Manage Windows Defender Firewall using Intune

In my other blog post, We discussed in detail about Creating custom Windows Defender firewall rules using Intune. This post is about Managing Windows Defender firewall using Intune.

To protect organization devices, we want to ensure that the defender firewall is switched on and cannot be turned off by users. Therefore, we will create a Windows defender firewall profile and assign it to Windows devices. Let’s take a look.

Ways to manage Windows Defender Firewall

You have different ways of managing Windows Defender Firewall. Please find below:

  1. Using Intune admin center > Endpoint Security > Firewall.
  2. By creating a Device configuration profile.
  3. By creating Microsoft Defender for Endpoint Baseline under Endpoint Security.

Devices with Windows Defender Firewall Switched Off

You can find all devices where the Windows Defender firewall is switched off from Intune admin center > Endpoint Security > Firewall. Click on MDM devices running Windows 10 or later with firewall off.

Devices with Windows Defender Firewall switched Off

Create a Windows Defender Firewall Policy

To create a Windows Defender firewall policy, follow the below steps:

  • Sign in to the Intune admin center > Endpoint Security > Firewall.
  • Click on + Create Policy to create a new Firewall Policy.
  • Platform: Windows
  • Profile: Windows Firewall.
  • Click on Create to create this policy.
  • Basics: Provide a Name and Description of the Policy.
  • Configuration Settings: You can configure the Global settings for the firewall, which are at the top of the list. Then, configure the Domain, Private, and Public profiles as per your requirement. For example, below are the most basic firewall settings I have configured.
Enable Windows defender firewall using Intune
  • Domain Profile Settings
    • Enable Domain Network Firewall: True
    • Default Inbound Action for Domain Profile: Block
    • Default Outbound Action: Allow
  • Private Profile Settings
    • Enable Private Network Firewall: True
    • Default Inbound Action for Domain Profile: Block
    • Default Outbound Action: Allow
  • Public Profile Settings
    • Enable Public Network Firewall: True
    • Default Inbound Action for Domain Profile: Block
    • Default Outbound Action: Allow
  • Auditing Settings
    • Object Access Audit Filtering Platform Connection: Success + Failure
    • Object Access Audit Filtering Platform Packet Drop: Success + Failure
  • Scope tags: Click Next.
  • Assignments tab: Click Add groups and select the Entra security group containing Windows 10/11 devices.
  • Review + create: Review the policy and click on Create.
How to create a Windows Defender firewall policy using Intune

End User Experience

Let’s check and confirm policy deployment on one of the target devices.

  • Go to Start > Search for Windows Security App.
  • Click on Firewall & network protection on the left-hand side.
  • You can find the status of Domain, Private, and Public firewall.
  • You can click on the link for each profile to get more information. For example, click Private network and check for more information about the private network profile.
  • As you can see in the screenshot below, the Private network Firewall profile is switched on and managed by Intune.
End-user Experience

Verify Windows Defender Firewall using Advanced Settings

To verify Windows Defender Firewall status using its advanced settings, follow the below steps:

  • Press Windows + R to open the Run dialog box.
  • Type wf.msc and press Enter.
  • Click on Windows Defender Firewall Properties.
  • A pop-up will open where you can check the configuration of each Firewall Profile.
Verify Windows Defender firewall using advanced settings

Manage Windows Defender Firewall using OMA-URI

You can also manage Windows Defender Firewall using OMA-URI settings. To learn more about Firewall CSP Settings, click on the link Firewall CSP. If you want to create a specific custom Windows Defender Firewall rule, refer to the post Create Windows Defender firewall rules using Intune.

Leave a Comment