Day-11: Security Baselines & Defender for Endpoint

By | February 13, 2026

๐ŸŽฏ Objective of Day-11

By the end of Day-11, you will be able to:

  • Explain what Intune Security Baselines are
  • Deploy baselines safely
  • Understand Defender for Endpoint integration
  • See how device risk affects access decisions

1๏ธโƒฃ What Are Security Baselines?

Security Baselines are Microsoft-recommended security configurations that:

  • Apply industry best practices
  • Reduce attack surface
  • Standardize device security

๐Ÿ“Œ Think of baselines as secure starting points, not final tuning.


2๏ธโƒฃ Security Baseline vs Compliance vs Configuration

FeaturePurposeEnforcesEvaluates
Security BaselineBest-practice securityโœ… YesโŒ No
Configuration ProfileCustom settingsโœ… YesโŒ No
Compliance PolicyTrust decisionโŒ Noโœ… Yes

๐Ÿ“Œ Baselines enforce, compliance decides.


3๏ธโƒฃ Available Security Baselines in Intune

Common baselines:

  • Windows Security Baseline
  • Microsoft Defender for Endpoint Baseline
  • Microsoft Edge Baseline

Each baseline targets a specific security layer.


4๏ธโƒฃ Where to Configure Security Baselines

Steps:

  1. Intune Admin Center
  2. Endpoint security
  3. Security baselines
  4. Select baseline (e.g., Windows)
  5. Create profile

5๏ธโƒฃ Deploying a Security Baseline (Safely)

Best practice steps:

  1. Create baseline profile
  2. Assign to pilot group first
  3. Review conflicts
  4. Monitor impact
  5. Expand gradually

๐Ÿ“Œ Never assign baselines to All devices on Day-1.


6๏ธโƒฃ Common Settings Applied by Baselines

  • Credential Guard
  • Defender Antivirus
  • Firewall enforcement
  • Attack Surface Reduction (ASR) rules
  • SmartScreen protection

๐Ÿ“Œ These settings actively change device behavior.


7๏ธโƒฃ What Is Microsoft Defender for Endpoint (MDE)?

Defender for Endpoint is an Endpoint Detection & Response (EDR) solution that:

  • Detects threats
  • Assesses device risk
  • Reports vulnerabilities
  • Feeds risk data to Conditional Access

8๏ธโƒฃ How Intune & Defender for Endpoint Work Together

Flow:

Device โ†’ Defender detects risk
       โ†’ Risk score updated
       โ†’ Intune receives status
       โ†’ Conditional Access evaluates access

๐Ÿ“Œ Defender does not block access โ€” CA does.


9๏ธโƒฃ Enable Defender for Endpoint Integration

Steps:

  1. Intune โ†’ Tenant administration
  2. Connectors and tokens
  3. Microsoft Defender for Endpoint
  4. Enable connection

๐Ÿ”Ÿ Device Risk Levels (Important)

Defender assigns risk:

  • Low
  • Medium
  • High

These can be used in Conditional Access policies.


1๏ธโƒฃ1๏ธโƒฃ Real-World Scenario

Situation:
User device is compliant but infected.

What happens:

  • Defender flags device as High risk
  • CA policy blocks access
  • Admin remediates device
  • Access restored automatically

๐Ÿ“Œ This is risk-based security in action.


1๏ธโƒฃ2๏ธโƒฃ Common Admin Mistakes

โŒ Enabling baselines without pilot testing
โŒ Conflicting baseline + configuration profiles
โŒ Ignoring Defender alerts
โŒ No CA policy tied to device risk


1๏ธโƒฃ3๏ธโƒฃ Best Practices Checklist

โœ” Pilot first
โœ” Monitor conflicts
โœ” Align Defender + CA
โœ” Document changes
โœ” Review monthly


โœ… End of Day-11 Outcome

You can now:
โœ” Explain security baselines confidently
โœ” Deploy them safely
โœ” Understand Defender integration
โœ” Design stronger security posture


๐Ÿ”œ Day-12 Preview

Day-12: Risk-Based Conditional Access

  • Device risk vs sign-in risk
  • Defender-driven access blocking
  • Real incident response flow
  • Admin troubleshooting scenarios

Leave a Reply

Your email address will not be published. Required fields are marked *