Skip to content

Commit 4f97744

Browse files
authored
Merge pull request #6523 from Brenduns/12573421-update-noncompliance-notifications-limitations
Edits for 12573421, limitations for partner managed devcies for actio…
2 parents 6435624 + 28471c5 commit 4f97744

2 files changed

Lines changed: 13 additions & 2 deletions

File tree

memdocs/intune/protect/actions-for-noncompliance.md

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ keywords:
77
author: brenduns
88
ms.author: brenduns
99
manager: dougeby
10-
ms.date: 10/19/2021
10+
ms.date: 01/12/2022
1111
ms.topic: how-to
1212
ms.service: microsoft-intune
1313
ms.subservice: protect
@@ -130,6 +130,13 @@ When you enable this action:
130130

131131
- When multiple compliance policies include the same compliance conditions, and include the push notification action with the same schedule, Intune sends multiple notifications to the same device on the same day.
132132

133+
> [!NOTE]
134+
> The following actions for noncompliance are not supported for devices that are managed by a [device compliance management partner](../protect/device-compliance-partners.md):
135+
> - Send push notification to end user
136+
> - Remotely lock the noncompliant device
137+
> - Retire the noncompliant device
138+
> - Send push notification to end user
139+
133140
## Before you begin
134141

135142
You can [add actions for noncompliance](#add-actions-for-noncompliance) when you configure device compliance policy, or later by editing the policy. You can add additional actions to each policy to meet your needs. Keep in mind that each compliance policy automatically includes the default action for noncompliance that marks devices as noncompliant, with a schedule set to zero days.

memdocs/intune/protect/quickstart-send-notification.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ keywords:
88
author: Erikre
99
ms.author: erikre
1010
manager: dougeby
11-
ms.date: 12/16/2021
11+
ms.date: 01/12/2022
1212
ms.topic: quickstart
1313
ms.service: microsoft-intune
1414
ms.subservice: protect
@@ -33,6 +33,9 @@ ms.collection: M365-identity-device-management
3333

3434
In this quickstart, you'll use Microsoft Intune to send an email notification to the members of your workforce that have noncompliant devices.
3535

36+
> [!NOTE]
37+
> The remote action to send an email notification is not supported on devices that are managed by a [device compliance partner](../protect/device-compliance-partners.md).
38+
3639
By default, when Intune detects a device that isn't compliant, Intune immediately marks the device as noncompliant. Azure Active Directory (Azure AD) [Conditional Access](/azure/active-directory/active-directory-conditional-access-azure-portal) then blocks the device. When a device isn't compliant, Intune allows you to add actions for noncompliance, which gives you flexibility to decide what to do. For example, you can give users a grace period to be compliant before blocking noncompliant devices.
3740

3841
One action to take when a device doesn't meet compliance is to send email to the devices user. You can also customize an email notification before sending it. Specifically, you can customize the recipients, subject, and message body, including company logo, and contact information. Intune also includes details about the noncompliant device in the email notification.
@@ -43,6 +46,7 @@ If you don't have an Intune subscription, [sign up for a free trial account](../
4346

4447
When using device compliance policies to block devices from corporate resources, Azure AD Conditional Access must be set up. If you've completed the [Create a device compliance policy](quickstart-set-password-length-android.md) quickstart, you're using Azure Active Directory. For more information about Azure AD, see [Conditional Access in Azure Active Directory](/azure/active-directory/active-directory-conditional-access-azure-portal) and [common ways to use Conditional Access with Intune](../protect/conditional-access-intune-common-ways-use.md).
4548

49+
4650
## Sign in to Intune
4751

4852
Sign in to the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431) as a [Global administrator](../fundamentals/users-add.md#types-of-administrators) or an Intune [Service administrator](../fundamentals/users-add.md#types-of-administrators). If you've created an Intune Trial subscription, the account you created the subscription with is the Global administrator.

0 commit comments

Comments
 (0)