From the course: Microsoft 365: Implement Modern Device Services
Unlock the full course today
Join today to access over 24,200 courses taught by industry experts.
Plan for device compliance
From the course: Microsoft 365: Implement Modern Device Services
Plan for device compliance
- [Narrator] When managing the compliance of devices, there are two core approaches. The first one is with conditional access. This is used for devices that comply to policy rules and you are able to give those devices access to email and other organization resources. If the devices do not comply to policy rules, then they don't get access to the organizational resources. This is referred to as conditional access. Second option is without conditional access. You can also use device compliance policies without any conditional access. When you use compliance policies independently, the targeted devices are evaluated and reported with their compliance status. For example, you can get a report on how many devices aren't encrypted or which devices are jailbroken or rooted. When you use compliance polices without conditional access, there aren't any access restrictions to organization resources. Conditional access is how you can…