EPC Group - Enterprise Microsoft AI, SharePoint, Power BI, and Azure Consulting
G2 High Performer Summer 2025, Momentum Leader Spring 2025, Leader Winter 2025, Leader Spring 2026
BlogContact
Ready to transform your Microsoft environment?Get started today
(888) 381-9725Get Free Consultation
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌

EPC Group

Enterprise Microsoft consulting with 29 years serving Fortune 500 companies.

(888) 381-9725
contact@epcgroup.net
4900 Woodway Drive, Suite 830
Houston, TX 77056

Follow Us

Solutions

  • M&A Practices

    • M&A Tenant Migration
    • Carve-Out Migration
    • Private Equity Practice
    • Engagement Operating Model
  • All Services
  • Microsoft 365 Consulting
  • AI Governance
  • Azure AI Consulting
  • Cloud Migration
  • Microsoft Copilot
  • Data Governance
  • Microsoft Fabric
  • Dynamics 365
  • Power BI Consulting
  • SharePoint Consulting
  • Microsoft Teams
  • vCIO / vCAIO Services
  • Large-Scale Migrations
  • SharePoint Development

Industries

  • All Industries
  • Healthcare IT
  • Financial Services
  • Government
  • Education
  • Teams vs Slack

Power BI

  • Case Studies
  • 24/7 Emergency Support
  • Dashboard Guide
  • Gateway Setup
  • Premium Features
  • Lookup Functions
  • Power Pivot vs BI
  • Treemaps Guide
  • Dataverse
  • Power BI Consulting

Company

  • About Us
  • Our History
  • Microsoft Gold Partner
  • Case Studies
  • Testimonials
  • Fixed-Fee Accelerators
  • Blog
  • Resources
  • All Guides & Articles
  • Video Library
  • Client Reviews
  • Engagement Operating Model
  • FAQ
  • Contact
  • Schedule a consultation

Microsoft Teams

  • Teams Questions
  • Teams Healthcare
  • Task Management
  • PSTN Calling
  • Enable Dial Pad

Azure & SharePoint

  • Azure Databricks
  • Azure DevOps
  • Azure Synapse
  • SharePoint MySites
  • SharePoint ECM
  • SharePoint vs M-Files

Comparisons

  • M365 vs Google
  • Databricks vs Dataproc
  • Dynamics vs SAP
  • Intune vs SCCM
  • Power BI vs MicroStrategy

Legal

  • Sitemap
  • Privacy Policy
  • Terms
  • Cookies

About EPC Group

EPC Group is a Microsoft consulting firm founded in 1997 (originally Enterprise Project Consulting, renamed EPC Group in 2005). 29 years of enterprise Microsoft consulting experience. EPC Group historically held the distinction of being the oldest continuous Microsoft Gold Partner in North America from 2016 until the program's retirement. Because Microsoft officially deprecated the Gold/Silver tiering framework, EPC Group transitioned to the modern Microsoft Solutions Partner ecosystem and currently holds the core Microsoft Solutions Partner designations.

Headquartered at 4900 Woodway Drive, Suite 830, Houston, TX 77056. Public clients include NASA, FBI, Federal Reserve, Pentagon, United Airlines, PepsiCo, Nike, and Northrop Grumman. 6,500+ SharePoint implementations, 1,500+ Power BI deployments, 500+ Microsoft Fabric implementations, 70+ Fortune 500 organizations served, 11,000+ enterprise engagements, 200+ Microsoft Power BI and Microsoft 365 consultants on staff.

About Errin O'Connor

Errin O'Connor is the Founder, CEO, and Chief AI Architect of EPC Group. Microsoft MVP multiple years, first awarded 2003. 4× Microsoft Press bestselling author of Windows SharePoint Services 3.0 Inside Out (MS Press 2007), Microsoft SharePoint Foundation 2010 Inside Out (MS Press 2011), SharePoint 2013 Field Guide (Sams/Pearson 2014), and Microsoft Power BI Dashboards Step by Step (MS Press 2018).

Original SharePoint Beta Team member (Project Tahoe). Original Power BI Beta Team member (Project Crescent). FedRAMP framework contributor. Worked with U.S. CIO Vivek Kundra on the Obama administration's 25-Point Plan to reform federal IT, and with NASA CIO Chris Kemp as Lead Architect on the NASA Nebula Cloud project. Speaker at Microsoft Ignite, SharePoint Conference, KMWorld, and DATAVERSITY.

© 2026 EPC Group. All rights reserved. Microsoft, SharePoint, Power BI, Azure, Microsoft 365, Microsoft Copilot, Microsoft Fabric, and Microsoft Dynamics 365 are trademarks of the Microsoft group of companies.

Intune compliance policies define the health rules devices must meet before they can access corporate data. They cover OS version, disk encryption, password complexity, antivirus, and jailbreak detection. Non-compliant devices are blocked via Conditional Access until the user fixes the issue. This guide explains how compliance policies work, how to configure them, and how they map to HIPAA and SOC 2 requirements.

Key Facts

  • Compliance policies set device health requirements. Conditional Access enforces them — blocking or restricting non-compliant devices.
  • Policies are platform-specific: separate policies for Windows, iOS, Android, and macOS.
  • Non-compliant devices show a grace period (configurable 1–90 days) before access is blocked.
  • Intune sends compliance status to Azure AD in real time. Conditional Access reads this status on every sign-in.
  • EPC Group: 29 years of Microsoft consulting, 10,000+ enterprise deployments, Microsoft Solutions Partner (core designations).
Back to Blog

Introduction To Intune Compliance Policies And Their Need

Errin O\'Connor
December 2025
8 min read

Introduction to Microsoft Intune Compliance Policies

Intune compliance policies define the health rules devices must meet before they can access corporate data. They cover OS version, disk encryption, password complexity, antivirus, and jailbreak detection. Non-compliant devices are blocked via Conditional Access until the user fixes the issue. This guide explains how compliance policies work, how to configure them, and how they map to HIPAA and SOC 2 requirements.

Key facts

  • Compliance policies set device health requirements. Conditional Access enforces them — blocking or restricting non-compliant devices.
  • Policies are platform-specific: separate policies for Windows, iOS, Android, and macOS.
  • Non-compliant devices show a grace period (configurable 1–90 days) before access is blocked.
  • Intune sends compliance status to Azure AD in real time. Conditional Access reads this status on every sign-in.
  • EPC Group: 29 years of Microsoft consulting, 10,000+ enterprise deployments, Microsoft Solutions Partner (core designations).

What are Intune compliance policies?

Compliance policies are sets of rules that a device must satisfy to be considered healthy by Intune. Think of them as the minimum security bar your organization requires before a device touches corporate data.

Each policy covers settings across three categories.

  • Device health — BitLocker enabled, Secure Boot on, Defender running, no jailbreak detected.
  • Device properties — minimum and maximum OS version, minimum security patch level.
  • System security — password complexity, minimum length, lockout threshold, screen timeout.

How compliance policies work with Conditional Access

Compliance policies alone do not block access — they report a device's compliance status. Conditional Access uses that status to make access decisions.

  1. A user signs in to a corporate app (Outlook, SharePoint, Teams).
  2. Azure AD evaluates Conditional Access policies for the user and the app.
  3. Conditional Access checks the device's Intune compliance status. If the device is non-compliant, access is denied.
  4. The user sees a message explaining why access is blocked and what they need to fix.
  5. Once the device meets the compliance requirements, Intune reports it as compliant. Access is restored on the next sign-in.

How to create a compliance policy in Intune

  1. In the Microsoft Intune admin center (intune.microsoft.com), go to Devices → Compliance policies → Create policy.
  2. Select the platform: Windows 10/11, iOS/iPadOS, Android Enterprise, or macOS.
  3. On the Compliance settings tab, configure the rules for each category (device health, properties, system security).
  4. On the Actions for noncompliance tab, set the grace period. Common settings: mark non-compliant immediately, send email notification on Day 1, block access after 3 days.
  5. On the Assignments tab, assign to an Azure AD group (e.g., All Corporate Devices, All Mobile Users).
  6. Click Create. The policy deploys to assigned devices within 8 hours (or on next check-in).

Compliance policy settings by platform

Setting Windows iOS/iPadOS Android Enterprise
Encryption required BitLocker Built-in encryption Work profile encryption
Jailbreak detection N/A Yes Root detection
Minimum OS version Windows 11 22H2+ iOS 16.0+ Android 12.0+
Antivirus required Microsoft Defender N/A Via Mobile Threat Defense
Password complexity Yes (Alphanumeric) Yes Yes

Compliance policies by user type

Different user groups need different compliance requirements. Create separate policies per group.

  • Executives — require biometric authentication (Face ID or Windows Hello), latest OS version, and Defender ATP integration.
  • IT administrators — require privileged access workstations (PAW) configuration, Secure Boot, BitLocker, and an updated security patch within 7 days.
  • Standard corporate users — minimum OS version, BitLocker, Defender active, and a 6-character PIN or password.
  • Frontline workers (shared devices) — lighter policy appropriate for shared kiosk devices — PIN required, enrollment required, no personal app data mixing.

Compliance alignment: HIPAA and SOC 2

Intune compliance policies satisfy several regulatory control requirements.

  • HIPAA §164.312(a) — Access controls: password complexity and MFA enforcement ensure only authorized users access PHI.
  • HIPAA §164.312(a)(2)(iv) — Encryption: BitLocker and iOS built-in encryption at rest requirements satisfy this control.
  • HIPAA Audit controls §164.312(b): Intune compliance audit logs in Azure Monitor provide evidence of policy enforcement.
  • SOC 2 Security criterion (CC6.1): logical access controls via Conditional Access plus device compliance meet this criterion.
  • CMMC 3.1.1 — Access control: Conditional Access requiring compliant devices limits system access to authorized users on authorized endpoints.

Frequently asked questions

What happens when a device goes non-compliant?

Intune marks the device non-compliant and sends a notification to the user. Conditional Access blocks or restricts access based on your grace period settings. The user must fix the issue (e.g., enable BitLocker, update the OS) before Intune marks the device compliant again and access is restored.

Can I create different compliance policies for different departments?

Yes. Create separate policies and assign each to the appropriate Azure AD group. Finance and HR typically need stricter policies than general staff. Executive devices often have the strictest requirements. Intune applies the most restrictive policy if multiple policies apply to the same device.

Do BYOD devices need a compliance policy?

Yes, if they access corporate data. For BYOD, use App Protection Policies combined with a lighter compliance policy that does not require BitLocker or domain join. This protects corporate data in managed apps (Outlook, Teams) without controlling the personal side of the device.

How often do devices check in for compliance?

Windows devices check in every 8 hours. iOS and Android devices check in every 8 hours when the Company Portal app is active. Conditional Access re-evaluates compliance on every sign-in attempt, so a device that goes non-compliant is blocked at the next sign-in — not just at the next scheduled check-in.

Can compliance policies detect if a device has malware?

Yes, through Microsoft Defender integration. Enable the "Microsoft Defender ATP Risk Score" compliance setting. Intune evaluates the Defender risk score (Clean, Low, Medium, High) and marks devices non-compliant if the risk score exceeds your threshold. This blocks infected devices from accessing corporate data automatically.

Design your Intune compliance strategy

EPC Group deploys Intune compliance policies for enterprise organizations across healthcare, financial services, and government. Call (888) 381-9725 or request a 30-minute discovery call.

Why Organizations Choose EPC Group

EPC Group is a Houston-based Microsoft consulting firm with 29 years of enterprise implementation experience and over 10,000 successful deployments across Power BI, Microsoft Fabric, SharePoint, Azure, Microsoft 365, and Copilot. We serve organizations across all industries including Fortune 500, federal agencies, healthcare, financial services, government, manufacturing, energy, education, retail, technology, and global enterprises.

What sets EPC Group apart is our governance-first approach. Every engagement begins with a security and compliance assessment. Our team of senior architects brings hands-on delivery experience across HIPAA, SOC 2, FedRAMP, and CMMC environments. We own outcomes, not hours.

  • Fixed-fee accelerators with predictable pricing and defined deliverables
  • Senior architect engagement on every project, not rotating juniors
  • Compliance-native delivery for regulated industries
  • End-to-end coverage from strategy through 24/7 managed services
  • 11,000+ enterprise engagements refined into repeatable, risk-controlled patterns

Call (888) 381-9725 or email contact@epcgroup.net for a free assessment.

Compliance Notes: 2026 Considerations for Introduction To Intune Compliance Policies And Their Need

HIPAA-compliant Microsoft 365 deployment in 2026 requires: signed Business Associate Agreement (BAA) with Microsoft (free, but must be executed at tenant-creation time), Microsoft Defender for Office 365 Plan 2, Microsoft Purview Information Protection with PHI-classified sensitivity labels, Microsoft Defender for Cloud Apps with anomaly detection, Audit (Premium) for 6-year audit log retention, and Customer Lockbox for support-access logging.

FedRAMP authorization in 2026 averages 14-22 months and $1.2M-$3M for commercial Authority To Operate (ATO); agency ATOs run 18-30 months. Microsoft Azure Government Cloud as the underlying platform provides material control inheritance; typical commercial ATO leveraging Azure Gov drops to 9-13 months and $750K-$2M total.

Decision factors EPC Group evaluates

  • Audit (Premium) 6-year retention configuration
  • Sensitivity-label-driven DLP policies for PHI/PII/CUI
  • Customer Lockbox enablement for regulated tenants
  • HIPAA / SOC 2 Type II / FedRAMP / CMMC Level 2 baseline mapping to Microsoft controls
  • Microsoft Purview Compliance Manager assessment templates

See related EPC Group services at /services or schedule a discovery call at /contact.