Review 3rd Party Compliance API Connectors (PDM/PCM)
Last Updated: May 2025
Implementation Effort: Medium – This setup requires coordination between Microsoft Intune, Microsoft Entra ID, and the third-party compliance partner, including configuration, licensing, and device enrollment.
User Impact: Low – End users are not directly involved; compliance data is collected and processed in the background by the partner and Intune.
Introduction
Intune supports integration with third-party compliance solutions through Partner Device Management (PDM) and Partner Compliance Management (PCM). These integrations are designed for macOS devices that are not enrolled in Intune, but are instead managed by a third-party MDM or security platform. PDM/PCM allows organizations to bring external compliance signals into Intune, enabling Conditional Access enforcement based on third-party device posture.
This section helps administrators evaluate their current use of PDM/PCM integrations and ensure alignment with Zero Trust principles—especially in mixed-management environments.
Why This Matters
- Enables Conditional Access for macOS devices managed outside of Intune.
- Extends device compliance signals beyond native Intune capabilities.
- Supports Zero Trust by incorporating real-time, external trust signals.
- Improves visibility into device health and risk across platforms.
- Ensures future readiness by aligning with Microsoft’s supported integration model.
Key Considerations
Integration Models
Partner Compliance Management (PCM)
- The current and recommended model for integrating third-party compliance solutions with Intune.
- Partners publish compliance data to Intune using Microsoft Graph APIs.
- Devices appear in Intune with compliance state and metadata, which can be used in Conditional Access policies.
- Enables enforcement of access controls based on third-party security posture—even if the device is not enrolled in Intune.
Legacy Compliance API (Deprecated)
- Older integrations used a now-deprecated compliance API model.
- Microsoft is phasing out this model in favor of PCM.
- If you're still using the legacy model, begin planning your migration to avoid disruption.
Applicability to macOS
- This integration is only relevant if you have macOS devices managed by a third-party solution, not Intune.
- Common use cases include:
- Devices managed by another MDM (e.g., Jamf)
- Devices monitored by a third-party security agent (e.g., EDR, antivirus)
- Ensure the third-party solution supports macOS and is integrated using the modern PCM API.
Compliance State Mapping
- Third-party compliance data is mapped into Intune’s compliance engine.
- Devices are marked as compliant or non-compliant based on partner-defined criteria.
- This compliance state can be used in Conditional Access policies to allow or block access to corporate resources.
Visibility and Reporting
- Integrated devices appear in the Intune admin center with compliance status and partner attribution.
- Use reporting to monitor compliance trends and identify gaps in third-party coverage.