Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
In an enterprise scenario, security operation teams are typically assigned a set of devices. These devices are grouped together based on a set of attributes such as their domains, computer names, or designated tags.
In Microsoft Defender for Endpoint, you can create device groups and use them to:
Limit access to related alerts and data to specific Microsoft Entra user groups with assigned RBAC roles
Configure different auto-remediation settings for different sets of devices
Assign specific remediation levels to apply during automated investigations
In an investigation, filter the Devices list to specific device groups by using the Group filter.
You can create device groups in the context of role-based access (RBAC) to control who can take specific action or see information by assigning the device group(s) to a user group. For more information, see Manage portal access using role-based access control.
Specify the matching rule that determines which device group belongs to the group based on the device name, domain, tags, and OS platform. If a device is also matched to other groups, it's added only to the highest ranked device group.
Select the Microsoft Entra user group that should have access to the device group.
Rank the device group relative to other groups after it's created.
Note
A device group is accessible to all users if you don't assign any Microsoft Entra groups to it.
Create a device group
In the navigation pane, select Settings > Endpoints > Permissions > Device groups.
Click Add device group.
Enter the group name and automation settings and specify the matching rule that determines which devices belong to the group. See How the automated investigation starts.
You can promote or demote the rank of a device group so that it's given higher or lower priority during matching. A device group with a rank of 1 is the highest ranked group. When a device is matched to more than one group, it's added only to the highest ranked group. You can also edit and delete groups.
Warning
Deleting a device group may affect email notification rules. If a device group is configured under an email notification rule, it will be removed from that rule. If the device group is the only group configured for an email notification, that email notification rule will be deleted along with the device group.
By default, device groups are accessible to all users with portal access. You can change the default behavior by assigning Microsoft Entra user groups to the device group.
Devices that aren't matched to any groups are added to Ungrouped devices (default) group. You cannot change the rank of this group or delete it. However, you can change the remediation level of this group, and define the Microsoft Entra user groups that can access this group.
Note
Applying changes to device group configuration may take up to several minutes.
Add device group definitions
Device group definitions can also include multiple values for each condition. You can set multiple tags, device names, and domains to the definition of a single device group.
Create a new device group, then select Devices tab.
Add the first value for one of the conditions.
Select + to add more rows of the same property type.
Tip
Use the 'OR' operator between rows of the same condition type, which allows multiple values per property.
You can add up to 10 rows (values) for each property type - tag, device name, domain.
This module provides instruction on how to create groups for distributing email to multiple users within Exchange Online. It also explains how to create groups to support collaboration in SharePoint Online.
Plan and execute an endpoint deployment strategy, using essential elements of modern management, co-management approaches, and Microsoft Intune integration.