Close Menu
Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    Facebook X (Twitter) Instagram
    Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    • Home
    • Intune
    • Windows
      • Modern Workplace
    • macOS
    • Android
    • iOS
    • Automation
      • Logic Apps
      • Intune Monitoring
      • GitHub
    • Security
      • Passwordless
      • Security
    • Speaking
    • About me
    Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    Home»Intune»Intune compliance for Windows 365 Cloud PCs
    Intune

    Intune compliance for Windows 365 Cloud PCs

    Peter KlapwijkBy Peter KlapwijkSeptember 12, 20253 Mins Read

    Today we’re going to have a look at Intune compliance policies for Windows 365 Cloud PCs.

    Windows 365 Cloud PCs are just virtualized workplaces running a version of Windows, therefor we can and need to target Intune compliance policies to these devices. But because these are workplaces running on a virtualization platform, there are some things to keep in mind when implementing compliance policies for Cloud PCs.

    Overall we can target most of the compliance settings that we target to our physical Windows devices to our cloud PCs as well. But there are some exceptions on these, because the setting is not supported, or sometimes behave a little bit “different” on Cloud PCs.

    Unsupported compliance settings

    BitLocker is one of the exceptions we shouldn’t configure in our compliance policy targeted to Cloud PCs.

    As written in the Microsoft documentation, BitLocker is not supported as encryption option for Windows 365 Cloud PCs.

    Although BitLocker isn’t supported, our stored data on Cloud PCs is safe as Windows 365 Cloud PC disks are encrypted with Azure Storage server-side encryption (SSE) and host-based encryption.

    But this is at least one compliance settings on which we shouldn’t check our compliance state.

    As BitLocker isn’t supported, we also shouldn’t configure Encryption of data storage on device.
    BitLocker would mark your device not compliant when you do target it to a Cloud PC, Encryption of data storage on device will show as not applicable.

    Another setting which we can remove from our compliance policy is the one that checks the Trusted Platform Module (TPM). That setting will also show as not applicable if you add it to your compliance policy.

    Settings to implement with caution

    We also have settings from which we can check the compliance state, but with caution. Secure boot and code integrity are two of these settings. Both settings can be added to our compliance policy, and will report compliant, eventually.

    On physical devices you might sometimes see secure boot or code integrity report as not compliant, but most of the time this is solved by performing a reboot of your physical device.
    On Cloud PCs, for some reason, it might just take some time before it reports compliant. Or some people report on community forums it reports as not compliant and after a while it is reporting compliant again.

    Compliance policy

    It’s recommended to create a separate compliance policy specifically for your Windows 365 Cloud PCs, as some settings are not supported in this environment.

    Settings like minimum OS version, Real-time protection, and Defender Antimalware version can be configured without any issues. Depending on your organization’s requirements, you can include all these settings in a single compliance policy.

    However, if Secure Boot or Code Integrity checks behave inconsistently, consider using a grace period for these two settings. In that case, it’s best to split the policy:

    • Create one policy that includes Secure Boot and Code Integrity, and test in your environment to determine an appropriate grace period. In most cases, half a day to one day should be sufficient.
    • Create a second policy without a grace period, and include all other settings. This ensures that most compliance issues are reported immediately when detected.

    Windows 365 Cloud PCs offer a flexible and secure way to deliver virtual desktops, but they do come with some considerations when it comes to compliance. I hope this helps you in setting up your compliance policies for Windows 365.

    Thanks for reading!

    Intune Microsoft Endpoint Manager Windows Windows 11 Windows 365
    Share. Facebook Twitter LinkedIn Email WhatsApp
    Peter Klapwijk
    • Website
    • X (Twitter)
    • LinkedIn

    Peter is a Security (Intune) MVP since 2020 and is working as Modern Workplace Engineer at Wortell in The Netherlands. He has more than 15 years of experience in IT, with a strong focus on Microsoft technologies like Microsoft Intune, Windows, and (low-code) automation.

    Related Posts

    Using Windows Autopilot device preparation with Windows 365 Frontline shared cloud PCs

    April 13, 2025

    Using Visual Studio with Microsoft Endpoint Privilege Management, some notes

    April 8, 2025

    Setup a Windows 10 kiosk device using Intune and AutoPilot

    May 4, 2019
    Add A Comment
    Leave A Reply Cancel Reply

    Peter Klapwijk

    Hi! Welcome to my blog post.
    I hope you enjoy reading my articles.

    Hit the About Me button to get in contact with me or leave a comment.

    Awards
    Sponsor
    Latest Posts

    Intune connector for Active Directory configuration error

    August 29, 2025

    Deploy Microsoft Defender updates in deployment rings

    July 4, 2025

    Create deployment ring groups for Microsoft Intune

    June 27, 2025

    Update Windows Defender during Windows Autopilot enrollments

    May 16, 2025
    follow me
    • Twitter 4.8K
    • LinkedIn 6.1K
    • YouTube
    • Bluesky 1.5K
    Tags
    Administrative Templates Android Automation Autopilot Azure Azure AD Browser Conditional Access Edge EMS Exchange Online Feitian FIDO2 Flow Google Chrome Graph Graph API Identity Management Intune Intune Monitoring iOS KIOSK Logic Apps macOS MEM MEMMonitoring Microsoft 365 Microsoft Defender Microsoft Edge Microsoft Endpoint Manager Modern Workplace Office 365 OneDrive for Business Outlook Passwordless PowerApps Power Automate Security SharePoint Online Windows Windows 10 Windows10 Windows 11 Windows Autopilot Windows Update
    Awards
    Sponsor
    Follow me on Twitter
    Tweets by inthecloud_247
    Tags
    Administrative Templates Android Automation Autopilot Azure Azure AD Browser Conditional Access Edge EMS Exchange Online Feitian FIDO2 Flow Google Chrome Graph Graph API Identity Management Intune Intune Monitoring iOS KIOSK Logic Apps macOS MEM MEMMonitoring Microsoft 365 Microsoft Defender Microsoft Edge Microsoft Endpoint Manager Modern Workplace Office 365 OneDrive for Business Outlook Passwordless PowerApps Power Automate Security SharePoint Online Windows Windows 10 Windows10 Windows 11 Windows Autopilot Windows Update
    Archives
    Peter Klapwijk

    Hi! Welcome to my blog post.
    I hope you enjoy reading my articles.

    Hit the About Me button to get in contact with me or leave a comment.

    Copy right

    This information is provided “AS IS” with no warranties, confers no rights and is not supported by the authors, or In The Cloud 24-7.

     

    Copyright © 2025 by In The Cloud 24-7/ Peter Klapwijk. All rights reserved, No part of the information on this web site may be reproduced or posted in any form or by any means without the prior written permission of the publisher.

    Shorthand; Don’t pass off my work as yours, it’s not nice.

    Recent Comments
    • Peter Klapwijk on Deploy Microsoft Defender updates in deployment rings
    • Magnus on Deploy Microsoft Defender updates in deployment rings
    • Gertjan Jongeneel on Add an Azure AD group to the local administrators group with Microsoft Intune
    • Peter Klapwijk on Add a certificate to the Trusted Publishers with Intune without reporting errors
    • Ram hIRANI on Add a certificate to the Trusted Publishers with Intune without reporting errors
    most popular

    Application installation issues; Download pending

    October 1, 2024

    How to change the Windows 11 language with Intune

    November 11, 2022

    Restrict which users can logon into a Windows 10 device with Microsoft Intune

    April 11, 2020

    Update Microsoft Edge during Windows Autopilot enrollments

    July 9, 2024
    Recent Comments
    • Peter Klapwijk on Deploy Microsoft Defender updates in deployment rings
    • Magnus on Deploy Microsoft Defender updates in deployment rings
    • Gertjan Jongeneel on Add an Azure AD group to the local administrators group with Microsoft Intune
    • Peter Klapwijk on Add a certificate to the Trusted Publishers with Intune without reporting errors
    • Ram hIRANI on Add a certificate to the Trusted Publishers with Intune without reporting errors
    Copy right

    This information is provided “AS IS” with no warranties, confers no rights and is not supported by the authors, or In The Cloud 24-7.

    Copyright © 2023 by In The Cloud 24-7/ Peter Klapwijk. All rights reserved. No part of the information on this web site may be reproduced or posted in any form or by any means without the prior written permission of the publisher.

    Shorthand: Don’t pass off my work as yours, it’s not nice.

    Peter Klapwijk – In The Cloud 24-7
    X (Twitter) LinkedIn YouTube RSS Bluesky
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.

    Manage Cookie Consent
    To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
    View preferences
    {title} {title} {title}