Close Menu
Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    Facebook X (Twitter) Instagram
    Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    • Home
    • Intune
    • Windows
      • Modern Workplace
    • macOS
    • Android
    • iOS
    • Automation
      • Logic Apps
      • Intune Monitoring
      • GitHub
    • Security
      • Passwordless
      • Security
    • Speaking
    • About me
    Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    Home»Intune»Deploy Heimdal Security with Microsoft Intune
    Intune

    Deploy Heimdal Security with Microsoft Intune

    Peter KlapwijkBy Peter KlapwijkDecember 22, 2017Updated:December 3, 20193 Mins Read

    We are managing Windows 10 clients with Microsoft Intune as MDM devices. This provides us the option to deploy software (.msi files) to these Intune managed devices. Today we have a look at deploying Heimdal Security, which we use to increase security on our devices on which Windows Defender Anti-virus is also active.

    Editing the Heimdal msi file

    The first thing we need to do to be able to deploy Heimdal with Intune is editing de msi installer file to include the serial key. You can use Orca to edit the installer file which is part of the Windows SDK Components for Windows Installer Developers, more info and the download link can be found here.
    Open Orca, in the menu go to Tools, Options. On the tab Database make sure you check the first two options and click OK.

    Now download your msi installer file from the Heimdal Unified Threat Dashboard and open the file in Orca. Scroll down to the table Property, from the menu choose Tables and Add Row.
    In the property field write HEIMDALKEY

    In the value field write your serial key. Your serial key is the Heimdal Corp Activation Key which can be found in the dashboard. Click OK.

    You see an row with HEIMDALKEY and your serial like below.

    Save the file on your computer. The file is ready for deployment.

    Deploy the Heimdal msi file with Microsoft Intune

    Logon to the Azure portal and open the Intune tab. Click on Mobile apps, Apps and Add to add a new application to deploy.

    As App type choose Line-of-business app.

    Click on Select file and browse to your self created Heimdal msi file and click OK.

    Click on Configure. Add the required information about the application (Name, Description and Publisher). We don`t need to add a Command-line argument.

    Click on Select image to upload the Heimdal logo. Browse to an image file with the Heimdal logo and click OK and Add.

    After uploading the installer file click on Assignments. Pick a group to assign the deployment to and the assignment type. I took a device group and deployment type Required. When you choose required the installation will be forced to install. When yo choose Available, the user is able to install the application from the Intune Company portal.

    Heimdal installation

    When a device sync is done Intune is triggered to install Heimdal to the users device when the assignment type is Required. No action is required from the user.

    If you choose Available as assignment type, your user needs to open the Intune Company portal to install Heimdal. Click on the app icon and choose install

    After installation on to the Windows 10 device, in the taskbar you see the Heimdal icon which confirms the successful installation of Heimdal. To confirm the correct license is applied, which we added to the installer file, open Heimdal and open the license tab. You notice the last few numbers/ letters from your license key.

    In the Intune portal you open the Heimdal app and click on Device install status. After a short period your devices show up with a install status.

    And as last, from the Heimdal Unified Threat Dashboard you see the devices show up activated.

    EMS Intune Microsoft 365 Microsoft Endpoint Manager Security Windows 10
    Share. Facebook Twitter LinkedIn Email WhatsApp
    Peter Klapwijk
    • Website
    • X (Twitter)
    • LinkedIn

    Peter is a Security (Intune) MVP since 2020 and is working as Modern Workplace Engineer at Wortell in The Netherlands. He has more than 15 years of experience in IT, with a strong focus on Microsoft technologies like Microsoft Intune, Windows, and (low-code) automation.

    Related Posts

    Setup an Edge Chromium based Kiosk device with Microsoft Intune

    December 30, 2019

    Uninstall Windows 10 apps with Intune

    October 18, 2018

    Control Windows 10 privacy settings with Intune [UPDATED]

    November 10, 2017
    Add A Comment
    Leave A Reply Cancel Reply

    Peter Klapwijk

    Hi! Welcome to my blog post.
    I hope you enjoy reading my articles.

    Hit the About Me button to get in contact with me or leave a comment.

    Awards
    Sponsor
    Latest Posts

    Create deployment ring groups for Microsoft Intune

    June 27, 2025

    Update Windows Defender during Windows Autopilot enrollments

    May 16, 2025

    Hide the “Turn on an ad privacy feature” pop-up in Chrome with Microsoft Intune

    April 19, 2025

    How to set Google as default search provider with Microsoft Intune

    April 18, 2025
    follow me
    • Twitter 4.8K
    • LinkedIn 6.1K
    • YouTube
    • Bluesky 1.5K
    Tags
    Administrative Templates Android Automation Autopilot Azure Azure AD Browser Conditional Access Edge EMS Exchange Online Feitian FIDO2 Flow Google Chrome Graph Graph API Identity Management Intune Intune Monitoring iOS KIOSK Logic Apps macOS MEM MEMMonitoring Microsoft 365 Microsoft Edge Microsoft Endpoint Manager Modern Workplace Office 365 OneDrive for Business Outlook Passwordless PowerApps Power Automate Security SharePoint Online Teams Windows Windows 10 Windows10 Windows 11 Windows Autopilot Windows Update
    Copy right

    This information is provided “AS IS” with no warranties, confers no rights and is not supported by the authors, or In The Cloud 24-7.

     

    Copyright © 2025 by In The Cloud 24-7/ Peter Klapwijk. All rights reserved, No part of the information on this web site may be reproduced or posted in any form or by any means without the prior written permission of the publisher.

    Shorthand; Don’t pass off my work as yours, it’s not nice.

    Recent Comments
    • Parth Savjadiya on Using Visual Studio with Microsoft Endpoint Privilege Management, some notes
    • Chris Johnson on Assign Deny Local Log On user right to an (Azure) AD group by using Microsoft Intune
    • Northernsky on Automatically wipe a Windows 10 device after a number of authentication failures
    • Henrik on Intune Driver update for Windows – Get applicable devices
    • Adam on Get notified on expiring Azure App Registration client secrets
    most popular

    Application installation issues; Download pending

    October 1, 2024

    Restrict which users can logon into a Windows 10 device with Microsoft Intune

    April 11, 2020

    How to change the Windows 11 language with Intune

    November 11, 2022

    Update Microsoft Edge during Windows Autopilot enrollments

    July 9, 2024
    Peter Klapwijk – In The Cloud 24-7
    X (Twitter) LinkedIn YouTube RSS Bluesky
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.

    Manage Cookie Consent
    To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
    View preferences
    {title} {title} {title}