Day-9: Device Compliance & Configuration Policies (Deep Admin Guide)

By | February 2, 2026

Device Compliance & Configuration Policies in Microsoft Intune


🎯 Objective of Day-9

By the end of Day-9, you will be able to:

  • Explain compliance vs configuration clearly
  • Create and assign compliance policies
  • Troubleshoot non-compliant devices
  • Understand how Conditional Access uses compliance

1️⃣ Compliance vs Configuration (MOST IMPORTANT)

FeatureCompliance PolicyConfiguration Profile
PurposeDecide device trustApply settings
ResultCompliant / Non-CompliantSettings enforced
Used by CAβœ… Yes❌ No
Blocks accessβœ… Yes❌ No

πŸ“Œ Golden rule:

Compliance = decision
Configuration = enforcement


2️⃣ What is a Device Compliance Policy?

A compliance policy checks whether a device:

  • Has a password
  • Is encrypted
  • Is up-to-date
  • Is not jailbroken/rooted

If conditions fail β†’ device becomes Non-Compliant


3️⃣ Where to Create Compliance Policies

Steps:

  1. Intune Admin Center β†’ Devices
  2. Device compliance
  3. Policies
  4. Create policy
  5. Choose platform (Windows / iOS / Android)

4️⃣ Common Compliance Settings (Windows Example)

Typical checks:

  • Require BitLocker
  • Require password
  • Minimum OS version
  • Maximum OS version
  • Firewall enabled

πŸ“Œ These settings do not configure BitLocker β€” they only check status.


5️⃣ Assigning Compliance Policies

Steps:

  1. Select compliance policy
  2. Assignments
  3. Select user or device group
  4. Save

⚠ Best practice:
Use user groups, not devices.


6️⃣ What Happens When Device Is Non-Compliant?

  • Device status = Non-Compliant
  • User still signs in (initially)
  • Conditional Access evaluates status
  • Access may be blocked

πŸ“Œ Intune itself does not block access β€” Conditional Access does.


7️⃣ Grace Period (Very Important)

Admins can define a grace period.

Example:

  • Device becomes non-compliant
  • User gets time (e.g. 3 days) to fix it
  • After grace β†’ access blocked

πŸ“Œ Prevents sudden user outages.


8️⃣ What is a Configuration Profile?

A configuration profile:

  • Enforces settings
  • Changes device behavior

Examples:

  • Enforce BitLocker
  • Password complexity
  • Disable USB storage
  • Wi-Fi profiles

9️⃣ Create Configuration Profile (Windows)

Steps:

  1. Intune β†’ Devices
  2. Configuration profiles
  3. Create profile
  4. Platform: Windows 10 and later
  5. Profile type: Settings catalog

πŸ”Ÿ Compliance Without Configuration (Common Mistake)

Scenario:

  • Compliance policy requires BitLocker
  • No configuration profile to enable BitLocker

Result:
❌ Device becomes non-compliant
❌ User blocked
❌ Admin escalation

πŸ“Œ Always pair configuration first, then compliance.


1️⃣1️⃣ Monitoring Compliance Status

Steps:

  1. Intune β†’ Devices
  2. All devices
  3. Select device
  4. Device compliance

You can see:

  • Compliance state
  • Failed rules
  • Last check-in time

1️⃣2️⃣ Troubleshooting Non-Compliant Devices

Checklist:

  • License assigned?
  • Correct policy assigned?
  • OS supported?
  • Device synced recently?
  • Grace period expired?

πŸ“Œ 90% issues = assignment or licensing.


1️⃣3️⃣ Real-World Admin Insight

Never deploy:
❌ Compliance + Conditional Access together on Day-1

Always:
βœ” Configure β†’ Monitor β†’ Enforce β†’ Block


βœ… End of Day-9 Outcome

You can now:
βœ” Design compliance policies safely
βœ” Explain Intune trust logic
βœ” Avoid user lockouts
βœ” Prepare for Conditional Access


πŸ”œ Day-10 Preview

Day-10: Conditional Access + Intune

  • How CA evaluates identity & device
  • β€œRequire compliant device” explained
  • Common CA mistakes
  • Real incident scenarios

Leave a Reply

Your email address will not be published. Required fields are marked *