Create Mobile Threat Defense (MTD) device compliance policy with Intune
This information applies to all Mobile Threat Defense partners.
Intune with MTD helps you detect threats and assess risk on mobile devices. You can create an Intune device compliance policy rule that assesses risk to determine if the device is compliant or not. You can then use a Conditional Access policy to block access to services based on device compliance.
Before you begin
As part of the MTD setup, in the MTD partner console, you created a policy that classifies various threats as high, medium, and low. You now need to set the Mobile Threat Defense level in the Intune device compliance policy.
Prerequisites for device compliance policy with MTD:
- Set up MTD integration with Intune
To create an MTD device compliance policy
Go to the Azure portal, and sign in with your Intune credentials.
On the Azure Dashboard, choose All services from the left menu, then type Intune in the text box filter.
Choose Intune, the Intune Dashboard opens.
On the Intune Dashboard, choose Device compliance, then choose Policies under the Manage section.
Choose Create policy, enter the device compliance Name, Description, select the Platform, then choose Configure under the Settings section.
On the compliance policy pane, choose Device Health.
On the Device Health pane, choose the Mobile Threat Level from the drop-down list under the Require the device to be at or under the Device Threat Level.
a. Secured: This level is the most secure. The device cannot have any threats present and still access company resources. If any threats are found, the device is evaluated as noncompliant.
b. Low: The device is compliant if only low-level threats are present. Anything higher puts the device in a noncompliant status.
c. Medium: The device is compliant if the threats found on the device are low or medium level. If high-level threats are detected, the device is determined as noncompliant.
d. High: This level is the least secure. This allows all threat levels, and uses Mobile Threat Defense for reporting purposes only. Devices are required to have the MTD app activated with this setting.
Click OK twice, then choose Create.
If you create Conditional Access policies for Office 365 or other services, the device compliance evaluation is assessed and noncompliant devices are blocked from accessing corporate resources until the threat is resolved in the device.
To assign an MTD device compliance policy
To assign a device compliance policy to users, choose a policy that you have previously configured. Existing policies can be found in the Device compliance – policies pane.
Choose the policy you want to assign to users and choose Assignments. This action opens the pane where you can select Azure Active Directory security groups and assign them to the policy.
Choose Select groups to include to open the pane that displays the Azure AD security groups. Choosing Select deploys the policy to users.
You have applied the policy to users. The devices used by the users who are targeted by the policy are evaluated for compliance.