How to deploy this Exploit protection policy and how it works across M365 tenant and devices?

Vinod Survase 4,741 Reputation points
2023-12-11T15:11:02.9066667+00:00

How to deploy this Exploit protection policy and how it works across M365 tenant and devices?

As I can see it requires the script but really not sure which script is needed and how to build from the below link?

https://video2.skills-academy.com/en-us/microsoft-365/security/defender-endpoint/enable-exploit-protection?view=o365-worldwide

https://video2.skills-academy.com/en-us/windows/client-management/mdm/policy-csp-exploitguard

User's image

Microsoft Intune Security
Microsoft Intune Security
Microsoft Intune: A Microsoft cloud-based management solution that offers mobile device management, mobile application management, and PC management capabilities.Security: The precautions taken to guard against crime, attack, sabotage, espionage, or another threat.
417 questions
Microsoft Intune Configuration
Microsoft Intune Configuration
Microsoft Intune: A Microsoft cloud-based management solution that offers mobile device management, mobile application management, and PC management capabilities.Configuration: The process of arranging or setting up computer systems, hardware, or software.
1,893 questions
Microsoft Intune Application management
Microsoft Intune Application management
Microsoft Intune: A Microsoft cloud-based management solution that offers mobile device management, mobile application management, and PC management capabilities.Application management: The process of creating, configuring, managing, and monitoring applications.
941 questions
Microsoft Intune Enrollment
Microsoft Intune Enrollment
Microsoft Intune: A Microsoft cloud-based management solution that offers mobile device management, mobile application management, and PC management capabilities.Enrollment: The process of requesting, receiving, and installing a certificate.
1,360 questions
Microsoft Intune
Microsoft Intune
A Microsoft cloud-based management solution that offers mobile device management, mobile application management, and PC management capabilities.
5,053 questions
0 comments No comments
{count} votes

2 answers

Sort by: Most helpful
  1. Pavel yannara Mirochnitchenko 12,576 Reputation points MVP
    2023-12-11T22:05:47.8433333+00:00

    Never done this but looks like you can capture current settings with powershell and create your own xml. This is not the primary security mechanism I would use to secure endpoints :)

    https://video2.skills-academy.com/en-us/microsoft-365/security/defender-endpoint/enable-exploit-protection?view=o365-worldwide#powershell


  2. Crystal-MSFT 48,591 Reputation points Microsoft Vendor
    2023-12-12T01:36:40.3533333+00:00

    @Vinod Survase, Thanks for posting in Q&A. Exploit protection helps protect devices from malware that use exploits to spread and infect. It consists of a number of mitigations that can be applied at either the operating system level, or at the individual app level.

    You can configure exploit protection to your desired state then export the configuration file with xml format.

    https://video2.skills-academy.com/en-us/microsoft-365/security/defender-endpoint/import-export-exploit-protection-emet-xml?view=o365-worldwide

    After that, you can configure the Exploit protection policy with the above xml to deploy it to the devices you want.

    Hope the above information can help.


    If the answer is helpful, please click "Accept Answer" and kindly upvote it. If you have extra questions about this answer, please click "Comment".

    Note: Please follow the steps in our documentation to enable e-mail notifications if you want to receive the related email notification for this thread.


Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.