To better understand how to implement specific security configuration scenarios, see the security configuration framework guidance for iOS compliance policies. When configuring compliance policies, the broad range of settings enable you to tailor protection to your specific needs. To learn more about compliance policies, and what they do, see get started with device compliance. As part of your mobile device management (MDM) solution, use these settings to require an email, mark rooted (jailbroken) devices as not compliant, set an allowed threat level, set passwords to expire, and more.Īs an Intune administrator, use these compliance settings to help protect your organizational resources. This article lists and describes the different compliance settings you can configure on iOS/iPadOS devices in Intune.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |