Device compliance policies in Microsoft Intune (2024)

  • Article
  • 11 minutes to read

Mobile device management (MDM) solutions like Intune can help protect organizational data by requiring users and devices to meet some requirements. In Intune, this feature is called compliance policies.

Compliance policies in Intune:

  • Define the rules and settings that users and devices must meet to be compliant.
  • Include actions that apply to devices that are noncompliant. Actions for noncompliance can alert users to the conditions of noncompliance and safeguard data on noncompliant devices.
  • Can be combined with Conditional Access, which can then block users and devices that don't meet the rules.
  • Can override the configuration of settings that you also manage through device configuration policies. To learn more about conflict resolution for policies, see If multiple policies are assigned to the same user or device, how do I know which settings gets applied?.

There are two parts to compliance policies in Intune:

  • Compliance policy settings – Tenant-wide settings that are like a built-in compliance policy that every device receives. Compliance policy settings set a baseline for how compliance policy works in your Intune environment, including whether devices that haven’t received any device compliance policies are compliant or noncompliant.

  • Device compliance policy – Platform-specific rules you configure and deploy to groups of users or devices. These rules define requirements for devices, like minimum operating systems or the use of disk encryption. Devices must meet these rules to be considered compliant.

Like other Intune policies, compliance policy evaluations for a device depend on when the device checks-in with Intune, and policy and profile refresh cycles.

Compliance policy settings

Compliance policy settings are tenant-wide settings that determine how Intune’s compliance service interacts with your devices. These settings are distinct from the settings you configure in a device compliance policy.

To manage the compliance policy settings, sign in to Microsoft Endpoint Manager admin center and go to Endpoint security > Device compliance > Compliance policy settings.

Compliance policy settings include the following settings:

  • Mark devices with no compliance policy assigned as

    This setting determines how Intune treats devices that haven't been assigned a device compliance policy. This setting has two values:

    • Compliant (default): This security feature is off. Devices that aren’t sent a device compliance policy are considered compliant.
    • Not compliant: This security feature is on. Devices that haven’t received a device compliance policy are considered noncompliant.

    If you use Conditional Access with your device compliance policies, change this setting to Not compliant to ensure that only devices that are confirmed as compliant can access your resources.

    If an end user isn't compliant because a policy isn't assigned to them, then the Company Portal app shows No compliance policies have been assigned.

  • Enhanced jailbreak detection (applies only to iOS/iPadOS)

    This setting works only with devices that you target with a device compliance policy that blocks jailbroken devices. (See Device Health settings for iOS/iPadOS).

    This setting has two values:

    • Disabled (default): This security feature is off. This setting has no effect on your devices that receive device compliance policy that blocks jailbroken devices.
    • Enabled: This security feature is on. Devices that receive device compliance policy to block jailbroken devices use the Enhanced jailbreak detection.

    When enabled on an applicable iOS/iPadOS device, the device:

    • Enables location services at the OS level.
    • Always allows the Company Portal to use location services.
    • Uses its location services to trigger jailbreak detection more frequently in the background. The user location data isn't stored by Intune.

    Enhanced jailbreak detection runs an evaluation when:

    • The Company Portal app opens
    • The device physically moves a significant distance, which is approximately 500 meters or more. Intune can’t guarantee that each significant location change results in a jailbreak detection check, as the check depends on a device's network connection at the time.

    If an Enhanced jailbreak detection evaluation does not run for a certain period of time, the device will be marked as Jailbroken, and subsequently as Not Compliant.

    On iOS 13 and higher, this feature requires users to select Always Allow whenever the device prompts them to continue allowing Company Portal to use their location in the background. If enabled, this will allow more frequent jailbreak detection checks.

  • Compliance status validity period (days)

    Specify a period in which devices must successfully report on all their received compliance policies. If a device fails to report its compliance status for a policy before the validity period expires, the device is treated as noncompliant.

    By default, the period is set to 30 days. You can configure a period from 1 to 120 days.

    You can view details about a devices compliance to the validity period setting. Sign in to Microsoft Endpoint Manager admin center and go to Devices > Monitor > Setting compliance. This setting has a name of Is active in the Setting column. For more information about this and related compliance status views, see Monitor device compliance.

Device compliance policies

Intune device compliance policies:

  • Define the rules and settings that users and managed devices must meet to be compliant. Examples of rules include requiring devices run a minimum OS version, not being jail-broken or rooted, and being at or under a threat level as specified by threat management software you’ve integrated with Intune.
  • Support actions that apply to devices that don’t meet your compliance rules. Examples of actions include being remotely locked, or sending a device user email about the device status so they can fix it.
  • Deploy to users in user groups or devices in device groups. When a compliance policy is deployed to a user, all the user's devices are checked for compliance. Using device groups in this scenario helps with compliance reporting.

If you use Conditional Access, your Conditional Access policies can use your device compliance results to block access to resources from noncompliant devices.

The available settings you can specify in a device compliance policy depend on the platform type you select when you create a policy. Different device platforms support different settings, and each platform type requires a separate policy.

The following subjects link to dedicated articles for different aspects of device configuration policy.

  • Actions for noncompliance - Each device compliance policy includes one or more actions for noncompliance. These actions are rules that get applied to devices that don’t meet the conditions you set in the policy.

    By default, each device compliance policy includes the action to mark a device as noncompliant if it fails to meet a policy rule. The policy then applies to the device any additional actions for noncompliance that you’ve configured, based on the schedules you set for those actions.

    Actions for noncompliance can help alert users when their device isn’t compliant, or safeguard data that might be on a device. Examples of actions include:

    • Sending email alerts to users and groups with details about the noncompliant device. You might configure the policy to send an email immediately upon being marked as noncompliant, and then again, periodically, until the device becomes compliant.
    • Remotely lock devices that have been noncompliant for some time.
    • Retire devices after they’ve been noncompliant for some time. This action marks a qualifying device as ready to be retired. An admin can then view a list of devices marked for retirement and must take an explicit action to retire one or more devices. Retiring a device removes the device from Intune management and removes all company data from the device. For more information about this action, see Available actions for noncompliance.
  • Create a policy – With the information in this article, you can review prerequisites, work through the options to configure rules, specify actions for noncompliance, and assign the policy to groups. This article also includes information about policy refresh times.

    View the device compliance settings for the different device platforms:

    • Android device administrator
    • Android Enterprise
    • Android Open Source Project (AOSP)
    • iOS
    • Linux - Support includes Custom Compliance and limited settings from the settings catalog for Allowed Distributions, Device Encryptions, and Password Policy.
    • macOS
    • Windows Holographic for Business
    • Windows 8.1 and later

      Important

      On October 22, 2022, Microsoft Intune is ending support for devices running Windows 8.1. After that date, technical assistance and automatic updates on these devices won't be available. For more information, go to Plan for Change: Ending support for Windows 8.1.

      If you currently use Windows 8.1, then we recommend moving to Windows 10/11 devices. Microsoft Intune has built-in security and device features that manage Windows 10/11 client devices. For more information, go to End of support for Windows 7 and Windows 8.1.

    • Windows 10/11

    Intune also supports compliance policy for Linux (Ubuntu Desktop, version 20.04 LTS and 22.04 LTS), which use the Settings catalog format instead of templates. Dedicated content for the settings in the settings catalog isn't available, but information is available from within the Settings catalog.

  • Custom compliance settings – With custom compliance settings you can expand on Intune’s built-in device compliance options. Custom settings provide flexibility to base compliance on the settings that are available on a device without having to wait for Intune to add those settings.

    You can use custom compliance settings with the following platforms:

    • Linux – Ubuntu Desktop, version 20.04 LTS and 22.04 LTS
    • Windows 10/11

Monitor compliance status

Intune includes a device compliance dashboard that you use to monitor the compliance status of devices, and to drill-in to policies and devices for more information. To learn more about this dashboard, see Monitor device compliance.

Integrate with Conditional Access

When you use Conditional Access, you can configure your Conditional Access policies to use the results of your device compliance policies to determine which devices can access your organizational resources. This access control is in addition to and separate from the actions for noncompliance that you include in your device compliance policies.

When a device enrolls in Intune it registers in Azure AD. The compliance status for devices is reported to Azure AD. If your Conditional Access policies have Access controls set to Require device to be marked as compliant, Conditional access uses that compliance status to determine whether to grant or block access to email and other organization resources.

If you’ll use device compliance status with Conditional Access policies, review how your tenant has configured Mark devices with no compliance policy assigned as, which you manage under Compliance policy settings.

For more information about using Conditional Access with your device compliance policies, see Device-based Conditional Access

Learn more about Conditional Access in the Azure AD documentation:

  • What is Conditional Access
  • What is a device identity

Reference for non-compliance and Conditional Access on the different platforms

The following table describes how noncompliant settings are managed when a compliance policy is used with a Conditional Access policy.

  • Remediated: The device operating system enforces compliance. For example, the user is forced to set a PIN.

  • Quarantined: The device operating system doesn't enforce compliance. For example, Android and Android Enterprise devices don't force the user to encrypt the device. When the device isn't compliant, the following actions take place:

    • If a Conditional Access policy applies to the user, the device is blocked.
    • The Company Portal app notifies the user about any compliance problems.
Policy settingPlatform
Allowed DistrosLinux (only) - Quarantined
Device encryption- Android 4.0 and later: Quarantined
- Samsung Knox Standard 4.0 and later: Quarantined
- Android Enterprise: Quarantined

- iOS 8.0 and later: Remediated (by setting PIN)
- macOS 10.11 and later: Quarantined

- Linux: Quarantined

- Windows 10/11: Quarantined

Email profile- Android 4.0 and later: Not applicable
- Samsung Knox Standard 4.0 and later: Not applicable
- Android Enterprise: Not applicable

- iOS 8.0 and later: Quarantined
- macOS 10.11 and later: Quarantined

- Linux: Not applicable

- Windows 10/11: Not applicable

Jailbroken or rooted device- Android 4.0 and later: Quarantined (not a setting)
- Samsung Knox Standard 4.0 and later: Quarantined (not a setting)
- Android Enterprise: Quarantined (not a setting)

- iOS 8.0 and later: Quarantined (not a setting)
- macOS 10.11 and later: Not applicable

- Linux: Not applicable

- Windows 10/11: Not applicable

Maximum OS version- Android 4.0 and later: Quarantined
- Samsung Knox Standard 4.0 and later: Quarantined
- Android Enterprise: Quarantined

- iOS 8.0 and later: Quarantined
- macOS 10.11 and later: Quarantined

- Linux: See Allowed Distros

- Windows 10/11: Quarantined

Minimum OS version- Android 4.0 and later: Quarantined
- Samsung Knox Standard 4.0 and later: Quarantined
- Android Enterprise: Quarantined

- iOS 8.0 and later: Quarantined
- macOS 10.11 and later: Quarantined

- Linux: See Allowed Distros

- Windows 10/11: Quarantined

PIN or password configuration- Android 4.0 and later: Quarantined
- Samsung Knox Standard 4.0 and later: Quarantined
- Android Enterprise: Quarantined

- iOS 8.0 and later: Remediated
- macOS 10.11 and later: Remediated

- Linux: Quarantined

- Windows 10/11: Remediated

Windows health attestation- Android 4.0 and later: Not applicable
- Samsung Knox Standard 4.0 and later: Not applicable
- Android Enterprise: Not applicable

- iOS 8.0 and later: Not applicable
- macOS 10.11 and later: Not applicable

- Linux: Not applicable

- Windows 10/11: Quarantined

Note

The Company Portal app enters the enrollment remediation flow when the user signs into the app and the device has not successfully checked in with Intune for 30 days or more (or the device is non-compliant due to a Lost contact compliance reason). In this flow, we attempt to initiate a check-in one more time. If that still does not succeed, we issue a retire command to allow the user to re-enroll the device manually.

Next steps

  • Create and deploy policy and review prerequisites
  • Monitor device compliance
  • Common questions, issues, and resolutions with device policies and profiles in Microsoft Intune
  • Reference for policy entities has information about the Intune Data Warehouse policy entities
Device compliance policies in Microsoft Intune (2024)

FAQs

Does Intune require device compliance? ›

To manage the compliance policy settings, sign in to Microsoft Intune admin center and go to Endpoint security > Device compliance > Compliance policy settings. This setting determines how Intune treats devices that haven't been assigned a device compliance policy.

What happens if a device is not compliant in Intune? ›

The result of this default is when Intune detects a device isn't compliant, Intune immediately marks the device as noncompliant. After a device is marked as noncompliance, Azure Active Directory (AD) Conditional Access can block the device.

How often does Intune check device compliance? ›

By default, Intune devices check in every 8 hours. If Last check in is more than 24 hours, there may be an issue with the device. A device that can't check in can't receive your policies from Intune.

How do I check my Intune device compliance? ›

View compliance reports
  1. Sign in to the Microsoft Endpoint Manager admin center.
  2. Select Devices > Monitor, and then from below Compliance select the report you want to view. Some of the available compliance reports include: Device compliance. Noncompliant devices. Devices without compliance policy. Setting compliance.

What are the minimum requirements for Intune? ›

Intune requires Android 8. x or higher for device enrollment scenarios and app configuration delivered through Managed devices app configuration policies. This requirement does not apply to Microsoft Teams Android devices as these devices will continue to be supported.

What is the difference between conditional access and compliance policy? ›

So, what is Device Compliance and Conditional Access? Let's look at them in terms of health. Compliance: Tells you if your device is healthy or not. Conditional Access: Determines what to do with these devices depending on their health status.

How do I know if my device is compliant? ›

Tap Devices and then select your device. Under Device Settings Status, tap Check device settings. Company Portal will check your device to confirm that it's meeting your organization's policy requirements. After the check, your device settings status will either read, In Compliance or Not in Compliance.

Do I need an Intune license for every device? ›

Each device that accesses and uses the online services and related software (including System Center software) must have a device license available in the Microsoft 365 tenant. If a device is used by more than one user, each device requires a device based software license or all users require a user software license.

What are the limitations of device enrollment manager Intune? ›

A DEM account is useful for scenarios where devices are enrolled & prepared before handing them out to the users of the devices. There's a limit of 150 Device Enrollment Manager accounts in Microsoft Intune. DEM enrolls Windows 10/11 devices.

How do I make my device Intune compliant? ›

Step-by-Step Guide to Microsoft Intune Device Compliances
  1. To start, log in Azure portal as Global administrator.
  2. Then go to All Services | Intune | Devices.
  3. Under devices I can see my demo device is in healthy state.
  4. First, we need to create device group, so I can target it with the policy. ...
  5. Then click on New Group.
Dec 2, 2018

What is the grace period for Intune compliance policy? ›

In-grace period: The device is targeted with one or more device compliance policy settings. But, the user hasn't applied the policies yet. This means the device is not-compliant, but it's in the grace-period defined by the admin. Learn more about Actions for noncompliant devices.

What is the default compliance policy in Intune? ›

Intune Compliance Policy for device help to protect company data; the organization needs to ensure that the devices used to access company apps and data comply with certain rules. By default, when Intune detects a device that isn't compliant, Intune immediately marks the device as non-compliant.

How do I know if Intune policies are applied? ›

At any time, users can open the Company Portal app, Devices > Check Status or Settings > Sync to immediately check for policy or profile updates. For related information about the Intune Management Extension agent or Win32 apps, see Win32 app management in Microsoft Intune.

How do I check my Intune compliance update? ›

Sign in to the Microsoft Intune admin center. Select Devices > Monitor, and then below Software updates select Feature update failures. Selecting a profile opens a dedicated view that contains all active Alerts for that profile.

What is a compliance policy? ›

Compliance policies detail the laws, industry regulations and government legislation around managing your business, employees and customers. Compliance policies include a Human Resources Policy, Financial Services Policy, Data Security Policy and Work-place Safety Policy.

What is Microsoft Intune limitation? ›

Intune device limit restrictions set the maximum number of devices that a user can enroll. You can allow a user to enroll up to 15 devices. To set a device limit restriction, sign in to Microsoft Intune admin center. Then go to Devices > Enrollment restrictions.

Is Intune a full MDM? ›

Microsoft Intune is a cloud-based mobile device management (MDM) service that helps you manage and secure mobile devices used by your employees. With Intune, you can manage apps, devices, and data for your employees. You can also set up security policies to help protect your company's data.

What is an Intune compliant device? ›

Device compliance policies are a key feature when using Intune to protect your organization's resources. In Intune, you can create rules and settings that devices must meet to be considered compliant, such as a minimum OS version.

What is the limit of Conditional Access policies? ›

Conditional Access has a limit of 195 policies per-tenant. We recommend that you analyze your apps and group them into applications that have the same resource requirements for the same users.

What are the two main components of a Conditional Access policy? ›

Simple policies

A Conditional Access policy must contain at minimum the following to be enforced: Name of the policy. Users and/or groups to apply the policy to.

What are the three key elements of Conditional Access? ›

Three critical elements go behind activating conditional access: assignments, access controls, and policy enablement.

What is conditional access for compliant devices? ›

Conditional Access can be used to allow or block access to Exchange on-premises based on the device compliance policies and enrollment state. When Conditional Access is used in combination with a device compliance policy, only compliant devices are allowed access to Exchange on-premises.

How do I know if my device is on a banned list? ›

Find the IMEI (International Mobile Equipment Identity) or ESN (Electronic Serial number). You can find these numbers in your phone's settings in the About section, on your battery, the phone box, or on the back of the phone. Once you find the number, call your carrier to verify if it's blacklisted.

What are compliant devices? ›

Compliant Device means a mobile communications device upon which is installed an Approved Complete ICQ Application, which is an Authorized Platform for that particular Approved Complete ICQ Application, which has been authorized for distribution under Section 4.4, and which otherwise meets the requirements of this ...

What is the total device limit for Intune? ›

There is a maximum limit of 20,000 devices in a single Windows Intune subscription account. Organizations may choose to have multiple accounts if they need to manage more than 20,000 devices.

What is the difference between Intune and Endpoint Manager? ›

Account editing: Microsoft Intune does not allow administrators to edit user accounts in the program's interface. Endpoint Manager allows users to manage accounts across its suite from its admin center.

Can you have two Intune profiles? ›

Intune only supports deploying app protection policies to only one user account per device. Microsoft details this in their support document What to expect when your iOS app is managed by app protection policies.

How many devices can a device enrollment manager enroll? ›

People signed in to a DEM account can enroll and manage up to 1,000 devices, while a standard non-admin account can only enroll 15. A DEM account requires an Intune user or device license, and an associated Azure AD user.

What is the difference between configuration profile and compliance policy? ›

This is completely different than “Compliance policy” where it simply to checks to see if the users are within compliance. Configuration profiles flexes its muscles and does the heavy lifting.

What is Intune compliance policy error 65000? ›

The states include error, conflict, and success. The Intune error code 65000 could be of the oblivious reasons explained for the issue related to Managing Local Admins using Intune Local User Group Membership Management Policy in the post, Manage Local Admins using Intune Local User Group Membership Management Policy.

What is the number of days to wait before restart is enforced Intune? ›

A setting of 1 day or 2 days provides device users flexibility to manage a restart before it's forced. These settings correspond to an automatic restart delay of 24 or 48 hours after the update installs on the device.

How do you enforce Intune policy? ›

If a policy or application is sent to the device Intune will try to notify the device within five minutes, otherwise the device should check in every 24 hours. To force the policy sync on a device open the Start menu and select Settings. Select Accounts. Select Work access then the organization you are subscribed to.

What is error 65001 in Intune compliance policy? ›

Error 65001 - Application X doesn't have permission to access application Y or the permission has been revoked. Or The user or administrator has not consented to use the application with ID X. Send an interactive authorization request for this user and resource.

Does Intune compliance require BitLocker? ›

Currently, Intune supports only the encryption check with BitLocker. For a more robust encryption setting, consider using Require BitLocker, which leverages Windows Device Health Attestation to validate Bitlocker status at the TPM level.

What standards Microsoft is in compliance with? ›

ISO/IEC 27001:2013 Information Security Management Standards - Microsoft Compliance | Microsoft Learn.

What is the grace period for Intune device compliance? ›

You can edit and make other changes to the compliance policy via the Intune portal, the grace period will stay set at 1 hour. The policy works exactly as expected, devices are marked as “in grace period” immediately after enrolment and users can access corporate resources immediately.

How to get device state and compliance information from Microsoft Intune? ›

View the device details
  1. Sign in to the Microsoft Intune admin center.
  2. Select Devices > All devices > select one of your listed devices to open its details: Overview shows the device name, and lists some key properties of the device, like whether it's a personal or corporate device, serial number, primary user, and more.
Mar 29, 2023

How do I force a device to sync with Intune policy? ›

Sync a device
  • Sign in to the Microsoft Intune admin center.
  • Select Devices > All devices.
  • In the list of devices you manage, select a device to open its Overview pane, and then select Sync.
  • To confirm, select Yes.
Mar 1, 2023

How do I collect device logs in Intune? ›

Collect diagnostics
  1. Sign in to the Microsoft Intune admin center.
  2. Navigate to Devices > Windows > select a supported device.
  3. On the device's Overview page, select … > ...
  4. To see the status of the action, select Device diagnostics monitor.
  5. After the action completes, select Download in the row for the action > Yes.
Mar 9, 2023

How many devices does an Intune license cover? ›

Intune device limit restrictions

You can allow a user to enroll up to 15 devices. To set a device limit restriction, sign in to Microsoft Intune admin center. Then go to Devices > Enrollment restrictions. For more information, see Create a device limit restriction.

How much does an Intune license cost? ›

Microsoft Intune Pricing Overview
Microsoft 365 Business Basic $5 On Premise per user/per monthMicrosoft 365 For Individuals $6.99 On Premise per month
Microsoft 365 Business Standard $12.50 On Premise per user/per monthMicrosoft 365 Business Premium $15 On Premise per user/per month

Top Articles
Latest Posts
Article information

Author: Kareem Mueller DO

Last Updated:

Views: 6431

Rating: 4.6 / 5 (46 voted)

Reviews: 85% of readers found this page helpful

Author information

Name: Kareem Mueller DO

Birthday: 1997-01-04

Address: Apt. 156 12935 Runolfsdottir Mission, Greenfort, MN 74384-6749

Phone: +16704982844747

Job: Corporate Administration Planner

Hobby: Mountain biking, Jewelry making, Stone skipping, Lacemaking, Knife making, Scrapbooking, Letterboxing

Introduction: My name is Kareem Mueller DO, I am a vivacious, super, thoughtful, excited, handsome, beautiful, combative person who loves writing and wants to share my knowledge and understanding with you.