Skip to content

Commit 2fba429

Browse files
Merge pull request #49833 from KenMAG/Bugs
Revised unit per SE BUG 146376
2 parents 757e8ea + c0c4e3c commit 2fba429

File tree

3 files changed

+14
-16
lines changed

3 files changed

+14
-16
lines changed

learn-pr/wwl-sci/configure-manage-automation-microsoft-defender-for-endpoint/5-block-risk-devices.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,8 @@ title: Block at risk devices
44
metadata:
55
title: Block at risk devices
66
description: "Block at risk devices"
7-
ms.date: 3/31/2025
8-
author: wwlpublish
7+
ms.date: 04/02/2025
8+
author: KenMAG
99
ms.author: kelawson
1010
ms.topic: unit
1111
azureSandbox: false

learn-pr/wwl-sci/configure-manage-automation-microsoft-defender-for-endpoint/includes/5-block-risk-devices.md

Lines changed: 10 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -44,35 +44,33 @@ Take the following steps to enable Conditional Access:
4444

4545
### Create the compliance policy in the Intune admin center
4646

47-
1. In the Microsoft Intune admin center, select **Dashboard**, and select **Compliance policies**.
47+
1. In the Microsoft Intune admin center, select **Devices** from the navigation menu, and then expand the **Manage Devices** section.
48+
49+
1. Select **Compliance**.
4850

4951
1. Select **+ Create policy**.
5052

5153
1. In Platform, select **Windows 10 and later**, and select **Create**.
5254

5355
1. Enter a Name and Description, select **Next**.
5456

55-
1. On the *Compliance Settings* tab, expand **Microsoft Defender for Endpoint rules**, set **Require the device to be at or under the machine risk score** to your preferred level:
57+
1. On the *Compliance Settings* tab, expand **Microsoft Defender for Endpoint**, set **Require the device to be at or under the machine risk score** to your preferred level:
5658

5759
- Clear: This level is the most secure. The device can't have any existing threats and still access company resources. If any threats are found, the device is evaluated as noncompliant.
5860
- Low: The device is compliant if only low-level threats exist. Devices with medium or high threat levels aren't compliant.
5961
- Medium: The device is compliant if the threats found on the device are low or medium. If high-level threats are detected, the device is determined as noncompliant.
6062
- High: This level is the least secure and allows all threat levels. So devices with high, medium, or low threat levels are considered compliant.
6163

64+
1. Select **Next** and in the **Actions for noncompliance** tab, select actions to take.
6265

63-
1. Select **Next** until you can select **Create**, and Create to save your changes (and create the policy).
64-
65-
### Assign the policy in Endpoint Manager
66-
67-
1. In Microsoft Endpoint Manager admin center, open the policy you created in the previous step, select **Properties**.
68-
69-
1. Under the Assignments section, select **Edit**.
66+
1. Select **Next** and in the **Scope tags** tab, leave the *Default* or select other scope tags.
7067

71-
1. Select **Assignments**.
68+
1. Select **Next** and in the **Assignments** tab, select the groups, users, or devices to assign the policy to. Or select groups to exclude from the policy.
7269

73-
1. Include or exclude your Entra ID groups to assign them the policy.
70+
1. Select **Next**, and then select **Create**, to save your changes (and create the policy).
7471

75-
1. To deploy the policy to the groups, select **Review + Save** and then select **Save**. The user devices targeted by the policy are evaluated for compliance.
72+
> [!NOTE]
73+
> You can also create and assign policies in the *Microsoft Intune admin center*, **Endpoint security**, *Device compliance* section.
7674
7775
### Create an Entra ID Conditional Access policy
7876

learn-pr/wwl-sci/configure-manage-automation-microsoft-defender-for-endpoint/index.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,8 @@ uid: learn.wwl.configure-manage-automation-microsoft-defender-for-endpoint
33
metadata:
44
title: Configure and manage automation using Microsoft Defender for Endpoint
55
description: "Configure and manage automation using Microsoft Defender for Endpoint"
6-
ms.date: 03/31/2025
7-
author: wwlpublish
6+
ms.date: 04/02/2025
7+
author: KenMAG
88
ms.author: kelawson
99
ms.topic: module
1010
ms.service: azure

0 commit comments

Comments
 (0)