Saturday, August 13, 2022
Advertisement
Firnco
  • Home
  • Cloud Computing
  • Cybersecurity News
  • Tutorials & Certification
No Result
View All Result
  • Home
  • Cloud Computing
  • Cybersecurity News
  • Tutorials & Certification
No Result
View All Result
Firnco
No Result
View All Result
Home Cloud Computing

An Try to Configure Defender for Endpoint and Endpoint Supervisor With the Identical Software Tag – Shehan Perera:[techBlog]

August 4, 2022
in Cloud Computing
Reading Time: 10 mins read
0
An Try to Configure Defender for Endpoint and Endpoint Supervisor With the Identical Software Tag – Shehan Perera:[techBlog]
74
SHARES
1.2k
VIEWS
Share on Twitter


Maximum incessantly the instrument tagging necessities are easy otherwise you do have a suite of tags for the gadgets which are enrolled in Intune and a suite of tags for the gadgets onboarded in Defender for Endpoint. On the other hand there will also be eventualities the place you wish to have each products and services to have the similar instrument tagging setup. This absolutely make sense and those products and services are inter-connected with each and every different and I don’t see an issue having the similar tag. Additionally why is that this now not in position already within the first position? There are few strategies you’ll use however my purpose is to create a workflow. That means, as soon as the setup is in position, you must upload the instrument to the Software Workforce as soon as (dynamically or as assigned) and each Microsoft Endpoint Supervisor (MEM) and Microsoft Defender for Endpoint (MDE) tags can be implemented. You’ll additionally imagine this as a workaround on account of the tag disconnection between the products and services.

For this way to paintings the instrument could have the mode Azure AD Joined or Hybrid Azure AAD Joined.

Software to be enrolled in Endpoint Supervisor and be onboarded in Microsoft Defender for Endpoint

Desk of Content material

Create the Azure AD Software Workforce

Create the Azure AD staff and upload the gadgets. You’ll use a dynamic rule so as to add the gadgets if you wish to have, or upload the gadgets manually.

I’ve the crowd which I created named AZ-DEVICES

Create Endpoint Supervisor CSP

Create this so as to add a registry key by means of a OMA-URI profile and ship it to the Home windows instrument that’s onboarded in MDE. This would be the similar process the place you’ll permit the use of GPOs but when the instrument joined by means of Azure AD mode simplest, the native GPO is not going to paintings.

Cross to Endpoint Supervisor > Gadgets > Configuration Profiles > Create Profile >

Platform: Home windows 10 and later
Profile Sort: Templates > Customized

And press Subsequent. Within the subsequent display screen, upload the OMA-URI command. My tag can be CLOUD-PC

Title: DeviceTagging
OMA-URI: ./Software/Dealer/MSFT/WindowsAdvancedThreatProtection/DeviceTagging/Workforce
Information sort: String
Price: CLOUD-PC

Press Subsequent and upload the instrument staff within the subsequent display screen

Within the subsequent Software sync, this coverage can be despatched to the Home windows instrument and the registry key can be added

Reg key can be created within the under trail

Trail: HKEY_LOCAL_MACHINESOFTWAREPoliciesMicrosoftWindows Complicated Risk ProtectionDeviceTagging
Price (Reg_SZ): Workforce
Information: CLOUD-PC

A Limitation Value Bringing up
The OMA-URI profile can be utilized so as to add just one Tag according to instrument. I attempted including every other tag and it gave me a coverage warfare. Additionally the Registry simplest permit to create one access with the title Workforce (clearly) in that trail.

Create the Endpoint Supervisor Scope Tags

Cross to Endpoint Supervisor > Tenant management > Roles > Scope (Tags)

Get started by way of offering the Tag title and assign it to the instrument staff

Assign it to the similar staff that used to be created previous, AZ-DEVICES

Take a look at the Tag in Defender for Endpoint

Should you pass to http://safety.microsoft.com and navigate to Software Stock you are going to see under. Search for the Tags segment for the instrument.

Take a look at the Tag in Endpoint Supervisor

This will also be checked from the Intune instrument’s houses.

Create MDE Software Workforce In line with Software Tags

MDE primarily based instrument teams can be utilized for the MDE comparable actions throughout the Defender Safety portal and offering the RBAC to sure admins, implement sure Internet content material filtering insurance policies and so forth. You’ll create the instrument staff with the under dynamic rule.

And the rule of thumb will seize the gadgets that has the equipped tag title

What’s Subsequent?

From this level onwards you’ll get started including the instrument in to the Azure AD Software staff and it’ll upload the tag(s) respectively.

Ultimate Ideas

As I discussed previous, this isn’t a chic setup as the primary purpose of this process is to set the similar tag from each ends and the instrument will also be discovered with out going thru a lot hassle. Additionally the 1 tag according to instrument by means of this system as discussed above, which is usually a downside in some eventualities. I’m hoping Microsoft will get a hold of a immediately ahead way to outline the similar tag between MEM and MDE in a single pass, however till then, hope this comes in handy so that you can get issues finished.

Like this:

Like Loading…

Comparable



Supply hyperlink

Tweet19

Recommended For You

CCSK Good fortune Tales: From the VP of Inner Safety

August 13, 2022
CCSK Good fortune: From a CISO and Leader Privateness Officer

This is a part of a weblog collection interviewing cybersecurity execs who've earned their Certificates of Cloud Safety Wisdom (CCSK). In those blogs we invite people to proportion...

Read more

Who Plays a SOC 2 Audit? The Position of SOC 2 Auditors

August 13, 2022
Who Plays a SOC 2 Audit? The Position of SOC 2 Auditors

Firstly revealed via A-LIGN right here. Written via Stephanie Oyler, Vice President of Attestation Products and services, A-LIGN. Information breaches and ransomware assaults proceed to dominate the inside...

Read more

The usage of Id Governance and Azure Purposes To Construct a Self-Provider Utility Get right of entry to Control Answer – Phase 2

August 13, 2022
The usage of Id Governance and Azure Purposes To Construct a Self-Provider Utility Get right of entry to Control Answer – Phase 2

On this sequence:Growing an authenticated internet software and the use of Azure Purposes to ask visitor customers to the groupGrowing an get right of entry to package deal...

Read more

5 Tactics the Cloud Can Free up New Alternatives for Your Accounting Observe

August 13, 2022

The accountancy career is awash with communicate of cloud adoption. Certainly, many companies have already recognised one of the tangible advantages that the cloud can carry. On the...

Read more

SOC as a Provider: The entirety You Want to Know

August 13, 2022
SOC as a Provider: The entirety You Want to Know

SOC as a Provider: The entirety You Want to Know Via WatServ August 12, 2022 A big pillar of any group’s clean operations is a forged cybersecurity plan....

Read more
Next Post
PowerShell – Obtain Record from SharePoint Record Library

PowerShell – Obtain Record from SharePoint Record Library

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related News

Careers – Courting Hero

Careers – Courting Hero

August 9, 2022
7 Highest Pizza Ovens (2022): Outside, Indoor, Gasoline, and Wooden

7 Highest Pizza Ovens (2022): Outside, Indoor, Gasoline, and Wooden

August 11, 2022

AFA warns monetary advisers that shopper information is at top possibility for robbery. Canadians wish to be extra forgettable. India scraps its information privateness invoice.

August 4, 2022

Browse by Category

  • Black Hat
  • Breach
  • Cloud Computing
  • Cloud Security
  • Cybersecurity News
  • Hacks
  • InfoSec Insider
  • IoT
  • Malware
  • Malware Alerts
  • News
  • Podcasts
  • Privacy
  • Sponsored
  • Tutorials & Certification
  • Vulnerabilities
  • Web Security
Firnco

© 2022 | Firnco.com

66 W Flagler Street, suite 900 Miami, FL 33130

  • About Us
  • Home
  • Privacy Policy

305-647-2610 [email protected]

No Result
View All Result
  • Home
  • Cloud Computing
  • Cybersecurity News
  • Tutorials & Certification

© 2022 | Firnco.com

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?