You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/configure-manage-automation-microsoft-defender-for-endpoint/includes/5-block-risk-devices.md
+10-12Lines changed: 10 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -44,35 +44,33 @@ Take the following steps to enable Conditional Access:
44
44
45
45
### Create the compliance policy in the Intune admin center
46
46
47
-
1. In the Microsoft Intune admin center, select **Dashboard**, and select **Compliance policies**.
47
+
1. In the Microsoft Intune admin center, select **Devices** from the navigation menu, and then expand the **Manage Devices** section.
48
+
49
+
1. Select **Compliance**.
48
50
49
51
1. Select **+ Create policy**.
50
52
51
53
1. In Platform, select **Windows 10 and later**, and select **Create**.
52
54
53
55
1. Enter a Name and Description, select **Next**.
54
56
55
-
1. On the *Compliance Settings* tab, expand **Microsoft Defender for Endpoint rules**, set **Require the device to be at or under the machine risk score** to your preferred level:
57
+
1. On the *Compliance Settings* tab, expand **Microsoft Defender for Endpoint**, set **Require the device to be at or under the machine risk score** to your preferred level:
56
58
57
59
- Clear: This level is the most secure. The device can't have any existing threats and still access company resources. If any threats are found, the device is evaluated as noncompliant.
58
60
- Low: The device is compliant if only low-level threats exist. Devices with medium or high threat levels aren't compliant.
59
61
- Medium: The device is compliant if the threats found on the device are low or medium. If high-level threats are detected, the device is determined as noncompliant.
60
62
- High: This level is the least secure and allows all threat levels. So devices with high, medium, or low threat levels are considered compliant.
61
63
64
+
1. Select **Next** and in the **Actions for noncompliance** tab, select actions to take.
62
65
63
-
1. Select **Next** until you can select **Create**, and Create to save your changes (and create the policy).
64
-
65
-
### Assign the policy in Endpoint Manager
66
-
67
-
1. In Microsoft Endpoint Manager admin center, open the policy you created in the previous step, select **Properties**.
68
-
69
-
1. Under the Assignments section, select **Edit**.
66
+
1. Select **Next** and in the **Scope tags** tab, leave the *Default* or select other scope tags.
70
67
71
-
1. Select **Assignments**.
68
+
1. Select **Next** and in the **Assignments** tab, select the groups, users, or devices to assign the policy to. Or select groups to exclude from the policy.
72
69
73
-
1.Include or exclude your Entra ID groups to assign them the policy.
70
+
1.Select **Next**, and then select **Create**, to save your changes (and create the policy).
74
71
75
-
1. To deploy the policy to the groups, select **Review + Save** and then select **Save**. The user devices targeted by the policy are evaluated for compliance.
72
+
> [!NOTE]
73
+
> You can also create and assign policies in the *Microsoft Intune admin center*, **Endpoint security**, *Device compliance* section.
0 commit comments