maciejrebisz.com

IT

How to integrate Windows Defender Advanced Threat Protection with Intune Conditional Access – Cloud First

maximios June 2, 2023

Microsoft has released a integration between Windows Defender Advanced Threat Protection (WDATP) and Intune. This is great news, now we can use WDATP in combination with Conditional Access. We are now able to block access from a Windows 10 that has a certain threat level to company resources.

Building on the existing security defenses in Windows 10, Windows Defender ATP provides a new post-breach layer of protection to the Windows 10 security stack. With a combination of client technology built into Windows 10 and a robust cloud service, it can help detect threats that have made it past other defenses, provide enterprises with information to investigate the breach across endpoints, and offer response recommendations. Windows Defender ATP is also setting a threat level on the devices that can be used in Intune and Conditional Access.

Prerequisites
To use device compliance policies, the following are required:

Use the following subscriptions:

  • Intune
  • Azure Active Directory (AD) Premium
  • Windows Defender Advanced Threat Protection (WDATP)

Use a supported platform:

How to integrate Windows Defender Advanced Threat Protection with Intune:

Start the Intune Management portal.

  1. Click Device Compliance
  2. Click Windows Defender ATP

In the Configuring Windows Defender ATP – click on the link

Click Sign in

Click on the settings tab and move slider “Microsoft Intune Connection” to on

Go back to the Intune management portal and refresh, then the connection is up and running.

In the Windows 10 compliance policy you are ready to set the evaluation rules up for WDATP.

Require the device to be at or under the Device Threat Level

The options are:

Secured: This option is the most secure, as the device can’t have any threats. If the device is detected as having any level of threats, it is evaluated as noncompliant.
Low: The device is evaluated as compliant if only low-level threats are present. Anything higher puts the device in a noncompliant status.
Medium: The device is evaluated as compliant if existing threats on the device are low or medium level. If the device is detected to have high-level threats, it is determined to be noncompliant.
High: This option is the least secure, and allows all threat levels. It may be useful if you’re using this solution only for reporting purposes.

In Intune under devices you can see the Device Threat Level

  1. Click all Devices
  2. Click Columns
  3. Click Device Threat Level

Now you can see see the Device Threat Level in the Device overview

Read more at:

Add a device compliance policy for Windows devices in Intune
https://docs.microsoft.com/en-us/intune/compliance-policy-create-windows

Windows Defender Advanced Threat Protection
https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/windows-defender-advanced-threat-protection

Related Posts

IT /

Intune – Windows device enrollment restrictions – Cloud First

IT /

How to add “hidden” Windows UWP to Windows Store for Business – Cloud First

IT /

Office 2016 Active Directory-Based activation – Cloud First

‹ How to deploy Printix client with Intune – Cloud First › Admin portals for Microsoft EM+S – Cloud First

Recent Posts

  • Intune – Windows device enrollment restrictions – Cloud First
  • How to add “hidden” Windows UWP to Windows Store for Business – Cloud First
  • Office 2016 Active Directory-Based activation – Cloud First
  • How to deploy Windows Local Experience Packs with Intune – Cloud First
  • Conditional Access for Outlook Web Access (OWA) – Cloud First

Recent Comments

No comments to show.

Archives

  • November 2025
  • October 2025
  • August 2025
  • July 2025
  • June 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • November 2024
  • September 2024
  • July 2024
  • June 2024
  • March 2024
  • December 2023
  • August 2023
  • June 2023
  • March 2023
  • February 2023
  • December 2022
  • September 2022
  • August 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • January 2022
  • December 2021
  • October 2021
  • September 2021
  • August 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • February 2020
  • January 2020
  • December 2019
  • October 2019
  • September 2019
  • June 2019
  • April 2019
  • March 2019
  • February 2019
  • March 2018
  • February 2018
  • December 2017
  • October 2017
  • August 2017

Categories

  • IT

Back to Top

© maciejrebisz.com 2026
Powered by WordPress • Themify WordPress Themes