top of page
Writer's pictureNathan Hutchinson

Seamlessly Migrating from Symantec Endpoint Protection to Microsoft Defender for Business

Table of Contents



Introduction

I recently worked on a project for a client who wanted to migrate their endpoint security solution from Symantec Endpoint Protection (SEP) to Microsoft Defender for Business (MDB). This is the Defender for Endpoint (MDE) plan included in the Business Premium license, which they aimed to maximise the value of. The client’s devices were fully managed with Intune, comprising a mix of hybrid and Entra ID-joined endpoints.

In this blog, I’ll share the process we followed, challenges we encountered, and how we overcame them, including a PowerShell script I created to streamline the migration.


Understanding Defender for Endpoint Modes

One of the standout features of Microsoft Defender is its flexibility in running modes. Let’s explore two key modes that make migrations like this one a breeze.


Passive Mode

Defender’s Passive Mode activates automatically when a device is onboarded to Defender for Endpoint and a third-party antivirus (AV) solution is already installed. In this mode, Microsoft Defender Antivirus (MDAV) disables its AV features, such as file scanning and threat remediation, recognising the presence of another AV solution.

This means there’s no need to uninstall Defender when using a third-party solution—it automatically goes into hibernation. Likewise, if you uninstall the third-party AV, Defender seamlessly switches back to Active Mode. A quick note: Passive Mode is only available for desktop operating systems, as Windows Server behaves differently.


EDR in Block Mode

EDR (Endpoint Detection and Response) in Block Mode builds upon Passive Mode. While MDAV remains disabled, EDR capabilities stay active. This means post-breach functionality, such as alerting and remediation, continues to operate via Defender’s EDR service, Microsoft Sense.

This mode supports a defence-in-depth approach, providing an additional layer of protection against malicious artefacts even if Defender isn’t the primary endpoint security solution.


Migration Strategy

For this client, the migration followed three straightforward steps:

  1. Enable EDR in Block Mode: This acted as a safety net during the transition, ensuring continuous EDR protection while SEP was still active.

  2. Onboard devices to Defender for Endpoint: Using Intune, we configured an Endpoint Detection and Response (EDR) policy to onboard devices to Defender for Business, along with appropriate configuration policies for MDAV, Firewall and Attack Surface Reduction.

  3. Uninstall Symantec Endpoint Protection: After onboarding, we disabled Tamper Protection and Password Protection via SEPM policy, then removed SEP using our platform script to fully enable Defender’s Active Mode.


Step-by-Step Process

Microsoft’s documentation clearly outlines the recommended steps:

  • Update your devices, and prep your team.

  • Configure Defender policies within Intune.

  • Deploy policies to a pilot group of devices.

  • Onboard devices to Microsoft Defender for Endpoint.

  • Uninstall 3rd party solution.


Defender for Endpoint migration process

As we Intune managed the entire process, the transition was smooth and served as a great opportunity to upskill the team.


Challenges and Solutions

Lack of Remote Uninstall for SEP

One surprising challenge was the lack of a remote uninstall option for SEP via the management portal. Previous AV solutions I’ve migrated from usually had either a cloud-based or on-premises dashboard to execute remote uninstall commands.

Upon reviewing Broadcom’s documentation, I discovered that SEP removal requires either Group Policy or PowerShell. Since most of the client’s devices were cloud-native and Intune-managed, Group Policy wasn’t an option.


Using Intune and PowerShell for SEP Removal

To address this, I created a PowerShell script to uninstall SEP. This script was deployed using Intune’s script deployment feature, aligning with modern management practices. It would have been a better option to use remediation scripts here, but due to licensing we were limited. Don’t forget to disable Tamper Protection and Password Protection via SEPM policy, failing to do this would cause the uninstall to fail.


As soon as SEP was removed, Defender automatically activated, thanks to its Passive Mode capabilities. The script I developed is included below and available on my GitHub repository along with Intune deployment steps.


Key Takeaways

This project marked my first migration from Symantec Endpoint Protection, and while the lack of remote uninstall was disappointing, the experience highlighted the power of Microsoft’s security ecosystem, and the ease of use around Intune.


The combination of Defender’s Passive Mode, EDR in Block Mode, and Intune’s modern management capabilities ensured a seamless transition. The PowerShell script is now a reusable asset for future migrations, and I’m thrilled to have helped another client begin their Microsoft security journey.


PowerShell Script for SEP Removal



168 views0 comments

Recent Posts

See All

©2022 by Nate Hutchinson. All rights reserved.

bottom of page