You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -106,6 +106,10 @@ Depending on where you want to route the audit log data, you need one of the fol
106
106
107
107
If you choose to use a storage account, then also enter how many days you want to keep the data (retention). To keep data forever, set **Retention (days)** to `0` (zero).
108
108
109
+
-**LOG** > **IntuneDevices**: The Intune Device log shows device inventory and status information for Intune enrolled and managed devices. Choose this option to send the IntuneDevices logs to your storage account, event hub, or log analytics.
110
+
111
+
If you choose to use a storage account, then also enter how many days you want to keep the data (retention). To keep data forever, set **Retention (days)** to `0` (zero).
112
+
109
113
When finished, your settings look similar to the following settings:
110
114
111
115
:::image type="content" source="./media/review-logs-using-azure-monitor/diagnostics-settings-example.png" alt-text="Sample image that sends Endpoint Manager and Microsoft Intune audit logs to an Azure storage account.":::
Copy file name to clipboardExpand all lines: memdocs/intune/protect/actions-for-noncompliance.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -101,6 +101,9 @@ When you enable this action:
101
101
- Windows 10/11
102
102
103
103
When this action applies to a device, that device is added to a list of devices in the admin console at **Devices** > **Compliance policies** > **Retire Noncompliant Devices**. The device isn't retired until an admin takes explicit action to retire the device.
104
+
105
+
> [!NOTE]
106
+
> Only devices to which the **Retire the noncompliant device** action has been triggered appear in the **Retire Selected Devices** view. To see a list of all devices that are not compliant, see the **Noncompliant devices** report mentioned in [Monitor device compliance policy](../protect/compliance-policy-monitor.md#view-compliance-reports).
104
107
105
108
To retire one or more devices from the list, select devices to retire and then select **Retire Selected Devices**. When you choose an action that retires devices, you're then presented with a dialog box to confirm the action. It's only after confirming the intent to retire the devices that they are cleared of company data and removed from Intune management.
> If the device immediately syncs after a reboot, or immediately syncs waking from sleep, then this setting may report as an **Error**. This scenario might not affect the overall device compliance status. To re-evaluate the compliance status, manually [sync the device](../user-help/sync-your-device-manually-windows.md).
200
+
> - If the device immediately syncs after a reboot, or immediately syncs waking from sleep, then this setting may report as an **Error**. This scenario might not affect the overall device compliance status. To re-evaluate the compliance status, manually [sync the device](../user-help/sync-your-device-manually-windows.md).
201
+
>
202
+
> - If a group policy is applied to a device that configures Defender Firewall to allow all inbound traffic, or turns off the firewall, setting **Firewall** to **Require** will return **Not compliant**, even if Intune device configuration policy turns Firewall on. This is because the group policy object overrides the Intune policy. To fix this issue, we recommend that you remove any conflicting group policy settings, or that you migrate your Firewall-related group policy settings to Intune device configuration policy. In general, we recommend that you [keep default settings](/windows/security/threat-protection/windows-firewall/best-practices-configuring#keep-default-settings), including blocking inbound connections. For more information, see [Best practices for configuring Windows Defender Firewall](/windows/security/threat-protection/windows-firewall/best-practices-configuring).
203
+
201
204
202
205
-**Trusted Platform Module (TPM)**:
203
206
-**Not configured** (*default*) - Intune doesn't check the device for a TPM chip version.
Copy file name to clipboardExpand all lines: memdocs/intune/protect/compliance-policy-monitor.md
+8-10Lines changed: 8 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -96,21 +96,19 @@ Descriptions of the different device compliance policy states:
96
96
> [!IMPORTANT]
97
97
> Devices that are enrolled into Intune, but not targeted by any device compliance policies are included in this report under the **Compliant** bucket.
98
98
99
-
#### Device behavior with a compliance status of Error
99
+
#### Device behavior with a compliance settings in Error state
100
100
101
-
Devices keep a compliance status of **Error**for up to seven days to allow time for the compliance calculation to complete correctly. Within those seven days, its previous compliance status applies until the device evaluates as **Compliant** or **Not compliant**. If after seven days, the device still has a status of **Error**, it becomes **Not compliant**. Note that grace periods do not apply to devices with an Error status.
101
+
When a setting for a compliance policy returns a value of **Error**, the existing compliance state on the device remains unaffected for up to seven days to allow time for the compliance calculation to complete correctly for that setting. Within those seven days, the device's existing compliance status continues to apply until the compliance policy setting evaluates as **Compliant** or **Not compliant**. If after seven days, the setting still has a status of **Error**, the device becomes **Not compliant** immediately. Note that grace periods do not apply to compliance policies with a setting in an **Error** state.
102
102
103
103
##### Examples:
104
-
105
-
- A device is initially marked **Compliant**, but then its status changes to **Error**. After three days, compliance evaluation completes successfully and the device is marked **Not compliant**. The user can continue to use the device to access Conditional Access-protected resources within the first three days after the status changes to **Error**. Once the device is marked **Not compliant**, this access is removed until the device becomes **Compliant** again.
106
-
107
-
- A device is initially marked **Compliant**, but then its status changes to **Error**. After three days, compliance evaluation completes successfully and the device is marked **Compliant**. The user is able to continue to access Conditional Access-protected resources without interruption.
108
-
109
104
110
-
- A device is initially marked **Compliant**, but then its status changes to **Error**. The user is able to access Conditional Access-protected resources for seven days, but after seven days, the compliance status is still **Error**. At this point, the device becomes **Not compliant** and the user loses access to the protected resources until the device becomes **Compliant** – even if there is a grace period set for the applicable compliance policy.
111
-
105
+
- A device is initially marked **Compliant**, but then a setting in one of the compliance policies targeted to the device reports **Error**. After three days, compliance evaluation completes successfully and the setting now reports **Not compliant**. The user can continue to use the device to access Conditional Access-protected resources within the first three days after the setting states changes to **Error**, but once the setting returns **Not compliant**, the device is marked **Not compliant** and this access is removed until the device becomes **Compliant** again.
106
+
107
+
- A device is initially marked **Compliant**, but then a setting in one of the compliance policies targeted to the device reports **Error**. After three days, compliance evaluation completes successfully, the setting returns **Compliant**, and the device's compliance status becomes **Compliant**. The user is able to continue to access Conditional Access protected resources without interruption.
112
108
113
-
- A device is initially marked **Not compliant**, but then its status changes to **Error**. After three days, compliance evaluation completes successfully and the device is marked **Compliant**. The user is prevented from accessing Conditional Access-protected resources for the first three days. Once the device is marked **Compliant**, the user can begin to access protected resources on the device.
109
+
- A device is initially marked **Compliant**, but then a setting in one of the compliance policies targeted to the device reports **Error**. The user is able to access Conditional Access protected resources for seven days, but after seven days, the compliance setting still returns **Error**. At this point, the device becomes Not compliant immediately and the user loses access to the protected resources until the device becomes **Compliant** – even if there is a grace period set for the applicable compliance policy.
110
+
111
+
- A device is initially marked **Not compliant**, but then a setting in one of the compliance policies targeted to the device reports Error. After three days, compliance evaluation completes successfully, the setting returns **Compliant**, and the device's compliance status becomes **Compliant**. The user is prevented from accessing Conditional Access protected resources for the first three days (while the setting returns **Error**). Once the setting returns **Compliant** and the device is marked **Compliant**, the user can begin to access protected resources on the device.
0 commit comments