Field guide

Intune CIS Benchmark for Windows, Mac, and mobile.

The Microsoft Intune CIS Benchmark covers endpoint hardening across every platform Intune manages. This page distills it to twelve high-impact controls, each with a paraphrased summary, why it matters, and a 5-minute fix you can run from the Intune admin center. Free to read, no email required.

Windows + macOS

Security baselines, BitLocker and FileVault, ASR rules, EDR onboarding, LAPS, compliance policies. The corporate workstation surface end to end.

iOS + Android

App Protection Policies for personally owned phones. MAM, not MDM. The right control for BYOD without enrolling the whole device.

Patch cadence

Windows Update for Business rings, feature update governance, deferral and restart schedules that stop reboot storms.

Why Intune compliance is different from M365 compliance

It is a fleet, not a tenant

M365 controls are tenant-wide settings. Intune controls apply to thousands of devices, each with its own state. A misconfigured policy is silent until you check the assignment report and realize 12 percent of devices never received it.

Platforms behave differently

A “require encryption” policy lands as BitLocker on Windows, FileVault on macOS, native encryption on iOS, and a request that may or may not be honored on Android. Same control name, four different stories.

BYOD requires MAM, not MDM

Personal phones should never be enrolled in full MDM. The correct control for BYOD is App Protection Policy: wrap the managed apps, leave the device alone, wipe just the work container if you need to.

“Configured” is not “applied”

Most Intune audit findings are about devices that did not receive a policy that exists in the tenant. The policy passes review. The deployment fails silently. The CIS control fails on the endpoint, not in the admin center.

12 endpoint controls, 12 fixes

Paraphrased control titles from the Veri-Tech control registry. CIS and NIST section IDs are factual references and remain visible. Authoritative control text lives with the publisher; this page describes what each control checks for and how to satisfy it from the Intune admin center.

#1CIS-5.3.1highWindows

Deploy Windows Security Baseline

What it does

A Microsoft-curated baseline of hundreds of Windows hardening settings (UAC, SmartScreen, attack surface reduction, credential protection) deployed as an Intune policy and pinned to a recent version.

Why it matters

Reinventing a Windows hardening baseline is two weeks of engineering time you do not need to spend. Microsoft publishes one and updates it. Skipping it is the difference between secure-by-default and the registry equivalent of "factory settings."

5-minute fix

Intune admin center, Endpoint security, Security baselines, Windows Security Baseline. Create a profile, accept the recommended settings, scope to All Devices excluding Personal, and watch the deployment metrics.

#2CIS-5.4.1highWindows

Deploy Defender for Endpoint security baseline

What it does

The Microsoft Defender for Endpoint baseline applied through Intune. Configures EDR, automated investigation and response, Defender SmartScreen, and tamper protection to recommended values.

Why it matters

A Defender license without the baseline is like a smoke detector without batteries. The baseline is what turns the EDR sensor on, points it at the cloud, and stops users from disabling it.

5-minute fix

Endpoint security, Security baselines, Microsoft Defender for Endpoint Baseline. Create the policy and assign to your managed Windows group. Verify Tamper Protection shows On in the Defender portal device inventory.

#3NIST-SI-3highWindows

Configure Attack Surface Reduction rules

What it does

A Defender ASR rule policy that blocks the most-abused malware behaviors: Office macros launching child processes, credential dumping from LSASS, executable content from email, abuse of WMI and PsExec, JavaScript download patterns.

Why it matters

ASR rules are the single highest-leverage control on a Windows endpoint. Properly tuned, they stop most commodity ransomware in a way no antivirus signature can. They are also the control most often left in audit mode forever.

5-minute fix

Endpoint security, Attack surface reduction, ASR rules. Set the Microsoft-recommended block rules to Block (not Audit). Pilot on a 50-device ring for one week, address exclusions, then roll out org-wide.

#4CIS-5.1.4highWindows

Deploy Windows LAPS

What it does

Windows Local Administrator Password Solution rotates the local admin account password on every managed device on a schedule and stores the rotated password in Entra ID for audited retrieval.

Why it matters

A static local admin password shared across the fleet is the lateral-movement gift that keeps on giving. LAPS turns one compromised endpoint into one compromised endpoint, not a ransomware blast radius.

5-minute fix

Endpoint security, Account protection, Local admin password solution. Create a policy with Backup directory = Azure AD only, password complexity = Large letters + small letters + numbers + special characters, age = 7 days.

#5CIS-5.2.2.1highWindows

Require BitLocker drive encryption

What it does

A BitLocker policy that silently encrypts the OS volume on every managed Windows device, with recovery keys escrowed to Entra ID.

Why it matters

A laptop in a TSA tray, a stolen kit from a hotel, a returned device on eBay. Encryption is the single thing that turns a hardware loss into an inconvenience instead of a HIPAA notification.

5-minute fix

Endpoint security, Disk encryption, Create policy, BitLocker. Set Encryption method = AES-256, Configure Encryption Methods = Yes, Compatible TPM startup = Required, Recovery Key escrow to Entra ID.

#6CIS-5.5.1highWindows

Windows device compliance policy configured

What it does

A compliance policy that defines what "compliant" means: BitLocker on, firewall on, antivirus reporting, OS minimum version, secure boot enabled.

Why it matters

Conditional Access can require a compliant device. Without a compliance policy, "compliant" defaults to "any enrolled device," which means non-compliant. The policy is the floor under your CA rule.

5-minute fix

Devices, Windows, Compliance policies. Create a Windows 10/11 compliance policy with device health checks (BitLocker, secure boot, code integrity), platform configuration (firewall, antivirus), minimum OS version, and a 24-hour grace period for new devices.

#7NIST-SI-4highWindows

Deploy Endpoint Detection and Response (EDR) policy

What it does

An Intune EDR policy that onboards every managed Windows device to Microsoft Defender for Endpoint and configures sample submission, telemetry level, and sensor health.

Why it matters

An EDR license without onboarded devices is shelfware. The policy is the wire that connects the sensor to the cloud and lights up the device in the Defender portal.

5-minute fix

Endpoint security, Endpoint detection and response, Create policy, Microsoft Defender for Endpoint. Use the auto-generated onboarding blob (Settings, Onboarding in Defender). Sample sharing = All, Telemetry = Expedite.

#8CIS-5.5.5highmacOS

Deploy macOS FileVault disk encryption

What it does

A macOS FileVault policy that enforces full-disk encryption on every managed Mac, escrows the personal recovery key to Intune, and rotates it after retrieval.

Why it matters

macOS without FileVault is a clear-text laptop. Same threat model as a Windows device without BitLocker. The recovery-key escrow is the operational difference between a managed fleet and a hope.

5-minute fix

Devices, macOS, Configuration profiles, Endpoint protection, FileVault. Enable FileVault, Personal recovery key = Yes, Escrow to Intune. Assign to all macOS devices.

#9CIS-5.5.4highmacOS

macOS device compliance policy configured

What it does

The macOS equivalent of the Windows compliance policy: minimum OS version, FileVault required, system integrity protection on, gatekeeper enabled, password requirements.

Why it matters

Same logic as Windows. Conditional Access cannot enforce "compliant Mac" if no policy defines what compliant means. Macs without compliance walls drift fast and quietly.

5-minute fix

Devices, macOS, Compliance policies. Create a policy with Device Health (System Integrity Protection on, FileVault on), Device Properties (minimum OS version), and Password (require, length, complexity, max minutes after lock).

#10CIS-6.2.1highiOS

iOS app protection policy configured

What it does

An App Protection Policy (APP) that wraps the managed apps on personally owned iPhones and iPads (Outlook, Teams, OneDrive, Word) without enrolling the device itself in MDM.

Why it matters

The right answer for personal iOS is MAM, not MDM. APP isolates the work container, requires PIN, blocks copy-paste to non-managed apps, and lets you wipe just the corporate data if the phone goes missing. Forcing a personal device into Intune enrollment is the wrong threat model.

5-minute fix

Apps, App protection policies, Create policy, iOS/iPadOS. Targeted apps = Microsoft 365 set. Data protection: Backup org data to iCloud = Block, Send org data to other apps = Policy managed apps. Access requirements: PIN for access = Require.

#11CIS-6.2.2highAndroid

Android app protection policy configured

What it does

The Android twin of the iOS APP. Wraps managed apps on personal Android devices with the same data-protection and access controls.

Why it matters

Personal Android is the largest unmanaged endpoint surface in most tenants. APP turns it into a managed application surface without requiring full enrollment, which Android users (correctly) refuse to accept.

5-minute fix

Apps, App protection policies, Create policy, Android. Same Microsoft 365 app set. Data protection same as iOS. Access requirements: PIN for access = Require, Block screen capture = Yes.

#12NIST-SI-2highWindows

Windows Update for Business rings configured

What it does

Update rings that stage Windows quality and feature updates across pilot, broad, and broad-late groups with appropriate deferrals and restart schedules.

Why it matters

Patching every Patch Tuesday is the most common cause of "every laptop reboots at 2pm Tuesday and the help desk gets buried." Rings give you a controlled cadence: pilot tomorrow, broad next week, late deployment two weeks out. Same patches, fewer fires.

5-minute fix

Devices, Windows, Update rings. Create three rings with quality update deferral (0, 7, 14 days) and feature update deferral (30, 60, 90 days). Restart settings: pause Active hours, deadline 7 days post-install.

What about the rest of the Intune posture?

Beyond these twelve, Veri-Tune scans for Edge security baselines, M365 Apps baselines, Defender Antivirus configuration, exploit protection, app control for business, device control, endpoint privilege management, sensitivity labeling, and the OpenIntuneBaseline community reference. Every finding ships with a per-platform remediation runbook and a one-click apply path through Conditional Access and Intune Graph.

The hardest part of Intune is not knowing what to set. It is making sure the policy actually arrived on the device, the user, the platform, and the OS version you scoped it to. That is what we built Veri-Tune to verify.