Ócáid
Apr 9, 3 PM - Apr 10, 12 PM
Códaigh an Todhchaí le IS agus ceangail le piaraí agus saineolaithe Java ag JDConf 2025.
Cláraigh anoisNí thacaítear leis an mbrabhsálaí seo a thuilleadh.
Uasghrádú go Microsoft Edge chun leas a bhaint as na gnéithe is déanaí, nuashonruithe slándála, agus tacaíocht theicniúil.
Microsoft Intune and Microsoft Entra work together to secure your organization through device compliance policies and Conditional Access. Device compliance policies are a great way to ensure user devices meet minimum configuration requirements. The requirements can be enforced when users access services protected with Conditional Access policies.
Some organizations might not be ready to require device compliance for all users. These organizations might instead choose to deploy the following policies:
Conditional Access policies are powerful tools, we recommend excluding the following accounts from your policies:
Organizations can choose to deploy this policy using the steps outlined below or using the Conditional Access templates.
The following steps help create a Conditional Access policy to require devices accessing resources be marked as compliant with your organization's Intune compliance policies.
Rabhadh
Without a compliance policy created in Microsoft Intune, this Conditional Access policy won't function as intended. Create a compliance policy first and ensure you have at least one compliant device before proceeding.
After administrators confirm the settings using report-only mode, they can move the Enable policy toggle from Report-only to On.
Nóta
You can enroll your new devices to Intune even if you select Require device to be marked as compliant for All users and All resources (formerly 'All cloud apps') using the previous steps. The Require device to be marked as compliant control doesn't block Intune enrollment.
On iOS, Android, macOS, and some non-Microsoft web browsers, Microsoft Entra ID identifies the device using a client certificate that is provisioned when the device is registered with Microsoft Entra ID. When a user first signs in through the browser the user is prompted to select the certificate. The end user must select this certificate before they can continue to use the browser.
Organizations that use the Subscription Activation feature to enable users to "step-up" from one version of Windows to another, might want to exclude the Windows Store for Business, AppID 45a330b1-b1ec-4cc1-9161-9f03992aa49f from their device compliance policy.
Ócáid
Apr 9, 3 PM - Apr 10, 12 PM
Códaigh an Todhchaí le IS agus ceangail le piaraí agus saineolaithe Java ag JDConf 2025.
Cláraigh anoisOiliúint
Modúl
MD-102 3-Implement device compliance - Training
This module describes how to use compliance and conditional access policies to help protect access to organizational resources.
Deimhniú
Microsoft 365 Certified: Endpoint Administrator Associate - Certifications
Plan and execute an endpoint deployment strategy, using essential elements of modern management, co-management approaches, and Microsoft Intune integration.
Doiciméadúchán
Grant controls in Conditional Access policy - Microsoft Entra ID
Grant controls in a Microsoft Entra Conditional Access policy.
Block unsupported platforms with Conditional Access - Microsoft Entra ID
Create a custom Conditional Access policy blocking unsupported platforms.
Require compliant, hybrid joined devices, or MFA - Microsoft Entra ID
Create a custom Conditional Access policy to require compliant, hybrid joined devices, or multifactor authentication.