Technical Model

1. Overview

This article provides an overview of the Intune Solution Architecture and Technical Model (including what this consists of). There is a brief description to summarise each item and what it does to help you better understand the model overall.

1.1 Intune Solution Architecture

The diagram below shows how all supported device types link into NHSmail Intune.

1.2 Technical Model

The diagram shows an overview of the Intune Technical Model, including which items LAs can customise and assign devices to:

Note:

A detailed breakdown of available settings, policies and baselines can be found in our Intune Model Spreadsheet via the link below.

NHSmail Intune New Model Settings

Please note the above link is only accessible to those users signed in to NHSmail.

We continually review these settings; any changes will be made if there are sufficient reasons to do so and communicated to Intune Local Administrators.

2. Business Apps

Business Apps are apps that can be downloaded from your device app store:

Android apps can be downloaded via the Intune Managed Google Play Store.
iOS/iPadOS apps can be procured through ABM and deployed to Intune via the Volume Purchase Program (VPP) token.
For Windows devices, the Microsoft 365 apps are built into Intune and can be configured and deployed to devices. You can also upload your own Windows apps (Win32) via the Intune Windows App section.

These applications can be made mandatory or optional for users. For further information on how to deploy apps to devices please see the Operations Guide.

3. Device Compliance Policies and App Protection Policies

Device Compliance and App Protection will require alignment to 1 of  3 different postures.

3.1 Device Compliance

Device compliance policy settings are platform-specific rules which are configured and deployed to groups of users or devices. These rules define requirements for devices, like minimum operating systems or the use of disk encryption. Devices must meet these rules to be considered compliant.

Device Compliance policies are centrally managed; LAs will be able to view and assign these.

3.2 App Protection Policies (APP)

An additional layer of security is provided by application protection policies on Intune. App protection policies (APP) are rules that ensure an organisation’s data remains safe or contained in a managed app. Many productivity apps, such as the Microsoft Office apps, can be managed by Intune MAM.

  • LAs can monitor the status of app protection policies applied to users from the App protection section in Intune.
  • Personal devices cannot be enrolled in Intune. Therefore, to protect corporate data on personal devices we recommend to use App Protection Policies.

App Protection policies are centrally managed; LAs will be able to view and assign these.

Note:

App protection policies can be assigned to an organisation’s AAD users security group only. Device Groups are not supported for these policies. LAs must add the users to the group using the Security Group Management App.

3.3 Postures Available

There are 12 centralised policies available for Device Compliance and 6 centralised policies available for App Protection. These policies each have 3 different postures which come with varying degrees of complexity; alignment to one of these 3 postures is required.

  1. Baseline Posture: provides default security and compliance settings for simple use cases / test devices.
  2. Enhanced Posture: a more restrictive, but still mainstream posture. Aligns closely to the current ‘penciled-in’ configurations.
  3. Restrictive Posture: provides the most secure Intune configuration for high security/sensitivity use cases.

Examples of what the 3 different postures offer can be found in the table below:

Item Baseline Enhanced Restrictive
iOS/iPad OS Android Windows iOS/iPad OS Android Windows iOS/iPad OS Android Windows
Minimum OS Version iOS 15 8 10 (20H2) iOS 16 10 10 (21H1) iOS 16 11 10 (21H2)
Minimum Password Length & Type 4

(Numeric)

None 6

(Numeric)

6

(Numeric, Complex)

Not Set 6

(Alpha-numeric)

6

(Alpha-numeric)

Not Set
Password Expiry No Expiry No Expiry Not Set 90 days 90 days Not Set 60 days 60 days Not Set
Mark Device Non-Compliant After 15 Days After 15 Days After 15 Days Immediate Immediate Immediate Immediate Immediate Immediate
Send Push Notification To User 15 Days 15 Days Not Applicable 3 Days 3 Days Not Applicable Instant Instant Not Applicable

4. Conditional Access (including Device Compliance)

Please see our Conditional Access (including Conditional Access & Device Compliance) Support Site article for more information.

5. Standard Device Configuration Profiles

Configuration profiles are policies or settings that configure devices (they operate in a similar manner to group policies in SCCM).

These profiles allow LAs to add and configure settings, and then push these settings to specific groups of devices.

Standard device configuration profiles are centrally managed; LAs will be able to view and assign these.

6. Custom Device Configuration Profiles

Custom configuration policies can be created and managed by LAs

LAs can use custom configuration profiles to manage what end users can do and see on their devices for example:

  • Allow or disable features
  • Set password rules
  • Allow or restrict specific policies
  • Apply backgrounds
  • Pin apps to the start bar for all devices

Custom Device Configuration Profiles are delegated to LAs who have full control over these.

Note:

Any deviation from the centrally available baseline settings and configuration should be done with consideration and prior testing. Organisations are solely responsible for changes made by their LAs that have been provided with Intune RBAC permissions.

8. Autopilot Profile

Windows Autopilot deployment profiles lets you customize the out-of-box experience for your devices. Some examples include:

  • Select your privacy settings
  • Language
  • Automatically configure your keyboard

Autopilot Profiles are centrally managed; LAs are able to view and assign these.

9. Enrolment Status Page

This shows apps and profile installation status to users during device setup. The enrolment status page appears during initial device setup and during first user sign in.

Enrolment Status Page is centrally manage; LAs are able to view and assign.

10. Exceptions

For all onboarded organisations that require any new custom configuration which sits outside of the predefined settings of the new three postures (as detailed in the Introduction section), Local Administrators are able to raise a Service Request (via Helpdesk Self-Service) for a custom policy or configuration to deployed for your organisation.

Note:

Exceptions will be reviewed on a case-by-case basis and require a strong business case which will need to go through an approval process (e.g. where a custom policy is required that does not align to the managed postures).

For full details on the Exceptions process and review steps, please refer to the Operations Guide.

Last Reviewed Date 29/02/2024
Updated on 29/02/2024

Related Articles

Need Support?
Can’t find the answer you’re looking for? Don’t worry we’re here to help!
Contact Support
back to top