7.1 Onboarding Devices
Onboarding Devices to Defender for Endpoint
By the end of this subsection, you will know the four onboarding methods, when to use each, how to verify onboarding with KQL, and how to detect coverage gaps across your device fleet.
An unonboarded device is invisible to Defender for Endpoint. No telemetry, no alerts, no investigation capability, no response actions. Onboarding is the foundation — every other subsection in this module depends on it.
Onboarding methods
| Method | Best for | Scale | Prerequisites | Maintenance |
|---|---|---|---|---|
| Microsoft Intune | Cloud-managed devices | Thousands | Device enrolled in Intune | Automatic — new enrollments onboard automatically |
| Group Policy (GPO) | On-premises AD environments | Thousands | Domain-joined, GPO infrastructure | Manual — new OUs may need GPO linked |
| Local script | Individual devices, testing, POC | 1 at a time | Local admin access | Manual per device |
| Configuration Manager (SCCM/MECM) | Existing ConfigMgr infrastructure | Thousands | ConfigMgr deployed | Integrated with ConfigMgr compliance |
A single Intune configuration profile pushed to all enrolled devices. No scripts to maintain, no GPO to troubleshoot, no manual intervention. When a new device enrolls in Intune, it automatically onboards to Defender. This is the method used in subsection 7.8 for the compliance integration that blocks AiTM attacks.
Intune onboarding walkthrough
- Navigate to the Defender portal → Settings → Endpoints → Onboarding
- Select “Microsoft Intune” as the deployment method
- Download the onboarding configuration package
- In the Intune admin center, navigate to Endpoint Security → Endpoint Detection and Response
- Create a new EDR policy targeting all Windows devices
- Upload the configuration package from step 3
- Assign the policy to your device groups (or “All devices”)
- Devices receive the policy at next Intune sync (typically within 1 hour)
Platform coverage and limitations
| Platform | Sensor type | EDR capability | ASR support | TVM support | Key limitation |
|---|---|---|---|---|---|
| Windows 10/11 | Built-in (enable via policy) | Full | Full | Full | None — complete capability |
| Windows Server 2016+ | Built-in (enable via policy) | Full | Full | Full | Server Core uses different onboarding package |
| Windows Server 2012 R2 | MDE unified agent (separate install) | Full | Limited | Full | Requires manual agent install, no built-in sensor |
| macOS 13+ | Separate package (Intune/Jamf) | Full EDR | Limited (network protection only) | Partial | System Extensions must be approved; some ASR rules unsupported |
| Linux (RHEL/Ubuntu/etc.) | Separate package (apt/yum) | EDR only | Not supported | Limited | Manual install, no ASR, command-line management |
| iOS | Defender app + Intune | Web protection + jailbreak detection | Not supported | Not supported | No EDR — app-level protection only |
| Android | Defender app + Intune | Web protection + malware scan | Not supported | Not supported | No EDR — app-level protection only |
macOS requires explicit approval for kernel and system extensions. If the Defender system extension is not approved, the sensor installs but cannot capture process or network telemetry. On Intune-managed Macs, deploy a system extension profile that pre-approves the Microsoft Defender extensions. On Jamf, use PPPC (Privacy Preferences Policy Control) profiles. Without this step, your Macs appear onboarded but are blind.
Verification — is the device reporting?
| |
| DeviceName | OSPlatform | OnboardingStatus | SensorHealthState | LastSeen |
|---|---|---|---|---|
| DESKTOP-NGE042 | Windows10 | Onboarded | Active | 14:32 |
| LAPTOP-NGE015 | Windows11 | Onboarded | Active | 14:31 |
| MAC-NGE008 | macOS | Onboarded | Active | 14:28 |
| SRV-FILE01 | WindowsServer2019 | CanBeOnboarded | — | — |
OnboardingStatus = Onboarded + SensorHealthState = Active confirms telemetry is flowing. SRV-FILE01 at "CanBeOnboarded" is a coverage gap — the device is known to the environment but not protected. arg_max(TimeGenerated, *) deduplicates to the most recent record per device.Coverage gap detection
Run this query weekly to find every device that should be onboarded but is not:
| |
| OSPlatform | OnboardingStatus | DeviceCount |
|---|---|---|
| WindowsServer2019 | CanBeOnboarded | 3 |
| Windows10 | CanBeOnboarded | 1 |
Fleet coverage metrics
| |
| TotalDevices | Onboarded | NotOnboarded | HealthyActive | Unhealthy | CoveragePercent | EffectiveCoverage |
|---|---|---|---|---|---|---|
| 493 | 489 | 4 | 484 | 5 | 99.2% | 98.2% |
CoveragePercent (onboarded/total) and EffectiveCoverage (healthy+active/total). The gap between them (99.2% vs 98.2%) represents 5 devices that are onboarded but unhealthy — the sensor is installed but not reporting. These 9 devices (4 not onboarded + 5 unhealthy) are your blind spots.Try it yourself
Common causes of onboarded but unhealthy:
1. Device powered off or offline — common for laptops not used recently. Not a configuration problem.
2. Network connectivity issue — the device cannot reach *.securitycenter.windows.com on port 443. Firewall or proxy blocking.
3. Sensor service stopped — the "Microsoft Defender for Endpoint Service" (SENSE) is not running. Check with sc query sense on the device.
4. Tamper protection disabled and sensor was tampered with — an attacker or admin disabled components. Investigate immediately.
5. Disk full — the sensor cannot buffer telemetry. Clear disk space and restart the sensor.
Check your understanding
1. CoveragePercent shows 99.2% but EffectiveCoverage shows 98.2%. What do the missing 1% represent?
2. A macOS device shows "Onboarded" and "Active" but generates zero process telemetry. What is the most likely cause?
3. Which onboarding method provides automatic onboarding for new devices without any manual steps?