How to Secure Cloud-Only Devices with Microsoft Intune, Entra ID, and Defender

A layered security approach for Microsoft Entra joined devices — from identity and access control through endpoint protection, compliance enforcement, and threat response.

Published April 1, 2026 ~22 min read Intune · Entra ID · Defender · Endpoint Security

Introduction

Cloud-only devices are no longer an experiment. Microsoft has been steering the industry toward Entra joined endpoints for several years now, and for organizations that have made the move — or are planning to — the question isn't whether to go cloud-only but how to secure it properly. The devices work. The enrollment works. The management works. What gets missed is the security architecture that needs to wrap around all of it.

The instinct for a lot of IT teams is to assume that cloud-only means less control. That without Group Policy, without a domain controller issuing Kerberos tickets, without the device sitting behind a corporate firewall, the security posture is weaker. That instinct is understandable but wrong. The security model for cloud-only devices is different, not weaker. Instead of relying on network perimeter and domain trust, you're building on three pillars: Entra ID for identity and access, Intune for device management and compliance, and Microsoft Defender for threat detection and response. When these three systems are properly connected, the result is a security posture that's at least as strong as traditional domain-joined environments — and in several respects, meaningfully stronger.

This article explains how those three pillars work together. It's written for IT directors, endpoint engineers, and security architects who either have cloud-only devices in production or are evaluating the model. The focus is on architecture and integration, not portal click-throughs. If you already know how to create a Conditional Access policy, the goal here is to help you think about how that policy fits into the larger security picture and where the gaps are if you're only using one or two of the three layers.

What "Cloud-Only" Means for Security

When a Windows device is Microsoft Entra joined with no on-premises domain relationship, several things change about how security is enforced. There's no Group Policy processing. There are no NTLM or Kerberos tickets issued by a local domain controller. There's no corporate firewall between the device and the internet by default. The device authenticates to Entra ID over the internet, receives its management policies from Intune over the internet, and reports its health status to Defender over the internet. The network the device sits on — home Wi-Fi, coffee shop, hotel, office LAN — is largely irrelevant to the security controls that apply.

This is the fundamental shift. Traditional enterprise security assumed that the network was the perimeter: devices inside the firewall were trusted, and everything outside was hostile. That model broke years ago — remote work, cloud applications, and mobile devices destroyed the assumption that "inside the network" meant "secure." Cloud-only devices don't even pretend the network matters. Security is enforced at the identity layer (who is this person, and have they proved it?) and the device layer (is this machine healthy, configured correctly, and free of active threats?). The network is just a transport mechanism.

This means every security control must work regardless of where the device is physically located. A compliance policy that checks whether BitLocker is enabled doesn't care whether the laptop is in the office or on a plane. A Conditional Access policy that requires multi-factor authentication applies whether the user is signing in from the corporate network or from a hotel room in another country. An endpoint detection rule that triggers on suspicious process behavior fires whether the device is behind a next-gen firewall or connected to an open access point. That's the design. And when you build the architecture correctly, it's a better model than hoping the firewall will catch what your endpoint controls missed.

Three Pillars of Cloud-Only Device Security
Entra ID Identity & Access Control
Conditional Access
Risk-Based Policies
MFA & Passwordless
Intune Device Management
Compliance Policies
Security Baselines
App Control
Defender Threat Protection
EDR & Investigation
Attack Surface Reduction
Risk Signal Feedback

Each pillar operates independently but becomes significantly more effective when integrated with the others.

Layer 1: Identity Security with Entra ID

In a cloud-only model, identity is the first and most critical security boundary. Every time a user signs into a device, opens Outlook, connects to SharePoint, or launches a line-of-business application, they're authenticating against Entra ID. That makes Entra the gatekeeper for everything that happens on or through the device. If identity security is weak, nothing downstream can compensate for it.

Conditional Access: The Policy Engine

Conditional Access is where identity security becomes operational. A Conditional Access policy evaluates a set of conditions at sign-in time — who is the user, what are they signing into, where are they, what device are they on, what's their risk level — and then makes an access decision: allow, block, or require additional verification. It's effectively a set of if-then rules that sit between the user and your resources.

The most foundational policy is requiring multi-factor authentication for all users accessing all cloud apps. This is table stakes, and Microsoft's own data shows it blocks over 99% of account compromise attacks. But MFA alone is not sufficient for a cloud-only security model. The next critical policy is requiring a compliant device — which is where Intune enters the picture. A Conditional Access policy that says "require MFA AND a compliant device" means the user must prove their identity (something they know plus something they have) AND the device must pass Intune's compliance checks. This is meaningfully stronger than either control alone, because it addresses both identity theft and compromised endpoints.

Beyond those two baseline policies, Conditional Access supports blocking access from specific geographies you don't operate in, requiring Terms of Use acceptance, blocking legacy authentication protocols that can't support MFA, and requiring specific authentication strengths (for example, requiring phishing-resistant MFA for admin accounts rather than accepting a simple SMS code). Each of these policies adds a layer, and they can be combined. The important thing is to design them as a coherent set, not a collection of one-off rules created in response to individual security incidents.

Entra ID Protection: Risk-Based Intelligence

Conditional Access becomes significantly more powerful when paired with Entra ID Protection (formerly Identity Protection). This service uses machine learning to evaluate sign-in risk and user risk in real time. A sign-in risk assessment looks at the characteristics of an individual authentication attempt: is it from an unfamiliar location, an anonymous IP address, a known botnet, or an impossible-travel scenario where the user signed in from one country and then from a different continent ten minutes later? User risk looks at broader patterns: has the user's credential been found in a public breach database, is there evidence of token replay, is the account exhibiting patterns consistent with compromise?

What makes this operationally useful is that you can feed these risk signals into Conditional Access policies. A policy that says "if sign-in risk is high, require MFA" means the system only challenges the user with additional verification when something looks wrong. A policy that says "if user risk is high, require password change" forces remediation when there's evidence the account may be compromised. This adaptive approach is better than blanket MFA prompts for everything, because it reduces authentication friction for normal activity while escalating protections when they're needed.

Passwordless Authentication

The long-term direction for identity security — and one that Microsoft is actively pushing — is passwordless. FIDO2 security keys, Windows Hello for Business (which uses biometric or PIN authentication backed by a hardware TPM), and the Microsoft Authenticator app in passwordless mode all eliminate the password as an attack surface entirely. There's no credential to phish, no password hash to steal, no complexity rule to get around with "Summer2026!"

Windows Hello for Business is particularly relevant for cloud-only devices because it ties authentication to the specific hardware. The private key never leaves the device's TPM. Even if an attacker compromises the user's Entra ID session from another location, they can't replicate the Windows Hello credential because it's bound to that specific machine. For organizations running Entra joined devices, enabling Windows Hello for Business should be a priority, not a future-state item. Intune can deploy the configuration, and the user experience is actually better than passwords — faster sign-in with a fingerprint or face recognition.

Session Controls and Continuous Access Evaluation

Traditional authentication was a gate: prove who you are, get a token, use that token until it expires. Continuous Access Evaluation (CAE) changes this model. With CAE, Entra ID and the resource provider (Exchange Online, SharePoint Online, Teams) maintain a near-real-time communication channel. If a user's account is disabled, their session can be revoked within minutes rather than waiting for the token to expire (which could be an hour or more). If a Conditional Access policy changes — say, a new policy blocks access from a specific country — CAE can enforce that change against existing sessions, not just new sign-ins.

For cloud-only security, CAE closes the window between "we detected a problem" and "we cut off access." In a traditional model, disabling an account might not take effect until every cached token expired. With CAE enabled, the response is functionally immediate for supported workloads. This matters most in incident response scenarios, where minutes of continued access after detection can mean significant data exfiltration.

Layer 2: Device Management and Compliance with Intune

If Entra ID answers the question "who is this person, and should they be allowed in?" then Intune answers "what state is this device in, and does it meet our standards?" For cloud-only devices, Intune replaces Group Policy, SCCM, and the traditional configuration management stack. It's the system that defines what a well-configured device looks like and then continuously verifies whether each enrolled device matches that definition.

Compliance Policies: Defining "Healthy"

A compliance policy in Intune is a set of conditions that a device must satisfy to be considered compliant. The compliance state is a binary: the device either meets all the conditions or it doesn't. That binary state is what Conditional Access policies consume when they require a "compliant device" for access. So the compliance policy is, in effect, defining your organization's minimum security standard for any device that touches corporate data.

A well-designed compliance policy for Windows cloud-only devices typically checks several things. BitLocker encryption must be enabled — this protects data at rest if the device is lost or stolen, and there's no good reason to skip it on any managed laptop. The OS version must be at or above a minimum threshold, which keeps devices from running known-vulnerable builds of Windows. Windows Defender Antimalware must be active and reporting, because disabling the built-in antivirus is one of the first things malware attempts. The Windows Firewall must be enabled across all profiles (domain, private, public). The device must not be jailbroken or rooted (relevant for mobile devices but included for completeness in cross-platform policies). And Secure Boot must be enabled, which prevents rootkits from loading before the operating system.

The key design decision is where to set the threshold. Too permissive, and the compliance check is theater — it marks devices as compliant that you wouldn't actually trust. Too strict, and you'll have constant compliance failures that either block users from working or train them to ignore compliance warnings. Start with the non-negotiables (BitLocker, antivirus active, firewall on, current OS build) and expand from there as the organization matures. Build in a grace period for new compliance requirements so users aren't blindsided by access loss. And always test compliance policies in report-only mode before enforcing them.

Configuration Profiles: Hardening the Endpoint

Where compliance policies verify the state of the device, configuration profiles actively set it. A compliance policy checks "is BitLocker on?" A configuration profile is what turns BitLocker on in the first place. Configuration profiles are the Intune equivalent of Group Policy — they push settings to the device and enforce them on an ongoing basis.

The most impactful configuration profiles for cloud-only security fall into several categories. Security baselines are pre-built profile templates from Microsoft that apply a set of recommended security settings drawn from industry guidance. The Windows 11 security baseline, for example, configures hundreds of settings related to credential handling, browser security, network protocols, and privilege escalation prevention. These baselines are a solid starting point, though they shouldn't be applied blindly — review each setting against your environment, because some baseline defaults (like disabling the Windows built-in administrator account) may conflict with your operational needs.

Firewall rules deployed through Intune control inbound and outbound traffic at the endpoint level. For cloud-only devices that regularly connect to untrusted networks, endpoint firewall rules are not optional — they're the only firewall between the device and the local network. Windows Update policies control when devices receive feature updates and security updates, which prevents the common scenario where a device goes weeks without patching because the user keeps clicking "remind me later." Delivery Optimization settings control how updates are distributed, which matters when you have dozens of devices on the same office network all pulling the same update simultaneously.

CIS Benchmark Alignment

The Center for Internet Security publishes detailed benchmarks for Windows hardening — the CIS Microsoft Windows 11 Enterprise Benchmark, for instance, contains over 400 individual settings covering everything from audit policy to account lockout to user rights assignments. Mapping these controls to Intune is not trivial because CIS benchmarks were originally written for Group Policy, and the Intune Settings Catalog uses different naming conventions and paths. But the work is worth doing, because CIS alignment gives you a defensible, auditable security baseline that maps to a recognized industry framework.

In practice, most organizations don't implement 100% of the CIS benchmark on day one. The Level 1 profile is designed to be broadly applicable without breaking standard business functionality, while Level 2 adds controls that may impact usability. A realistic approach is to start with the Microsoft security baseline (which overlaps significantly with CIS Level 1), then layer in additional CIS controls through the Settings Catalog where the baseline doesn't cover them. Track which controls are implemented, which are deferred, and why — that documentation is what auditors and security teams will ask for.

Endpoint Privilege Management

One of the hardest operational problems in endpoint security is local admin rights. Developers want them for tooling. Finance teams need them for that one ancient application that insists on admin privileges. Help desk teams grant them temporarily and forget to revoke them. The result is that a significant percentage of endpoints have users running with admin rights, which is the single most exploitable configuration on a Windows machine — ransomware, lateral movement, privilege escalation, and credential theft all become dramatically easier when the user context has local admin.

Intune Policy Coverage Matrix
Compliance Policies
BitLocker status · OS version · Antivirus active · Firewall enabled · Secure Boot · Defender risk level · Password requirements
Configuration Profiles
Security baselines · Firewall rules · Windows Update rings · Delivery Optimization · BitLocker encryption · Credential Guard · Windows Hello
Endpoint Security Policies
Antivirus settings · Disk encryption · Firewall configuration · Attack surface reduction · EDR onboarding · Account protection
App Management
Required apps · Blocked apps · App protection policies · Win32 app deployment · Microsoft Store apps · LOB apps

Compliance policies verify state. Configuration profiles and endpoint security policies enforce it. App management controls software.

Intune's Endpoint Privilege Management (EPM) addresses this by letting you remove local admin rights from users while still allowing specific, pre-approved applications to run with elevated privileges. The user stays in a standard user context for everything except the explicitly approved exceptions. When they need elevation, they can request it, and the elevation can be automatic (for approved apps), require a business justification, or require IT approval. This is a massive improvement over the binary choice of "admin or not admin," and it removes one of the most common attack vectors without generating a flood of help desk tickets about software that won't install.

Application Management

Controlling which applications are on the device is both a security concern and an operational one. Intune handles app deployment through several mechanisms: Win32 apps packaged and deployed through the Intune management extension, Microsoft Store apps deployed through the new Microsoft Store integration, line-of-business apps uploaded as MSI or MSIX packages, and web apps pinned to the taskbar or Start menu. For security purposes, the more important side of app management is what you prevent, not just what you deploy. App protection policies can restrict copy/paste between managed and unmanaged apps, prevent saving corporate data to personal cloud storage, and require encryption for app data. On the configuration side, Windows Defender Application Control (WDAC) can restrict which applications are allowed to execute at all, though WDAC requires careful planning and testing because an overly restrictive policy will break things.

Layer 3: Threat Protection with Microsoft Defender

The first two layers — identity security and device compliance — are about prevention and posture. They make it harder for bad things to happen. The third layer, Microsoft Defender, is about what happens when something gets through anyway. No security posture is perfect. Phishing emails will land. Users will click links they shouldn't. Zero-day vulnerabilities will be exploited before patches are available. Defender is the detection and response layer that handles these realities.

Defender for Endpoint: EDR on Every Device

Defender for Endpoint is the core of the threat protection layer for cloud-only devices. It provides endpoint detection and response (EDR), which means it continuously monitors process behavior, network connections, file system activity, and registry changes on the device, looking for patterns that indicate malicious activity. This isn't traditional antivirus that scans files against a signature database — it's behavioral analysis that can detect novel attacks, fileless malware, living-off-the-land techniques, and lateral movement attempts.

When Defender for Endpoint detects a threat, several things can happen depending on how you've configured it. Automated investigation and remediation (AIR) can automatically collect evidence, analyze the threat, and take remediation actions like quarantining a file, killing a process, or isolating the device from the network. For less clear-cut detections, it generates an alert that your security team investigates. The investigation experience in the Microsoft Defender portal provides a timeline of everything that happened on the device before, during, and after the detection, which is critical for understanding the scope of an incident and whether other devices are affected.

Attack surface reduction (ASR) rules are a particularly valuable Defender for Endpoint feature that doesn't get enough attention. ASR rules proactively block specific behaviors that are common in attacks but rare in legitimate use: blocking Office applications from creating child processes, preventing credential stealing from the Windows LSASS process, blocking untrusted and unsigned processes that run from USB, blocking JavaScript or VBScript from launching downloaded executable content. Each rule can be set to audit mode first (which logs what would have been blocked without actually blocking it) so you can assess the impact before enforcing. For cloud-only devices that may be connecting to untrusted networks regularly, ASR rules add a meaningful layer of protection against the most common initial access techniques.

Defender for Office 365: Protecting the Inbox

Email remains the primary initial access vector for most attacks, and cloud-only users are typically heavy Microsoft 365 users. Defender for Office 365 extends protection beyond the endpoint to the email and collaboration layer. Safe Links rewrites URLs in emails and Teams messages to route them through Microsoft's scanning infrastructure, checking the destination at click time rather than just at delivery time. This matters because attackers increasingly use delayed detonation — the URL is clean when the email is delivered, but the destination is weaponized hours later when the user actually clicks it.

Safe Attachments opens email attachments in a sandbox environment before delivering them to the user's inbox, detonating any malicious payloads in an isolated environment rather than on the user's device. Anti-phishing policies use machine learning to detect impersonation attempts — emails that appear to come from your CEO or CFO but originate from an external account. These protections aren't endpoint controls in the traditional sense, but for cloud-only devices where email is the primary communication channel and the device is the primary work surface, they're inseparable from the endpoint security story.

Defender for Cloud Apps: Shadow IT and Data Control

One of the challenges with cloud-only devices is that users have unfettered access to cloud applications. There's no web proxy filtering traffic by default, no network-level DLP inspecting what's being uploaded. Defender for Cloud Apps (formerly Cloud App Security) addresses this by discovering which cloud applications your users are accessing, assessing the risk of those applications, and allowing you to set policies around data sharing and access.

The discovery component is often the most eye-opening. Most organizations underestimate the number of cloud applications in use by a factor of five to ten. Defender for Cloud Apps can show you that your users are moving files through personal Dropbox accounts, sharing data in unsanctioned project management tools, or using file conversion services that upload your documents to third-party servers. Once you have visibility, you can create session policies that control what users can do within specific apps — blocking downloads from apps that aren't sanctioned, preventing uploads of sensitive file types, requiring step-up authentication for high-risk actions.

Defender Risk Signals as a Compliance Input

This is where the Defender layer directly connects to the other two. Defender for Endpoint calculates a machine risk level for each device: no known risk, low, medium, or high. This risk level is based on active alerts, unresolved vulnerabilities, and misconfiguration findings on the device. Intune can consume this risk level as a compliance condition. Your compliance policy can specify that a device with a medium or high Defender risk level is non-compliant. And since Conditional Access requires a compliant device, the chain is complete: Defender detects a threat, the device becomes non-compliant, and Conditional Access blocks access to corporate resources until the threat is resolved.

This integration is what turns three separate products into a coherent security system. Without it, you have Defender generating alerts in one console, Intune managing compliance in another, and Conditional Access making access decisions in a third — and none of them are talking to each other. With it, a threat detection on the endpoint automatically triggers an access control response. That closed loop is the entire point of a layered cloud-only security architecture.

How the Three Layers Work Together

The previous sections describe each layer in isolation, but the real security value comes from how they integrate. Understanding the integration is what separates a well-architected cloud-only deployment from one that has all three products licensed but operating as three separate tools.

Here's how the closed loop works in practice. A user attempts to access Exchange Online from their Entra joined device. Conditional Access evaluates the request: is MFA satisfied? Yes, the user authenticated with Windows Hello. Is the device compliant? Conditional Access checks the device's compliance state in Intune. Intune's compliance policy checks several conditions, including the Defender for Endpoint machine risk level. Defender reports the device has no active threats and no critical vulnerabilities. The compliance policy passes. Conditional Access grants access. This evaluation happens on every sign-in, every token refresh, and — with Continuous Access Evaluation — can be re-evaluated mid-session if conditions change.

Now consider what happens when something goes wrong. A user clicks a phishing link that downloads a malicious script. Defender for Endpoint detects the script attempting to execute and raises a high-severity alert. The device's machine risk level changes from "no known risk" to "high." Intune's compliance engine picks up the changed risk level within minutes and marks the device as non-compliant. Conditional Access, which requires a compliant device, blocks the user's next access attempt to any protected cloud app. The user can't reach email, SharePoint, Teams, or any other resource until the threat is resolved. Meanwhile, Defender's automated investigation has already quarantined the malicious file and is collecting forensic evidence. The security team reviews the incident, confirms remediation, and clears the alert. The risk level drops, compliance is restored, and access resumes.

Why this matters

Without the integration between Defender and Intune compliance, a threat detection is just an alert in a dashboard. With it, a threat detection automatically triggers access revocation. That's the difference between "we saw the attack and hoped someone would respond" and "the system responded automatically while the security team investigates."

The flow also works in the other direction. Entra ID Protection detects a risky sign-in — the user's credentials are being used from an unfamiliar location with characteristics matching a known attack pattern. The risk-based Conditional Access policy blocks the sign-in or requires additional verification. Even if the attacker has the user's password, they can't get past the identity layer. And because the access was blocked at the identity level, there's no endpoint compromise for Defender to detect — the attack was stopped before it reached the device.

This bidirectional integration between identity risk (Entra), device health (Intune), and threat intelligence (Defender) creates a security posture where each layer compensates for the others' blind spots. Identity controls stop credential-based attacks before they reach the device. Device compliance ensures endpoints meet a minimum security standard before accessing resources. Threat detection catches what gets past prevention and automatically triggers access enforcement. No single layer is sufficient alone. Together, they form a system that's significantly harder to breach than any one of them individually.

Device Lifecycle Security — From Enrollment to Ongoing Protection
Enroll Entra join +
Intune MDM
Configure Security baselines +
compliance policies
Protect Defender onboard +
ASR rules
Enforce CA requires
compliant device
Monitor Continuous risk
assessment + CAE
Threat detected
Risk level rises
Device non-compliant
Access blocked
Remediate + restore

Getting Started: A Practical Implementation Order

The temptation with a three-layer security model is to try to implement everything at once. That approach reliably fails. There are too many moving parts, too many potential conflicts between policies, and too much risk of locking users out of resources before you've validated the configuration. A phased approach lets you build each layer, validate it, and then connect it to the others.

Phase 1: Foundation (Weeks 1-3)

Start with the basics. Entra join the devices and enroll them in Intune — this is the prerequisite for everything else. Create a basic compliance policy that checks for the non-negotiables: BitLocker enabled, OS version current, antivirus active, firewall on. Deploy this compliance policy in report-only mode first so you can see which devices would fail without actually blocking anyone. Simultaneously, create a Conditional Access policy that requires MFA for all users on all cloud apps, but set it to report-only as well. Review the results for a week. Identify any devices that would fail compliance and remediate them. Then switch both policies to enforcement.

At this stage, users must authenticate with MFA and their device must meet basic compliance. This alone is a significant improvement over most environments. Don't rush past this phase — if MFA enrollment isn't complete or compliance failures are widespread, adding more complexity will compound the problems.

Phase 2: Hardening (Weeks 4-6)

With the foundation solid, add the hardening layer. Deploy the Microsoft security baseline through Intune configuration profiles to a pilot group, then expand. Onboard devices to Defender for Endpoint — this can be done through Intune endpoint security policies, which deploy the onboarding package to enrolled devices. Enable BitLocker enforcement (not just the compliance check, but the configuration profile that actually enables it). Review the initial Defender findings — every environment has misconfigurations and unresolved vulnerabilities that Defender will surface immediately. Prioritize the critical and high findings.

At this phase, you can also configure the Intune compliance policy to include the Defender machine risk level as a condition. Start with "high risk only = non-compliant" so that only actively compromised devices lose access. This connects Defender to the compliance/access enforcement loop for the first time.

Phase 3: Advanced Controls (Weeks 7-10)

Now layer in the more sophisticated controls. Enable risk-based Conditional Access policies using Entra ID Protection sign-in risk and user risk. Deploy ASR rules in audit mode, review the logs for two weeks, then enforce the rules that don't generate false positives. Evaluate and deploy Endpoint Privilege Management to remove local admin rights from users who don't need them. Begin mapping additional CIS benchmark controls through the Settings Catalog for anything the security baseline doesn't cover. Lower the Defender risk level threshold in your compliance policy from "high only" to "medium and high" if your remediation workflow can handle the volume.

Phase 4: Operations (Ongoing)

Security isn't a project with a completion date. Phase 4 is continuous. Monitor Microsoft Secure Score and use it as a prioritization tool — it surfaces the highest-impact improvements you haven't made yet. Build incident response procedures that account for the automated access revocation loop (when a device gets blocked by compliance, who investigates, and what's the expected response time?). Review Conditional Access sign-in logs regularly for unusual patterns. Update compliance policies as new threats emerge. Keep ASR rules current. Run quarterly reviews of your security baseline against the latest CIS benchmarks. And track what you've deferred and why, because auditors will ask.

Implementation Phases
Phase 1
Foundation
Entra join + Intune enrollment, basic compliance, MFA via Conditional Access
Phase 2
Hardening
Security baselines, Defender onboarding, BitLocker, risk-level compliance
Phase 3
Advanced
Risk-based CA, ASR rules, EPM, CIS alignment, tighter risk thresholds
Phase 4
Operations
Secure Score, incident response, quarterly reviews, continuous improvement

Common Gaps in Cloud-Only Security

Having all three products licensed and partially configured is not the same as having a secure environment. These are the gaps we see most frequently in cloud-only deployments that look reasonable on the surface but have significant blind spots.

MFA Without Device Compliance

This is the most common gap. The organization has MFA enforced through Conditional Access, which is good, but the Conditional Access policy doesn't require a compliant device. The result is that a user with valid credentials and a working MFA method can access corporate data from any device — a personal laptop with no antivirus, a shared family computer running an outdated OS, a compromised machine in a hotel business center. MFA protects the identity layer, but without device compliance, there's no assurance that the endpoint accessing the data meets any security standard at all. Adding "require compliant device" to your Conditional Access policies is one of the highest-impact changes you can make.

Defender Deployed but Not Integrated

The organization has Defender for Endpoint onboarded across the fleet. It's generating alerts, it's detecting threats, and someone in the security team probably checks the dashboard occasionally. But the Defender risk level isn't feeding into Intune compliance policies, which means there's no automatic consequence when a device has an active threat. The threat detection and the access control are running in parallel but not connected. An infected device can continue accessing Exchange, SharePoint, and Teams while the alert sits unread in the Defender portal. Connecting Defender risk level to Intune compliance takes five minutes to configure and fundamentally changes the security model from "detect and hope" to "detect and respond."

BitLocker Not Enforced

Some organizations skip BitLocker because "it's just a laptop" or because they had a bad experience with it years ago (recovery key chaos, performance concerns on older hardware). Modern BitLocker with TPM-backed encryption has negligible performance impact on any hardware manufactured in the last five years, and Intune handles recovery key escrow automatically — the recovery key is stored in Entra ID, accessible to admins through the portal. Without BitLocker, a lost or stolen laptop means a data breach. The entire hard drive is readable by anyone who can boot from a USB drive. This is not a theoretical risk; laptop theft is one of the most common sources of data exposure, and it's entirely preventable.

ASR Rules Skipped

Attack surface reduction rules are one of the most effective preventive controls in the Microsoft stack, and they're consistently underused. The usual reason is that they seem complex, or the team tried one rule, got a false positive that disrupted a user, and abandoned the whole feature. The correct approach is to deploy each rule in audit mode first, monitor the logs for a week or two, identify any legitimate applications that would be blocked, create exclusions for those applications, and then switch to block mode. Yes, it takes effort. But ASR rules that block Office macro child processes, credential theft from LSASS, and executable content from email clients prevent the most common initial access techniques in real-world attacks. Skipping them because they require testing is like skipping a seatbelt because it takes two seconds to buckle.

No Operational Monitoring

The final gap is the most insidious: the organization deployed all the security controls but nobody is watching the output. Defender generates alerts that go unread. Conditional Access sign-in logs show blocked attempts that nobody investigates. Compliance reports show a slow drift of devices falling out of compliance, and nobody follows up. Security tools without operational processes are security theater. Someone — whether it's an internal team, a managed security provider, or a designated admin with a daily review habit — must be responsible for monitoring alerts, investigating anomalies, and acting on findings. The tools do the detection. The operations do the response. You need both.

Final Takeaways

Cloud-only device security is not weaker than traditional domain-joined security. It's architecturally different. Instead of relying on a network perimeter and Group Policy to protect devices that happen to be inside the firewall, you're building a security model that works regardless of where the device is, based on identity verification, device health, and continuous threat monitoring. When the three layers — Entra ID, Intune, and Defender — are properly integrated, the result is a security posture that's identity-aware, device-aware, and threat-aware simultaneously. That's something traditional domain security never achieved.

The integration is the key. Three separate products running in three separate consoles with no connections between them is just three products. Three products with Defender risk signals feeding into Intune compliance, Intune compliance state feeding into Conditional Access, and Entra ID Protection risk signals adjusting access controls in real time — that's a security system. The closed loop between detection, compliance, and access enforcement is what makes the architecture work.

Start with the foundation: Entra join, Intune enrollment, basic compliance, MFA. Get that working cleanly. Then harden: security baselines, Defender onboarding, BitLocker enforcement. Then connect the dots: risk-based policies, ASR rules, and the Defender-to-Intune-to-CA integration that creates the automated response loop. Phase it. Validate each layer before adding the next. And then keep operating it — because security is a continuous function, not a deployment project.

If your organization is evaluating cloud-only endpoints or already running them without a coherent security layer, getting the architecture right is the highest-leverage investment you can make. The technology exists. The integration points are well-documented. The work is in designing the policies, testing them, and building the operational habits to keep them effective over time. That's where a partner with hands-on Intune and Defender experience can accelerate the process — not by installing software, but by designing the security architecture that ties it all together.

Chat with an engineer