Edit

Share via


Step 4 - Configure device features and settings to secure devices and access resources

So far, you set up your Intune subscription, created app protection policies, and created device compliance policies.

In this step, you're ready to configure a minimum or baseline set of security and device features that all devices must have.

Diagram that shows getting started with Microsoft Intune with step 4, which is configuring devices features and security settings.

This article applies to:

  • Android
  • iOS/iPadOS
  • macOS
  • Windows

When you create device configuration profiles, you can choose from different levels and types of policies. These levels are the minimum Microsoft recommended policies. Know that your environment and business needs can be different.

  • Level 1 - Minimum device configuration: In this level, Microsoft recommends you create policies that:

    • Focus on device security, including installing antivirus, creating a strong password policy, and regularly installing software updates.
    • Give users access to their organization email and controlled secure access to your network, wherever they are.
  • Level 2 - Enhanced device configuration: In this level, Microsoft recommends you create policies that:

    • Expand device security, including configuring disk encryption, enabling secure boot, and adding more password rules.
    • Use the built-in features and templates to configure more settings that are important for your organization, including analyzing on-premises Group Policy Objects (GPOs).
  • Level 3 - High device configuration: In this level, Microsoft recommends you create policies that:

    • Move to password-less authentication, including using certificates, configuring single sign-on (SSO) to apps, enabling multifactor authentication (MFA), and configuring Microsoft Tunnel.
    • Add extra layers of security by using Android common criteria mode or creating DFCI policies for Windows devices.
    • Use the built-in features to configure kiosk devices, dedicated devices, shared devices, and other specialized devices.
    • Deploy existing shell scripts.

This article lists the different levels of device configuration policies that organizations should use. Most of these policies focus on access to organization resources and security.

Configure these features in device configuration profiles in the Microsoft Intune admin center. When the Intune profiles are ready, assign them to your users and devices.

Level 1 - Create your security baseline

To help keep your organization's data and devices secure, create different policies that focus on security. Create a list of security features that all users and devices must have. This list is your security baseline.

In your baseline, at a minimum, include the following security policies:

  • Install antivirus (AV) software and regularly scan for malware.
  • Use detection and response.
  • Turn on the firewall.
  • Install software updates regularly.
  • Create a strong PIN or password policy.

This section lists the Intune and Microsoft services you can use to create these security policies.

For a more granular list of Windows settings and their recommended values, see Windows security baselines.

Antivirus and scanning

Install antivirus software and regularly scan for malware

Install antivirus software on all devices and regularly scan for malware. Intune integrates with third-party partner mobile threat defense (MTD) services that provide AV and threat scanning. Antivirus and scanning are built in to Intune by using Microsoft Defender for Endpoint.

Your policy options:

Platform Policy type
Android Enterprise - Mobile threat defense partner
- Microsoft Defender for Endpoint
iOS/iPadOS - Mobile threat defense partner
- Microsoft Defender for Endpoint
macOS - Intune Endpoint Security antivirus profile (Microsoft Defender for Endpoint)
Windows client - Intune security baselines (recommended)
- Intune Endpoint Security antivirus profile (Microsoft Defender for Endpoint)

Detection and response

Detect attacks and act on these threats

When you detect threats quickly, you can help minimize the impact of the threat. When you combine these policies with Conditional Access, you can block users and devices from accessing organization resources if a threat is detected.

Your policy options:

Platform Policy type
Android Enterprise - Mobile threat defense partner
- Microsoft Defender for Endpoint
iOS/iPadOS - Mobile threat defense partner
- Microsoft Defender for Endpoint
macOS Intune endpoint detection and response profile (Microsoft Defender for Endpoint)
Windows client - Intune security baselines (recommended)
- Intune endpoint detection and response profile (Microsoft Defender for Endpoint)

Firewall

Enable the firewall on all devices

Some platforms come with a built-in firewall. On other platforms, you might need to install a firewall separately. Intune integrates with third-party partner mobile threat defense (MTD) services that can manage a firewall for Android and iOS/iPadOS devices. For macOS and Windows, Intune includes built-in firewall security through Microsoft Defender for Endpoint.

Your policy options:

Platform Policy type
Android Enterprise Mobile threat defense partner
iOS/iPadOS Mobile threat defense partner
macOS Intune Endpoint Security firewall profile (Microsoft Defender for Endpoint)
Windows client - Intune security baselines (recommended)
- Intune Endpoint Security firewall profile (Microsoft Defender for Endpoint)

Password policy

Create a strong password or PIN policy and block simple passcodes

PINs unlock devices. On devices that access organization data, including personally owned devices, require strong PINs or passcodes and support biometrics to unlock devices. Using biometrics is part of a password-less approach, which is recommended.

Use the settings catalog and device restrictions template profiles in Intune to create and configure password requirements.

Your policy options:

Platform Policy type
Android Enterprise Intune settings catalog for Corporate owned, Fully Managed, and Dedicated devices to manage the:
- Device password
- Work profile password

Intune device restrictions template for Corporate owned and Personally owned devices to manage the:
- Device password
- Work profile password
- Password
Android Open-Source Project (AOSP) - Intune settings catalog > Device password
- Intune device restrictions template > Device password
iOS/iPadOS - Intune settings catalog > Declarative Device Management (DDM) > Passcode (recommended)
- Intune settings catalog > Security > Passcode
- Intune device restrictions template > Password
macOS - Intune settings catalog > Declarative Device Management (DDM) > Passcode (recommended)
- Intune settings catalog > Security > Passcode
- Intune device restrictions template > Password
Windows client - Intune security baselines (recommended)
- Intune device restrictions template > Password
- Manage Windows Hello for Business when devices enroll
- Manage Windows Hello for Business after devices enroll

Software updates

Regularly install software updates

Update all devices regularly, and create policies to make sure these updates are successfully installed. For most platforms, Intune has policy settings that focus on managing and installing updates.

Your policy options:

Platform Policy type
Android Enterprise organization owned devices Intune device restrictions template > Corporate owned > General > System update
Android Enterprise personally owned devices Not available

Can use compliance policies to set a minimum patch level, min/max OS version, and more.
iOS/iPadOS Intune settings catalog managed software updates
macOS Intune settings catalog managed software updates
Windows client - Intune feature updates policy
- Intune quality updates policy

Level 1 - Access organization email, connect to VPN or Wi-Fi

This section focuses on accessing resources in your organization. These resources include:

  • Email for work or school accounts
  • VPN connection for remote connectivity
  • Wi-Fi connection for on-premises connectivity

Diagram that shows an email, VPN, and Wi-Fi profiles deployed from Microsoft Intune to end user devices.

Email

Many organizations deploy email profiles with preconfigured settings to user devices.

Automatically connect to user email accounts

The profile includes the email configuration settings that connect to your email server.

Depending on the settings you configure, the email profile can also automatically connect the users to their individual email account settings.

Use enterprise level email apps

Email profiles in Intune use common and popular email apps, like Outlook. The email app is deployed to user devices. After the app is deployed, you deploy the email device configuration profile with the settings that configure the email app.

The email device configuration profile includes settings that connect to your Exchange.

Access work or school email

Creating an email profile is a common minimum baseline policy for organizations with users that use email on their devices.

Intune has built-in email settings for Android, iOS/iPadOS, and Windows client devices. When users open their email app, they can automatically connect, authenticate, and synchronize their organizational email accounts on their devices.

Deploy anytime

On new devices, deploy the email app during the enrollment process. When enrollment completes, deploy the email device configuration policy.

If you have existing devices, deploy the email app at any time. Then, deploy the email device configuration policy.

Get started with email profiles

To get started:

  1. Deploy an email app to your devices. For some guidance, see Add email settings to devices using Intune.

  2. Create an email device configuration profile in Intune. Depending on the email app your organization uses, you might not need the email device configuration profile.

    For some guidance, see Add email settings to devices using Intune.

  3. In the email device configuration profile, configure the settings for your platform:

  4. Assign the email device configuration profile to your users or user groups.

VPN

Many organizations deploy VPN profiles with preconfigured settings to user devices. The VPN connects your devices to your internal organization network.

If your organization uses cloud services with modern authentication and secure identities, then you probably don't need a VPN profile. Cloud-native services don't require a VPN connection.

If your apps or services aren't cloud-based or aren't cloud-native, deploy a VPN profile to connect to your internal organization network.

Work from anywhere

Creating a VPN profile is a common minimum baseline policy for organizations with remote workers and hybrid workers.

As users work from anywhere, they can use the VPN profile to securely connect to your organization's network to access resources.

Intune has built-in VPN settings for Android, iOS/iPadOS, macOS, and Windows client devices. On user devices, your VPN connection appears as an available connection. Users select it. And, depending on the settings in your VPN profile, users can automatically authenticate and connect to the VPN on their devices.

Use enterprise level VPN apps

VPN profiles in Intune use common enterprise VPN apps, like Check Point, Cisco, Microsoft Tunnel, and more. The VPN app is deployed to user devices. After the app is deployed, then you deploy the VPN connection profile with settings that configure the VPN app.

The VPN device configuration profile includes settings that connect to your VPN server.

Deploy anytime

On new devices, deploy the VPN app during the enrollment process. When enrollment completes, deploy the VPN device configuration policy.

If you have existing devices, deploy the VPN app at any time, and then deploy the VPN device configuration policy.

Get started with VPN profiles

To get started:

  1. Deploy a VPN app to your devices.

  2. Create a VPN configuration profile in Intune.

  3. In the VPN device configuration profile, configure the settings for your platform:

  4. Assign the VPN device configuration profile to your users or user groups.

Wi-Fi

Many organizations deploy Wi-Fi profiles with preconfigured settings to user devices. If your organization has a remote-only workforce, then you don't need to deploy Wi-Fi connection profiles. Wi-Fi profiles are optional and are used for on-premises connectivity.

Connect wirelessly

As users work from different mobile devices, they can use the Wi-Fi profile to wirelessly and securely connect to your organization's network.

The profile includes the Wi-Fi configuration settings that automatically connect to your network and/or SSID (service set identifier). Users don't have to manually configure their Wi-Fi settings.

Support mobile devices on-premises

Creating a Wi-Fi profile is a common minimum baseline policy for organizations with mobile devices that work on-premises.

Intune has built-in Wi-Fi settings for Android, iOS/iPadOS, macOS, and Windows client devices. On user devices, your Wi-Fi connection appears as an available connection. Users select it. And, depending on the settings in your Wi-Fi profile, users can automatically authenticate and connect to the Wi-Fi on their devices.

Deploy anytime

On new devices, deploy the Wi-Fi device configuration policy when devices enroll in Intune.

If you have existing devices, you can deploy the Wi-Fi device configuration policy at any time.

Get started with Wi-Fi profiles

To get started:

  1. Create a Wi-Fi device configuration profile in Intune.

  2. Configure the settings for your platform:

  3. Assign the Wi-Fi device configuration profile to your users or user groups.

Level 2 - Enhanced protection and configuration

This level expands on what you configured in level 1 and adds more security for your devices. In this section, you create a level 2 set of policies that configure more security settings for your devices.

Microsoft recommends the following level 2 security policies:

  • Enable disk encryption, secure boot, and TPM on your devices. Use these features with a strong PIN policy or biometric unlocking.

    On Android devices, the operating system might include disk encryption and Samsung Knox. You might automatically enable disk encryption when you configure the lock screen settings, which are enabled and allowed by default.

    In Intune, you can:

    • Create a settings catalog policy that disables the lock screen (not recommended). When you disable the lock screen, the device isn't encrypted.
    • Create a device restrictions template profile that disables individual features when the lock screen is on.

    For a list of the password and lock screen settings you can configure, see:



  • Intune includes hundreds of settings that can manage device features and settings, like disabling the built-in camera, controlling notifications, allowing Bluetooth, blocking games, and more.

    Use the settings catalog or the built-in templates to see and configure the settings.

    • Use the settings catalog to see and configure all the available settings. You can use the settings catalog on the following platforms:

      • Android
      • iOS/iPadOS
      • macOS
      • Windows
    • Device restrictions templates are logical groups of built-in settings that you can use to control different parts of the devices, including security, hardware, data sharing, and more.

      Use these templates on the following platforms:

      • Android
      • iOS/iPadOS
      • macOS
      • Windows
  • If you use on-premises GPOs and want to know if these same settings are available in Intune, then use Group Policy analytics. This feature analyzes your GPOs and depending on the analysis, can import them into an Intune settings catalog policy.

    For more information, see Analyze your on-premises GPOs and import them in Intune.

Level 3 - High protection and configuration

This level expands on what you configured in levels 1 and 2. It adds extra security features used in enterprise-level organizations.

  • Expand password-less authentication to other services used by your workforce. In level 1, you enabled biometrics so users can sign in to their devices with a fingerprint or facial recognition. In this level, expand password-less to other parts of the organization.

    • Use certificates to authenticate email, VPN, and Wi-Fi connections. Deploy certificates to users and devices, and then use them to access resources in your organization through the email, VPN, and Wi-Fi connections.

      To learn more about using certificates in Intune, see:

    • Configure single sign-on (SSO) for a more seamless experience when users open business apps, like Microsoft 365 apps. Users sign in once and then are automatically signed in to all the apps that support your SSO configuration.

      To learn about using SSO in Intune and Microsoft Entra ID, see:

      Uses the Microsoft Authentication Library (MSAL), which is a feature of Microsoft Entra ID. It helps you enable SSO across your applications and acts as a broker, so you can extend SSO across the entire device.


    • Use multifactor authentication (MFA). When you move to password-less, MFA adds an extra layer of security, and it can help protect your organization from phishing attacks. Use MFA with authenticator apps, like Microsoft Authenticator, or with a phone call or text message. You can also use MFA when users enroll their devices in Intune.

      Multifactor authentication is a feature of Microsoft Entra ID and you can use it with Microsoft Entra accounts. For more information, see:

    • Set up Microsoft Tunnel for your enrolled Android and iOS/iPadOS devices. Microsoft Tunnel uses Linux to allow these devices access to on-premises resources by using modern authentication and Conditional Access.

      Microsoft Tunnel uses Intune, Microsoft Entra ID, and Active Directory Federation Services (AD FS). For more information, see Microsoft Tunnel for Microsoft Intune.

    • Use Microsoft Tunnel for Mobile Application Management (Tunnel for MAM) to extend tunnel capabilities to Android and iOS/iPad devices that are not enrolled with Intune. Tunnel for MAM is available as an Intune add-on that requires an extra license.

      For more information, see Use Intune Suite add-on capabilities.

  • Use Local Administrator Password Solution (LAPS) policy to manage and back up the local administrator account on your devices.

    You can configure LAPS on new and existing macOS automated device enrollment (ADE) profiles. Devices are provisioned with a local administrator account that has a strong, encrypted, and randomized admin password, which is stored and encrypted by Intune.

    For more information, see macOS LAPS in Intune.


  • Use Microsoft Intune Endpoint Privilege Management (EPM) to reduce the attack surface of your Windows devices. EPM empowers you to have users that run as standard users (without administrator rights) yet remain productive by determining when those users can run apps in an elevated context.

    EPM elevation rules can be based on file hashes, certificate rules, and more. The rules you configure help to ensure that only the expected and trusted applications you allow can run as elevated. Rules can:

    • Manage the child processes that an app creates.
    • Support requests by users to elevate a managed process.
    • Allow for automatic elevations of files that just need to run without any user interruption.

    Endpoint Privilege Management is available as an Intune add-on that requires an extra license. For more information, see Use Intune Suite add-on capabilities.

  • Use Android Common Criteria mode on Android devices that are used by highly sensitive organizations, like government establishments.

    For more information on this feature, search for Common Criteria mode at:

  • Create policies that apply to the firmware layer:

    These policies help you manage firmware updates, which can include software and security patches, feature updates, and other changes to the device's firmware.



  • Deploy shell scripts:

    Use shell scripts to manage settings and features that aren't available in Intune natively. You can add a script, set the script frequency, and more.


This article is part of a five-step series that describes how to deploy Microsoft Intune. The series includes the following articles, in order:

  1. Set up Microsoft Intune
  2. Add, configure, and protect apps
  3. Plan for compliance policies
  4. 🡺 Configure device features (this article)
  5. Enroll devices