Device Compliance
Device Compliance
Get started
Learn the basics about compliance settings, and the tasks you can accomplish with them.
Get started with compliance settings
Common tasks
In this section, you'll find some common scenarios that will help you learn to use compliance settings in
Configuration Manager.
Common tasks for managing compliance
  Windows PCs (with the Configuration Manager client)           Create custom configuration items to assess objects such as
                                                                registry keys, files, and Active Directory attributes.
Windows PCs (enrolled with on-premises MDM) Select settings from a predefined list.
Windows Phone devices (enrolled with on-premises MDM) Select settings from a predefined list.
  Mac computers (with the Configuration Manager client)         Create custom configuration items to assess objects such as
                                                                macOS preferences, and results returned by a script.
     If you want to run reports, then you must configure reporting      Introduction to reporting
     for your site.
     Required security permissions.                                     The Compliance Settings Manager security role includes
                                                                        the necessary permissions to manage compliance settings,
                                                                        user data and profiles configuration items, and remote
                                                                        connection profiles.
     TIP
     Other device types require no specific configuration to evaluate compliance settings.
1.    In the Configuration Manager console, click Administration > Client Settings > Default Settings .
2.    On the Home tab, in the Proper ties group, click Proper ties .
3.    In the Default Settings dialog box, click Compliance Settings .
4.    Configure the following client settings for compliance settings:
          Enable compliance evaluation on clients - Set to True if you want to evaluate compliance on client
          devices.
          Schedule compliance evaluation - Click Schedule if you want to modify the default compliance
          evaluation schedule on client devices.
          Enable User Data and Profiles - Enable this option if you want to create and deploy user data and
          profiles configuration items to Windows computers. For details, see Create user data and profiles
          configuration items.
5. Click OK to close the Default Settings dialog box.
Client computers are configured with these settings the next time they download client policy.
       Common tasks for managing compliance with
       Configuration Manager
       9/4/2020 • 2 minutes to read • Edit Online
In this scenario, you discover that an important line-of-business app doesn't run correctly on some Windows 8.1
computers that you manage. You determine that this is because a registry key named
HKEY_LOCAL_MACHINE\SOFTWARE\Woodgrove\LOB App\Configuration\Configuration1 is set to a
value of 0 on some computers. For the line-of-business app to run successfully, this value needs to be set to 1 .
In this procedure, you'll create a configuration item that monitors for and automatically remediates any incorrect
registry key values that are found.
1. On the General page of the Create Configuration Item Wizard, select the Windows Desktops and
   Ser vers (custom) configuration item type, and then select Next .
2. On the Suppor ted Platforms page of the wizard, select Windows 8.1 (to ensure the configuration item
   applies only to affected computers).
3. On the Settings page, select New to create a new setting.
4. On the General tab of the Create Setting dialog box, configure these settings:
      Name > Example setting
      Setting type > Registr y value
      Data type > Integer (because the value contains a number only)
      Hive > HKEY_LOCAL_MACHINE
      Key > SOFTWARE\Woodgrove\LOB App\Configuration\Configuration1
      Value > 1 (the required value)
5. On the Compliance Rules tab of the Create Setting dialog box, select New . In the Create Rule dialog
   box, configure these settings:
      Name > Example Rule
      Selected setting > Verify that the selected setting is Example setting .
      Rule type > Value
      The setting must comply with the following rule > Verify that the setting name is correct and
      configure the option to specify that the setting value must equal 1 .
      Remediate noncompliant rules when suppor ted > Select this check box to ensure that
      Configuration Manager will reset the registry key value to the correct value if it's incorrect.
6. Complete the wizard to create the configuration item.
You can now use the information in the Common tasks for creating and deploying configuration baselines article to
help you deploy the configuration you've created to devices.
Next steps
Create and deploy configuration baselines
       Common tasks for creating and deploying
       configuration baselines with Configuration Manager
       9/4/2020 • 2 minutes to read • Edit Online
        TIP
        Don't worry if the collection you choose contains computers or devices that don't run Windows 10. As long
        as you configured supported platforms in the configuration item you created, only Windows 10 PCs are
        evaluated for compliance.
      If necessary, configure the schedule by which the configuration baseline is evaluated. Otherwise,
      keep the default of 7 Days .
5. Click OK to close the Deploy Configuration Baselines dialog box and create the deployment.
   If you want to take a quick look at compliance statistics for this deployment, in the Monitoring workspace,
   click Deployments . At the bottom of the screen, you see a Compliance Statistics chart.
Next steps
For more detailed information about how to monitor configuration baselines, see Monitor compliance settings.
        Security and privacy for compliance settings in
        Configuration Manager
        9/4/2020 • 2 minutes to read • Edit Online
  Do not monitor sensitive data.                                  To help avoid information disclosure, do not configure
                                                                  configuration items to monitor potentially sensitive
                                                                  information.
  Do not configure compliance rules that use data that can be     If you create a compliance rule based on data that users can
  modified by end users.                                          modify, such as registry settings for configuration choices, the
                                                                  compliance results will not be reliable.
  Import Microsoft System Center configuration packs and          Published configuration data can be digitally signed so that
  other configuration data from external sources only if they     you can verify the publishing source and ensure that the data
  have a valid digital signature from a trusted publisher.        has not been tampered with. If the digital signature
                                                                  verification check fails, you are warned and prompted to
                                                                  continue with the import. Do not import unsigned data if you
                                                                  cannot verify the source and integrity of the data.
  Implement access controls to protect reference computers.       Ensure that when an administrative user configures a registry
                                                                  or file system setting by browsing to a reference computer, the
                                                                  reference computer had not been compromised.
  Secure the communication channel when you browse to a           To prevent tampering of the data when it is transferred over
  reference computer.                                             the network, use Internet Protocol security (IPsec) or server
                                                                  message block (SMB) between the computer that runs the
                                                                  Configuration Manager console and the reference computer.
  Restrict and monitor the administrative users who are granted   Administrative users who are granted the Compliance
  the Compliance Settings Manager role-based security role.       Settings Manager role can deploy configuration items to all
                                                                  devices and all users in the hierarchy. Configuration items can
                                                                  be very powerful and can include, for example, scripts and
                                                                  registry reconfiguration.
Next steps
Get started with compliance settings
        Create configuration items for Windows 10 devices
        9/4/2020 • 5 minutes to read • Edit Online
 Use the Configuration Manager Windows 10 configuration item to manage settings for Windows 10 computers
 that are managed by the Configuration Manager client.
   IMPORTANT
   In this release, if you created a Password setting as part of a configuration item of the type Windows 10 (for a device
   managed with the Configuration Manager client), be aware of the following problem. If the setting doesn't already exist, or
   hasn't been configured on the Windows 10 device, it will incorrectly evaluate as compliant.
   As a workaround, when you create a setting for these devices, ensure that Remediate noncompliant settings is selected
   on the settings pages of the Create Configuration Item wizard. In addition, when you deploy a configuration baseline
   containing a Windows 10 configuration item containing password settings, select Remediate noncompliant rules when
   suppor ted . You make this selection in the Deploy Configuration Baselines dialog box. By using this workaround, the setting
   is monitored, and remediated if it's found to be noncompliant. After remediation, the setting is correctly reported as
   Compliant (unless a problem is encountered, in which case it will report Error ).
      TIP
      If the setting that you want isn't listed, select the Configure additional settings that are not in the default
      setting groups check box.
 9. On each settings page, configure the settings you require, and whether you want to remediate them when
    they aren't compliant on devices (when this is supported).
10. For each settings group, you can also configure the severity reported when a configuration item is found to
    be noncompliant:
       None : Devices that fail this compliance rule don't report a failure severity for Configuration Manager
        reports.
        Information : Devices that fail this compliance rule report a failure severity of Information for
        Configuration Manager reports.
        Warning : Devices that fail this compliance rule report a failure severity of Warning for
        Configuration Manager reports.
        Critical : Devices that fail this compliance rule report a failure severity of Critical for Configuration
        Manager reports.
        Critical with event : Devices that fail this compliance rule report a failure severity of Critical for
        Configuration Manager reports. This severity level is also logged as a Windows event in the
        application event log.
11. On the Platform Applicability page of the wizard, review any settings that aren't compatible with the
    supported platforms you selected earlier. You can go back and remove these settings, or you can continue.
       TIP
       Unsupported settings are not assessed for compliance.
Minimum password length (characters) The minimum length in characters for the password.
Password expiration in days The number of days before the password must be changed.
   Number of failed logon attempts before a device is             Wipes the device if sign-in fails this number of times.
   wiped
   Idle time before device is locked                              Specifies how many minutes the device must be inactive
                                                                  before it's automatically locked.
   Password complexity                                            Choose whether you can specify a PIN such as '1234', or
                                                                  whether you must supply a strong password.
   Number of complex character sets required in                   If you selected a Strong password, use this setting to
   password                                                       configure the number of complex character sets required. For
                                                                  a strong password, this setting should be set to at least 3 ,
                                                                  which means both letters and numbers are required. Select 4
                                                                  if you want to enforce a password that additionally requires
                                                                  special characters, such as (%$ .
                                                                  (Windows 10 only)
 SET T IN G                                          DETA IL S
Device
 SET T IN G N A M E                                  DETA IL S
Cloud
 SET T IN G N A M E                                  DETA IL S
 Settings synchronization over metered connections   Allows settings to be synchronized when the internet
                                                     connection is metered.
Roaming
 SET T IN G N A M E                                  DETA IL S
Encryption
 SET T IN G N A M E                                  DETA IL S
File encr yption on device Requires that files on the device are encrypted.
System security
 SET T IN G N A M E                                  DETA IL S
 User Account Control                                Configures how Windows User Account Control works on the
                                                     device.
                                                     For example, you can disable it, or set the level at which it
                                                     notifies you.
  Virus protection signatures are up to date                  Requires that the signature files for the antivirus software on
                                                              the device must be up to date.
See also
Configuration items for devices managed with the Configuration Manager client
        Create configuration items for Mac OS X devices
        9/4/2020 • 6 minutes to read • Edit Online
 Use the Configuration Manager Mac OS X (custom) configuration item to manage settings for Mac OS X devices
 that are managed by the Configuration Manager client.
 The Mac OS X operating system uses property list (.plist) files to store application settings. Use compliance settings
 to evaluate and remediate settings in a property list file. You can also manage Mac OS X settings by writing a shell
 script that returns a value that you can evaluate and remediate for compliance.
             IMPORTANT
             The key name is case sensitive, and won't be evaluated if it differs from the key name on the Mac
             computer. Additionally, you can't edit the key name after you have specified it. If you need to edit the
             key name, delete and then re-create the setting.
       Script
          Discover y Script : Select Add Script , and then enter a shell script to assess settings on the
          Mac computer for compliance. Use the echo command in the shell script to return values to
          Configuration Manager for compliance. Configuration Manager uses the results returned in
          STDOUT to evaluate compliance.
             IMPORTANT
             Don't include the reboot command in the discovery script. Because the discovery script runs each
             time the client restarts, this causes the Mac computer to continually restart.
          Remediation script (optional) : Optionally, select Add Script , and then enter a shell script
          that is used to remediate any noncompliant settings found on Mac client computers.
             IMPORTANT
             To ensure that you don't introduce formatting characters that the Mac computer can't interpret, don't
             use copy and paste. Instead, type in the script.
11. Choose the Data type , which is the format in which the condition returns the data before it's used to
    evaluate the setting.
      NOTE
      The Floating point data type supports only 3 digits after the decimal point.
      Configuration Manager doesn't support using the Boolean data type for Mac configuration item script settings.
      Instead, set the data type to Integer , and ensure that the script returns an integer value.
12. Select OK to save the setting and close the Create Setting dialog box. Then continue to add as many
    settings as you require.
13. On the Compliance Rules page of the wizard, specify the conditions that define the compliance of a
    configuration item. Before a setting can be evaluated to compliance, it must have at least one compliance
    rule. Select New to add a new rule.
14. In the Create Rule dialog box, provide the following information:
       Name : Enter a name for the compliance rule.
       Description : Enter a description for the compliance rule.
       Selected setting : Select Browse to open the Select Setting dialog box. Select the setting that you
       want to define a rule for, or select New Setting . When you are finished, choose Select .
         TIP
         You can also select Proper ties to view information about the currently selected setting.
       Rule type : Select the type of compliance rule that you want to use:
          Value : Create a rule that compares the value returned by the configuration item against a
          value that you specify.
          Existential : Create a rule that evaluates the setting depending on whether it exists on a
          device.
For a rule type of Value , specify the following information:
   The setting must comply with the following rule : Select an operator and a value that is
   assessed for compliance with the selected setting. You can use the following operators:
      Equals
      Not equal to
      Greater than
      Less than
      Between
      Greater than or equal to
      Less than or equal to
      One of : In the text box, specify one entry on each line.
      None of : In the text box, specify one entry on each line.
   Remediate noncompliant rules when suppor ted : Select this option if you want
   Configuration Manager to automatically remediate noncompliant rules.
     IMPORTANT
     You can only remediate noncompliant rules when the rule operator is set to Equals .
   Repor t noncompliance if this setting instance is not found : The configuration item
   reports noncompliance if this setting isn't found on the Mac computer.
   Noncompliance severity for repor ts : Specify the severity level reported if this compliance
   rule fails. The available severity levels are:
      None : Computers that fail this compliance rule don't report a failure severity for
      Configuration Manager reports.
      Information : Computers that fail this compliance rule report a failure severity of
      Information for Configuration Manager reports.
      Warning : Computers that fail this compliance rule report a failure severity of Warning
      for Configuration Manager reports.
      Critical : Computers that fail this compliance rule report a failure severity of Critical
      for Configuration Manager reports.
      Critical with event : Computers that fail this compliance rule report a failure severity
      of Critical for Configuration Manager reports. The Mac client computer also logs this
      severity level.
For a rule type of Existential , specify the following information:
   Choose either:
      The setting must exist on client devices
      The setting must not exist on client devices
   Noncompliance severity for repor ts : Specify the severity level that is reported if this
          compliance rule fails. The available severity levels are:
             None : Computers that fail this compliance rule don't report a failure severity for
             Configuration Manager reports.
             Information : Computers that fail this compliance rule report a failure severity of
             Information for Configuration Manager reports.
             Warning : Computers that fail this compliance rule report a failure severity of Warning
             for Configuration Manager reports.
             Critical : Computers that fail this compliance rule report a failure severity of Critical
             for Configuration Manager reports.
             Critical with event : Computers that fail this compliance rule report a failure severity
             of Critical for Configuration Manager reports. The Mac client computer also logs this
             severity level.
         NOTE
         The options shown might vary, depending on the setting type you are configuring a rule for.
 Next steps
 Configuration items for devices managed with the Configuration Manager client
       Create custom configuration items for Windows
       desktop and server computers managed with the
       Configuration Manager client
       9/4/2020 • 15 minutes to read • Edit Online
     TIP
     If you want to supply detection method settings that check for the existence of an application, select This
     configuration file contains application settings .
5. To help you search and filter configuration items in the Configuration Manager console, select Categories
   to create and assign categories.
Detection methods
Use this procedure to provide detection method information for the configuration item.
  NOTE
  This information only applies if you select This configuration item contains application settings on the General page
  of the wizard.
A detection method in Configuration Manager contains rules that are used to detect whether an application is
installed on a computer. This detection occurs before the client assesses its compliance for the configuration item.
To detect whether an application is installed, you can detect the presence of a Windows Installer file for the
application, use a custom script, or select Always assume application is installed to assess the configuration
item for compliance regardless of whether the application is installed.
To detect an application installation by using the Windows Installer file
1. On the Detection Methods page of the Create Configuration Item Wizard , select the option to Use
   Windows Installer detection .
2. Select Open , browse to the Windows Installer (.msi) file that you want to detect, and then select Open .
3. The Version field automatically populates with the version number of the Windows Installer file. If the
   displayed value is incorrect, enter a new version number here.
4. If you want to detect each user profile on the computer, select This application is installed for one or
   more users .
To detect a specific application and deployment type
1. On the Detection Methods page of the Create Configuration Item Wizard , select to Detect a specific
   application and deployment type . Choose Select .
2. In the Specify Application dialog box, select the application and an associated deployment type that you
   want to detect.
To detect an application installation by using a custom script
1. On the Detection Methods page of the Create Configuration Item Wizard , select the option to Use a
   custom script to detect this application .
2. In the list, select the language of the script. Choose from the following formats:
      VBScript
      JScript
      PowerShell
        NOTE
        Starting in version 1810, when a Windows PowerShell script runs as a detection method, the Configuration
        Manager client calls PowerShell with the -NoProfile parameter. This option starts PowerShell without
        profiles. A PowerShell profile is a script that runs when PowerShell starts.
3. Select Open , browse to the script that you want to use, and then select Open .
  NOTE
  When specifying Windows Server 2016, the selection for All Windows Server 2016 and higher 64-bit) also includes
  Windows Server 2019. To specify Windows Server 2016 only, use the option to Specify the version of Windows
  manually .
Configure settings
Use this procedure to configure the settings in the configuration item.
Settings represent the business or technical conditions that are used to assess compliance on client devices. You
can configure a new setting or browse to an existing setting on a reference computer.
1. On the Settings page of the Create Configuration Item Wizard , select New .
2. On the General tab of the Create Setting dialog box, provide the following information:
      Name : Enter a unique name for the setting. You can use a maximum of 256 characters.
      Description : Enter a description for the setting. You can use a maximum of 256 characters.
      Setting type : In the list, choose and configure one of the following setting types to use for this
      setting:
         Active Directory query
         Assembly
         File system
         IIS metabase
         Registry key
         Registry value
         Script
         SQL query
         WQL query
         XPath query
      Data type : Choose the format in which the condition returns the data before it's used to assess the
      setting. The Data type list isn't displayed for all setting types.
        TIP
        The Floating point data type supports only three digits after the decimal point.
3. Configure additional details about this setting under the Setting type list. The items you can configure vary
   depending on the setting type you've selected.
4. Select OK to save the setting and close the Create Setting dialog box.
Active Directory query
  LDAP prefix : Specify a valid prefix to the Active Directory Domain Services query to assess compliance on
  client computers. To do a global catalog search, use either LDAP:// or GC:// .
   Distinguished Name (DN) : Specify the distinguished name of the Active Directory Domain Services
   object that is assessed for compliance on client computers.
   Search filter : Specify an optional LDAP filter to refine the results from the Active Directory Domain
   Services query to assess compliance on client computers. To return all results from the query, enter
    (objectclass=*) .
   Search scope : Specify the search scope in Active Directory Domain Services
      Base : Queries only the specified object
      One Level : This option isn't used in this version of Configuration Manager
      Subtree : Queries the specified object and its complete subtree in the directory
   Proper ty : Specify the property of the Active Directory Domain Services object that's used to assess
   compliance on client computers.
   For example, if you want to query the Active Directory property that stores the number of times a user
   incorrectly enters a password, enter badPwdCount in this field.
   Quer y : Displays the query constructed from the entries in LDAP prefix , Distinguished name (DN) ,
   Search Filter (if specified), and Proper ty .
Assembly
An assembly is a piece of code that can be shared between applications. Assemblies can have the file name
extension .dll or .exe. The global assembly cache is the folder %SystemRoot%\Assembly on client computers. This
cache is where Windows stores all shared assemblies.
   Assembly name: Specifies the name of the assembly object that you want to search for. The name can't be the
   same as other assembly objects of the same type. First register it in the global assembly cache. The assembly
   name can be up to 256 characters long.
File system
    Type : In the list, select whether you want to search for a File or a Folder .
   Path : Specify the path of the specified file or folder on client computers. You can specify system
   environment variables and the %USERPROFILE% environment variable in the path.
     NOTE
     If you use the %USERPROFILE% environment variable in the Path or File or folder name boxes, the Configuration
     Manager client searches all user profiles on the client computer. This behavior could result in it finding multiple
     instances of the file or folder.
     If compliance settings don't have access to the specified path, a discovery error is generated. Additionally, if the file
     you are searching for is currently in use, a discovery error is generated.
     TIP
     Select Browse to configure the setting from values on a reference computer.
   File or folder name : Specify the name of the file or folder object to search for. You can specify system
   environment variables and the %USERPROFILE% environment variable in the file or folder name. You can also
   use the wildcards * and ? in the file name.
     NOTE
     If you specify a file or folder name and use wildcards, this combination might produce a high number of results. It
     could also result in high resource use on the client computer, and high network traffic when reporting results to
     Configuration Manager.
   Include subfolders : Also search any subfolders under the specified path.
   This file or folder is associated with a 64-bit application : If enabled, only search 64-bit file locations
   such as %ProgramFiles% on 64-bit computers. If this option isn't enabled, search both 64-bit locations and
   32-bit locations such as %ProgramFiles(x86)% .
     NOTE
     If the same file or folder exists in both the 64-bit and 32-bit system file locations on the same 64-bit computer,
     multiple files are discovered by the global condition.
   The File system setting type doesn't support specifying a UNC path to a network share in the Path box.
IIS metabase
   Metabase path : Specify a valid path to the Internet Information Services (IIS) metabase. For example,
   /LM/W3SVC/ .
     TIP
     Select Browse to configure the setting from values on a reference computer. To browse to a registry key on a remote
     computer, enable the Remote Registr y service on the remote computer.
   Key : Specify the registry key name that you want to search for. Use the format           key\subkey   .
   This registr y key is associated with a 64-bit application : Search 64-bit registry keys in addition to
   the 32-bit registry keys on clients that are running a 64-bit version of Windows.
     NOTE
     If the same registry key exists in both the 64-bit and 32-bit registry locations on the same 64-bit computer, both
     registry keys are discovered by the global condition.
Registry value
  Hive : Select the registry hive to search.
     TIP
     Select Browse to configure the setting from values on a reference computer. To browse to a registry value on a
     remote computer, enable the Remote Registr y service on the remote computer. You also need administrator
     permissions to access the remote computer.
   Key : Specify the registry key name to search for. Use the format        key\subkey   .
   Value : Specify the value that must be contained within the specified registry key.
   This registr y key is associated with a 64-bit application : Search the 64-bit registry keys in addition
   to the 32-bit registry keys on clients that are running a 64-bit version of Windows.
     NOTE
     If the same registry key exists in both the 64-bit and 32-bit registry locations on the same 64-bit computer, both
     registry keys are discovered by the global condition.
Script
The value returned by the script is used to assess the compliance of the global condition. For example, when using
VBScript, you could use the command WScript.Echo Result to return the Result variable value to the global
condition.
   Discover y script : Select Add Script , and enter or browse to a script. This script is used to find the value.
   You can use Windows PowerShell, VBScript, or Microsoft JScript scripts.
   Remediation script (optional) : Select Add Script , and enter or browse to a script. This script is used to
   remediate non-compliant setting values. You can use Windows PowerShell, VBScript, or Microsoft JScript
   scripts.
   Run scripts by using the logged on user credentials : If you enable this option, the script runs on client
   computers that use the credentials of the signed-in user.
  NOTE
  Starting in version 1810, when you use Windows PowerShell as a discovery or remediation script, the Configuration Manager
  client calls PowerShell with the -NoProfile parameter. This option starts PowerShell without profiles. A PowerShell profile is
  a script that runs when PowerShell starts.
SQL query
  SQL Ser ver instance : Choose whether you want the SQL query to run on the default instance, all
  instances, or a specified database instance name.
     NOTE
     The instance name must refer to a local instance of SQL Server. To refer to a clustered SQL server instance, you
     should use a script setting.
   Database : Specify the name of the Microsoft SQL Server database against which you want to run the SQL
   query.
   Column : Specify the column name returned by the Transact-SQL statement that's used to assess the
   compliance of the global condition.
   Transact-SQL statement : Specify the full SQL query you want to use for the global condition. To use an
   existing SQL query, select Open .
     IMPORTANT
     SQL Query settings don't support any SQL commands that modify the database. You can only use SQL commands
     that read information from the database.
WQL query
 Namespace : Specify the WMI namespace that's assessed for compliance on client computers. The default
 value is root\cimv2 .
   Class : Specify the target WMI class in the above namespace.
   Proper ty : Specify the target WMI property in the above class.
   WQL quer y WHERE clause : Specify a qualifying clause to reduce the results. For example, to only query
   the DHCP service in the Win32_Service class, the WHERE clause could be
    Name = 'DHCP' and StartMode = 'Auto' .
XPath query
  Path : Specify the path of the .xml file on client computers that is used to assess compliance. Configuration
  Manager supports the use of all Windows system environment variables and the %USERPROFILE% user
  variable in the path name.
   XML file name : Specify the file name containing the XML query in the above path.
   Include subfolders : Enable this option to search any subfolders under the specified path.
   This file is associated with a 64-bit application : Search the 64-bit system file location
    %Windir%\System32 in addition to the 32-bit system file location         %Windir%\Syswow64   on Configuration
   Manager clients that are running a 64-bit version of Windows.
   XPath quer y : Specify a valid full XML path language (XPath) query.
   Namespaces : Identify namespaces and prefixes to be used during the XPath query.
If you attempt to discover an encrypted .xml file, compliance settings find the file, but the XPath query produces no
results. The Configuration Manager client doesn't generate an error.
If the XPath query isn't valid, the setting is evaluated as noncompliant on client computers.
        TIP
        To view information about the currently selected setting, select Proper ties .
      Rule type : Select the type of compliance rule that you want to use:
         Value : Create a rule that compares the value returned by the configuration item against a
         value that you specify. For more information on the additional settings, see Value rules.
         Existential : Create a rule that evaluates the setting depending on whether it exists on a client
         device or on the number of times it's found. For more information on the additional settings,
         see Existential rules.
3. Select OK to close the Create Rule dialog box.
Value rules
   Proper ty : The property of the object to check varies depending upon the selected setting. The available
   properties vary based on the type of setting.
   The setting must comply with the following...: The available rules or permissions vary based on the
   type of setting.
   Remediate noncompliant rules when suppor ted : Select this option for Configuration Manager to
   automatically remediate non-compliant rules. Configuration Manager supports this action with the
   following rule types:
      Registr y value : If it's noncompliant, the client sets the registry value. If it doesn't exist, the client
      creates the value.
      Script : The client uses the remediation script that you specified with the setting.
      WQL quer y
     IMPORTANT
     You can only remediate noncompliant rules when the rule operator is set to Equals .
   Repor t noncompliance if this setting instance is not found : If this setting isn't found on client
   computers, enable this option for the configuration item to report noncompliance.
   Noncompliance severity for repor ts : Specify the severity level that's reported in Configuration Manager
   reports if this compliance rule fails. The following severity levels are available:
      None
      Information
      Warning
      Critical
      Critical with event : Computers that fail this compliance rule report a failure severity of Critical . This
      severity level is also logged as a Windows event in the application event log.
Existential rules
  NOTE
  The options shown might vary depending on the setting type you're configuring a rule for.
Next steps
Create configuration baselines
       How to create child configuration items in
       Configuration Manager
       9/4/2020 • 2 minutes to read • Edit Online
  NOTE
  You can only create child configuration items from configuration items of the type Windows Desktops and Ser vers
  (custom) .
  TIP
  There's no way to specify the order that the Configuration Manager client evaluates the configuration items in a baseline. It's
  non-deterministic.
Configuration baselines
Configuration baselines in Configuration Manager can contain specific revisions of configuration items or can be
configured to always use the latest version of a configuration item. For more information about configuration item
revisions, see Management tasks for configuration data.
There are two methods that you can use to create configuration baselines:
   Import configuration data from a file. To start the Impor t Configuration Data Wizard , in the
   Configuration Items or Configuration Baselines node in the Assets and Compliance workspace,
   click Impor t Configuration Data . For more information, see Import configuration data.
   Use the Create Configuration Baseline dialog box to create a new configuration baseline.
 5. Use the Change Purpose list to specify the behavior of a configuration item that you've selected in the
    Configuration data list. You can select from the following items:
       Required : The configuration baseline is evaluated as noncompliant if the configuration item isn't
       detected on a client device. If it's detected, it's evaluated for compliance
       Optional : The configuration item is only evaluated for compliance if the application it references is
       found on client computers. If the application is not found, the configuration baseline isn't marked as
       noncompliant (only applicable to application configuration items).
       Prohibited : The configuration baseline is evaluated as noncompliant if the configuration item is
       detected on client computers (only applicable to application configuration items).
      NOTE
      The Change Purpose list is available only if you clicked the option This configuration item contains
      application settings on the General page of the Create Configuration Item Wizard .
 6. Use the Change Revision list to select a specific or the latest revision of the configuration item to assess
    for compliance on client devices or select Always Use Latest to always use the latest revision. For more
    information about configuration item revisions, see Management tasks for configuration data.
 7. To remove a configuration item from the configuration baseline, select a configuration item, and then click
    Remove .
 8. Starting in version 1806, select if you want to Always apply this baseline for co-managed clients .
    When checked, this baseline will apply even on clients that are managed by Intune. This exception might be
    used to configure settings that are required by your organization but not yet available in Intune.
 9. Optionally, click on Categories to assign categories to the baseline for searching and filtering.
10. Click OK to close the Create Configuration Baseline dialog box and to create the configuration baseline.
   NOTE
   Modifying an existing baseline, such as setting Always apply this baseline for co-managed clients , will increment the
   baseline content version. Clients will need to evaluate the new version to update the baseline reporting.
  IMPORTANT
  When targeting devices that are co-managed, ensure you meet the co-management prerequisites.
In this scenario, when Compliance Policy 1 evaluates for          User1   using   Device1   , both   Configuration Baseline 1
and Configuration Baseline 2 are evaluated too.
    User1 sometimes uses Device2 .
    Device2 is a member of Device Collection 2 and Device Collection 3 .
    Device Collection 3 has Configuration Baseline 3 deployed to it, but Evaluate this baseline as par t of
   compliance policy assessment isn't selected.
When    User1   uses   Device2   , only   Configuration Baseline 2   gets evaluated when       Compliance Policy 1     evaluates.
  NOTE
  If the compliance policy evaluates a new baseline that has never been evaluated on the client before, it may report non-
  compliance. This occurs if the baseline evaluation is still running when the compliance is evaluated. To workaround this issue,
  click Check compliance in the Software Center .
Create and deploy a compliance policy with a rule for baseline compliance policy assessment
1. In the Assets and Compliance workspace, expand Compliance Settings , then select the Compliance
   Polices node.
2. Click Create Compliance Policy in the ribbon to bring up the Create Compliance Policy Wizard .
3. On the General page, select Compliance rules for devices managed with the Configuration
   Manager client .
       Devices must be managed with the Configuration Manager client to include custom configuration
       baselines as part of compliance policy assessment.
 4. Select your platforms on the Suppor ted Platforms pages.
 5. On the Rules page, select New , then select the Include configured baselines in compliance policy
    assessment condition.
Next steps
Import configuration data
      How to deploy configuration baselines in
      Configuration Manager
      9/4/2020 • 2 minutes to read • Edit Online
     IMPORTANT
     If you change a configuration item that has been added to a deployed configuration baseline, the revised
     configuration item is not evaluated for compliance until its next scheduled evaluation time.
8. Click OK to close the Deploy Configuration Baselines dialog box and to create the deployment. For
   more information about how to monitor the deployment, see Monitor compliance settings.
        Manage configuration data in Configuration
        Manager
       9/4/2020 • 3 minutes to read • Edit Online
M A N A GEM EN T TA SK DETA IL S
  Create Child Configuration Item                           Opens the Create Child Configuration Item Wizard
                                                            where you can create a child configuration item from the
                                                            selected configuration item.
  View XML Definition                                       Displays the XML definition file for the selected configuration
                                                            item in a new window. This information can be useful when
                                                            you want to author configuration data manually.
M A N A GEM EN T TA SK DETA IL S
Show Members                                             Displays all of the configuration items that are referenced by
                                                         the configuration baseline.
Schedule Summarization                                   Configures the schedule by which the data shown in the
                                                         Configuration Baselines node in the Configuration
                                                         Manager console is updated with the latest information from
                                                         the site database.
View XML Definition                                      Displays the XML definition file for the selected configuration
                                                         baseline in a new window. This information can be useful when
                                                         you want to author configuration data manually.
  IMPORTANT
  You can only deploy user data and profiles configuration items to user collections.
     NOTE
     This page only appears if you checked Folder redirection on the General page of the wizard.
5. On the Offline Files page of the Create User Data and Profiles Configuration Item Wizard , you can
   enable or disable the use of offline files for users that receive this configuration item and configure settings
   for the behavior of the offline files. You can also specify offline files that will always be available on any
   computer that the user logs on to. For more information about offline files, see your Windows Server
   documentation.
     NOTE
     This page only appears if you checked the box Offline files on the General page of the wizard.
6. On the Roaming Profiles page of the Create User Data and Profiles Configuration Item Wizard ,
   you can configure whether roaming profiles are available on computers that the user logs onto and also
   configure further information about how these profiles behave. For more information about roaming
   profiles, see your Windows Server documentation.
     NOTE
     This page only appears if you checked the box Roaming user profiles on the General page of the wizard.
        IMPORTANT
        You can only deploy user data and profiles configuration items to user collections.
      Remediate noncompliant rules when suppor ted – Enable this option to automatically
      remediate any rules that are evaluated as noncompliant on client computers.
      Allow remediation outside the maintenance window – If a maintenance window has been
      configured for the collection to which you are deploying the configuration item, enable this option to
      let compliance settings remediate the value outside of the maintenance window. For more
      information about maintenance windows, see How to use maintenance windows.
      Generate an aler t – Enable this option to configure an alert that is generated if the configuration
      item compliance is less than a specified percentage by a specified date and time. You can also specify
      whether you want an alert to be sent to System Center Operations Manager.
      Specify the compliance evaluation schedule for this configuration item - Specifies the
      schedule by which the deployed configuration item is evaluated on client computers. This can be
      either a simple or a custom schedule.
4. Click OK to close the Deploy User Data and Profiles Configuration Item dialog box and to create the
   deployment.
Starting in Configuration Manager version 1902, you can create OneDrive for Business Profiles for moving
Windows known folders to OneDrive for Business. These folders include Desktop, Documents, and Pictures. In each
profile, you can specify settings for moving the Windows known folders. For more information on OneDrive for
Business, see Redirect and move Windows known folders to OneDrive.
Prerequisites
   Find your Microsoft 365 tenant ID
   Deploy the OneDrive sync client version 18.111.0603.0004 or later. For more information, see Deploy
   OneDrive apps by using Configuration Manager.
Next steps
Create remote connection profiles
       Remote connection profiles in Configuration
       Manager
       9/4/2020 • 7 minutes to read • Edit Online
  IMPORTANT
  When you specify remote connection profile settings with Configuration Manager, the client stores the settings in Windows
  local policy. These settings might override Remote Desktop settings that you configure with another application. Additionally,
  if you use Windows Group Policy to configure Remote Desktop settings, the settings specified in the Group Policy will
  override Configuration Manager settings.
Configuration Manager creates a security group on clients, Remote PC Connect . When you deploy a remote
connection profile, the client adds the primary users of the computer to this group. A local administrator can
manually add or remove users to this group, but Configuration Manager updates the membership when it next
evaluates compliance of the profile.
  IMPORTANT
  If the user device affinity relationship between a user and a device changes, Configuration Manager disables the remote
  connection profile and Windows Firewall settings to prevent connections to the computer.
Prerequisites
External dependencies
   If you want to enable users to connect from the internet, install and configure a Remote Desktop Gateway
   server. For more information about how to install and configure a Remote Desktop Gateway server, see
   Remote Desktop Services - Access from anywhere.
   If clients run a host-based firewall, it must enable the mstsc.exe program. When you configure a remote
   connection profile, enable the setting to Allow Windows Firewall exception for connections on
   Windows domains and on private networks . This setting allows Configuration Manager to
   automatically configure Windows Firewall.
     TIP
     Group Policy settings to configure Windows Firewall can override the configuration that you set in Configuration
     Manager. If you use Group Policy to configure Windows Firewall, make sure that Group Policy settings don't block
     mstsc.exe.
   If clients run a different host-based firewall, manually configure this firewall dependency.
Configuration Manager dependencies
   In order for a user to connect to a work computer, that computer must be a primary device of the user. For
   more information, see Link users and devices with user device affinity.
   To manage remote connection profiles, your user account needs specific permissions in Configuration
   Manager. The Compliance Settings Manager built-in role includes the permissions required to manage
   these profiles. For more information, see Configure role-based administration.
Create a profile
1. In the Configuration Manager console, go to the Assets and Compliance workspace, expand
   Compliance Settings , and select Remote Connection Profiles .
2. On the Home tab of the ribbon, in the Create group, select Create Remote Connection Profile .
3. On the General page of the Create Remote Connection Profile Wizard , specify a name and optional
   description for the profile. Both values have a maximum limit of 256 characters.
4. On the Profile Settings page, specify the following settings:
      Full name and por t of the Remote Desktop Gateway ser ver (optional) : Specify the name of
      the Remote Desktop Gateway Server to use for connections. This value has the following
      requirements:
         The server name can't be longer than 256 characters.
         It can contain uppercase, lowercase, and numeric characters.
         Aside from periods ( . ) between segments, and a colon ( : ) before the port, the only special
         characters are dash ( – ) and underscore ( _ ).
         Configuration Manager doesn't support the use of an internationalized domain name for this
         value.
      Allow connections only from computers that run Remote Desktop with Network Level
      Authentication : Enabled by default, this setting adds an additional level of security for the
      connection. For more information, see Grant Remote Desktop access.
      Enable the following connection settings:
         Allow remote connections to work computers
         Allow all primar y users of the work computer to remotely connect
         Allow Windows Firewall exception for connections on Windows domains and on
         private networks
        IMPORTANT
        All three settings must be the same before you can continue.
      Only disable these settings when you deploy a profile to turn off remote connections.
5. Complete the wizard.
The new profile is displayed in the Remote Connection Profiles node in the Assets and Compliance
workspace.
Deploy
1. In the Configuration Manager console, go to the Assets and Compliance workspace, expand
   Compliance Settings , and select Remote Connection Profiles .
2. In the Remote Connection Profiles list, select the profile that you want to deploy. In the Home tab of the
   ribbon, in the Deployment group, select Deploy .
3. In the Deploy Remote Connection Profile window, specify the following information:
      Collection : Browse to select the device collection where you want to deploy the profile.
      Remediate noncompliant rules when suppor ted : Enable this setting to automatically remediate
      the profile settings when they're noncompliant on a device. The profile can be non-compliant when it
      doesn't exist.
      Allow remediation outside the maintenance window : If you configure a maintenance window
      for the collection to which you deploy the profile, enable this option to let Configuration Manager
      remediate it outside the maintenance window. For more information, see How to use maintenance
      windows.
      Generate an aler t : Enable this option to configure a compliance alert.
      Specify the compliance evaluation schedule for this configuration baseline : Specify a
      simple or custom schedule by which the client evaluates the profile.
4. Select OK to close the window and create the deployment.
Client evaluation
The client evaluates the profile when a user signs in.
If a device leaves a collection to which you deploy a remote connection profile, Configuration Manager disables
the settings on the device. However, for this process to occur correctly, you must have already deployed at least
one configuration item or configuration baseline that contains a configuration item from your site.
Conflict resolution
Don't deploy more than one remote connection profile with conflicting settings to the same device. For example,
you deploy two profiles with different settings to the same collection. You only configure one profile deployment
to Remediate noncompliant rules when suppor ted . This deployment might override the settings in the other
profile. Configuration Manager doesn't support this type of remote connection profile deployment.
Monitor
In the Configuration Manager console, go to the Monitoring workspace, and select Deployments . In the
Deployments list, select the remote connection profile deployment.
You can review summary information about the compliance of the remote connection profile deployment on the
main page. To view more detailed information, select the profile deployment. Then on the Home tab of the ribbon,
in the Deployment group, select View Status . This action opens the Deployment Status page.
The Deployment Status page contains the following tabs:
   Compliant : Displays the compliance of the remote connection profile based on the number of assets that
   are affected.
     IMPORTANT
     The client doesn't evaluate a remote connection profile if it's not applicable. However, it still reports compliant.
   Error : Displays a list of all errors for the selected remote connection profile deployment based on the
   number of assets that are affected.
   Non-Compliant : Displays a list of all noncompliant rules within the remote connection profile based on
   the number of assets that are affected.
   Unknown : Displays a list of all devices that didn't report compliance for the selected remote connection
   profile deployment, together with the current client status of the devices.
On any tab, open a rule to create a temporary subnode under the Users node in the Assets and Compliance
workspace. This subnode contains all devices with the compliance state of the selected tab.
The Asset Details pane displays the devices with the selected compliance state for this profile. Open a device in
the list to display additional information.
Reports
Configuration Manager includes built-in reports that you can use to monitor information about remote connection
profiles. These reports have the report category of Compliance and Settings Management .
  IMPORTANT
  Use the wildcard character ( % ) when you use the parameters Device filter and User filter in the reports for compliance
  settings.
For more information about how to configure reporting in Configuration Manager, see Introduction to reporting.
       Upgrade Windows devices to a new edition with
       Configuration Manager
       9/4/2020 • 3 minutes to read • Edit Online
           NOTE
           After you create a policy containing a product key, you can't edit the product key later. Configuration
           Manager obscures the key for security reasons. To change the product key, re-enter the entire key.
         License File - Select Browse to choose a valid license file in XML format. Configuration
         Manager uses this license file to upgrade Windows 10 Mobile devices.
5. Complete the wizard.
Next steps
Monitor this deployment from the Deployments node of the Monitoring workspace. If you see errors indicating
an unsuccessful deployment, for example:
   Not applicable for this device
   Data type conversion failed
These errors don't mean that the deployment failed. Verify at the targeted device that the upgrade ran successfully.
Once the client evaluates the targeted policy, it applies the upgrade within two hours. Some versions of Windows
may require a restart at that time. Make sure you inform any users to which you deploy the policy, or schedule the
policy to run outside of the users' working hours.
If the following error appears in DcmWmiProvider.log on the client, check that you're using the proper key for
your activation scenario. For more information, see the Before you start section. If you're using a key management
service (KMS) for activation, make sure to use a KMS client setup key.
Failed to execute CheckApplicabilityMethod with error = 0x80041001 OsEditionUpgradeProvider
See also
   Plan for volume activation
   Windows 10 edition upgrade
   Upgrade Windows 10 editions or switch out of S mode on devices using Microsoft Intune
       Configure Microsoft Edge Legacy settings in
       Configuration Manager
       9/4/2020 • 3 minutes to read • Edit Online
  IMPORTANT
  If you're using Microsoft Edge version 77 or later, and are trying to open the settings pane, enter
   edge://settings/profiles in the browser address bar instead of search. For more information, see Get to know Microsoft
  Edge.
  This article is for IT professionals to manage Microsoft Edge Legacy settings with Microsoft Endpoint Configuration Manager.
Policy settings
This policy currently includes the following settings:
   Set Microsoft Edge browser as default : configures the Windows 10 default app setting for web browser
   to Microsoft Edge
   Allow address bar drop-down : Requires Windows 10, version 1703 or later. For more information, see
   AllowAddressBarDropdown browser policy.
   Allow sync favorites between Microsoft browsers : Requires Windows 10, version 1703 or later. For
   more information, see SyncFavoritesBetweenIEAndMicrosoftEdge browser policy.
   Allow clear browsing data on exit : Requires Windows 10, version 1703 or later. For more information,
   see ClearBrowsingDataOnExit browser policy.
   Allow Do Not Track headers : For more information, see AllowDoNotTrack browser policy.
   Allow autofill : For more information, see AllowAutofill browser policy.
   Allow cookies : For more information, see AllowCookies browser policy.
   Allow pop-up blocker : For more information, see AllowPopups browser policy.
   Allow search suggestions in address bar : For more information, see
   AllowSearchSuggestionsinAddressBar browser policy.
   Allow send intranet traffic to Internet Explorer : For more information, see
   SendIntranetTraffictoInternetExplorer browser policy.
   Allow password manager : For more information, see AllowPasswordManager browser policy.
   Allow Developer Tools : For more information, see AllowDeveloperTools browser policy.
   Allow extensions : For more information, see AllowExtensions browser policy.
  TIP
  For more information on using group policy to configure these and other settings, see Microsoft Edge Legacy group policies.
Next steps
Like any compliance settings policy, the client remediates the settings on the schedule you specify. Monitor and
report on device compliance in the Configuration Manager console.
       Monitor compliance settings in Configuration
       Manager
       9/4/2020 • 5 minutes to read • Edit Online
  NOTE
  The validation criteria fields in compliance settings reports (the equivalent on the client-side report is Constraints ) display
  the underlying Service Modeling Language (SML). This can make it difficult for administrators who have authored the
  configuration item in the Configuration Manager console to understand what the validation criteria is if they do not have
  knowledge of SML. In this case, use the Monitoring workspace in the Configuration Manager console to view the
  properties of the configuration item and its validation criteria.
         IMPORTANT
         A configuration item rule is not evaluated if it is not detected or not applicable on a client device; however,
         the rule is returned as compliant.
      Error : Displays a list of all errors for the selected configuration baseline deployment based on
      number of assets affected. You can click a rule to create a temporary node under the Users or
      Devices node of the Assets and Compliance workspace, which contains all users or devices that
      generated errors with this rule. When you select a user or device, the Asset Details pane displays
      the users or devices that are affected by the selected issue. Double-click a user or device in the list to
      display additional information about the issue.
      Non-Compliant : Displays a list of all noncompliant rules within the configuration baseline based on
      number of assets affected. You can click a rule to create a temporary node under the Users or
      Devices node of the Assets and Compliance workspace, which contains all users or devices that
      are not compliant with this rule. When you select a user or device, the Asset Details pane displays
      the users or devices that are affected by the selected issue. Double-click a user or device in the list to
      display further information about the issue.
      Unknown : Displays a list of all users and devices that did not report compliance for the selected
      configuration baseline deployment together with the current client status of devices.
4. On the Deployment Status page, you can review detailed information about the compliance of the
   deployed configuration baseline. A temporary node is created under the Deployments node that helps
   you find this information again quickly.
  IMPORTANT
  You must use a wildcard (%) character when you use the parameters Device filter and User filter in the compliance settings
  reports.
For more information about how to configure Reporting in Configuration Manager, see Introduction to reporting.
1. Navigate to Configuration Manager in Control Panel of the client computer, and double-click it to open
   its properties.
2. Click the Configurations tab, and view the list of deployed configuration baselines.
3. View the Compliance State for each configuration baseline:
     IMPORTANT
     The evaluation results are cached on the client for 15 minutes. If you initiate a re-evaluation within the 15 minute
     period, the compliance results are returned from this cache rather than a new evaluation. Therefore, if you make a
     change on the client that might affect the compliance evaluation results, wait until the 15 minutes have elapsed
     before initiating a re-evaluation.
      Compliant : The client computer is in compliance with the evaluated configuration baseline.
      Non-Compliant : The client computer is out of compliance with the evaluated configuration
      baseline.
      Unknown : The client computer has not yet evaluated the configuration baseline. If you want to
      initiate evaluation outside the compliance evaluation schedule, select the configuration baselines to
      evaluate, and then click Evaluate .
        NOTE
        If you have local administrator credentials on the client computer, you can view details of each evaluated
        configuration baseline to determine which configuration item is reporting a noncompliant status. To do this,
        select the configuration baseline, and then click View Repor t .
4. Click OK .