In this sequence, you’ll configure Defender for Endpoint to use compliance and app protection policies configured in Intune. To complete the configuration, follow these steps: Figure 9.8 – Compliance policy evaluation section When enabling these settings, Intune will use the device threat level information sent by MDE to determine whether the device is compliant or […]