Table of Contents
To be successful, you’ll use the following configurations in concert:
- Establish a service-to-service connection between Intune and Microsoft Defender for Endpoint.
- Use a device configuration profile to onboard devices with Microsoft Defender for Endpoint.
- Use a device compliance policy to set the level of risk you want to allow.
- Use a conditional access policy to block users from accessing corporate resources from devices that are noncompliant.
- Intune (Endpoint Manager ) must be configured to integrated with Microsoft Defender for Endpoint.
- Devices must be enrolled into Intune ( Azure AD Registered or Azure AD Joined).
- Devices must be onboarded in Microsoft Defender for Endpoint.
5/5 - (1 vote)