Skip to content

Commit 112c10c

Browse files
committed
Update configure-conditional-access.md
1 parent 90c2db8 commit 112c10c

File tree

1 file changed

+5
-7
lines changed

1 file changed

+5
-7
lines changed

defender-endpoint/configure-conditional-access.md

Lines changed: 5 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -31,28 +31,26 @@ This section guides you through all the steps you need to take to properly imple
3131
## Before you begin
3232

3333
> [!WARNING]
34-
> It's important to note that Microsoft Entra registered devices aren't supported in this scenario.</br>
35-
> Only Intune enrolled devices are supported.
34+
> It's important to note that Microsoft Entra registered devices aren't supported in this scenario. Only Intune enrolled devices are supported.
3635
3736
You need to make sure that all your devices are enrolled in Intune. You can use any of the following options to enroll devices in Intune:
3837

3938
- IT Admin: For more information on how to enable auto-enrollment, see [Windows Enrollment](/intune/windows-enroll#enable-windows-10-automatic-enrollment)
40-
- End-user: For more information on how to enroll your Windows 10 and Windows 11 device in Intune, see [Enroll your Windows 10 device in Intune](/intune/quickstart-enroll-windows-device)
39+
- End user: For more information on how to enroll your Windows 10 and Windows 11 device in Intune, see [Enroll your Windows 10 device in Intune](/intune/quickstart-enroll-windows-device)
4140
- End-user alternative: For more information on joining a Microsoft Entra domain, see [How to: Plan your Microsoft Entra join implementation](/azure/active-directory/devices/azureadjoin-plan).
4241

4342
There are steps you'll need to take in the Microsoft Defender portal, the Intune portal, and Microsoft Entra admin center.
4443

4544
It's important to note the required roles to access these portals and implement Conditional access:
4645

47-
- **Microsoft Defender portal** - You'll need to sign into the portal with a Global Administrator role to turn on the integration.
46+
- **Microsoft Defender portal** - You'll need to sign into the portal with an appropriate role to turn on integration. See [Permission options](user-roles.md#permission-options).
4847
- **Intune** - You'll need to sign in to the portal with Security Administrator rights with management permissions.
49-
- **Microsoft Entra admin center** - You'll need to sign in as a Global Administrator, Security Administrator, or Conditional Access administrator.
48+
- **Microsoft Entra admin center** - You'll need to sign in as a Security Administrator or Conditional Access administrator.
5049

5150
> [!IMPORTANT]
5251
> Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
5352
54-
> [!NOTE]
55-
> You'll need a Microsoft Intune environment, with Intune managed and Microsoft Entra joined Windows 10 and Windows 11 devices.
53+
You'll need a Microsoft Intune environment, with Intune managed and Microsoft Entra joined Windows 10 and Windows 11 devices.
5654

5755
Take the following steps to enable Conditional Access:
5856

0 commit comments

Comments
 (0)