Compliance & Conditional Access

Intune for SMBs: Zero to Hero  ·  Part 2 of 6

Microsoft Intune  ·  Compliance  ·  Conditional Access  ·  SMB  ·  2026

Series overview — 6 articles
Part 1 · Done ✓
Licensing, Setup & First Device
Part 2 · Now
Compliance & Conditional Access
Part 3
Settings Catalog & Configuration Profiles
Part 4
App Deployment & Company Portal
Part 5
Security Baselines & Defender
Part 6
Reporting & Day-2 Operations

You enrolled your first device in Part 1. Now it sits in Intune — visible, manageable — but nothing is actually enforced yet. Compliance policies and Conditional Access are what turn Intune from a visibility tool into a real security control. Get this layer right and every other policy you push from Part 3 onwards lands on a device you can trust. Get it wrong and you have a false sense of security: policies applied, but no gate blocking non-compliant devices from reaching your data.

This part covers the four Windows compliance settings every SMB needs on day one, what happens during the grace period, the one tenant setting that changes everything, and how to wire compliance into Conditional Access without locking anyone out on day one.

📋
Compliance policies evaluate — they do not configure. A policy that requires BitLocker enabled will mark a device as non-compliant if BitLocker is off. It will not turn BitLocker on. That is the job of a configuration profile (Part 3).
⏱️
Compliance state and access blocking are not the same thing. Intune marks a device Non-compliant immediately when it fails a check — that verdict is visible in the portal right away. What you control with actions for non-compliance is when Conditional Access acts on that verdict. With CA in Report-only mode, nothing is blocked regardless of compliance state. Once CA is in Enforce mode, a Non-compliant verdict blocks access — unless you have configured a grace period in the policy actions.
⚠️
"Mark devices with no compliance policy as Non-compliant" is set to Compliant by default. This is a critical gap — change it immediately once your first compliance policy is assigned.
🛡️
Start Conditional Access in Report-only mode. You see exactly what would be blocked before a single user gets a sign-in failure. Switch to Enabled only after reviewing the report.

What compliance policies actually do — and don't do

A compliance policy is a set of rules that Intune evaluates against a device and returns a verdict: Compliant or Non-compliant. That verdict is a signal — most importantly, a signal that Conditional Access policies in Entra ID can act on.

The key distinction that trips up many admins is this: compliance policies evaluate state; they do not set state. If you create a compliance policy requiring BitLocker encryption and assign it to a device that has BitLocker disabled, the device will be marked Non-compliant. BitLocker will not automatically be turned on. To configure the device, you need a Settings Catalog profile — covered in Part 3. The correct order for any setting you want to enforce is: configure it first (profile), then check it (compliance policy).

💡
Compliance verdict flows upstream. Intune sends the device's compliance state to Entra ID. Conditional Access policies in Entra ID can then require that a device is marked Compliant before it can access cloud apps like Exchange Online, SharePoint, or Teams. The connection between the two products is automatic once both are configured — no extra connector or sync is needed.

The one tenant setting you must change first

Before you create a single compliance policy, change this setting: Devices → Compliance → Compliance settings → Mark devices with no compliance policy as. The default value is Compliant.

This default means that any enrolled device without a compliance policy assigned to it is automatically considered compliant — and will therefore pass any Conditional Access check that requires a compliant device. In an SMB tenant with a handful of devices, this is easy to miss: you assign your compliance policy to a group, forget a device, and that device sails through your access controls unchecked.

🚨
Do not change this to Non-compliant until you have at least one compliance policy assigned to all your device groups. If you flip the toggle now with no policies assigned, every enrolled device instantly becomes non-compliant. If you also have a Conditional Access policy blocking non-compliant devices, everyone loses access simultaneously. Change tenant setting → assign policy → verify compliance → then enforce via Conditional Access.

The path to change this in Intune admin centre is: Devices → Compliance → Compliance settings. Set it to Not compliant once your policy is ready to assign.

Building your Windows compliance policy

For a typical SMB on Microsoft 365 Business Premium, four compliance checks give you the most security value for the least operational friction. These are the settings to configure first — treat this as a day-one baseline, not a complete compliance strategy. A well-run environment will add more checks over time; starting here means you have something enforced and meaningful from week one, rather than nothing deployed while you perfect an exhaustive list.

The four essential settings

Setting Recommended value Why it matters
BitLocker
Device Health → BitLocker
Require Encrypts the drive at rest. Without this, a stolen laptop is a data breach waiting to happen.
Secure Boot
Device Health → Secure Boot
Require Validates firmware integrity on boot. Blocks bootkits and low-level malware that loads before Windows.
Microsoft Defender Antimalware
Microsoft Defender for Endpoint → Antimalware
Require Ensures Defender is not disabled. Any device that has switched off real-time protection is a risk to your environment.
Minimum OS version
Device Properties → Minimum OS version
Target: 10.0.22621
Windows 11 22H2

Transitional: 10.0.19045
Windows 10 22H2 — while migration is in progress
Keeps devices on a supported, patched OS. Devices running older builds should not be considered compliant — they are missing security patches that cannot be retroactively applied.
⚠️
Two states, two values. If your estate is fully on Windows 11, set the minimum to 10.0.22621 (Windows 11 22H2) and move forward. If you still have Windows 10 devices in migration, use 10.0.19045 (Windows 10 22H2 — the last supported build) as a transitional floor. This keeps those devices compliant while you migrate, without compromising on patching standards. Windows 10 reached end of support in October 2025 — any device still on it should have an active migration plan, not a permanent compliance exemption.

Settings to consider adding later

Once your baseline is stable, these are worth adding in a second pass:

  • Password complexity: Require a PIN or password meeting your organisation's policy. For devices with Windows Hello for Business configured (from Part 3), most users will authenticate with biometrics or a PIN — set this to match your Hello policy.
  • Firewall: Require Windows Defender Firewall to be enabled. Simple check, easy win.
  • Antivirus signature version: Mark devices non-compliant if definitions are more than a set number of days old. Useful but can generate noise if devices are offline for extended periods.
  • Microsoft Defender for Endpoint — Machine risk score: Requires the Intune and Defender for Business (or Defender for Endpoint) integration to be explicitly configured first — it does not activate automatically from the licence alone. Once the connector is set up in the Intune admin centre under Endpoint security → Microsoft Defender for Endpoint, you can require the device risk level to be at or below Medium or Low. This ties real endpoint telemetry directly into the compliance verdict. Part 5 of this series covers the integration setup in full.

Creating the policy — step by step

1
Navigate to compliance policy creation
In the Intune admin centre (intune.microsoft.com), go to Devices → Compliance → Policies → Create policy. Select Windows 10 and later as the platform.
2
Name and describe the policy
Use a name that is descriptive and survives a team handover. A pattern like WIN-Compliance-SMB-Baseline-v1 is clear and searchable. Add a description noting the date created and the settings it checks.
3
Configure compliance settings
Under Device Health: set BitLocker and Secure Boot to Require. Under Device Properties: set Minimum OS version. Under Microsoft Defender for Endpoint: set Require the device to be at or under the machine risk score if Defender for Business is in use. Leave other settings at Not configured for now.
4
Configure actions for non-compliance
Leave the default action (Mark device non-compliant) set to Immediately for now — you will add a grace period in the next section. Optionally add Send email to end user after 1 day so users know their device has a compliance issue before any access is blocked.
5
Assign to a group
Assign to your Intune-Devices-Windows group created in Part 1 (or a staging group for initial testing). Do not assign to All Devices until you have validated the policy against a test device.

Grace period and actions for non-compliance

The Actions for non-compliance section defines what happens when a device fails a check — and when. The default action, Mark device non-compliant, fires on first evaluation. If your Conditional Access policy is already in Enforce mode, that verdict blocks access immediately.

For a first rollout, that is too aggressive. A better sequence for most SMBs:

Day Action Purpose
Day 0 Mark device non-compliant The verdict is set in Intune — visible to admins, but Conditional Access is still in Report-only so no access is blocked.
Day 1 Send email to end user User receives a notification that their device has a compliance issue. They can self-remediate common problems (e.g. a PIN not set) before access is affected.
Day 3 Send push notification Follow-up if the first email was missed. Appears in the Company Portal app on the device.
Day 7 (Switch CA to Enabled) By this point you switch Conditional Access from Report-only to Enabled. Devices that are still non-compliant after a full week will be blocked from accessing cloud resources.
💡
The grace period buys you operational time, not a security bypass. The non-compliant verdict exists in Intune from day 0 — you can see exactly which devices are failing and why. The grace period only delays when Conditional Access acts on that verdict. Use the window to fix device issues and communicate with users before access is affected.

Assigning the policy — and the tenant toggle

Assign your compliance policy to your Windows device group. Then, once the policy is assigned and you can verify at least one device has received and evaluated it, go to Devices → Compliance → Compliance settings and change Mark devices with no compliance policy as from Compliant to Not compliant.

The order is important: policy assigned first, tenant setting changed second. Doing it in the wrong order — changing the tenant setting before any policy is assigned — will mark every enrolled device as non-compliant simultaneously.

Checking that a device has received the policy

In the Intune admin centre go to Devices → All devices, select a device, and choose Device compliance. You should see your policy listed with a status. If it shows Not applicable, the device is not in the assigned group. If it shows Pending, the device has not checked in yet — trigger a manual sync from the device in Settings → Accounts → Access work or school → Info → Sync, or issue a Sync action from the Intune portal.

Connecting compliance to Conditional Access

Conditional Access policies live in Entra ID but consume the compliance signal Intune produces. The policy you build here says: require a Compliant device to access cloud apps — block anything else.

For an SMB, start broad: all users, all cloud apps, require compliant device. Add Named Locations and exclusions later. The sequence is always: Report-only first, validate, then enforce.

Create the Conditional Access policy

📱
Personal and unmanaged devices will show Report-only: Failure — that is expected. If you are designing for managed access only, any personal phone, home laptop, or BYOD device that is not enrolled in Intune has no compliance verdict and will be flagged as would-be-blocked. This is the intended outcome, not an error to fix. Review these entries in the sign-in logs, understand which users they belong to, and decide whether those devices need enrolment or a separate access path before you enforce.
1
Open Conditional Access in the Entra admin centre
Navigate to entra.microsoft.com → Protection → Conditional Access → Policies → New policy. Name it something like CA-Require-Compliant-Device-v1.
2
Set Users
Set Users → Include → All users. Under Exclude, add your Break Glass (emergency access) accounts and the Intune Enrollment service account if you use one. Never create a Conditional Access policy with no exclusion — always preserve a way in if something goes wrong.
3
Set Target resources
Set Target resources → Cloud apps → All cloud apps. This is the broadest scope. If you want to start narrower, scope it to Office 365 (which covers Exchange Online, SharePoint, and Teams) and expand later.
4
Set the Grant control
Under Grant, select Grant access and tick Require device to be marked as compliant. Select Require all the selected controls (if you add MFA here later, this ensures both are checked).
5
Set to Report-only — do not enable yet
At the bottom of the policy, set the policy state to Report-only. This lets you observe what the policy would block without enforcing it. Click Create.
⚠️
Break Glass accounts are not optional. Always exclude one or two accounts from every Conditional Access policy. These are cloud-only accounts without MFA, stored in a physical safe with a printed password. If your Conditional Access policy has a misconfiguration and blocks all sign-ins, these accounts are your recovery path. Without them, a broken CA policy can require a call to Microsoft Support to resolve.

Reading Report-only data before you enforce

With your Conditional Access policy in Report-only mode, every sign-in attempt generates a result showing whether it would have been allowed or blocked. You read this data from the Entra sign-in logs.

Go to entra.microsoft.com → Monitoring & health → Sign-in logs. Filter by date (last 7 days) and look at the Conditional Access tab on any sign-in entry. You will see your policy listed with a result of either Report-only: Success (would be allowed) or Report-only: Failure (would be blocked).

What to look for before enabling

GOOD
Report-only: Success for all sign-ins from corporate devices. This confirms your enrolled, compliant devices would not be blocked.
INVESTIGATE
Report-only: Failure for a device you expected to be compliant. Check that device's compliance status in Intune — it may not have evaluated the policy yet, or it may be genuinely non-compliant.
EXPECTED
Report-only: Failure for personal devices, mobile devices, or unmanaged machines. These are not enrolled in Intune and have no compliance verdict — they would be blocked once the policy is enabled, which is the intended behaviour.
REVIEW
Report-only: Failure for service accounts, shared mailboxes, or legacy authentication flows. These need exclusions or alternative controls before you enable the policy — they will break on day one otherwise.

Run Report-only for at least 5–7 working days before enabling enforcement. Cover as many sign-in scenarios as possible: normal user sign-ins, mobile apps, desktop Office applications, shared devices. Once you are satisfied the data looks correct, switch the policy state from Report-only to On.

Verifying compliance status across your fleet

Once devices have checked in, the compliance report gives you a fleet-wide view before you switch Conditional Access to Enforce.

Go to Devices → Monitor → Device compliance. States shown: Compliant, Non-compliant, In grace period, Not evaluated, Error. Before enabling enforcement, get Non-compliant to zero — or to a count you can individually explain.

Drilling into individual non-compliant settings

Select any non-compliant device, then choose Device compliance from the left menu. Expand the compliance policy and you will see each individual setting with its evaluation result. This tells you exactly which check failed — BitLocker not enabled, OS version below minimum, and so on. This is also the fastest way to prove to a user (or a manager) what is wrong and what they need to fix.

For remote remediation of simple issues, you can trigger a compliance re-evaluation after a fix by selecting the device in Intune and choosing Sync from the action menu. The device will check in within a few minutes and update its compliance state.

Part 2 checklist — before moving to Part 3

  • Windows compliance policy created and named Policy named clearly (e.g. WIN-Compliance-SMB-Baseline-v1) and saved in Intune with the four baseline settings configured.
  • Actions for non-compliance configured Day 0: Mark non-compliant. Day 1: Email notification to end user. Optionally Day 3: Push notification via Company Portal.
  • Policy assigned to Windows device group Assigned to your Intune-Devices-Windows group (or equivalent). At least one test device confirmed as having received and evaluated the policy.
  • Tenant compliance setting updated Devices → Compliance → Compliance settings → Mark devices with no compliance policy as → changed to Not compliant.
  • Conditional Access policy created in Report-only mode Policy targets All users / All cloud apps / Require compliant device grant. Break Glass accounts excluded. Policy state: Report-only.
  • Report-only data reviewed for 5–7 days Sign-in logs reviewed. All corporate enrolled devices show Report-only: Success. Any Report-only: Failure entries investigated and explained or excluded.
  • Fleet compliance verified in Device compliance report Devices → Monitor → Device compliance reviewed. Non-compliant count understood and addressed before enabling enforcement.
  • Conditional Access policy switched to Enabled (after validation) Once 5–7 days of clean Report-only data confirmed, policy state changed from Report-only to On. Access tested from a compliant device and a non-enrolled device.
Next in the series — Part 3 of 6
Settings Catalog & Configuration Profiles
Now that compliance is checking device state, it's time to configure it. BitLocker enforcement, Windows Hello for Business, OneDrive Known Folder Move, and browser hardening — all through Settings Catalog profiles.
Read Part 3 →

Up next — Part 3 of 6
Settings Catalog & Configuration Profiles
Compliance checks state — profiles configure it. BitLocker enforcement, Windows Hello for Business, OneDrive Known Folder Move, and browser hardening are all next. Read Part 3 →
Previous
Previous

Settings Catalog & Configuration Profiles

Next
Next

Licensing, Setup & First Device