Remotely Intune wipe devices in Defender for Endpoint isolation mode!
Intro
Microsoft recently announced that device isolation exclusions in Defender for Endpoint are now generally available. This made me think about possible use cases for this new feature. Together with Bjorn Claes, we explored whether it’s possible to exclude the Intune wipe process from isolation mode. If this works, it would allow us to remotely wipe devices using Intune while keeping them in isolation mode within Defender for Endpoint.
A special thanks to Rudy Ooms for his Intune Insights blogs, which helped us quickly identify the processes and services we needed to investigate. His blogs can you find here.
What’s new
Isolation exclusions allow designated processes or endpoints to bypass the restrictions of network isolation, ensuring essential functions continue while limiting broader network exposure. Previously you had only the option to allow outlook, Teams and Skype for business communication to be excluded while in isolation mode.
Now we the new option you can exclude based on:
- Process path – You can define a specific executable path. Wildcards are supported for flexibility.
- Service – You can exclude a Windows service (note: a service is not the same as an application).
- Package family – The Package Family Name (PFN) is a unique identifier assigned to Windows app packages.Â
Set an exclusion for Intune RemoteWipe
Any exclusion weakens device isolation and increases security risks. To minimize risk, configure exclusions only when strictly necessary. Regularly review and update exclusions to align with security policies.
Before you can start with configurating the exclusion rules you first need to enable this new feature. You can do this by going to Defender XDR portal under Settings > Endpoints > Advanced Features > Isolation Exclusion Rules.

Now you are ready to configure the Isolation Exclusion Rules. You can find them again in the Defender XDR portal under Settings > Endpoints > Isolation Exclusion Rules . Click on ‘Add exclusion rule’

You will need to configure different policies for every process and services you want to exclude. The following list contains all those exclusions you need to configure to let the Intune remote Wipe work:
- Process name:
- C:\windows\system32\omadmclient.exe
Example rule for the omadmclient.exe :

- Service name:
- WpnService
- CrypSvc
- TokenBroker
- IntuneManagementExtension
- dmpwappushservice
Example rule for the service dmpwappushservice:

Once you have configured the exclusions you will notice that isolation options have changed:

Previously, you could simply check a box to automatically exclude apps like Teams, Outlook, or Skype. Now, that checkbox instead controls whether your custom-defined Isolation Exclusion Rules are applied.
Mapping Mitre attack techniques with allowed exclusions
I find it important to also point all the Mitre attack Techniques that available for the allowed exclusions. I suggest to review them one by one and determine the risk of them.
- Omadmclient.exe
- T1569.002 – Service Execution
- Adversaries may abuse Windows services to execute malicious payloads. Since
omadmclient.exeruns as a service, attackers may attempt to hijack or mimic it.
- Adversaries may abuse Windows services to execute malicious payloads. Since
- T1021.006 – Windows Remote Management (WinRM)
- WinRM can be used to remotely trigger processes like
omadmclient.exe, especially in lateral movement scenarios.
- WinRM can be used to remotely trigger processes like
- T1059 – Command and Scripting Interpreter
- Attackers may use PowerShell or CMD to invoke or manipulate
omadmclient.exefor execution or configuration changes.
- Attackers may use PowerShell or CMD to invoke or manipulate
- T1204.002 – User Execution: Malicious File
- If
omadmclient.exeis tricked into executing a malicious configuration or script, it could be part of a user execution chain.
- If
- T1134 – Access Token Manipulation
- Attackers may manipulate tokens to run
omadmclient.exeunder elevated privileges or impersonated contexts.
- Attackers may manipulate tokens to run
- T1569.002 – Service Execution
- WpnService (Windows Push Notification Service)
- T1046 – Network Service Discovery
- Adversaries may scan for services like WpnService to identify targets or vulnerabilities.
- T1046 – Network Service Discovery
- CrypSvc (Cryptographic Services)
- T1496 – Resource Hijacking
- Attackers may abuse system services like CrypSvc for resource-intensive tasks such as cryptomining.
- T1496 – Resource Hijacking
- TokenBroker
- T1134 – Access Token Manipulation
- TokenBroker is involved in authentication flows; attackers may manipulate access tokens to escalate privileges or evade defenses.
- T1078 – Valid Accounts
- Abuse of valid tokens and accounts for persistence or lateral movement.
- T1134 – Access Token Manipulation
- IntuneManagementExtension
- T1176 – Software Extensions
- Attackers may abuse software deployment mechanisms like IntuneManagementExtension to persist or execute payloads.
- T1021 – Remote Services
- Could be used for remote execution or lateral movement via Intune-managed scripts.
- T1176 – Software Extensions
- Dmpwappushservice (WAP Push Message Routing Service)
- T1003 – OS Credential Dumping
- May be targeted or monitored during credential harvesting.
- T1046 – Network Service Discovery
- Could be discovered during scans for exploitable services.
- T1110 – Brute Force
- May be involved in brute force attempts if exposed to network authentication.
- T1003 – OS Credential Dumping
Set an exclusion for Outlook & Teams
If you are looking for a solution to exclude Outlook & Teams I can advise to have a look at Louis Mastelinck his blog post about this which you can find here: https://www.lousec.be/mde/isolation-exclusion-rules-fixing-microsoft-teams-outlook-communication-during-isolation/
Unsure if only C:\windows\system32\omadmclient.exe is needed or if all services is needed? What did you really setup?
Hello,
The following process:
Process name:
C:\windows\system32\omadmclient.exe
And the following services:
WpnService
CrypSvc
TokenBroker
IntuneManagementExtension
dmpwappushservice
If you configure those as exclusions it should work!
br, Thomas
Worked like a charm 🙂