level, exposure level, and last seen timestamp. The Incidents queue, where MDE alerts appear correlated with alerts from other Defender products.


Plan 1 vs Plan 2: what you get at each tier

The distinction between MDE Plan 1 and Plan 2 directly affects what your SOC can do. Many organizations start with P1 (included in M365 E3 and Business Premium) and discover limitations when they need investigation capabilities that only P2 provides.

Plan 1 (prevention-focused) includes next-generation antivirus protection (Microsoft Defender Antivirus with cloud-delivered protection, behavioral monitoring, and exploit protection), attack surface reduction capabilities (ASR rules, controlled folder access, device control, network protection, web protection), manual response actions (device isolation, restrict app execution, run antivirus scan), and centralized management through the Defender portal. Plan 1 provides the preventive layer — it stops known threats and reduces the attack surface. But it does not provide the investigation and hunting capabilities that SOC analysts need.

Plan 2 (prevention + investigation + hunting) includes everything in Plan 1 plus the full endpoint detection and response (EDR) engine, the device timeline with detailed forensic telemetry, live response sessions for remote forensic collection, automated investigation and response (AIR), threat and vulnerability management (TVM), Advanced Hunting across all Device tables, custom detection rules, attack simulators for testing, and Microsoft Threat Experts (ask-the-expert service). Plan 2 provides the investigation layer — it enables the alert triage, device timeline analysis, process tree investigation, and live response forensics that Module 1 taught and that Modules 11-15 depend on.

The practical impact: with Plan 1, when an endpoint alert fires, you can see the alert name and severity but cannot drill into the device timeline, cannot use live response to collect forensic artifacts, cannot run Advanced Hunting queries against the detailed telemetry, and cannot configure automated investigation. You can isolate the device and run an antivirus scan — but you cannot investigate what happened. For a SOC analyst, Plan 2 is not optional.

Plan 1 vs Plan 2 — Feature Comparison
CapabilityPlan 1 (E3)Plan 2 (E5)
Next-gen antivirus (Defender AV)
ASR rules
Device isolation
Restrict app execution
Network / web protection
Device timeline (forensic telemetry)
Live response (remote shell)
Advanced Hunting (KQL)
Automated Investigation (AIR)
Threat & Vulnerability Mgmt
Custom detection rules
Attack simulators
The dividing line: Plan 1 stops threats. Plan 2 stops threats AND lets you investigate what happened. Every highlighted row is a capability you need daily as a SOC analyst. The SC-200 exam tests all of them.

Licensing paths to Plan 2: M365 E5 includes Plan 2. M365 E3 includes Plan 1 — upgrade by purchasing the standalone Defender for Endpoint P2 add-on. M365 Business Premium includes Plan 1 — same add-on path. Standalone Defender for Endpoint P2 can be purchased without any M365 bundle for organizations that need endpoint protection but not the full M365 suite.

The SC-200 exam assumes Plan 2

Every exam question about device investigation, live response, automated investigation, and Advanced Hunting assumes you have Plan 2 capabilities. If your organization runs Plan 1, you can still pass the exam by studying in your lab (which should have E5), but you should understand that the investigation features tested on the exam are not available in your production environment without a P2 upgrade.


Deployment planning decisions

Before onboarding your first production device, you need to make five decisions that determine how MDE operates in your environment. Getting these wrong causes operational pain that is difficult to fix after deployment because changing them requires re-onboarding or policy redistribution.

Decision 1: Onboarding method. How will you deploy the MDE sensor configuration to your devices? The options are Microsoft Intune (recommended for cloud-managed devices), Microsoft Configuration Manager (SCCM/MECM, for on-premises managed environments), Group Policy (for domain-joined devices without Intune or SCCM), local script (for testing and small deployments), and VDI onboarding scripts (for virtual desktop environments). Your choice depends on your existing device management infrastructure. If you already use Intune to manage devices, use Intune for MDE onboarding — it provides the tightest integration and the simplest policy management. If you use SCCM, use the SCCM integration. Do not mix multiple onboarding methods for the same device population — it creates management complexity and troubleshooting confusion.

Decision 2: Automation level. How much autonomous remediation should AIR perform? The options range from “Full — remediate threats automatically” (AIR investigates and remediates without analyst approval) to “No automated response” (alerts only, no AIR). The recommended starting point for most organizations is “Semi — require approval for any remediation” — AIR investigates and recommends actions, but an analyst must approve before remediation executes. This gives you the investigation benefit of AIR (it analyzes the alert faster than any human analyst) while maintaining human oversight of remediation actions. After you build confidence in AIR’s recommendations over 30-60 days, you can upgrade to full automation for common, well-understood alert types.

Decision 3: Device groups. How will you organize devices for policy application and RBAC? Device groups let you apply different automation levels, assign different analyst teams, and scope visibility so that SOC analysts only see devices in their responsibility area. Common grouping strategies include by operating system (Windows workstations, Windows servers, macOS, Linux), by business unit (Engineering, Finance, Executive), by risk level (standard users, privileged users, high-value servers), or by geographic region. Your device group structure should mirror your organizational responsibility model — if a specific analyst team is responsible for server security, create a server device group and assign that team access.

Decision 4: Advanced features enablement. Which platform capabilities will you enable? Key features that require explicit enablement include live response (disabled by default — must be enabled before any analyst can initiate a live response session), advanced live response (allows running unsigned scripts — additional risk, requires separate enablement), custom network indicators (allows blocking specific IPs, URLs, and domains at the endpoint level), web content filtering (blocks access to categories of websites), automated investigation (enable or disable the AIR engine), and Microsoft Defender for Identity integration (enables identity data enrichment in endpoint alerts). Review each feature, understand the security and operational implications, and enable deliberately rather than enabling everything at once.

Decision 5: Sample sharing and data retention. MDE can submit suspicious files to Microsoft’s cloud for deep analysis (detonation). This improves detection fidelity but means file samples leave your environment. For organizations with strict data handling requirements (government, defense, financial services), review the sample sharing policy with your compliance team before enabling. Data retention for MDE telemetry defaults to 180 days. If you need longer retention for compliance or forensic purposes, forward the data to a Sentinel workspace with extended retention configured (covered in Module 7).


Integration with device management platforms

MDE does not operate in isolation — it integrates with your device management platform to enable compliance-based conditional access, a powerful control that blocks compromised devices from accessing corporate resources.

Intune integration is the deepest and most automated. When Intune and MDE are connected (Settings → Endpoints → Advanced features → Microsoft Intune connection), MDE sends device risk levels to Intune. Intune compliance policies can then include a “device must be at or below a specified risk level” condition. Conditional Access policies in Entra ID can block access to corporate resources (email, SharePoint, Teams) for devices that fail compliance — meaning a device flagged as “high risk” by MDE is automatically blocked from accessing corporate data until the threat is remediated. This creates a closed-loop protection system: MDE detects the threat, Intune marks the device as non-compliant, Conditional Access blocks access, the analyst remediates the threat, MDE recalculates the risk level, Intune marks the device as compliant, and access is restored. All of this can happen without any analyst intervention if AIR is configured for full automation.

CLOSED-LOOP PROTECTION: MDE → INTUNE → CONDITIONAL ACCESSMDE detectsthreat on deviceRisk signalsent to IntuneNon-compliantIntune marks deviceAccess blockedConditional AccessRemediateAIR or analystRisk cleared → compliant → access restored
Figure 2.2: The closed-loop protection cycle. MDE detects a threat, Intune marks the device non-compliant, Conditional Access blocks corporate resource access, and remediation (automated or manual) restores compliance. The entire cycle can complete without analyst intervention when AIR is set to full automation.

Configuration Manager integration provides similar capabilities for on-premises managed devices that are co-managed with Intune. The co-management scenario requires both SCCM and Intune to be configured, with the endpoint protection workload directed to Intune. This is the recommended approach for organizations transitioning from on-premises to cloud management.

Group Policy integration is the least automated option but necessary for environments that do not use Intune or SCCM. GPO can deploy the onboarding package and configure ASR rules, but it does not provide the compliance-to-conditional-access integration that Intune enables. Organizations using GPO for MDE should plan a migration path to Intune for the full protection loop.


MDE in the Defender XDR ecosystem

MDE does not exist alone. Its value multiplies when integrated with other Defender products because each product contributes signals that improve the others.

MDE sends device risk signals to Entra ID Protection, which incorporates them into conditional access evaluations. A user signing in from a device flagged as compromised by MDE faces additional authentication requirements or is blocked entirely — even if their credentials are valid.

MDE telemetry feeds into the Defender XDR correlation engine, which connects endpoint alerts with email alerts (Defender for Office 365), identity alerts (Defender for Identity and Entra ID Protection), and cloud app alerts (Defender for Cloud Apps). The cross-product correlation queries you wrote in Module 1.8 depend on MDE providing the DeviceProcessEvents, DeviceNetworkEvents, and DeviceFileEvents data that represent the endpoint layer of the attack chain.

MDE data can be forwarded to Microsoft Sentinel for long-term retention (beyond the 180-day default), custom analytics rules that combine endpoint data with third-party data sources, and SOAR playbooks that automate response actions triggered by Sentinel incidents. The Defender XDR data connector in Sentinel (configured in Module 0.5) is what enables this data flow.

MDE integrates with Defender for Identity by sharing device context in identity alerts. When Defender for Identity detects lateral movement (pass-the-hash, pass-the-ticket), the alert enrichment includes the MDE device risk level and any active endpoint alerts for the source device — giving the analyst immediate context about whether the source device was already compromised.

Try it yourself

In your Defender portal, navigate to Settings → Endpoints → Advanced features. Review each feature toggle and note which are currently enabled and which are disabled. Then navigate to Settings → Endpoints → Onboarding and note the available onboarding methods for each operating system. You do not need to onboard a device yet — this exercise builds familiarity with the configuration surface before subsection 2.2 walks through the onboarding process.

What you should observe

The Advanced features page contains approximately 20 toggles. In a new tenant, most are disabled by default. Key features to note: Live Response (must be enabled before any analyst can use it), Automated Investigation (controls whether AIR runs), Custom Network Indicators (allows endpoint-level blocking), and the Microsoft Intune connection (enables the compliance-to-conditional-access integration). The Onboarding page shows different package options per operating system and deployment method. For a lab environment, the "Local script" method is the simplest for your first device.


Knowledge check

Check your understanding

1. Your organization has M365 E3 licenses. An analyst opens an endpoint alert and tries to view the device timeline, but the option is not available. What is the most likely cause?

M365 E3 includes Defender for Endpoint Plan 1, which does not include the device timeline, live response, or Advanced Hunting. These investigation features require Plan 2, which is included in M365 E5 or available as a standalone add-on. The analyst can see alerts and perform basic response actions (isolate, scan) but cannot perform the detailed forensic investigation that Plan 2 enables.
The device is not onboarded correctly
Live response needs to be enabled in Advanced features
The analyst does not have the correct RBAC role

2. You are planning MDE deployment for an organization with 500 Windows workstations managed by Intune and 50 Windows servers managed by SCCM. What is the recommended onboarding approach?

Use Intune for the 500 workstations (tightest integration, enables compliance-to-conditional-access loop) and SCCM for the 50 servers (matches existing management infrastructure). Create separate device groups for workstations and servers so you can apply different automation levels and assign different analyst teams. Do not mix onboarding methods for the same device population.
Use GPO for everything — it is the most universal method
Use local scripts for all 550 devices
Wait until all devices are in Intune before onboarding any

3. You are configuring the automation level for your new MDE deployment. The SOC team has never used AIR before. What level do you recommend?

Semi — require approval for any remediation. This gives the SOC team the investigation benefits of AIR (automated analysis, recommended actions) while maintaining human approval of all remediation actions. After 30-60 days of reviewing AIR recommendations and building confidence in its accuracy, gradually upgrade to full automation for well-understood, low-risk alert types. Starting with full automation before the team understands AIR's behavior creates risk — an incorrect automated remediation could disrupt a legitimate business process.
Full automation — remediate everything automatically from day one
No automated response — use AIR only after 6 months of manual operations
Semi — require approval for core folders remediation only

4. A device has the MDE sensor installed and running, but it does not appear in the Defender portal's device inventory. Network logs show the device cannot reach *.securitycenter.windows.com. What is the problem?

The sensor cannot communicate with the MDE cloud backend because the required URLs are blocked by a firewall, proxy, or network policy. The sensor captures telemetry locally but cannot send it to the cloud service for analysis and portal visibility. The fix is to allow outbound HTTPS (port 443) to the MDE service URLs through your network perimeter. Until connectivity is restored, the device is effectively unprotected — no cloud analysis, no alerts, no remote response capabilities.
The device needs a Plan 2 license
The sensor is corrupted and needs reinstallation
The device needs to reboot after onboarding