You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: memdocs/intune/protect/endpoint-security-policy.md
+1-3Lines changed: 1 addition & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -30,9 +30,7 @@ ms.reviewer: mattcall
30
30
31
31
# Manage device security with endpoint security policies in Microsoft Intune
32
32
33
-
Use Intune endpoint security policies to manage security focused settings on devices. Each endpoint security policy supports one or more profiles, which are similar in concept to a device configuration policy template, a logical group of related settings. However, endpoint security profiles focus on a subset of available settings that focus on configuring and securing your device endpoints.
34
-
35
-
As a security admin concerned with device security, use these security-focused policies to avoid the overhead of device configuration profiles or security baselines. Device configuration profiles and baselines include a large body of diverse settings outside the scope of securing endpoints. In contrast, each endpoint security profile focuses on a specific subset of device settings intended to configure a specific aspect of device security.
33
+
Use Intune endpoint security policies to manage security settings on devices. Each endpoint security policy supports one or more profiles. These profiles are similar in concept to a device configuration policy template, a logical group of related settings. As a security admin concerned with device security, you can use these security-focused profiles to avoid the overhead of device configuration profiles or security baselines. Where device configuration profiles and baselines include a large body of diverse settings outside the scope of securing endpoints, each endpoint security profile focuses on a specific subset of device settings intended to configure one aspect of device security.
36
34
37
35
Intune treats the settings from security baselines, device configuration policies, and endpoint security policies as equal. Therefore, it’s important to develop a plan for using the multiple policy types to minimize the risk of settings conflict.
0 commit comments