Skip to content

Commit f840e86

Browse files
Text edits
1 parent 78545ce commit f840e86

1 file changed

Lines changed: 6 additions & 2 deletions

File tree

memdocs/intune/protect/security-baselines.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ keywords:
77
author: brenduns
88
ms.author: brenduns
99
manager: dougeby
10-
ms.date: 01/04/2022
10+
ms.date: 08/11/2022
1111
ms.topic: overview
1212
ms.service: microsoft-intune
1313
ms.subservice: protect
@@ -46,7 +46,11 @@ This feature applies to:
4646

4747
You deploy security baselines to groups of users or devices in Intune, and the settings apply to devices that run Windows 10/11. For example, the *MDM Security Baseline* automatically enables BitLocker for removable drives, automatically requires a password to unlock a device, automatically disables basic authentication, and more. When a default value doesn't work for your environment, customize the baseline to apply the settings you need.
4848

49-
Separate baseline types can include the same settings but use different default values for those settings. It's important to understand the defaults in the baselines you choose to use, and to then modify each baseline to fit your organizational needs. In almost all scenarios, the default settings in the security baselines will be the most restrictive, thus the administrator will need to validate whether those settings conflict with any other feature being used in the environment. For example, the default settings for Firewall configuration might not merge connection security rules and local policy rules with MDM rules, so if you are using Delivery optimization feature, you would need to validate these configurations before applying.
49+
Separate baseline types can include the same settings and use different default values for those settings. It's important to understand the defaults in the baselines you choose to use, and to then modify each baseline to fit your organizational needs.
50+
51+
In almost all scenarios, the default settings in the security baselines are the most restrictive. You should confirm that these settings don't conflict with other policy settings or features in your environment.
52+
53+
For example, the default settings for firewall configuration might not merge connection security rules and local policy rules with MDM rules. So, if you're using delivery optimization, then you should validate these configurations before assigning the security baseline.
5054

5155
> [!NOTE]
5256
> Microsoft doesn't recommend using preview versions of security baselines in a production environment. The settings in a preview baseline might change over the course of the preview.

0 commit comments

Comments
 (0)