官术网_书友最值得收藏!

Creating a compliance policy

Now that you understand some of the policy options, follow these steps to create your first policy:

  1. Go to Intune (go to devicemanagement.microsoft.com or portal.azure.com and search for Intune).
  2. Click on Device compliance in the left-hand pane.
  3. Under Manage, select Policies.
  4. Select + Create Policy:
  1. Name and describe the policy and select the particular platform this policy will apply to:

  1. Select Configure to begin adjusting the platform-specific settings that are available. These indicate whether a device is compliant for your organization. Each platform will differ in terms of the available options:

  1. In this example, we'll select System Security so that we can have a minimum password length of 12 characters for our Windows 10 devices:

  1. When finished, click OK until you're back in the Create Policy pane, as shown in step 5.
  2. Now, click on Actions for noncompliance to choose what happens when a device does not meet the requirements you've just configured. By default, the device is marked as noncompliant. You can add additional actions and set them to take effect after a certain duration if you wish:

  1. Click OK until you're back to just the Create Policy pane again. If you wish to configure Scope (Tags), you may. Otherwise, click Create:
  1. Once created, you'll be presented with a monitoring page for the new policy, along with a reminder that you need to assign the policy to a group (or multiple groups) before it can take effect. Click Assignments:
  1. Select the user or device group(s) to be subjected to this new device compliance policy. You can assign it to all groups except certain groups by using the Exclude option; otherwise, use the Include option to target specific groups:
  1. Click Save when you're finished.
  2. If you need to modify the policy later, repeat steps 1-3 and then select the policy you wish to modify.
  3. Click on Properties. Here, you'll be presented with the configuration options for the policy, just like in step 5:

After selecting a policy from Device compliance, you'll be able to view the reports of devices and the users who are subject to the policy and its current status.

  1. You can check additional reports, such as Device compliance, under the Monitor heading at any time to get a snapshot of your overall compliance:
Mobile device compliance in Intune does not allow or restrict access unless you use Azure AD's conditional access function. Without conditional access, mobile device compliance still provides you with some functionality, such as remote locking, running the reports of non-compliant managed devices (jailbroken systems, unencrypted systems, old operating systems, and so on), and emailing users with reminders to make their device(s) compliant.

Now, we have our first compliance policy. In the next section, we'll explore how conditional access policies in Azure AD complement the compliance policy you configured in Intune.

主站蜘蛛池模板: 南澳县| 依兰县| 麻栗坡县| 巴里| 宁强县| 青神县| 星子县| 永丰县| 汾西县| 昌乐县| 涿州市| 寻甸| 崇文区| 西充县| 建湖县| 汽车| 醴陵市| 南阳市| 如东县| 仁怀市| 长宁区| 乌苏市| 永平县| 满洲里市| 德惠市| 信宜市| 哈巴河县| 安西县| 塘沽区| 镇远县| 长顺县| 奇台县| 措勤县| 宜君县| 吴旗县| 喜德县| 浪卡子县| 陆丰市| 方城县| 肇庆市| 图们市|