Auto Add

Friday, 12 December 2025

Microsoft Intune, a Compliance Policy

 In Microsoft Intune, a Compliance Policy is a set of rules and settings that a device must meet to be considered "healthy" and secure by your organization.

Its primary role is verification. Before a device is allowed to touch corporate data, Intune checks it against a "checklist" you define (e.g., "Does it have a password? Is the drive encrypted?").

Here is a detailed breakdown of how Compliance Policies work, what they check, and how they enforce security.

1. The Core Function: The "Gatekeeper"

In a modern Zero Trust architecture, you cannot assume a device is safe just because a user logs in. The Compliance Policy acts as a real-time health check.

  • Compliant: The device meets all your security rules. It is granted a "Compliant" flag in the system.

  • Non-Compliant: The device fails one or more checks (e.g., old OS, no antivirus). It is flagged as "Non-Compliant," which triggers enforcement actions.

2. Common Compliance Settings

You can create different policies for different platforms (Windows, iOS, Android, macOS). Common rules include:

CategoryCommon Checks
Device HealthIs the device jailbroken (iOS) or rooted (Android)? Is BitLocker (Windows) or FileVault (macOS) encryption enabled?
Operating SystemIs the device running the minimum required OS version (e.g., "Must be on iOS 17 or later")? This ensures devices have the latest security patches.
System SecurityDoes the device have a password/PIN? Does it meet complexity requirements (e.g., 6 digits, alphanumeric)? Is the firewall enabled?
Defender ExposureFor Windows, is the "Machine Risk Score" from Microsoft Defender low enough? If Defender detects malware, the device instantly becomes "Non-Compliant".

3. What Happens When a Device is Non-Compliant?

Intune doesn't just flag the device; it takes action based on "Actions for Non-compliance" that you configure:

  1. Mark device non-compliant: This happens immediately or after a grace period (e.g., 1 day) to give the user time to fix it.

  2. Send email to end user: Intune automatically emails the user: "Your device is non-compliant. Please update your OS to regain access."

  3. Remotely lock: The device can be forced to lock if it remains non-compliant for too long.

  4. Retire the device: In extreme cases, the device can be removed from management.

4. Integration with Conditional Access (The Enforcer)

This is the most critical part. Intune checks the status, but Microsoft Entra ID (Azure AD) enforces the consequence via Conditional Access.

  • The Rule: "Block access to Office 365 if the device is marked Non-Compliant."

  • The Scenario:

    1. A user tries to open Outlook on their phone.

    2. Entra ID checks Intune: "Is this phone compliant?"

    3. Intune says: "No, the OS is outdated."

    4. Entra ID blocks the login and tells the user: "Update your device to continue."

5. Best Practices

  • Don't be too aggressive immediately: When rolling out a new policy, use the "Report Only" mode or set a "Grace Period" (e.g., 3 days) so users aren't locked out instantly for minor issues.

  • Separate Compliance from Configuration: Use Configuration Profiles to apply settings (make the change), and Compliance Policies to check settings (verify the result).

  • Tenant-Wide Settings: Configure the specific setting "Mark devices with no compliance policy assigned as" to Not Compliant. This ensures that a new, unproven device is treated as unsafe until it explicitly passes your checks.

Azure Intune Role and Responsibilities in Modern Endpoint Management

 Microsoft Intune (formerly Azure Intune) acts as the central command center for managing the devices and applications in a modern workplace. Its primary role is to enforce security and configuration standards on endpoints (laptops, mobiles, virtual desktops) while ensuring users have access to the corporate resources they need.

In a modern "Zero Trust" architecture, Intune serves as the compliance engine. It verifies that a device is healthy and secure before Microsoft Entra ID (formerly Azure AD) allows that device to access company data.

Here is a detailed breakdown of the roles and responsibilities associated with Intune in modern endpoint management.

1. Functional Responsibilities of Intune

These are the specific technical tasks Intune handles within an IT environment.

A. Device Management (MDM)

Intune takes responsibility for the device lifecycle, from the moment it is unboxed to when it is retired.

  • Automated Provisioning: Using Windows Autopilot, Apple Automated Device Enrollment, or Android Zero-touch to configure devices "over the air" without IT needing to touch them physically.

  • Configuration Profiles: Pushing standardized settings to devices, such as Wi-Fi networks, VPN configurations, email profiles, and trusted certificates, so users don't have to configure them manually.

  • Inventory & Monitoring: Maintaining a real-time inventory of hardware and software assets and monitoring device health (e.g., detecting if a hard drive is failing or a battery is degrading) via Endpoint Analytics.

  • Remote Actions: Executing critical commands on remote devices, such as Wipe (factory reset), Retire (remove only corporate data), Restart, or Remote Lock.

B. Application Management (MAM)

This role is critical for BYOD (Bring Your Own Device) scenarios where IT manages the data rather than the whole device.

  • Data Protection Policies: Intune creates a "container" around corporate apps. It can prevent users from copying text from a corporate email (Outlook) and pasting it into a personal app (Facebook Messenger).

  • Selective Wipe: The ability to remove only corporate data (e.g., the Teams app and Outlook inbox) from a personal phone while leaving personal photos and apps untouched.

  • App Deployment: Silently installing, updating, or removing applications (Store apps, Win32 apps, or Line-of-Business apps) across the fleet.

C. Security & Compliance Enforcement

Intune acts as the security enforcement arm for endpoints.

  • Compliance Policies: It evaluates devices against a set of rules. If a device fails (e.g., "Jailbroken," "No BitLocker," or "Old OS version"), it is marked as Non-Compliant.

  • Conditional Access Integration: This is Intune's most critical modern role. It feeds compliance status to Microsoft Entra ID. If a device is non-compliant, Entra ID blocks access to resources (like email or SharePoint) until the user fixes the issue.

  • Endpoint Security: Managing settings for Microsoft Defender (Antivirus, Firewall, Attack Surface Reduction) directly from the cloud.


2. Administrator Roles (RBAC) within Intune

If your question refers to the human roles required to manage the platform, Intune uses Role-Based Access Control (RBAC) to divide responsibilities securely:

RolePrimary Responsibilities
Intune AdministratorFull Admin: Has full permission to manage all devices, apps, and settings. Can assign roles to others.
Endpoint Security ManagerSecurity Focus: Manages compliance policies, security baselines, and Defender settings. Can view reports but cannot deploy apps.
Policy and Profile ManagerConfig Focus: Creates and manages configuration profiles (e.g., Wi-Fi, device restrictions) and compliance policies.
Application ManagerApp Focus: Manages the entire app lifecycle (add, deploy, configure, patch) and app protection policies.
Help Desk OperatorSupport Focus: Read-only access to view user/device details. Can perform remote tasks like "Reset Passcode" or "Remote Lock" to assist users.

3. Summary: The Workflow

In a modern setup, the workflow of responsibilities typically follows this path:

  1. Configure: The Policy Manager creates a profile requiring BitLocker encryption.

  2. Enroll: The user logs into a new laptop; Intune pushes the profile and encrypts the drive.

  3. Evaluate: Intune's Compliance Engine checks if the drive is encrypted.

  4. Gatekeep: If encrypted, Intune tells Entra ID the device is "Compliant."

  5. Access: When the user opens Outlook, Entra ID sees the "Compliant" flag and grants access.

Azure AD Connect

I will walk you through how to configure Azure AD Connect to  synchronize on-premises AD identities with Azure AD, there are different types of Azure AD Connect deployment topological in the scenario of multiple forest and multiple Azure AD Tenants. 

Azure AD prerequisites:
1. An Azure AD tenant. You get one with an Azure free trial also.

2. Add and verify the domain you plan to use in Azure AD. This should be your publicly registered domain. For example, if you plan to use goud.com for your users then make sure this domain has been verified and you are not only using the goud.onmicrosoft.com default domain. Every new Azure AD tenant comes with an initial domain name, <domainname>.onmicrosoft.com. You can’t change or delete the initial domain name, but you can add your organization’s names. Adding custom domain names helps you to create user names that are familiar to your users, such as sri@goudo.com.

Azure AD Connect server prerequisites:
1. Azure AD Connect can only be installed on Windows Server Standard, Enterprise or Datacenter editions.
2. Azure AD Connect must be installed on Windows Server 2012 or later. This server must be domain joined and may be a domain controller or a member server.

SQL for Azure AD Connect:
1. Azure AD Connect requires a SQL Server database to store identity data. By default a SQL Server 2012 Express LocalDB (a light version of SQL Server Express) is installed. SQL Server Express has a 10GB size limit that enables you to manage approximately 100,000 objects. If you need to manage a higher volume of directory objects, you need to point the installation wizard to a different installation of SQL Server.
2. Microsoft Azure SQL Database is not supported as a database.

Accounts:
1. An Azure AD Global Administrator account for the Azure AD tenant you wish to integrate with. This account must be a school or organization account and cannot be a Microsoft account.
2. If you use express settings or upgrade from DirSync, then you must have an Enterprise Administrator account for your on-premises Active Directory.

Network Connectivity:
If your local network has firewall/proxy then you need to ensure that all the required ports and endpoints mentioned in below documentations.
https://docs.microsoft.com/en-us/azure/active-directory/hybrid/reference-connect-ports
https://docs.microsoft.com/en-us/office365/enterprise/urls-and-ip-address-ranges?redirectSourcePath=%252fen-gb%252farticle%252foffice-365-urls-and-ip-address-ranges-8548a211-3fe7-47cb-abb1-355ea5aa88a2

Azure AD Connect – Key Terminologies and Components:
Azure AD Connect is a vast solution in itself so it’s not feasible to cover all the deep dive architecture details in this post, below are important AAD Connect terminologies and concepts that you need to understand when working with Azure AD Connect.

1. Azure AD Connect sync (sync engine)
2. Connector
3. Connected Data Sources or Connected Directories (CD)
4. Source anchor
5. Connector Space (CS)
6. Metaverse (MV)
7. Joined Object (or connector object)
8. Disjoined Object (or disconnector object)
9. Provisioning
10. Deprovisioning

It will be good to refer below Microsoft documentations to dive deeper into Azure AD Connect architecture and above concepts.

Azure AD Connect sync: Technical Concepts:
https://docs.microsoft.com/en-us/azure/active-directory/hybrid/plan-connect-design-concepts

Azure AD Connect sync: Understanding the architecture:
https://docs.microsoft.com/en-us/azure/active-directory/hybrid/concept-azure-ad-connect-sync-architecture

Azure AD Connect Authentication (sign-in) Options:
Below are the four different authentication (sign-in) mechanisms provided by Azure AD when you are using Azure AD Connect, based on your feasibility from security and compliance perspective you can choose the one appropriate. During Azure AD Connect installation wizard you will have the ability to choose one of the authentication mechanism.

1. Password Hash Synchronization (PHS):
–When we install Azure AD Connect with “Express Settings” then Password Harsh Synchronization (PHS) authentication mechanism is the default configuration.
–AAD Connect synchronizes a hash, of the hash, of an AD user’s password from an on-premises AD to Azure AD.
–To synchronize user’s password, Azure AD Connect sync extracts user’s password hash from the on-premises Active Directory. Extra security processing is applied to the password hash before it is synchronized to the Azure Active Directory.
–PHS process runs every 2 minutes and we cannot modify the frequency of this process.

2. Pass-through Authentication (PTA):
–Users credentials are validated by on-premises Active Directory Domain Controller via AAD Connect Authentication Agent, On-premises AD user’s passwords are not stored in Azure AD in any form.
–For Pass-through Authentication to work, users need to be provisioned into Azure AD from on-premises Active Directory using Azure AD Connect. Pass-through Authentication does not apply to cloud-only users.
–Communication between Authentication Agent and Azure AD is uses certificate-based authentication. These certificates are automatically renewed every few months by Azure AD.
–Microsoft recommends to have more than one AAD Connect Authentication Agent to provide high availability of authentication requests.
–PTA can also be used in conjunction with PHS for high availability scenarios, As per Microsoft “Enabling Password Hash Synchronization gives you the option to failover authentication if your on-premises infrastructure is disrupted. This failover from Pass-through Authentication to Password Hash Synchronization is not automatic. You’ll need to switch the sign-in method manually using Azure AD Connect. If the server running Azure AD Connect goes down, you’ll require help from Microsoft Support to turn off Pass-through Authentication.”

3. Federation with ADFS:
–In ADFS federation scenario, Azure AD will be redirecting authentication request to ADFS.

4. Federation with PingFederate:
–If you are already using PingFederate in your environment then you may choose this method for authentication. AAD Connect natively supports PingFederate, please refer below official document from PingFederate regarding implementation of this.


Azure AD Connect Server Installation:
I have talked about some important concepts theoretically, Now let’s go ahead and install the Azure AD Connect server in on-premises ADDS environment.

1. Add Custom Domain (Routable) to Azure AD and make it as a “Primary Domain” for Azure AD:
–Login to Azure portal and go to Azure Active Directory.


–Click on “Add custom domain” option.



Microsoft Azure Intune Administration

 Comprehensive Guide to Microsoft Azure Intune Administration


This document provides a comprehensive, step-by-step guide to Microsoft Azure Intune Administration, a core component of Microsoft Endpoint Manager (MEM) and tightly integrated with Azure Active Directory (Azure AD). It details the full lifecycle of modern endpoint management, from initial setup to advanced policy deployment and continuous monitoring.

1. Initial Setup and Tenant Preparation


Successful Intune administration begins with foundational configuration and verification within your Azure tenant.1.1 Accessing the Management Portal


The primary administrative interface is the Microsoft Endpoint Manager Admin Center (MEMAC), which unifies Intune, Configuration Manager, and other endpoint services.

  • Action: Navigate directly to the Microsoft Endpoint Manager admin center at [https://endpoint.microsoft.com](https://endpoint.microsoft.com).

  • Requirement: Sign in with an account holding appropriate permissions (e.g., Global Administrator, Intune Administrator, or Endpoint Manager Administrator).

1.2 Licensing Verification and Assignment


Intune functionality is contingent upon proper user licensing. Most features require licenses such as Microsoft 365 E3/E5, Enterprise Mobility + Security (EMS) E3/E5, or a standalone Intune license.

  • Action: Verify license assignments within the Azure portal under Azure Active Directory > Licenses. Ensure licenses are assigned to the target user groups intended for MDM enrollment.

1.3 Setting the Mobile Device Management (MDM) Authority


This crucial, one-time configuration determines which service manages the endpoints. For cloud-native deployments, the authority must be set to Intune.

  • Action: In the MEMAC, navigate to Tenant administration > Tenant status.

  • Confirmation: Ensure the MDM Authority is explicitly set to Microsoft Intune. (If a tenant previously used a hybrid setup with Configuration Manager, a migration step might be necessary before changing this authority.)

2. Platform Connectors and Integration


To manage devices across all major platforms, Intune requires specific connectors to be established with third-party vendors.2.1 Apple Platform Management (iOS/macOS)


Management of Apple devices necessitates a secure connection via the Apple Push Notification service (APNs).

  • Requirement: An Apple APNs Certificate is required. This process involves generating a certificate signing request (CSR) in Intune, uploading it to the Apple Push Certificates Portal using a valid Apple ID, and then uploading the signed certificate back into Intune.

  • Critical Note: This certificate must be renewed annually using the same Apple ID to avoid losing management control over enrolled devices.

  • Location: Tenant administration > Connectors and tokens > Apple VPP tokens.

2.2 Android Enterprise Integration


For corporate-owned Android devices and robust application management, Intune integrates with Managed Google Play.

  • Action: Link the tenant to Managed Google Play. This involves accepting the terms and launching the Google service connection from the MEMAC.

  • Output: This step creates a dedicated Enterprise account linked to your Intune tenant, enabling you to manage device profiles and approve applications directly from the Google Play store within the MEMAC.

  • Location: Tenant administration > Connectors and tokens > Managed Google Play.

3. Device Enrollment Methods


Intune supports diverse enrollment strategies tailored to device ownership (corporate vs. personal) and operating system.3.1 User Enrollment (BYOD) via Company Portal


This is the standard method for personally-owned devices (Bring Your Own Device, or BYOD) and initial corporate enrollment.

  • Process: Users download the Microsoft Intune Company Portal app, sign in with their work credentials, and follow the guided setup.

  • Control: Enrollment restrictions can be configured to limit the maximum number of devices per user and block specific platforms or minimum OS versions.

  • Location: Devices > Enrollment > Enrollment restrictions.

3.2 Automatic Enrollment (Windows 10/11)


For devices that are Azure AD Joined or Hybrid Azure AD Joined, the enrollment can be seamlessly automated.

  • Configuration: Within the Azure portal, navigate to Azure Active Directory > Mobility (MDM and MAM).

  • Settings: Configure the MDM user scope (e.g., to Some or All) to define which users trigger automatic enrollment upon signing into the device with their work account.

3.3 Apple Automated Device Enrollment (ADE)


This method provides a zero-touch, supervised, corporate-owned deployment experience for iOS/macOS devices purchased directly through Apple Business Manager (ABM) or Apple School Manager (ASM).

  • Process: After setting up the APNs certificate, an Enrollment Program Token is uploaded from ABM/ASM to Intune. Devices are then assigned to an Enrollment Profile within Intune, defining the initial setup assistant experience (e.g., skipping location services, requiring a mandatory MDM profile).

  • Benefit: Devices are locked to MDM and are automatically re-enrolled upon wipe/reset.

  • Location: Devices > Enrollment > iOS/iPadOS > Enrollment Program Tokens.

4. Advanced Policy Management


Policies are the core mechanism for configuring and enforcing security and functional standards across the environment.4.1 Device Configuration Profiles


These profiles are used to push granular settings to devices, such as enabling BitLocker, configuring VPN/Wi-Fi, or controlling device features.

  • Best Practice: Utilize the Settings Catalog profile type. This provides a vast library of settings, mirroring the experience of Group Policy Objects (GPOs), offering unparalleled granular control.

  • Action: Create a profile, select the platform and profile type, configure the necessary settings, and assign it to the required user or device groups.

  • Location: Devices > Configuration profiles > Create profile.

4.2 Compliance Policies and Conditional Access


Compliance policies define the security baselines that devices must meet (e.g., minimum OS version, requiring encryption, demanding a PIN/passcode).

  • Function: If a device is marked as non-compliant, it can be blocked from accessing corporate resources (Exchange Online, SharePoint, Teams) through Conditional Access rules established in Azure AD.

  • Action: Define Actions for noncompliance (e.g., mark device noncompliant, send notification email) and assign the policy to user groups.

  • Location: Devices > Compliance policies.

5. Application Deployment


Intune supports deploying various application types across all managed platforms.5.1 Win32 Application Management


This is the most powerful method for deploying complex legacy applications on Windows, including MSI, EXE, and custom scripts.

  • Process: The installer and any required files are packaged into a .intunewin file using the Microsoft Win32 Content Prep Tool.

  • Configuration: Administrators define installation/uninstallation command lines, detection rules (to verify successful installation), and minimum OS/architecture requirements.

  • Benefit: Supports sophisticated dependency and supersedence rules.

5.2 Application Assignment


When assigning apps, administrators define the deployment purpose:

  • Required: Mandatory installation that Intune enforces and remediates if removed.

  • Available for enrolled devices: Optional installation; the user installs the app via the Company Portal.

  • Uninstall: Forces the removal of an application from the target group's devices.

  • Location: Apps > All apps > Add.

6. Monitoring, Reporting, and Troubleshooting


Continuous management involves monitoring the deployment status and quickly diagnosing issues.6.1 Device Inventory and Health


The All devices view provides a centralized inventory and current health status.

  • Action: Navigate to Devices > All devices. Click any device to view detailed hardware information, device compliance state, assigned policies, and application installation status.

6.2 Detailed Reports


Intune offers built-in reporting to track the success and failure of policy deployments.

  • Device Configuration Reports: Provides a comprehensive view of which devices successfully received configuration profiles and highlights conflict or error states.

  • Compliance Reports: Essential for verifying the overall security posture and identifying devices that are blocked by Conditional Access.

  • Location: Reports > Device configuration or Reports > Device compliance.

6.3 Troubleshooting and Support


The dedicated troubleshooting blade simplifies diagnostics for individual users.

  • Function: Utilize the Troubleshoot + support blade to quickly check a specific user's licensing, group membership, device enrollment status, policy assignment success, and application delivery status, significantly reducing diagnostic time.

  • Location: Troubleshoot + support.

Summary of Intune Administrative Lifecycle

Category

Key Administrative Task

Intune/Azure Location

Best Practice / Context

Foundation

Set MDM Authority

Tenant administration > Tenant status

Crucial one-time setup.

Integration

Configure APNs Certificate

Connectors and tokens

Annual renewal required using the original Apple ID.

Enrollment

Define Windows Auto-Enrollment Scope

Azure AD > Mobility (MDM and MAM)

Assign to a pilot group before All users.

Security Policy

Create Compliance Policy

Devices > Compliance policies

Enforced by Conditional Access rules.

Configuration

Deploy Settings via Settings Catalog

Devices > Configuration profiles

Use the Settings Catalog for GPO-like granularity.

Applications

Deploy Complex Apps (e.g., .exe)

Apps > All apps

Package with the Win32 Content Prep Tool.

Monitoring

Check Policy/App Assignment Success

Devices > Monitor

Essential for post-deployment verification.

Troubleshooting

Review User Health/Assignments

Troubleshoot + support

The fastest way to diagnose user-specific issues.


Microsoft Intune, a Compliance Policy

  In Microsoft Intune, a Compliance Policy is a set of rules and settings that a device must meet to be considered "healthy" and ...