Skip to content

Commit 5ad4b2e

Browse files
committed
modifying new text
1 parent 240aeb2 commit 5ad4b2e

1 file changed

Lines changed: 1 addition & 3 deletions

File tree

memdocs/intune/protect/endpoint-security-policy.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -30,9 +30,7 @@ ms.reviewer: mattcall
3030

3131
# Manage device security with endpoint security policies in Microsoft Intune
3232

33-
Use Intune endpoint security policies to manage security focused settings on devices. Each endpoint security policy supports one or more profiles, which are similar in concept to a device configuration policy template, a logical group of related settings. However, endpoint security profiles focus on a subset of available settings that focus on configuring and securing your device endpoints.
34-
35-
As a security admin concerned with device security, use these security-focused policies to avoid the overhead of device configuration profiles or security baselines. Device configuration profiles and baselines include a large body of diverse settings outside the scope of securing endpoints. In contrast, each endpoint security profile focuses on a specific subset of device settings intended to configure a specific aspect of device security.
33+
Use Intune endpoint security policies to manage security settings on devices. Each endpoint security policy supports one or more profiles. These profiles are similar in concept to a device configuration policy template, a logical group of related settings. As a security admin concerned with device security, you can use these security-focused profiles to avoid the overhead of device configuration profiles or security baselines. Where device configuration profiles and baselines include a large body of diverse settings outside the scope of securing endpoints, each endpoint security profile focuses on a specific subset of device settings intended to configure one aspect of device security.
3634

3735
Intune treats the settings from security baselines, device configuration policies, and endpoint security policies as equal. Therefore, it’s important to develop a plan for using the multiple policy types to minimize the risk of settings conflict.
3836

0 commit comments

Comments
 (0)