Intune Compliance: Top Tenant Mistakes
Intune
Apr 12, 2026 11:29 PM

Intune Compliance: Top Tenant Mistakes

by HubSite 365 about Jonathan Edwards

No-Faffing Managed IT Support & Cyber Security Support. Made in Yorkshire, built for the UK.

Microsoft expert fixes Intune default compliance, builds enforceable policies and enforces them with Conditional Access

Key insights

  • Default compliance setting: In the video, MSP Mike shows many tenants leave the built-in default that marks devices with no assigned policy as "Compliant," which creates a false sense of security.
    Change that default to "Not compliant" and assign real policies so devices don't pass checks by accident.

  • Compliance status validity period: Intune marks devices non‑compliant if they do not check in within the set validity window (defaults to 30 days).
    Adjust the period or ensure regular device check‑ins to avoid unexpected non‑compliance flags.

  • Enrolled user exists: A common built‑in check fails when a device has a deleted or unlicensed primary user, or when shared/kiosk devices lack a proper user account.
    Fix by updating the device primary user, using shared device settings, or excluding known exceptions.

  • Conditional Access: Compliance status only blocks access if you link Intune policies to Conditional Access in Microsoft Entra ID.
    Use CA to deny access for non‑compliant devices so policy results actually protect resources.

  • Policy assignment best practice: Target policies to users (not devices), avoid duplicate or overlapping policies, and use platform‑specific rules (encryption, antivirus, jailbreak/root detection).
    Pilot new policies on a small group before broad rollout to catch conflicts.

  • Practical fixes & monitoring: Build a clear compliance policy (bitlocker, AV, system update checks), link it to Conditional Access, and require remediation via Company Portal.
    Regularly review reports, test syncs, and audit defaults during offboarding to keep compliance meaningful.

Jonathan Edwards published a practical YouTube walkthrough that highlights a common and risky misconfiguration in Microsoft Intune tenants. In the video, an MSP nicknamed Mike discovers that a tenant reporting 100% device compliance can either mean strong security or a silent failure in policy setup. Consequently, Edwards demonstrates how to correct the default behavior, build a meaningful compliance policy, and then enforce it with Conditional Access so compliance actually controls access.

What the Video Reveals

The episode begins with a surprising observation: every enrolled device in one tenant showed as Compliant, which triggered an investigation. Edwards and Mike show that this green status sometimes results from Intune's default configuration rather than active security enforcement, so it can provide a false sense of safety. Therefore, the rest of the video focuses on identifying the default setting at fault and applying changes so that policy results reflect real device posture.

Next, Edwards walks viewers through a hands-on repair. He adjusts the tenant-level defaults, creates a concrete compliance policy that checks things like encryption and antivirus, and then links that policy to a Conditional Access rule. In this way, the video moves from discovery to remediation and ends with an explanation of how enforcement prompts users to remediate non-compliant devices via the Company Portal.

Understanding Intune's Default Behavior

Edwards explains two tenant-level defaults that often cause trouble. The first is the Compliance status validity period, which defaults to thirty days; if devices fail to check in within that window they can appear non-compliant due to inactivity. The second default, often overlooked, is the setting that determines how Intune treats devices with no assigned policy, which frequently defaults to Compliant and therefore lets unprotected endpoints slip through.

Those defaults trade convenience for risk. On one hand, marking unassigned devices as Compliant reduces admin effort and avoids accidental lockouts during rollout. On the other hand, it undermines visibility and weakens access control. Therefore, Edwards recommends reassessing those defaults so that compliance reports match real security posture and conditional access decisions rely on accurate signals.

How to Fix Policies and Enforce Access

In the demo, Edwards changes the default from Compliant to Not compliant for devices with no assigned policy and reduces ambiguity by assigning explicit policies to target users. He also stresses assigning policies to users rather than devices, because user assignment avoids conflicts on multi-user machines and aligns better with access tokens and sign-in behavior. After building platform-specific checks, such as BitLocker enforcement for Windows or jailbreak detection for iOS, he links the resulting compliance state to a Conditional Access rule to block access from non-compliant devices.

However, enforcement raises tradeoffs that Edwards discusses plainly. Blocking non-compliant devices improves security but can disrupt business workflows if rolled out too quickly or without user support. Thus, he suggests a phased approach with clear communication, remediation guidance through the Company Portal, and pilot groups that validate policy behavior before broad enforcement.

Common Pitfalls and Operational Challenges

The video calls out frequent mistakes that create false confidence or operational headaches. For example, duplicate or overlapping policies can produce unexpected statuses, deleted or disabled primary users can trigger an Enrolled user exists failure, and long check-in intervals interact poorly with the validity period. Edwards also notes known reporting quirks where a device shows Not applicable despite being in scope, requiring detailed device-level troubleshooting.

Beyond configuration errors, practical challenges include handling shared or kiosk devices, managing license changes during offboarding, and balancing automated blocking with helpdesk capacity. These issues force teams to weigh tight enforcement against potential user disruption, so Edwards recommends continuous monitoring, regular audits of policy assignments, and clear playbooks for remediation.

Practical Takeaways for MSPs and IT Teams

To conclude, Edwards offers actionable guidance: review tenant defaults, set unassigned devices to Not compliant if you want real enforcement, and assign policies to users where feasible. Additionally, integrate compliance signals with Conditional Access to make policy meaningfully control resource access, but plan rollouts to avoid business interruption and to give users clear remediation steps.

Overall, the video serves as a concise and useful reminder that green dashboards can lie when defaults remain unchecked. By balancing strict enforcement with staged changes and good user support, IT teams and MSPs can move from deceptive compliance to measurable security.

Intune - Intune Compliance: Top Tenant Mistakes

Keywords

Intune compliance policies, Intune policy misconfigurations, Microsoft Intune best practices, Intune tenant compliance mistakes, Endpoint Manager compliance settings, Intune device compliance troubleshooting, Conditional Access and Intune compliance, common Intune compliance errors