Endpoint Security15 min read0 views

How to Deploy Microsoft Defender for Endpoint Across Your Enterprise

Step-by-step guide to deploying Microsoft Defender for Endpoint (MDE) across Windows, macOS, Linux, and mobile devices. Covers licensing, onboarding methods, policy setup, and alert tuning for organizations of any size.

Adebisi Oluwasoya

Adebisi Oluwasoya

Senior Security Analyst · April 6, 2026

How to Deploy Microsoft Defender for Endpoint Across Your Enterprise

Key Takeaways

  • Microsoft Defender for Endpoint (MDE) scores 99.7% detection in AV-TEST evaluations and is included in Microsoft 365 E5 — making it the most cost-effective enterprise EDR for Microsoft environments.
  • Deployment takes 4-6 weeks for most organizations: Week 1 for licensing and portal setup, Weeks 2-3 for pilot onboarding, Weeks 4-6 for full rollout.
  • Intune is the easiest onboarding method for cloud-managed devices, but Group Policy, SCCM, and local scripts cover domain-joined and air-gapped environments.
  • The biggest deployment mistake is skipping the pilot phase — testing with 50-100 devices first catches compatibility issues before they affect thousands of users.
  • Attack Surface Reduction (ASR) rules are the most powerful MDE feature most organizations never enable — start in audit mode to avoid blocking legitimate processes.

Think of Microsoft Defender for Endpoint (MDE) as a security camera system for every device in your company. It watches everything happening on each laptop, desktop, and server — and alerts you the moment something suspicious happens. But a security camera only works if you actually install it. That is what this guide is about.

MDE is not just antivirus. It includes Endpoint Detection and Response (EDR), threat hunting, automated investigation, and attack surface reduction. And because Microsoft makes both the operating system and the security product, they integrate more deeply than any third-party tool can.

Why Choose Microsoft Defender for Endpoint in 2026?

MDE has evolved from a basic Windows antivirus into a serious enterprise security platform. Here is how it stacks up:

Feature MDE Plan 2 CrowdStrike Falcon SentinelOne
AV-TEST Detection Rate99.7%99.8%99.6%
Cost per user/month$5.20 (standalone)$8.99+$6-18
Included in M365 E5YesNoNo
Windows IntegrationNative (OS-level)Agent-basedAgent-based
macOS/Linux SupportYesYesYes
Mobile SupportiOS + AndroidiOS + AndroidiOS + Android
Automated InvestigationYes (AI-powered)YesYes
Attack Surface Reduction16 built-in rulesCustom rulesCustom rules

Best value scenario: If your organization already uses Microsoft 365 E3, upgrading to E5 adds MDE Plan 2 plus Defender for Identity, Defender for Cloud Apps, and more — often cheaper than buying a standalone EDR product separately.

Step 1: Licensing and Prerequisites

Before you touch a single device, sort out licensing and access. Here is what you need:

License Options

License MDE Plan Key Features Price/User/Month
Microsoft 365 E3Plan 1AV, ASR, device control$36
Microsoft 365 E5Plan 2Plan 1 + EDR + threat hunting$57
MDE P1 StandalonePlan 1AV, ASR, device control$3
MDE P2 StandalonePlan 2Full EDR + all features$5.20
M365 E5 Security Add-onPlan 2Full EDR (add to E3)$12

Prerequisites Checklist

  • Azure AD tenant — Every M365 subscription has one
  • Global Admin or Security Admin role — needed for initial portal setup
  • Supported OS versions — Windows 10 1709+, Windows 11, Server 2012 R2+, macOS 12+, supported Linux distros
  • Network connectivity — Devices must reach Microsoft cloud endpoints (list available in Microsoft docs)
  • Uninstall third-party AV — or plan for passive mode during transition

Step 2: Portal Setup and Configuration

The Microsoft Defender portal at security.microsoft.com is your command center. Here is how to set it up.

Initial Portal Configuration (15 minutes)

  1. Navigate to security.microsoft.com — Sign in with Global Admin credentials
  2. Go to Settings, then Endpoints, then General, then Advanced Features — turn on these critical settings:
    • Automated Investigation — let MDE auto-investigate alerts
    • Live Response — enables remote investigation on devices
    • Auto-resolve alerts — reduces alert fatigue by closing confirmed false positives
    • Custom network indicators — block specific IPs and URLs across all devices
  3. Set up role-based access control (RBAC) — create roles for:
    • Security Admins (full access)
    • Security Operators (can respond to alerts)
    • Security Readers (view-only for management dashboards)
  4. Configure data retention — set to 180 days (maximum) for EDR data. You cannot get this data back once it expires.
MDE DEPLOYMENT TIMELINE: 4-6 WEEKS 1 WEEK 1 2 WEEKS 2-3 4 OK WEEKS 4-6 SETUP AND LICENSING Verify/purchase licenses Configure portal settings Set up RBAC roles Remove 3rd-party AV plan PILOT (50-100 DEVICES) Onboard test devices Configure policies Tune alert thresholds Test ASR rules (audit) FULL ROLLOUT Onboard all devices Enable ASR in block mode Set up alert workflows Train security team 15 min Portal setup time 50-100 Pilot device count 180 days Max data retention 99.7% AV-TEST detection rate
Typical MDE deployment follows a 4-6 week timeline — rushing past the pilot phase causes the most problems

Step 3: Choose Your Onboarding Method

Onboarding is how devices connect to the MDE service. Microsoft gives you several options based on how your devices are managed.

Method Best For Difficulty Scale
Microsoft IntuneCloud-managed devices (Azure AD joined)EasyThousands of devices
Group Policy (GPO)On-premises AD domain-joined devicesModerateHundreds to thousands
SCCM/MECMEnterprise with existing SCCM setupModerateTens of thousands
Local ScriptIndividual devices, labs, testingEasy1-50 devices
VDI scriptVirtual desktop infrastructureAdvancedVDI pools

This is the simplest method if your devices are already enrolled in Intune. It takes about 5 minutes to configure and then automatically onboards every enrolled device.

  1. Go to Microsoft Intune admin center then Endpoint security then Microsoft Defender for Endpoint
  2. Set "Connect Windows devices to Microsoft Defender for Endpoint" to On
  3. A configuration profile is automatically created and assigned to all Windows devices
  4. Devices onboard within 15-30 minutes of their next Intune check-in

Method 2: Group Policy Onboarding

  1. Download the onboarding package from security.microsoft.com, then Settings, then Endpoints, then Onboarding
  2. Select "Group Policy" as the deployment method
  3. Extract the package — it contains a .xml file with your organization's unique onboarding settings
  4. Create a new GPO: Computer Configuration then Policies then Administrative Templates then Windows Components then Microsoft Defender ATP then Onboarding
  5. Import the configuration file and link the GPO to target OUs

Method 3: Local Script (for Testing)

  1. Download the local onboarding script from the MDE portal
  2. Run the .cmd file as Administrator on the target device
  3. Wait 5-10 minutes for the device to appear in the portal
  4. Verify status: Run sc query sense — the service should show as RUNNING

Step 4: Configure Security Policies

Onboarding devices is only half the battle. Now you need to configure what MDE actually does on those devices.

Antivirus Settings

In Intune, go to Endpoint security then Antivirus then Create profile. Set these settings:

  • Cloud-delivered protection — Enabled (sends suspicious files to Microsoft cloud for analysis)
  • Cloud-delivered protection level — High (provides stronger detection)
  • Real-time protection — Enabled
  • Behavior monitoring — Enabled
  • Scan all downloads — Enabled
  • Scan scripts loaded in browsers — Enabled
  • PUA protection — Block (blocks potentially unwanted applications)
  • Tamper protection — Enabled (prevents malware from disabling Defender)

Attack Surface Reduction (ASR) Rules

ASR rules are the hidden superpower of MDE that most organizations skip. They block specific attack techniques at the OS level — like preventing Office from creating child processes (which blocks most macro-based malware).

Start with these 5 ASR rules in Audit Mode:

  1. Block executable content from email client and webmail — stops email malware
  2. Block all Office applications from creating child processes — stops macro attacks
  3. Block JavaScript or VBScript from launching downloaded content — stops web-based attacks
  4. Block credential stealing from lsass.exe — stops Mimikatz-style attacks
  5. Block process creations from PSExec and WMI — stops lateral movement

Run in Audit Mode for 2-4 weeks. Check the audit logs for false positives. Then switch rules to Block Mode one at a time for rules that did not trigger false positives.

Endpoint Detection and Response (EDR)

EDR is what makes Plan 2 worth the extra cost. Configure these EDR settings:

  • Sample collection — Enable (sends suspicious files for cloud analysis)
  • Telemetry reporting frequency — Normal (every 15 minutes)
  • Advanced features — Enable Live Response for remote investigation capabilities

Step 5: Onboard Non-Windows Devices

macOS Devices

MDE for macOS uses a combination of a kernel extension (or system extension on newer macOS) and a network extension. Deploy via Intune or JAMF:

  1. Create a configuration profile for system extensions and network extensions
  2. Deploy the MDE app through Intune or JAMF
  3. Approve the kernel/system extension via MDM
  4. Verify: Open Terminal and run mdatp health — check that "healthy" shows true

Linux Servers

MDE supports Ubuntu 18.04+, RHEL 7+, CentOS 7+, Debian 9+, SLES 12+, and Oracle Linux 7+. Install via package manager:

  1. Add the Microsoft repository to your package manager
  2. Install the mdatp package
  3. Run the onboarding script provided by the MDE portal
  4. Verify: Run mdatp health --field org_id — should return your organization ID

Mobile Devices (iOS and Android)

Deploy the Microsoft Defender app through Intune app deployment. On iOS, it provides web protection and phishing detection. On Android, it adds malware scanning and app security checks. Both require the Intune Company Portal app.

MDE PLATFORM COVERAGE AND ONBOARDING METHODS Windows Intune / GPO / SCCM Local Script / VDI ALL FEATURES ASR + EDR + AIR macOS Intune / JAMF Shell script MOST FEATURES AV + EDR + Web Linux Package manager + onboarding script CORE FEATURES AV + EDR iOS Intune app deploy + Company Portal WEB PROTECTION Phishing + Web Android Intune app deploy + Company Portal MOBILE SECURITY Malware + Web FEATURE AVAILABILITY ACROSS PLATFORMS AV: Win/Mac/Linux/Android EDR: Win/Mac/Linux ASR Rules: Windows only Web Filter: All platforms
MDE supports all major platforms — but feature availability varies, with Windows getting the most complete coverage

Step 6: Alert Tuning and Day-to-Day Operations

A freshly deployed MDE instance generates a lot of noise. You will see alerts for legitimate IT tools, admin scripts, and normal business activities. Tuning reduces noise so real threats stand out.

Common False Positives to Suppress

  • IT admin tools — Software like PSExec, Remote Desktop Manager, and PowerShell scripts trigger alerts. Create suppression rules for known IT tools used by your team.
  • Developer tools — Compiler and IDE processes may flag as suspicious. Add developer applications to your allow lists.
  • Security scanning tools — Vulnerability scanners like Nessus or Qualys look like attacks to MDE. Exclude their IP addresses from network detection.
  • Backup software — Backup agents read many files rapidly, which looks like ransomware to behavior monitoring. Exclude backup processes.

Alert Priority Framework

Severity Response Time Example Alerts Action
HighWithin 1 hourRansomware detected, credential theft, active exploitationIsolate device, investigate immediately
MediumWithin 4 hoursSuspicious PowerShell, unusual network activity, PUA detectedReview alert details, check timeline
LowWithin 24 hoursInformational alerts, policy violations, audit eventsReview in daily triage
InformationalWeekly reviewAuto-resolved alerts, blocked threatsCheck trends, no immediate action

Step 7: Enable Advanced Features

Automated Investigation and Remediation (AIR)

AIR is like having a junior security analyst working 24/7. When an alert fires, AIR automatically:

  1. Analyzes the alert and gathers evidence
  2. Checks related processes, files, and network connections
  3. Determines if the threat is real or a false positive
  4. Recommends or automatically takes remediation actions

Set the automation level in Settings then Endpoints then General then Auto-remediation. Start with "Semi — require approval" and increase to "Full" once you trust the system judgment (typically after 2-3 months).

Threat Analytics

Threat Analytics in the Defender portal shows you which current real-world threats your organization is vulnerable to and which you are protected against. Check it weekly to stay ahead of emerging campaigns.

Microsoft Secure Score

Secure Score gives you a percentage rating of your security posture based on MDE configurations. A typical new deployment starts around 40-50%. Target 80%+ by following the recommended improvement actions in the Secure Score dashboard.

8 Common MDE Deployment Mistakes to Avoid

  1. Skipping the pilot phase — Deploying directly to 5,000 devices means 5,000 users calling IT when something goes wrong
  2. Not removing third-party AV first — Two AV products fighting over file access causes crashes and slowdowns
  3. Ignoring ASR rules — They are the most effective prevention feature and most organizations never enable them
  4. Setting automation to "Full" on day one — Let the system learn your environment before trusting auto-remediation
  5. Not configuring exclusions — Legitimate IT tools (PSExec, PowerShell remoting) generate constant false positive alerts
  6. Forgetting non-Windows devices — macOS and Linux servers need MDE too
  7. Not training the security team — MDE is powerful but complex. Budget time for team training
  8. Setting data retention too low — Investigations often look back months. Set retention to 180 days (the maximum)

Microsoft Defender for Endpoint is one of the most capable endpoint security platforms available, especially for organizations already invested in the Microsoft ecosystem. The key to a successful deployment is planning your rollout carefully, starting with a pilot, and tuning alerts before scaling. Skip the pilot, and you will spend weeks cleaning up the mess instead.

Frequently Asked Questions

Microsoft Defender for Endpoint Plan 2 (full EDR) is included in Microsoft 365 E5 and Microsoft 365 E5 Security add-on. Plan 1 (basic protection without EDR) is included in Microsoft 365 E3. You can also buy standalone licenses: Plan 1 costs about $3/user/month and Plan 2 costs about $5.20/user/month. For the best value, Microsoft 365 E5 at $57/user/month includes Defender for Endpoint, Defender for Identity, Defender for Cloud Apps, and more.

Adebisi Oluwasoya

Adebisi Oluwasoya

Senior Security Analyst

Threat Intelligence & IR

Adebisi is a CISSP-certified cybersecurity analyst with over eight years of experience in enterprise security. He specializes in threat intelligence and incident response, helping organizations detect, analyze, and neutralize advanced persistent threats. His work spans Fortune 500 companies across the financial, healthcare, and government sectors.

You Might Also Like

Free Newsletter

Stay Ahead of Cyber Threats

Get weekly cybersecurity insights and practical tips. No spam, just actionable advice to keep you safe.