From the course: Microsoft 365: Implement Modern Device Services

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Plan for device compliance

Plan for device compliance

From the course: Microsoft 365: Implement Modern Device Services

Start my 1-month free trial

Plan for device compliance

- [Narrator] When managing the compliance of devices, there are two core approaches. The first one is with conditional access. This is used for devices that comply to policy rules and you are able to give those devices access to email and other organization resources. If the devices do not comply to policy rules, then they don't get access to the organizational resources. This is referred to as conditional access. Second option is without conditional access. You can also use device compliance policies without any conditional access. When you use compliance policies independently, the targeted devices are evaluated and reported with their compliance status. For example, you can get a report on how many devices aren't encrypted or which devices are jailbroken or rooted. When you use compliance polices without conditional access, there aren't any access restrictions to organization resources. Conditional access is how you can…

Contents