Compliance policies
We can define the rules and settings that users and devices must meet to be compliant. This can include actions that apply to non-compliant devices. Actions for noncompliance can alert users to the conditions of noncompliance and safeguard data on non-compliant devices.
See the following example of how you can set the risk level within Microsoft Defender when your endpoint does not meet the compliance expectations. Your device will show up as a risk in Microsoft Defender for Endpoint as well as in Intune – marked as non-compliant.
Figure 13.92: Microsoft Defender for Endpoint compliance settings
More information on compliance policies can be found in Chapter 10, Advanced Policy Management.