|
|
|---|---|
|
Contents
No table of contents entries found.
Device Configuration (ADMX)
This section contains a list of all device configuration profiles which are backed by ADMX available in Intune.
Microsoft Edge Policy
| Property | Value |
| createdDateTime | 02/26/2024 17:30:37 |
| displayName | Microsoft Edge Policy |
| description | |
| roleScopeTagIds | 0 |
| policyConfigurationIngestionType | builtIn |
| id | 3f39503f-bfc5-4da1-a731-d68e21aa04d6 |
| lastModifiedDateTime | 02/26/2024 17:30:38 |
Assignments
| Name | MemberCount | GroupType | DynamicRule | Intent | Source | AssignType |
| All Users | - | BuilIn | - | - | Include | |
| All Devices | - | BuilIn | - | - | Include |
Settings
| DisplayName | Scope | Path | SupportedOn | State | Value |
| Configure extension installation allow list | machine | \Google\Google Chrome\Extensions | Microsoft Windows 7 or later | Enabled | |
| Configure extension installation allow list | user | \Google\Google Chrome\Extensions | Microsoft Windows 7 or later | Enabled |
Turn off Autoplay
Turns off autoplay for all drives
| Property | Value |
| createdDateTime | 11/04/2022 19:06:01 |
| displayName | Turn off Autoplay |
| description | Turns off autoplay for all drives |
| roleScopeTagIds | 0 |
| policyConfigurationIngestionType | builtIn |
| id | e23a8a72-0f21-460f-820e-e5edf9e5fdb2 |
| lastModifiedDateTime | 11/04/2022 19:06:01 |
Assignments
| Name | MemberCount | GroupType | DynamicRule | Intent | Source | AssignType |
| All Users | - | BuilIn | - | - | Include | |
| All Devices | - | BuilIn | - | - | Include |
Settings
| DisplayName | Scope | Path | SupportedOn | State | Value |
| Turn off Autoplay | machine | \Windows Components\AutoPlay Policies | At least Windows 2000 | Enabled | 255 |
Apple Configuration
This section contains the Apple specific Intune configuration. The following Apple push notification certificate is configured:
| Property | Value |
| @odata.context | https://graph.microsoft.com/v1.0/\(metadata\#deviceManagement/applePushNotificationCertificate/\)entity |
| id | d7e9937d-e23a-40cf-b068-3aaed6a3d40f |
| appleIdentifier | rex.linder@xentermd.com |
| topicIdentifier | com.apple.mgmt.External.e12d1b2e-b9d1-47ab-adf5-571830b4eca6 |
| lastModifiedDateTime | 05/21/2024 21:54:06 |
| expirationDateTime | 05/21/2025 21:43:35 |
| certificateUploadStatus | |
| certificateUploadFailureReason | |
| certificateSerialNumber | 00E1C6C8C4AC5848 |
| certificate |
Compliance Policies
This section contains a list of all compliances policies available in Intune.
Default Windows 10 Compliance Policy
| Property | Value |
| @odata.type | #microsoft.graph.windows10CompliancePolicy |
| roleScopeTagIds | 0 |
| id | 191dfb82-e574-433c-9417-ae34027cd131 |
| createdDateTime | 08/14/2020 22:10:50 |
| description | |
| lastModifiedDateTime | 06/29/2023 22:19:18 |
| displayName | Default Windows 10 Compliance Policy |
| version | 6 |
| passwordRequired | |
| passwordBlockSimple | |
| passwordRequiredToUnlockFromIdle | |
| passwordMinutesOfInactivityBeforeLock | |
| passwordExpirationDays | |
| passwordMinimumLength | |
| passwordMinimumCharacterSetCount | |
| passwordRequiredType | deviceDefault |
| passwordPreviousPasswordBlockCount | |
| requireHealthyDeviceReport | |
| osMinimumVersion | 10.0.19042.1706 |
| osMaximumVersion | |
| mobileOsMinimumVersion | |
| mobileOsMaximumVersion | |
| earlyLaunchAntiMalwareDriverEnabled | |
| bitLockerEnabled | True |
| secureBootEnabled | True |
| codeIntegrityEnabled | True |
| memoryIntegrityEnabled | |
| kernelDmaProtectionEnabled | |
| virtualizationBasedSecurityEnabled | |
| firmwareProtectionEnabled | |
| storageRequireEncryption | True |
| activeFirewallRequired | True |
| defenderEnabled | True |
| defenderVersion | 4.18.1909.6 |
| signatureOutOfDate | True |
| rtpEnabled | True |
| antivirusRequired | True |
| antiSpywareRequired | True |
| deviceThreatProtectionEnabled | True |
| deviceThreatProtectionRequiredSecurityLevel | medium |
| configurationManagerComplianceRequired | |
| tpmRequired | True |
| deviceCompliancePolicyScript | |
| validOperatingSystemBuildRanges |
Assignments
| Name | MemberCount | GroupType | DynamicRule | Intent | Source | AssignType |
| All Users | - | BuilIn | - | - | direct | Include |
Default compliance policy for Android
900f8baa-812e-4886-a598-61f73001bae8
| Property | Value |
| @odata.type | #microsoft.graph.androidCompliancePolicy |
| roleScopeTagIds | 0 |
| id | 6351f163-7d4c-d232-81d6-5c3b8f29fcfe |
| createdDateTime | 04/30/2020 03:52:01 |
| description | 900f8baa-812e-4886-a598-61f73001bae8 |
| lastModifiedDateTime | 06/29/2023 22:52:58 |
| displayName | Default compliance policy for Android |
| version | 3 |
| passwordRequired | |
| passwordMinimumLength | |
| passwordRequiredType | deviceDefault |
| requiredPasswordComplexity | none |
| passwordMinutesOfInactivityBeforeLock | 15 |
| passwordExpirationDays | |
| passwordPreviousPasswordBlockCount | |
| passwordSignInFailureCountBeforeFactoryReset | |
| securityPreventInstallAppsFromUnknownSources | True |
| securityDisableUsbDebugging | True |
| securityRequireVerifyApps | True |
| deviceThreatProtectionEnabled | True |
| deviceThreatProtectionRequiredSecurityLevel | secured |
| advancedThreatProtectionRequiredSecurityLevel | medium |
| securityBlockJailbrokenDevices | True |
| securityBlockDeviceAdministratorManagedDevices | True |
| osMinimumVersion | 12 |
| osMaximumVersion | |
| minAndroidSecurityPatchLevel | |
| storageRequireEncryption | True |
| securityRequireSafetyNetAttestationBasicIntegrity | True |
| securityRequireSafetyNetAttestationCertifiedDevice | True |
| securityRequireGooglePlayServices | True |
| securityRequireUpToDateSecurityProviders | True |
| securityRequireCompanyPortalAppIntegrity | True |
| conditionStatementId | |
| restrictedApps |
Assignments
| Name | MemberCount | GroupType | DynamicRule | Intent | Source | AssignType |
| 0 | Static | - | - | direct | Include |
Device Configuration Policies (Settings Catalog)
This section contains a list of all device configuration policies available in Intune.
Alllow KnowBe4 Second Chance
Exception to allow Outlook to start a child process for KnowBe4 Second Chance .
| createdDateTime | creationSource | description | lastModifiedDateTime | name | platforms | priorityMetaData | roleScopeTagIds | settingCount | technologies | id | templateReference |
| 08/04/2023 20:37:10 | Migration_DI_643b593b-bf98-4d22-adfc-b2374fddb13c | Exception to allow Outlook to start a child process for KnowBe4 Second Chance . | 08/04/2023 20:37:10 | Alllow KnowBe4 Second Chance | windows10 | 0 | 1 | mdm,microsoftSense | 2b4307b1-9283-4e43-85ee-7c2d53441a7f | @{templateId=e8c053d6-9f95-42b1-a7f1-ebfd71c67a4b_1; templateFamily=endpointSecurityAttackSurfaceReduction; templateDisplayName=Attack Surface Reduction Rules; templateDisplayVersion=Version 1} |
Assignments
| Name | MemberCount | GroupType | DynamicRule | Intent | Source | AssignType |
| All Users | - | BuilIn | - | - | direct | Include |
Settings
| DisplayName | ID | Path | Value | ValueName |
| Attack Surface Reduction Only Exclusions | device_vendor_msft_policy_config_defender_attacksurfacereductiononlyexclusions | Defender | C:\Program Files (x86)\KnowBe4\Second Chance\ |
Block process creation PSExec and WMI
Block process creations originating from PSExec and WMI commands
| createdDateTime | creationSource | description | lastModifiedDateTime | name | platforms | priorityMetaData | roleScopeTagIds | settingCount | technologies | id | templateReference |
| 11/04/2022 19:13:51 | Block process creations originating from PSExec and WMI commands | 11/04/2022 19:13:51 | Block process creation PSExec and WMI | windows10 | 0 | 1 | mdm,microsoftSense | f0c85af1-422f-4bee-83cd-460581bb4bc7 | @{templateId=e8c053d6-9f95-42b1-a7f1-ebfd71c67a4b_1; templateFamily=endpointSecurityAttackSurfaceReduction; templateDisplayName=Attack Surface Reduction Rules; templateDisplayVersion=Version 1} |
Assignments
| Name | MemberCount | GroupType | DynamicRule | Intent | Source | AssignType |
| All Users | - | BuilIn | - | - | direct | Include |
Settings
| DisplayName | ID | Path | Value | ValueName |
| Block process creations originating from PSExec and WMI commands | device_vendor_msft_policy_config_defender_attacksurfacereductionrules_blockprocesscreationsfrompsexecandwmicommands | Defender | block | Block |
BlockAdobeCreateChildProcess
| createdDateTime | creationSource | description | lastModifiedDateTime | name | platforms | priorityMetaData | roleScopeTagIds | settingCount | technologies | id | templateReference |
| 05/31/2022 16:42:35 | 12/05/2022 21:05:20 | BlockAdobeCreateChildProcess | windows10 | 0 | 1 | mdm,microsoftSense | ef304928-5e58-4e29-b180-7251d52f76f4 | @{templateId=e8c053d6-9f95-42b1-a7f1-ebfd71c67a4b_1; templateFamily=endpointSecurityAttackSurfaceReduction; templateDisplayName=Attack Surface Reduction Rules; templateDisplayVersion=Version 1} |
Assignments
| Name | MemberCount | GroupType | DynamicRule | Intent | Source | AssignType |
| All Users | - | BuilIn | - | - | direct | Include |
| All Devices | - | BuilIn | - | - | direct | Include |
Settings
| DisplayName | ID | Path | Value | ValueName |
| Block Adobe Reader from creating child processes | device_vendor_msft_policy_config_defender_attacksurfacereductionrules_blockadobereaderfromcreatingchildprocesses | Defender | audit | Audit |
BlockExecutableFromEmail Audit
Block executable content from email client and webmail
| createdDateTime | creationSource | description | lastModifiedDateTime | name | platforms | priorityMetaData | roleScopeTagIds | settingCount | technologies | id | templateReference |
| 11/04/2022 21:43:09 | Block executable content from email client and webmail | 11/04/2022 21:43:09 | BlockExecutableFromEmail Audit | windows10 | 0 | 1 | mdm,microsoftSense | 49bbc575-9998-4471-9fef-b1b1c8aa2ce0 | @{templateId=e8c053d6-9f95-42b1-a7f1-ebfd71c67a4b_1; templateFamily=endpointSecurityAttackSurfaceReduction; templateDisplayName=Attack Surface Reduction Rules; templateDisplayVersion=Version 1} |
Assignments
| Name | MemberCount | GroupType | DynamicRule | Intent | Source | AssignType |
| All Users | - | BuilIn | - | - | direct | Include |
| All Devices | - | BuilIn | - | - | direct | Include |
Settings
| DisplayName | ID | Path | Value | ValueName |
| Block executable content from email client and webmail | device_vendor_msft_policy_config_defender_attacksurfacereductionrules_blockexecutablecontentfromemailclientandwebmail | Defender | audit | Audit |
BlockOfficeCreateProcessRule
Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability:
https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/
| createdDateTime | creationSource | description | lastModifiedDateTime | name | platforms | priorityMetaData | roleScopeTagIds | settingCount | technologies | id | templateReference |
| 05/31/2022 16:36:53 | Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability: https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/ | 05/31/2022 19:03:07 | BlockOfficeCreateProcessRule | windows10 | 0 | 1 | mdm,microsoftSense | 6f656fbb-cc2b-471f-a87d-0758685d6d35 | @{templateId=e8c053d6-9f95-42b1-a7f1-ebfd71c67a4b_1; templateFamily=endpointSecurityAttackSurfaceReduction; templateDisplayName=Attack Surface Reduction Rules; templateDisplayVersion=Version 1} |
Assignments
| Name | MemberCount | GroupType | DynamicRule | Intent | Source | AssignType |
| All Users | - | BuilIn | - | - | direct | Include |
| All Devices | - | BuilIn | - | - | direct | Include |
Settings
| DisplayName | ID | Path | Value | ValueName |
| Block Office communication application from creating child processes | device_vendor_msft_policy_config_defender_attacksurfacereductionrules_blockofficecommunicationappfromcreatingchildprocesses | Defender | audit | Audit |
| Block all Office applications from creating child processes | device_vendor_msft_policy_config_defender_attacksurfacereductionrules_blockallofficeapplicationsfromcreatingchildprocesses | Defender | audit | Audit |
Default EDR policy for all devices
Default EDR policy for targetting all tenants devices, created by MDE.
| createdDateTime | creationSource | description | lastModifiedDateTime | name | platforms | priorityMetaData | roleScopeTagIds | settingCount | technologies | id | templateReference |
| 12/05/2023 19:38:14 | Migration_DI_8af9d54a-d7d2-44b1-8e84-23eafe707b81 | Default EDR policy for targetting all tenants devices, created by MDE. | 12/05/2023 19:38:14 | Default EDR policy for all devices | windows10 | 0 | 2 | mdm,microsoftSense | 93ab48b3-2a7a-4704-8670-67da475b56f0 | @{templateId=0385b795-0f2f-44ac-8602-9f65bf6adede_1; templateFamily=endpointSecurityEndpointDetectionAndResponse; templateDisplayName=Endpoint detection and response; templateDisplayVersion=Version 1} |
Assignments
| Name | MemberCount | GroupType | DynamicRule | Intent | Source | AssignType |
| All Devices | - | BuilIn | - | - | direct | Include |
Settings
| DisplayName | ID | Path | Value | ValueName |
| Microsoft Defender for Endpoint client configuration package type | device_vendor_msft_windowsadvancedthreatprotection_configurationtype | Microsoft Defender for Endpoint | autofromconnector | Auto from connector |
| [Deprecated] Telemetry Reporting Frequency | device_vendor_msft_windowsadvancedthreatprotection_configuration_telemetryreportingfrequency | Microsoft Defender for Endpoint | 2 | Expedite |
EnableControlledFolderAccess
Protects files, folders, and memory areas on devices from unauthorized changes by unfriendly applications such as ransomware.
| createdDateTime | creationSource | description | lastModifiedDateTime | name | platforms | priorityMetaData | roleScopeTagIds | settingCount | technologies | id | templateReference |
| 05/31/2022 16:41:35 | Protects files, folders, and memory areas on devices from unauthorized changes by unfriendly applications such as ransomware. | 05/31/2022 18:39:14 | EnableControlledFolderAccess | windows10 | 0 | 4 | mdm,microsoftSense | be377908-d5e9-4030-a93c-bab12d04a4c4 | @{templateId=e8c053d6-9f95-42b1-a7f1-ebfd71c67a4b_1; templateFamily=endpointSecurityAttackSurfaceReduction; templateDisplayName=Attack Surface Reduction Rules; templateDisplayVersion=Version 1} |
Assignments
| Name | MemberCount | GroupType | DynamicRule | Intent | Source | AssignType |
| All Users | - | BuilIn | - | - | direct | Include |
| All Devices | - | BuilIn | - | - | direct | Include |
Settings
| DisplayName | ID | Path | Value | ValueName |
| Use advanced protection against ransomware | device_vendor_msft_policy_config_defender_attacksurfacereductionrules_useadvancedprotectionagainstransomware | Defender | block | Block |
| Enable Controlled Folder Access | device_vendor_msft_policy_config_defender_enablecontrolledfolderaccess | Defender | 2 | Audit Mode |
| Controlled Folder Access Protected Folders | device_vendor_msft_policy_config_defender_controlledfolderaccessprotectedfolders | Defender | C:\Users | |
| Controlled Folder Access Allowed Applications | device_vendor_msft_policy_config_defender_controlledfolderaccessallowedapplications | Defender | System.Object[] |
Firewall Windows default policy
Default policy sets settings for all endpoints that are not governed by any other policy, ensuring that all your clients are managed as soon as MDE is deployed. The default policy is based on a set of pre-configured recommended settings and can be adjusted by user with admin priviledges.
| createdDateTime | creationSource | description | lastModifiedDateTime | name | platforms | priorityMetaData | roleScopeTagIds | settingCount | technologies | id | templateReference |
| 03/30/2022 23:10:54 | MdeDeviceConfigurationPolicies | Default policy sets settings for all endpoints that are not governed by any other policy, ensuring that all your clients are managed as soon as MDE is deployed. The default policy is based on a set of pre-configured recommended settings and can be adjusted by user with admin priviledges. | 03/30/2022 23:10:54 | Firewall Windows default policy | windows10 | 0 | 3 | mdm,microsoftSense | 1a26b955-e4d1-46ad-90d5-915e768e3dd9 | @{templateId=6078910e-d808-4a9f-a51d-1b8a7bacb7c0_1; templateFamily=endpointSecurityFirewall; templateDisplayName=Windows Firewall; templateDisplayVersion=Version 1} |
Assignments
| Name | MemberCount | GroupType | DynamicRule | Intent | Source | AssignType |
| All Devices | - | BuilIn | - | - | direct | Include |
Settings
| DisplayName | ID | Path | Value | ValueName |
| Enable Domain Network Firewall | vendor_msft_firewall_mdmstore_domainprofile_enablefirewall | Firewall | true | True |
| Enable Private Network Firewall | vendor_msft_firewall_mdmstore_privateprofile_enablefirewall | Firewall | true | True |
| Enable Public Network Firewall | vendor_msft_firewall_mdmstore_publicprofile_enablefirewall | Firewall | true | True |
Force Enable Application Guard
| createdDateTime | creationSource | description | lastModifiedDateTime | name | platforms | priorityMetaData | roleScopeTagIds | settingCount | technologies | id | templateReference |
| 12/07/2023 22:35:46 | Migration_DI_fa9d58e2-d638-4b44-a7be-61c1bd977621 | 06/19/2024 20:28:42 | Force Enable Application Guard | windows10 | 0 | 2 | mdm | fd5a2be0-e814-4758-ac1d-b0afe8ba024a | @{templateId=9f667e40-8f3c-4f88-80d8-457f16906315_1; templateFamily=endpointSecurityAttackSurfaceReduction; templateDisplayName=App and Browser Isolation; templateDisplayVersion=Version 1} |
Settings
| DisplayName | ID | Path | Value | ValueName |
| Turn on Microsoft Defender Application Guard | device_vendor_msft_windowsdefenderapplicationguard_settings_allowwindowsdefenderapplicationguard | Microsoft Defender Application Guard | 0 | Disabled |
| Audit Application Guard | device_vendor_msft_windowsdefenderapplicationguard_audit_auditapplicationguard | Microsoft Defender Application Guard | 0 | Disabled |
Full ASR Rule Audit
Audit Mode for ASR Rules
| createdDateTime | creationSource | description | lastModifiedDateTime | name | platforms | priorityMetaData | roleScopeTagIds | settingCount | technologies | id | templateReference |
| 11/21/2022 20:45:59 | Audit Mode for ASR Rules | 11/21/2022 20:45:59 | Full ASR Rule Audit | windows10 | 0 | 1 | mdm,microsoftSense | 15c9fbb3-cb19-4c27-b3a5-fe5d116b0dbb | @{templateId=e8c053d6-9f95-42b1-a7f1-ebfd71c67a4b_1; templateFamily=endpointSecurityAttackSurfaceReduction; templateDisplayName=Attack Surface Reduction Rules; templateDisplayVersion=Version 1} |
Assignments
| Name | MemberCount | GroupType | DynamicRule | Intent | Source | AssignType |
| All Users | - | BuilIn | - | - | direct | Include |
| All Devices | - | BuilIn | - | - | direct | Include |
Settings
| DisplayName | ID | Path | Value | ValueName |
| Block Adobe Reader from creating child processes | device_vendor_msft_policy_config_defender_attacksurfacereductionrules_blockadobereaderfromcreatingchildprocesses | Defender | audit | Audit |
| Block execution of potentially obfuscated scripts | device_vendor_msft_policy_config_defender_attacksurfacereductionrules_blockexecutionofpotentiallyobfuscatedscripts | Defender | audit | Audit |
| Block Win32 API calls from Office macros | device_vendor_msft_policy_config_defender_attacksurfacereductionrules_blockwin32apicallsfromofficemacros | Defender | audit | Audit |
| Block credential stealing from the Windows local security authority subsystem | device_vendor_msft_policy_config_defender_attacksurfacereductionrules_blockcredentialstealingfromwindowslocalsecurityauthoritysubsystem | Defender | audit | Audit |
| Block executable files from running unless they meet a prevalence, age, or trusted list criterion | device_vendor_msft_policy_config_defender_attacksurfacereductionrules_blockexecutablefilesrunningunlesstheymeetprevalenceagetrustedlistcriterion | Defender | audit | Audit |
| Block JavaScript or VBScript from launching downloaded executable content | device_vendor_msft_policy_config_defender_attacksurfacereductionrules_blockjavascriptorvbscriptfromlaunchingdownloadedexecutablecontent | Defender | audit | Audit |
| Block Office communication application from creating child processes | device_vendor_msft_policy_config_defender_attacksurfacereductionrules_blockofficecommunicationappfromcreatingchildprocesses | Defender | audit | Audit |
| Block all Office applications from creating child processes | device_vendor_msft_policy_config_defender_attacksurfacereductionrules_blockallofficeapplicationsfromcreatingchildprocesses | Defender | audit | Audit |
| Block untrusted and unsigned processes that run from USB | device_vendor_msft_policy_config_defender_attacksurfacereductionrules_blockuntrustedunsignedprocessesthatrunfromusb | Defender | audit | Audit |
| Block process creations originating from PSExec and WMI commands | device_vendor_msft_policy_config_defender_attacksurfacereductionrules_blockprocesscreationsfrompsexecandwmicommands | Defender | audit | Audit |
| Block persistence through WMI event subscription | device_vendor_msft_policy_config_defender_attacksurfacereductionrules_blockpersistencethroughwmieventsubscription | Defender | audit | Audit |
| Block Office applications from creating executable content | device_vendor_msft_policy_config_defender_attacksurfacereductionrules_blockofficeapplicationsfromcreatingexecutablecontent | Defender | audit | Audit |
| Block Office applications from injecting code into other processes | device_vendor_msft_policy_config_defender_attacksurfacereductionrules_blockofficeapplicationsfrominjectingcodeintootherprocesses | Defender | audit | Audit |
| Use advanced protection against ransomware | device_vendor_msft_policy_config_defender_attacksurfacereductionrules_useadvancedprotectionagainstransomware | Defender | audit | Audit |
| Block executable content from email client and webmail | device_vendor_msft_policy_config_defender_attacksurfacereductionrules_blockexecutablecontentfromemailclientandwebmail | Defender | audit | Audit |
| Block abuse of exploited vulnerable signed drivers (Device) | device_vendor_msft_policy_config_defender_attacksurfacereductionrules_blockabuseofexploitedvulnerablesigneddrivers | Defender | audit | Audit |
MS Edge Baseline
| createdDateTime | creationSource | description | lastModifiedDateTime | name | platforms | priorityMetaData | roleScopeTagIds | settingCount | technologies | id | templateReference |
| 06/30/2023 17:26:33 | 04/04/2024 16:55:18 | MS Edge Baseline | windows10 | 0 | 18 | mdm | ff8c048c-6b0a-4624-8bd4-a08b0cf8de68 | @{templateId=c66347b7-8325-4954-a235-3bf2233dfbfd_1; templateFamily=baseline; templateDisplayName=Security Baseline for Microsoft Edge; templateDisplayVersion=Version 112} |
Assignments
| Name | MemberCount | GroupType | DynamicRule | Intent | Source | AssignType |
| Windows | 1 | DynamicDevice | (device.deviceOSType -eq “Windows”) | - | direct | Include |
Settings
| DisplayName | ID | Path | Value | ValueName |
| Control which extensions cannot be installed | device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge~extensions_extensioninstallblocklist | Microsoft Edge\Extensions | 1 | Enabled |
| Allow Basic authentication for HTTP | device_vendor_msft_policy_config_microsoft_edgev88.0.705.23~policy~microsoft_edge~httpauthentication_basicauthoverhttpenabled | Microsoft Edge\HTTP authentication | 0 | Disabled |
| Supported authentication schemes | device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge~httpauthentication_authschemes | Microsoft Edge\HTTP authentication | 1 | Enabled |
| Allow user-level native messaging hosts (installed without admin permissions) | device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge~nativemessaging_nativemessaginguserlevelhosts | Microsoft Edge\Native Messaging | 0 | Disabled |
| Enable saving passwords to the password manager | device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge~passwordmanager_passwordmanagerenabled | Microsoft Edge\Password manager and protection | 0 | Disabled |
| Specifies whether to allow insecure websites to make requests to more-private network endpoints | device_vendor_msft_policy_config_microsoft_edgev92~policy~microsoft_edge~privatenetworkrequestsettings_insecureprivatenetworkrequestsallowed | Microsoft Edge\ Private Network Request Settings | 0 | Disabled |
| Configure Microsoft Defender SmartScreen | device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge~smartscreen_smartscreenenabled | Microsoft Edge\SmartScreen settings | 1 | Enabled |
| Configure Microsoft Defender SmartScreen to block potentially unwanted apps | device_vendor_msft_policy_config_microsoft_edgev80diff~policy~microsoft_edge~smartscreen_smartscreenpuaenabled | Microsoft Edge\SmartScreen settings | 1 | Enabled |
| Prevent bypassing Microsoft Defender SmartScreen prompts for sites | device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge~smartscreen_preventsmartscreenpromptoverride | Microsoft Edge\SmartScreen settings | 1 | Enabled |
| Allow unconfigured sites to be reloaded in Internet Explorer mode | device_vendor_msft_policy_config_microsoft_edgev92~policy~microsoft_edge_internetexplorerintegrationreloadiniemodeallowed | Microsoft Edge | 0 | Disabled |
| Allow users to proceed from the HTTPS warning page | device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge_sslerroroverrideallowed | Microsoft Edge | 0 | Disabled |
| Enable browser legacy extension point blocking | device_vendor_msft_policy_config_microsoft_edgev95~policy~microsoft_edge_browserlegacyextensionpointsblockingenabled | Microsoft Edge | 1 | Enabled |
| Enable site isolation for every site | device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge_siteperprocess | Microsoft Edge | 1 | Enabled |
| Enhance images enabled | device_vendor_msft_policy_config_microsoft_edgev97~policy~microsoft_edge_edgeenhanceimagesenabled | Microsoft Edge | 0 | Disabled |
| Force WebSQL to be enabled | device_vendor_msft_policy_config_microsoft_edgev107~policy~microsoft_edge_websqlaccess | Microsoft Edge | 0 | Disabled |
| Minimum TLS version enabled | device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge_sslversionmin | Microsoft Edge | 1 | Enabled |
| Show the Reload in Internet Explorer mode button in the toolbar | device_vendor_msft_policy_config_microsoft_edgev96~policy~microsoft_edge_internetexplorermodetoolbarbuttonenabled | Microsoft Edge | 0 | Disabled |
| Specifies whether SharedArrayBuffers can be used in a non cross-origin-isolated context | device_vendor_msft_policy_config_microsoft_edgev111~policy~microsoft_edge_sharedarraybufferunrestrictedaccessallowed | Microsoft Edge | 0 | Disabled |
NGP Windows default policy
Default policy sets settings for all endpoints that are not governed by any other policy, ensuring that all your clients are managed as soon as MDE is deployed. The default policy is based on a set of pre-configured recommended settings and can be adjusted by user with admin priviledges.
| createdDateTime | creationSource | description | lastModifiedDateTime | name | platforms | priorityMetaData | roleScopeTagIds | settingCount | technologies | id | templateReference |
| 03/30/2022 23:10:54 | MdeDeviceConfigurationPolicies | Default policy sets settings for all endpoints that are not governed by any other policy, ensuring that all your clients are managed as soon as MDE is deployed. The default policy is based on a set of pre-configured recommended settings and can be adjusted by user with admin priviledges. | 07/07/2023 19:23:08 | NGP Windows default policy | windows10 | 0 | 27 | mdm,microsoftSense | b28bc355-0c75-4460-b7f3-e2c7ae73eb0a | @{templateId=804339ad-1553-4478-a742-138fb5807418_1; templateFamily=endpointSecurityAntivirus; templateDisplayName=Microsoft Defender Antivirus; templateDisplayVersion=Version 1} |
Assignments
| Name | MemberCount | GroupType | DynamicRule | Intent | Source | AssignType |
| All Devices | - | BuilIn | - | - | direct | Include |
Settings
| DisplayName | ID | Path | Value | ValueName |
| Allow Archive Scanning | device_vendor_msft_policy_config_defender_allowarchivescanning | Defender | 1 | Allowed. Scans the archive files. |
| Allow Behavior Monitoring | device_vendor_msft_policy_config_defender_allowbehaviormonitoring | Defender | 1 | Allowed. Turns on real-time behavior monitoring. |
| Allow Cloud Protection | device_vendor_msft_policy_config_defender_allowcloudprotection | Defender | 1 | Allowed. Turns on Cloud Protection. |
| Allow Email Scanning | device_vendor_msft_policy_config_defender_allowemailscanning | Defender | 1 | Allowed. Turns on email scanning. |
| Allow Full Scan On Mapped Network Drives | device_vendor_msft_policy_config_defender_allowfullscanonmappednetworkdrives | Defender | 0 | Not allowed. Disables scanning on mapped network drives. |
| Allow Full Scan Removable Drive Scanning | device_vendor_msft_policy_config_defender_allowfullscanremovabledrivescanning | Defender | 1 | Allowed. Scans removable drives. |
| Allow scanning of all downloaded files and attachments | device_vendor_msft_policy_config_defender_allowioavprotection | Defender | 1 | Allowed. |
| Allow Realtime Monitoring | device_vendor_msft_policy_config_defender_allowrealtimemonitoring | Defender | 1 | Allowed. Turns on and runs the real-time monitoring service. |
| Allow Scanning Network Files | device_vendor_msft_policy_config_defender_allowscanningnetworkfiles | Defender | 0 | Not allowed. Turns off scanning of network files. |
| Allow Script Scanning | device_vendor_msft_policy_config_defender_allowscriptscanning | Defender | 1 | Allowed. |
| Allow User UI Access | device_vendor_msft_policy_config_defender_allowuseruiaccess | Defender | 1 | Allowed. Lets users access UI. |
| Avg CPU Load Factor | device_vendor_msft_policy_config_defender_avgcpuloadfactor | Defender | 50 | |
| Check For Signatures Before Running Scan | device_vendor_msft_policy_config_defender_checkforsignaturesbeforerunningscan | Defender | 1 | Enabled |
| Cloud Block Level | device_vendor_msft_policy_config_defender_cloudblocklevel | Defender | 2 | High |
| Cloud Extended Timeout | device_vendor_msft_policy_config_defender_cloudextendedtimeout | Defender | 50 | |
| Days To Retain Cleaned Malware | device_vendor_msft_policy_config_defender_daystoretaincleanedmalware | Defender | 0 | |
| Disable Catchup Full Scan | device_vendor_msft_policy_config_defender_disablecatchupfullscan | Defender | 0 | Disabled |
| Disable Catchup Quick Scan | device_vendor_msft_policy_config_defender_disablecatchupquickscan | Defender | 0 | Disabled |
| Enable Low CPU Priority | device_vendor_msft_policy_config_defender_enablelowcpupriority | Defender | 0 | Disabled |
| Enable Network Protection | device_vendor_msft_policy_config_defender_enablenetworkprotection | Defender | 1 | Enabled (block mode) |
| PUA Protection | device_vendor_msft_policy_config_defender_puaprotection | Defender | 1 | PUA Protection on. Detected items are blocked. They will show in history along with other threats. |
| Real Time Scan Direction | device_vendor_msft_policy_config_defender_realtimescandirection | Defender | 0 | Monitor all files (bi-directional). |
| Scan Parameter | device_vendor_msft_policy_config_defender_scanparameter | Defender | 1 | Quick scan |
| Schedule Quick Scan Time | device_vendor_msft_policy_config_defender_schedulequickscantime | Defender | 720 | |
| Schedule Scan Day | device_vendor_msft_policy_config_defender_schedulescanday | Defender | 2 | Monday |
| Signature Update Interval | device_vendor_msft_policy_config_defender_signatureupdateinterval | Defender | 4 | |
| Submit Samples Consent | device_vendor_msft_policy_config_defender_submitsamplesconsent | Defender | 1 | Send safe samples automatically. |
Device Configuration
This section contains a list of all device configuration profiles available in Intune.
ADMX Firefox Default Policies
Default Firefox policies to enhance security and usability.
| Property | Value |
| @odata.type | #microsoft.graph.windows10CustomConfiguration |
| id | 2bc3f272-cb4c-486b-b010-6ee05c40bd49 |
| lastModifiedDateTime | 07/06/2022 18:34:07 |
| roleScopeTagIds | 0 |
| supportsScopeTags | True |
| deviceManagementApplicabilityRuleOsEdition | |
| deviceManagementApplicabilityRuleOsVersion | |
| deviceManagementApplicabilityRuleDeviceMode | |
| createdDateTime | 11/08/2021 19:03:51 |
| description | Default Firefox policies to enhance security and usability. |
| displayName | ADMX Firefox Default Policies |
| version | 7 |
| omaSettings |
Assignments
| Name | MemberCount | GroupType | DynamicRule | Intent | Source | AssignType |
| All Users | - | BuilIn | - | apply | direct | Include |
Custom OMA-Uri
| @odata.type | displayName | description | omaUri | secretReferenceValueId | isEncrypted | value |
| #microsoft.graph.omaSettingString | Firefox ADMX | Default Firefox Settings | ./Device/Vendor/MSFT/Policy/ConfigOperations/ADMXInstall/Firefox/Policy/FirefoxAdmx | aeaba85a-84ce-4deb-b0fd-e22de311a7a7_2bc3f272-cb4c-486b-b010-6ee05c40bd49_b1f1e87d-fc54-4ae5-81f9-1bd8b3dec644 | True | **** |
| #microsoft.graph.omaSettingString | Required Extensions | List of extensions to force install | ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/ExtensionSettings | aeaba85a-84ce-4deb-b0fd-e22de311a7a7_2bc3f272-cb4c-486b-b010-6ee05c40bd49_f3ec6f4a-f12d-4f51-9978-6cadec4973c1 | True | **** |
Baseline Android Device Restrictions
| Property | Value |
| @odata.type | #microsoft.graph.androidWorkProfileGeneralDeviceConfiguration |
| id | a8b4eeb8-0204-4964-9a6d-a99e7cb17cf4 |
| lastModifiedDateTime | 06/29/2023 22:56:31 |
| roleScopeTagIds | 0 |
| supportsScopeTags | True |
| deviceManagementApplicabilityRuleOsEdition | |
| deviceManagementApplicabilityRuleOsVersion | |
| deviceManagementApplicabilityRuleDeviceMode | |
| createdDateTime | 11/16/2021 19:13:08 |
| description | |
| displayName | Baseline Android Device Restrictions |
| version | 2 |
| passwordBlockFaceUnlock | |
| passwordBlockFingerprintUnlock | |
| passwordBlockIrisUnlock | |
| passwordBlockTrustAgents | |
| passwordExpirationDays | 365 |
| passwordMinimumLength | 10 |
| passwordMinutesOfInactivityBeforeScreenTimeout | 15 |
| passwordPreviousPasswordBlockCount | 5 |
| passwordSignInFailureCountBeforeFactoryReset | 5 |
| passwordRequiredType | required |
| requiredPasswordComplexity | medium |
| workProfileAllowAppInstallsFromUnknownSources | |
| workProfileDataSharingType | allowPersonalToWork |
| workProfileBlockNotificationsWhileDeviceLocked | |
| workProfileBlockAddingAccounts | |
| workProfileBluetoothEnableContactSharing | |
| workProfileBlockScreenCapture | |
| workProfileBlockCrossProfileCallerId | |
| workProfileBlockCamera | |
| workProfileBlockCrossProfileContactsSearch | |
| workProfileBlockCrossProfileCopyPaste | |
| workProfileDefaultAppPermissionPolicy | prompt |
| workProfilePasswordBlockFaceUnlock | |
| workProfilePasswordBlockFingerprintUnlock | |
| workProfilePasswordBlockIrisUnlock | |
| workProfilePasswordBlockTrustAgents | |
| workProfilePasswordExpirationDays | |
| workProfilePasswordMinimumLength | |
| workProfilePasswordMinNumericCharacters | |
| workProfilePasswordMinNonLetterCharacters | |
| workProfilePasswordMinLetterCharacters | |
| workProfilePasswordMinLowerCaseCharacters | |
| workProfilePasswordMinUpperCaseCharacters | |
| workProfilePasswordMinSymbolCharacters | |
| workProfilePasswordMinutesOfInactivityBeforeScreenTimeout | |
| workProfilePasswordPreviousPasswordBlockCount | |
| workProfilePasswordSignInFailureCountBeforeFactoryReset | |
| workProfilePasswordRequiredType | deviceDefault |
| workProfileRequiredPasswordComplexity | none |
| workProfileRequirePassword | |
| securityRequireVerifyApps | True |
| vpnAlwaysOnPackageIdentifier | |
| vpnEnableAlwaysOnLockdownMode | |
| workProfileAllowWidgets | |
| workProfileBlockPersonalAppInstallsFromUnknownSources | True |
| workProfileAccountUse | allowAllExceptGoogleAccounts |
| allowedGoogleAccountDomains | |
| blockUnifiedPasswordForWorkProfile |
Assignments
| Name | MemberCount | GroupType | DynamicRule | Intent | Source | AssignType |
| 0 | Static | - | apply | direct | Include |
Disable MS WUDO
Disables Microsofts P2P local network update sharing.
| Property | Value |
| @odata.type | #microsoft.graph.windowsDeliveryOptimizationConfiguration |
| id | a4e50ef4-36e6-4d40-b072-adb3ae1d6ee9 |
| lastModifiedDateTime | 07/27/2022 19:48:10 |
| roleScopeTagIds | 0 |
| supportsScopeTags | True |
| deviceManagementApplicabilityRuleOsEdition | |
| deviceManagementApplicabilityRuleOsVersion | |
| deviceManagementApplicabilityRuleDeviceMode | |
| createdDateTime | 07/27/2022 19:48:10 |
| description | Disables Microsofts P2P local network update sharing. |
| displayName | Disable MS WUDO |
| version | 1 |
| deliveryOptimizationMode | simpleDownload |
| restrictPeerSelectionBy | notConfigured |
| groupIdSource | |
| bandwidthMode | |
| backgroundDownloadFromHttpDelayInSeconds | |
| foregroundDownloadFromHttpDelayInSeconds | |
| minimumRamAllowedToPeerInGigabytes | |
| minimumDiskSizeAllowedToPeerInGigabytes | |
| minimumFileSizeToCacheInMegabytes | |
| minimumBatteryPercentageAllowedToUpload | |
| modifyCacheLocation | |
| maximumCacheAgeInDays | |
| maximumCacheSize | |
| vpnPeerCaching | notConfigured |
| cacheServerHostNames | |
| cacheServerForegroundDownloadFallbackToHttpDelayInSeconds | |
| cacheServerBackgroundDownloadFallbackToHttpDelayInSeconds |
Assignments
| Name | MemberCount | GroupType | DynamicRule | Intent | Source | AssignType |
| All Users | - | BuilIn | - | apply | direct | Include |
| All Devices | - | BuilIn | - | apply | direct | Include |
Mac Approve System Extensions
This profile is needed for MacOS 10.15 (Catalina) or newer. It will be ignored on older MacOS.
| Property | Value |
| @odata.type | #microsoft.graph.macOSExtensionsConfiguration |
| id | 175c09f6-f23c-4d11-bda3-4a8714c81c6b |
| lastModifiedDateTime | 04/08/2022 16:18:44 |
| roleScopeTagIds | 0 |
| supportsScopeTags | True |
| deviceManagementApplicabilityRuleOsEdition | |
| deviceManagementApplicabilityRuleOsVersion | |
| deviceManagementApplicabilityRuleDeviceMode | |
| createdDateTime | 04/08/2022 16:14:57 |
| description | This profile is needed for MacOS 10.15 (Catalina) or newer. It will be ignored on older MacOS. |
| displayName | Mac Approve System Extensions |
| version | 2 |
| kernelExtensionOverridesAllowed | |
| kernelExtensionAllowedTeamIdentifiers | |
| systemExtensionsBlockOverride | |
| systemExtensionsAllowedTeamIdentifiers | |
| kernelExtensionsAllowed | |
| systemExtensionsAllowed | |
| systemExtensionsAllowedTypes |
Assignments
| Name | MemberCount | GroupType | DynamicRule | Intent | Source | AssignType |
| Apple Business | 1 | Static | (device.deviceOSType -contains “macOS”) or (device.deviceOSType -contains “OS X”) or (device.deviceModel -contains “MacBook Air”) or (device.deviceModel -contains “MacBook Pro”) | apply | direct | Include |
Mac Defender for Endpoint Full Disk Access
MacOS 10.15 (Catalina) contains new security and privacy enhancements. Beginning with this version, by default, applications are not able to access certain locations on disk (such as Documents, Downloads, Desktop, etc.) without explicit consent. In the absence of this consent, Microsoft Defender for Endpoint is not able to fully protect your device.
This configuration profile grants Full Disk Access to Microsoft Defender for Endpoint.
| Property | Value |
| @odata.type | #microsoft.graph.macOSCustomConfiguration |
| id | 4e6ba603-3ae3-4951-9e9e-80a0196bb6e2 |
| lastModifiedDateTime | 04/08/2022 16:27:10 |
| roleScopeTagIds | 0 |
| supportsScopeTags | True |
| deviceManagementApplicabilityRuleOsEdition | |
| deviceManagementApplicabilityRuleOsVersion | |
| deviceManagementApplicabilityRuleDeviceMode | |
| createdDateTime | 04/08/2022 16:24:29 |
| description | MacOS 10.15 (Catalina) contains new security and privacy enhancements. Beginning with this version, by default, applications are not able to access certain locations on disk (such as Documents, Downloads, Desktop, etc.) without explicit consent. In the absence of this consent, Microsoft Defender for Endpoint is not able to fully protect your device. This configuration profile grants Full Disk Access to Microsoft Defender for Endpoint. |
| displayName | Mac Defender for Endpoint Full Disk Access |
| version | 2 |
| payloadName | Mac MDATP Full Disk Access |
| payloadFileName | fulldisk.mobileconfig |
| payload | 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 |
| deploymentChannel | deviceChannel |
Assignments
| Name | MemberCount | GroupType | DynamicRule | Intent | Source | AssignType |
| Apple Business | 1 | Static | (device.deviceOSType -contains “macOS”) or (device.deviceOSType -contains “OS X”) or (device.deviceModel -contains “MacBook Air”) or (device.deviceModel -contains “MacBook Pro”) | apply | direct | Include |
Mac Defender for Endpoint Network Filter
As part of the Endpoint Detection and Response capabilities, Microsoft Defender for Endpoint on macOS inspects socket traffic and reports this information to the Microsoft 365 Defender portal. The following policy allows the network extension to perform this functionality.
| Property | Value |
| @odata.type | #microsoft.graph.macOSCustomConfiguration |
| id | 5d61dac5-40ce-47d8-80fc-73e8dbaa48ba |
| lastModifiedDateTime | 04/08/2022 16:26:17 |
| roleScopeTagIds | 0 |
| supportsScopeTags | True |
| deviceManagementApplicabilityRuleOsEdition | |
| deviceManagementApplicabilityRuleOsVersion | |
| deviceManagementApplicabilityRuleDeviceMode | |
| createdDateTime | 04/08/2022 16:26:17 |
| description | As part of the Endpoint Detection and Response capabilities, Microsoft Defender for Endpoint on macOS inspects socket traffic and reports this information to the Microsoft 365 Defender portal. The following policy allows the network extension to perform this functionality. |
| displayName | Mac Defender for Endpoint Network Filter |
| version | 1 |
| payloadName | Mac Defender for Endpoint Network Filter |
| payloadFileName | netfilter.mobileconfig |
| payload | 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 |
| deploymentChannel | deviceChannel |
Assignments
| Name | MemberCount | GroupType | DynamicRule | Intent | Source | AssignType |
| Apple Business | 1 | Static | (device.deviceOSType -contains “macOS”) or (device.deviceOSType -contains “OS X”) or (device.deviceModel -contains “MacBook Air”) or (device.deviceModel -contains “MacBook Pro”) | apply | direct | Include |
Mac Defender for Endpoint Notifications
This profile is used to allow Microsoft Defender for Endpoint on macOS and Microsoft Auto Update to display notifications in UI on macOS 10.15 (Catalina) or newer.
| Property | Value |
| @odata.type | #microsoft.graph.macOSCustomConfiguration |
| id | 43e52813-e3b7-478e-a692-a52cddf1b3f1 |
| lastModifiedDateTime | 04/08/2022 16:28:34 |
| roleScopeTagIds | 0 |
| supportsScopeTags | True |
| deviceManagementApplicabilityRuleOsEdition | |
| deviceManagementApplicabilityRuleOsVersion | |
| deviceManagementApplicabilityRuleDeviceMode | |
| createdDateTime | 04/08/2022 16:28:34 |
| description | This profile is used to allow Microsoft Defender for Endpoint on macOS and Microsoft Auto Update to display notifications in UI on macOS 10.15 (Catalina) or newer. |
| displayName | Mac Defender for Endpoint Notifications |
| version | 1 |
| payloadName | Mac Defender for Endpoint Notifications |
| payloadFileName | notif.mobileconfig |
| payload | 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 |
| deploymentChannel | deviceChannel |
Assignments
| Name | MemberCount | GroupType | DynamicRule | Intent | Source | AssignType |
| Apple Business | 1 | Static | (device.deviceOSType -contains “macOS”) or (device.deviceOSType -contains “OS X”) or (device.deviceModel -contains “MacBook Air”) or (device.deviceModel -contains “MacBook Pro”) | apply | direct | Include |
Mac Firewall
Require enable/disable firewall on MacOS devices.
| Property | Value |
| @odata.type | #microsoft.graph.macOSEndpointProtectionConfiguration |
| id | be972483-7f59-4965-bbd7-41aaa9c0b1cc |
| lastModifiedDateTime | 05/26/2022 17:04:45 |
| roleScopeTagIds | 0 |
| supportsScopeTags | True |
| deviceManagementApplicabilityRuleOsEdition | |
| deviceManagementApplicabilityRuleOsVersion | |
| deviceManagementApplicabilityRuleDeviceMode | |
| createdDateTime | 05/26/2022 17:04:45 |
| description | Require enable/disable firewall on MacOS devices. |
| displayName | Mac Firewall |
| version | 1 |
| gatekeeperAllowedAppSource | macAppStoreAndIdentifiedDevelopers |
| gatekeeperBlockOverride | True |
| firewallEnabled | True |
| firewallBlockAllIncoming | |
| firewallEnableStealthMode | True |
| fileVaultEnabled | |
| fileVaultSelectedRecoveryKeyTypes | notConfigured |
| fileVaultInstitutionalRecoveryKeyCertificate | |
| fileVaultInstitutionalRecoveryKeyCertificateFileName | |
| fileVaultPersonalRecoveryKeyHelpMessage | |
| fileVaultAllowDeferralUntilSignOut | |
| fileVaultNumberOfTimesUserCanIgnore | |
| fileVaultDisablePromptAtSignOut | |
| fileVaultPersonalRecoveryKeyRotationInMonths | |
| fileVaultHidePersonalRecoveryKey | |
| advancedThreatProtectionRealTime | notConfigured |
| advancedThreatProtectionCloudDelivered | notConfigured |
| advancedThreatProtectionAutomaticSampleSubmission | notConfigured |
| advancedThreatProtectionDiagnosticDataCollection | notConfigured |
| advancedThreatProtectionExcludedFolders | |
| advancedThreatProtectionExcludedFiles | |
| advancedThreatProtectionExcludedExtensions | |
| advancedThreatProtectionExcludedProcesses | |
| firewallApplications |
Assignments
| Name | MemberCount | GroupType | DynamicRule | Intent | Source | AssignType |
| Apple Business | 1 | Static | (device.deviceOSType -contains “macOS”) or (device.deviceOSType -contains “OS X”) or (device.deviceModel -contains “MacBook Air”) or (device.deviceModel -contains “MacBook Pro”) | apply | direct | Include |
Mac Kernel Extensions
This profile is needed for MacOS 10.15 (Catalina) or older. It will be ignored on newer MacOS.
| Property | Value |
| @odata.type | #microsoft.graph.macOSExtensionsConfiguration |
| id | a4dc11b2-744a-4cff-88a3-1190841b926e |
| lastModifiedDateTime | 04/08/2022 16:16:51 |
| roleScopeTagIds | 0 |
| supportsScopeTags | True |
| deviceManagementApplicabilityRuleOsEdition | |
| deviceManagementApplicabilityRuleOsVersion | |
| deviceManagementApplicabilityRuleDeviceMode | |
| createdDateTime | 04/08/2022 16:16:51 |
| description | This profile is needed for MacOS 10.15 (Catalina) or older. It will be ignored on newer MacOS. |
| displayName | Mac Kernel Extensions |
| version | 1 |
| kernelExtensionOverridesAllowed | |
| kernelExtensionAllowedTeamIdentifiers | UBF8T346G9 |
| systemExtensionsBlockOverride | |
| systemExtensionsAllowedTeamIdentifiers | |
| kernelExtensionsAllowed | |
| systemExtensionsAllowed | |
| systemExtensionsAllowedTypes |
Assignments
| Name | MemberCount | GroupType | DynamicRule | Intent | Source | AssignType |
| Apple Business | 1 | Static | (device.deviceOSType -contains “macOS”) or (device.deviceOSType -contains “OS X”) or (device.deviceModel -contains “MacBook Air”) or (device.deviceModel -contains “MacBook Pro”) | apply | direct | Include |
Mac MDATP onboarding
Required for all Mac versions
| Property | Value |
| @odata.type | #microsoft.graph.macOSCustomConfiguration |
| id | e8e07c2d-2bc0-4353-966b-28a2bf8523ca |
| lastModifiedDateTime | 04/08/2022 16:18:00 |
| roleScopeTagIds | 0 |
| supportsScopeTags | True |
| deviceManagementApplicabilityRuleOsEdition | |
| deviceManagementApplicabilityRuleOsVersion | |
| deviceManagementApplicabilityRuleDeviceMode | |
| createdDateTime | 04/08/2022 16:10:49 |
| description | Required for all Mac versions |
| displayName | Mac MDATP onboarding |
| version | 2 |
| payloadName | MDATP onboarding for MacOS |
| payloadFileName | WindowsDefenderATPOnboarding.xml |
| payload | <?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
<plist version="1">
    <dict>
        <key>PayloadUUID</key>
        <string>A27F524F-7A54-4E9A-B459-B50A321C4295</string>
        <key>PayloadType</key>
        <string>Configuration</string>
        <key>PayloadOrganization</key>
        <string>Microsoft</string>
        <key>PayloadIdentifier</key>
        <string>A27F524F-7A54-4E9A-B459-B50A321C4295</string>
        <key>PayloadDisplayName</key>
        <string>WDATP settings</string>
        <key>PayloadDescription</key>
        <string>WDATP configuration settings.</string>
        <key>PayloadVersion</key>
        <integer>1</integer>
        <key>PayloadEnabled</key>
        <true/>
        <key>PayloadRemovalDisallowed</key>
        <true/>
        <key>PayloadScope</key>
        <string>System</string>
        <key>PayloadContent</key>
        <array>
            <dict>
                <key>PayloadUUID</key>
                <string>D71143E9-8F41-47EE-8CD2-69495E82C6AC</string>
                <key>PayloadType</key>
                <string>com.microsoft.wdav.atp</string>
                <key>PayloadOrganization</key>
                <string>Microsoft</string>
                <key>PayloadIdentifier</key>
                <string>D71143E9-8F41-47EE-8CD2-69495E82C6AC</string>
                <key>PayloadDisplayName</key>
                <string>WDATP configuration settings</string>
                <key>PayloadDescription</key>
                <string/>
                <key>PayloadVersion</key>
                <integer>1</integer>
                <key>PayloadEnabled</key>
                <true/>
                <key>AllowUserOverrides</key>
                <true/>
                <key>OrgId</key>
                <string>2153dff7-5394-4ad6-a293-4486c19b1702</string>
                <key>OnboardingInfo</key>
                <string>{"body":"{\"previousOrgIds\":[],\"orgId\":\"2153dff7-5394-4ad6-a293-4486c19b1702\",\"geoLocationUrl\":\"https://winatp-gw-cus3.microsoft.com/\",\"datacenter\":\"CentralUs3\",\"vortexGeoLocation\":\"US\",\"version\":\"1.35\"}","sig":"gLAyf1Mw62lEpwh6rRdUmWvE7nJPXwRxgCkzgpORqzBOLDp1Usm0CXxp+VX9LSIM0sgvgA+ymLZ87PQgN3domPdQ/+tI70nfsWk5LYZYU/losxkdEhj9jHziz+UpV4YWZTxZkvZ1AQViejUJvUvjRZX1AEb5zqpbriIitJepNaptogoN9DhUEU9cOCpEPm22HTBUxRLAPqAAxS702s4nwkDSELJrRhJJbJR3iHqrMidLbT3cvHwDILGWc0KufYgZC/GF+DbwT/pOahkPe4wNx2I0IlwxUytt1DMQtu/Jr3ZUpS4iuTe6c53tj1lhTf2BLRXVXYLlh3xiO1RuRSJ9tg==","sha256sig":"T5pooe8pLOZB9jpfoW7/77Pg7gEZKKtdh2OUmxG/mmpKjV5SDXo0YKOc3N16IZcUFUftQqQGC7z+38r6TLzmW+VilZZn3/PrJOChlqyup7hxeRniNY5HwN/0jyR0k7b3ENYxbc89h7y+yfoUU1PJ+Mg5VO4YV7DIJvcCTulZzNBPZULwQryn3szVO3qB/v6C7Eo1ykh77xMALskTgb/4SWXPnBqFgg4n8prT8xQz757D7OBlAFn64tDj5TKmg3L5HmnaSqftN+/U/LvKoqjVlTDLKKJjzZtl9se9BEUUoJkbSiWOiJk7fl5UHCZ2q6xYPIzYzhbH6m5t980iu8rCvw==","cert":"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","chain":["MIIG2DCCBMCgAwIBAgIKYT+3GAAAAAAABDANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTExMDE4MjI1NTE5WhcNMjYxMDE4MjMwNTE5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQgU2VjdXJlIFNlcnZlciBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA0AvApKgZgeI25eKq5fOyFVh1vrTlSfHghPm7DWTvhcGBVbjz5/FtQFU9zotq0YST9XV8W6TUdBDKMvMj067uz54EWMLZR8vRfABBSHEbAWcXGK/G/nMDfuTvQ5zvAXEqH4EmQ3eYVFdznVUr8J6OfQYOrBtU8yb3+CMIIoueBh03OP1y0srlY8GaWn2ybbNSqW7prrX8izb5nvr2HFgbl1alEeW3Utu76fBUv7T/LGy4XSbOoArX35Ptf92s8SxzGtkZN1W63SJ4jqHUmwn4ByIxcbCUruCw5yZEV5CBlxXOYexl4kvxhVIWMvi1eKp+zU3sgyGkqJu+mmoE4KMczVYYbP1rL0I+4jfycqvQeHNye97sAFjlITCjCDqZ75/D93oWlmW1w4Gv9DlwSa/2qfZqADj5tAgZ4Bo1pVZ2Il9q8mmuPq1YRk24VPaJQUQecrG8EidT0sH/ss1QmB619Lu2woI52awb8jsnhGqwxiYL1zoQ57PbfNNWrFNMC/o7MTd02Fkr+QB5GQZ7/RwdQtRBDS8FDtVrSSP/z834eoLP2jwt3+jYEgQYuh6Id7iYHxAHu8gFfgsJv2vd405bsPnHhKY7ykyfW2Ip98eiqJWIcCzlwT88UiNPQJrDMYWDL78p8R1QjyGWB87v8oDCRH2bYu8vw3eJq0VNUz4CedMCAwEAAaOCAUswggFHMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBQ2VollSctbmy88rEIWUE2RuTPXkTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQBByGHB9VuePpEx8bDGvwkBtJ22kHTXCdumLg2fyOd2NEavB2CJTIGzPNX0EjV1wnOl9U2EjMukXa+/kvYXCFdClXJlBXZ5re7RurguVKNRB6xo6yEM4yWBws0q8sP/z8K9SRiax/CExfkUvGuV5Zbvs0LSU9VKoBLErhJ2UwlWDp3306ZJiFDyiiyXIKK+TnjvBWW3S6EWiN4xxwhCJHyke56dvGAAXmKX45P8p/5beyXf5FN/S77mPvDbAXlCHG6FbH22RDD7pTeSk7Kl7iCtP1PVyfQoa1fB+B1qt1YqtieBHKYtn+f00DGDl6gqtqy+G0H15IlfVvvaWtNefVWUEH5TV/RKPUAqyL1nn4ThEO792msVgkn8Rh3/RQZ0nEIU7cU507PNC4MnkENRkvJEgq5umhUXshn6x0VsmAF7vzepsIikkrw4OOAd5HyXmBouX+84Zbc1L71/TyH6xIzSbwb5STXq3yAPJarqYKssH0uJ/Lf6XFSQSz6iKE9s5FJlwf2QHIWCiG7pplXdISh5RbAU5QrM5l/Eu9thNGmfrCY498EpQQgVLkyg9/kMPt5fqwgJLYOsrDSDYvTJSUKJJbVuskfFszmgsSAbLLGOBG+lMEkc0EbpQFv0rW6624JKhxJKgAlN2992uQVbG+C7IHBfACXH0w76Fq17Ip5xCA==","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"]}</string>
            </dict>
        </array>
    </dict>
</plist>
 |
| deploymentChannel | deviceChannel |
Assignments
| Name | MemberCount | GroupType | DynamicRule | Intent | Source | AssignType |
| Apple Business | 1 | Static | (device.deviceOSType -contains “macOS”) or (device.deviceOSType -contains “OS X”) or (device.deviceModel -contains “MacBook Air”) or (device.deviceModel -contains “MacBook Pro”) | apply | direct | Include |
XenFi Wifi
WiFi settings for the SLC office.
| Property | Value |
| @odata.type | #microsoft.graph.windowsWifiConfiguration |
| id | ace48d61-3a43-4ce6-99fe-26d402cb79b9 |
| lastModifiedDateTime | 07/21/2022 22:04:56 |
| roleScopeTagIds | 0 |
| supportsScopeTags | True |
| deviceManagementApplicabilityRuleOsEdition | |
| deviceManagementApplicabilityRuleOsVersion | |
| deviceManagementApplicabilityRuleDeviceMode | |
| createdDateTime | 11/05/2021 20:34:22 |
| description | WiFi settings for the SLC office. |
| displayName | XenFi Wifi |
| version | 4 |
| preSharedKey | |
| wifiSecurityType | wpa2Personal |
| meteredConnectionLimit | unrestricted |
| ssid | XenFi |
| networkName | XenFi |
| connectAutomatically | True |
| connectToPreferredNetwork | |
| connectWhenNetworkNameIsHidden | |
| proxySetting | none |
| proxyManualAddress | |
| proxyManualPort | |
| proxyAutomaticConfigurationUrl | |
| forceFIPSCompliance | True |
Assignments
| Name | MemberCount | GroupType | DynamicRule | Intent | Source | AssignType |
| All Users | - | BuilIn | - | apply | direct | Include |
XenFi WiFi
| Property | Value |
| @odata.type | #microsoft.graph.macOSWiFiConfiguration |
| id | c459745f-cbbf-4aac-bd08-b7ae4d6f2b64 |
| lastModifiedDateTime | 07/21/2022 21:28:40 |
| roleScopeTagIds | 0 |
| supportsScopeTags | True |
| deviceManagementApplicabilityRuleOsEdition | |
| deviceManagementApplicabilityRuleOsVersion | |
| deviceManagementApplicabilityRuleDeviceMode | |
| createdDateTime | 03/25/2022 17:18:04 |
| description | |
| displayName | XenFi WiFi |
| version | 5 |
| networkName | 94490a93-da69-43b9-8e82-91cfcf020a4a |
| ssid | XenFi |
| connectAutomatically | True |
| connectWhenNetworkNameIsHidden | |
| wiFiSecurityType | wpaPersonal |
| proxySettings | none |
| proxyManualAddress | |
| proxyManualPort | |
| proxyAutomaticConfigurationUrl | |
| deploymentChannel | |
| preSharedKey |
Assignments
| Name | MemberCount | GroupType | DynamicRule | Intent | Source | AssignType |
| Apple Business | 1 | Static | (device.deviceOSType -contains “macOS”) or (device.deviceOSType -contains “OS X”) or (device.deviceModel -contains “MacBook Air”) or (device.deviceModel -contains “MacBook Pro”) | apply | direct | Include |
Enrollment Configuration
This section contains all Enrollment configurations in Intune.
Enrollment Limit - All users and all devices
This is the default Device Limit Restriction applied with the lowest priority to all users regardless of group membership.
All users and all devices
| Property | Value |
| @odata.type | #microsoft.graph.deviceEnrollmentLimitConfiguration |
| id | aeaba85a-84ce-4deb-b0fd-e22de311a7a7_DefaultLimit |
| displayName | All users and all devices |
| description | This is the default Device Limit Restriction applied with the lowest priority to all users regardless of group membership. |
| priority | |
| createdDateTime | 01/01/0001 00:00:00 |
| lastModifiedDateTime | 06/19/2024 21:08:37 |
| version | |
| roleScopeTagIds | |
| deviceEnrollmentConfigurationType | limit |
| limit | 6 |
Assignments
| Name | MemberCount | GroupType | DynamicRule | Intent | Source | AssignType |
| All Devices | - | BuilIn | - | - | direct | Include |
Platform Restrictions - All users and all devices
This is the default Device Type Restriction applied with the lowest priority to all users regardless of group membership.
All users and all devices
| Property | Value |
| @odata.type | #microsoft.graph.deviceEnrollmentPlatformRestrictionsConfiguration |
| id | aeaba85a-84ce-4deb-b0fd-e22de311a7a7_DefaultPlatformRestrictions |
| displayName | All users and all devices |
| description | This is the default Device Type Restriction applied with the lowest priority to all users regardless of group membership. |
| priority | |
| createdDateTime | 01/01/0001 00:00:00 |
| lastModifiedDateTime | 06/19/2024 21:08:37 |
| version | |
| roleScopeTagIds | |
| deviceEnrollmentConfigurationType | platformRestrictions |
| iosRestriction | @{platformBlocked=False; personalDeviceEnrollmentBlocked=False; osMinimumVersion=; osMaximumVersion=; blockedManufacturers=System.Object[]; blockedSkus=System.Object[]} |
| windowsRestriction | @{platformBlocked=False; personalDeviceEnrollmentBlocked=False; osMinimumVersion=; osMaximumVersion=; blockedManufacturers=System.Object[]; blockedSkus=System.Object[]} |
| windowsHomeSkuRestriction | @{platformBlocked=False; personalDeviceEnrollmentBlocked=False; osMinimumVersion=; osMaximumVersion=; blockedManufacturers=System.Object[]; blockedSkus=System.Object[]} |
| windowsMobileRestriction | @{platformBlocked=True; personalDeviceEnrollmentBlocked=False; osMinimumVersion=; osMaximumVersion=; blockedManufacturers=System.Object[]; blockedSkus=System.Object[]} |
| androidRestriction | @{platformBlocked=False; personalDeviceEnrollmentBlocked=False; osMinimumVersion=; osMaximumVersion=; blockedManufacturers=System.Object[]; blockedSkus=System.Object[]} |
| androidForWorkRestriction | @{platformBlocked=False; personalDeviceEnrollmentBlocked=False; osMinimumVersion=; osMaximumVersion=; blockedManufacturers=System.Object[]; blockedSkus=System.Object[]} |
| macRestriction | @{platformBlocked=False; personalDeviceEnrollmentBlocked=False; osMinimumVersion=; osMaximumVersion=; blockedManufacturers=System.Object[]; blockedSkus=System.Object[]} |
| macOSRestriction | @{platformBlocked=False; personalDeviceEnrollmentBlocked=False; osMinimumVersion=; osMaximumVersion=; blockedManufacturers=System.Object[]; blockedSkus=System.Object[]} |
Assignments
| Name | MemberCount | GroupType | DynamicRule | Intent | Source | AssignType |
| All Devices | - | BuilIn | - | - | direct | Include |
Windows Hello for Business - All users and all devices
This is the default Windows Hello for Business configuration applied with the lowest priority to all users regardless of group membership.
All users and all devices
| Property | Value |
| @odata.type | #microsoft.graph.deviceEnrollmentWindowsHelloForBusinessConfiguration |
| id | aeaba85a-84ce-4deb-b0fd-e22de311a7a7_DefaultWindowsHelloForBusiness |
| displayName | All users and all devices |
| description | This is the default Windows Hello for Business configuration applied with the lowest priority to all users regardless of group membership. |
| priority | |
| createdDateTime | 01/01/0001 00:00:00 |
| lastModifiedDateTime | 06/19/2024 21:08:37 |
| version | |
| roleScopeTagIds | |
| deviceEnrollmentConfigurationType | windowsHelloForBusiness |
| pinMinimumLength | 6 |
| pinMaximumLength | 127 |
| pinUppercaseCharactersUsage | allowed |
| pinLowercaseCharactersUsage | allowed |
| pinSpecialCharactersUsage | allowed |
| state | enabled |
| securityDeviceRequired | |
| unlockWithBiometricsEnabled | True |
| remotePassportEnabled | True |
| pinPreviousBlockCount | 5 |
| pinExpirationInDays | |
| enhancedBiometricsState | enabled |
| securityKeyForSignIn | enabled |
| enhancedSignInSecurity |
Assignments
| Name | MemberCount | GroupType | DynamicRule | Intent | Source | AssignType |
| All Devices | - | BuilIn | - | - | direct | Include |
ESP - All users and all devices
This is the default enrollment status screen configuration applied with the lowest priority to all users and all devices regardless of group membership.
All users and all devices
| Property | Value |
| @odata.type | #microsoft.graph.windows10EnrollmentCompletionPageConfiguration |
| id | aeaba85a-84ce-4deb-b0fd-e22de311a7a7_DefaultWindows10EnrollmentCompletionPageConfiguration |
| displayName | All users and all devices |
| description | This is the default enrollment status screen configuration applied with the lowest priority to all users and all devices regardless of group membership. |
| priority | |
| createdDateTime | 01/01/0001 00:00:00 |
| lastModifiedDateTime | 06/19/2024 21:08:37 |
| version | |
| roleScopeTagIds | |
| deviceEnrollmentConfigurationType | windows10EnrollmentCompletionPageConfiguration |
| showInstallationProgress | |
| blockDeviceSetupRetryByUser | True |
| allowDeviceResetOnInstallFailure | |
| allowLogCollectionOnInstallFailure | |
| customErrorMessage | |
| installProgressTimeoutInMinutes | |
| allowDeviceUseOnInstallFailure | |
| selectedMobileAppIds | |
| allowNonBlockingAppInstallation | |
| installQualityUpdates | |
| trackInstallProgressForAutopilotOnly | |
| disableUserStatusTrackingAfterFirstUser |
Assignments
| Name | MemberCount | GroupType | DynamicRule | Intent | Source | AssignType |
| All Devices | - | BuilIn | - | - | direct | Include |
ESP - Basics
Basics
| Property | Value |
| @odata.type | #microsoft.graph.windows10EnrollmentCompletionPageConfiguration |
| id | 9f9dc144-f24f-451b-a1fd-8893946fa431_Windows10EnrollmentCompletionPageConfiguration |
| displayName | Basics |
| description | |
| priority | 1 |
| createdDateTime | 06/13/2023 21:55:48 |
| lastModifiedDateTime | 06/15/2023 18:36:22 |
| version | 4 |
| roleScopeTagIds | 0 |
| deviceEnrollmentConfigurationType | windows10EnrollmentCompletionPageConfiguration |
| showInstallationProgress | True |
| blockDeviceSetupRetryByUser | |
| allowDeviceResetOnInstallFailure | True |
| allowLogCollectionOnInstallFailure | True |
| customErrorMessage | Setup could not be completed. Please try again or contact your support person for help. |
| installProgressTimeoutInMinutes | 60 |
| allowDeviceUseOnInstallFailure | True |
| selectedMobileAppIds | |
| allowNonBlockingAppInstallation | |
| installQualityUpdates | |
| trackInstallProgressForAutopilotOnly | True |
| disableUserStatusTrackingAfterFirstUser | True |
Assignments
| Name | MemberCount | GroupType | DynamicRule | Intent | Source | AssignType |
| Autopilot | 1 | DynamicDevice | (device.devicePhysicalIDs -any (_ -contains “[ZTDID]”)) | - | direct | Include |
Device Management Partners
This section contains all device management partners defined in Intune.
Jamf
| Property | Value |
| id | 007d2fff-e0dd-4b28-8595-cec005efe5cd |
| lastHeartbeatDateTime | 01/01/0001 00:00:00 |
| partnerState | unknown |
| partnerAppType | singleTenantApp |
| singleTenantAppId | |
| displayName | Jamf |
| isConfigured | |
| whenPartnerDevicesWillBeRemovedDateTime | |
| whenPartnerDevicesWillBeMarkedAsNonCompliantDateTime | |
| groupsRequiringPartnerEnrollment |
PowerShell Scripts
This section contains a list of all PowerShell scripts available in Intune.
Disable Fastboot
Some lab software requires fastboot to be disabled; such as NI MAX.
| Property | Value |
| id | 0f2e88d4-cfce-40f4-9d83-7e68493c3c23 |
| displayName | Disable Fastboot |
| description | Some lab software requires fastboot to be disabled; such as NI MAX. |
| enforceSignatureCheck | |
| runAs32Bit | |
| runAsAccount | system |
| fileName | disable-fastboot.ps1 |
| scriptContent | Path = “HKLM:\SYSTEM\CurrentControlSet\Control\Session Manager\Power” $Name = “HiberbootEnabled” $Type = “DWORD” $Value = 1 Try { $Registry = Get-ItemProperty -Path $Path -Name $Name -ErrorAction Stop |
Assignments
| Name | MemberCount | GroupType | DynamicRule | Intent | Source | AssignType |
| Lab Computers | 1 | DynamicDevice | (device.displayName -startsWith “lab-”) | - | Include |
Patch CVE-2022-30190
https://github.com/XenterMD/CVE-Patching/blob/main/2022/cve-2022-30190.ps1
| Property | Value |
| id | 1570d01f-89a4-41d1-8bf6-d7ca844d1b17 |
| displayName | Patch CVE-2022-30190 |
| description | https://github.com/XenterMD/CVE-Patching/blob/main/2022/cve-2022-30190.ps1 |
| enforceSignatureCheck | |
| runAs32Bit | True |
| runAsAccount | system |
| fileName | cve-2022-30190.ps1 |
| scriptContent | <# Source: https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/ On Monday May 30, 2022, Microsoft issued CVE-2022-30190 regarding the Microsoft Support Diagnostic Tool (MSDT) in Windows vulnerability. A remote code execution vulnerability exists when MSDT is called using the URL protocol from a calling application such as Word. An attacker who successfully exploits this vulnerability can run arbitrary code with the privileges of the calling application. The attacker can then install programs, view, change, or delete data, or create new accounts in the context allowed by the user’s rights. Workaround: To disable the MSDT URL Protocol Disabling MSDT URL protocol prevents troubleshooters being launched as links including links throughout the operating system. Troubleshooters can still be accessed using the Get Help application and in system settings as other or additional troubleshooters. Follow these steps to disable: 1. Run Command Prompt as Administrator. 2. To back up the registry key, execute the command “reg export HKEY_CLASSES_ROOT\ms-msdt filename“ 3. Execute the command “reg delete HKEY_CLASSES_ROOT\ms-msdt /f”. How to undo the workaround 1. Run Command Prompt as Administrator. 2. To back up the registry key, execute the command “reg import filename” Microsoft Defender Detections & Protections Customers with Microsoft Defender Antivirus should turn-on cloud-delivered protection and automatic sample submission. These capabilities use artificial intelligence and machine learning to quickly identify and stop new and unknown threats. Customers of Microsoft Defender for Endpoint can enable attack surface reduction rule “BlockOfficeCreateProcessRule” that blocks Office apps from creating child processes. Creating malicious child processes is a common malware strategy. For more information see Attack surface reduction rules overview. Microsoft Defender Antivirus provides detections and protections for possible vulnerability exploitation under the following signatures using detection build 1.367.719.0 or newer: - Trojan:Win32/Mesdetty.A (blocks msdt command line) - Trojan:Win32/Mesdetty.B (blocks msdt command line) - Behavior:Win32/MesdettyLaunch.A!blk (terminates the process that launched msdt command line) Microsoft Defender for Endpoint provides customers detections and alerts. The following alert title in the Microsoft 365 Defender portal can indicate threat activity on your network: - Suspicious behavior by an Office application - Suspicious behavior by Msdt.exe #> # Define registry key $regkey = “HKEY_CLASSES_ROOT\ms-msdt” # Define backup location \(bak = "C:\\registry\_ms-msdt.reg.bak" \# If regkey exists if (Test-Path -Path registry::\)regkey) { Write-Host -ForegroundColor Red “Vulnerability detected: CVE-2022-30190. Beginning remediation…” # Backup registry key reg export $regkey $bak /y |
Assignments
| Name | MemberCount | GroupType | DynamicRule | Intent | Source | AssignType |
| Windows | 1 | DynamicDevice | (device.deviceOSType -eq “Windows”) | - | Include |
Enable Application Guard
Force enable Application Guard feature on client machines.
| Property | Value |
| id | 9010fde7-0bfb-466d-91bf-df158f7f4fcb |
| displayName | Enable Application Guard |
| description | Force enable Application Guard feature on client machines. |
| enforceSignatureCheck | |
| runAs32Bit | True |
| runAsAccount | system |
| fileName | Enable-ApplicationGuard.ps1 |
| scriptContent | if((Get-WindowsOptionalFeature -FeatureName Windows-Defender-ApplicationGuard -Online).State -eq “Disabled”) { Enable-WindowsOptionalFeature -online -FeatureName Windows-Defender-ApplicationGuard } |
Assignments
| Name | MemberCount | GroupType | DynamicRule | Intent | Source | AssignType |
| All Users | - | BuilIn | - | - | Include | |
| All Devices | - | BuilIn | - | - | Include |
Enable WSL
| Property | Value |
| id | 7e9a029a-7b70-4473-b044-747dc02425dc |
| displayName | Enable WSL |
| description | |
| enforceSignatureCheck | |
| runAs32Bit | |
| runAsAccount | system |
| fileName | Enable-Wsl.ps1 |
| scriptContent | nable-WindowsOptionalFeature -Online -FeatureName “Microsoft-Windows-Subsystem-Linux” -All -NoRestart |
Assignments
| Name | MemberCount | GroupType | DynamicRule | Intent | Source | AssignType |
| All Users | 1 | DynamicDevice | All Users | - | Include |
Disable WSL
| Property | Value |
| id | a5da6193-1070-4fa9-a6f9-ce43b7c4e53e |
| displayName | Disable WSL |
| description | |
| enforceSignatureCheck | |
| runAs32Bit | |
| runAsAccount | system |
| fileName | Disable-Wsl.ps1 |
| scriptContent | isable-WindowsOptionalFeature -Online -FeatureName “Microsoft-Windows-Subsystem-Linux” -NoRestart |
lab-pc-configuration
This script is used to configure a lab PC for use. The following steps are taken:
1. Install Pip Packages
2. Add nipkg, python, libusb to system PATH
3. Set computers to never sleep
4. Install NI Packages
| Property | Value |
| id | c4f64c6f-7105-4f2e-b913-fbfb5591b053 |
| displayName | lab-pc-configuration |
| description | This script is used to configure a lab PC for use. The following steps are taken: 1. Install Pip Packages 2. Add nipkg, python, libusb to system PATH 3. Set computers to never sleep 4. Install NI Packages |
| enforceSignatureCheck | |
| runAs32Bit | |
| runAsAccount | system |
| fileName | lab-pc-configuration.ps1 |
| scriptContent | # This script is used to configure a lab PC for use. The following steps are taken: 1. Install Pip Packages 2. Add nipkg, python, libusb to system PATH 3. Install NI Packages 4. Set computers to never sleep #> $pythonPath=‘C:\Users\LabUser\AppData\Local\Microsoft\WindowsApps\PythonSoftwareFoundation.Python.3.8_qbz5n2kfra8p0’ $libusbPath=‘C:\Users\LabUser\AppData\Local\Packages\PythonSoftwareFoundation.Python.3.8_qbz5n2kfra8p0\LocalCache\local-packages\Python38\site-packages\libusb\_platform\_windows\x64’ $nipkgPath=‘C:\Program Files\National Instruments\NI Package Manager’ $PathArray = \(Env:PSModulePath.Split(";") \#\)envPath=[Environment]::GetEnvironmentVariable(“Path”) # Install pip packages using pip from \(pythonPath & "\)pythonPath\pip.exe” install pyvisa libusb pyusb zeroconf numpy matplotlib # Add programs to path if($PathArray -notcontains \(pythonPath) { \[Environment\]::SetEnvironmentVariable( "Path", \[Environment\]::GetEnvironmentVariable("Path", \[EnvironmentVariableTarget\]::Machine) + ";\)pythonPath”, [EnvironmentVariableTarget]::Machine) write-host “Added Python to System Path” } if($PathArray -notcontains \(libusbPath) { \[Environment\]::SetEnvironmentVariable( "Path", \[Environment\]::GetEnvironmentVariable("Path", \[EnvironmentVariableTarget\]::Machine) + ";\)libusbPath”, [EnvironmentVariableTarget]::Machine) write-host “Added LibUSB to System Path” } if($PathArray -notcontains \(nipkgPath) { \[Environment\]::SetEnvironmentVariable( "Path", \[Environment\]::GetEnvironmentVariable("Path", \[EnvironmentVariableTarget\]::Machine) + ";\)nipkgPath”, [EnvironmentVariableTarget]::Machine) write-host “Added nipkg to System Path” } # Reload PATH $env:Path = [System.Environment]::GetEnvironmentVariable(“Path”,“Machine”) + “;” + [System.Environment]::GetEnvironmentVariable(“Path”,“User”) # Configure computer to never sleep (set to 0 to never sleep) powercfg -change -standby-timeout-ac 0 # Install NI Packages nipkg.exe install –accept-eulas ni-system-configuration ni-visa ni-hwcfg-utility ni-max ni-syscfg-dotnet-runtime ni-syscfg-cvi-support ni-usblandevice ni-web-based-configuration |
Assignments
| Name | MemberCount | GroupType | DynamicRule | Intent | Source | AssignType |
| Lab Computers | 1 | DynamicDevice | (device.displayName -startsWith “lab-”) | - | Include |
Windows Update Configuration
This section contains a list of all Windows Update configuration profiles available in Intune.
Update policy for Windows 10 devices
| Property | Value |
| @odata.type | #microsoft.graph.windowsUpdateForBusinessConfiguration |
| id | b1845d94-b421-44be-855b-35449c956e7c |
| lastModifiedDateTime | 11/01/2021 21:44:07 |
| roleScopeTagIds | 0 |
| supportsScopeTags | True |
| deviceManagementApplicabilityRuleOsEdition | |
| deviceManagementApplicabilityRuleOsVersion | |
| deviceManagementApplicabilityRuleDeviceMode | |
| createdDateTime | 09/09/2021 16:45:43 |
| description | |
| displayName | Update policy for Windows 10 devices |
| version | 2 |
| deliveryOptimizationMode | httpWithPeeringNat |
| prereleaseFeatures | userDefined |
| automaticUpdateMode | autoInstallAtMaintenanceTime |
| microsoftUpdateServiceAllowed | True |
| driversExcluded | |
| qualityUpdatesDeferralPeriodInDays | |
| featureUpdatesDeferralPeriodInDays | |
| qualityUpdatesPaused | |
| featureUpdatesPaused | |
| qualityUpdatesPauseExpiryDateTime | 01/01/0001 00:00:00 |
| featureUpdatesPauseExpiryDateTime | 01/01/0001 00:00:00 |
| businessReadyUpdatesOnly | all |
| skipChecksBeforeRestart | |
| updateWeeks | |
| qualityUpdatesPauseStartDate | |
| featureUpdatesPauseStartDate | |
| featureUpdatesRollbackWindowInDays | |
| qualityUpdatesWillBeRolledBack | |
| featureUpdatesWillBeRolledBack | |
| qualityUpdatesRollbackStartDateTime | 01/01/0001 00:00:00 |
| featureUpdatesRollbackStartDateTime | 01/01/0001 00:00:00 |
| engagedRestartDeadlineInDays | |
| engagedRestartSnoozeScheduleInDays | |
| engagedRestartTransitionScheduleInDays | |
| deadlineForFeatureUpdatesInDays | |
| deadlineForQualityUpdatesInDays | |
| deadlineGracePeriodInDays | |
| postponeRebootUntilAfterDeadline | |
| autoRestartNotificationDismissal | notConfigured |
| scheduleRestartWarningInHours | |
| scheduleImminentRestartWarningInMinutes | |
| userPauseAccess | notConfigured |
| userWindowsUpdateScanAccess | notConfigured |
| updateNotificationLevel | notConfigured |
| allowWindows11Upgrade | |
| installationSchedule | @{@odata.type=#microsoft.graph.windowsUpdateActiveHoursInstall; activeHoursStart=06:00:00.0000000; activeHoursEnd=22:00:00.0000000} |
Assignments
| Name | MemberCount | GroupType | DynamicRule | Intent | Source | AssignType |
| All Users | 1 | DynamicDevice | All Users | apply | direct | Include |
Mobile Apps
This section contains a list of all applications available in Intune.
| Publisher | DisplayName | Type | Assignments |
| 15Five | 15Five | androidManagedStoreApp | allLicensedUsersAssignmentTarget - Intent:available |
| 8bit Solutions LLC | Bitwarden | winGetApp | allLicensedUsersAssignmentTarget - Intent:uninstall allDevicesAssignmentTarget - Intent:uninstall |
| 8bit Solutions LLC | Bitwarden Password Manager | iosStoreApp | Apple Business - Intent:availableWithoutEnrollment |
| Adobe | Adobe Acrobat Reader DC | win32LobApp | allLicensedUsersAssignmentTarget - Intent:required allDevicesAssignmentTarget - Intent:available |
| Adobe | Adobe Acrobat Reader: Edit PDF | androidManagedStoreApp | allLicensedUsersAssignmentTarget - Intent:available |
| Adobe | Adobe Acrobat Sign | androidManagedStoreApp | allLicensedUsersAssignmentTarget - Intent:available |
| Amazon Mobile LLC | Amazon Shopping | androidManagedStoreApp | allLicensedUsersAssignmentTarget - Intent:available |
| Apple | Apple Configurator | iosStoreApp | Information Technology - Intent:available - Intent:available |
| AQA Company | ISOXpress | winMobileMSI | allDevicesAssignmentTarget - Intent:required |
| Ashish Kulkarni | wkhtmltopdf | win32LobApp | Lab Computers - Intent:required |
| Atlassian | Jira Cloud by Atlassian | androidManagedStoreApp | allLicensedUsersAssignmentTarget - Intent:available |
| Authy | Twilio Authy Authenticator | androidManagedStoreApp | allLicensedUsersAssignmentTarget - Intent:available |
| AWS Mobile LLC | AWS Console | androidManagedStoreApp | allLicensedUsersAssignmentTarget - Intent:available |
| Bill.com Inc. | BILL Spend & Expense (Divvy) | androidManagedStoreApp | allLicensedUsersAssignmentTarget - Intent:available |
| Bitwarden | Bitwarden | macOSDmgApp | Apple Business - Intent:required |
| Bitwarden Inc | Bitwarden | win32LobApp | allDevicesAssignmentTarget - Intent:required |
| Bitwarden Inc. | Bitwarden Password Manager | androidManagedStoreApp | - Intent:availableWithoutEnrollment |
| Brother Industries, Ltd. | Brother Print Service Plugin | androidManagedStoreApp | allLicensedUsersAssignmentTarget - Intent:available |
| Canonical Group Limited | Ubuntu 20.04.6 LTS | winGetApp | allLicensedUsersAssignmentTarget - Intent:available |
| Dynalist Inc. | Obsidian | androidManagedStoreApp | allLicensedUsersAssignmentTarget - Intent:available |
| GitHub | GitHub | androidManagedStoreApp | allLicensedUsersAssignmentTarget - Intent:available |
| Google Chrome | winMobileMSI | allLicensedUsersAssignmentTarget - Intent:available Lab Computers - Intent:required | |
| Google LLC | Gboard - the Google Keyboard | androidManagedStoreApp | allLicensedUsersAssignmentTarget - Intent:available |
| Google LLC | Gmail | androidManagedStoreApp | allLicensedUsersAssignmentTarget - Intent:available |
| Google LLC | Google Authenticator | androidManagedStoreApp | allLicensedUsersAssignmentTarget - Intent:available |
| Google LLC | Google Chrome | androidManagedStoreApp | allLicensedUsersAssignmentTarget - Intent:available |
| Kenji Mouri | NanaZip | winGetApp | allDevicesAssignmentTarget - Intent:required |
| LinkedIn: Jobs & Business News | androidManagedStoreApp | allLicensedUsersAssignmentTarget - Intent:available | |
| Michael Rumpler | Royal TSD Lite | androidManagedStoreApp | allLicensedUsersAssignmentTarget - Intent:available |
| Microsoft | Autologon | win32LobApp | Conference Rooms - Intent:required |
| Microsoft | Autologon App | win32LobApp | Conference Rooms - Intent:required |
| Microsoft | Microsoft 365 Apps for macOS | macOSOfficeSuiteApp | Apple Business - Intent:required allLicensedUsersAssignmentTarget - Intent:available |
| Microsoft | Microsoft 365 Apps for Windows 10 and later | officeSuiteApp | allLicensedUsersAssignmentTarget - Intent:available allDevicesAssignmentTarget - Intent:required |
| Microsoft | Microsoft Azure CLI (64-bit) | winMobileMSI | Information Technology - Intent:available |
| Microsoft | Microsoft Defender for Endpoint (macOS) | macOSMicrosoftDefenderApp | allDevicesAssignmentTarget - Intent:required |
| Microsoft | Microsoft Edge for macOS | macOSMicrosoftEdgeApp | allLicensedUsersAssignmentTarget - Intent:available |
| Microsoft | Powershell 7.2.5 | macOSLobApp | allLicensedUsersAssignmentTarget - Intent:available |
| Microsoft | Project | officeSuiteApp | SET - Intent:required |
| Microsoft | SQL Server Management Studio | win32LobApp | Software - Intent:available |
| Microsoft | Visio | officeSuiteApp | Visio - Intent:available Visio - Intent:required |
| Microsoft | VS Code | win32LobApp | allLicensedUsersAssignmentTarget - Intent:available Lab Computers - Intent:required |
| Microsoft Corporation | Azure Information Protection | androidManagedStoreApp | allLicensedUsersAssignmentTarget - Intent:available |
| Microsoft Corporation | Company Portal | winGetApp | allLicensedUsersAssignmentTarget - Intent:required |
| Microsoft Corporation | Dynamics 365 Business Central | androidManagedStoreApp | allLicensedUsersAssignmentTarget - Intent:available |
| Microsoft Corporation | HEIF Image Extensions | winGetApp | allLicensedUsersAssignmentTarget - Intent:required |
| Microsoft Corporation | Intune Company Portal | androidManagedStoreApp | allLicensedUsersAssignmentTarget - Intent:availableWithoutEnrollment allDevicesAssignmentTarget - Intent:required |
| Microsoft Corporation | Link to Windows | androidManagedStoreApp | allLicensedUsersAssignmentTarget - Intent:available |
| Microsoft Corporation | Microsoft 365 (Office) | androidManagedStoreApp | allLicensedUsersAssignmentTarget - Intent:available |
| Microsoft Corporation | Microsoft 365 Admin | androidManagedStoreApp | Information Technology - Intent:available - Intent:available |
| Microsoft Corporation | Microsoft Authenticator | androidManagedStoreApp | allLicensedUsersAssignmentTarget - Intent:available |
| Microsoft Corporation | Microsoft Azure | androidManagedStoreApp | allLicensedUsersAssignmentTarget - Intent:available |
| Microsoft Corporation | Microsoft Edge: AI browser | androidManagedStoreApp | allLicensedUsersAssignmentTarget - Intent:available |
| Microsoft Corporation | Microsoft Edge: Web Browser | iosStoreApp | allLicensedUsersAssignmentTarget - Intent:available |
| Microsoft Corporation | Microsoft Excel | iosStoreApp | allLicensedUsersAssignmentTarget - Intent:available |
| Microsoft Corporation | Microsoft Excel: Spreadsheets | androidManagedStoreApp | allLicensedUsersAssignmentTarget - Intent:available |
| Microsoft Corporation | Microsoft Intune | androidManagedStoreApp | allLicensedUsersAssignmentTarget - Intent:availableWithoutEnrollment allDevicesAssignmentTarget - Intent:required |
| Microsoft Corporation | Microsoft Intune Company Portal | iosStoreApp | allLicensedUsersAssignmentTarget - Intent:required |
| Microsoft Corporation | Microsoft Launcher | androidManagedStoreApp | allLicensedUsersAssignmentTarget - Intent:available |
| Microsoft Corporation | Microsoft Lens - PDF Scanner | androidManagedStoreApp | allLicensedUsersAssignmentTarget - Intent:available |
| Microsoft Corporation | Microsoft Math Solver | androidManagedStoreApp | All Users - Intent:available |
| Microsoft Corporation | Microsoft Office | iosStoreApp | allDevicesAssignmentTarget - Intent:required |
| Microsoft Corporation | Microsoft OneDrive | iosStoreApp | allLicensedUsersAssignmentTarget - Intent:available |
| Microsoft Corporation | Microsoft OneDrive | androidManagedStoreApp | allLicensedUsersAssignmentTarget - Intent:available |
| Microsoft Corporation | Microsoft OneNote | iosStoreApp | allLicensedUsersAssignmentTarget - Intent:available |
| Microsoft Corporation | Microsoft OneNote: Save Notes | androidManagedStoreApp | allLicensedUsersAssignmentTarget - Intent:available |
| Microsoft Corporation | Microsoft Outlook | iosStoreApp | allLicensedUsersAssignmentTarget - Intent:available |
| Microsoft Corporation | Microsoft Outlook | androidManagedStoreApp | allLicensedUsersAssignmentTarget - Intent:available |
| Microsoft Corporation | Microsoft Planner | androidManagedStoreApp | allLicensedUsersAssignmentTarget - Intent:available |
| Microsoft Corporation | Microsoft Power BI | androidManagedStoreApp | allLicensedUsersAssignmentTarget - Intent:available |
| Microsoft Corporation | Microsoft PowerPoint | iosStoreApp | allLicensedUsersAssignmentTarget - Intent:available |
| Microsoft Corporation | Microsoft PowerPoint | androidManagedStoreApp | allLicensedUsersAssignmentTarget - Intent:available |
| Microsoft Corporation | Microsoft SharePoint | androidManagedStoreApp | allLicensedUsersAssignmentTarget - Intent:available |
| Microsoft Corporation | Microsoft Teams | androidManagedStoreApp | allLicensedUsersAssignmentTarget - Intent:available |
| Microsoft Corporation | Microsoft Teams | iosStoreApp | allLicensedUsersAssignmentTarget - Intent:available |
| Microsoft Corporation | Microsoft To Do: Lists & Tasks | androidManagedStoreApp | All Users - Intent:available |
| Microsoft Corporation | Microsoft Translator | androidManagedStoreApp | All Users - Intent:available |
| Microsoft Corporation | Microsoft Word | iosStoreApp | allLicensedUsersAssignmentTarget - Intent:available |
| Microsoft Corporation | Microsoft Word: Edit Documents | androidManagedStoreApp | allLicensedUsersAssignmentTarget - Intent:available |
| Microsoft Corporation | Power Apps | androidManagedStoreApp | allLicensedUsersAssignmentTarget - Intent:available |
| Microsoft Corporation | Power Automate | androidManagedStoreApp | allLicensedUsersAssignmentTarget - Intent:available |
| Microsoft Corporation | Remote Desktop | androidManagedStoreApp | allLicensedUsersAssignmentTarget - Intent:available |
| Microsoft Corporation | VP9 Video Extensions | winGetApp | allLicensedUsersAssignmentTarget - Intent:required |
| Mozilla | Firefox Fast & Private Browser | androidManagedStoreApp | allLicensedUsersAssignmentTarget - Intent:available |
| Mozilla | Mozilla Firefox | winGetApp | allLicensedUsersAssignmentTarget - Intent:available allDevicesAssignmentTarget - Intent:required |
| mRemoteNG | mRemoteNG | winMobileMSI | allLicensedUsersAssignmentTarget - Intent:available |
| National Instruments | NI Package Manager | win32LobApp | allLicensedUsersAssignmentTarget - Intent:available Lab Computers - Intent:required |
| Okta Inc. | Okta Verify | androidManagedStoreApp | allLicensedUsersAssignmentTarget - Intent:available |
| OpenVPN | OpenVPN Connect – OpenVPN App | androidManagedStoreApp | allLicensedUsersAssignmentTarget - Intent:available |
| Oracle America, Inc. | NetSuite | androidManagedStoreApp | allLicensedUsersAssignmentTarget - Intent:available |
| People Center Inc. | Rippling - HR, IT & Finance | androidManagedStoreApp | allLicensedUsersAssignmentTarget - Intent:available |
| People Center Inc. | Rippling - Time Clock | androidManagedStoreApp | allLicensedUsersAssignmentTarget - Intent:available |
| Pritunl | Pritunl | win32LobApp | allLicensedUsersAssignmentTarget - Intent:required |
| Pritunl, Inc. | Pritunl | macOSLobApp | Apple Business - Intent:available |
| Python Software Foundation | Python 3.8 | win32LobApp | allLicensedUsersAssignmentTarget - Intent:available |
| RealVNC Limited | RealVNC Viewer: Remote Desktop | androidManagedStoreApp | allLicensedUsersAssignmentTarget - Intent:available |
| Rippling People Center Inc. | Rippling | macOSDmgApp | Apple Business - Intent:required allDevicesAssignmentTarget - Intent:required |
| Royal Apps GmbH | Royal TSX | macOSDmgApp | Information Technology - Intent:required |
| Spiceworks | Spiceworks Agent Shell | winMobileMSI | allLicensedUsersAssignmentTarget - Intent:required |
| SwiftKey | Microsoft SwiftKey AI Keyboard | androidManagedStoreApp | allLicensedUsersAssignmentTarget - Intent:available |
| Termius Corporation | Termius - SSH and SFTP client | androidManagedStoreApp | allLicensedUsersAssignmentTarget - Intent:available |
| The Python Software Foundation | Python 3.12 | win32LobApp | allLicensedUsersAssignmentTarget - Intent:available |
| Vibe Inc | Vibe Canvas | androidManagedStoreApp | allLicensedUsersAssignmentTarget - Intent:available |
| Zoom Video Communications, Inc. | Zoom Client | macOSLobApp | allLicensedUsersAssignmentTarget - Intent:available |
| Zoom Video Communications, Inc. | Zoom Outlook Plugin | macOSLobApp | allLicensedUsersAssignmentTarget - Intent:available |
| Zoom Video Communications, Inc. | Zoom Workplace (64-bit) | winMobileMSI | allDevicesAssignmentTarget - Intent:required |
| zoom.us | Zoom Rooms Controller | androidManagedStoreApp | allLicensedUsersAssignmentTarget - Intent:availableWithoutEnrollment |
| zoom.us | Zoom Workplace | androidManagedStoreApp | allLicensedUsersAssignmentTarget - Intent:availableWithoutEnrollment |
| zoom.us | Zoom Workplace for Intune | androidManagedStoreApp | allLicensedUsersAssignmentTarget - Intent:available |
Mobile App Management
This section contains a list of all mobile applications management policies available in Intune.
OneDrive mobile policy
OneDrive mobile policy UX set via Admin UX
| Property | Value |
| @odata.type | #microsoft.graph.defaultManagedAppProtection |
| displayName | OneDrive mobile policy |
| description | OneDrive mobile policy UX set via Admin UX |
| createdDateTime | 08/13/2020 16:10:52 |
| lastModifiedDateTime | 01/05/2022 00:06:26 |
| roleScopeTagIds | 0 |
| id | G_4ef35a8f-185a-4b67-8210-278957c7b64c |
| version | “20002f81-0000-0300-0000-61d4e1020000” |
| periodOfflineBeforeAccessCheck | PT1H30M |
| periodOnlineBeforeAccessCheck | P7D |
| allowedInboundDataTransferSources | allApps |
| allowedOutboundDataTransferDestinations | allApps |
| organizationalCredentialsRequired | |
| allowedOutboundClipboardSharingLevel | allApps |
| dataBackupBlocked | |
| deviceComplianceRequired | |
| managedBrowserToOpenLinksRequired | |
| saveAsBlocked | |
| periodOfflineBeforeWipeIsEnforced | P720D |
| pinRequired | |
| maximumPinRetries | 5 |
| simplePinBlocked | |
| minimumPinLength | 8 |
| pinCharacterSet | numeric |
| periodBeforePinReset | PT0S |
| allowedDataStorageLocations | |
| contactSyncBlocked | |
| printBlocked | |
| fingerprintBlocked | |
| disableAppPinIfDevicePinIsSet | |
| maximumRequiredOsVersion | |
| maximumWarningOsVersion | |
| maximumWipeOsVersion | |
| minimumRequiredOsVersion | |
| minimumWarningOsVersion | |
| minimumRequiredAppVersion | |
| minimumWarningAppVersion | |
| minimumWipeOsVersion | |
| minimumWipeAppVersion | |
| appActionIfDeviceComplianceRequired | block |
| appActionIfMaximumPinRetriesExceeded | block |
| pinRequiredInsteadOfBiometricTimeout | |
| allowedOutboundClipboardSharingExceptionLength | |
| notificationRestriction | allow |
| previousPinBlockCount | |
| managedBrowser | notConfigured |
| maximumAllowedDeviceThreatLevel | notConfigured |
| mobileThreatDefenseRemediationAction | block |
| mobileThreatDefensePartnerPriority | |
| blockDataIngestionIntoOrganizationDocuments | |
| allowedDataIngestionLocations | |
| appActionIfUnableToAuthenticateUser | |
| dialerRestrictionLevel | allApps |
| gracePeriodToBlockAppsDuringOffClockHours | |
| protectedMessagingRedirectAppType | anyApp |
| appDataEncryptionType | useDeviceSettings |
| screenCaptureBlocked | |
| allowWidgetContentSync | |
| encryptAppData | |
| disableAppEncryptionIfDeviceEncryptionIsEnabled | |
| minimumRequiredSdkVersion | |
| deployedAppCount | |
| minimumRequiredPatchVersion | 0000-00-00 |
| minimumWarningPatchVersion | 0000-00-00 |
| faceIdBlocked | |
| minimumWipeSdkVersion | |
| minimumWipePatchVersion | 0000-00-00 |
| allowedIosDeviceModels | |
| appActionIfIosDeviceModelNotAllowed | block |
| allowedAndroidDeviceManufacturers | |
| appActionIfAndroidDeviceManufacturerNotAllowed | block |
| thirdPartyKeyboardsBlocked | |
| filterOpenInToOnlyManagedApps | |
| disableProtectionOfManagedOutboundOpenInData | |
| protectInboundDataFromUnknownSources | |
| requiredAndroidSafetyNetDeviceAttestationType | none |
| appActionIfAndroidSafetyNetDeviceAttestationFailed | block |
| requiredAndroidSafetyNetAppsVerificationType | none |
| appActionIfAndroidSafetyNetAppsVerificationFailed | block |
| customBrowserProtocol | |
| customBrowserPackageId | |
| customBrowserDisplayName | |
| minimumRequiredCompanyPortalVersion | |
| minimumWarningCompanyPortalVersion | |
| minimumWipeCompanyPortalVersion | |
| allowedAndroidDeviceModels | |
| appActionIfAndroidDeviceModelNotAllowed | block |
| customDialerAppProtocol | |
| customDialerAppPackageId | |
| customDialerAppDisplayName | |
| biometricAuthenticationBlocked | |
| requiredAndroidSafetyNetEvaluationType | basic |
| blockAfterCompanyPortalUpdateDeferralInDays | |
| warnAfterCompanyPortalUpdateDeferralInDays | |
| wipeAfterCompanyPortalUpdateDeferralInDays | |
| deviceLockRequired | |
| appActionIfDeviceLockNotSet | block |
| connectToVpnOnLaunch | |
| appActionIfDevicePasscodeComplexityLessThanLow | |
| appActionIfAccountIsClockedOut | |
| appActionIfDevicePasscodeComplexityLessThanMedium | |
| appActionIfDevicePasscodeComplexityLessThanHigh | |
| requireClass3Biometrics | |
| requirePinAfterBiometricChange | |
| fingerprintAndBiometricEnabled | |
| minimumWarningSdkVersion | |
| messagingRedirectAppUrlScheme | |
| messagingRedirectAppDisplayName | |
| messagingRedirectAppPackageId | |
| customSettings | |
| exemptedAppProtocols | |
| exemptedAppPackages |
OneDrive mobile policy
OneDrive mobile policy UX set via Admin UX
| Property | Value |
| @odata.type | #microsoft.graph.defaultManagedAppProtection |
| displayName | OneDrive mobile policy |
| description | OneDrive mobile policy UX set via Admin UX |
| createdDateTime | 08/13/2020 16:11:25 |
| lastModifiedDateTime | 01/05/2022 00:06:26 |
| roleScopeTagIds | 0 |
| id | G_7db7347d-71bd-4eb6-8d28-3103c1fc24bb |
| version | “11008d05-0000-0300-0000-61d4e1020000” |
| periodOfflineBeforeAccessCheck | PT1H30M |
| periodOnlineBeforeAccessCheck | P7D |
| allowedInboundDataTransferSources | allApps |
| allowedOutboundDataTransferDestinations | allApps |
| organizationalCredentialsRequired | |
| allowedOutboundClipboardSharingLevel | allApps |
| dataBackupBlocked | |
| deviceComplianceRequired | |
| managedBrowserToOpenLinksRequired | |
| saveAsBlocked | |
| periodOfflineBeforeWipeIsEnforced | P720D |
| pinRequired | |
| maximumPinRetries | 5 |
| simplePinBlocked | |
| minimumPinLength | 8 |
| pinCharacterSet | numeric |
| periodBeforePinReset | PT0S |
| allowedDataStorageLocations | |
| contactSyncBlocked | |
| printBlocked | |
| fingerprintBlocked | |
| disableAppPinIfDevicePinIsSet | |
| maximumRequiredOsVersion | |
| maximumWarningOsVersion | |
| maximumWipeOsVersion | |
| minimumRequiredOsVersion | |
| minimumWarningOsVersion | |
| minimumRequiredAppVersion | |
| minimumWarningAppVersion | |
| minimumWipeOsVersion | |
| minimumWipeAppVersion | |
| appActionIfDeviceComplianceRequired | block |
| appActionIfMaximumPinRetriesExceeded | block |
| pinRequiredInsteadOfBiometricTimeout | |
| allowedOutboundClipboardSharingExceptionLength | |
| notificationRestriction | allow |
| previousPinBlockCount | |
| managedBrowser | notConfigured |
| maximumAllowedDeviceThreatLevel | notConfigured |
| mobileThreatDefenseRemediationAction | block |
| mobileThreatDefensePartnerPriority | |
| blockDataIngestionIntoOrganizationDocuments | |
| allowedDataIngestionLocations | |
| appActionIfUnableToAuthenticateUser | |
| dialerRestrictionLevel | allApps |
| gracePeriodToBlockAppsDuringOffClockHours | |
| protectedMessagingRedirectAppType | anyApp |
| appDataEncryptionType | useDeviceSettings |
| screenCaptureBlocked | |
| allowWidgetContentSync | |
| encryptAppData | True |
| disableAppEncryptionIfDeviceEncryptionIsEnabled | |
| minimumRequiredSdkVersion | |
| deployedAppCount | 2 |
| minimumRequiredPatchVersion | 0000-00-00 |
| minimumWarningPatchVersion | 0000-00-00 |
| faceIdBlocked | |
| minimumWipeSdkVersion | |
| minimumWipePatchVersion | 0000-00-00 |
| allowedIosDeviceModels | |
| appActionIfIosDeviceModelNotAllowed | block |
| allowedAndroidDeviceManufacturers | |
| appActionIfAndroidDeviceManufacturerNotAllowed | block |
| thirdPartyKeyboardsBlocked | |
| filterOpenInToOnlyManagedApps | |
| disableProtectionOfManagedOutboundOpenInData | |
| protectInboundDataFromUnknownSources | |
| requiredAndroidSafetyNetDeviceAttestationType | none |
| appActionIfAndroidSafetyNetDeviceAttestationFailed | block |
| requiredAndroidSafetyNetAppsVerificationType | none |
| appActionIfAndroidSafetyNetAppsVerificationFailed | block |
| customBrowserProtocol | |
| customBrowserPackageId | |
| customBrowserDisplayName | |
| minimumRequiredCompanyPortalVersion | |
| minimumWarningCompanyPortalVersion | |
| minimumWipeCompanyPortalVersion | |
| allowedAndroidDeviceModels | |
| appActionIfAndroidDeviceModelNotAllowed | block |
| customDialerAppProtocol | |
| customDialerAppPackageId | |
| customDialerAppDisplayName | |
| biometricAuthenticationBlocked | |
| requiredAndroidSafetyNetEvaluationType | basic |
| blockAfterCompanyPortalUpdateDeferralInDays | |
| warnAfterCompanyPortalUpdateDeferralInDays | |
| wipeAfterCompanyPortalUpdateDeferralInDays | |
| deviceLockRequired | |
| appActionIfDeviceLockNotSet | block |
| connectToVpnOnLaunch | |
| appActionIfDevicePasscodeComplexityLessThanLow | |
| appActionIfAccountIsClockedOut | |
| appActionIfDevicePasscodeComplexityLessThanMedium | |
| appActionIfDevicePasscodeComplexityLessThanHigh | |
| requireClass3Biometrics | |
| requirePinAfterBiometricChange | |
| fingerprintAndBiometricEnabled | |
| minimumWarningSdkVersion | |
| messagingRedirectAppUrlScheme | |
| messagingRedirectAppDisplayName | |
| messagingRedirectAppPackageId | |
| customSettings | |
| exemptedAppProtocols | |
| exemptedAppPackages |
Default Android Policy
{}
| Property | Value |
| @odata.type | #microsoft.graph.androidManagedAppProtection |
| displayName | Default Android Policy |
| description | {} |
| createdDateTime | 08/21/2020 01:45:36 |
| lastModifiedDateTime | 01/04/2022 21:52:25 |
| roleScopeTagIds | 0 |
| id | T_52e262b6-b544-4544-82f3-9f636563cb2e |
| version | “0b0095a8-0000-0300-0000-61d4c1990000” |
| periodOfflineBeforeAccessCheck | PT12H |
| periodOnlineBeforeAccessCheck | PT12H |
| allowedInboundDataTransferSources | allApps |
| allowedOutboundDataTransferDestinations | allApps |
| organizationalCredentialsRequired | |
| allowedOutboundClipboardSharingLevel | allApps |
| dataBackupBlocked | |
| deviceComplianceRequired | |
| managedBrowserToOpenLinksRequired | |
| saveAsBlocked | |
| periodOfflineBeforeWipeIsEnforced | P1D |
| pinRequired | |
| maximumPinRetries | 5 |
| simplePinBlocked | |
| minimumPinLength | 4 |
| pinCharacterSet | numeric |
| periodBeforePinReset | PT0S |
| allowedDataStorageLocations | |
| contactSyncBlocked | |
| printBlocked | |
| fingerprintBlocked | |
| disableAppPinIfDevicePinIsSet | |
| maximumRequiredOsVersion | |
| maximumWarningOsVersion | |
| maximumWipeOsVersion | |
| minimumRequiredOsVersion | |
| minimumWarningOsVersion | |
| minimumRequiredAppVersion | |
| minimumWarningAppVersion | |
| minimumWipeOsVersion | |
| minimumWipeAppVersion | |
| appActionIfDeviceComplianceRequired | block |
| appActionIfMaximumPinRetriesExceeded | block |
| pinRequiredInsteadOfBiometricTimeout | |
| allowedOutboundClipboardSharingExceptionLength | |
| notificationRestriction | allow |
| previousPinBlockCount | |
| managedBrowser | notConfigured |
| maximumAllowedDeviceThreatLevel | notConfigured |
| mobileThreatDefenseRemediationAction | block |
| mobileThreatDefensePartnerPriority | |
| blockDataIngestionIntoOrganizationDocuments | |
| allowedDataIngestionLocations | |
| appActionIfUnableToAuthenticateUser | |
| dialerRestrictionLevel | allApps |
| gracePeriodToBlockAppsDuringOffClockHours | |
| protectedMessagingRedirectAppType | anyApp |
| isAssigned | True |
| targetedAppManagementLevels | unspecified |
| appGroupType | selectedPublicApps |
| screenCaptureBlocked | |
| disableAppEncryptionIfDeviceEncryptionIsEnabled | |
| encryptAppData | |
| deployedAppCount | |
| minimumRequiredPatchVersion | 0000-00-00 |
| minimumWarningPatchVersion | 0000-00-00 |
| minimumWipePatchVersion | 0000-00-00 |
| allowedAndroidDeviceManufacturers | |
| appActionIfAndroidDeviceManufacturerNotAllowed | block |
| appActionIfAccountIsClockedOut | |
| appActionIfSamsungKnoxAttestationRequired | |
| requiredAndroidSafetyNetDeviceAttestationType | none |
| appActionIfAndroidSafetyNetDeviceAttestationFailed | block |
| requiredAndroidSafetyNetAppsVerificationType | none |
| appActionIfAndroidSafetyNetAppsVerificationFailed | block |
| customBrowserPackageId | |
| customBrowserDisplayName | |
| minimumRequiredCompanyPortalVersion | |
| minimumWarningCompanyPortalVersion | |
| minimumWipeCompanyPortalVersion | |
| keyboardsRestricted | |
| allowedAndroidDeviceModels | |
| appActionIfAndroidDeviceModelNotAllowed | block |
| customDialerAppPackageId | |
| customDialerAppDisplayName | |
| biometricAuthenticationBlocked | |
| requiredAndroidSafetyNetEvaluationType | basic |
| blockAfterCompanyPortalUpdateDeferralInDays | |
| warnAfterCompanyPortalUpdateDeferralInDays | |
| wipeAfterCompanyPortalUpdateDeferralInDays | |
| deviceLockRequired | |
| appActionIfDeviceLockNotSet | block |
| connectToVpnOnLaunch | |
| appActionIfDevicePasscodeComplexityLessThanLow | |
| appActionIfDevicePasscodeComplexityLessThanMedium | |
| appActionIfDevicePasscodeComplexityLessThanHigh | |
| requireClass3Biometrics | |
| requirePinAfterBiometricChange | |
| fingerprintAndBiometricEnabled | |
| messagingRedirectAppPackageId | |
| messagingRedirectAppDisplayName | |
| exemptedAppPackages | |
| approvedKeyboards | |
| Targeted Apps |
Assignments
| Name | MemberCount | GroupType | DynamicRule | Intent | Source | AssignType |
| All Users | 1 | DynamicDevice | All Users | - | direct | Include |
Default iOS Policy
{}
| Property | Value |
| @odata.type | #microsoft.graph.iosManagedAppProtection |
| displayName | Default iOS Policy |
| description | {} |
| createdDateTime | 08/21/2020 02:22:28 |
| lastModifiedDateTime | 01/04/2022 21:52:23 |
| roleScopeTagIds | 0 |
| id | T_59f5d989-43c2-499f-a5a4-d3f335855a4d |
| version | “0b00b4a3-0000-0300-0000-61d4c1970000” |
| periodOfflineBeforeAccessCheck | PT12H |
| periodOnlineBeforeAccessCheck | PT12H |
| allowedInboundDataTransferSources | allApps |
| allowedOutboundDataTransferDestinations | allApps |
| organizationalCredentialsRequired | |
| allowedOutboundClipboardSharingLevel | allApps |
| dataBackupBlocked | |
| deviceComplianceRequired | |
| managedBrowserToOpenLinksRequired | |
| saveAsBlocked | |
| periodOfflineBeforeWipeIsEnforced | P1D |
| pinRequired | |
| maximumPinRetries | 5 |
| simplePinBlocked | |
| minimumPinLength | 4 |
| pinCharacterSet | numeric |
| periodBeforePinReset | PT0S |
| allowedDataStorageLocations | |
| contactSyncBlocked | |
| printBlocked | |
| fingerprintBlocked | |
| disableAppPinIfDevicePinIsSet | |
| maximumRequiredOsVersion | |
| maximumWarningOsVersion | |
| maximumWipeOsVersion | |
| minimumRequiredOsVersion | |
| minimumWarningOsVersion | |
| minimumRequiredAppVersion | |
| minimumWarningAppVersion | |
| minimumWipeOsVersion | |
| minimumWipeAppVersion | |
| appActionIfDeviceComplianceRequired | block |
| appActionIfMaximumPinRetriesExceeded | block |
| pinRequiredInsteadOfBiometricTimeout | |
| allowedOutboundClipboardSharingExceptionLength | |
| notificationRestriction | allow |
| previousPinBlockCount | |
| managedBrowser | notConfigured |
| maximumAllowedDeviceThreatLevel | notConfigured |
| mobileThreatDefenseRemediationAction | block |
| mobileThreatDefensePartnerPriority | |
| blockDataIngestionIntoOrganizationDocuments | |
| allowedDataIngestionLocations | |
| appActionIfUnableToAuthenticateUser | |
| dialerRestrictionLevel | allApps |
| gracePeriodToBlockAppsDuringOffClockHours | |
| protectedMessagingRedirectAppType | anyApp |
| isAssigned | True |
| targetedAppManagementLevels | unspecified |
| appGroupType | selectedPublicApps |
| appDataEncryptionType | useDeviceSettings |
| minimumRequiredSdkVersion | |
| deployedAppCount | |
| faceIdBlocked | |
| allowWidgetContentSync | |
| minimumWipeSdkVersion | |
| allowedIosDeviceModels | |
| appActionIfIosDeviceModelNotAllowed | block |
| appActionIfAccountIsClockedOut | |
| thirdPartyKeyboardsBlocked | |
| filterOpenInToOnlyManagedApps | |
| disableProtectionOfManagedOutboundOpenInData | |
| protectInboundDataFromUnknownSources | |
| customBrowserProtocol | |
| customDialerAppProtocol | |
| managedUniversalLinks | http://*.sharepoint.com/* http://*.sharepoint-df.com/* http://*.yammer.com/* http://*.onedrive.com/* http://tasks.office.com/* http://to-do.microsoft.com/sharing* http://web.microsoftstream.com/video/* http://msit.microsoftstream.com/video/* http://*.powerbi.com/* http://app.powerbi.cn/* http://app.powerbigov.us/* http://app.powerbi.de/* http://*.service-now.com/* http://*.appsplatform.us/* http://*.powerapps.cn/* http://*.powerapps.com/* http://*.powerapps.us/* http://*teams.microsoft.com/l/* http://*devspaces.skype.com/l/* http://*teams.live.com/l/* http://*collab.apps.mil/l/* http://*teams.microsoft.us/l/* http://*teams-fl.microsoft.com/l/* http://*.zoom.us/* http://zoom.us/* https://*.sharepoint.com/* https://*.sharepoint-df.com/* https://*.yammer.com/* https://*.onedrive.com/* https://tasks.office.com/* https://to-do.microsoft.com/sharing* https://web.microsoftstream.com/video/* https://msit.microsoftstream.com/video/* https://*.powerbi.com/* https://app.powerbi.cn/* https://app.powerbigov.us/* https://app.powerbi.de/* https://*.service-now.com/* https://*.appsplatform.us/* https://*.powerapps.cn/* https://*.powerapps.com/* https://*.powerapps.us/* https://*teams.microsoft.com/l/* https://*devspaces.skype.com/l/* https://*teams.live.com/l/* https://*collab.apps.mil/l/* https://*teams.microsoft.us/l/* https://*teams-fl.microsoft.com/l/* https://*.zoom.us/* https://zoom.us/* |
| exemptedUniversalLinks | http://maps.apple.com https://maps.apple.com http://facetime.apple.com https://facetime.apple.com |
| minimumWarningSdkVersion | |
| messagingRedirectAppUrlScheme | |
| exemptedAppProtocols | |
| Targeted Apps |
Assignments
| Name | MemberCount | GroupType | DynamicRule | Intent | Source | AssignType |
| All Users | 1 | DynamicDevice | All Users | - | direct | Include |
Default Windows 10 Application Policy
{}
| Property | Value |
| @odata.type | #microsoft.graph.mdmWindowsInformationProtectionPolicy |
| displayName | Default Windows 10 Application Policy |
| description | {} |
| createdDateTime | 08/13/2020 20:14:02 |
| lastModifiedDateTime | 11/16/2021 21:45:58 |
| roleScopeTagIds | 0 |
| id | M_81118850-9b16-465e-9d2a-83af981ae866 |
| version | 7 |
| enforcementLevel | noProtection |
| enterpriseDomain | xentermd.com |
| protectionUnderLockConfigRequired | True |
| revokeOnUnenrollDisabled | |
| rightsManagementServicesTemplateId | |
| azureRightsManagementServicesAllowed | |
| iconsVisible | True |
| enterpriseIPRangesAreAuthoritative | |
| enterpriseProxyServersAreAuthoritative | |
| indexingEncryptedStoresOrItemsBlocked | |
| isAssigned | True |
| enterpriseProtectedDomainNames | |
| dataRecoveryCertificate | @{subjectName=OU=EFS File Encryption Certificate, L=EFS, CN=RexLinder; description=dra_recovery_key_microsoft365.CER; expirationDateTime=07/20/2120 02:50:05; certificate=} |
| protectedApps | Internet Explorer, Word, Excel, PowerPoint, OneDrive, OneNote, Mail and Calendar, Skype for Business, Microsoft Edge |
| exemptApps | |
| enterpriseNetworkDomainNames | |
| enterpriseProxiedDomains | |
| enterpriseIPRanges | |
| enterpriseProxyServers | |
| enterpriseInternalProxyServers | |
| neutralDomainResources | |
| smbAutoEncryptedFileExtensions |
Assignments
| Name | MemberCount | GroupType | DynamicRule | Intent | Source | AssignType |
| All Users | 1 | DynamicDevice | All Users | - | direct | Include |