In this module
AD3.11 Interactive Lab: Device Compliance Deployment
Interactive Lab: Device Compliance Deployment
This lab uses the investigation engine to walk you through deploying device compliance for Northgate Engineering. You'll audit the device estate, build compliance policies for Windows and iOS, integrate with conditional access, handle a non-compliant device scenario, and process an exception request — making the deployment decisions that determine whether enforcement day is smooth or catastrophic.
What you practised
This lab tested your ability to audit device enrollment, predict compliance failures, build graduated compliance policies, transition CA003 from report-only to enforced, remediate non-compliant devices, and handle exception requests with documented alternative controls. The key judgment calls were: when to enforce (after remediation, not before), how to handle BYOD (app protection policies, not forced enrollment), and when to approve exceptions (narrow scope, alternative control, expiration date).
Connection to Module AD4
With identity, email, and device controls in place, the next module covers data protection — sensitivity labels and basic DLP policies that prevent sensitive data from leaving your organization through email, Teams, or SharePoint.
You're reading the free modules of M365 Security: From Admin to Defender
The full course continues with advanced topics, production detection rules, worked investigation scenarios, and deployable artifacts.