You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: learn-pr/endpoint-manager/policy-security-management-using-microsoft-endpoint-manager/2-policy-management-groups.yml
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ title: Learn about policy management based on groups
4
4
metadata:
5
5
title: Learn about policy management based on groups
6
6
description: Understand the concepts surrounding policy management based on groups.
Copy file name to clipboardExpand all lines: learn-pr/endpoint-manager/policy-security-management-using-microsoft-endpoint-manager/3-conditional-access.yml
Copy file name to clipboardExpand all lines: learn-pr/endpoint-manager/policy-security-management-using-microsoft-endpoint-manager/4-use-conditional-access.yml
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ title: Learn about using Conditional Access
4
4
metadata:
5
5
title: Learn about using Conditional Access
6
6
description: Understand the two common types of Conditional Access.
Copy file name to clipboardExpand all lines: learn-pr/endpoint-manager/policy-security-management-using-microsoft-endpoint-manager/5-benefits-conditional-access.yml
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ title: Understand the benefits of Conditional Access
4
4
metadata:
5
5
title: Understand the benefits of Conditional Access
6
6
description: Learn about the benefits of Conditional Access.
Copy file name to clipboardExpand all lines: learn-pr/endpoint-manager/policy-security-management-using-microsoft-endpoint-manager/6-implement-security-rules.yml
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ title: Learn about implementing security rules
4
4
metadata:
5
5
title: Learn about implementing security rules
6
6
description: Understand the capabilities behind keeping device secure using Microsoft Intune.
Copy file name to clipboardExpand all lines: learn-pr/endpoint-manager/policy-security-management-using-microsoft-endpoint-manager/7-knowledge-check.yml
Copy file name to clipboardExpand all lines: learn-pr/endpoint-manager/policy-security-management-using-microsoft-endpoint-manager/includes/2-policy-management-groups.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,11 +27,11 @@ After your device is enrolled, it becomes *managed*. Your organization can assig
27
27
28
28
## Apps
29
29
30
-
After you've added an app to Microsoft Intune, you can assign the app to users and devices. It's important to note that you can assign an app to a device whether or not the device is managed by Intune.
30
+
After you've added an app to Microsoft Intune, you can assign the app to users and devices. It's important to note that you can assign an app to a device whether Intune manages it or not.
31
31
32
32
In Intune, you can determine who has access to an app by assigning groups of users to include and exclude. Before you assign groups to the app, you must set the assignment type for an app. The assignment type makes the app available, required, or uninstalls the app.
33
33
34
-
To set the availability of an app, you include and exclude app assignments to a group of users or devices by using a combination of include and exclude group assignments. This capability can be useful when you make the app available by including a large group, then narrow the selected users by also excluding a smaller group. The smaller group might be a test group or an executive group.
34
+
To set the availability of an app, you include and exclude app assignments to a group of users or devices. You can accomplish this using a combination of include and exclude group assignments. This capability can be useful when you make the app available by including a large group. Then narrow the selected users by also excluding a smaller group. The smaller group might be a test group or an executive group.
35
35
36
36
As a best practice, create and assign apps specifically for your user groups and separately for your device groups.
37
37
@@ -45,17 +45,17 @@ You can assign policies to groups using Intune. When you assign policies, you ca
45
45
46
46
## User groups vs. device groups
47
47
48
-
Many users ask when to use user groups and when to use device groups. The answer depends on your goal. Here's some guidance to get you started:
48
+
Many users ask when to utilize user groups versus device groups. The answer depends on your goal. Here's some guidance to get you started:
49
49
50
50
### Device groups
51
51
52
52
If you want to apply settings on a device regardless of who's signed in, assign your profiles to a device group. Settings applied to device groups always go with the device, not the user. Device groups are commonly used for shared and specialized devices.
53
53
54
54
For example:
55
55
56
-
- Device groups are useful for managing devices that don't have a dedicated user. For example, you have devices that print tickets, scan inventory, are shared by shift workers, are assigned to a specific warehouse, and so on. Put these devices in a device group and assign your profiles to this device group.
56
+
- Device groups are useful for managing devices that don't have a dedicated user. For example, you have devices that print tickets, scan inventory, share information across shift workers, assign tickets to specific warehouses, and so on. Put these devices in a device group and assign your profiles to this device group.
57
57
- You create a Device Firmware Configuration Interface (DFCI) Intune profile that updates settings in the BIOS. For example, you configure this profile to disable the device camera or lock down the boot options to prevent users from booting up another OS. This profile is a good scenario to assign to a device group.
58
-
- On some specific Windows devices, you always want to control some Microsoft Edge settings, regardless of who's using the device. For example, you want to block all downloads, limit all cookies to the current browsing session, and delete the browsing history. For this scenario, put these specific Windows devices in a device group, then create an Administrative Template in Intune, add these device settings, and assign this profile to the device group.
58
+
- On some specific Windows devices, you always want to control some Microsoft Edge settings, regardless of who's using the device. For example, you want to block all downloads, limit all cookies to the current browsing session, and delete the browsing history. For this scenario, put these specific Windows devices in a device group. Then create an Administrative Template in Intune, add these device settings, and assign this profile to the device group.
59
59
60
60
To summarize, use device groups when you don't care who's signed in on the device, or if anyone is signed in. You want your settings to always be on the device.
61
61
@@ -71,4 +71,4 @@ For example:
71
71
72
72
For example, you want to block untrusted ActiveX controls in your Office apps. You can create an Administrative Template in Intune, configure this setting, and assign this profile to a user group.
73
73
74
-
To summarize, use user groups when you want your settings and rules to always go with the user, whatever device they use.
74
+
To summarize, utilize user groups when you want your settings and rules to always go with the user, whatever device they use.
Copy file name to clipboardExpand all lines: learn-pr/endpoint-manager/policy-security-management-using-microsoft-endpoint-manager/includes/4-use-conditional-access.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,7 +21,7 @@ With co-management, Intune evaluates every device in your network to determine h
21
21
22
22
- This evaluation is pre-security breach and configuration-based.
23
23
24
-
- For co-managed devices, Configuration Manager also does configuration-based evaluation; for example, required updates or apps compliance. Intune combines this evaluation along with its own assessment.
24
+
- For co-managed devices, Configuration Manager also does configuration-based evaluation for things like required updates or apps compliance. Intune combines this evaluation along with its own assessment.
25
25
26
26
1. Intune detects active security incidents on a device. It uses the intelligent security of Microsoft Defender for Endpoint (formerly Microsoft Defender Advanced Threat Protection or Windows Defender ATP) and other mobile threat-defense providers. These partners run ongoing behavioral analysis on devices. This analysis detects active incidents, then passes this information to Intune for real-time compliance evaluation.
27
27
@@ -65,7 +65,7 @@ Conditional Access for PCs provides capabilities similar to those available for
65
65
66
66
#### Bring your own device (BYOD)
67
67
68
-
-**Workplace join and Intune management:**Here the user can join their personal devices to access corporate resources and services. You can use Workplace join and enroll devices into Intune MDM to receive device-level policies, which are another option to evaluate Conditional Access criteria.
68
+
-**Workplace join and Intune management:**The user can join their personal devices to access corporate resources and services. You can use Workplace join and enroll devices into Intune MDM to receive device-level policies, which are another option to evaluate Conditional Access criteria.
0 commit comments