Muokkaa

Jaa


Access requirements policy mapping from Basic Mobility and Security to Intune

This article provides mapping details between Basic Mobility and Security to Intune. Specifically, this page maps the Microsoft Purview compliance portal Access Requirement policies to the equivalent policies in Microsoft Intune. Intune offers more policy flexibility. So, each Office policy translates into multiple Intune and Microsoft Entra policies to achieve the same result.

If you're migrating from Basic Mobility and Security to Intune, you can use the Migration evaluation tool to automate much of this mapping.

To see these settings in the Microsoft Purview compliance portal, sign in to the Purview compliance portal. Then, go to the Device security policies list, select your policy name > Edit policy > Access Requirements.

Before you begin

To configure the settings in an Intune policy, sign in to the Microsoft Intune admin center. Role-based access control (RBAC) with Microsoft Intune lists and describes the built-in roles that can create policies.

If a device doesn't meet the requirements above, then...

This setting determines if you should use Intune compliance policies or configuration profiles for all the access requirement settings. Make sure to review the details for this setting first.

Note

Basic Mobility and Security never supported enforcing Conditional Access on Windows.

Allow access and report violation (one-time enrollment is still enforced)

All Access Requirements are deployed in an Intune device configuration profile.

Block access and report violation

All Access Requirements are deployed in an Intune compliance policy. The groups assigned are assigned to classic Conditional Access policies:

  • [GraphAggregatorService] Device policy
  • [Office 365 Exchange Online] Device policy
  • [Outlook Service for Exchange] Device policy
  • [Office 365 SharePoint Online] Device policy
  • [Outlook Service for OneDrive] Device policy

Require a password

Note

All password-related settings impact only local accounts on Windows. User accounts sourced from Microsoft Entra ID are not managed by these policies.

When If a device doesn't meet the requirements above, then… is set to Block access and report violation, use Intune compliance policies as shown below. If the setting is set to Allow…, use configuration profiles instead.

Three compliance policies:

  • Devices > By platform > Windows > Manage devices > Compliance > policy name_O365_W > Properties > Compliance settings Edit > System Security > Require a password to unlock mobile devices
  • Devices > By platform > iOS/iPadOS > Manage devices > Compliance > policy name_O365_i > Properties > Compliance settings Edit > System Security > Require a password to unlock mobile devices
  • Devices > By platform > Android > Manage devices > Compliance > policy name_O365_A > Properties > Compliance settings Edit > System Security > Require a password to unlock mobile devices

Prevent simple passwords

For Android devices, this setting and multiple other Office settings are covered by one Android compliance setting. So this setting alone doesn't determine a specific Android compliance value.

When If a device doesn't meet the requirements above, then… is set to Block access and report violation, use Intune compliance policies as shown below. If the setting is set to Allow…, use configuration profiles instead.

Three compliance policies:

  • Devices > By platform > Windows > Manage devices > Compliance > policy name_O365_W > Properties > Compliance settings Edit > System Security > Simple passwords

  • Devices > By platform > iOS/iPadOS > Manage devices > Compliance > policy name_O365_i > Properties > Compliance settings Edit > System Security > Simple passwords

  • Devices > By platform > Android > Manage devices > Compliance > policy name_O365_A > Properties > Compliance settings Edit > System Security > Required password type.

    • If Prevent simple passwords is selected, choose Numeric complex, Alphabetic, Alphanumeric, or Alphanumeric with symbols (based on other Office settings).
    • If Prevent simple passwords isn't selected, choose Numeric or a higher type in the list (based on other Office settings).

Require an alphanumeric password

For Android devices, this setting and multiple other Office settings are covered by one Android compliance setting. So this setting alone doesn't determine a specific Android compliance value.

When If a device doesn't meet the requirements above, then… is set to Block access and report violation, use Intune compliance policies as shown below. If the setting is set to Allow…, use configuration profiles instead.

Three compliance policies:

  • Devices > By platform > Windows > Manage devices > Compliance > policy name_O365_W > Properties > Compliance settings Edit > System Security > Required password type

  • Devices > By platform > iOS/iPadOS > Manage devices > Compliance > policy name_O365_i > Properties > Compliance settings Edit > System Security > Required password type

  • Devices > By platform > Android > Manage devices > Compliance > policy name_O365_A > Properties > Compliance settings Edit > System Security > Required password type.

    • If Prevent simple passwords is selected, choose Numeric complex, Alphabetic, Alphanumeric, or Alphanumeric with symbols (based on other Office settings).
    • If Prevent simple passwords isn't selected, choose Numeric or a higher type in the list (based on other Office settings).

Password must include at least [1-4] character sets

When If a device doesn't meet the requirements above, then… is set to Block access and report violation, use Intune compliance policies as shown below. If the setting is set to Allow…, use configuration profiles instead.

Four compliance policies:

  • Devices > By platform > Windows > Manage devices > Compliance > policy name_O365_W > Properties > Compliance settings Edit > System Security > Password complexity.

    Office value Intune value
    1 Require digits and lowercase letters. The Windows compliance policy doesn't allow only one character set, so an Office setting of 1 translates to Require digits and lowercase letters.
    2 Require digits and lowercase letters
    3 Require digits, lowercase and uppercase letters
    4 Require digits, lowercase, uppercase, and special characters
  • Devices > By platform > iOS/iPadOS > Manage devices > Compliance > policy name_O365_i > Properties > Compliance settings Edit > System Security > Number of non-alphanumeric characters in password.

    The iOS compliance policy doesn't enforce the number of character sets but only the number of non-alphanumeric characters that must be used. So Office values are translated to the same number of non-alphanumeric characters required.

    Office value Intune value
    Disabled (0) Not configured
    1 1
    2 2
    3 3
    4 4
  • Devices > By platform > Android > Manage devices > Compliance > policy name_O365_A > Properties > Compliance settings Edit > System Security > Required password type.

    Android doesn't support distinguishing lowercase and uppercase as different character sets, and so the Office value of 4 can't be enforced. Instead it translates to at least Alphanumeric with symbols.

    Office value Intune value
    1 At least Numeric or Numeric complex (based on other Office settings)
    2 At least Alphanumeric
    3 At least Alphanumeric with symbols
    4 At least Alphanumeric with symbols
  • policy-name_OfficeMDM > Access controls > Grant > Require device to be marked as compliant

Minimum password length

When If a device doesn't meet the requirements above, then… is set to Block access and report violation, use Intune compliance policies as shown below. If the setting is set to Allow…, use configuration profiles instead.

Three compliance policies:

  • Devices > By platform > Windows > Manage devices > Compliance > policy name_O365_W > Properties > Compliance settings Edit > System Security > Minimum password length

  • Devices > By platform > iOS/iPadOS > Manage devices > Compliance > policy name_O365_i > Properties > Compliance settings Edit > System Security > Minimum password length

  • Devices > By platform > Android > Manage devices > Compliance > policy name_O365_A > Properties > Compliance settings Edit > System Security > Required password type and Minimum password length.

    Office value for Require an alphanumeric password Intune value for Required password type
    Selected At least Numeric (based on other Office settings)
    Not selected At least Numeric (based on other Office settings)

Number of sign-in failures before the device is wiped

Although this setting is listed under Access requirements in Basic Mobility and Security, access is still allowed. It's allowed even if this setting isn't enabled on the device yet, and this setting isn't a device compliance criterion.

When If a device doesn't meet the requirements above, then… is set to Block access and report violation, use Intune compliance policies as shown below. If the setting is set to Allow…, use configuration profiles instead.

Three configuration profiles:

  • Devices > By platform > Windows > Manage devices > Configuration > policy name_O365_W > Properties > Compliance settings Edit > Password > Number of sign-in failures before wiping device
  • Devices > By platform > iOS/iPadOS > Manage devices > Configuration > policy name_O365_i > Properties > Compliance settings Edit > Password > Number of sign-in failures before wiping device
  • Devices > By platform > Android > Manage devices > Configuration > policy name_O365_A > Properties > Compliance settings Edit > Password > Number of sign-in failures before wiping device

Lock devices if they are inactive for this many minutes

The Windows, iOS/iPadOS, and Android compliance policies don't offer the same granularity of values, so the Office setting range is mapped to fewer Intune values.

Three compliance policies:

  • Devices > By platform > Windows > Manage devices > Compliance > policy name_O365_W > Properties > Compliance settings Edit > System Security > Maximum minutes of inactivity before password is required

    Office value Intune value
    1 through 4 1 minute
    5 through 14 5 minutes
    15 or more 15 minutes
  • Devices > By platform > iOS/iPadOS > Manage devices > Compliance > policy name_O365_i > Properties > Compliance settings Edit > System Security > Maximum minutes of inactivity before password is required

    Office value Intune value
    1 1 minute
    2 2 minutes
    3 3 minutes
    4 4 minutes
    5 through 9 5 minutes (maximum for iOS)
    10 through 14 10 minutes (iPadOS only)
    15 or more 15 minutes (iPadOS only)
  • Devices > By platform > Android > Manage devices > Compliance > policy name_O365_A > Properties > Compliance settings Edit > System Security > Required password type.

    Office value Intune value
    1 through 4 1 minute
    5 through 14 5 minutes
    15 through 29 15 minutes
    30 through 59 30 minutes
    60 60 minutes

Password expiration

When If a device doesn't meet the requirements above, then… is set to Block access and report violation, use Intune compliance policies as shown below. If the setting is set to Allow…, use configuration profiles instead.

Three compliance policies:

  • Devices > By platform > Windows > Manage devices > Compliance > policy name_O365_W > Properties > Compliance settings Edit > System Security > Password expiration (days)
  • Devices > By platform > iOS/iPadOS > Manage devices > Compliance > policy name_O365_i > Properties > Compliance settings Edit > System Security > Password expiration (days)
  • Devices > By platform > Android > Manage devices > Compliance > policy name_O365_A > Properties > Compliance settings Edit > System Security > Number of days until password expires.

Remember password history and prevent reuse

When If a device doesn't meet the requirements above, then… is set to Block access and report violation, use Intune compliance policies as shown below. If the setting is set to Allow…, use configuration profiles instead.

Three compliance policies:

  • Devices > By platform > Windows > Manage devices > Compliance > policy name_O365_W > Properties > Compliance settings Edit > System Security > Number of previous passwords to prevent reuse

  • Devices > By platform > iOS/iPadOS > Manage devices > Compliance > policy name_O365_i > Properties > Compliance settings Edit > System Security > Number of previous passwords to prevent reuse

  • Devices > By platform > Android > Manage devices > Compliance > policy name_O365_A > Properties > Compliance settings Edit > System Security > Number of previous passwords to prevent reuse and Required password type

    Office value for Require an alphanumeric password Intune value for Required password type
    Selected At least Numeric (based on other Office settings)
    Not selected At least Numeric (based on other Office settings)

Require data encryption on devices

This setting was never configurable for Windows or iOS/iPadOS in Basic Mobility and Security.

When If a device doesn't meet the requirements above, then… is set to Block access and report violation, use Intune compliance policies as shown below. If the setting is set to Allow…, use configuration profiles instead.

One compliance policy:

  • Devices > By platform > Android > Manage devices > Compliance > policy name_O365_A > Properties > Compliance settings Edit > System Security > Encryption of data storage on device

Prevent jail broken or rooted devices from connecting

This setting was never configurable for Windows in Basic Mobility and Security.

For Android devices, Intune only supports this setting for Android device administrator devices.

Important

Microsoft Intune is ending support for Android device administrator management on devices with access to Google Mobile Services (GMS) on December 31, 2024. After that date, device enrollment, technical support, bug fixes, and security fixes will be unavailable. If you currently use device administrator management, we recommend switching to another Android management option in Intune before support ends. For more information, see Ending support for Android device administrator on GMS devices.

When If a device doesn't meet the requirements above, then… is set to Block access and report violation, use Intune compliance policies as shown below. If the setting is set to Allow…, use configuration profiles instead.

Two compliance policies:

  • Devices > By platform > iOS/iPadOS > Manage devices > Compliance > policy name_O365_i > Properties > Compliance settings Edit > Device Health > Jailbroken devices
  • Devices > By platform > Android > Manage devices > Compliance > policy name_O365_A > Properties > Compliance settings Edit > Device Health > Rooted devices

Require managing email profile (required for selective wipe on iOS)

Requiring this setting was never supported for Windows or Android compliance in Basic Mobility and Security. Windows email was never supported for Windows 10 in Basic Mobility and Security.

For Android, this setting was only supported on Samsung Knox devices in Basic Mobility and Security.

Intune requires more settings be configured when deploying email that weren't available in device security policies. For more information, see More settings required by Intune for email profiles.

When If a device doesn't meet the requirements above, then… is set to Block access and report violation, use Intune compliance policies as shown below. If the setting is set to Allow…, use configuration profiles instead.

Three configuration profiles and one compliance policy:

  • Devices > By platform > Windows > Manage devices > Configuration > policy name_O365_W_Email > Properties > Configuration settings Edit

    Setting Value
    Email server outlook.office365.com
    Account name Office 365 email
    Username attribute from Microsoft Entra ID User Principal Name
    Email address attribute from Microsoft Entra ID User Principal Name
    SSL Enable
  • Devices > By platform > iOS/iPadOS > Manage devices > Configuration > policy name_O365_i_Email > Properties > Configuration settings Edit

    Setting Value
    Email server outlook.office365.com
    Account name Office 365 email
    Username attribute from Microsoft Entra ID User Principal Name
    Email address attribute from Microsoft Entra ID User Principal Name
    Authentication name Username and password
    SSL Enable
  • Devices > By platform > iOS/iPadOS > Manage devices > Compliance > policy name_O365_i > Properties > Compliance settings Edit > Email > Unable to set up email on the device > Require

  • Devices > Android ** > Configuration profiles > policy name_O365_A_Email > Properties > ** Configuration settings Edit

    Setting Value
    Email server outlook.office365.com
    Account name Office 365 email
    Username attribute from Microsoft Entra ID User Principal Name
    Email address attribute from Microsoft Entra ID User Principal Name
    Authentication name Username and password
    SSL Enable

More settings required by Intune for email profiles

The following settings aren't deployed by device security policies. But when deploying email profiles, Intune requires the settings have a value.

Platform Setting Value in migration
Android Require S/mime false
Android Sync Contacts true
Android Sync Calendar true
Android Sync Tasks true
Android Sync Notes false
iOS Block moving messages to other email accounts false
iOS Block sending Email from third party addresses false
iOS Block syncing recently used email addresses false
iOS Require S/mime false
Windows 10 Sync Contacts true
Windows 10 Sync Calendar true
Windows 10 Sync Tasks true

Migration evaluation tool