Device management
This section describes the configuration of device management within Microsoft Defender associated with systems built according to the guidance provided by ASD's Blueprint for Secure Cloud.
Estimated reading time: 1 minute
Instruction
The below tables outline the as built configuration for ASD’s Blueprint for Secure Cloud (the Blueprint) for the Microsoft Defender portal at the following URL:
https://security.microsoft.com/securitysettings/endpoints/onboarding
The settings described on these pages provide a baseline implementation for a system configured using the Blueprint. Any implementation implied by these pages should not be considered as prescriptive as to how an organisation must scope, build, document, or assess a system.
Implementation of the guidance provided by the Blueprint will differ depending on an organisation’s operating context and organisational culture. Organisations should implement the Blueprint in alignment with their existing change management, business processes and frameworks.
Placeholders such as <ORGANISATION.GOV.AU>
, <BLUEPRINT.GOV.AU>
and <TENANT-NAME>
should be replaced with the relevant details as required.
Onboarding
Item | Value |
---|---|
Select operating system to start onboarding process | Windows 10 and 11 |
Connectivity type | Streamlined |
Deployment method | Mobile Device Management / Microsoft Intune |
Offboarding
Item | Value |
---|---|
Select operating system to start offboarding process | Windows 10 and 11 |
Deployment method | Mobile Device Management / Microsoft Intune |
Related information
Security & Governance
- Essential Eight: Patch Applications
- Essential Eight: Patch Operating Systems
- Essential Eight: Regular Backups
- System Administration Process