Skip to content

Commit 0768e46

Browse files
authored
Update pci-requirement-1.md
1 parent 7cda8fd commit 0768e46

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/active-directory/standards/pci-requirement-1.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ ms.collection:
6262

6363
|PCI-DSS Defined approach requirements|Azure AD guidance and recommendations|
6464
|-|-|
65-
|**1.5.1** Security controls are implemented on any computing devices, including company- and employee-owned devices, that connect to both untrusted networks (including the Internet) and the CDE as follows: </br> Specific configuration settings are defined to prevent threats being introduced into the entity’s network. </br> Security controls are actively running. </br> Security controls are not alterable by users of the computing devices unless specifically documented and authorized by management on a case-by-case basis for a limited period.| Use the following cloud services to allow access from compliant devices: </br> Defender for Endpoint Protection </br> Intune for Endpoint Management </br> Conditional Access </br> </br> [Common security policies for Microsoft 365 organizations](/microsoft-365/security/office-365-security/identity-access-policies?view=o365-worldwide&preserve-view=true) </br> [Zero Trust deployment plan with Microsoft 365](/microsoft-365/security/microsoft-365-zero-trust?view=o365-worldwide&preserve-view=true)|
65+
|**1.5.1** Security controls are implemented on any computing devices, including company- and employee-owned devices, that connect to both untrusted networks (including the Internet) and the CDE as follows: </br> Specific configuration settings are defined to prevent threats being introduced into the entity’s network. </br> Security controls are actively running. </br> Security controls are not alterable by users of the computing devices unless specifically documented and authorized by management on a case-by-case basis for a limited period.| Deploy Conditional Access policies that require device compliance. [Use compliance policies to set rules for devices you manage with Intune](/mem/intune/protect/device-compliance-get-started) </br> Integrate device compliance state with anti-malware solutions. [Enforce compliance for Microsoft Defender for Endpoint with Conditional Access in Intune](/mem/intune/protect/advanced-threat-protection) </br> [Mobile Threat Defense integration with Intune](/mem/intune/protect/mobile-threat-defense)|
6666

6767
## Next steps
6868

0 commit comments

Comments
 (0)