WebApr 12, 2024 · Good morning everybody, I would like to ask you about the Disk Encryption Visibility tab in Cortex XDR . When the endpoint is managed by Microsoft Intune and the Bitlocker function is managed also from there, I would like to see a proper Encryption status - Compliant. Or find a way how to match settings done by Intune and properly detected … WebNov 22, 2024 · For example, if it’s security-related, such as enabling BitLocker or anti-virus, then rebooting the device may be in your best interest. If it’s hiding the sleep button, then maybe it can wait. Targeting applications. For applications, I personally have a preference to deploy (using “assignments”) applications to users when using Intune.
How to have secure remote working with a BYOD policy
WebFeb 15, 2024 · Step 1: Create BitLocker Policy in Intune. In this step, we will create a new endpoint security policy for Bitlocker in Intune with the following steps: ... However, I … WebThere isn't any real "best practice" as a whole, just what you want to do with it. Start by reading about all the policies and how they are configured and that will allow you to think about new things that could be of use to you. Microsoft docs are good enough for getting started. brianj0923 • 3 yr. ago. shane young powerapps shopping cart
Manage BitLocker policy for Windows devices with Intune
WebDec 12, 2024 · Here is a detailed explanation of windows compliance policy best practices you can utilize in your network via Intune. If you would `like to see other blogs post about … WebJul 22, 2024 · Proceed through Autopilot to provision the device. Once on the desktop, open an elevated command prompt and confirm that BitLocker is on and encrypting the drive with the Method you set in the policy. After just a few minutes encryption should be complete. When looking at the Device configuration list in Intune, you should see the BitLocker ... WebJul 15, 2024 · The most important thing we’re going to do is configure device compliance. This becomes extremely powerful when it is combined with device-based Conditional access, which we covered in our Azure AD best practices checklist. That’s because the device literally becomes part of your identity, and its compliance status can become a … shane young power bi