Defender for Endpoint Onboarding & Connectivity Troubleshooting in a Filtered Enterprise Network
This project documents the onboarding validation and post-onboarding troubleshooting of Microsoft Defender for Endpoint on a Windows Server Domain Controller inside a filtered enterprise-style lab network. Although the Defender sensor service was installed and running, the device reported a configuration enforcement and connectivity issue in the Microsoft security portal. The root cause was traced to DNS-based filtering interfering with required Microsoft Defender cloud endpoints.
Project Objective
The objective of this project was to:
- validate Microsoft Defender for Endpoint health on a Windows Server / Domain Controller
- troubleshoot a Microsoft portal configuration enforcement error
- determine whether the problem was caused by DNS, firewall, endpoint state, or onboarding failure
- restore required Microsoft Defender connectivity without weakening the lab’s filtering posture
- document a reliable server-specific validation method for Microsoft Defender for Endpoint
- confirm Defender for Identity sensor health where applicable
- create an operational troubleshooting reference for filtered enterprise networks
This project was designed to reflect a real-world scenario where endpoint security tooling must coexist with aggressive DNS and edge filtering controls.
Environment Overview
Affected System
- Host: CORP-DC01
- Role: Domain Controller
- Platform: Windows Server
- Function: Tier-0 identity infrastructure and Microsoft security onboarding target
Network Context
The device existed behind a filtered security architecture that included:
- pfSense at the edge
- pfBlockerNG DNSBL and IP reputation controls
- segmented VLAN design
- controlled outbound security filtering
- enterprise-style DNS handling through internal infrastructure
Security Stack Context
The affected server was expected to support:
- Microsoft Defender Antivirus
- Microsoft Defender for Endpoint
- Microsoft Defender for Identity sensor operations
- Microsoft Sentinel ingestion
- hybrid identity workflows via Microsoft Entra ID
Problem Statement
After onboarding activity, Microsoft security tooling indicated that the device had a configuration enforcement or connectivity issue.
This created an ambiguous state:
- onboarding appeared partially complete
- core services were running locally
- general internet connectivity existed
- portal health was not clean
- policy and telemetry confidence could not be assumed
The project therefore became a full operational investigation into whether the problem was:
- a failed onboarding
- a DNS resolution issue
- a TCP/443 reachability issue
- a service-state issue
- a validation-method misunderstanding
- or some combination of the above
Initial Validation
1. Defender Local Health Checks
The first stage focused on confirming the local state of Defender on the Windows Server.
Commands used:
Get-MpComputerStatusGet-Service Sense
Observed indicators:
- Antivirus enabled
- Real-time protection enabled
- behavior monitoring enabled
- signatures current
- Sense service running
- tamper protection enabled via ATP
- host recognized as a virtual machine
Initial conclusion: the local Microsoft Defender stack appeared healthy.
2. Baseline Internet Validation
General outbound connectivity was tested to determine whether the device had a broad internet access problem.
Example validation:
Invoke-WebRequest https://www.microsoft.com
The request succeeded, confirming that general outbound HTTPS was functional.
Troubleshooting Workflow
3. Endpoint Connectivity Testing
The next phase focused on specific Microsoft Defender-related endpoints.
Example tests performed:
Invoke-WebRequest https://winatp-gw-cus.microsoft.com/pingInvoke-WebRequest https://winatp-cus.microsoft.com/pingTest-NetConnection endpoint.security.microsoft.com -Port 443Test-NetConnection security.microsoft.com -Port 443Test-NetConnection login.microsoftonline.com -Port 443Test-NetConnection enterpriseregistration.windows.net -Port 443
Key findings:
- some Microsoft endpoints were reachable
- some requests returned HTTP 404, which still indicated network reachability
- at least one critical endpoint failed with remote name could not be resolved
endpoint.security.microsoft.comfailed DNS resolution- general Microsoft services like
security.microsoft.comandlogin.microsoftonline.comwere reachable
4. Sense Service Handling
The Sense service was checked to ensure that the MDE sensor component was present and active.
Get-Service Sense
The Sense service was running. Attempts to restart it were not the correct primary fix path and were also complicated by service protection and privilege boundaries.
Root Cause Analysis
The primary root cause was identified as:
DNS-based filtering interfering with resolution of required Microsoft Defender for Endpoint cloud endpoints.
Evidence supporting this conclusion:
- general internet access worked
- some Microsoft security endpoints were reachable
- specific Defender-related hostnames failed DNS resolution
- the environment used pfBlockerNG DNSBL
- post-whitelist rebuild behavior aligned with restored resolution expectations
- the portal error described connectivity enforcement issues, which matched the DNS findings
In enterprise or semi-enterprise environments, security filtering can accidentally block cloud telemetry, service discovery, or Microsoft security platform dependencies. This was a real operational dependency conflict.
Remediation
pfBlockerNG DNSBL Review
Because the network edge used pfBlockerNG with multiple DNSBL and IP reputation feeds, the remediation path focused on reviewing filtering behavior and whitelisting required domains.
Microsoft Defender Domain Whitelisting
Core Defender-related endpoints:
.wdatp.comwinatp-gw.microsoft.comwinatp-gw-cus.microsoft.comwinatp-cus.microsoft.comendpoint.security.microsoft.com.security.microsoft.com
Telemetry / pipeline-related domains:
browser.pipe.aria.microsoft.com.aria.microsoft.com.events.data.microsoft.com
Shared Microsoft service dependencies:
.bing.com.msn.com.windows.com
Allowing only the obvious primary endpoint is often not enough. Microsoft security products depend on multiple service, telemetry, and supporting domains.
DNSBL Rebuild and Service Reload
After whitelist updates, DNSBL was rebuilt and Unbound / DNSBL services were restarted through pfBlockerNG. This refreshed the filtering layer cleanly and allowed subsequent validation to proceed.
Validation After Remediation
DNS Validation
Resolve-DnsName endpoint.security.microsoft.comnslookup endpoint.security.microsoft.com
Expected result: previously failing Defender-related domains now resolve successfully.
TCP/443 Validation
Test-NetConnection endpoint.security.microsoft.com -Port 443
Expected result: DNS and outbound HTTPS path both restored.
Local Service Validation
Get-Service SenseGet-MpComputerStatus
Expected state: Sense running, Defender enabled, real-time protection enabled, signatures current.
Portal-Side Validation
Final authority for health confirmation is the Microsoft security portal. Expected improvements included:
- connectivity enforcement error clears
- device reports healthy / up to date state
- telemetry and policy handling normalize
Server-Specific Validation Insight
Why OnboardingState Was Misleading
One of the most important lessons in this project was that Windows Server does not expose onboarding status in the same way as Windows client devices.
Get-MpComputerStatus | Select OnboardingState
A blank OnboardingState on Windows Server is not, by itself, proof of failed onboarding.
Correct Validation Model for Servers
- Sense service state
- Defender health indicators
- DNS and endpoint connectivity tests
- portal device visibility and health
- Defender for Identity sensor status where relevant
Defender for Identity Sensor Findings
The environment also included Defender for Identity sensor validation.
- sensor page and workflows were reviewed
- the Domain Controller sensor appeared present
- service status showed running
- health showed healthy
- version data appeared current
Where the sensor showed running and healthy state, Defender for Identity was already in a good operational condition.
ADCS / ADFS “Unable to Determine” Interpretation
A related portal observation involved “Unable to determine” status for ADCS / ADFS-related visibility. In this case, the most likely explanation was that those roles were not installed on the server.
This is not automatically an error. It can simply mean the role is not deployed or not applicable in the current architecture.
Challenges Encountered
- one security control impaired another: DNSBL filtering interfered with cloud security tooling
- distinguishing local service health from cloud onboarding completion
- separating DNS failures from transport failures
- interpreting Microsoft portal health correctly in a server environment
- avoiding misleading client-style validation assumptions on Windows Server
Without proper interpretation, the environment could easily have been misdiagnosed as a bad onboarding, broken Sense service, or failed internet access problem.
Security & Operational Value
This project demonstrates practical capability in:
- Microsoft Defender for Endpoint troubleshooting
- Windows Server security validation
- DNS and network dependency analysis
- pfBlockerNG DNSBL operations
- Microsoft endpoint whitelisting strategy
- interpreting cloud security platform health correctly
- resolving conflicts between network security controls and endpoint tooling
- Defender for Identity validation
- portal-to-host troubleshooting workflow
Operationally, this project matters because successful onboarding is not just about installing an agent or seeing a running service. Real success depends on cloud connectivity, correct DNS behavior, endpoint health, portal-side validation, and architecture-aware interpretation of status indicators.
Outcome
This project successfully identified and remediated a Microsoft Defender for Endpoint connectivity enforcement issue caused by DNS-based filtering in the lab’s security architecture. It also established a more accurate and operationally sound validation method for Microsoft Defender on Windows Server, avoiding misleading client-side assumptions such as blank OnboardingState interpretation.
The result was a healthier, more trustworthy Microsoft security posture for the domain controller and a documented troubleshooting pattern that can be applied to filtered enterprise environments in the future.