Autopilot & Windows Defender Antimalware Engine missing issue


If you are managing Microsoft Defender AV and Microsoft Defender for Endpoint policies using Intune, then chances are that you may come across an issue where Windows Defender Real-Time Protection doesn't enable after a device has been provisioned using Autopilot. I started experiencing this issue lately which also resulted in device reporting as non-compliant. 


On further investigation, I found out that Windows Defender Antimalware Real-Time Protection was not getting enabled because of the missing of Antimalware Engine. This is clearly evident under Windows Security > Settings > About section.

It appears that the check for security intelligence updates was not getting initiated during and post provisioning and the updates were not coming down automatically. This is odd because I have got the policies for automatic update of Defender AV updates enabled as part of my policies in Intune.


I must state that in my case the operating system is Windows 11 Enterprise and the devices are being configured in Co-managed state. However, the policy for Co-management would not apply unless the ConfigMgr agent installs which I am doing as the last step in the Account setup phase in Autopilot. Until then, the intelligence security updates should get pulled directly from Internet which didn't seem to happen automatically. 

To circumvent the issue, I decided to push down a script to initiate a scan for intelligence security updates during the Autopilot provisioning process. It is literally a one liner that needed to be put in a .ps1 file which will then take care of the scan.

####
Update-MpSignature
####

Now let's import it in Intune.

2. Browse to Devices > Windows > PowerShell Scripts
3. Click on Add
4. Give a Name
5. Select the script
6. Set Run this script using the logged on credentials as No
7. Set Enforce script signature check to No
8. Set Run script in 64 bit PowerShell Host as Yes
9. Deploy to a user\device based group.


That's it. Your devices should now scan for updates during Autopilot and should report compliant as intended. The activity will get logged in event viewer as well.




Until next time..

Comments

  1. wow nice catchup and solution thanks for sharing

    ReplyDelete

Post a Comment

Popular posts from this blog

How to force escrowing of BitLocker recovery keys using Intune

Intune: Configure Printers for Non-Administrative Users

Intune: UAC Elevation Prompt Behavior for Standard Users