Anavem
Languagefr
How to Enable Advanced Ransomware Protection in Microsoft Intune 2026

How to Enable Advanced Ransomware Protection in Microsoft Intune 2026

Configure Microsoft Defender's advanced ransomware protection through Intune's endpoint protection policies. Deploy Block-level protection to Windows 10+ devices with proper verification and monitoring.

March 26, 2026 15 min
hardmicrosoft-intune 10 steps 15 min

Why Configure Advanced Ransomware Protection in Microsoft Intune?

Ransomware attacks have evolved into one of the most devastating cybersecurity threats facing organizations today. Microsoft Intune's advanced ransomware protection provides enterprise-grade defense by leveraging Microsoft Defender's sophisticated heuristics and machine learning capabilities. This protection goes beyond traditional signature-based detection, using behavioral analysis to identify and block ransomware activities in real-time.

What Makes Microsoft Defender's Ransomware Protection Advanced?

The advanced protection feature combines client-side and cloud-based intelligence to detect ransomware behaviors before they can encrypt your data. Unlike basic antivirus solutions, this system monitors file system activities, process behaviors, and network communications to identify ransomware patterns. When configured through Intune, you gain centralized management across all Windows devices in your organization, ensuring consistent protection policies and simplified administration.

How Does Intune Integration Enhance Security Management?

Managing ransomware protection through Microsoft Intune provides several critical advantages. You can deploy consistent security policies across thousands of devices, monitor protection status from a single dashboard, and ensure that security settings cannot be tampered with locally. The integration with Microsoft's cloud intelligence means your devices benefit from global threat intelligence and rapid response to emerging ransomware variants. This tutorial will guide you through configuring Block-level protection, the strongest setting that automatically stops ransomware activities without user intervention, providing maximum security for your organization's critical data and systems.

Implementation Guide

Full Procedure

01

Access Microsoft Intune Admin Center and Navigate to Device Configuration

Start by logging into the Microsoft Intune admin center where you'll create the ransomware protection policy.

Open your browser and navigate to https://endpoint.microsoft.com. Sign in using your administrator credentials that have Intune management permissions.

Once logged in, navigate to the device configuration section:

  1. Click Devices in the left navigation pane
  2. Select Configuration from the submenu
  3. Click the + Create button
  4. Choose New policy from the dropdown

This opens the policy creation wizard where you'll configure the ransomware protection settings.

Pro tip: Bookmark the Intune admin center URL for quick access. The interface updates frequently, so familiarize yourself with the current navigation structure.

Verification: You should see the "Create a profile" page with platform and profile type selection options available.

02

Select Platform and Profile Type for Endpoint Protection

Configure the policy foundation by selecting the appropriate platform and protection profile type.

In the "Create a profile" dialog:

  1. Set Platform to Windows 10 and later
  2. Under Profile type, select Templates
  3. Choose Endpoint protection from the template list
  4. Click Create to proceed

The endpoint protection template provides comprehensive security settings including the advanced ransomware protection we need to configure.

Warning: Don't select "Settings catalog" unless you need granular control over specific settings. The endpoint protection template is the recommended approach for ransomware protection.

Alternatively, if you prefer the Settings catalog approach:

  1. Select Profile type as Settings catalog
  2. This gives you more granular control but requires more configuration steps

Verification: The policy creation wizard should advance to the "Basics" configuration page where you can name your policy.

03

Configure Policy Basics and Naming Convention

Establish clear policy identification and description for easy management and troubleshooting.

On the "Basics" page, configure the following:

  • Name: Advanced Ransomware Protection - Windows Devices
  • Description: Enables Microsoft Defender advanced ransomware protection with Block-level enforcement for all managed Windows 10/11 devices. Automatically stops ransomware-like activities using client and cloud heuristics.

Use a consistent naming convention that includes:

  • The security feature being configured
  • The target device platform
  • The enforcement level (Block, Audit, Warn)

Example naming patterns:

Advanced Ransomware Protection - Block Mode - Windows
Ransomware Defense - Audit Only - Test Group
Defender Ransomware - Warn Mode - Pilot Devices
Pro tip: Include the enforcement level in the policy name. This helps administrators quickly identify the protection level when reviewing multiple policies.

Click Next to proceed to the configuration settings.

Verification: The policy name appears in the breadcrumb navigation, and you should see the "Configuration settings" page load.

04

Navigate to Microsoft Defender Antivirus Ransomware Settings

Locate and access the specific ransomware protection settings within the endpoint protection configuration.

On the "Configuration settings" page, you'll see multiple categories of security settings. Navigate to the ransomware protection options:

  1. Scroll down to find Microsoft Defender Antivirus section
  2. Expand the section if it's collapsed
  3. Look for Rules to protect against ransomware or similar wording
  4. Click to expand this subsection

If using the Settings catalog approach instead:

  1. Click + Add settings
  2. In the settings picker, search for ransomware
  3. Select Defender > Use advanced protection against ransomware
  4. Click Add to include it in your policy

The ransomware protection setting controls how Microsoft Defender responds to potential ransomware activities on managed devices.

Warning: Some Intune interfaces may show this setting under different paths. If you can't find "Rules to protect against ransomware," search for "advanced protection against ransomware" in the settings catalog.

Verification: You should see the ransomware protection setting with a dropdown menu containing options like "Not configured," "Audit only," "Warn," and "Block."

05

Configure Advanced Ransomware Protection Level

Set the appropriate protection level based on your organization's security requirements and risk tolerance.

In the ransomware protection setting, you'll see these options:

Protection LevelBehaviorUse Case
Not configuredUses device default settingsWhen other policies manage this setting
Audit onlyLogs ransomware activities without blockingTesting and monitoring phase
WarnPrompts user before allowing suspicious actionsEnvironments requiring user interaction
BlockAutomatically stops ransomware-like activitiesProduction environments (recommended)

For maximum protection, configure the setting:

  1. Click the dropdown for Use advanced protection against ransomware
  2. Select Block for the highest security level
  3. This enables automatic blocking of ransomware-like behaviors using both client-side and cloud-based heuristics

The Block setting provides:

  • Real-time protection against file encryption attempts
  • Automatic quarantine of suspicious processes
  • Integration with Microsoft's cloud intelligence
  • Immediate threat response without user intervention
Pro tip: Start with "Audit only" in a test environment to understand the impact before deploying "Block" mode to production devices. Monitor the audit logs for false positives.

Verification: The setting should show "Block" as selected, and you should see additional configuration options if available for your Intune version.

06

Configure Additional Defender Settings and Exclusions

Optimize the ransomware protection by configuring complementary security settings and necessary exclusions.

While still in the Microsoft Defender Antivirus section, review and configure these related settings:

Tamper Protection (Recommended)

  1. Find Tamper Protection setting
  2. Set to Enable to prevent local changes to security settings
  3. This prevents ransomware from disabling Defender protection

Cloud Protection Level

  1. Locate Cloud-delivered protection level
  2. Set to High or High plus for enhanced detection
  3. This improves ransomware detection using Microsoft's cloud intelligence

File and Folder Exclusions (If Needed)

If your organization has legitimate applications that might trigger false positives:

Example exclusions (configure only if necessary):
C:\MyApp\Data\*
*.myappextension
C:\LegitimateBackupTool\
Warning: Be extremely cautious with exclusions. Each exclusion creates a potential attack vector. Only add exclusions after thorough testing and approval from your security team.

Additional recommended settings:

  • Real-time protection: Enable
  • Behavior monitoring: Enable
  • Network inspection system: Enable
  • Script scanning: Enable

Verification: Review all configured settings in the summary view. Tamper Protection should be enabled, and cloud protection should be set to High level.

07

Assign Policy to Target Device Groups

Deploy the ransomware protection policy to the appropriate device groups in your organization.

Click Next to reach the "Assignments" page. Here you'll specify which devices receive this protection policy.

Recommended Assignment Strategy

  1. Click + Add groups under "Included groups"
  2. Select your target groups:
Recommended group assignments:
- All Windows Devices (for organization-wide protection)
- Critical Business Systems (for high-value targets)
- Executive Devices (for high-risk users)
- Finance Department Devices (for sensitive data access)

Phased Deployment Approach

For large organizations, consider a phased rollout:

  1. Phase 1: IT Department devices (10-20 devices)
  2. Phase 2: Pilot group (100-200 devices)
  3. Phase 3: Department by department
  4. Phase 4: Organization-wide deployment

Exclusion Groups (If Needed)

If certain devices need different protection levels:

  1. Click + Add groups under "Excluded groups"
  2. Select groups that should not receive this policy
  3. Example: Test devices, kiosk systems, or devices with conflicting security software
Pro tip: Use Azure AD dynamic groups based on device properties (OS version, department, device type) to automatically assign policies as new devices are enrolled.

Verification: The assignment summary should show your selected included and excluded groups with the expected device count for each group.

08

Review and Create the Ransomware Protection Policy

Perform a final review of all policy settings before deployment to ensure correct configuration.

Click Next to reach the "Review + create" page. This page displays a comprehensive summary of your policy configuration.

Review Checklist

Verify the following settings are correct:

  • Policy name: Clear and descriptive
  • Platform: Windows 10 and later
  • Ransomware protection: Set to "Block" (or your chosen level)
  • Tamper protection: Enabled
  • Cloud protection: High level
  • Target groups: Appropriate device groups selected
  • Exclusions: Minimal and justified

Policy Configuration Summary

{
  "policyName": "Advanced Ransomware Protection - Windows Devices",
  "platform": "Windows 10 and later",
  "profileType": "Endpoint protection",
  "ransomwareProtection": "Block",
  "tamperProtection": "Enabled",
  "cloudProtection": "High",
  "assignedGroups": ["All Windows Devices"],
  "excludedGroups": []
}

Once you've verified all settings:

  1. Click Create to deploy the policy
  2. The policy will be created and begin deploying to assigned devices
  3. You'll be redirected to the policy overview page
Warning: Once created, the policy immediately begins deploying to assigned devices. Ensure all settings are correct before clicking Create, as changes require policy updates.

Verification: The policy appears in the Configuration profiles list with a "Deployment status" showing the rollout progress to target devices.

09

Monitor Policy Deployment and Device Compliance

Track the policy deployment progress and verify that devices are receiving and applying the ransomware protection settings.

Monitor Deployment Status

  1. In the Intune admin center, navigate to Devices > Configuration
  2. Click on your "Advanced Ransomware Protection" policy
  3. Review the Overview tab for deployment statistics

The overview shows:

  • Assignment status: Success, Error, Conflict counts
  • Device status: Compliant vs non-compliant devices
  • User status: Users affected by the policy

Check Individual Device Status

  1. Click the Device status tab
  2. Review individual device compliance
  3. Look for devices showing "Error" or "Conflict" status

Common status indicators:

✓ Success: Policy applied successfully
⚠ Pending: Policy deployment in progress
✗ Error: Policy failed to apply
⚡ Conflict: Conflicting policies detected

Verify Protection in Microsoft Defender Portal

  1. Navigate to https://security.microsoft.com
  2. Go to Settings > Endpoints > Advanced features
  3. Verify that ransomware protection is active
  4. Check the Vulnerability management dashboard for security posture
Pro tip: Set up automated reports in the Defender portal to receive weekly summaries of ransomware protection status across your organization.

Verification: Run this PowerShell command on a test device to confirm the policy is applied:

Get-MpPreference | Select-Object EnableControlledFolderAccess, AttackSurfaceReductionRules_RuleSpecificExclusions
10

Test and Validate Ransomware Protection Effectiveness

Perform controlled testing to ensure the ransomware protection is working correctly without disrupting business operations.

Safe Testing Methods

Use Microsoft's official testing tools and methods:

  1. EICAR Test File: Download the EICAR anti-malware test file
  2. PowerShell Test: Run controlled suspicious activities
  3. Defender ATP Demo: Use Microsoft's demo scenarios

PowerShell Ransomware Simulation

Run this safe test on a non-production device:

# Create a test file
New-Item -Path "C:\temp\testfile.txt" -ItemType File -Force
Add-Content -Path "C:\temp\testfile.txt" -Value "This is a test file"

# Attempt to encrypt (this should be blocked)
try {
    $content = Get-Content "C:\temp\testfile.txt"
    $encrypted = [System.Convert]::ToBase64String([System.Text.Encoding]::UTF8.GetBytes($content))
    Set-Content -Path "C:\temp\testfile.encrypted" -Value $encrypted
    Write-Host "WARNING: Encryption was not blocked!" -ForegroundColor Red
} catch {
    Write-Host "SUCCESS: Ransomware protection blocked the action" -ForegroundColor Green
}

Monitor Test Results

  1. Check Windows Event Viewer for Defender events
  2. Review alerts in the Microsoft Defender portal
  3. Verify blocked actions appear in security reports

Event Log Verification

Check these event logs for ransomware protection activity:

Event Log Locations:
- Applications and Services Logs > Microsoft > Windows > Windows Defender
- Event ID 1116: Malware detected
- Event ID 1117: Action taken on malware
- Event ID 5007: Configuration changed
Warning: Never test with real ransomware samples. Use only Microsoft-approved testing methods and tools. Real malware can cause irreversible damage even in test environments.

Validate User Experience

  1. Test legitimate file operations to ensure no false positives
  2. Verify users can perform normal business activities
  3. Document any applications that require exclusions

Verification: Successful testing shows blocked malicious activities in logs while allowing legitimate operations to proceed normally.

Frequently Asked Questions

What's the difference between Block, Warn, and Audit modes in Microsoft Intune ransomware protection?+
Block mode automatically stops ransomware-like activities without user intervention, providing maximum protection. Warn mode prompts users before allowing suspicious actions, giving them the choice to proceed or block. Audit mode only logs ransomware activities without blocking them, useful for testing and monitoring. Block mode is recommended for production environments as it provides immediate, automatic protection against ransomware threats using Microsoft's advanced heuristics.
How long does it take for Microsoft Intune ransomware protection policies to deploy to devices?+
Intune policies typically deploy within 8 hours during normal device check-ins, but can be faster if devices are actively online. You can force immediate policy application by opening the Company Portal app on target devices and clicking 'Check for updates' or 'Sync'. The deployment time depends on device connectivity, network conditions, and the device's last check-in time. Monitor deployment progress through the Intune admin center's policy status dashboard.
Can Microsoft Intune ransomware protection cause false positives with legitimate business applications?+
Yes, Block mode can occasionally flag legitimate applications that exhibit file encryption behaviors, such as backup software, database applications, or document management systems. To minimize false positives, start with Audit mode to identify potential conflicts, then create specific exclusions for verified legitimate applications. Always test exclusions thoroughly and limit them to specific file paths or processes rather than broad exclusions that could create security gaps.
Does Microsoft Intune ransomware protection work offline or require internet connectivity?+
Microsoft Defender's ransomware protection includes both offline client-side heuristics and cloud-based intelligence. Basic protection works offline using local behavioral analysis and signature databases. However, cloud connectivity enhances protection significantly by providing real-time threat intelligence, advanced machine learning models, and immediate updates about new ransomware variants. For optimal protection, ensure devices have regular internet connectivity to receive cloud-enhanced security updates.
How do I troubleshoot Microsoft Intune ransomware protection policy conflicts or deployment failures?+
Check the Intune admin center's device status tab for specific error codes and conflict details. Common issues include conflicting security policies, tamper protection preventing changes, or insufficient device permissions. Review Windows Event Viewer logs under Microsoft > Windows > DeviceManagement-Enterprise-Diagnostics-Provider for detailed error information. Ensure devices are properly enrolled in Intune, have the latest Windows updates, and that no third-party security software conflicts with Microsoft Defender settings.

Discussion

Share your thoughts and insights

Sign in to join the discussion