![]() Security baselines are one of several methods in Intune to configure settings on devices. As a best practice, proper testing should be done leveraging a device on the corporate network and testing this out with a pilot group of users before broad deployment. Its possible that some of the settings pre-configured as part of the security baseline profile will be disruptive to end-users. S04E08 – Custom Compliance policies (I.T) – YouTube.Windows 10 Compliance Policy Intune – YouTube. ![]() iOS Device Compliance Policy Intune – YouTube.microsoftgraph/powershell-intune-samples ().Powershell-intune-samples/CompliancePolicy at master It is recommended to push out a configuration profile to automatically configure encryption in this use case to avoid help desk calls.ĭevice compliance policy settings might vary depending on the organization but should be standardized where possible. For instance, configuring Encryption of data storage on the device will prompt the user to configure Bitlocker encryption if it is not already enabled. There are certain device compliance policy settings that will prompt the end-user for certain action. Devices not in compliance will show up in the Intune admin center from a reporting standpoint. Device compliance policies will have no impact to end-users unless they are paired with conditional access policies to block access on noncompliant devices. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |