This guide will provide background information on modifying an existing device compliance policy.
Compliance Policies
Compliance Policies help protect organizational data by requiring users and devices to meet some minimum requirements prior to being allowed access to organizational resources.
Compliance Policies define:
- The rules and settings that users and managed devices must meet to be compliant. Examples of rules include requiring devices run a minimum OS version, or devices are not allowed to be jail-broken or rooted.
- The actions that apply to devices that don’t meet your compliance rules. Examples of actions include being remotely locked or sending a device user email about the device status so they can fix it.
If you use Conditional Access, your Conditional Access policies can use your device compliance results to block access to resources from noncompliant devices.
Role Requirements
Procedure Scope: Administrators
Required Group Membership: Admin.Security
Handbook Reference
Package: TBD
Domain: TBD
Modifies: TBD
Modifying a Device Compliance Policy
- Navigate to the Compliance Policies – Intune portal, locate and select the policy you wish to alter.
- Upon opening the policy, select the Properties tab; all the information of the rule will be displayed. Five points of interest will be available to Edit. You can modify the sections as needed.
- Basics: Adjusts non-functional items of the rule, such as the Name or Description of the policy.
- Compliance Settings: Displays the security settings for the designated profile type that are currently enabled or disabled and being applied to the associated devices specified in the Assignments section.
- Actions for Noncompliance: Specifies what happens when a device falls out of compliance.
- Scope Tags: Specifies which administrators will have access to the viewing and altering this object.
- Assignments: Specifies which Groups will be included or excluded from policy enforcement.
- Basics: Adjusts non-functional items of the rule, such as the Name or Description of the policy.
- Regardless of which section is selected to be Edited, the same redirect to the Edit Policy page will be displayed. The first page will display the selected sections current configuration and will allow you to make the necessary adjustments (additions, removals, editing, etc.) The second page will be the Review section where you will finalize the changes. Once the necessary adjustments have been configured for the selected section select Review + save to continue to the modification finalization stage.
- Once on the revisions page, if all the necessary adjustments look correct, select Save to finalize the modification process.
Need Assistance?
Reach out to your Customer Success Manager to discuss how a Sittadel cybersecurity analyst can assist in managing these tasks for you. New to our services? Inquire about arranging a consultation to explore optimizing your Azure environment for painless management.