What Good Endpoint Management Actually Looks Like

Team Neuron

They had antivirus on every machine. They were sure of it. That's what we were told in the kickoff call. The previous IT person had set it up two years ago, it was the licensed enterprise edition, and it was running everywhere it needed to be.

A week into the engagement, we ran the first endpoint inventory. There were 47 workstations. The antivirus management console showed 31. Of those 31, eight hadn't checked in for over 90 days. Three were running a version two major releases behind. One was a desktop in the warehouse that had been turned on for the first time in eleven months and was actively trying to phone home to a malware command-and-control server that was on every blocklist published since 2024.

This isn't a story about that particular antivirus product. It's a story about what "we have antivirus" means in an environment without endpoint management. It means: somebody installed antivirus, once, and nobody has looked at what's actually running since.

What Endpoint Management Actually Covers

When we say endpoint management, we mean the operational discipline of knowing, configuring, and maintaining every device that connects to your environment. Workstations, laptops, mobile devices, and the increasing population of in-between things — Surface tablets, Chromebooks, kiosk devices, shared workstations on a shop floor.

The components a complete endpoint management program covers:

  • Inventory. What devices exist, who they belong to, what's installed on them, and when they last checked in.
  • Identity binding. Each device is associated with a known user account, joined to a known directory (Active Directory, Entra ID, or both), and authenticates through known mechanisms.
  • Configuration baselines. Each device matches a defined baseline for OS settings, security policies, installed applications, and allowed or blocked behaviors. Deviations from baseline are visible.
  • Patching. OS and application updates are deployed on a schedule with rings, validation, and rollback paths.
  • Disk encryption. Storage is encrypted at rest. Recovery keys are escrowed somewhere the IT team can retrieve them.
  • Endpoint detection and response (EDR). Modern threat detection that goes beyond signature-based AV. The console shows what's happening on every endpoint, in near-real-time.
  • Application control. Allowed applications can run. Unallowed ones can't. This used to be aspirational for small environments; modern MDM platforms make it feasible.
  • Device retirement. When a device leaves the fleet, it's wiped, decommissioned, and removed from licensing and identity systems.

Most SMBs have one or two of these. The well-managed ones have most of them. The ones in the kickoff-call story had antivirus and not much else.

Why Most SMB Endpoint Postures Are Fragmented

The fragmentation isn't accidental. It's the product of incremental decisions, each rational at the time:

  • Antivirus was bought when somebody got a virus.
  • Windows updates were left on auto because they didn't want to manage them.
  • Office and Adobe licenses were bought direct from Microsoft and Adobe portals, with no MDM enforcement.
  • Laptops were bought from a retail vendor and handed to employees without going through an enrollment process.
  • New hires got administrator rights on their own workstations because IT didn't want to gatekeep every install.
  • The conference room PC was set up by the AV consultant and has never been touched since.

After three or four years of decisions like these, the endpoint posture is a mosaic. There's no single source of truth. Devices age out of compliance silently. New devices come in through paths IT doesn't control. Identity sprawls across local accounts, Entra accounts, and personal Microsoft accounts.

This isn't a moral failure. It's what an unmanaged environment looks like by default. The work to consolidate it into a managed environment is real and it doesn't happen by accident.

What Good Looks Like

One enrollment path

Every device that enters the environment goes through one enrollment path. For most SMBs, that's Microsoft Intune (or another MDM). When a new laptop is purchased, it gets autopilot-enrolled before it leaves the IT bench. The user receives it, signs in, and the device automatically configures itself: baseline policies applied, allowed applications installed, encryption enabled, EDR agent deployed, user identity bound.

The discipline isn't the tooling. It's that there is no other way for a device to enter the environment. No "I bought this laptop on Amazon and brought it to work." No "the previous IT person set this one up manually." If it's not enrolled through the standard path, it doesn't get the access.

One identity per user

Every user has one identity that controls access to everything: the workstation login, email, file shares, SaaS apps. Local accounts on workstations exist only for IT recovery. Personal Microsoft accounts don't sign into managed devices. MFA is enforced on the one identity, not retrofitted onto each individual application.

This is the work that pays off when somebody leaves the company. You disable the one identity, and access ends everywhere. You don't have to remember which seven SaaS accounts they had separately.

One baseline, enforced

There's a defined set of settings every managed device matches: disk encryption on, firewall on, screen lock policy, allowed Wi-Fi profiles, EDR agent running, OS within N versions of current. The MDM console shows you which devices are out of compliance. Out-of-compliance devices either get remediated automatically or block conditional access to the resources you care about.

The point of the baseline isn't conformity. It's visibility. Without a baseline, you can't see drift. With one, you can.

One patching discipline

Updates ship to a test ring first, then to the broader fleet. Application updates and OS updates are both managed. Failed deployments are visible. Rollback paths exist. We covered this in detail in a practical guide to safer software rollouts.

One inventory you can trust

When somebody asks "how many devices do we have, and what's on them," the answer is a report from the MDM console, not a guess from memory. The report includes serial numbers, assigned users, last check-in time, OS version, installed application list, and compliance status. It's accurate enough that you'd send it to a regulator.

This is the difference between hoping you have antivirus on every machine and knowing.

What This Connects To

Endpoint management isn't a standalone problem. It connects directly to cybersecurity — most successful ransomware attacks land on an endpoint, and the speed of detection and the integrity of the endpoint determine everything that happens next. It connects to backup and disaster recovery — knowing what's on each endpoint determines what needs to be backed up and what can be reimaged. It connects to compliance — CMMC, NIST 800-171, and most other frameworks have explicit endpoint hardening requirements that can only be met by an actively managed fleet.

In an environment without endpoint management, every one of those programs is harder. Cybersecurity tools see a fraction of what's deployed. Backups miss devices. Compliance audits require manual evidence collection that's mostly wrong by the time it's compiled.

What It Costs to Move from Fragmented to Managed

The work isn't usually the licenses. Microsoft Intune is included in Microsoft 365 Business Premium. EDR platforms are priced per endpoint at numbers most SMBs can absorb. The cost is the project — inventorying what's deployed, enrolling devices that aren't enrolled, retiring devices that should be retired, establishing the baselines, and training users on the changed processes.

For a 50-endpoint environment, this is typically a six-to-ten-week project, with most of the actual user-facing impact concentrated in a two-week rollout window. After that, the operational discipline is the ongoing work — and it's significantly less work than the chaos of unmanaged endpoints, because the chaos generates a steady stream of tickets that managed endpoints don't.

Our managed IT support engagements typically include endpoint management as a baseline. If you want a read on what your current posture looks like and where the gaps are, that's a one-meeting conversation. We can usually tell you within ninety minutes whether you have a manageable problem or a project on your hands.