Skip to content

Commit 461b089

Browse files
author
Jill Grant
authored
Merge pull request #47698 from lootle1/MR49
Technical Review 1003299: Understand Conditional Access policies usin…
2 parents 1a3d0ff + a4d4dfa commit 461b089

14 files changed

+34
-34
lines changed

learn-pr/endpoint-manager/policy-security-management-using-microsoft-endpoint-manager/1-introduction.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: Introduction
44
metadata:
55
title: Introduction
66
description: Learn about policy and security management using Microsoft Intune.
7-
ms.date: 05/05/2023
7+
ms.date: 10/28/2024
88
author: ErikRe
99
ms.author: erikre
1010
ms.topic: unit

learn-pr/endpoint-manager/policy-security-management-using-microsoft-endpoint-manager/2-policy-management-groups.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: Learn about policy management based on groups
44
metadata:
55
title: Learn about policy management based on groups
66
description: Understand the concepts surrounding policy management based on groups.
7-
ms.date: 05/05/2023
7+
ms.date: 10/28/2024
88
author: Erikre
99
ms.author: erikre
1010
ms.topic: unit

learn-pr/endpoint-manager/policy-security-management-using-microsoft-endpoint-manager/3-conditional-access.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: Understand Conditional Access
44
metadata:
55
title: Understand Conditional Access
66
description: Understand the concepts behind Conditional Access.
7-
ms.date: 05/05/2023
7+
ms.date: 10/28/2024
88
author: Erikre
99
ms.author: erikre
1010
ms.topic: unit

learn-pr/endpoint-manager/policy-security-management-using-microsoft-endpoint-manager/4-use-conditional-access.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: Learn about using Conditional Access
44
metadata:
55
title: Learn about using Conditional Access
66
description: Understand the two common types of Conditional Access.
7-
ms.date: 05/05/2023
7+
ms.date: 10/28/2024
88
author: Erikre
99
ms.author: erikre
1010
ms.topic: unit

learn-pr/endpoint-manager/policy-security-management-using-microsoft-endpoint-manager/5-benefits-conditional-access.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: Understand the benefits of Conditional Access
44
metadata:
55
title: Understand the benefits of Conditional Access
66
description: Learn about the benefits of Conditional Access.
7-
ms.date: 05/05/2023
7+
ms.date: 10/28/2024
88
author: Erikre
99
ms.author: erikre
1010
ms.topic: unit

learn-pr/endpoint-manager/policy-security-management-using-microsoft-endpoint-manager/6-implement-security-rules.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: Learn about implementing security rules
44
metadata:
55
title: Learn about implementing security rules
66
description: Understand the capabilities behind keeping device secure using Microsoft Intune.
7-
ms.date: 05/05/2023
7+
ms.date: 10/28/2024
88
author: Erikre
99
ms.author: erikre
1010
ms.topic: unit

learn-pr/endpoint-manager/policy-security-management-using-microsoft-endpoint-manager/7-knowledge-check.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ uid: learn.policy-security-management-using-microsoft-endpoint-manager.7-knowled
33
metadata:
44
title: Knowledge check
55
description: Knowledge check
6-
ms.date: 05/05/2023
6+
ms.date: 10/28/2024
77
author: Erikre
88
ms.author: erikre
99
ms.topic: unit

learn-pr/endpoint-manager/policy-security-management-using-microsoft-endpoint-manager/8-summary.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: Summary
44
metadata:
55
title: Summary
66
description: Microsoft Intune - Summary.
7-
ms.date: 05/05/2023
7+
ms.date: 10/28/2024
88
author: Erikre
99
ms.author: erikre
1010
ms.topic: unit

learn-pr/endpoint-manager/policy-security-management-using-microsoft-endpoint-manager/includes/2-policy-management-groups.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -27,11 +27,11 @@ After your device is enrolled, it becomes *managed*. Your organization can assig
2727

2828
## Apps
2929

30-
After you've added an app to Microsoft Intune, you can assign the app to users and devices. It's important to note that you can assign an app to a device whether or not the device is managed by Intune.
30+
After you've added an app to Microsoft Intune, you can assign the app to users and devices. It's important to note that you can assign an app to a device whether Intune manages it or not.
3131

3232
In Intune, you can determine who has access to an app by assigning groups of users to include and exclude. Before you assign groups to the app, you must set the assignment type for an app. The assignment type makes the app available, required, or uninstalls the app.
3333

34-
To set the availability of an app, you include and exclude app assignments to a group of users or devices by using a combination of include and exclude group assignments. This capability can be useful when you make the app available by including a large group, then narrow the selected users by also excluding a smaller group. The smaller group might be a test group or an executive group.
34+
To set the availability of an app, you include and exclude app assignments to a group of users or devices. You can accomplish this using a combination of include and exclude group assignments. This capability can be useful when you make the app available by including a large group. Then narrow the selected users by also excluding a smaller group. The smaller group might be a test group or an executive group.
3535

3636
As a best practice, create and assign apps specifically for your user groups and separately for your device groups.
3737

@@ -45,17 +45,17 @@ You can assign policies to groups using Intune. When you assign policies, you ca
4545

4646
## User groups vs. device groups
4747

48-
Many users ask when to use user groups and when to use device groups. The answer depends on your goal. Here's some guidance to get you started:
48+
Many users ask when to utilize user groups versus device groups. The answer depends on your goal. Here's some guidance to get you started:
4949

5050
### Device groups
5151

5252
If you want to apply settings on a device regardless of who's signed in, assign your profiles to a device group. Settings applied to device groups always go with the device, not the user. Device groups are commonly used for shared and specialized devices.
5353

5454
For example:
5555

56-
- Device groups are useful for managing devices that don't have a dedicated user. For example, you have devices that print tickets, scan inventory, are shared by shift workers, are assigned to a specific warehouse, and so on. Put these devices in a device group and assign your profiles to this device group.
56+
- Device groups are useful for managing devices that don't have a dedicated user. For example, you have devices that print tickets, scan inventory, share information across shift workers, assign tickets to specific warehouses, and so on. Put these devices in a device group and assign your profiles to this device group.
5757
- You create a Device Firmware Configuration Interface (DFCI) Intune profile that updates settings in the BIOS. For example, you configure this profile to disable the device camera or lock down the boot options to prevent users from booting up another OS. This profile is a good scenario to assign to a device group.
58-
- On some specific Windows devices, you always want to control some Microsoft Edge settings, regardless of who's using the device. For example, you want to block all downloads, limit all cookies to the current browsing session, and delete the browsing history. For this scenario, put these specific Windows devices in a device group, then create an Administrative Template in Intune, add these device settings, and assign this profile to the device group.
58+
- On some specific Windows devices, you always want to control some Microsoft Edge settings, regardless of who's using the device. For example, you want to block all downloads, limit all cookies to the current browsing session, and delete the browsing history. For this scenario, put these specific Windows devices in a device group. Then create an Administrative Template in Intune, add these device settings, and assign this profile to the device group.
5959

6060
To summarize, use device groups when you don't care who's signed in on the device, or if anyone is signed in. You want your settings to always be on the device.
6161

@@ -71,4 +71,4 @@ For example:
7171

7272
For example, you want to block untrusted ActiveX controls in your Office apps. You can create an Administrative Template in Intune, configure this setting, and assign this profile to a user group.
7373

74-
To summarize, use user groups when you want your settings and rules to always go with the user, whatever device they use.
74+
To summarize, utilize user groups when you want your settings and rules to always go with the user, whatever device they use.

learn-pr/endpoint-manager/policy-security-management-using-microsoft-endpoint-manager/includes/4-use-conditional-access.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ With co-management, Intune evaluates every device in your network to determine h
2121

2222
- This evaluation is pre-security breach and configuration-based.
2323

24-
- For co-managed devices, Configuration Manager also does configuration-based evaluation; for example, required updates or apps compliance. Intune combines this evaluation along with its own assessment.
24+
- For co-managed devices, Configuration Manager also does configuration-based evaluation for things like required updates or apps compliance. Intune combines this evaluation along with its own assessment.
2525

2626
1. Intune detects active security incidents on a device. It uses the intelligent security of Microsoft Defender for Endpoint (formerly Microsoft Defender Advanced Threat Protection or Windows Defender ATP) and other mobile threat-defense providers. These partners run ongoing behavioral analysis on devices. This analysis detects active incidents, then passes this information to Intune for real-time compliance evaluation.
2727

@@ -65,7 +65,7 @@ Conditional Access for PCs provides capabilities similar to those available for
6565

6666
#### Bring your own device (BYOD)
6767

68-
- **Workplace join and Intune management:** Here the user can join their personal devices to access corporate resources and services. You can use Workplace join and enroll devices into Intune MDM to receive device-level policies, which are another option to evaluate Conditional Access criteria.
68+
- **Workplace join and Intune management:** The user can join their personal devices to access corporate resources and services. You can use Workplace join and enroll devices into Intune MDM to receive device-level policies, which are another option to evaluate Conditional Access criteria.
6969

7070
## App-based Conditional Access
7171

0 commit comments

Comments
 (0)