10 MIN READ

Intune Device Compliance

All devices should be compliance before company resources can be accessed. The compliance policies include the following:

  1. Device Encryption
  2. Windows Firewall status
  3. Defender For Endpoint status & threat level
  4. Minimum versions for iOS, Android, and Windows
  5. Windows TPM & Secure Boot

Compliance status for all devices can be verified on Devices – Microsoft Intune admin center
Click on the device you want to verify, Device compliance.

This indicates an issue with the TPM Bitlocker & Secure Boot policy. If you double click it, it will show the per-settings errors.
Per-setting compliance policy errors.

Common issues

Defender for Endpoint status can be an issue if there is a third-part AV installed. Uninstall all that you can find.

Defender for Endpoint threat level – compliance issues regarding this should be taken verry seriously as it could indicate there is a threat on the device. Review incidents alerts, and the device on Security & Compliance (microsoft.com)

BitLocker will be auto enabled, recovery keys will be saved in Entra ID. Policies do require a certain device encryption cryptography. Should there be any conflicts, it’s often enough to decrypt the drive, and enable encryption again.

Secure Boot should always be enabled. Follow these instructions to enable in case it isn’t. It does often require entering the Bios settings, facetiming with the user could be usefull.
Windows 11 and Secure Boot – Microsoft Support

TPM needs to be enabled as well. It also requires access to Bios if it isn’t enabled. There is also TPM.MSC that can be used to configure and verify status.
Enable TPM 2.0 on your PC – Microsoft Support

Latest Articles

Why You Should Only Use Intune Compliant Devices in Your Organization
In today’s threat landscape, cybercriminals are getting smarter, and phishing attacks are more sophisticated than ever. Attackers use tools like Evilginx to bypass traditional security ...
SOAR: Block Log Analytics IP Entities on Azure Frontdoor / WAF #3
How it works Previously, I’ve blogged about two variants that we used at Prof-IT Services to block malicious IP addresses on Azure Frontdoor that were ...
The G-Door: Microsoft 365 & the risk of unmanaged Google Doc accounts
It’s time to secure Google Workspace—even if you’re not using it. Read about our recent discovered vulnerability, called 'G-Door', which allows users to bypass Microsoft ...
Automating Azure SQL Maintenance with Azure Automation
Keeping Your Azure SQL Databases Healthy: The Power of Automation In the realm of database management, maintaining optimal performance and storage efficiency for your Azure ...