Device Risk Meets Conditional Access: The Real Power of Unified Endpoint Security

Device compliance is one of the things that should be on top of the list of any organization’s Cybersecurity activities. This enforces the next steps that can be taken by the device management solution from reporting to block access to resources immediately if the configured device policies are not meeting a certain standard. For an example, take Windows OS level. If you don’t have a marker to understand the devices that doesn’t meet the minimum OS levels and the next steps of restricting access for the devices that doesn’t meet the OS levels, it can be a disaster – If someone tries to access Corporate data from a device where it’s OS is outdated there for vulnerable for attacks.

Intune Compliance policies always work hand-in-hand with other configurations and monitor the devices to see if they are falling off from the required compliance levels and reports them back to Intune and maybe action if the complementing policies have been set up.

Device risk is determined by Defender for Endpoint, depending on the exposure to risks and activities found on the device. These alerts will be visible on the “Alerts” page as well. However, what’s not new is Defender for Endpoint is preventing these threats in the device and making sure the device is safe by quarantining malware or going through the Automated Investigation and Resolution tasks if configured.

Identifying risks in the device can vary from a user opening a malicious file to suspicious activities in the device identified by the Defender for Endpoint Behavioral monitoring and reporting it as an alert.

“The risk level reflects the overall risk assessment of the device based on combination of factors, including the types and severity of active alerts on the device. Resolving active alerts, approving remediation activities, and suppressing subsequent alerts can lower the risk level.”

This is where the goodness of Microsoft Intune comes into play. Microsoft Intune as the device management solution, has a good place for device compliance configurations and frequently checking for compliance in devices and actioning the next steps.

On the other hand this can be combined with Microsoft Entra, specifically with the Conditional Access Policies. Block access to corporate devices if the device is not compliant has been there for a while now.

I wrote about that here – https://emsroute.com/2023/02/03/byod-02/

Microsoft Intune Device Compliance Policies now have rules for Defender for Endpoint Risk levels, and you can make the device to be marked as Non-Compliant immediately. Combine this with the Conditional Access Policies. Access to corporate applications and data will be immediately stopped as the device now pose a risk as threats have been found by Defender for Endpoint. Users will be able to access the resources as soon as the device risk level is secure/ clear.

Prerequisites:

  • Compatible with: Windows/ iOS/ Android
  • Configure the service connections between Intune and Defender for Endpoint
  • Device needs to be enrolled in Intune
  • Device needs to be onboarded in Defender for Endpoint

Intune Device Compliance Policy – MDE Section

Create the CA Policy in-order to block access to corporate resources depending on the device compliance.

At a glance, Entra ID devices page will show you the compliance signal.

When creating the Conditional Access policy, you can use the above compliance signal to make sure you are addressing the correct set of devices by setting a Device Filter in your policy.,

This will make sure the access to the resources are blocked until the device to be marked as compliant. Which means the Device Risk needs to be clear or have to be at the given state.

Create Notifications in Compliance Policies

You can get notified when the devices are not compliant using the

Set the option Send email to end user and select an additional user as well. This can be your IT admin or helpdesk email address.

There are a few ways to clear the status, so the user will be able to access the resources as well as the device will be compliant.

  1. Use Manual or automated remediation.
  2. Resolve active alerts on the device. This removes the risk from the device.
  3. You can remove the device from the active policies and consequently, Conditional Access won’t be applied on the device.

Device Compliance is paramount, and this piece will prove you how components in the eco-system works hand in hand in-order to close threats in your environment


Discover more from EMS Route

Subscribe to get the latest posts sent to your email.

Leave a comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.