Skip to content

Commit ee62b4d

Browse files
authored
Merge pull request #6532 from Brenduns/odds-and-ends
Revision proposal. Clarifications, and enhnced detials for CP work items.
2 parents 78fee52 + a3d8bbe commit ee62b4d

1 file changed

Lines changed: 12 additions & 4 deletions

File tree

memdocs/intune/protect/endpoint-security-policy.md

Lines changed: 12 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ keywords:
77
author: brenduns
88
ms.author: brenduns
99
manager: dougeby
10-
ms.date: 04/16/2021
10+
ms.date: 01/12/2022
1111
ms.topic: how-to
1212
ms.service: microsoft-intune
1313
ms.subservice: protect
@@ -30,11 +30,19 @@ ms.reviewer: mattcall
3030

3131
# Manage device security with endpoint security policies in Microsoft Intune
3232

33-
As a security admin, use the security policies found in the *Endpoint security* node of Intune to configure device security. By using these security-focused policies, you avoid the overhead of navigating through a larger body of diverse settings found in device configuration profiles and security baselines.
33+
Use Intune endpoint security policies to manage security settings on devices. Each endpoint security policy supports one or more profiles. These profiles are similar in concept to a device configuration policy template, a logical group of related settings.
3434

35-
Each policy type supports one or more profiles. Profiles are where you configure settings and can group settings for different platforms, or for different areas of focus in the larger policy area.
35+
As a security admin concerned with device security, you can use these security-focused profiles to avoid the overhead of device configuration profiles or security baselines. Device configuration profiles and baselines include a large body of diverse settings outside the scope of securing endpoints. In contrast, each endpoint security profile focuses on a specific subset of device settings intended to configure one aspect of device security.
3636

37-
You'll find these policies under *Manage* in the **Endpoint security** node of the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431).
37+
When using endpoint security policies along side other policy types like security baselines or endpoint protection templates from device configuration policies, it’s important to develop a plan for using multiple policy types to minimize the risk of conflicting settings. Security baselines, device configuration policies, and endpoint security policies are all treated as equal sources of device configuration settings by Intune. A settings conflict occurs when a device receives two different configurations for a setting from multiple sources. Multiple sources can include separate policy types and multiple instances of the same policy.
38+
39+
When Intune evaluates policy for a device and identifies conflicting configurations for a setting, the setting that's involved can be flagged for an error or conflict and fail to apply. Each type of configuration policy supports identifying and resolving conflicts should they arise:
40+
41+
- [Device configuration profiles](../configuration/device-profile-monitor.md#view-conflicts)
42+
- [Endpoint security profiles](#manage-conflicts)
43+
- [Security baselines](../protect/security-baselines-monitor.md#resolve-conflicts-for-security-baselines)
44+
45+
You'll find endpoint security policies under *Manage* in the **Endpoint security** node of the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431).
3846

3947
![Manage policies](./media/endpoint-security-policy/endpoint-security-policies.png)
4048

0 commit comments

Comments
 (0)