Intune Compliance Policies: The Baseline Every Regulated Tenant Needs
Intune compliance policies are the most underutilised security control in Microsoft 365. While most organisations deploy Intune for device management (configuration profiles, app deployment), remarkably few implement robust compliance policies that actually enforce security posture at the authentication layer. The distinction matters enormously: a configuration policy pushes settings to a device; a compliance policy evaluates whether the device meets requirements and, critically, feeds that assessment into Conditional Access to permit or deny access.
Compliance vs Configuration Policies: The Critical Distinction
Configuration policies (Devices > Configuration > Profiles) actively push settings to devices. They configure the firewall, deploy Wi-Fi profiles, set BitLocker encryption, and enforce password requirements. They are proactive, they change the device state.
Compliance policies (Devices > Compliance) evaluate the device state and report it. They check whether the firewall is on, whether encryption is active, whether the OS is up to date. They are reactive, they assess and report. The compliance state (Compliant, Not Compliant, In Grace Period, Not Evaluated) is then consumed by Conditional Access policies to make access decisions.
The critical architecture is: Configuration policies enforce the settings. Compliance policies verify them. Conditional Access acts on the verification. Without all three layers, you have gaps.
Essential Compliance Checks
Every regulated tenant should implement the following compliance checks as a baseline. Navigate to Microsoft Intune admin centre > Devices > Compliance > Create policy.
For Windows 10/11 devices:
Device Health:
- Require BitLocker: Yes
- Require Secure Boot: Yes
- Require code integrity: Yes
These checks leverage the Windows Health Attestation Service and verify that the device booted securely. If an attacker disables BitLocker or compromises the boot chain, the device fails compliance.
Device Properties:
- Minimum OS version: Set to the current servicing channel build (e.g., 10.0.22631.xxxx for Windows 11 23H2). Update this monthly after Patch Tuesday.
- Maximum OS version: Optional, but useful for preventing preview builds in production.
System Security:
- Require a password: Yes
- Minimum password length: 12 characters
- Password expiration: Per organisational policy (NCSC now recommends no expiration if using MFA, but some frameworks still require it)
- Firewall: Required
- Antivirus: Required
- Antispyware: Required
- Microsoft Defender Antimalware: Required
- Microsoft Defender Antimalware minimum version: Current version
- Real-time protection: Required
Microsoft Defender for Endpoint:
- Require the device to be at or under the machine risk score: Medium (or Low for high-security environments)
This last check is exceptionally powerful. It means that if Defender for Endpoint detects active threats on a device and raises its risk score, the device automatically fails compliance and loses access to Microsoft 365 - without any human intervention.
For macOS devices:
- Require system integrity protection: Yes
- Require FileVault encryption: Yes
- Minimum OS version: Current macOS version minus one minor release
- Password requirements: Minimum 12 characters, complex
For iOS/iPadOS devices:
- Minimum OS version: Current version minus one minor release
- Jailbreak detection: Block jailbroken devices
- Require a password: Yes, minimum 6 digits
- Maximum minutes of inactivity before password is required: 5
For Android Enterprise devices:
- Minimum OS version: Current version minus two major releases
- Rooted devices: Block
- Require encryption: Yes
- Google Play Services: Required (ensures security patches are deliverable)
Non-Compliant Device Actions
When a device fails compliance, Intune can execute a sequence of actions. Configure these under the compliance policy's Actions for noncompliance section:
- Day 0 - Mark device non-compliant: Immediately. This triggers Conditional Access to block access.
- Day 0 - Send email to end user: Notify the user that their device is non-compliant and provide remediation steps. Use the Intune notification message template to include specific guidance.
- Day 3 - Send push notification: Remind the user via Company Portal push notification.
- Day 7 - Send second email: Escalate to the user's manager (using the Entra ID manager attribute).
- Day 14 - Retire device: For corporate-owned devices, remove all corporate data. For BYOD, selectively wipe corporate apps and data.
The grace period is critical. Setting compliance enforcement to immediate with no grace period will lock out users who are, for example, mid-flight when a patch is released. A 24-48 hour grace period for OS version compliance balances security with usability.
Integration with Conditional Access
The compliance policy alone does nothing to protect resources. It must be consumed by a Conditional Access policy. Navigate to Entra ID > Security > Conditional Access > Create policy:
- Users: All users (exclude emergency access accounts)
- Cloud apps: All cloud apps (or target Microsoft 365 specifically)
- Conditions: Any device platform
- Grant: Require device to be marked as compliant
This single Conditional Access policy transforms every compliance check into an access control. A device without BitLocker cannot access SharePoint. A device with an outdated OS cannot access Exchange Online. A device with active malware (detected by Defender for Endpoint raising the risk score) cannot access anything.
Monitoring and Reporting
Compliance policy effectiveness must be monitored continuously:
- Intune Reports > Device compliance > Policy compliance: Shows the percentage of devices compliant per policy. Target 95% or higher.
- Intune Reports > Device compliance > Setting compliance: Drills into which specific settings are causing failures. Common culprits: OS version (users deferring updates) and BitLocker (devices that were enrolled before BitLocker was enforced).
- Noncompliant device report: Export this monthly as evidence for ISO 27001 (A.8.1 User Endpoint Devices), Cyber Essentials, or SOC 2 audits.
Configure alerts in the Intune admin centre to notify the IT security team when the compliance rate for any policy drops below 90%. This provides early warning of systemic issues, such as a Windows Update deployment failure - before they become access outages.
The compliance policy baseline described here is not optional for regulated organisations. It is the minimum viable security posture that transforms Intune from a device management tool into a genuine Zero Trust enforcement point.