7.1 Onboarding Devices

75 minutes · Module 7

Onboarding Devices to Defender for Endpoint

By the end of this subsection, you will know the four onboarding methods, when to use each, how to verify onboarding with KQL, and how to detect coverage gaps across your device fleet.

An unonboarded device is invisible to Defender for Endpoint. No telemetry, no alerts, no investigation capability, no response actions. Onboarding is the foundation — every other subsection in this module depends on it.

Onboarding methods

MethodBest forScalePrerequisitesMaintenance
Microsoft IntuneCloud-managed devicesThousandsDevice enrolled in IntuneAutomatic — new enrollments onboard automatically
Group Policy (GPO)On-premises AD environmentsThousandsDomain-joined, GPO infrastructureManual — new OUs may need GPO linked
Local scriptIndividual devices, testing, POC1 at a timeLocal admin accessManual per device
Configuration Manager (SCCM/MECM)Existing ConfigMgr infrastructureThousandsConfigMgr deployedIntegrated with ConfigMgr compliance
Intune is the recommended method for most organizations

A single Intune configuration profile pushed to all enrolled devices. No scripts to maintain, no GPO to troubleshoot, no manual intervention. When a new device enrolls in Intune, it automatically onboards to Defender. This is the method used in subsection 7.8 for the compliance integration that blocks AiTM attacks.

Intune onboarding walkthrough

  1. Navigate to the Defender portal → Settings → Endpoints → Onboarding
  2. Select “Microsoft Intune” as the deployment method
  3. Download the onboarding configuration package
  4. In the Intune admin center, navigate to Endpoint Security → Endpoint Detection and Response
  5. Create a new EDR policy targeting all Windows devices
  6. Upload the configuration package from step 3
  7. Assign the policy to your device groups (or “All devices”)
  8. Devices receive the policy at next Intune sync (typically within 1 hour)

Platform coverage and limitations

PlatformSensor typeEDR capabilityASR supportTVM supportKey limitation
Windows 10/11Built-in (enable via policy)FullFullFullNone — complete capability
Windows Server 2016+Built-in (enable via policy)FullFullFullServer Core uses different onboarding package
Windows Server 2012 R2MDE unified agent (separate install)FullLimitedFullRequires manual agent install, no built-in sensor
macOS 13+Separate package (Intune/Jamf)Full EDRLimited (network protection only)PartialSystem Extensions must be approved; some ASR rules unsupported
Linux (RHEL/Ubuntu/etc.)Separate package (apt/yum)EDR onlyNot supportedLimitedManual install, no ASR, command-line management
iOSDefender app + IntuneWeb protection + jailbreak detectionNot supportedNot supportedNo EDR — app-level protection only
AndroidDefender app + IntuneWeb protection + malware scanNot supportedNot supportedNo EDR — app-level protection only
macOS System Extensions are the #1 onboarding failure on Mac

macOS requires explicit approval for kernel and system extensions. If the Defender system extension is not approved, the sensor installs but cannot capture process or network telemetry. On Intune-managed Macs, deploy a system extension profile that pre-approves the Microsoft Defender extensions. On Jamf, use PPPC (Privacy Preferences Policy Control) profiles. Without this step, your Macs appear onboarded but are blind.

Verification — is the device reporting?

1
2
3
4
5
6
7
8
DeviceInfo
| where TimeGenerated > ago(24h)
| summarize arg_max(TimeGenerated, *) by DeviceId
| project DeviceName, OSPlatform, OSVersion,
    OnboardingStatus, SensorHealthState,
    MachineGroup, LastSeen = TimeGenerated
| sort by LastSeen desc
| take 20
Expected Output
DeviceNameOSPlatformOnboardingStatusSensorHealthStateLastSeen
DESKTOP-NGE042Windows10OnboardedActive14:32
LAPTOP-NGE015Windows11OnboardedActive14:31
MAC-NGE008macOSOnboardedActive14:28
SRV-FILE01WindowsServer2019CanBeOnboarded
What to look for: OnboardingStatus = Onboarded + SensorHealthState = Active confirms telemetry is flowing. SRV-FILE01 at "CanBeOnboarded" is a coverage gap — the device is known to the environment but not protected. arg_max(TimeGenerated, *) deduplicates to the most recent record per device.

Coverage gap detection

Run this query weekly to find every device that should be onboarded but is not:

1
2
3
4
5
6
DeviceInfo
| where TimeGenerated > ago(7d)
| summarize arg_max(TimeGenerated, *) by DeviceId
| where OnboardingStatus != "Onboarded"
| summarize DeviceCount = count() by OSPlatform, OnboardingStatus
| sort by DeviceCount desc
Expected Output
OSPlatformOnboardingStatusDeviceCount
WindowsServer2019CanBeOnboarded3
Windows10CanBeOnboarded1
What to look for: 3 Windows servers and 1 Windows 10 device not onboarded. Servers are priority — they host sensitive data and are common lateral movement targets. The Windows 10 device may be a personal device or a recently deployed machine that missed the Intune policy. Investigate each and onboard.

Fleet coverage metrics

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
DeviceInfo
| where TimeGenerated > ago(7d)
| summarize arg_max(TimeGenerated, *) by DeviceId
| summarize
    TotalDevices = count(),
    Onboarded = countif(OnboardingStatus == "Onboarded"),
    NotOnboarded = countif(OnboardingStatus != "Onboarded"),
    HealthyActive = countif(SensorHealthState == "Active"),
    Unhealthy = countif(OnboardingStatus == "Onboarded" and SensorHealthState != "Active")
| extend CoveragePercent = round(Onboarded * 100.0 / TotalDevices, 1),
    EffectiveCoverage = round(HealthyActive * 100.0 / TotalDevices, 1)
Expected Output
TotalDevicesOnboardedNotOnboardedHealthyActiveUnhealthyCoveragePercentEffectiveCoverage
4934894484599.2%98.2%
What to look for: Two metrics matter: CoveragePercent (onboarded/total) and EffectiveCoverage (healthy+active/total). The gap between them (99.2% vs 98.2%) represents 5 devices that are onboarded but unhealthy — the sensor is installed but not reporting. These 9 devices (4 not onboarded + 5 unhealthy) are your blind spots.

Try it yourself

Run the fleet coverage metrics query in your environment or the demo workspace. Calculate both CoveragePercent and EffectiveCoverage. What is the gap between them? What could cause devices to be onboarded but not healthy?

Common causes of onboarded but unhealthy:

1. Device powered off or offline — common for laptops not used recently. Not a configuration problem.

2. Network connectivity issue — the device cannot reach *.securitycenter.windows.com on port 443. Firewall or proxy blocking.

3. Sensor service stopped — the "Microsoft Defender for Endpoint Service" (SENSE) is not running. Check with sc query sense on the device.

4. Tamper protection disabled and sensor was tampered with — an attacker or admin disabled components. Investigate immediately.

5. Disk full — the sensor cannot buffer telemetry. Clear disk space and restart the sensor.

Check your understanding

1. CoveragePercent shows 99.2% but EffectiveCoverage shows 98.2%. What do the missing 1% represent?

Devices that are onboarded (sensor installed) but not healthy (sensor not actively reporting). These are blind spots — the device appears covered in the inventory but generates no telemetry. An attacker on one of these devices operates undetected.
Rounding error
Devices that do not support Defender

2. A macOS device shows "Onboarded" and "Active" but generates zero process telemetry. What is the most likely cause?

The macOS System Extension for Microsoft Defender was not approved. The sensor installs and reports health (appears active) but cannot capture process or network events without the system extension. Deploy a system extension approval profile via Intune or Jamf.
macOS does not support process telemetry
The device needs to reboot

3. Which onboarding method provides automatic onboarding for new devices without any manual steps?

Microsoft Intune — when a new device enrolls, it automatically receives the EDR policy and onboards. No scripts, no GPO refresh, no manual intervention. This is why Intune is the recommended method for cloud-managed environments.
Group Policy — processes on next gpupdate
Local script — fastest for individual devices