In this module
AD3.1 Why Device Compliance Is the Third Priority
Figure AD3.1 — The three-layer defense model. Identity (MFA) stops credential attacks. Email (Safe Links/Attachments) stops phishing delivery. Device compliance stops access from unmanaged or unhealthy devices — including AiTM token replay where the attacker passes MFA but uses their own unmanaged device. Without Layer 3, the attacker has a bypass.
Why device compliance comes third, not first
The ordering is deliberate. Device compliance depends on conditional access for enforcement — you built conditional access in Module AD1. Without CA, compliance policies exist but don't block anything. The blast radius of device compliance is also higher than identity or email controls. MFA affects the login experience (a 5-second prompt). Email protection works in the background (users don't notice Safe Links checking URLs). Device compliance can lock a user out of their email entirely if their device doesn't meet requirements — and unlike a password reset (which takes 5 minutes), fixing a non-compliant device can take hours (OS update, encryption enablement, antivirus installation).
Deploying compliance before identity and email would create maximum user disruption with incomplete protection. Deploying it after identity and email means the highest-impact controls are already in place, and the compliance enforcement adds the device layer without being the only thing standing between the attacker and the data.
The practical consequence: if you had to stop after Module AD1 and never configure device compliance, your environment would still be dramatically more secure than when you started. MFA alone provides 99.9% protection against credential attacks. Device compliance provides the additional protection against the 0.1% of sophisticated attacks (AiTM token replay) and against data loss from stolen or compromised devices. It's important — but it's third priority, not first.
What device compliance actually checks
An Intune compliance policy evaluates the device against a set of requirements every time the device checks in (typically every 8 hours, or on-demand when the user signs in to a conditional access-protected resource). The compliance check is pass/fail — either the device meets every requirement, or it doesn't. There's no partial compliance.
The five checks that matter most for security:
BitLocker encryption. An unencrypted laptop that's lost or stolen exposes every file on the disk — emails cached in Outlook, documents synced from OneDrive, cached credentials, browser passwords. BitLocker encryption ensures the disk is unreadable without the recovery key. This is the most fundamental device security control and the one most frequently missing.
Minimum OS version. An outdated operating system misses security patches that fix known vulnerabilities. An attacker with local access to a device running Windows 10 21H2 (end of support: June 2024) has a library of unpatched exploits to choose from. Setting a minimum OS version ensures devices stay current.
Firewall enabled. The Windows Firewall blocks unsolicited inbound connections. Disabling it (which some users and even some IT teams do to "fix" connectivity issues) exposes the device to network-based attacks when connected to public WiFi, hotel networks, or compromised corporate networks.
Defender Antivirus active and up to date. Defender Antivirus is included with Windows and provides real-time protection against malware. The compliance check verifies that Defender is running, real-time protection is enabled, and signatures are current. A device with disabled antivirus or signatures more than 7 days old is a significantly higher risk.
Require Secure Boot. Secure Boot prevents rootkits and boot-level malware from loading before the operating system starts. It's enabled by default on modern hardware but can be disabled in BIOS settings. The compliance check ensures it stays enabled.
What happens when you enforce compliance
When compliance enforcement is active (CA003 switched from report-only to on), the authentication flow adds a device check. The user signs in, completes MFA, and then conditional access checks the device compliance state in Intune. If the device is compliant, access is granted. If the device is not compliant, the user sees an error page explaining that their device doesn't meet security requirements, with a link to instructions for resolving the issue.
This is where the blast radius hits. Users with non-compliant devices can't access Exchange Online, SharePoint, or Teams until their device is remediated. For a user whose laptop needs a Windows update, that's 30-60 minutes of downtime. For a user whose laptop needs BitLocker encryption enabled, that's 1-2 hours. For a user on a personal device that isn't enrolled in Intune at all, they're locked out until they enroll — or they access data through the browser only (which you can configure as a fallback with app protection policies).
This is why the report-only period is essential. You need to know how many devices would fail compliance BEFORE you enforce. Module AD3.2 covers the audit that gives you this data.
You're about to start building compliance policies. Your Intune enrollment shows 180 of 210 devices enrolled (86%). The 30 unenrolled devices are a mix of personal devices (BYOD) used by 20 employees for email access and 10 older laptops that were never enrolled. How do you handle the unenrolled devices when you enforce compliance via CA003?
Option A: Enforce compliance for enrolled devices only and ignore the 30 unenrolled devices — they'll be blocked by CA003 anyway since they're not compliant.
Option B: Before enforcing CA003, enroll the 10 corporate laptops, create an app protection policy for the 20 BYOD devices that provides browser-only access with restricted download capability, and then enforce CA003.
Option C: Wait until all 210 devices are enrolled before enforcing compliance.
The correct answer is Option B. The 10 unenrolled corporate laptops should be enrolled — they're company-owned and there's no reason not to manage them. The 20 BYOD devices present a different challenge: you can't require personal device enrollment without a BYOD policy and user consent. App protection policies provide a middle ground — the user accesses email through the Outlook mobile app or browser, data is protected within the app container, but the personal device isn't fully enrolled. When CA003 enforces, the corporate laptops (now enrolled + compliant) get full access. The BYOD devices get restricted access through app protection. No users are locked out, and corporate data is protected on every device type.
Try it: Check your enrollment and compliance baseline
Navigate to intune.microsoft.com → Devices → All devices. Note the total count of enrolled devices. Compare this to your total employee count — the difference is your enrollment gap.
Now navigate to Devices → Compliance → Compliance policies. If you see "No compliance policies," your enrolled devices are all "compliant by default" — which means the compliance check has no teeth. Every device passes because there's nothing to check.
Click "Devices → Monitor → Noncompliant devices" (or Devices → Overview). If compliance policies don't exist yet, this shows zero noncompliant devices — not because all devices are healthy, but because nothing has been checked.
Navigate to Devices → All devices → click on any enrolled device. Check the "Device compliance" section. You'll see "No compliance policy assigned" if no policies exist. After you build the compliance policy in AD3.3, this section shows the specific pass/fail for each compliance check.
Record: total devices enrolled, total devices expected, enrollment gap (count and reason), and current compliance policy status (none, basic, or full). This is your device security baseline.
Connect-MgGraph -Scopes "DeviceManagementManagedDevices.Read.All"
# Count enrolled devices by platform
Get-MgDeviceManagementManagedDevice -All |
Group-Object OperatingSystem |
Select-Object Name, Count |
Sort-Object Count -Descending |
Format-TableYou're reading the free modules of M365 Security: From Admin to Defender
The full course continues with advanced topics, production detection rules, worked investigation scenarios, and deployable artifacts.