Event banner
Policy management with Microsoft Intune
Event Ended
Tuesday, Oct 25, 2022, 07:30 AM PDTEvent details
You’ve seen all the exciting Microsoft Intune policy news at Microsoft Ignite, now it’s time to go deeper. Come join Julia and Mike as we share our top five Intune policy tips and tricks to help keep...
Heather_Poulsen
Updated Dec 27, 2024
PON-JRobinson
Oct 25, 2022Copper Contributor
This is a difficult one. You can use MDE and Vulnerability Management to "baseline" your settings against certain industry recommendations (CIS/STIG), but a lot of it comes down to tracking your own configurations, and building your own based on your requirements.
Unfortunately, as a lot of CSP settings change different registry keys than traditional GPO, I've seen many pen-test tools fail a device just because they're hard-coded to look at the GPO registry value.
Mike-Danoski
Microsoft
Oct 26, 2022This is fantastic advice from James. I was going to say the same for reg key and security enforcement inspection. Id also recommend looking to a benchmark that is MDM focused if you can.