maciejrebisz.com

IT

New compliance settings for Windows 10 when using Conditional Access – Mobile-First Cloud-First

maximios June 25, 2022

Microsoft is constantly improving the features in the Intune Service – this applies also for the Conditional Access part, with the latest update for Intune in March 2018 we got some new compliance settings that we can check for. This settings will apply both for AzureAD joined devices that are MDM managed with Intune – but also with Windows 10 devices that are hybrid AzureAD joined with SCCM co-management.

If you have not already planed, tested or deployed Co-management now is the time, one of the first workload I’m moving away from SCCM is Compliance Policy to benefit from the easy way of making Conditional Access in Azure, like the new policy covered in this blog post. The only two things you need to get this working with co-management is enable co-management and move the workload Compliance Policies to Intune.

The new settings are in the Windows 10 compliance policy with two new sections under System Security – Device Security and Defender

The new device compliance policy settings allows us to more check on more security related settings on a Windows 10 devices.

Device Security

  • Firewall : Require Firewall to be on and monitoring.
  • User Account Control (UAC) : Require User Account Control to help prevent potientially harmful programs from making changes on to the device.

Defender

  • Windows Defender Antimalware : Require the Windows Defender service to be enabled. (This compliance check is supported for devices with Windows 10 Desktop)
  • Windows Defender Antimalware minimum version: Minimum version of Windows Defender (e.g. 4.11.0.0)(This compliance check is supported for devices with Windows 10 Desktop)
  • Windows Defender Antimalware signature up-to date: Require Windows Defender Signature to be up-to-date. (This compliance check is supported for devices with Windows 10 Desktop)
  • Real-time protection: Require real-time protection prompts for known malware detection. (This compliance check is supported for devices with Windows 10 Desktop)

Note: When using “Windows Defender Antimalware signature up-to date” remember that the signature is updated multiple times a day!

Another new setting in Intune is what compliance state a devices without compliance policy has

Under Device Compliance – Compliance policy settings

There are a new setting for compliance status!!

These settings configure the way the compliance service threats devices

  • Mark devices with no compliance policy assigned as: Depending on the number of devices and users in your organization, this change may take some time to take effect.
  • Enhanced jailbreak detection: Enhanced detection uses the device’s Location Services to trigger device check-in and jailbreak evaluation with Intune more frequently. User location data is not stored by intune. This may impact battery life.
  • Compliance status validity period (days): Specify the time period in witch devices must report the status for all received compliance policies. Devices that do not return status within this time period are treated as noncompliant. The default value is 30 days.

What is the user experience with a non compliant device ??

In the Company Portal on Windows 10 the end user can “Check Access” to see if it allowed to access company resources that are protected by Conditional Access.

With the new firewall settings in the Compliance policy that I showed earlier in the blogpost – if the end user is disabling the firewall

Runs a new compliance check in Company Portal the device is now marked as non-compliant

So when trying to access company resource like Office 365 the end user will get a message

The IT admin can always see the compliance state in Intune

When you start testing the new compliance policy for Windows 10 – try it on for a pilot group before going company wide with this new features, if you by a mistake mark a end users devices as non compliant they will not be able to get access to company data!

Related Posts

IT /

Intune – Windows device enrollment restrictions – Cloud First

IT /

How to add “hidden” Windows UWP to Windows Store for Business – Cloud First

IT /

Office 2016 Active Directory-Based activation – Cloud First

‹ MDT 2013 Update 1 – Failed to copy Command line action – Mobile-First Cloud-First › Intune Enrollment Status page different assignment for different devicetypes – Mobile-First Cloud-First

Recent Posts

  • Intune – Windows device enrollment restrictions – Cloud First
  • How to add “hidden” Windows UWP to Windows Store for Business – Cloud First
  • Office 2016 Active Directory-Based activation – Cloud First
  • How to deploy Windows Local Experience Packs with Intune – Cloud First
  • Conditional Access for Outlook Web Access (OWA) – Cloud First

Recent Comments

No comments to show.

Archives

  • November 2025
  • October 2025
  • August 2025
  • July 2025
  • June 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • November 2024
  • September 2024
  • July 2024
  • June 2024
  • March 2024
  • December 2023
  • August 2023
  • June 2023
  • March 2023
  • February 2023
  • December 2022
  • September 2022
  • August 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • January 2022
  • December 2021
  • October 2021
  • September 2021
  • August 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • February 2020
  • January 2020
  • December 2019
  • October 2019
  • September 2019
  • June 2019
  • April 2019
  • March 2019
  • February 2019
  • March 2018
  • February 2018
  • December 2017
  • October 2017
  • August 2017

Categories

  • IT

Back to Top

© maciejrebisz.com 2026
Powered by WordPress • Themify WordPress Themes