%3CLINGO-SUB%20id%3D%22lingo-sub-1616735%22%20slang%3D%22en-US%22%3EIntroducing%20a%20simpler%20way%20to%20secure%20your%20Windows%2010%20computers%20with%20Microsoft%20365%20Business%20Premium%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1616735%22%20slang%3D%22en-US%22%3E%3CP%3EApplying%20security%20policies%20to%20the%20computers%20in%20your%20organization%20is%20a%20foundational%20security%20practice.%26nbsp%3B%20It%E2%80%99s%20especially%20important%20now%20that%20more%20employees%20are%20using%20these%20devices%20away%20from%20the%20office.%26nbsp%3B%20To%20make%20it%20easier%20for%20you%20to%20protect%20your%20organization%E2%80%99s%20devices%2C%20we%E2%80%99ve%20added%20a%20new%20setup%20experience%20to%20the%20Microsoft%20365%20admin%20center%20that%20allows%20you%20to%20establish%20a%20security%20baseline%20for%20all%20of%20the%20Windows%2010%20PCs%20in%20your%20organization%20in%20just%20a%20few%20clicks.%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThis%20new%20experience%20is%20available%20to%20customers%20with%20Microsoft%20365%20Business%20Premium.%20%26nbsp%3BIt%20has%20begun%20rolling%20out%20and%20will%20reach%20all%20eligible%20customers%20within%20the%20next%20few%20months.%20Let%E2%80%99s%20take%20a%20closer%20look%20at%20what%E2%80%99s%20new.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ETo%20access%20these%20new%20capabilities%2C%20in%20the%20Microsoft%20365%20Admin%20Center%2C%20open%20%3CSTRONG%3ESetup%20%3C%2FSTRONG%3Eon%20the%20left%20menu.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Opener.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F215114iC66BF4D1A9885626%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22Opener.png%22%20alt%3D%22Opener.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CDIV%20id%3D%22tinyMceEditorJon%20Orton_0%22%20class%3D%22mceNonEditable%20lia-copypaste-placeholder%22%3E%26nbsp%3B%3C%2FDIV%3E%0A%3CP%3EIn%20the%20%3CSTRONG%3ESign-up%20and%20Security%20%3C%2FSTRONG%3Esection%2C%20find%20%3CSTRONG%3ESecure%20your%20Windows%2010%20computers%3C%2FSTRONG%3E%2C%20and%20click%20the%20View%20button.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%222.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F215099i2B09FBA2E32A42CB%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%222.png%22%20alt%3D%222.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EOn%20the%20%3CSTRONG%3ESecure%20your%20Windows%2010%20computers%3C%2FSTRONG%3E%20page%2C%20you%20can%20read%20about%20the%20streamlined%20process%20for%20securing%20Windows%2010%20devices%20and%20access%20relevant%20documentation.%26nbsp%3B%20As%20the%20page%20notes%2C%20this%20experience%20is%20built%20with%20small%20and%20medium-sized%20businesses%20in%20mind.%26nbsp%3B%20It%20simplifies%20the%20process%20of%20setting%20up%20Intune-powered%20devices%20policies.%26nbsp%3B%20Larger%20enterprises%20and%20advanced%20users%20can%20go%20to%20the%20Endpoint%20Manager%20admin%20center%20instead.%26nbsp%3B%20Click%20the%20%3CSTRONG%3EGet%20Started%3C%2FSTRONG%3E%20button%20to%20continue.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%223.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F215100i1B8670965A6D4EA9%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%223.png%22%20alt%3D%223.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20pane%20that%20appears%20on%20the%20right%20side%20shows%20the%20five%20policies%20recommended%20for%20applying%20a%20security%20baseline.%26nbsp%3B%20The%20policies%20that%20you%20can%20enable%20here%20are%20a%20lightweight%20set%20designed%20to%20elevate%20your%20protection%20while%20minimizing%20user%20impact%20and%20limiting%20management%20complexity.%20They%20were%20selected%20based%20on%20input%20from%20IT%20partners%20who%20serve%20small%20and%20medium%20sized%20businesses%2C%20telemetry%20on%20the%20most%20commonly%20applied%20Intune%20policies%2C%20and%20feedback%20from%20customers.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20recommended%20security%20settings%20are%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CSTRONG%3E%3CEM%3EHelp%20protect%20PCs%20from%20viruses%20and%20other%20threats%20using%20Windows%20Defender%20Antivirus%3A%3C%2FEM%3E%3C%2FSTRONG%3E%20Requires%20that%20Windows%20Defender%20Antivirus%20is%20turned%20on%20to%20protect%20PCs%20from%20the%20dangers%20of%20being%20connected%20to%20the%20internet.%3C%2FLI%3E%0A%3CLI%3E%3CSTRONG%3E%3CEM%3EHelp%20protect%20PCs%20from%20web-based%20threats%3A%20%3C%2FEM%3E%3C%2FSTRONG%3ETurns%20on%20settings%20in%20that%20help%20protect%20users%20from%20malicious%20sites%20and%20downloads.%20It%20also%20prevents%20the%20launching%20off%20applications%20with%20Microsoft%20Office.%3C%2FLI%3E%0A%3CLI%3E%3CSTRONG%3E%3CEM%3EPrevent%20network%20access%20to%20potentially%20malicious%20content%20on%20the%20Internet%3A%3C%2FEM%3E%3C%2FSTRONG%3E%20Network%20protection%20helps%20to%20prevent%20employees%20from%20using%20any%20application%20to%20access%20dangerous%20domains%20that%20may%20host%20phishing%20scams%2C%20exploits%2C%20and%20other%20malicious%20content%20on%20the%20internet.%3C%2FLI%3E%0A%3CLI%3E%3CSTRONG%3E%3CEM%3EHelp%20protect%20files%20and%20folders%20on%20PCs%20from%20unauthorized%20access%20with%20BitLocker%3A%20%3C%2FEM%3E%3C%2FSTRONG%3EBitLocker%20Drive%20Encryption%20is%20a%20data%20protection%20feature%20that%20integrates%20with%20the%20operating%20system%20and%20addresses%20the%20threats%20of%20data%20theft%20or%20exposure%20from%20lost%2C%20stolen%2C%20or%20inappropriately%20decommissioned%20computers.%3C%2FLI%3E%0A%3CLI%3E%3CSTRONG%3E%3CEM%3ETurn%20off%20device%20screen%20when%20idle%20for%20this%20amount%20of%20time%3A%3C%2FEM%3E%3C%2FSTRONG%3E%26nbsp%3B%20Makes%20sure%20that%20company%20data%20is%20protected%20if%20a%20user%20is%20idle.%20A%20user%20may%20be%20working%20in%20a%20public%20location%2C%20like%20a%20coffee%20shop%2C%20and%20step%20away%20or%20be%20distracted%20for%20just%20a%20moment%2C%20leaving%20their%20device%20vulnerable%20to%20random%20glances.%20This%20setting%20lets%20you%20control%20how%20long%20the%20user%20can%20be%20idle%20before%20the%20screen%20shuts%20off.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3EWhen%20you%20click%20Apply%20Settings%2C%20the%20system%20will%20create%20these%20policies%20in%20Intune.%26nbsp%3B%20For%20these%20policies%20to%20actually%20take%20effect%2C%20the%20conditions%20noted%20in%20the%20gray%20box%20must%20be%20true.%3C%2FP%3E%0A%3CDIV%20id%3D%22tinyMceEditorJon%20Orton_3%22%20class%3D%22mceNonEditable%20lia-copypaste-placeholder%22%3E%26nbsp%3B%3C%2FDIV%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%224.png%22%20style%3D%22width%3A%20581px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F215117iF02B4256432AE1A4%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%224.png%22%20alt%3D%224.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20most%20important%20of%20these%20is%20that%20the%20user%E2%80%99s%20computer%20must%20be%20enrolled%20in%20Intune.%20%26nbsp%3BThat%20is%20how%20the%20computer%20knows%20to%20check%20the%20cloud%20to%20see%20which%20settings%20should%20be%20applied.%20For%20information%20about%20Intune%20enrollment%20in%20an%20environment%20where%20PCs%20are%20joined%20to%20an%20on-premises%20Active%20Directory%20domain%2C%20see%20%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Fdocs.microsoft.com%252Fen-us%252Fmicrosoft-365%252Fbusiness%252Fmanage-windows-devices%253Fview%253Do365-worldwide%26amp%3Bdata%3D02%257C01%257Cjonorton%2540microsoft.com%257Cf0ccc2b81bd44aa0d28b08d849e32954%257C72f988bf86f141af91ab2d7cd011db47%257C1%257C0%257C637340587289321317%26amp%3Bsdata%3DvmWaLtBSNCCXRnNS05TwB4upX8qsq2Olyjxmh1Q1J2w%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EEnable%20domain-joined%20Windows%2010%20devices%20to%20be%20managed%20by%20Microsoft%20365%20Business%20Premium%3C%2FA%3E%2C%20an%20article%20that%20we%20recently%20improved%20based%20on%20customer%20feedback.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CEM%3ENote%3A%20You%20typically%20will%20not%20need%20to%20change%20Azure%20Active%20Directory%20settings%20noted%20in%20the%20gray%20box%20unless%20you%20have%20previously%20customized%20them.%26nbsp%3B%26nbsp%3B%20%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3EAfter%20the%20policy%20setup%20is%20complete%2C%20you%20can%20access%20and%20modify%20the%20policies%20at%20any%20time%20by%20clicking%20%3CSTRONG%3EDevices%3C%2FSTRONG%3E%20and%20then%20%3CSTRONG%3EPolicies%3C%2FSTRONG%3E.%26nbsp%3B%3C%2FP%3E%0A%3CDIV%20id%3D%22tinyMceEditorJon%20Orton_4%22%20class%3D%22mceNonEditable%20lia-copypaste-placeholder%22%3E%26nbsp%3B%3C%2FDIV%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%225.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F215118i6871D52F2FF7FAF1%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%225.png%22%20alt%3D%225.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20policy%20called%20%E2%80%9CDevice%20Policy%20for%20Windows%2010%E2%80%9D%20is%20the%20one%20created%20in%20the%20setup%20experience.%26nbsp%3B%20You%20can%20modify%20that%20policy%20or%20create%20additional%20ones.%3C%2FP%3E%0A%3CP%3EWhen%20you%20edit%20the%20settings%2C%20you%E2%80%99ll%20notice%20the%20original%20settings%20plus%20additional%20ones%20you%20can%20activate%3B%20related%20to%20keeping%20devices%20up%20to%20date%2C%20allowing%20users%20to%20download%20apps%20from%20the%20Microsoft%20store%2C%20and%20so%20on.%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%226.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F215103i19A527827BE1F5FD%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%226.png%22%20alt%3D%226.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CDIV%20id%3D%22tinyMceEditorJon%20Orton_5%22%20class%3D%22mceNonEditable%20lia-copypaste-placeholder%22%3E%26nbsp%3B%3C%2FDIV%3E%0A%3CP%3EAdvanced%20users%20who%20are%20familiar%20with%20Intune%20can%20also%20edit%20these%20policies%20and%20create%20others%20in%20the%20Endpoint%20Manager%20admin%20center%2C%20which%20is%20accessible%20in%20the%20left%20navigation.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWe%E2%80%99re%20rolling%20these%20capabilities%20out%20right%20now%2C%20and%20are%20eager%20for%20you%20to%20put%20them%20to%20work%20to%20secure%20the%20devices%20in%20your%20organization.%20%26nbsp%3BIf%20you%20have%20questions%20about%20the%20new%20setup%20experience%2C%20or%20feedback%20for%20the%20team%2C%20let%20us%20know%20here%20in%20the%20Tech%20Community.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-1616735%22%20slang%3D%22en-US%22%3E%3CP%3EWe%E2%80%99ve%20added%20a%20new%20setup%20experience%20to%20the%20Microsoft%20365%20admin%20center%20that%20allows%20you%20to%20establish%20a%20security%20baseline%20for%20all%20of%20the%20Windows%2010%20PCs%20in%20your%20organization%20in%20just%20a%20few%20clicks.%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1619182%22%20slang%3D%22en-US%22%3ERe%3A%20Introducing%20a%20simpler%20way%20to%20secure%20your%20Windows%2010%20computers%20with%20Microsoft%20365%20Business%20Premiu%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1619182%22%20slang%3D%22en-US%22%3E%3CP%3EExcellent!!!%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1623793%22%20slang%3D%22en-US%22%3ERe%3A%20Introducing%20a%20simpler%20way%20to%20secure%20your%20Windows%2010%20computers%20with%20Microsoft%20365%20Business%20Premiu%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1623793%22%20slang%3D%22en-US%22%3E%3CP%3EThank%20you%20so%20much.%20It%20is%20well%20to%20connect%20the%20devices%20with%20the%20security%20of%20M365%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1634443%22%20slang%3D%22en-US%22%3ERe%3A%20Introducing%20a%20simpler%20way%20to%20secure%20your%20Windows%2010%20computers%20with%20Microsoft%20365%20Business%20Premiu%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1634443%22%20slang%3D%22en-US%22%3E%3CP%3EThis%20was%20really%20helpful.%20Thanks%20so%20much!%3C%2FP%3E%3C%2FLINGO-BODY%3E
Microsoft

Applying security policies to the computers in your organization is a foundational security practice.  It’s especially important now that more employees are using these devices away from the office.  To make it easier for you to protect your organization’s devices, we’ve added a new setup experience to the Microsoft 365 admin center that allows you to establish a security baseline for all of the Windows 10 PCs in your organization in just a few clicks. 

 

This new experience is available to customers with Microsoft 365 Business Premium.  It has begun rolling out and will reach all eligible customers within the next few months. Let’s take a closer look at what’s new.

 

To access these new capabilities, in the Microsoft 365 Admin Center, open Setup on the left menu.

 

Opener.png

 

In the Sign-up and Security section, find Secure your Windows 10 computers, and click the View button.

 

2.png

 

On the Secure your Windows 10 computers page, you can read about the streamlined process for securing Windows 10 devices and access relevant documentation.  As the page notes, this experience is built with small and medium-sized businesses in mind.  It simplifies the process of setting up Intune-powered devices policies.  Larger enterprises and advanced users can go to the Endpoint Manager admin center instead.  Click the Get Started button to continue.

 

3.png

 

The pane that appears on the right side shows the five policies recommended for applying a security baseline.  The policies that you can enable here are a lightweight set designed to elevate your protection while minimizing user impact and limiting management complexity. They were selected based on input from IT partners who serve small and medium sized businesses, telemetry on the most commonly applied Intune policies, and feedback from customers.

 

The recommended security settings are:

  • Help protect PCs from viruses and other threats using Windows Defender Antivirus: Requires that Windows Defender Antivirus is turned on to protect PCs from the dangers of being connected to the internet.
  • Help protect PCs from web-based threats: Turns on settings in that help protect users from malicious sites and downloads. It also prevents the launching off applications with Microsoft Office.
  • Prevent network access to potentially malicious content on the Internet: Network protection helps to prevent employees from using any application to access dangerous domains that may host phishing scams, exploits, and other malicious content on the internet.
  • Help protect files and folders on PCs from unauthorized access with BitLocker: BitLocker Drive Encryption is a data protection feature that integrates with the operating system and addresses the threats of data theft or exposure from lost, stolen, or inappropriately decommissioned computers.
  • Turn off device screen when idle for this amount of time:  Makes sure that company data is protected if a user is idle. A user may be working in a public location, like a coffee shop, and step away or be distracted for just a moment, leaving their device vulnerable to random glances. This setting lets you control how long the user can be idle before the screen shuts off.

When you click Apply Settings, the system will create these policies in Intune.  For these policies to actually take effect, the conditions noted in the gray box must be true.

 

4.png

 

The most important of these is that the user’s computer must be enrolled in Intune.  That is how the computer knows to check the cloud to see which settings should be applied. For information about Intune enrollment in an environment where PCs are joined to an on-premises Active Directory domain, see Enable domain-joined Windows 10 devices to be managed by Microsoft 365 Business Premium, an article that we recently improved based on customer feedback.

 

Note: You typically will not need to change Azure Active Directory settings noted in the gray box unless you have previously customized them.  

After the policy setup is complete, you can access and modify the policies at any time by clicking Devices and then Policies

 

5.png

 

The policy called “Device Policy for Windows 10” is the one created in the setup experience.  You can modify that policy or create additional ones.

When you edit the settings, you’ll notice the original settings plus additional ones you can activate; related to keeping devices up to date, allowing users to download apps from the Microsoft store, and so on. 

 

6.png

 

Advanced users who are familiar with Intune can also edit these policies and create others in the Endpoint Manager admin center, which is accessible in the left navigation.

 

We’re rolling these capabilities out right now, and are eager for you to put them to work to secure the devices in your organization.  If you have questions about the new setup experience, or feedback for the team, let us know here in the Tech Community.

3 Comments
Senior Member

Excellent!!!

New Contributor

Thank you so much. It is well to connect the devices with the security of M365

New Contributor

This was really helpful. Thanks so much!