You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: memdocs/intune/protect/includes/security-config-mgt-prerequisites.md
+14-11Lines changed: 14 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -67,17 +67,20 @@ When your device protection needs extend beyond managing Defender for Endpoint,
67
67
68
68
The following table can help you understand which policies that can configure MDE settings are supported by devices that are managed by the different scenarios. When you deploy a policy that’s supported for both *MDE security configuration* and *Microsoft Endpoint Manager*, a single instance of that policy can be processed by devices that run MDE only and devices that are managed by either Intune or Configuration Manager.
69
69
70
-
| Microsoft Endpoint Manager | Workload | MDE Security configuration | Microsoft Endpoint Manager |
|| Endpoint detection and response | Endpoint detection and response |||
79
+
||Attack surface reduction | All |||
80
+
||Account Protection | All |||
81
+
|| Device Compliance | All |||
82
+
|| Conditional Access | All |||
83
+
|| Security baselines | All |||
81
84
82
85
**Endpoint security policies** are discrete groups of settings intended for use by security admins who focus on protecting devices in your organization.
0 commit comments