Windows Intune compliance settings by David Papkin

This post by David Papkin is about the Windows Intune new conditional access compliance settings in Windows 10.

Microsoft is constantly improving the features in the Intune Service – this applies also for the Conditional Access part, with the latest update for Intune in March 2018 we got some new compliance settings that we can check for. This settings will apply both for AzureAD joined devices that are MDM managed with Intune – but also with Windows 10 devices that are hybrid AzureAD joined with SCCM co-management.

If you have not already planed, tested or deployed Co-management now is the time, one of the first workload I’m moving away from SCCM is Compliance Policy to benefit from the easy way of making Conditional Access in Azure, like the new policy covered in this blog post. The only two things you need to get this working with co-management is enable co-management and move the workload Compliance Policies to Intune.

Co-management.png

 

 


The new settings are in the Windows 10 compliance policy with two new sections under System Security – Device Security and Defender

Compliance settings Device security - 01

The new device compliance policy settings allows us to more check on more security related settings on a Windows 10 devices.

Compliance settings Device security - 02

Device Security

  • Firewall : Require Firewall to be on and monitoring.
  • User Account Control (UAC) : Require User Account Control to help prevent potientially harmful programs from making changes on to the device.

Defender

  • Windows Defender Antimalware : Require the Windows Defender service to be enabled. (This compliance check is supported for devices with Windows 10 Desktop)
  • Windows Defender Antimalware minimum version: Minimum version of Windows Defender (e.g. 4.11.0.0)(This compliance check is supported for devices with Windows 10 Desktop)
  • Windows Defender Antimalware signature up-to date: Require Windows Defender Signature to be up-to-date. (This compliance check is supported for devices with Windows 10 Desktop)
  • Real-time protection: Require real-time protection prompts for known malware detection. (This compliance check is supported for devices with Windows 10 Desktop)

Note: When using “Windows Defender Antimalware signature up-to date” remember that the signature is updated multiple times a day!

Compliance settings Device security - Defender 01.png


Another new setting in Intune is what compliance state a devices without compliance policy has

Compliance settings - 01

Under Device Compliance – Compliance policy settings

Compliance settings - 02

There are a new setting for compliance status!!

Compliance settings - 03

These settings configure the way the compliance service threats devices

  • Mark devices with no compliance policy assigned as: Depending on the number of devices and users in your organization, this change may take some time to take effect.
  • Enhanced jailbreak detection: Enhanced detection uses the device’s Location Services to trigger device check-in and jailbreak evaluation with Intune more frequently. User location data is not stored by intune. This may impact battery life.
  • Compliance status validity period (days): Specify the time period in witch devices must report the status for all received compliance policies. Devices that do not return status within this time period are treated as noncompliant. The default value is 30 days.

What is the user experience with a non compliant device ??

In the Company Portal on Windows 10 the end user can “Check Access” to see if it allowed to access company resources that are protected by Conditional Access.

Company Portal - CA Check 01

With the new firewall settings in the Compliance policy that I showed earlier in the blogpost – if the end user is disabling the firewall

Company Portal - CA Check 02

Runs a new compliance check in Company Portal the device is now marked as non-compliant

Company Portal - CA Check 03

So when trying to access company resource like Office 365 the end user will get a message

Company Portal - CA Check 04

The IT admin can always see the compliance state in Intune

Compliance settings Firewall non compliance

When you start testing the new compliance policy for Windows 10 – try it on for a pilot group before going company-wide with this new features, if you by mistake mark an end-users devices as non-compliant they will not be able to get access to company data!

 

See the full article in the link below

https://osddeployment.dk/2018/03/31/new-compliance-settings-for-windows-10-when-using-conditional-access/amp/

 

This concludes this post by David Papkin about the Windows Intune new conditional access compliance settings in Windows 10.

http://davidpapkin.org/

David Papkin favorite movies

Robert Deniro in GoodFellas

Ava Gardner in Singapore (Flim Noir)

Clarke Gable in China Seas

 

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.