Remotely Intune wipe devices in Defender for Endpoint isolation mode!

Intro

Microsoft recently announced that device isolation exclusions in Defender for Endpoint are now generally available. This made me think about possible use cases for this new feature. Together with Bjorn Claes, we explored whether it’s possible to exclude the Intune wipe process from isolation mode. If this works, it would allow us to remotely wipe devices using Intune while keeping them in isolation mode within Defender for Endpoint.

A special thanks to Rudy Ooms for his Intune Insights blogs, which helped us quickly identify the processes and services we needed to investigate. His blogs can you find here.

What’s new

Isolation exclusions allow designated processes or endpoints to bypass the restrictions of network isolation, ensuring essential functions continue while limiting broader network exposure. Previously you had only the option to allow outlook, Teams and Skype for business communication to be excluded while in isolation mode.

Now we the new option you can exclude based on:

  • Process path – You can define a specific executable path. Wildcards are supported for flexibility.
  • Service – You can exclude a Windows service (note: a service is not the same as an application).
  • Package familyThe Package Family Name (PFN) is a unique identifier assigned to Windows app packages. 

Set an exclusion for Intune RemoteWipe

Any exclusion weakens device isolation and increases security risks. To minimize risk, configure exclusions only when strictly necessary. Regularly review and update exclusions to align with security policies.

Before you can start with configurating the exclusion rules you first need to enable this new feature. You can do this by going to Defender XDR portal under Settings > Endpoints > Advanced Features > Isolation Exclusion Rules.

Now you are ready to configure the Isolation Exclusion Rules. You can find them again in the Defender XDR portal under Settings > Endpoints > Isolation Exclusion Rules . Click on ‘Add exclusion rule’

You will need to configure different policies for every process and services you want to exclude. The following list contains all those exclusions you need to configure to let the Intune remote Wipe work:

  • Process name:
    • C:\windows\system32\omadmclient.exe

Example rule for the omadmclient.exe :

  • Service name:
    • WpnService
    • CrypSvc
    • TokenBroker
    • IntuneManagementExtension
    • dmpwappushservice

Example rule for the service dmpwappushservice:

Once you have configured the exclusions you will notice that isolation options have changed:

Previously, you could simply check a box to automatically exclude apps like Teams, Outlook, or Skype. Now, that checkbox instead controls whether your custom-defined Isolation Exclusion Rules are applied.

Mapping Mitre attack techniques with allowed exclusions

I find it important to also point all the Mitre attack Techniques that available for the allowed exclusions. I suggest to review them one by one and determine the risk of them.

Set an exclusion for Outlook & Teams

If you are looking for a solution to exclude Outlook & Teams I can advise to have a look at Louis Mastelinck his blog post about this which you can find here: https://www.lousec.be/mde/isolation-exclusion-rules-fixing-microsoft-teams-outlook-communication-during-isolation/

Similar Posts

Leave a Reply

3 Comments

  1. Unsure if only C:\windows\system32\omadmclient.exe is needed or if all services is needed? What did you really setup?

    1. Hello,

      The following process:

      Process name:
      C:\windows\system32\omadmclient.exe

      And the following services:
      WpnService
      CrypSvc
      TokenBroker
      IntuneManagementExtension
      dmpwappushservice

      If you configure those as exclusions it should work!

      br, Thomas