Intune Documentation

Xenter Inc

Powered by www.wpninjas.eu

22:17 20.03.2025

Contents

No table of contents entries found.

Device Configuration (ADMX)

This section contains a list of all device configuration profiles which are backed by ADMX available in Intune.

Microsoft Edge Policy

Property Value
createdDateTime 02/26/2024 17:30:37
displayName Microsoft Edge Policy
description
roleScopeTagIds 0
policyConfigurationIngestionType builtIn
id 3f39503f-bfc5-4da1-a731-d68e21aa04d6
lastModifiedDateTime 02/26/2024 17:30:38

Assignments

Name MemberCount GroupType DynamicRule Intent Source AssignType
All Users - BuilIn - - Include
All Devices - BuilIn - - Include

Settings

DisplayName Scope Path SupportedOn State Value
Configure extension installation allow list machine \Google\Google Chrome\Extensions Microsoft Windows 7 or later Enabled
Configure extension installation allow list user \Google\Google Chrome\Extensions Microsoft Windows 7 or later Enabled

Turn off Autoplay

Turns off autoplay for all drives

Property Value
createdDateTime 11/04/2022 19:06:01
displayName Turn off Autoplay
description Turns off autoplay for all drives
roleScopeTagIds 0
policyConfigurationIngestionType builtIn
id e23a8a72-0f21-460f-820e-e5edf9e5fdb2
lastModifiedDateTime 11/04/2022 19:06:01

Assignments

Name MemberCount GroupType DynamicRule Intent Source AssignType
All Users - BuilIn - - Include
All Devices - BuilIn - - Include

Settings

DisplayName Scope Path SupportedOn State Value
Turn off Autoplay machine \Windows Components\AutoPlay Policies At least Windows 2000 Enabled 255

Apple Configuration

This section contains the Apple specific Intune configuration. The following Apple push notification certificate is configured:

Property Value
@odata.context https://graph.microsoft.com/v1.0/\(metadata\#deviceManagement/applePushNotificationCertificate/\)entity
id 17c54a4c-79a3-4f5e-9baf-4b9ac17a38bc
appleIdentifier rex.linder@xentermd.com
topicIdentifier com.apple.mgmt.External.e12d1b2e-b9d1-47ab-adf5-571830b4eca6
lastModifiedDateTime 05/21/2024 21:54:06
expirationDateTime 05/21/2025 21:43:35
certificateUploadStatus
certificateUploadFailureReason
certificateSerialNumber 00E1C6C8C4AC5848
certificate

Autopilot Profiles

This section contains a list of all Autopilot Profiles available in Intune.

Conference Rooms

Configure single app kiosk mode for Zoom Rooms.

Property Value
@odata.type #microsoft.graph.azureADWindowsAutopilotDeploymentProfile
id 42d09e04-afa2-4623-bda9-87cb2a23cc48
displayName Conference Rooms
description Configure single app kiosk mode for Zoom Rooms.
language en-US
locale en-US
createdDateTime 07/27/2023 19:15:01
lastModifiedDateTime 07/28/2023 19:39:25
enrollmentStatusScreenSettings
extractHardwareHash True
hardwareHashExtractionEnabled True
deviceNameTemplate XMD-%SERIAL%
deviceType windowsPc
enableWhiteGlove
preprovisioningAllowed
roleScopeTagIds 0
managementServiceAppId
outOfBoxExperienceSettings @{hidePrivacySettings=True; hideEULA=True; userType=standard; deviceUsageType=shared; skipKeyboardSelectionPage=True; hideEscapeLink=True}
outOfBoxExperienceSetting @{privacySettingsHidden=True; eulaHidden=True; userType=standard; deviceUsageType=shared; keyboardSelectionPageSkipped=True; escapeLinkHidden=True}

Assignments

Name MemberCount GroupType DynamicRule Intent Source AssignType
Conference Rooms 1 Static (device.devicePhysicalIDs -any (_ -contains “[ZTDID]”)) and (device.devicePhysicalIds -contains “[OrderID]:conferenceroom”) - direct Include

User Devices

General provisioning that applies to employee devices.

Property Value
@odata.type #microsoft.graph.azureADWindowsAutopilotDeploymentProfile
id ace3d212-4bc5-4475-bca8-8bde1ad1b8d3
displayName User Devices
description General provisioning that applies to employee devices.
language os-default
locale os-default
createdDateTime 06/13/2023 21:58:47
lastModifiedDateTime 07/27/2023 18:53:46
enrollmentStatusScreenSettings
extractHardwareHash True
hardwareHashExtractionEnabled True
deviceNameTemplate XMD-%SERIAL%
deviceType windowsPc
enableWhiteGlove True
preprovisioningAllowed True
roleScopeTagIds 0
managementServiceAppId
outOfBoxExperienceSettings @{hidePrivacySettings=True; hideEULA=True; userType=standard; deviceUsageType=singleUser; skipKeyboardSelectionPage=True; hideEscapeLink=True}
outOfBoxExperienceSetting @{privacySettingsHidden=True; eulaHidden=True; userType=standard; deviceUsageType=singleUser; keyboardSelectionPageSkipped=True; escapeLinkHidden=True}

Assignments

Name MemberCount GroupType DynamicRule Intent Source AssignType
Employee Computers 1 DynamicDevice (device.devicePhysicalIDs -any (_ -contains “[ZTDID]”)) and (device.devicePhysicalIds -notContains “[OrderID]:conferenceroom”) - direct Include

Compliance Policies

This section contains a list of all compliances policies available in Intune.

Default Windows 10 Compliance Policy

Property Value
@odata.type #microsoft.graph.windows10CompliancePolicy
roleScopeTagIds 0
id 191dfb82-e574-433c-9417-ae34027cd131
createdDateTime 08/14/2020 22:10:50
description
lastModifiedDateTime 06/29/2023 22:19:18
displayName Default Windows 10 Compliance Policy
version 6
passwordRequired
passwordBlockSimple
passwordRequiredToUnlockFromIdle
passwordMinutesOfInactivityBeforeLock
passwordExpirationDays
passwordMinimumLength
passwordMinimumCharacterSetCount
passwordRequiredType deviceDefault
passwordPreviousPasswordBlockCount
requireHealthyDeviceReport
osMinimumVersion 10.0.19042.1706
osMaximumVersion
mobileOsMinimumVersion
mobileOsMaximumVersion
earlyLaunchAntiMalwareDriverEnabled
bitLockerEnabled True
secureBootEnabled True
codeIntegrityEnabled True
memoryIntegrityEnabled
kernelDmaProtectionEnabled
virtualizationBasedSecurityEnabled
firmwareProtectionEnabled
storageRequireEncryption True
activeFirewallRequired True
defenderEnabled True
defenderVersion 4.18.1909.6
signatureOutOfDate True
rtpEnabled True
antivirusRequired True
antiSpywareRequired True
deviceThreatProtectionEnabled True
deviceThreatProtectionRequiredSecurityLevel medium
configurationManagerComplianceRequired
tpmRequired True
deviceCompliancePolicyScript
validOperatingSystemBuildRanges
wslDistributions

Assignments

Name MemberCount GroupType DynamicRule Intent Source AssignType
All Users - BuilIn - - direct Include

Default compliance policy for Android

900f8baa-812e-4886-a598-61f73001bae8

Property Value
@odata.type #microsoft.graph.androidCompliancePolicy
roleScopeTagIds 0
id 6351f163-7d4c-d232-81d6-5c3b8f29fcfe
createdDateTime 04/30/2020 03:52:01
description 900f8baa-812e-4886-a598-61f73001bae8
lastModifiedDateTime 06/29/2023 22:52:58
displayName Default compliance policy for Android
version 3
passwordRequired
passwordMinimumLength
passwordRequiredType deviceDefault
requiredPasswordComplexity none
passwordMinutesOfInactivityBeforeLock 15
passwordExpirationDays
passwordPreviousPasswordBlockCount
passwordSignInFailureCountBeforeFactoryReset
securityPreventInstallAppsFromUnknownSources True
securityDisableUsbDebugging True
securityRequireVerifyApps True
deviceThreatProtectionEnabled True
deviceThreatProtectionRequiredSecurityLevel secured
advancedThreatProtectionRequiredSecurityLevel medium
securityBlockJailbrokenDevices True
securityBlockDeviceAdministratorManagedDevices True
osMinimumVersion 12
osMaximumVersion
minAndroidSecurityPatchLevel
storageRequireEncryption True
securityRequireSafetyNetAttestationBasicIntegrity True
securityRequireSafetyNetAttestationCertifiedDevice True
securityRequireGooglePlayServices True
securityRequireUpToDateSecurityProviders True
securityRequireCompanyPortalAppIntegrity True
conditionStatementId
restrictedApps

Assignments

Name MemberCount GroupType DynamicRule Intent Source AssignType
0 Static - - direct Include

Device Configuration Policies (Settings Catalog)

This section contains a list of all device configuration policies available in Intune.

Attack Surface Reduction Rules

Consolidated rules for attack surface reduction.

createdDateTime creationSource description lastModifiedDateTime name platforms priorityMetaData roleScopeTagIds settingCount technologies id templateReference
08/04/2023 20:37:10 Migration_DI_643b593b-bf98-4d22-adfc-b2374fddb13c Consolidated rules for attack surface reduction. 12/13/2024 18:05:59 Attack Surface Reduction Rules windows10 0 5 mdm,microsoftSense 2b4307b1-9283-4e43-85ee-7c2d53441a7f @{templateId=e8c053d6-9f95-42b1-a7f1-ebfd71c67a4b_1; templateFamily=endpointSecurityAttackSurfaceReduction; templateDisplayName=Attack Surface Reduction Rules; templateDisplayVersion=Version 1}

Assignments

Name MemberCount GroupType DynamicRule Intent Source AssignType
All Users - BuilIn - - direct Include

Settings

DisplayName ID Path Value ValueName
Attack Surface Reduction Only Exclusions device_vendor_msft_policy_config_defender_attacksurfacereductiononlyexclusions Defender C:\Program Files (x86)\KnowBe4\Second Chance\
Block process creations originating from PSExec and WMI commands device_vendor_msft_policy_config_defender_attacksurfacereductionrules_blockprocesscreationsfrompsexecandwmicommands Defender block Block
Block Adobe Reader from creating child processes device_vendor_msft_policy_config_defender_attacksurfacereductionrules_blockadobereaderfromcreatingchildprocesses Defender block Block
Block executable content from email client and webmail device_vendor_msft_policy_config_defender_attacksurfacereductionrules_blockexecutablecontentfromemailclientandwebmail Defender audit Audit
Block all Office applications from creating child processes device_vendor_msft_policy_config_defender_attacksurfacereductionrules_blockallofficeapplicationsfromcreatingchildprocesses Defender block Block
Block Office communication application from creating child processes device_vendor_msft_policy_config_defender_attacksurfacereductionrules_blockofficecommunicationappfromcreatingchildprocesses Defender block Block
Block execution of potentially obfuscated scripts device_vendor_msft_policy_config_defender_attacksurfacereductionrules_blockexecutionofpotentiallyobfuscatedscripts Defender block Block
Block Win32 API calls from Office macros device_vendor_msft_policy_config_defender_attacksurfacereductionrules_blockwin32apicallsfromofficemacros Defender block Block
Block executable files from running unless they meet a prevalence, age, or trusted list criterion device_vendor_msft_policy_config_defender_attacksurfacereductionrules_blockexecutablefilesrunningunlesstheymeetprevalenceagetrustedlistcriterion Defender audit Audit
Block credential stealing from the Windows local security authority subsystem device_vendor_msft_policy_config_defender_attacksurfacereductionrules_blockcredentialstealingfromwindowslocalsecurityauthoritysubsystem Defender block Block
Block JavaScript or VBScript from launching downloaded executable content device_vendor_msft_policy_config_defender_attacksurfacereductionrules_blockjavascriptorvbscriptfromlaunchingdownloadedexecutablecontent Defender audit Audit
Block untrusted and unsigned processes that run from USB device_vendor_msft_policy_config_defender_attacksurfacereductionrules_blockuntrustedunsignedprocessesthatrunfromusb Defender block Block
Block persistence through WMI event subscription device_vendor_msft_policy_config_defender_attacksurfacereductionrules_blockpersistencethroughwmieventsubscription Defender audit Audit
Block abuse of exploited vulnerable signed drivers (Device) device_vendor_msft_policy_config_defender_attacksurfacereductionrules_blockabuseofexploitedvulnerablesigneddrivers Defender block Block
Block Office applications from creating executable content device_vendor_msft_policy_config_defender_attacksurfacereductionrules_blockofficeapplicationsfromcreatingexecutablecontent Defender audit Audit
Block Office applications from injecting code into other processes device_vendor_msft_policy_config_defender_attacksurfacereductionrules_blockofficeapplicationsfrominjectingcodeintootherprocesses Defender block Block
Use advanced protection against ransomware device_vendor_msft_policy_config_defender_attacksurfacereductionrules_useadvancedprotectionagainstransomware Defender block Block
Enable Controlled Folder Access device_vendor_msft_policy_config_defender_enablecontrolledfolderaccess Defender 2 Audit Mode
Controlled Folder Access Protected Folders device_vendor_msft_policy_config_defender_controlledfolderaccessprotectedfolders Defender C:\Users
Controlled Folder Access Allowed Applications device_vendor_msft_policy_config_defender_controlledfolderaccessallowedapplications Defender System.Object[]

Block process creation PSExec and WMI

Block process creations originating from PSExec and WMI commands

createdDateTime creationSource description lastModifiedDateTime name platforms priorityMetaData roleScopeTagIds settingCount technologies id templateReference
11/04/2022 19:13:51 Block process creations originating from PSExec and WMI commands 11/04/2022 19:13:51 Block process creation PSExec and WMI windows10 0 1 mdm,microsoftSense f0c85af1-422f-4bee-83cd-460581bb4bc7 @{templateId=e8c053d6-9f95-42b1-a7f1-ebfd71c67a4b_1; templateFamily=endpointSecurityAttackSurfaceReduction; templateDisplayName=Attack Surface Reduction Rules; templateDisplayVersion=Version 1}

Assignments

Name MemberCount GroupType DynamicRule Intent Source AssignType
All Users - BuilIn - - direct Include

Settings

DisplayName ID Path Value ValueName
Block process creations originating from PSExec and WMI commands device_vendor_msft_policy_config_defender_attacksurfacereductionrules_blockprocesscreationsfrompsexecandwmicommands Defender block Block

BlockAdobeCreateChildProcess

createdDateTime creationSource description lastModifiedDateTime name platforms priorityMetaData roleScopeTagIds settingCount technologies id templateReference
05/31/2022 16:42:35 12/05/2022 21:05:20 BlockAdobeCreateChildProcess windows10 0 1 mdm,microsoftSense ef304928-5e58-4e29-b180-7251d52f76f4 @{templateId=e8c053d6-9f95-42b1-a7f1-ebfd71c67a4b_1; templateFamily=endpointSecurityAttackSurfaceReduction; templateDisplayName=Attack Surface Reduction Rules; templateDisplayVersion=Version 1}

Assignments

Name MemberCount GroupType DynamicRule Intent Source AssignType
All Users - BuilIn - - direct Include
All Devices - BuilIn - - direct Include

Settings

DisplayName ID Path Value ValueName
Block Adobe Reader from creating child processes device_vendor_msft_policy_config_defender_attacksurfacereductionrules_blockadobereaderfromcreatingchildprocesses Defender audit Audit

BlockExecutableFromEmail Audit

Block executable content from email client and webmail

createdDateTime creationSource description lastModifiedDateTime name platforms priorityMetaData roleScopeTagIds settingCount technologies id templateReference
11/04/2022 21:43:09 Block executable content from email client and webmail 11/04/2022 21:43:09 BlockExecutableFromEmail Audit windows10 0 1 mdm,microsoftSense 49bbc575-9998-4471-9fef-b1b1c8aa2ce0 @{templateId=e8c053d6-9f95-42b1-a7f1-ebfd71c67a4b_1; templateFamily=endpointSecurityAttackSurfaceReduction; templateDisplayName=Attack Surface Reduction Rules; templateDisplayVersion=Version 1}

Assignments

Name MemberCount GroupType DynamicRule Intent Source AssignType
All Users - BuilIn - - direct Include
All Devices - BuilIn - - direct Include

Settings

DisplayName ID Path Value ValueName
Block executable content from email client and webmail device_vendor_msft_policy_config_defender_attacksurfacereductionrules_blockexecutablecontentfromemailclientandwebmail Defender audit Audit

BlockOfficeCreateProcessRule

Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability:
https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/

createdDateTime creationSource description lastModifiedDateTime name platforms priorityMetaData roleScopeTagIds settingCount technologies id templateReference
05/31/2022 16:36:53 Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability: https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/ 05/31/2022 19:03:07 BlockOfficeCreateProcessRule windows10 0 1 mdm,microsoftSense 6f656fbb-cc2b-471f-a87d-0758685d6d35 @{templateId=e8c053d6-9f95-42b1-a7f1-ebfd71c67a4b_1; templateFamily=endpointSecurityAttackSurfaceReduction; templateDisplayName=Attack Surface Reduction Rules; templateDisplayVersion=Version 1}

Assignments

Name MemberCount GroupType DynamicRule Intent Source AssignType
All Users - BuilIn - - direct Include
All Devices - BuilIn - - direct Include

Settings

DisplayName ID Path Value ValueName
Block Office communication application from creating child processes device_vendor_msft_policy_config_defender_attacksurfacereductionrules_blockofficecommunicationappfromcreatingchildprocesses Defender audit Audit
Block all Office applications from creating child processes device_vendor_msft_policy_config_defender_attacksurfacereductionrules_blockallofficeapplicationsfromcreatingchildprocesses Defender audit Audit

CIS Administrative Template

Section 3 of CIS L1. This does not cover the Bitlock (BL) settings covered in section 3 of CIS. Certain options regarding Microsoft account have been ignored as we still use Microsoft accounts.

createdDateTime creationSource description lastModifiedDateTime name platforms priorityMetaData roleScopeTagIds settingCount technologies id templateReference
12/13/2024 23:40:59 Section 3 of CIS L1. This does not cover the Bitlock (BL) settings covered in section 3 of CIS. Certain options regarding Microsoft account have been ignored as we still use Microsoft accounts. 02/26/2025 16:45:18 CIS Administrative Template windows10 0 87 mdm d37cf123-126c-4286-ab62-b9b0c3668b36 @{templateId=; templateFamily=none; templateDisplayName=; templateDisplayVersion=}

Assignments

Name MemberCount GroupType DynamicRule Intent Source AssignType
All Devices - BuilIn - - direct Include

Settings

DisplayName ID Path Value ValueName
Apply UAC restrictions to local accounts on network logons device_vendor_msft_policy_config_mssecurityguide_applyuacrestrictionstolocalaccountsonnetworklogon Administrative Templates\MS Security Guide 1 Enabled
Configure SMB v1 client driver device_vendor_msft_policy_config_mssecurityguide_configuresmbv1clientdriver Administrative Templates\MS Security Guide 1 Enabled
Configure SMB v1 server device_vendor_msft_policy_config_mssecurityguide_configuresmbv1server Administrative Templates\MS Security Guide 0 Disabled
Enable Structured Exception Handling Overwrite Protection (SEHOP) device_vendor_msft_policy_config_mssecurityguide_enablestructuredexceptionhandlingoverwriteprotection Administrative Templates\MS Security Guide 1 Enabled
WDigest Authentication (disabling may require KB2871997) device_vendor_msft_policy_config_mssecurityguide_wdigestauthentication Administrative Templates\MS Security Guide 0 Disabled
MSS: (AutoAdminLogon) Enable Automatic Logon (not recommended) device_vendor_msft_policy_config_admx_mss-legacy_pol_mss_autoadminlogon Administrative Templates\MSS (Legacy) 0 Disabled
MSS: (DisableIPSourceRouting IPv6) IP source routing protection level (protects against packet spoofing) device_vendor_msft_policy_config_msslegacy_ipv6sourceroutingprotectionlevel Administrative Templates\MSS (Legacy) 1 Enabled
MSS: (DisableIPSourceRouting) IP source routing protection level (protects against packet spoofing) device_vendor_msft_policy_config_msslegacy_ipsourceroutingprotectionlevel Administrative Templates\MSS (Legacy) 1 Enabled
MSS: (EnableICMPRedirect) Allow ICMP redirects to override OSPF generated routes device_vendor_msft_policy_config_msslegacy_allowicmpredirectstooverrideospfgeneratedroutes Administrative Templates\MSS (Legacy) 0 Disabled
MSS: (NoNameReleaseOnDemand) Allow the computer to ignore NetBIOS name release requests except from WINS servers device_vendor_msft_policy_config_msslegacy_allowthecomputertoignorenetbiosnamereleaserequestsexceptfromwinsservers Administrative Templates\MSS (Legacy) 1 Enabled
MSS: (SafeDllSearchMode) Enable Safe DLL search mode (recommended) device_vendor_msft_policy_config_admx_mss-legacy_pol_mss_safedllsearchmode Administrative Templates\MSS (Legacy) 1 Enabled
MSS: (ScreenSaverGracePeriod) The time in seconds before the screen saver grace period expires (0 recommended) device_vendor_msft_policy_config_admx_mss-legacy_pol_mss_screensavergraceperiod Administrative Templates\MSS (Legacy) 1 Enabled
MSS: (WarningLevel) Percentage threshold for the security event log at which the system will generate a warning device_vendor_msft_policy_config_admx_mss-legacy_pol_mss_warninglevel Administrative Templates\MSS (Legacy) 1 Enabled
Turn off multicast name resolution device_vendor_msft_policy_config_admx_dnsclient_turn_off_multicast Administrative Templates\Network\DNS Client 1 Enabled
Prohibit installation and configuration of Network Bridge on your DNS domain network device_vendor_msft_policy_config_connectivity_prohibitinstallationandconfigurationofnetworkbridge Administrative Templates\Network\Network Connections 1 Enabled
Prohibit use of Internet Connection Sharing on your DNS domain network device_vendor_msft_policy_config_admx_networkconnections_nc_showsharedaccessui Administrative Templates\Network\Network Connections 1 Enabled
Minimize the number of simultaneous connections to the Internet or a Windows Domain device_vendor_msft_policy_config_admx_wcm_wcm_minimizeconnections Administrative Templates\Network\Windows Connection Manager 1 Enabled
Prohibit connection to non-domain networks when connected to domain authenticated network device_vendor_msft_policy_config_windowsconnectionmanager_prohitconnectiontonondomainnetworkswhenconnectedtodomainauthenticatednetwork Administrative Templates\Network\Windows Connection Manager 1 Enabled
Allow Print Spooler to accept client connections device_vendor_msft_policy_config_admx_printing2_registerspoolerremoterpcendpoint Administrative Templates\Printers 0 Disabled
Point and Print Restrictions device_vendor_msft_policy_config_printers_pointandprintrestrictions Administrative Templates\Printers 1 Enabled
Turn off toast notifications on the lock screen (User) user_vendor_msft_policy_config_admx_wpn_nolockscreentoastnotification Administrative Templates\Start Menu and Taskbar\Notifications 1 Enabled
Include command line in process creation events device_vendor_msft_policy_config_admx_auditsettings_includecmdline Administrative Templates\System\Audit Process Creation 1 Enabled
Encryption Oracle Remediation device_vendor_msft_policy_config_admx_credssp_allowencryptionoracle Administrative Templates\System\Credentials Delegation 1 Enabled
Remote host allows delegation of non-exportable credentials device_vendor_msft_policy_config_credentialsdelegation_remotehostallowsdelegationofnonexportablecredentials Administrative Templates\System\Credentials Delegation 1 Enabled
Remove Change Password (User) user_vendor_msft_policy_config_admx_ctrlaltdel_disablechangepassword Administrative Templates\System\Ctrl+Alt+Del Options 1 Enabled
Prevent device metadata retrieval from the Internet device_vendor_msft_policy_config_deviceinstallation_preventdevicemetadatafromnetwork Administrative Templates\System\Device Installation 1 Enabled
Boot-Start Driver Initialization Policy device_vendor_msft_policy_config_system_bootstartdriverinitialization Administrative Templates\System\Early Launch Antimalware 1 Enabled
Configure registry policy processing device_vendor_msft_policy_config_admx_grouppolicy_cse_registry Administrative Templates\System\Group Policy 1 Enabled
Configure security policy processing device_vendor_msft_policy_config_admx_grouppolicy_cse_security Administrative Templates\System\Group Policy 1 Enabled
Turn off background refresh of Group Policy device_vendor_msft_policy_config_admx_grouppolicy_disablebackgroundpolicy Administrative Templates\System\Group Policy 0 Disabled
Turn off downloading of print drivers over HTTP device_vendor_msft_policy_config_connectivity_disabledownloadingofprintdriversoverhttp Administrative Templates\System\Internet Communication Management\Internet Communication settings 1 Enabled
Turn off Internet download for Web publishing and online ordering wizards device_vendor_msft_policy_config_connectivity_disableinternetdownloadforwebpublishingandonlineorderingwizards Administrative Templates\System\Internet Communication Management\Internet Communication settings 1 Enabled
Block user from showing account details on sign-in device_vendor_msft_policy_config_admx_logon_blockuserfromshowingaccountdetailsonsignin Administrative Templates\System\Logon 1 Enabled
Do not display network selection UI device_vendor_msft_policy_config_windowslogon_dontdisplaynetworkselectionui Administrative Templates\System\Logon 1 Enabled
Do not enumerate connected users on domain-joined computers device_vendor_msft_policy_config_admx_logon_dontenumerateconnectedusers Administrative Templates\System\Logon 1 Enabled
Enumerate local users on domain-joined computers device_vendor_msft_policy_config_windowslogon_enumeratelocalusersondomainjoinedcomputers Administrative Templates\System\Logon 0 Disabled
Turn off app notifications on the lock screen device_vendor_msft_policy_config_windowslogon_disablelockscreenappnotifications Administrative Templates\System\Logon 1 Enabled
Turn off picture password sign-in device_vendor_msft_policy_config_credentialproviders_blockpicturepassword Administrative Templates\System\Logon 1 Enabled
Allow network connectivity during connected-standby (on battery) device_vendor_msft_policy_config_admx_power_dcconnectivityinstandby_2 Administrative Templates\System\Power Management\Sleep Settings 0 Disabled
Allow network connectivity during connected-standby (plugged in) device_vendor_msft_policy_config_admx_power_acconnectivityinstandby_2 Administrative Templates\System\Power Management\Sleep Settings 0 Disabled
Require a password when a computer wakes (on battery) device_vendor_msft_policy_config_power_requirepasswordwhencomputerwakesonbattery Administrative Templates\System\Power Management\Sleep Settings 1 Enabled
Require a password when a computer wakes (plugged in) device_vendor_msft_policy_config_power_requirepasswordwhencomputerwakespluggedin Administrative Templates\System\Power Management\Sleep Settings 1 Enabled
Configure Offer Remote Assistance device_vendor_msft_policy_config_remoteassistance_unsolicitedremoteassistance Administrative Templates\System\Remote Assistance 0 Disabled
Configure Solicited Remote Assistance device_vendor_msft_policy_config_remoteassistance_solicitedremoteassistance Administrative Templates\System\Remote Assistance 0 Disabled
Enable RPC Endpoint Mapper Client Authentication device_vendor_msft_policy_config_remoteprocedurecall_rpcendpointmapperclientauthentication Administrative Templates\System\Remote Procedure Call 1 Enabled
Enable Windows NTP Client device_vendor_msft_policy_config_admx_w32time_w32time_policy_enable_ntpclient Administrative Templates\System\Windows Time Service\Time Providers 1 Enabled
Enable Windows NTP Server device_vendor_msft_policy_config_admx_w32time_w32time_policy_enable_ntpserver Administrative Templates\System\Windows Time Service\Time Providers 0 Disabled
Do not preserve zone information in file attachments (User) user_vendor_msft_policy_config_attachmentmanager_donotpreservezoneinformation Administrative Templates\Windows Components\Attachment Manager 0 Disabled
Notify antivirus programs when opening attachments (User) user_vendor_msft_policy_config_attachmentmanager_notifyantivirusprograms Administrative Templates\Windows Components\Attachment Manager 1 Enabled
Do not display the password reveal button device_vendor_msft_policy_config_credentialsui_disablepasswordreveal Administrative Templates\Windows Components\Credential User Interface 1 Enabled
Enumerate administrator accounts on elevation device_vendor_msft_policy_config_credentialsui_enumerateadministrators Administrative Templates\Windows Components\Credential User Interface 0 Disabled
Prevent the use of security questions for local accounts device_vendor_msft_policy_config_admx_credui_nolocalpasswordresetquestions Administrative Templates\Windows Components\Credential User Interface 1 Enabled
Control Event Log behavior when the log file reaches its maximum size device_vendor_msft_policy_config_eventlogservice_controleventlogbehavior Administrative Templates\Windows Components\Event Log Service\Application 0 Disabled
Specify the maximum log file size (KB) device_vendor_msft_policy_config_eventlogservice_specifymaximumfilesizeapplicationlog Administrative Templates\Windows Components\Event Log Service\Application 1 Enabled
Control Event Log behavior when the log file reaches its maximum size device_vendor_msft_policy_config_admx_eventlog_channel_log_retention_2 Administrative Templates\Windows Components\Event Log Service\Security 0 Disabled
Specify the maximum log file size (KB) device_vendor_msft_policy_config_eventlogservice_specifymaximumfilesizesecuritylog Administrative Templates\Windows Components\Event Log Service\Security 1 Enabled
Control Event Log behavior when the log file reaches its maximum size device_vendor_msft_policy_config_admx_eventlog_channel_log_retention_3 Administrative Templates\Windows Components\Event Log Service\Setup 0 Disabled
Specify the maximum log file size (KB) device_vendor_msft_policy_config_admx_eventlog_channel_logmaxsize_3 Administrative Templates\Windows Components\Event Log Service\Setup 1 Enabled
Control Event Log behavior when the log file reaches its maximum size device_vendor_msft_policy_config_admx_eventlog_channel_log_retention_4 Administrative Templates\Windows Components\Event Log Service\System 0 Disabled
Specify the maximum log file size (KB) device_vendor_msft_policy_config_eventlogservice_specifymaximumfilesizesystemlog Administrative Templates\Windows Components\Event Log Service\System 1 Enabled
Configure Windows Defender SmartScreen device_vendor_msft_policy_config_admx_windowsexplorer_enablesmartscreen Administrative Templates\Windows Components\File Explorer 1 Enabled
Turn off Data Execution Prevention for Explorer device_vendor_msft_policy_config_fileexplorer_turnoffdataexecutionpreventionforexplorer Administrative Templates\Windows Components\File Explorer 0 Disabled
Turn off heap termination on corruption device_vendor_msft_policy_config_fileexplorer_turnoffheapterminationoncorruption Administrative Templates\Windows Components\File Explorer 0 Disabled
Turn off shell protocol protected mode device_vendor_msft_policy_config_admx_windowsexplorer_shellprotocolprotectedmodetitle_2 Administrative Templates\Windows Components\File Explorer 0 Disabled
Prevent the computer from joining a homegroup device_vendor_msft_policy_config_admx_sharing_disablehomegroup Administrative Templates\Windows Components\HomeGroup 1 Enabled
Configure local setting override for reporting to Microsoft MAPS device_vendor_msft_policy_config_admx_microsoftdefenderantivirus_spynet_localsettingoverridespynetreporting Administrative Templates\ Windows Components\ Microsoft Defender Antivirus\MAPS 0 Disabled
Turn off Microsoft Defender Antivirus device_vendor_msft_policy_config_admx_microsoftdefenderantivirus_disableantispywaredefender Administrative Templates\ Windows Components\ Microsoft Defender Antivirus 0 Disabled
Prevent users from sharing files within their profile. (User) user_vendor_msft_policy_config_admx_sharing_noinplacesharing Administrative Templates\Windows Components\Network Sharing 1 Enabled
Do not allow passwords to be saved device_vendor_msft_policy_config_remotedesktopservices_donotallowpasswordsaving Administrative Templates\Windows Components\Remote Desktop Services\Remote Desktop Connection Client 1 Enabled
Do not allow drive redirection device_vendor_msft_policy_config_remotedesktopservices_donotallowdriveredirection Administrative Templates\Windows Components\Remote Desktop Services\Remote Desktop Session Host\Device and Resource Redirection 1 Enabled
Always prompt for password upon connection device_vendor_msft_policy_config_remotedesktopservices_promptforpassworduponconnection Administrative Templates\Windows Components\Remote Desktop Services\Remote Desktop Session Host\Security 0 Disabled
Require secure RPC communication device_vendor_msft_policy_config_remotedesktopservices_requiresecurerpccommunication Administrative Templates\Windows Components\Remote Desktop Services\Remote Desktop Session Host\Security 0 Disabled
Require use of specific security layer for remote (RDP) connections device_vendor_msft_policy_config_admx_terminalserver_ts_security_layer_policy Administrative Templates\Windows Components\Remote Desktop Services\Remote Desktop Session Host\Security 0 Disabled
Require user authentication for remote connections by using Network Level Authentication device_vendor_msft_policy_config_admx_terminalserver_ts_user_authentication_policy Administrative Templates\Windows Components\Remote Desktop Services\Remote Desktop Session Host\Security 0 Disabled
Set client connection encryption level device_vendor_msft_policy_config_remotedesktopservices_clientconnectionencryptionlevel Administrative Templates\Windows Components\Remote Desktop Services\Remote Desktop Session Host\Security 0 Disabled
Do not delete temp folders upon exit device_vendor_msft_policy_config_admx_terminalserver_ts_temp_delete Administrative Templates\Windows Components\Remote Desktop Services\Remote Desktop Session Host\Temporary folders 0 Disabled
Prevent downloading of enclosures device_vendor_msft_policy_config_internetexplorer_disableenclosuredownloading Administrative Templates\Windows Components\RSS Feeds 1 Enabled
Turn off the offer to update to the latest version of Windows device_vendor_msft_policy_config_admx_windowsstore_disableosupgrade_2 Administrative Templates\Windows Components\Store 1 Enabled
Sign-in and lock last interactive user automatically after a restart device_vendor_msft_policy_config_windowslogon_allowautomaticrestartsignon Administrative Templates\Windows Components\Windows Logon Options 0 Disabled
Turn on PowerShell Script Block Logging device_vendor_msft_policy_config_windowspowershell_turnonpowershellscriptblocklogging Administrative Templates\Windows Components\Windows PowerShell 1 Enabled
Turn on PowerShell Transcription device_vendor_msft_policy_config_admx_powershellexecutionpolicy_enabletranscripting Administrative Templates\Windows Components\Windows PowerShell 1 Enabled
Allow Basic authentication device_vendor_msft_policy_config_remotemanagement_allowbasicauthentication_client Administrative Templates\Windows Components\Windows Remote Management (WinRM)\WinRM Client 0 Disabled
Allow unencrypted traffic device_vendor_msft_policy_config_remotemanagement_allowunencryptedtraffic_client Administrative Templates\Windows Components\Windows Remote Management (WinRM)\WinRM Client 0 Disabled
Disallow Digest authentication device_vendor_msft_policy_config_remotemanagement_disallowdigestauthentication Administrative Templates\Windows Components\Windows Remote Management (WinRM)\WinRM Client 1 Enabled
Allow Basic authentication device_vendor_msft_policy_config_remotemanagement_allowbasicauthentication_service Administrative Templates\Windows Components\Windows Remote Management (WinRM)\WinRM Service 0 Disabled
Allow unencrypted traffic device_vendor_msft_policy_config_remotemanagement_allowunencryptedtraffic_service Administrative Templates\Windows Components\Windows Remote Management (WinRM)\WinRM Service 0 Disabled
Disallow WinRM from storing RunAs credentials device_vendor_msft_policy_config_remotemanagement_disallowstoringofrunascredentials Administrative Templates\Windows Components\Windows Remote Management (WinRM)\WinRM Service 1 Enabled

CIS Auditing

This covers section 5 of the CIS L1 standards.

createdDateTime creationSource description lastModifiedDateTime name platforms priorityMetaData roleScopeTagIds settingCount technologies id templateReference
12/17/2024 21:05:47 This covers section 5 of the CIS L1 standards. 12/17/2024 23:36:50 CIS Auditing windows10 0 25 mdm e02fee80-f1e1-4c80-b4c2-d3995f080941 @{templateId=; templateFamily=none; templateDisplayName=; templateDisplayVersion=}

Assignments

Name MemberCount GroupType DynamicRule Intent Source AssignType
All Devices - BuilIn - - direct Include

Settings

DisplayName ID Path Value ValueName
Account Logon Audit Credential Validation device_vendor_msft_policy_config_audit_accountlogon_auditcredentialvalidation Auditing 3 Success+ Failure
Account Logon Logoff Audit Account Lockout device_vendor_msft_policy_config_audit_accountlogonlogoff_auditaccountlockout Auditing 2 Failure
Account Logon Logoff Audit Group Membership device_vendor_msft_policy_config_audit_accountlogonlogoff_auditgroupmembership Auditing 1 Success
Account Logon Logoff Audit Logoff device_vendor_msft_policy_config_audit_accountlogonlogoff_auditlogoff Auditing 1 Success
Account Logon Logoff Audit Logon device_vendor_msft_policy_config_audit_accountlogonlogoff_auditlogon Auditing 3 Success+ Failure
Account Management Audit Application Group Management device_vendor_msft_policy_config_audit_accountmanagement_auditapplicationgroupmanagement Auditing 3 Success+ Failure
Audit Authentication Policy Change device_vendor_msft_policy_config_audit_policychange_auditauthenticationpolicychange Auditing 1 Success
Audit Changes to Audit Policy device_vendor_msft_policy_config_audit_policychange_auditpolicychange Auditing 1 Success
Audit File Share Access device_vendor_msft_policy_config_audit_objectaccess_auditfileshare Auditing 3 Success+Failure
Audit Other Logon Logoff Events device_vendor_msft_policy_config_audit_accountlogonlogoff_auditotherlogonlogoffevents Auditing 3 Success+Failure
Audit Security Group Management device_vendor_msft_policy_config_audit_accountmanagement_auditsecuritygroupmanagement Auditing 1 Success
Audit Security System Extension device_vendor_msft_policy_config_audit_system_auditsecuritysystemextension Auditing 1 Success
Audit Special Logon device_vendor_msft_policy_config_audit_accountlogonlogoff_auditspeciallogon Auditing 1 Success
Audit User Account Management device_vendor_msft_policy_config_audit_accountmanagement_audituseraccountmanagement Auditing 3 Success+Failure
Detailed Tracking Audit PNP Activity device_vendor_msft_policy_config_audit_detailedtracking_auditpnpactivity Auditing 1 Success
Detailed Tracking Audit Process Creation device_vendor_msft_policy_config_audit_detailedtracking_auditprocesscreation Auditing 1 Success
Object Access Audit Detailed File Share device_vendor_msft_policy_config_audit_objectaccess_auditdetailedfileshare Auditing 2 Failure
Object Access Audit Other Object Access Events device_vendor_msft_policy_config_audit_objectaccess_auditotherobjectaccessevents Auditing 3 Success+ Failure
Object Access Audit Removable Storage device_vendor_msft_policy_config_audit_objectaccess_auditremovablestorage Auditing 3 Success+ Failure
Policy Change Audit MPSSVC Rule Level Policy Change device_vendor_msft_policy_config_audit_policychange_auditmpssvcrulelevelpolicychange Auditing 3 Success+ Failure
Policy Change Audit Other Policy Change Events device_vendor_msft_policy_config_audit_policychange_auditotherpolicychangeevents Auditing 2 Failure
System Audit I Psec Driver device_vendor_msft_policy_config_audit_system_auditipsecdriver Auditing 3 Success+ Failure
System Audit Other System Events device_vendor_msft_policy_config_audit_system_auditothersystemevents Auditing 3 Success+ Failure
System Audit Security State Change device_vendor_msft_policy_config_audit_system_auditsecuritystatechange Auditing 1 Success
System Audit System Integrity device_vendor_msft_policy_config_audit_system_auditsystemintegrity Auditing 3 Success+ Failure

CIS Defender

CSI L1 section 21 covering Defender. Includes attack surface reduction rules.

createdDateTime creationSource description lastModifiedDateTime name platforms priorityMetaData roleScopeTagIds settingCount technologies id templateReference
12/18/2024 19:32:25 CSI L1 section 21 covering Defender. Includes attack surface reduction rules. 12/18/2024 19:32:25 CIS Defender windows10 0 9 mdm 3b244e79-f61b-46b5-8d39-fdc03e4fdb83 @{templateId=; templateFamily=none; templateDisplayName=; templateDisplayVersion=}

Assignments

Name MemberCount GroupType DynamicRule Intent Source AssignType
All Devices - BuilIn - - direct Include

Settings

DisplayName ID Path Value ValueName
Allow Behavior Monitoring device_vendor_msft_policy_config_defender_allowbehaviormonitoring Defender 1 Allowed. Turns on real-time behavior monitoring.
Allow Email Scanning device_vendor_msft_policy_config_defender_allowemailscanning Defender 1 Allowed. Turns on email scanning.
Allow Full Scan Removable Drive Scanning device_vendor_msft_policy_config_defender_allowfullscanremovabledrivescanning Defender 1 Allowed. Scans removable drives.
Allow Realtime Monitoring device_vendor_msft_policy_config_defender_allowrealtimemonitoring Defender 1 Allowed. Turns on and runs the real-time monitoring service.
Allow scanning of all downloaded files and attachments device_vendor_msft_policy_config_defender_allowioavprotection Defender 1 Allowed.
Allow Script Scanning device_vendor_msft_policy_config_defender_allowscriptscanning Defender 1 Allowed.
Block abuse of exploited vulnerable signed drivers (Device) device_vendor_msft_policy_config_defender_attacksurfacereductionrules_blockabuseofexploitedvulnerablesigneddrivers Defender block Block
Block Adobe Reader from creating child processes device_vendor_msft_policy_config_defender_attacksurfacereductionrules_blockadobereaderfromcreatingchildprocesses Defender block Block
Block all Office applications from creating child processes device_vendor_msft_policy_config_defender_attacksurfacereductionrules_blockallofficeapplicationsfromcreatingchildprocesses Defender block Block
Block credential stealing from the Windows local security authority subsystem device_vendor_msft_policy_config_defender_attacksurfacereductionrules_blockcredentialstealingfromwindowslocalsecurityauthoritysubsystem Defender block Block
Block executable content from email client and webmail device_vendor_msft_policy_config_defender_attacksurfacereductionrules_blockexecutablecontentfromemailclientandwebmail Defender block Block
Block execution of potentially obfuscated scripts device_vendor_msft_policy_config_defender_attacksurfacereductionrules_blockexecutionofpotentiallyobfuscatedscripts Defender block Block
Block JavaScript or VBScript from launching downloaded executable content device_vendor_msft_policy_config_defender_attacksurfacereductionrules_blockjavascriptorvbscriptfromlaunchingdownloadedexecutablecontent Defender block Block
Block Office applications from creating executable content device_vendor_msft_policy_config_defender_attacksurfacereductionrules_blockofficeapplicationsfromcreatingexecutablecontent Defender block Block
Block Office applications from injecting code into other processes device_vendor_msft_policy_config_defender_attacksurfacereductionrules_blockofficeapplicationsfrominjectingcodeintootherprocesses Defender block Block
Block Office communication application from creating child processes device_vendor_msft_policy_config_defender_attacksurfacereductionrules_blockofficecommunicationappfromcreatingchildprocesses Defender block Block
Block persistence through WMI event subscription device_vendor_msft_policy_config_defender_attacksurfacereductionrules_blockpersistencethroughwmieventsubscription Defender block Block
Block untrusted and unsigned processes that run from USB device_vendor_msft_policy_config_defender_attacksurfacereductionrules_blockuntrustedunsignedprocessesthatrunfromusb Defender block Block
Block Win32 API calls from Office macros device_vendor_msft_policy_config_defender_attacksurfacereductionrules_blockwin32apicallsfromofficemacros Defender block Block
Enable Network Protection device_vendor_msft_policy_config_defender_enablenetworkprotection Defender 1 Enabled (block mode)
PUA Protection device_vendor_msft_policy_config_defender_puaprotection Defender 1 PUA Protection on. Detected items are blocked. They will show in history along with other threats.

CIS Delivery Optimization

CIS L1 section 22 on Delivery Optimization.

createdDateTime creationSource description lastModifiedDateTime name platforms priorityMetaData roleScopeTagIds settingCount technologies id templateReference
12/18/2024 20:04:54 CIS L1 section 22 on Delivery Optimization. 12/18/2024 20:04:54 CIS Delivery Optimization windows10 0 1 mdm 29c1349d-38d2-4dda-81e0-c9bff08c4cbb @{templateId=; templateFamily=none; templateDisplayName=; templateDisplayVersion=}

Assignments

Name MemberCount GroupType DynamicRule Intent Source AssignType
All Devices - BuilIn - - direct Include

Settings

DisplayName ID Path Value ValueName
DO Download Mode device_vendor_msft_policy_config_deliveryoptimization_dodownloadmode Delivery Optimization 0 HTTP only, no peering

CIS Device Guard

CIS L1 containg information on section 22, Device Guard.

createdDateTime creationSource description lastModifiedDateTime name platforms priorityMetaData roleScopeTagIds settingCount technologies id templateReference
12/18/2024 21:51:14 CIS L1 containg information on section 22, Device Guard. 02/27/2025 19:04:27 CIS Device Guard windows10 0 4 mdm f3a58c40-19be-44ea-9aa0-93cea6709b13 @{templateId=; templateFamily=none; templateDisplayName=; templateDisplayVersion=}

Assignments

Name MemberCount GroupType DynamicRule Intent Source AssignType
All Devices - BuilIn - - direct Include

Settings

DisplayName ID Path Value ValueName
Configure System Guard Launch device_vendor_msft_policy_config_deviceguard_configuresystemguardlaunch Device Guard 1 Unmanaged Enables Secure Launch if supported by hardware
Credential Guard device_vendor_msft_policy_config_deviceguard_lsacfgflags Device Guard 2 (Enabled without lock) Turns on Credential Guard without UEFI lock.
Enable Virtualization Based Security device_vendor_msft_policy_config_deviceguard_enablevirtualizationbasedsecurity Device Guard 1 enable virtualization based security.
Require Platform Security Features device_vendor_msft_policy_config_deviceguard_requireplatformsecurityfeatures Device Guard 1 Turns on VBS with Secure Boot.

CIS Device Lock

CIS L1 section 24 regarding device lock. Mostly involves local account password complexity requirements. Does not effect Entra ID.

createdDateTime creationSource description lastModifiedDateTime name platforms priorityMetaData roleScopeTagIds settingCount technologies id templateReference
12/18/2024 22:56:59 CIS L1 section 24 regarding device lock. Mostly involves local account password complexity requirements. Does not effect Entra ID. 12/18/2024 22:56:59 CIS Device Lock windows10 0 2 mdm 19263b12-0099-478d-99a2-beb4f2dd8445 @{templateId=; templateFamily=none; templateDisplayName=; templateDisplayVersion=}

Assignments

Name MemberCount GroupType DynamicRule Intent Source AssignType
All Devices - BuilIn - - direct Include

Settings

DisplayName ID Path Value ValueName
Device Password Enabled device_vendor_msft_policy_config_devicelock_devicepasswordenabled Device Lock 0 Enabled
Minimum Password Age device_vendor_msft_policy_config_devicelock_minimumpasswordage Device Lock 1

CIS Experience

CIS L1 section 30 regarding experience.

createdDateTime creationSource description lastModifiedDateTime name platforms priorityMetaData roleScopeTagIds settingCount technologies id templateReference
12/18/2024 23:07:59 CIS L1 section 30 regarding experience. 12/18/2024 23:07:59 CIS Experience windows10 0 4 mdm 21055f6a-4e20-4dab-8eed-0804f5a1b4cc @{templateId=; templateFamily=none; templateDisplayName=; templateDisplayVersion=}

Assignments

Name MemberCount GroupType DynamicRule Intent Source AssignType
All Devices - BuilIn - - direct Include

Settings

DisplayName ID Path Value ValueName
Allow Cortana device_vendor_msft_policy_config_experience_allowcortana Experience 0 Block
Allow Spotlight Collection (User) user_vendor_msft_policy_config_experience_allowspotlightcollection Experience 0
Disable Consumer Account State Content device_vendor_msft_policy_config_experience_disableconsumeraccountstatecontent Experience 1 Enabled.
Do Not Show Feedback Notifications device_vendor_msft_policy_config_experience_donotshowfeedbacknotifications Experience 1 Feedback notifications are disabled.

CIS Firewall

CIS L1 section 35 containing information on Firewall.

createdDateTime creationSource description lastModifiedDateTime name platforms priorityMetaData roleScopeTagIds settingCount technologies id templateReference
12/18/2024 23:57:47 CIS L1 section 35 containing information on Firewall. 01/10/2025 15:50:08 CIS Firewall windows10 0 3 mdm 62924d10-aa4e-48db-80aa-823f6a70c3b6 @{templateId=; templateFamily=none; templateDisplayName=; templateDisplayVersion=}

Assignments

Name MemberCount GroupType DynamicRule Intent Source AssignType
All Devices - BuilIn - - direct Include

Settings

DisplayName ID Path Value ValueName
Enable Domain Network Firewall vendor_msft_firewall_mdmstore_domainprofile_enablefirewall Firewall true True
Enable Private Network Firewall vendor_msft_firewall_mdmstore_privateprofile_enablefirewall Firewall true True
Enable Public Network Firewall vendor_msft_firewall_mdmstore_publicprofile_enablefirewall Firewall true True

CIS Lanman Workstation

CIS L1 section 42 containg information on Lanman Workstations

createdDateTime creationSource description lastModifiedDateTime name platforms priorityMetaData roleScopeTagIds settingCount technologies id templateReference
12/19/2024 16:00:28 CIS L1 section 42 containg information on Lanman Workstations 12/19/2024 16:00:28 CIS Lanman Workstation windows10 0 1 mdm d83fcbf9-ebd8-4e8f-ba06-0486e2e43fdf @{templateId=; templateFamily=none; templateDisplayName=; templateDisplayVersion=}

Assignments

Name MemberCount GroupType DynamicRule Intent Source AssignType
All Devices - BuilIn - - direct Include

Settings

DisplayName ID Path Value ValueName
Enable Insecure Guest Logons device_vendor_msft_policy_config_lanmanworkstation_enableinsecureguestlogons Lanman Workstation 0 Disabled

CIS Local Policies Security Options (Clients)

CIS local security policies specifically for end user clients, not including lab computers.

createdDateTime creationSource description lastModifiedDateTime name platforms priorityMetaData roleScopeTagIds settingCount technologies id templateReference
02/24/2025 22:20:02 CIS local security policies specifically for end user clients, not including lab computers. 02/27/2025 16:33:29 CIS Local Policies Security Options (Clients) windows10 0 29 mdm 9366ec15-4e4d-4ad7-a2cf-9653d061b209 @{templateId=; templateFamily=none; templateDisplayName=; templateDisplayVersion=}

Assignments

Name MemberCount GroupType DynamicRule Intent Source AssignType
All Devices - BuilIn - - direct Include

Settings

DisplayName ID Path Value ValueName
Accounts Enable Guest Account Status device_vendor_msft_policy_config_localpoliciessecurityoptions_accounts_enableguestaccountstatus Local Policies Security Options 0 Disable
Accounts Limit Local Account Use Of Blank Passwords To Console Logon Only device_vendor_msft_policy_config_localpoliciessecurityoptions_accounts_limitlocalaccountuseofblankpasswordstoconsolelogononly Local Policies Security Options 1 Enabled
Accounts Rename Administrator Account device_vendor_msft_policy_config_localpoliciessecurityoptions_accounts_renameadministratoraccount Local Policies Security Options xen-overseer
Accounts Rename Guest Account device_vendor_msft_policy_config_localpoliciessecurityoptions_accounts_renameguestaccount Local Policies Security Options xen-default-user
Interactive Logon Do Not Display Last Signed In device_vendor_msft_policy_config_localpoliciessecurityoptions_interactivelogon_donotdisplaylastsignedin Local Policies Security Options 0 Disabled (username will be shown)
Microsoft Network Client Digitally Sign Communications Always device_vendor_msft_policy_config_localpoliciessecurityoptions_microsoftnetworkclient_digitallysigncommunicationsalways Local Policies Security Options 1 Enable
Microsoft Network Client Digitally Sign Communications If Server Agrees device_vendor_msft_policy_config_localpoliciessecurityoptions_microsoftnetworkclient_digitallysigncommunicationsifserveragrees Local Policies Security Options 1 Enable
Microsoft Network Client Send Unencrypted Password To Third Party SMB Servers device_vendor_msft_policy_config_localpoliciessecurityoptions_microsoftnetworkclient_sendunencryptedpasswordtothirdpartysmbservers Local Policies Security Options 0 Disable
Microsoft Network Server Digitally Sign Communications Always device_vendor_msft_policy_config_localpoliciessecurityoptions_microsoftnetworkserver_digitallysigncommunicationsalways Local Policies Security Options 1 Enable
Microsoft Network Server Digitally Sign Communications If Client Agrees device_vendor_msft_policy_config_localpoliciessecurityoptions_microsoftnetworkserver_digitallysigncommunicationsifclientagrees Local Policies Security Options 1 Enable
Network Access Do Not Allow Anonymous Enumeration Of SAM Accounts device_vendor_msft_policy_config_localpoliciessecurityoptions_networkaccess_donotallowanonymousenumerationofsamaccounts Local Policies Security Options 1 Enabled
Network Access Do Not Allow Anonymous Enumeration Of Sam Accounts And Shares device_vendor_msft_policy_config_localpoliciessecurityoptions_networkaccess_donotallowanonymousenumerationofsamaccountsandshares Local Policies Security Options 1 Enabled
Network Access Restrict Anonymous Access To Named Pipes And Shares device_vendor_msft_policy_config_localpoliciessecurityoptions_networkaccess_restrictanonymousaccesstonamedpipesandshares Local Policies Security Options 1 Enable
Network Access Restrict Clients Allowed To Make Remote Calls To SAM device_vendor_msft_policy_config_localpoliciessecurityoptions_networkaccess_restrictclientsallowedtomakeremotecallstosam Local Policies Security Options Administrators: Remote Access: Allow
Network Security Allow Local System To Use Computer Identity For NTLM device_vendor_msft_policy_config_localpoliciessecurityoptions_networksecurity_allowlocalsystemtousecomputeridentityforntlm Local Policies Security Options 1 Allow
Network Security Allow PKU2U Authentication Requests device_vendor_msft_policy_config_localpoliciessecurityoptions_networksecurity_allowpku2uauthenticationrequests Local Policies Security Options 1 Allow
Network Security Do Not Store LAN Manager Hash Value On Next Password Change device_vendor_msft_policy_config_localpoliciessecurityoptions_networksecurity_donotstorelanmanagerhashvalueonnextpasswordchange Local Policies Security Options 1 Enable
Network Security LAN Manager Authentication Level device_vendor_msft_policy_config_localpoliciessecurityoptions_networksecurity_lanmanagerauthenticationlevel Local Policies Security Options 5 Send LM and NTLMv2 responses only. Refuse LM and NTLM
Network Security Minimum Session Security For NTLMSSP Based Clients device_vendor_msft_policy_config_localpoliciessecurityoptions_networksecurity_minimumsessionsecurityforntlmsspbasedclients Local Policies Security Options 537395200 Require NTLM and 128-bit encryption
Network Security Minimum Session Security For NTLMSSP Based Servers device_vendor_msft_policy_config_localpoliciessecurityoptions_networksecurity_minimumsessionsecurityforntlmsspbasedservers Local Policies Security Options 537395200 Require NTLM and 128-bit encryption
Network Security Restrict NTLM Audit Incoming NTLM Traffic device_vendor_msft_policy_config_localpoliciessecurityoptions_networksecurity_restrictntlm_auditincomingntlmtraffic Local Policies Security Options 2 Enable auditing for all accounts
User Account Control Behavior Of The Elevation Prompt For Administrators device_vendor_msft_policy_config_localpoliciessecurityoptions_useraccountcontrol_behavioroftheelevationpromptforadministrators Local Policies Security Options 2 Prompt for consent on the secure desktop
User Account Control Behavior Of The Elevation Prompt For Standard Users device_vendor_msft_policy_config_localpoliciessecurityoptions_useraccountcontrol_behavioroftheelevationpromptforstandardusers Local Policies Security Options 0 Automatically deny elevation requests
User Account Control Detect Application Installations And Prompt For Elevation device_vendor_msft_policy_config_localpoliciessecurityoptions_useraccountcontrol_detectapplicationinstallationsandpromptforelevation Local Policies Security Options 1 Enable
User Account Control Only Elevate UI Access Applications That Are Installed In Secure Locations device_vendor_msft_policy_config_localpoliciessecurityoptions_useraccountcontrol_onlyelevateuiaccessapplicationsthatareinstalledinsecurelocations Local Policies Security Options 1 Enabled: Application runs with UIAccess integrity only if it resides in secure location.
User Account Control Run All Administrators In Admin Approval Mode device_vendor_msft_policy_config_localpoliciessecurityoptions_useraccountcontrol_runalladministratorsinadminapprovalmode Local Policies Security Options 1 Enabled
User Account Control Switch To The Secure Desktop When Prompting For Elevation device_vendor_msft_policy_config_localpoliciessecurityoptions_useraccountcontrol_switchtothesecuredesktopwhenpromptingforelevation Local Policies Security Options 1 Enabled
User Account Control Use Admin Approval Mode device_vendor_msft_policy_config_localpoliciessecurityoptions_useraccountcontrol_useadminapprovalmode Local Policies Security Options 1 Enable
User Account Control Virtualize File And Registry Write Failures To Per User Locations device_vendor_msft_policy_config_localpoliciessecurityoptions_useraccountcontrol_virtualizefileandregistrywritefailurestoperuserlocations Local Policies Security Options 1 Enabled

CIS Local Policies Security Options (Lab PC’s)

CIS L1 section 45 containing information on local policies security options. This is specific to LAB computers as some settings are slightly different.

createdDateTime creationSource description lastModifiedDateTime name platforms priorityMetaData roleScopeTagIds settingCount technologies id templateReference
12/19/2024 18:30:57 CIS L1 section 45 containing information on local policies security options. This is specific to LAB computers as some settings are slightly different. 02/27/2025 16:32:37 CIS Local Policies Security Options (Lab PC’s) windows10 0 30 mdm 22f5ecff-e508-4000-9f18-dc30f91aac33 @{templateId=; templateFamily=none; templateDisplayName=; templateDisplayVersion=}

Settings

DisplayName ID Path Value ValueName
Accounts Enable Guest Account Status device_vendor_msft_policy_config_localpoliciessecurityoptions_accounts_enableguestaccountstatus Local Policies Security Options 0 Disable
Accounts Limit Local Account Use Of Blank Passwords To Console Logon Only device_vendor_msft_policy_config_localpoliciessecurityoptions_accounts_limitlocalaccountuseofblankpasswordstoconsolelogononly Local Policies Security Options 1 Enabled
Accounts Rename Administrator Account device_vendor_msft_policy_config_localpoliciessecurityoptions_accounts_renameadministratoraccount Local Policies Security Options xen-overseer
Accounts Rename Guest Account device_vendor_msft_policy_config_localpoliciessecurityoptions_accounts_renameguestaccount Local Policies Security Options xen-default-user
Interactive Logon Do Not Display Last Signed In device_vendor_msft_policy_config_localpoliciessecurityoptions_interactivelogon_donotdisplaylastsignedin Local Policies Security Options 0 Disabled (username will be shown)
Interactive Logon Smart Card Removal Behavior device_vendor_msft_policy_config_localpoliciessecurityoptions_interactivelogon_smartcardremovalbehavior Local Policies Security Options 1 Lock Workstation
Microsoft Network Client Digitally Sign Communications Always device_vendor_msft_policy_config_localpoliciessecurityoptions_microsoftnetworkclient_digitallysigncommunicationsalways Local Policies Security Options 1 Enable
Microsoft Network Client Digitally Sign Communications If Server Agrees device_vendor_msft_policy_config_localpoliciessecurityoptions_microsoftnetworkclient_digitallysigncommunicationsifserveragrees Local Policies Security Options 1 Enable
Microsoft Network Client Send Unencrypted Password To Third Party SMB Servers device_vendor_msft_policy_config_localpoliciessecurityoptions_microsoftnetworkclient_sendunencryptedpasswordtothirdpartysmbservers Local Policies Security Options 0 Disable
Microsoft Network Server Digitally Sign Communications Always device_vendor_msft_policy_config_localpoliciessecurityoptions_microsoftnetworkserver_digitallysigncommunicationsalways Local Policies Security Options 1 Enable
Microsoft Network Server Digitally Sign Communications If Client Agrees device_vendor_msft_policy_config_localpoliciessecurityoptions_microsoftnetworkserver_digitallysigncommunicationsifclientagrees Local Policies Security Options 1 Enable
Network Access Do Not Allow Anonymous Enumeration Of SAM Accounts device_vendor_msft_policy_config_localpoliciessecurityoptions_networkaccess_donotallowanonymousenumerationofsamaccounts Local Policies Security Options 1 Enabled
Network Access Do Not Allow Anonymous Enumeration Of Sam Accounts And Shares device_vendor_msft_policy_config_localpoliciessecurityoptions_networkaccess_donotallowanonymousenumerationofsamaccountsandshares Local Policies Security Options 1 Enabled
Network Access Restrict Anonymous Access To Named Pipes And Shares device_vendor_msft_policy_config_localpoliciessecurityoptions_networkaccess_restrictanonymousaccesstonamedpipesandshares Local Policies Security Options 1 Enable
Network Access Restrict Clients Allowed To Make Remote Calls To SAM device_vendor_msft_policy_config_localpoliciessecurityoptions_networkaccess_restrictclientsallowedtomakeremotecallstosam Local Policies Security Options Administrators: Remote Access: Allow.
Network Security Allow Local System To Use Computer Identity For NTLM device_vendor_msft_policy_config_localpoliciessecurityoptions_networksecurity_allowlocalsystemtousecomputeridentityforntlm Local Policies Security Options 1 Allow
Network Security Allow PKU2U Authentication Requests device_vendor_msft_policy_config_localpoliciessecurityoptions_networksecurity_allowpku2uauthenticationrequests Local Policies Security Options 1 Allow
Network Security Do Not Store LAN Manager Hash Value On Next Password Change device_vendor_msft_policy_config_localpoliciessecurityoptions_networksecurity_donotstorelanmanagerhashvalueonnextpasswordchange Local Policies Security Options 1 Enable
Network Security LAN Manager Authentication Level device_vendor_msft_policy_config_localpoliciessecurityoptions_networksecurity_lanmanagerauthenticationlevel Local Policies Security Options 5 Send LM and NTLMv2 responses only. Refuse LM and NTLM
Network Security Minimum Session Security For NTLMSSP Based Clients device_vendor_msft_policy_config_localpoliciessecurityoptions_networksecurity_minimumsessionsecurityforntlmsspbasedclients Local Policies Security Options 537395200 Require NTLM and 128-bit encryption
Network Security Minimum Session Security For NTLMSSP Based Servers device_vendor_msft_policy_config_localpoliciessecurityoptions_networksecurity_minimumsessionsecurityforntlmsspbasedservers Local Policies Security Options 537395200 Require NTLM and 128-bit encryption
Network Security Restrict NTLM Audit Incoming NTLM Traffic device_vendor_msft_policy_config_localpoliciessecurityoptions_networksecurity_restrictntlm_auditincomingntlmtraffic Local Policies Security Options 2 Enable auditing for all accounts
User Account Control Behavior Of The Elevation Prompt For Administrators device_vendor_msft_policy_config_localpoliciessecurityoptions_useraccountcontrol_behavioroftheelevationpromptforadministrators Local Policies Security Options 2 Prompt for consent on the secure desktop
User Account Control Behavior Of The Elevation Prompt For Standard Users device_vendor_msft_policy_config_localpoliciessecurityoptions_useraccountcontrol_behavioroftheelevationpromptforstandardusers Local Policies Security Options 3 Prompt for credentials
User Account Control Detect Application Installations And Prompt For Elevation device_vendor_msft_policy_config_localpoliciessecurityoptions_useraccountcontrol_detectapplicationinstallationsandpromptforelevation Local Policies Security Options 1 Enable
User Account Control Only Elevate UI Access Applications That Are Installed In Secure Locations device_vendor_msft_policy_config_localpoliciessecurityoptions_useraccountcontrol_onlyelevateuiaccessapplicationsthatareinstalledinsecurelocations Local Policies Security Options 1 Enabled: Application runs with UIAccess integrity only if it resides in secure location.
User Account Control Run All Administrators In Admin Approval Mode device_vendor_msft_policy_config_localpoliciessecurityoptions_useraccountcontrol_runalladministratorsinadminapprovalmode Local Policies Security Options 1 Enabled
User Account Control Switch To The Secure Desktop When Prompting For Elevation device_vendor_msft_policy_config_localpoliciessecurityoptions_useraccountcontrol_switchtothesecuredesktopwhenpromptingforelevation Local Policies Security Options 1 Enabled
User Account Control Use Admin Approval Mode device_vendor_msft_policy_config_localpoliciessecurityoptions_useraccountcontrol_useadminapprovalmode Local Policies Security Options 1 Enable
User Account Control Virtualize File And Registry Write Failures To Per User Locations device_vendor_msft_policy_config_localpoliciessecurityoptions_useraccountcontrol_virtualizefileandregistrywritefailurestoperuserlocations Local Policies Security Options 1 Enabled

CIS Microsoft Store

CIS L1 section 48 regarding Microsoft App Store.

createdDateTime creationSource description lastModifiedDateTime name platforms priorityMetaData roleScopeTagIds settingCount technologies id templateReference
12/19/2024 20:27:06 CIS L1 section 48 regarding Microsoft App Store. 12/19/2024 20:27:06 CIS Microsoft Store windows10 0 6 mdm d8867f05-8ffc-426e-abe4-4ff35c130d65 @{templateId=; templateFamily=none; templateDisplayName=; templateDisplayVersion=}

Assignments

Name MemberCount GroupType DynamicRule Intent Source AssignType
All Devices - BuilIn - - direct Include

Settings

DisplayName ID Path Value ValueName
Allow apps from the Microsoft app store to auto update device_vendor_msft_policy_config_applicationmanagement_allowappstoreautoupdate Microsoft App Store 1 Allowed.
Allow Game DVR device_vendor_msft_policy_config_applicationmanagement_allowgamedvr Microsoft App Store 0 Block
MSI Allow User Control Over Install device_vendor_msft_policy_config_applicationmanagement_msiallowusercontroloverinstall Microsoft App Store 0 Disabled
MSI Always Install With Elevated Privileges device_vendor_msft_policy_config_applicationmanagement_msialwaysinstallwithelevatedprivileges Microsoft App Store 0 Disabled
MSI Always Install With Elevated Privileges (User) user_vendor_msft_policy_config_applicationmanagement_msialwaysinstallwithelevatedprivileges Microsoft App Store 0 Disabled
Require Private Store Only device_vendor_msft_policy_config_applicationmanagement_requireprivatestoreonly Microsoft App Store 1 Only Private store is enabled.

CIS Privacy

CIS L1 section 58 on privacy.

createdDateTime creationSource description lastModifiedDateTime name platforms priorityMetaData roleScopeTagIds settingCount technologies id templateReference
12/19/2024 20:30:21 CIS L1 section 58 on privacy. 12/19/2024 20:30:21 CIS Privacy windows10 0 2 mdm aadf459e-bc60-4471-bc72-a771efdb2d95 @{templateId=; templateFamily=none; templateDisplayName=; templateDisplayVersion=}

Assignments

Name MemberCount GroupType DynamicRule Intent Source AssignType
All Devices - BuilIn - - direct Include

Settings

DisplayName ID Path Value ValueName
Allow Input Personalization device_vendor_msft_policy_config_privacy_allowinputpersonalization Privacy 0 Block
Let Apps Activate With Voice Above Lock device_vendor_msft_policy_config_privacy_letappsactivatewithvoiceabovelock Privacy 2 Force deny. Windows apps cannot be activated by voice while the screen is locked, and users cannot change it.

CIS Smart Screen

CIS L1 section 64 containing information on smart screen.

createdDateTime creationSource description lastModifiedDateTime name platforms priorityMetaData roleScopeTagIds settingCount technologies id templateReference
12/19/2024 20:47:38 CIS L1 section 64 containing information on smart screen. 12/19/2024 20:47:38 CIS Smart Screen windows10 0 4 mdm a34e4a51-e446-48ab-a453-5cdddea1776d @{templateId=; templateFamily=none; templateDisplayName=; templateDisplayVersion=}

Assignments

Name MemberCount GroupType DynamicRule Intent Source AssignType
All Devices - BuilIn - - direct Include

Settings

DisplayName ID Path Value ValueName
Notify Malicious device_vendor_msft_policy_config_webthreatdefense_notifymalicious Smart Screen\ Enhanced Phishing Protection 1 Enabled
Notify Password Reuse device_vendor_msft_policy_config_webthreatdefense_notifypasswordreuse Smart Screen\ Enhanced Phishing Protection 1 Enabled
Notify Unsafe App device_vendor_msft_policy_config_webthreatdefense_notifyunsafeapp Smart Screen\ Enhanced Phishing Protection 1 Enabled
Service Enabled device_vendor_msft_policy_config_webthreatdefense_serviceenabled Smart Screen\ Enhanced Phishing Protection 1 Enabled

CIS System

CIS L1 section 67 on system.

createdDateTime creationSource description lastModifiedDateTime name platforms priorityMetaData roleScopeTagIds settingCount technologies id templateReference
12/19/2024 21:00:29 CIS L1 section 67 on system. 12/19/2024 21:00:29 CIS System windows10 0 4 mdm c44684fc-ee52-4f9d-9285-e6b8df8d38d7 @{templateId=; templateFamily=none; templateDisplayName=; templateDisplayVersion=}

Assignments

Name MemberCount GroupType DynamicRule Intent Source AssignType
All Devices - BuilIn - - direct Include

Settings

DisplayName ID Path Value ValueName
Allow Telemetry device_vendor_msft_policy_config_system_allowtelemetry System 1 Basic
Enable One Settings Auditing device_vendor_msft_policy_config_system_enableonesettingsauditing System 1 Enabled.
Limit Diagnostic Log Collection device_vendor_msft_policy_config_system_limitdiagnosticlogcollection System 1 Enabled.
Limit Dump Collection device_vendor_msft_policy_config_system_limitdumpcollection System 1 Enabled.

CIS System Services (Xbox)

CIS L1 Section 69 on system services. These settings relate to xbox game specifically. Other system services are configured via a series of custom oma-uri’s.

createdDateTime creationSource description lastModifiedDateTime name platforms priorityMetaData roleScopeTagIds settingCount technologies id templateReference
01/08/2025 21:23:46 CIS L1 Section 69 on system services. These settings relate to xbox game specifically. Other system services are configured via a series of custom oma-uri’s. 01/08/2025 21:23:46 CIS System Services (Xbox) windows10 0 4 mdm 63dadaee-6c5f-435b-931b-aeb012852b2d @{templateId=; templateFamily=none; templateDisplayName=; templateDisplayVersion=}

Assignments

Name MemberCount GroupType DynamicRule Intent Source AssignType
All Devices - BuilIn - - direct Include

Settings

DisplayName ID Path Value ValueName
Configure Xbox Accessory Management Service Startup Mode device_vendor_msft_policy_config_systemservices_configurexboxaccessorymanagementservicestartupmode System Services 4 Disabled
Configure Xbox Live Auth Manager Service Startup Mode device_vendor_msft_policy_config_systemservices_configurexboxliveauthmanagerservicestartupmode System Services 4 Disabled
Configure Xbox Live Game Save Service Startup Mode device_vendor_msft_policy_config_systemservices_configurexboxlivegamesaveservicestartupmode System Services 4 Disabled
Configure Xbox Live Networking Service Startup Mode device_vendor_msft_policy_config_systemservices_configurexboxlivenetworkingservicestartupmode System Services 4 Disabled

CIS User Rights

CIS section 74 on user rights.

createdDateTime creationSource description lastModifiedDateTime name platforms priorityMetaData roleScopeTagIds settingCount technologies id templateReference
12/20/2024 18:19:59 CIS section 74 on user rights. 12/20/2024 18:19:59 CIS User Rights windows10 0 29 mdm cf754b1e-ab15-4844-8d41-668e3926b859 @{templateId=; templateFamily=none; templateDisplayName=; templateDisplayVersion=}

Assignments

Name MemberCount GroupType DynamicRule Intent Source AssignType
All Devices - BuilIn - - direct Include

Settings

DisplayName ID Path Value ValueName
Access Credential Manager As Trusted Caller device_vendor_msft_policy_config_userrights_accesscredentialmanagerastrustedcaller User Rights No One
Access From Network device_vendor_msft_policy_config_userrights_accessfromnetwork User Rights System.Object[]
Act As Part Of The Operating System device_vendor_msft_policy_config_userrights_actaspartoftheoperatingsystem User Rights No One
Allow Local Log On device_vendor_msft_policy_config_userrights_allowlocallogon User Rights System.Object[]
Backup Files And Directories device_vendor_msft_policy_config_userrights_backupfilesanddirectories User Rights Administrators
Change System Time device_vendor_msft_policy_config_userrights_changesystemtime User Rights System.Object[]
Create Global Objects device_vendor_msft_policy_config_userrights_createglobalobjects User Rights System.Object[]
Create Page File device_vendor_msft_policy_config_userrights_createpagefile User Rights Administrators
Create Permanent Shared Objects device_vendor_msft_policy_config_userrights_createpermanentsharedobjects User Rights No One
Create Symbolic Links device_vendor_msft_policy_config_userrights_createsymboliclinks User Rights System.Object[]
Create Token device_vendor_msft_policy_config_userrights_createtoken User Rights No One
Debug Programs device_vendor_msft_policy_config_userrights_debugprograms User Rights Administrators
Deny Access From Network device_vendor_msft_policy_config_userrights_denyaccessfromnetwork User Rights System.Object[]
Deny Local Log On device_vendor_msft_policy_config_userrights_denylocallogon User Rights Guests
Deny Remote Desktop Services Log On device_vendor_msft_policy_config_userrights_denyremotedesktopserviceslogon User Rights System.Object[]
Enable Delegation device_vendor_msft_policy_config_userrights_enabledelegation User Rights No One
Generate Security Audits device_vendor_msft_policy_config_userrights_generatesecurityaudits User Rights System.Object[]
Impersonate Client device_vendor_msft_policy_config_userrights_impersonateclient User Rights System.Object[]
Increase Scheduling Priority device_vendor_msft_policy_config_userrights_increaseschedulingpriority User Rights System.Object[]
Load Unload Device Drivers device_vendor_msft_policy_config_userrights_loadunloaddevicedrivers User Rights Administrators
Lock Memory device_vendor_msft_policy_config_userrights_lockmemory User Rights No One
Manage Auditing And Security Log device_vendor_msft_policy_config_userrights_manageauditingandsecuritylog User Rights Administrators
Manage Volume device_vendor_msft_policy_config_userrights_managevolume User Rights Administrators
Modify Firmware Environment device_vendor_msft_policy_config_userrights_modifyfirmwareenvironment User Rights Administrators
Modify Object Label device_vendor_msft_policy_config_userrights_modifyobjectlabel User Rights No One
Profile Single Process device_vendor_msft_policy_config_userrights_profilesingleprocess User Rights Administrators
Remote Shutdown device_vendor_msft_policy_config_userrights_remoteshutdown User Rights Administrators
Restore Files And Directories device_vendor_msft_policy_config_userrights_restorefilesanddirectories User Rights Administrators
Take Ownership device_vendor_msft_policy_config_userrights_takeownership User Rights Administrators

CIS Virtualization Based Technology

Section 75 on Virtualization based technology.

createdDateTime creationSource description lastModifiedDateTime name platforms priorityMetaData roleScopeTagIds settingCount technologies id templateReference
01/07/2025 20:15:27 Section 75 on Virtualization based technology. 01/07/2025 20:15:27 CIS Virtualization Based Technology windows10 0 2 mdm 1fd09e7c-9322-4c95-b218-eb5ae449cdb1 @{templateId=; templateFamily=none; templateDisplayName=; templateDisplayVersion=}

Assignments

Name MemberCount GroupType DynamicRule Intent Source AssignType
All Devices - BuilIn - - direct Include

Settings

DisplayName ID Path Value ValueName
Hypervisor Enforced Code Integrity device_vendor_msft_policy_config_virtualizationbasedtechnology_hypervisorenforcedcodeintegrity Virtualization Based Technology 1 (Enabled with UEFI lock) Turns on Hypervisor-Protected Code Integrity with UEFI lock.
Require UEFI Memory Attributes Table device_vendor_msft_policy_config_virtualizationbasedtechnology_requireuefimemoryattributestable Virtualization Based Technology 1 Require UEFI Memory Attributes Table

CIS Widgets

CIS L1 section 77 on widgets

createdDateTime creationSource description lastModifiedDateTime name platforms priorityMetaData roleScopeTagIds settingCount technologies id templateReference
01/07/2025 20:18:58 CIS L1 section 77 on widgets 01/07/2025 20:18:58 CIS Widgets windows10 0 1 mdm 8dfe3c8c-0f75-43f9-a4df-1e64bc8c7114 @{templateId=; templateFamily=none; templateDisplayName=; templateDisplayVersion=}

Assignments

Name MemberCount GroupType DynamicRule Intent Source AssignType
IT Testing 1 Static - - direct Exclude

Settings

DisplayName ID Path Value ValueName
Allow widgets device_vendor_msft_policy_config_newsandinterests_allownewsandinterests Widgets 0 Not allowed.

CIS Windows Ink Workspace

CIS L1 section 80 on windows ink workspace

createdDateTime creationSource description lastModifiedDateTime name platforms priorityMetaData roleScopeTagIds settingCount technologies id templateReference
01/07/2025 20:28:38 CIS L1 section 80 on windows ink workspace 01/07/2025 20:28:38 CIS Windows Ink Workspace windows10 0 1 mdm 48c5df00-3fe3-4501-9942-0af04279da2e @{templateId=; templateFamily=none; templateDisplayName=; templateDisplayVersion=}

Assignments

Name MemberCount GroupType DynamicRule Intent Source AssignType
All Devices - BuilIn - - direct Include

Settings

DisplayName ID Path Value ValueName
Allow Windows Ink Workspace device_vendor_msft_policy_config_windowsinkworkspace_allowwindowsinkworkspace Windows Ink Workspace 1 ink workspace is enabled (feature is turned on), but the user cannot access it above the lock screen.

CIS Windows Security Defender Center

CIS L1 section 78 on windows security defender center

createdDateTime creationSource description lastModifiedDateTime name platforms priorityMetaData roleScopeTagIds settingCount technologies id templateReference
01/07/2025 20:21:23 CIS L1 section 78 on windows security defender center 01/07/2025 20:21:23 CIS Windows Security Defender Center windows10 0 1 mdm 7cbdf2a9-f742-4ad1-a8cc-16af5ef751ea @{templateId=; templateFamily=none; templateDisplayName=; templateDisplayVersion=}

Assignments

Name MemberCount GroupType DynamicRule Intent Source AssignType
All Devices - BuilIn - - direct Include

Settings

DisplayName ID Path Value ValueName
Disallow Exploit Protection Override device_vendor_msft_policy_config_windowsdefendersecuritycenter_disallowexploitprotectionoverride Windows Defender Security Center 1 (Enable) Local users cannot make changes in the exploit protection settings area.

CIS Windows Update for Business

CIS L1 Section 83 on Windows update for business

createdDateTime creationSource description lastModifiedDateTime name platforms priorityMetaData roleScopeTagIds settingCount technologies id templateReference
01/07/2025 20:38:14 CIS L1 Section 83 on Windows update for business 01/07/2025 20:38:14 CIS Windows Update for Business windows10 0 7 mdm 88e44ae5-4829-423d-a91b-df4a47c16138 @{templateId=; templateFamily=none; templateDisplayName=; templateDisplayVersion=}

Assignments

Name MemberCount GroupType DynamicRule Intent Source AssignType
All Devices - BuilIn - - direct Include

Settings

DisplayName ID Path Value ValueName
Allow Auto Update device_vendor_msft_policy_config_update_allowautoupdate Windows Update For Business 3 Auto install and restart at a specified time. The IT specifies the installation day and time. If no day and time are specified, the default is 3 AM daily. Automatic installation happens at this time and device restart happens after a 15-minute countdown. If the user is logged in when Windows is ready to restart, the user can interrupt the 15-minute countdown to delay the restart.
Block “Pause Updates” ability device_vendor_msft_policy_config_update_setdisablepauseuxaccess Windows Update For Business 1 Block
Defer Feature Updates Period In Days device_vendor_msft_policy_config_update_deferfeatureupdatesperiodindays Windows Update For Business 180
Defer Quality Updates Period (Days) device_vendor_msft_policy_config_update_deferqualityupdatesperiodindays Windows Update For Business 0
Manage Preview Builds device_vendor_msft_policy_config_update_managepreviewbuilds Windows Update For Business 0 Disable Preview builds
Scheduled Install Day device_vendor_msft_policy_config_update_scheduledinstallday Windows Update For Business 0 Every day
Scheduled Install Time device_vendor_msft_policy_config_update_scheduledinstalltime Windows Update For Business 3

Default EDR policy for all devices

Default EDR policy for targetting all tenants devices, created by MDE.

createdDateTime creationSource description lastModifiedDateTime name platforms priorityMetaData roleScopeTagIds settingCount technologies id templateReference
12/05/2023 19:38:14 Migration_DI_8af9d54a-d7d2-44b1-8e84-23eafe707b81 Default EDR policy for targetting all tenants devices, created by MDE. 12/05/2023 19:38:14 Default EDR policy for all devices windows10 0 2 mdm,microsoftSense 93ab48b3-2a7a-4704-8670-67da475b56f0 @{templateId=0385b795-0f2f-44ac-8602-9f65bf6adede_1; templateFamily=endpointSecurityEndpointDetectionAndResponse; templateDisplayName=Endpoint detection and response; templateDisplayVersion=Version 1}

Assignments

Name MemberCount GroupType DynamicRule Intent Source AssignType
All Devices - BuilIn - - direct Include

Settings

DisplayName ID Path Value ValueName
Microsoft Defender for Endpoint client configuration package type device_vendor_msft_windowsadvancedthreatprotection_configurationtype Microsoft Defender for Endpoint autofromconnector Auto from connector
[Deprecated] Telemetry Reporting Frequency device_vendor_msft_windowsadvancedthreatprotection_configuration_telemetryreportingfrequency Microsoft Defender for Endpoint 2 Expedite

EnableControlledFolderAccess

Protects files, folders, and memory areas on devices from unauthorized changes by unfriendly applications such as ransomware.

createdDateTime creationSource description lastModifiedDateTime name platforms priorityMetaData roleScopeTagIds settingCount technologies id templateReference
05/31/2022 16:41:35 Protects files, folders, and memory areas on devices from unauthorized changes by unfriendly applications such as ransomware. 05/31/2022 18:39:14 EnableControlledFolderAccess windows10 0 4 mdm,microsoftSense be377908-d5e9-4030-a93c-bab12d04a4c4 @{templateId=e8c053d6-9f95-42b1-a7f1-ebfd71c67a4b_1; templateFamily=endpointSecurityAttackSurfaceReduction; templateDisplayName=Attack Surface Reduction Rules; templateDisplayVersion=Version 1}

Assignments

Name MemberCount GroupType DynamicRule Intent Source AssignType
All Users - BuilIn - - direct Include
All Devices - BuilIn - - direct Include

Settings

DisplayName ID Path Value ValueName
Use advanced protection against ransomware device_vendor_msft_policy_config_defender_attacksurfacereductionrules_useadvancedprotectionagainstransomware Defender block Block
Enable Controlled Folder Access device_vendor_msft_policy_config_defender_enablecontrolledfolderaccess Defender 2 Audit Mode
Controlled Folder Access Protected Folders device_vendor_msft_policy_config_defender_controlledfolderaccessprotectedfolders Defender C:\Users
Controlled Folder Access Allowed Applications device_vendor_msft_policy_config_defender_controlledfolderaccessallowedapplications Defender System.Object[]

Firewall Windows default policy

Default policy sets settings for all endpoints that are not governed by any other policy, ensuring that all your clients are managed as soon as MDE is deployed. The default policy is based on a set of pre-configured recommended settings and can be adjusted by user with admin priviledges.

createdDateTime creationSource description lastModifiedDateTime name platforms priorityMetaData roleScopeTagIds settingCount technologies id templateReference
03/30/2022 23:10:54 MdeDeviceConfigurationPolicies Default policy sets settings for all endpoints that are not governed by any other policy, ensuring that all your clients are managed as soon as MDE is deployed. The default policy is based on a set of pre-configured recommended settings and can be adjusted by user with admin priviledges. 03/30/2022 23:10:54 Firewall Windows default policy windows10 0 3 mdm,microsoftSense 1a26b955-e4d1-46ad-90d5-915e768e3dd9 @{templateId=6078910e-d808-4a9f-a51d-1b8a7bacb7c0_1; templateFamily=endpointSecurityFirewall; templateDisplayName=Windows Firewall; templateDisplayVersion=Version 1}

Assignments

Name MemberCount GroupType DynamicRule Intent Source AssignType
All Devices - BuilIn - - direct Include

Settings

DisplayName ID Path Value ValueName
Enable Domain Network Firewall vendor_msft_firewall_mdmstore_domainprofile_enablefirewall Firewall true True
Enable Private Network Firewall vendor_msft_firewall_mdmstore_privateprofile_enablefirewall Firewall true True
Enable Public Network Firewall vendor_msft_firewall_mdmstore_publicprofile_enablefirewall Firewall true True

Full ASR Rule Audit

Audit Mode for ASR Rules

createdDateTime creationSource description lastModifiedDateTime name platforms priorityMetaData roleScopeTagIds settingCount technologies id templateReference
11/21/2022 20:45:59 Audit Mode for ASR Rules 11/21/2022 20:45:59 Full ASR Rule Audit windows10 0 1 mdm,microsoftSense 15c9fbb3-cb19-4c27-b3a5-fe5d116b0dbb @{templateId=e8c053d6-9f95-42b1-a7f1-ebfd71c67a4b_1; templateFamily=endpointSecurityAttackSurfaceReduction; templateDisplayName=Attack Surface Reduction Rules; templateDisplayVersion=Version 1}

Assignments

Name MemberCount GroupType DynamicRule Intent Source AssignType
All Users - BuilIn - - direct Include
All Devices - BuilIn - - direct Include

Settings

DisplayName ID Path Value ValueName
Block Adobe Reader from creating child processes device_vendor_msft_policy_config_defender_attacksurfacereductionrules_blockadobereaderfromcreatingchildprocesses Defender audit Audit
Block execution of potentially obfuscated scripts device_vendor_msft_policy_config_defender_attacksurfacereductionrules_blockexecutionofpotentiallyobfuscatedscripts Defender audit Audit
Block Win32 API calls from Office macros device_vendor_msft_policy_config_defender_attacksurfacereductionrules_blockwin32apicallsfromofficemacros Defender audit Audit
Block credential stealing from the Windows local security authority subsystem device_vendor_msft_policy_config_defender_attacksurfacereductionrules_blockcredentialstealingfromwindowslocalsecurityauthoritysubsystem Defender audit Audit
Block executable files from running unless they meet a prevalence, age, or trusted list criterion device_vendor_msft_policy_config_defender_attacksurfacereductionrules_blockexecutablefilesrunningunlesstheymeetprevalenceagetrustedlistcriterion Defender audit Audit
Block JavaScript or VBScript from launching downloaded executable content device_vendor_msft_policy_config_defender_attacksurfacereductionrules_blockjavascriptorvbscriptfromlaunchingdownloadedexecutablecontent Defender audit Audit
Block Office communication application from creating child processes device_vendor_msft_policy_config_defender_attacksurfacereductionrules_blockofficecommunicationappfromcreatingchildprocesses Defender audit Audit
Block all Office applications from creating child processes device_vendor_msft_policy_config_defender_attacksurfacereductionrules_blockallofficeapplicationsfromcreatingchildprocesses Defender audit Audit
Block untrusted and unsigned processes that run from USB device_vendor_msft_policy_config_defender_attacksurfacereductionrules_blockuntrustedunsignedprocessesthatrunfromusb Defender audit Audit
Block process creations originating from PSExec and WMI commands device_vendor_msft_policy_config_defender_attacksurfacereductionrules_blockprocesscreationsfrompsexecandwmicommands Defender audit Audit
Block persistence through WMI event subscription device_vendor_msft_policy_config_defender_attacksurfacereductionrules_blockpersistencethroughwmieventsubscription Defender audit Audit
Block Office applications from creating executable content device_vendor_msft_policy_config_defender_attacksurfacereductionrules_blockofficeapplicationsfromcreatingexecutablecontent Defender audit Audit
Block Office applications from injecting code into other processes device_vendor_msft_policy_config_defender_attacksurfacereductionrules_blockofficeapplicationsfrominjectingcodeintootherprocesses Defender audit Audit
Use advanced protection against ransomware device_vendor_msft_policy_config_defender_attacksurfacereductionrules_useadvancedprotectionagainstransomware Defender audit Audit
Block executable content from email client and webmail device_vendor_msft_policy_config_defender_attacksurfacereductionrules_blockexecutablecontentfromemailclientandwebmail Defender audit Audit
Block abuse of exploited vulnerable signed drivers (Device) device_vendor_msft_policy_config_defender_attacksurfacereductionrules_blockabuseofexploitedvulnerablesigneddrivers Defender audit Audit

Inactivity To Lock Screen

After a period of inactivity on your computer goes to lock screen.

createdDateTime creationSource description lastModifiedDateTime name platforms priorityMetaData roleScopeTagIds settingCount technologies id templateReference
12/13/2024 17:15:58 After a period of inactivity on your computer goes to lock screen. 12/17/2024 23:46:55 Inactivity To Lock Screen windows10 0 2 mdm 9280a06c-6830-4553-9123-50a6f42bcb9d @{templateId=; templateFamily=none; templateDisplayName=; templateDisplayVersion=}

Assignments

Name MemberCount GroupType DynamicRule Intent Source AssignType
All Devices - BuilIn - - direct Include
Lab Computers 1 DynamicDevice (device.displayName -startsWith “lab-”) - direct Exclude

Settings

DisplayName ID Path Value ValueName
Allow Cortana Above Lock device_vendor_msft_policy_config_abovelock_allowcortanaabovelock Above Lock 0 Block
Interactive Logon Machine Inactivity Limit device_vendor_msft_policy_config_localpoliciessecurityoptions_interactivelogon_machineinactivitylimit_v2 Local Policies Security Options 600

Inactivity to lockout (Lab PC’s)

Sets a inactivity lockout specific for lab computers.

createdDateTime creationSource description lastModifiedDateTime name platforms priorityMetaData roleScopeTagIds settingCount technologies id templateReference
01/15/2025 15:57:50 Sets a inactivity lockout specific for lab computers. 02/27/2025 16:45:34 Inactivity to lockout (Lab PC’s) windows10 0 2 mdm 8a4de375-7b1c-43d7-bac7-197670e144dd @{templateId=; templateFamily=none; templateDisplayName=; templateDisplayVersion=}

Assignments

Name MemberCount GroupType DynamicRule Intent Source AssignType
Lab Computers 1 DynamicDevice (device.displayName -startsWith “lab-”) - direct Include

Settings

DisplayName ID Path Value ValueName
Interactive Logon Machine Inactivity Limit device_vendor_msft_policy_config_localpoliciessecurityoptions_interactivelogon_machineinactivitylimit_v2 Local Policies Security Options 1200
Unattended Sleep Timeout Plugged In device_vendor_msft_policy_config_power_unattendedsleeptimeoutpluggedin Power 0

MS Edge Baseline

createdDateTime creationSource description lastModifiedDateTime name platforms priorityMetaData roleScopeTagIds settingCount technologies id templateReference
06/30/2023 17:26:33 12/13/2024 16:28:59 MS Edge Baseline windows10 0 17 mdm ff8c048c-6b0a-4624-8bd4-a08b0cf8de68 @{templateId=c66347b7-8325-4954-a235-3bf2233dfbfd_1; templateFamily=baseline; templateDisplayName=Security Baseline for Microsoft Edge; templateDisplayVersion=Version 112}

Assignments

Name MemberCount GroupType DynamicRule Intent Source AssignType
Windows 1 DynamicDevice (device.deviceOSType -eq “Windows”) - direct Include

Settings

DisplayName ID Path Value ValueName
Allow Basic authentication for HTTP device_vendor_msft_policy_config_microsoft_edgev88.0.705.23~policy~microsoft_edge~httpauthentication_basicauthoverhttpenabled Microsoft Edge\HTTP authentication 0 Disabled
Supported authentication schemes device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge~httpauthentication_authschemes Microsoft Edge\HTTP authentication 1 Enabled
Allow user-level native messaging hosts (installed without admin permissions) device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge~nativemessaging_nativemessaginguserlevelhosts Microsoft Edge\Native Messaging 0 Disabled
Enable saving passwords to the password manager device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge~passwordmanager_passwordmanagerenabled Microsoft Edge\Password manager and protection 0 Disabled
Specifies whether to allow insecure websites to make requests to more-private network endpoints device_vendor_msft_policy_config_microsoft_edgev92~policy~microsoft_edge~privatenetworkrequestsettings_insecureprivatenetworkrequestsallowed Microsoft Edge\ Private Network Request Settings 0 Disabled
Configure Microsoft Defender SmartScreen device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge~smartscreen_smartscreenenabled Microsoft Edge\SmartScreen settings 1 Enabled
Configure Microsoft Defender SmartScreen to block potentially unwanted apps device_vendor_msft_policy_config_microsoft_edgev80diff~policy~microsoft_edge~smartscreen_smartscreenpuaenabled Microsoft Edge\SmartScreen settings 1 Enabled
Prevent bypassing Microsoft Defender SmartScreen prompts for sites device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge~smartscreen_preventsmartscreenpromptoverride Microsoft Edge\SmartScreen settings 1 Enabled
Allow unconfigured sites to be reloaded in Internet Explorer mode device_vendor_msft_policy_config_microsoft_edgev92~policy~microsoft_edge_internetexplorerintegrationreloadiniemodeallowed Microsoft Edge 1 Enabled
Allow users to proceed from the HTTPS warning page device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge_sslerroroverrideallowed Microsoft Edge 0 Disabled
Enable browser legacy extension point blocking device_vendor_msft_policy_config_microsoft_edgev95~policy~microsoft_edge_browserlegacyextensionpointsblockingenabled Microsoft Edge 1 Enabled
Enable site isolation for every site device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge_siteperprocess Microsoft Edge 1 Enabled
Enhance images enabled (obsolete) device_vendor_msft_policy_config_microsoft_edgev97~policy~microsoft_edge_edgeenhanceimagesenabled Microsoft Edge 0 Disabled
Force WebSQL to be enabled device_vendor_msft_policy_config_microsoft_edgev107~policy~microsoft_edge_websqlaccess Microsoft Edge 0 Disabled
Minimum TLS version enabled device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge_sslversionmin Microsoft Edge 1 Enabled
Show the Reload in Internet Explorer mode button in the toolbar device_vendor_msft_policy_config_microsoft_edgev96~policy~microsoft_edge_internetexplorermodetoolbarbuttonenabled Microsoft Edge 0 Disabled
Specifies whether SharedArrayBuffers can be used in a non cross-origin-isolated context device_vendor_msft_policy_config_microsoft_edgev111~policy~microsoft_edge_sharedarraybufferunrestrictedaccessallowed Microsoft Edge 0 Disabled

NGP Windows default policy

Default policy sets settings for all endpoints that are not governed by any other policy, ensuring that all your clients are managed as soon as MDE is deployed. The default policy is based on a set of pre-configured recommended settings and can be adjusted by user with admin priviledges.

createdDateTime creationSource description lastModifiedDateTime name platforms priorityMetaData roleScopeTagIds settingCount technologies id templateReference
03/30/2022 23:10:54 MdeDeviceConfigurationPolicies Default policy sets settings for all endpoints that are not governed by any other policy, ensuring that all your clients are managed as soon as MDE is deployed. The default policy is based on a set of pre-configured recommended settings and can be adjusted by user with admin priviledges. 07/07/2023 19:23:08 NGP Windows default policy windows10 0 27 mdm,microsoftSense b28bc355-0c75-4460-b7f3-e2c7ae73eb0a @{templateId=804339ad-1553-4478-a742-138fb5807418_1; templateFamily=endpointSecurityAntivirus; templateDisplayName=Microsoft Defender Antivirus; templateDisplayVersion=Version 1}

Assignments

Name MemberCount GroupType DynamicRule Intent Source AssignType
All Devices - BuilIn - - direct Include

Settings

DisplayName ID Path Value ValueName
Allow Archive Scanning device_vendor_msft_policy_config_defender_allowarchivescanning Defender 1 Allowed. Scans the archive files.
Allow Behavior Monitoring device_vendor_msft_policy_config_defender_allowbehaviormonitoring Defender 1 Allowed. Turns on real-time behavior monitoring.
Allow Cloud Protection device_vendor_msft_policy_config_defender_allowcloudprotection Defender 1 Allowed. Turns on Cloud Protection.
Allow Email Scanning device_vendor_msft_policy_config_defender_allowemailscanning Defender 1 Allowed. Turns on email scanning.
Allow Full Scan On Mapped Network Drives device_vendor_msft_policy_config_defender_allowfullscanonmappednetworkdrives Defender 0 Not allowed. Disables scanning on mapped network drives.
Allow Full Scan Removable Drive Scanning device_vendor_msft_policy_config_defender_allowfullscanremovabledrivescanning Defender 1 Allowed. Scans removable drives.
Allow scanning of all downloaded files and attachments device_vendor_msft_policy_config_defender_allowioavprotection Defender 1 Allowed.
Allow Realtime Monitoring device_vendor_msft_policy_config_defender_allowrealtimemonitoring Defender 1 Allowed. Turns on and runs the real-time monitoring service.
Allow Scanning Network Files device_vendor_msft_policy_config_defender_allowscanningnetworkfiles Defender 0 Not allowed. Turns off scanning of network files.
Allow Script Scanning device_vendor_msft_policy_config_defender_allowscriptscanning Defender 1 Allowed.
Allow User UI Access device_vendor_msft_policy_config_defender_allowuseruiaccess Defender 1 Allowed. Lets users access UI.
Avg CPU Load Factor device_vendor_msft_policy_config_defender_avgcpuloadfactor Defender 50
Check For Signatures Before Running Scan device_vendor_msft_policy_config_defender_checkforsignaturesbeforerunningscan Defender 1 Enabled
Cloud Block Level device_vendor_msft_policy_config_defender_cloudblocklevel Defender 2 High
Cloud Extended Timeout device_vendor_msft_policy_config_defender_cloudextendedtimeout Defender 50
Days To Retain Cleaned Malware device_vendor_msft_policy_config_defender_daystoretaincleanedmalware Defender 0
Disable Catchup Full Scan device_vendor_msft_policy_config_defender_disablecatchupfullscan Defender 0 Disabled
Disable Catchup Quick Scan device_vendor_msft_policy_config_defender_disablecatchupquickscan Defender 0 Disabled
Enable Low CPU Priority device_vendor_msft_policy_config_defender_enablelowcpupriority Defender 0 Disabled
Enable Network Protection device_vendor_msft_policy_config_defender_enablenetworkprotection Defender 1 Enabled (block mode)
PUA Protection device_vendor_msft_policy_config_defender_puaprotection Defender 1 PUA Protection on. Detected items are blocked. They will show in history along with other threats.
Real Time Scan Direction device_vendor_msft_policy_config_defender_realtimescandirection Defender 0 Monitor all files (bi-directional).
Scan Parameter device_vendor_msft_policy_config_defender_scanparameter Defender 1 Quick scan
Schedule Quick Scan Time device_vendor_msft_policy_config_defender_schedulequickscantime Defender 720
Schedule Scan Day device_vendor_msft_policy_config_defender_schedulescanday Defender 2 Monday
Signature Update Interval device_vendor_msft_policy_config_defender_signatureupdateinterval Defender 4
Submit Samples Consent device_vendor_msft_policy_config_defender_submitsamplesconsent Defender 1 Send safe samples automatically.

Device Configuration

This section contains a list of all device configuration profiles available in Intune.

ADMX Firefox Default Policies

Default Firefox policies to enhance security and usability.

Property Value
@odata.type #microsoft.graph.windows10CustomConfiguration
id 2bc3f272-cb4c-486b-b010-6ee05c40bd49
lastModifiedDateTime 07/06/2022 18:34:07
roleScopeTagIds 0
supportsScopeTags True
deviceManagementApplicabilityRuleOsEdition
deviceManagementApplicabilityRuleOsVersion
deviceManagementApplicabilityRuleDeviceMode
createdDateTime 11/08/2021 19:03:51
description Default Firefox policies to enhance security and usability.
displayName ADMX Firefox Default Policies
version 7
omaSettings

Assignments

Name MemberCount GroupType DynamicRule Intent Source AssignType
All Users - BuilIn - apply direct Include

Custom OMA-Uri

@odata.type displayName description omaUri secretReferenceValueId isEncrypted value
#microsoft.graph.omaSettingString Firefox ADMX Default Firefox Settings ./Device/Vendor/MSFT/Policy/ConfigOperations/ADMXInstall/Firefox/Policy/FirefoxAdmx aeaba85a-84ce-4deb-b0fd-e22de311a7a7_2bc3f272-cb4c-486b-b010-6ee05c40bd49_b1f1e87d-fc54-4ae5-81f9-1bd8b3dec644 True ****
#microsoft.graph.omaSettingString Required Extensions List of extensions to force install ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/ExtensionSettings aeaba85a-84ce-4deb-b0fd-e22de311a7a7_2bc3f272-cb4c-486b-b010-6ee05c40bd49_f3ec6f4a-f12d-4f51-9978-6cadec4973c1 True ****

Baseline Android Device Restrictions

Property Value
@odata.type #microsoft.graph.androidWorkProfileGeneralDeviceConfiguration
id a8b4eeb8-0204-4964-9a6d-a99e7cb17cf4
lastModifiedDateTime 06/29/2023 22:56:31
roleScopeTagIds 0
supportsScopeTags True
deviceManagementApplicabilityRuleOsEdition
deviceManagementApplicabilityRuleOsVersion
deviceManagementApplicabilityRuleDeviceMode
createdDateTime 11/16/2021 19:13:08
description
displayName Baseline Android Device Restrictions
version 2
passwordBlockFaceUnlock
passwordBlockFingerprintUnlock
passwordBlockIrisUnlock
passwordBlockTrustAgents
passwordExpirationDays 365
passwordMinimumLength 10
passwordMinutesOfInactivityBeforeScreenTimeout 15
passwordPreviousPasswordBlockCount 5
passwordSignInFailureCountBeforeFactoryReset 5
passwordRequiredType required
requiredPasswordComplexity medium
workProfileAllowAppInstallsFromUnknownSources
workProfileDataSharingType allowPersonalToWork
workProfileBlockNotificationsWhileDeviceLocked
workProfileBlockAddingAccounts
workProfileBluetoothEnableContactSharing
workProfileBlockScreenCapture
workProfileBlockCrossProfileCallerId
workProfileBlockCamera
workProfileBlockCrossProfileContactsSearch
workProfileBlockCrossProfileCopyPaste
workProfileDefaultAppPermissionPolicy prompt
workProfilePasswordBlockFaceUnlock
workProfilePasswordBlockFingerprintUnlock
workProfilePasswordBlockIrisUnlock
workProfilePasswordBlockTrustAgents
workProfilePasswordExpirationDays
workProfilePasswordMinimumLength
workProfilePasswordMinNumericCharacters
workProfilePasswordMinNonLetterCharacters
workProfilePasswordMinLetterCharacters
workProfilePasswordMinLowerCaseCharacters
workProfilePasswordMinUpperCaseCharacters
workProfilePasswordMinSymbolCharacters
workProfilePasswordMinutesOfInactivityBeforeScreenTimeout
workProfilePasswordPreviousPasswordBlockCount
workProfilePasswordSignInFailureCountBeforeFactoryReset
workProfilePasswordRequiredType deviceDefault
workProfileRequiredPasswordComplexity none
workProfileRequirePassword
securityRequireVerifyApps True
vpnAlwaysOnPackageIdentifier
vpnEnableAlwaysOnLockdownMode
workProfileAllowWidgets
workProfileBlockPersonalAppInstallsFromUnknownSources True
workProfileAccountUse allowAllExceptGoogleAccounts
allowedGoogleAccountDomains
blockUnifiedPasswordForWorkProfile

Assignments

Name MemberCount GroupType DynamicRule Intent Source AssignType
0 Static - apply direct Include

CIS Miscellaneous Recommendations

CIS L1 section 86 on miscellaneous recommendations

Property Value
@odata.type #microsoft.graph.windows10CustomConfiguration
id 722b038d-d199-40f8-9f19-02dae6b1af3b
lastModifiedDateTime 01/07/2025 20:48:18
roleScopeTagIds 0
supportsScopeTags True
deviceManagementApplicabilityRuleOsVersion
deviceManagementApplicabilityRuleDeviceMode
createdDateTime 01/07/2025 20:48:18
description CIS L1 section 86 on miscellaneous recommendations
displayName CIS Miscellaneous Recommendations
version 1
deviceManagementApplicabilityRuleOsEdition @{osEditionTypes=System.Object[]; name=; ruleType=include}
omaSettings

Assignments

Name MemberCount GroupType DynamicRule Intent Source AssignType
All Devices - BuilIn - apply direct Include

Custom OMA-Uri

@odata.type displayName description omaUri secretReferenceValueId isEncrypted value isReadOnly
#microsoft.graph.omaSettingInteger CIS 86.1.2 autoconnect->hotspot ./Device/Vendor/MSFT/Policy/Config/Wifi/AllowAutoConnectToWiFiSenseHotspots False 0 False

CIS System Services

CIS L1 section 69 on system services. Specifically settings the can only be made with a custom oma-uri.

Property Value
@odata.type #microsoft.graph.windows10CustomConfiguration
id 2659fe59-61d0-443f-9b7b-bc86a54c0df7
lastModifiedDateTime 01/08/2025 21:20:44
roleScopeTagIds 0
supportsScopeTags True
deviceManagementApplicabilityRuleOsVersion
deviceManagementApplicabilityRuleDeviceMode
createdDateTime 01/08/2025 21:20:44
description CIS L1 section 69 on system services. Specifically settings the can only be made with a custom oma-uri.
displayName CIS System Services
version 1
deviceManagementApplicabilityRuleOsEdition @{osEditionTypes=System.Object[]; name=; ruleType=include}
omaSettings

Assignments

Name MemberCount GroupType DynamicRule Intent Source AssignType
All Devices - BuilIn - apply direct Include

Custom OMA-Uri

@odata.type displayName description omaUri secretReferenceValueId isEncrypted value isReadOnly
#microsoft.graph.omaSettingInteger 69.3 (L1) Ensure ‘Computer Browser (Browser)’ ./Device/Vendor/MSFT/Policy/Config/SystemServices/ConfigureComputerBrowserServiceStartupMode False 4 False
#microsoft.graph.omaSettingInteger 69.6 (L1) Ensure ‘IIS Admin Service (IISADMIN)’ is set to ‘Disabled’ or ‘Not Installed’ exception needed for software team ./Device/Vendor/MSFT/Policy/Config/SystemServices/ConfigureIISAdminServiceStartupMode False 4 False
#microsoft.graph.omaSettingInteger 69.7 (L1) Ensure ‘Infrared monitor service (irmon)’ is set to ‘Disabled’ or ‘Not Installed’ (Automated) ./Device/Vendor/MSFT/Policy/Config/SystemServices/ConfigureInfraredMonitorServiceStartupMode False 4 False
#microsoft.graph.omaSettingInteger 69.11 (L1) Ensure ‘Microsoft FTP Service (FTPSVC)’ is set to ‘Disabled’ or ‘Not Installed’ (Automated) ./Device/Vendor/MSFT/Policy/Config/SystemServices/ConfigureMicrosoftFTPServiceStartupMode False 4 False
#microsoft.graph.omaSettingInteger 69.24 (L1) Ensure ‘Remote Procedure Call (RPC) Locator (RpcLocator)’ is set to ‘Disabled’ (Automated) ./Device/Vendor/MSFT/Policy/Config/SystemServices/ConfigureRemoteProcedureCallLocatorServiceStartupMode False 4 False
#microsoft.graph.omaSettingInteger 69.26 (L1) Ensure ‘Routing and Remote Access (RemoteAccess)’ is set to ‘Disabled’ (Automated) ./Device/Vendor/MSFT/Policy/Config/SystemServices/ConfigureRoutingAndRemoteAccessServiceStartupMode False 4 False
#microsoft.graph.omaSettingInteger 69.28 (L1) Ensure ‘Simple TCP/IP Services (simptcp)’ is set to ‘Disabled’ or ‘Not Installed’ (Automated) ./Device/Vendor/MSFT/Policy/Config/SystemServices/ConfigureSimpleTCPIPServicesStartupMode False 4 False
#microsoft.graph.omaSettingInteger 69.30 (L1) Ensure ‘Special Administration Console Helper (sacsvr)’ is set to ‘Disabled’ or ‘Not Installed’ (Automated) ./Device/Vendor/MSFT/Policy/Config/SystemServices/ConfigureSpecialAdministrationConsoleHelperServiceStartupMode False 4 False
#microsoft.graph.omaSettingInteger 69.31 (L1) Ensure ‘SSDP Discovery (SSDPSRV)’ is set to ‘Disabled’ (Automated) ./Device/Vendor/MSFT/Policy/Config/SystemServices/ConfigureSSDPDiscoveryServiceStartupMode False 4 False
#microsoft.graph.omaSettingInteger 69.32 (L1) Ensure ‘UPnP Device Host (upnphost)’ is set to ‘Disabled’ (Automated) ./Device/Vendor/MSFT/Policy/Config/SystemServices/ConfigureUPnPDeviceHostServiceStartupMode False 4 False
#microsoft.graph.omaSettingInteger 69.33 (L1) Ensure ‘Web Management Service (WMSvc)’ is set to ‘Disabled’ or ‘Not Installed’ (Automated) ./Device/Vendor/MSFT/Policy/Config/SystemServices/ConfigureWebManagementServiceStartupMode False 4 False
#microsoft.graph.omaSettingInteger 69.36 (L1) Ensure ‘Windows Media Player Network Sharing Service (WMPNetworkSvc)’ is set to ‘Disabled’ or ‘Not Installed’ (Automated) ./Device/Vendor/MSFT/Policy/Config/SystemServices/ConfigureWindowsMediaPlayerNetworkSharingServiceStartupMode False 4 False
#microsoft.graph.omaSettingInteger 69.37 (L1) Ensure ‘Windows Mobile Hotspot Service (icssvc)’ is set to ‘Disabled’ (Automated) ./Device/Vendor/MSFT/Policy/Config/SystemServices/ConfigureWindowsMobileHotspotServiceStartupMode False 4 False
#microsoft.graph.omaSettingInteger 69.41 (L1) Ensure ‘World Wide Web Publishing Service (W3SVC)’ is set to ‘Disabled’ or ‘Not Installed’ (Automated) ./Device/Vendor/MSFT/Policy/Config/SystemServices/ConfigureWorldWideWebPublishingServiceStartupMode False 4 False

Disable MS WUDO

Disables Microsofts P2P local network update sharing.

Property Value
@odata.type #microsoft.graph.windowsDeliveryOptimizationConfiguration
id a4e50ef4-36e6-4d40-b072-adb3ae1d6ee9
lastModifiedDateTime 07/27/2022 19:48:10
roleScopeTagIds 0
supportsScopeTags True
deviceManagementApplicabilityRuleOsEdition
deviceManagementApplicabilityRuleOsVersion
deviceManagementApplicabilityRuleDeviceMode
createdDateTime 07/27/2022 19:48:10
description Disables Microsofts P2P local network update sharing.
displayName Disable MS WUDO
version 1
deliveryOptimizationMode simpleDownload
restrictPeerSelectionBy notConfigured
groupIdSource
bandwidthMode
backgroundDownloadFromHttpDelayInSeconds
foregroundDownloadFromHttpDelayInSeconds
minimumRamAllowedToPeerInGigabytes
minimumDiskSizeAllowedToPeerInGigabytes
minimumFileSizeToCacheInMegabytes
minimumBatteryPercentageAllowedToUpload
modifyCacheLocation
maximumCacheAgeInDays
maximumCacheSize
vpnPeerCaching notConfigured
cacheServerHostNames
cacheServerForegroundDownloadFallbackToHttpDelayInSeconds
cacheServerBackgroundDownloadFallbackToHttpDelayInSeconds

Assignments

Name MemberCount GroupType DynamicRule Intent Source AssignType
All Users - BuilIn - apply direct Include
All Devices - BuilIn - apply direct Include

Mac Approve System Extensions

This profile is needed for MacOS 10.15 (Catalina) or newer. It will be ignored on older MacOS.

Property Value
@odata.type #microsoft.graph.macOSExtensionsConfiguration
id 175c09f6-f23c-4d11-bda3-4a8714c81c6b
lastModifiedDateTime 04/08/2022 16:18:44
roleScopeTagIds 0
supportsScopeTags True
deviceManagementApplicabilityRuleOsEdition
deviceManagementApplicabilityRuleOsVersion
deviceManagementApplicabilityRuleDeviceMode
createdDateTime 04/08/2022 16:14:57
description This profile is needed for MacOS 10.15 (Catalina) or newer. It will be ignored on older MacOS.
displayName Mac Approve System Extensions
version 2
kernelExtensionOverridesAllowed
kernelExtensionAllowedTeamIdentifiers
systemExtensionsBlockOverride
systemExtensionsAllowedTeamIdentifiers
kernelExtensionsAllowed
systemExtensionsAllowed
systemExtensionsAllowedTypes

Assignments

Name MemberCount GroupType DynamicRule Intent Source AssignType
Apple Business 1 Static (device.deviceOSType -contains “macOS”) or (device.deviceOSType -contains “OS X”) or (device.deviceModel -contains “MacBook Air”) or (device.deviceModel -contains “MacBook Pro”) apply direct Include

Mac Defender for Endpoint Full Disk Access

MacOS 10.15 (Catalina) contains new security and privacy enhancements. Beginning with this version, by default, applications are not able to access certain locations on disk (such as Documents, Downloads, Desktop, etc.) without explicit consent. In the absence of this consent, Microsoft Defender for Endpoint is not able to fully protect your device.
This configuration profile grants Full Disk Access to Microsoft Defender for Endpoint.

Property Value
@odata.type #microsoft.graph.macOSCustomConfiguration
id 4e6ba603-3ae3-4951-9e9e-80a0196bb6e2
lastModifiedDateTime 04/08/2022 16:27:10
roleScopeTagIds 0
supportsScopeTags True
deviceManagementApplicabilityRuleOsEdition
deviceManagementApplicabilityRuleOsVersion
deviceManagementApplicabilityRuleDeviceMode
createdDateTime 04/08/2022 16:24:29
description MacOS 10.15 (Catalina) contains new security and privacy enhancements. Beginning with this version, by default, applications are not able to access certain locations on disk (such as Documents, Downloads, Desktop, etc.) without explicit consent. In the absence of this consent, Microsoft Defender for Endpoint is not able to fully protect your device. This configuration profile grants Full Disk Access to Microsoft Defender for Endpoint.
displayName Mac Defender for Endpoint Full Disk Access
version 2
payloadName Mac MDATP Full Disk Access
payloadFileName fulldisk.mobileconfig
payload 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
deploymentChannel deviceChannel

Assignments

Name MemberCount GroupType DynamicRule Intent Source AssignType
Apple Business 1 Static (device.deviceOSType -contains “macOS”) or (device.deviceOSType -contains “OS X”) or (device.deviceModel -contains “MacBook Air”) or (device.deviceModel -contains “MacBook Pro”) apply direct Include

Mac Defender for Endpoint Network Filter

As part of the Endpoint Detection and Response capabilities, Microsoft Defender for Endpoint on macOS inspects socket traffic and reports this information to the Microsoft 365 Defender portal. The following policy allows the network extension to perform this functionality.

Property Value
@odata.type #microsoft.graph.macOSCustomConfiguration
id 5d61dac5-40ce-47d8-80fc-73e8dbaa48ba
lastModifiedDateTime 04/08/2022 16:26:17
roleScopeTagIds 0
supportsScopeTags True
deviceManagementApplicabilityRuleOsEdition
deviceManagementApplicabilityRuleOsVersion
deviceManagementApplicabilityRuleDeviceMode
createdDateTime 04/08/2022 16:26:17
description As part of the Endpoint Detection and Response capabilities, Microsoft Defender for Endpoint on macOS inspects socket traffic and reports this information to the Microsoft 365 Defender portal. The following policy allows the network extension to perform this functionality.
displayName Mac Defender for Endpoint Network Filter
version 1
payloadName Mac Defender for Endpoint Network Filter
payloadFileName netfilter.mobileconfig
payload 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
deploymentChannel deviceChannel

Assignments

Name MemberCount GroupType DynamicRule Intent Source AssignType
Apple Business 1 Static (device.deviceOSType -contains “macOS”) or (device.deviceOSType -contains “OS X”) or (device.deviceModel -contains “MacBook Air”) or (device.deviceModel -contains “MacBook Pro”) apply direct Include

Mac Defender for Endpoint Notifications

This profile is used to allow Microsoft Defender for Endpoint on macOS and Microsoft Auto Update to display notifications in UI on macOS 10.15 (Catalina) or newer.

Property Value
@odata.type #microsoft.graph.macOSCustomConfiguration
id 43e52813-e3b7-478e-a692-a52cddf1b3f1
lastModifiedDateTime 04/08/2022 16:28:34
roleScopeTagIds 0
supportsScopeTags True
deviceManagementApplicabilityRuleOsEdition
deviceManagementApplicabilityRuleOsVersion
deviceManagementApplicabilityRuleDeviceMode
createdDateTime 04/08/2022 16:28:34
description This profile is used to allow Microsoft Defender for Endpoint on macOS and Microsoft Auto Update to display notifications in UI on macOS 10.15 (Catalina) or newer.
displayName Mac Defender for Endpoint Notifications
version 1
payloadName Mac Defender for Endpoint Notifications
payloadFileName notif.mobileconfig
payload PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz4KPCFET0NUWVBFIHBsaXN0IFBVQkxJQyAiLS8vQXBwbGUvL0RURCBQTElTVCAxLjAvL0VOIiAiaHR0cDovL3d3dy5hcHBsZS5jb20vRFREcy9Qcm9wZXJ0eUxpc3QtMS4wLmR0ZCI+CjxwbGlzdCB2ZXJzaW9uPSIxIj4KPGRpY3Q+CjxrZXk+UGF5bG9hZFVVSUQ8L2tleT4KPHN0cmluZz5FMUUwRDNGNy01NDZGLTQ4NjctQjY1NS02NjlFMTM2MUFCRTU8L3N0cmluZz4KPGtleT5QYXlsb2FkVHlwZTwva2V5Pgo8c3RyaW5nPkNvbmZpZ3VyYXRpb248L3N0cmluZz4KPGtleT5QYXlsb2FkT3JnYW5pemF0aW9uPC9rZXk+CjxzdHJpbmc+TWljcm9zb2Z0IENvcnBvcmF0aW9uPC9zdHJpbmc+CjxrZXk+UGF5bG9hZElkZW50aWZpZXI8L2tleT4KPHN0cmluZz5FMUUwRDNGNy01NDZGLTQ4NjctQjY1NS02NjlFMTM2MUFCRTU8L3N0cmluZz4KPGtleT5QYXlsb2FkRGlzcGxheU5hbWU8L2tleT4KPHN0cmluZz5EZWZlbmRlciAtIE5vdGlmaWNhdGlvbnM8L3N0cmluZz4KPGtleT5QYXlsb2FkRGVzY3JpcHRpb248L2tleT4KPHN0cmluZy8+CjxrZXk+UGF5bG9hZFZlcnNpb248L2tleT4KPGludGVnZXI+MTwvaW50ZWdlcj4KPGtleT5QYXlsb2FkRW5hYmxlZDwva2V5Pgo8dHJ1ZS8+CjxrZXk+UGF5bG9hZFJlbW92YWxEaXNhbGxvd2VkPC9rZXk+Cjx0cnVlLz4KPGtleT5QYXlsb2FkU2NvcGU8L2tleT4KPHN0cmluZz5TeXN0ZW08L3N0cmluZz4KPGtleT5QYXlsb2FkQ29udGVudDwva2V5Pgo8YXJyYXk+CjxkaWN0Pgo8a2V5PlBheWxvYWREaXNwbGF5TmFtZTwva2V5Pgo8c3RyaW5nPk5vdGlmaWNhdGlvbnMgUGF5bG9hZDwvc3RyaW5nPgo8a2V5PlBheWxvYWRJZGVudGlmaWVyPC9rZXk+CjxzdHJpbmc+MDVCRjcyMjEtMjQ3MC00NzdELTk5QjMtMTcyOUIxOTMyQkRCPC9zdHJpbmc+CjxrZXk+UGF5bG9hZE9yZ2FuaXphdGlvbjwva2V5Pgo8c3RyaW5nPk1pY3Jvc29mdCBDb3Jwb3JhdGlvbjwvc3RyaW5nPgo8a2V5PlBheWxvYWRUeXBlPC9rZXk+CjxzdHJpbmc+Y29tLmFwcGxlLm5vdGlmaWNhdGlvbnNldHRpbmdzPC9zdHJpbmc+CjxrZXk+UGF5bG9hZFVVSUQ8L2tleT4KPHN0cmluZz4wNUJGNzIyMS0yNDcwLTQ3N0QtOTlCMy0xNzI5QjE5MzJCREI8L3N0cmluZz4KPGtleT5QYXlsb2FkVmVyc2lvbjwva2V5Pgo8aW50ZWdlcj4xPC9pbnRlZ2VyPgo8a2V5Pk5vdGlmaWNhdGlvblNldHRpbmdzPC9rZXk+CjxhcnJheT4KPGRpY3Q+CjxrZXk+QWxlcnRUeXBlPC9rZXk+CjxpbnRlZ2VyPjE8L2ludGVnZXI+CjxrZXk+QmFkZ2VzRW5hYmxlZDwva2V5Pgo8dHJ1ZS8+CjxrZXk+QnVuZGxlSWRlbnRpZmllcjwva2V5Pgo8c3RyaW5nPmNvbS5taWNyb3NvZnQuYXV0b3VwZGF0ZTI8L3N0cmluZz4KPGtleT5Dcml0aWNhbEFsZXJ0RW5hYmxlZDwva2V5Pgo8ZmFsc2UvPgo8a2V5Pk5vdGlmaWNhdGlvbnNFbmFibGVkPC9rZXk+Cjx0cnVlLz4KPGtleT5TaG93SW5Mb2NrU2NyZWVuPC9rZXk+CjxmYWxzZS8+CjxrZXk+U2hvd0luTm90aWZpY2F0aW9uQ2VudGVyPC9rZXk+Cjx0cnVlLz4KPGtleT5Tb3VuZHNFbmFibGVkPC9rZXk+Cjx0cnVlLz4KPC9kaWN0Pgo8ZGljdD4KPGtleT5BbGVydFR5cGU8L2tleT4KPGludGVnZXI+MTwvaW50ZWdlcj4KPGtleT5CYWRnZXNFbmFibGVkPC9rZXk+Cjx0cnVlLz4KPGtleT5CdW5kbGVJZGVudGlmaWVyPC9rZXk+CjxzdHJpbmc+Y29tLm1pY3Jvc29mdC53ZGF2LnRyYXk8L3N0cmluZz4KPGtleT5Dcml0aWNhbEFsZXJ0RW5hYmxlZDwva2V5Pgo8ZmFsc2UvPgo8a2V5Pk5vdGlmaWNhdGlvbnNFbmFibGVkPC9rZXk+Cjx0cnVlLz4KPGtleT5TaG93SW5Mb2NrU2NyZWVuPC9rZXk+CjxmYWxzZS8+CjxrZXk+U2hvd0luTm90aWZpY2F0aW9uQ2VudGVyPC9rZXk+Cjx0cnVlLz4KPGtleT5Tb3VuZHNFbmFibGVkPC9rZXk+Cjx0cnVlLz4KPC9kaWN0Pgo8L2FycmF5Pgo8L2RpY3Q+CjwvYXJyYXk+CjwvZGljdD4KPC9wbGlzdD4K
deploymentChannel deviceChannel

Assignments

Name MemberCount GroupType DynamicRule Intent Source AssignType
Apple Business 1 Static (device.deviceOSType -contains “macOS”) or (device.deviceOSType -contains “OS X”) or (device.deviceModel -contains “MacBook Air”) or (device.deviceModel -contains “MacBook Pro”) apply direct Include

Mac Firewall

Require enable/disable firewall on MacOS devices.

Property Value
@odata.type #microsoft.graph.macOSEndpointProtectionConfiguration
id be972483-7f59-4965-bbd7-41aaa9c0b1cc
lastModifiedDateTime 05/26/2022 17:04:45
roleScopeTagIds 0
supportsScopeTags True
deviceManagementApplicabilityRuleOsEdition
deviceManagementApplicabilityRuleOsVersion
deviceManagementApplicabilityRuleDeviceMode
createdDateTime 05/26/2022 17:04:45
description Require enable/disable firewall on MacOS devices.
displayName Mac Firewall
version 1
gatekeeperAllowedAppSource macAppStoreAndIdentifiedDevelopers
gatekeeperBlockOverride True
firewallEnabled True
firewallBlockAllIncoming
firewallEnableStealthMode True
fileVaultEnabled
fileVaultSelectedRecoveryKeyTypes notConfigured
fileVaultInstitutionalRecoveryKeyCertificate
fileVaultInstitutionalRecoveryKeyCertificateFileName
fileVaultPersonalRecoveryKeyHelpMessage
fileVaultAllowDeferralUntilSignOut
fileVaultNumberOfTimesUserCanIgnore
fileVaultDisablePromptAtSignOut
fileVaultPersonalRecoveryKeyRotationInMonths
fileVaultHidePersonalRecoveryKey
advancedThreatProtectionRealTime notConfigured
advancedThreatProtectionCloudDelivered notConfigured
advancedThreatProtectionAutomaticSampleSubmission notConfigured
advancedThreatProtectionDiagnosticDataCollection notConfigured
advancedThreatProtectionExcludedFolders
advancedThreatProtectionExcludedFiles
advancedThreatProtectionExcludedExtensions
advancedThreatProtectionExcludedProcesses
firewallApplications

Assignments

Name MemberCount GroupType DynamicRule Intent Source AssignType
Apple Business 1 Static (device.deviceOSType -contains “macOS”) or (device.deviceOSType -contains “OS X”) or (device.deviceModel -contains “MacBook Air”) or (device.deviceModel -contains “MacBook Pro”) apply direct Include

Mac Kernel Extensions

This profile is needed for MacOS 10.15 (Catalina) or older. It will be ignored on newer MacOS.

Property Value
@odata.type #microsoft.graph.macOSExtensionsConfiguration
id a4dc11b2-744a-4cff-88a3-1190841b926e
lastModifiedDateTime 04/08/2022 16:16:51
roleScopeTagIds 0
supportsScopeTags True
deviceManagementApplicabilityRuleOsEdition
deviceManagementApplicabilityRuleOsVersion
deviceManagementApplicabilityRuleDeviceMode
createdDateTime 04/08/2022 16:16:51
description This profile is needed for MacOS 10.15 (Catalina) or older. It will be ignored on newer MacOS.
displayName Mac Kernel Extensions
version 1
kernelExtensionOverridesAllowed
kernelExtensionAllowedTeamIdentifiers UBF8T346G9
systemExtensionsBlockOverride
systemExtensionsAllowedTeamIdentifiers
kernelExtensionsAllowed
systemExtensionsAllowed
systemExtensionsAllowedTypes

Assignments

Name MemberCount GroupType DynamicRule Intent Source AssignType
Apple Business 1 Static (device.deviceOSType -contains “macOS”) or (device.deviceOSType -contains “OS X”) or (device.deviceModel -contains “MacBook Air”) or (device.deviceModel -contains “MacBook Pro”) apply direct Include

Mac MDATP onboarding

Required for all Mac versions

Property Value
@odata.type #microsoft.graph.macOSCustomConfiguration
id e8e07c2d-2bc0-4353-966b-28a2bf8523ca
lastModifiedDateTime 04/08/2022 16:18:00
roleScopeTagIds 0
supportsScopeTags True
deviceManagementApplicabilityRuleOsEdition
deviceManagementApplicabilityRuleOsVersion
deviceManagementApplicabilityRuleDeviceMode
createdDateTime 04/08/2022 16:10:49
description Required for all Mac versions
displayName Mac MDATP onboarding
version 2
payloadName MDATP onboarding for MacOS
payloadFileName WindowsDefenderATPOnboarding.xml
payload <?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
<plist version="1">
    <dict>
        <key>PayloadUUID</key>
        <string>A27F524F-7A54-4E9A-B459-B50A321C4295</string>
        <key>PayloadType</key>
        <string>Configuration</string>
        <key>PayloadOrganization</key>
        <string>Microsoft</string>
        <key>PayloadIdentifier</key>
        <string>A27F524F-7A54-4E9A-B459-B50A321C4295</string>
        <key>PayloadDisplayName</key>
        <string>WDATP settings</string>
        <key>PayloadDescription</key>
        <string>WDATP configuration settings.</string>
        <key>PayloadVersion</key>
        <integer>1</integer>
        <key>PayloadEnabled</key>
        <true/>
        <key>PayloadRemovalDisallowed</key>
        <true/>
        <key>PayloadScope</key>
        <string>System</string>
        <key>PayloadContent</key>
        <array>
            <dict>
                <key>PayloadUUID</key>
                <string>D71143E9-8F41-47EE-8CD2-69495E82C6AC</string>
                <key>PayloadType</key>
                <string>com.microsoft.wdav.atp</string>
                <key>PayloadOrganization</key>
                <string>Microsoft</string>
                <key>PayloadIdentifier</key>
                <string>D71143E9-8F41-47EE-8CD2-69495E82C6AC</string>
                <key>PayloadDisplayName</key>
                <string>WDATP configuration settings</string>
                <key>PayloadDescription</key>
                <string/>
                <key>PayloadVersion</key>
                <integer>1</integer>
                <key>PayloadEnabled</key>
                <true/>
                <key>AllowUserOverrides</key>
                <true/>
                <key>OrgId</key>
                <string>2153dff7-5394-4ad6-a293-4486c19b1702</string>
                <key>OnboardingInfo</key>
                <string>{"body":"{\"previousOrgIds\":[],\"orgId\":\"2153dff7-5394-4ad6-a293-4486c19b1702\",\"geoLocationUrl\":\"https://winatp-gw-cus3.microsoft.com/\",\"datacenter\":\"CentralUs3\",\"vortexGeoLocation\":\"US\",\"version\":\"1.35\"}","sig":"gLAyf1Mw62lEpwh6rRdUmWvE7nJPXwRxgCkzgpORqzBOLDp1Usm0CXxp+VX9LSIM0sgvgA+ymLZ87PQgN3domPdQ/+tI70nfsWk5LYZYU/losxkdEhj9jHziz+UpV4YWZTxZkvZ1AQViejUJvUvjRZX1AEb5zqpbriIitJepNaptogoN9DhUEU9cOCpEPm22HTBUxRLAPqAAxS702s4nwkDSELJrRhJJbJR3iHqrMidLbT3cvHwDILGWc0KufYgZC/GF+DbwT/pOahkPe4wNx2I0IlwxUytt1DMQtu/Jr3ZUpS4iuTe6c53tj1lhTf2BLRXVXYLlh3xiO1RuRSJ9tg==","sha256sig":"T5pooe8pLOZB9jpfoW7/77Pg7gEZKKtdh2OUmxG/mmpKjV5SDXo0YKOc3N16IZcUFUftQqQGC7z+38r6TLzmW+VilZZn3/PrJOChlqyup7hxeRniNY5HwN/0jyR0k7b3ENYxbc89h7y+yfoUU1PJ+Mg5VO4YV7DIJvcCTulZzNBPZULwQryn3szVO3qB/v6C7Eo1ykh77xMALskTgb/4SWXPnBqFgg4n8prT8xQz757D7OBlAFn64tDj5TKmg3L5HmnaSqftN+/U/LvKoqjVlTDLKKJjzZtl9se9BEUUoJkbSiWOiJk7fl5UHCZ2q6xYPIzYzhbH6m5t980iu8rCvw==","cert":"MIIFgzCCA2ugAwIBAgITMwAAAbnvaa3BtdDiyQAAAAABuTANBgkqhkiG9w0BAQsFADB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQgU2VjdXJlIFNlcnZlciBDQSAyMDExMB4XDTIxMDcwMTE5MTQ0OFoXDTIyMDcwMTE5MTQ0OFowHjEcMBoGA1UEAxMTU2V2aWxsZS5XaW5kb3dzLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANwQqmQnh8zPAWsIqT9w8fO/isnLjIq7xGqSBGJd85GZRC2PS/hHJEtxLhKblzBiPwu9MAEkDx6yp+uDpf1hMkIYDo47D/R67fvAcQ0TJ82TdBs8byYBsIsyulf16Tw6QMyZssaDd7W9wFc1pTmB60B6ybx9BVcGxHe5HMzNfmWpcC/+jl9DZpJTAJPjPGmw4JBe2uTkx/M3kfohWjD6vTzLCDtFGU+YvK9n/Tky8AYy7iOflff4HsqrQfsjvLPB4Eqf5DH6dd+OpfScpmpWq23GTVwYMLIVtkgG3pzWS6Gt1f7wxFjpV0qFKix/ROQ+QqcsXisymMdLEP07mhYpeVECAwEAAaOCAVgwggFUMA4GA1UdDwEB/wQEAwIFIDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDAYDVR0TAQH/BAIwADAeBgNVHREEFzAVghNTZXZpbGxlLldpbmRvd3MuY29tMB0GA1UdDgQWBBRiSr3YSZ29UH7giX6oEKqOUnf85jAfBgNVHSMEGDAWgBQ2VollSctbmy88rEIWUE2RuTPXkTBTBgNVHR8ETDBKMEigRqBEhkJodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNTZWNTZXJDQTIwMTFfMjAxMS0xMC0xOC5jcmwwYAYIKwYBBQUHAQEEVDBSMFAGCCsGAQUFBzAChkRodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY1NlY1NlckNBMjAxMV8yMDExLTEwLTE4LmNydDANBgkqhkiG9w0BAQsFAAOCAgEANseRAsrd/3LBKGAR9PO4QG9qXMrYcsPMmAruZGWe2hLBVdj5Vq5RaDs+PUisS08Jf5kkQBLRiwx061a4U9YrobNVdP/FUjwq8UJSHxWVr3erVSazOqCY+ZOYRQgBJBtzi4nhKV/L0+G8uxj/r2yiHBuQeWHI/eeXOd+/bw/3BkdUTgENrrtm4fXanuHyaSHj/q+g4ea/cqrOuD+iIb+gaKM/5e8pWJ0McF3dYwUvBcH0FfxKjegKrsCBU+Y+BmEir8NEHXN7ZUVGx1BiW5DOBjgjCqYo5uxE4bztMmijb5cuH3GbQXPmfGm7GKBN+S7zyA+qK4xanS4cCqaVvZpIYXoPy4CTGXyctyAFLDTybkcxuXU2UqD+k43UkrTpgvZfzAu0XeWkcmNfHsuJOp+YA3Bxq1DUAtdvNwE+oQ0LQhjvqhzE9+nTykXFQq5mVZlXYM3G/Y3lGyxDMqfyEAFnT+nYLbRhnkN6Nidhfe9MKRNSu2jKzfkmYoIGIaWW/bd7WnCDd75DhIgsCW9LHAikaT2jb+JiP9R1grsY3kf98g9KO2gIQKNyifiVYrZQn02wXVfrEh2Qelvom4lBERrU3B/W5mmph4UF3X3iU5lCv55OcoHU2FY4EusnQoxAmBMRz6yxxHZqVuc8IW3G8jxuNu0HaB9vZ+iMEkd9sEIfMpA=","chain":["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","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"]}</string>
            </dict>
        </array>
    </dict>
</plist>

deploymentChannel deviceChannel

Assignments

Name MemberCount GroupType DynamicRule Intent Source AssignType
Apple Business 1 Static (device.deviceOSType -contains “macOS”) or (device.deviceOSType -contains “OS X”) or (device.deviceModel -contains “MacBook Air”) or (device.deviceModel -contains “MacBook Pro”) apply direct Include

XenFi Wifi

WiFi settings for the SLC office.

Property Value
@odata.type #microsoft.graph.windowsWifiConfiguration
id ace48d61-3a43-4ce6-99fe-26d402cb79b9
lastModifiedDateTime 07/21/2022 22:04:56
roleScopeTagIds 0
supportsScopeTags True
deviceManagementApplicabilityRuleOsEdition
deviceManagementApplicabilityRuleOsVersion
deviceManagementApplicabilityRuleDeviceMode
createdDateTime 11/05/2021 20:34:22
description WiFi settings for the SLC office.
displayName XenFi Wifi
version 4
preSharedKey
wifiSecurityType wpa2Personal
meteredConnectionLimit unrestricted
ssid XenFi
networkName XenFi
connectAutomatically True
connectToPreferredNetwork
connectWhenNetworkNameIsHidden
proxySetting none
proxyManualAddress
proxyManualPort
proxyAutomaticConfigurationUrl
forceFIPSCompliance True

Assignments

Name MemberCount GroupType DynamicRule Intent Source AssignType
All Users - BuilIn - apply direct Include

XenFi WiFi

Property Value
@odata.type #microsoft.graph.macOSWiFiConfiguration
id c459745f-cbbf-4aac-bd08-b7ae4d6f2b64
lastModifiedDateTime 07/21/2022 21:28:40
roleScopeTagIds 0
supportsScopeTags True
deviceManagementApplicabilityRuleOsEdition
deviceManagementApplicabilityRuleOsVersion
deviceManagementApplicabilityRuleDeviceMode
createdDateTime 03/25/2022 17:18:04
description
displayName XenFi WiFi
version 5
networkName 94490a93-da69-43b9-8e82-91cfcf020a4a
ssid XenFi
connectAutomatically True
connectWhenNetworkNameIsHidden
wiFiSecurityType wpaPersonal
proxySettings none
proxyManualAddress
proxyManualPort
proxyAutomaticConfigurationUrl
deploymentChannel
preSharedKey

Assignments

Name MemberCount GroupType DynamicRule Intent Source AssignType
Apple Business 1 Static (device.deviceOSType -contains “macOS”) or (device.deviceOSType -contains “OS X”) or (device.deviceModel -contains “MacBook Air”) or (device.deviceModel -contains “MacBook Pro”) apply direct Include

Enrollment Configuration

This section contains all Enrollment configurations in Intune.

Enrollment Limit - All users and all devices

This is the default Device Limit Restriction applied with the lowest priority to all users regardless of group membership.

All users and all devices

Property Value
@odata.type #microsoft.graph.deviceEnrollmentLimitConfiguration
id aeaba85a-84ce-4deb-b0fd-e22de311a7a7_DefaultLimit
displayName All users and all devices
description This is the default Device Limit Restriction applied with the lowest priority to all users regardless of group membership.
priority
createdDateTime 01/01/0001 00:00:00
lastModifiedDateTime 06/19/2024 21:08:37
version
roleScopeTagIds
deviceEnrollmentConfigurationType limit
limit 6

Assignments

Name MemberCount GroupType DynamicRule Intent Source AssignType
All Devices - BuilIn - - direct Include

Platform Restrictions - All users and all devices

This is the default Device Type Restriction applied with the lowest priority to all users regardless of group membership.

All users and all devices

Property Value
@odata.type #microsoft.graph.deviceEnrollmentPlatformRestrictionsConfiguration
id aeaba85a-84ce-4deb-b0fd-e22de311a7a7_DefaultPlatformRestrictions
displayName All users and all devices
description This is the default Device Type Restriction applied with the lowest priority to all users regardless of group membership.
priority
createdDateTime 01/01/0001 00:00:00
lastModifiedDateTime 06/19/2024 21:08:37
version
roleScopeTagIds
deviceEnrollmentConfigurationType platformRestrictions
visionOSRestriction
tvosRestriction
iosRestriction @{platformBlocked=False; personalDeviceEnrollmentBlocked=False; osMinimumVersion=; osMaximumVersion=; blockedManufacturers=System.Object[]; blockedSkus=System.Object[]}
windowsRestriction @{platformBlocked=False; personalDeviceEnrollmentBlocked=False; osMinimumVersion=; osMaximumVersion=; blockedManufacturers=System.Object[]; blockedSkus=System.Object[]}
windowsHomeSkuRestriction @{platformBlocked=False; personalDeviceEnrollmentBlocked=False; osMinimumVersion=; osMaximumVersion=; blockedManufacturers=System.Object[]; blockedSkus=System.Object[]}
windowsMobileRestriction @{platformBlocked=True; personalDeviceEnrollmentBlocked=False; osMinimumVersion=; osMaximumVersion=; blockedManufacturers=System.Object[]; blockedSkus=System.Object[]}
androidRestriction @{platformBlocked=False; personalDeviceEnrollmentBlocked=False; osMinimumVersion=; osMaximumVersion=; blockedManufacturers=System.Object[]; blockedSkus=System.Object[]}
androidForWorkRestriction @{platformBlocked=False; personalDeviceEnrollmentBlocked=False; osMinimumVersion=; osMaximumVersion=; blockedManufacturers=System.Object[]; blockedSkus=System.Object[]}
macRestriction @{platformBlocked=False; personalDeviceEnrollmentBlocked=False; osMinimumVersion=; osMaximumVersion=; blockedManufacturers=System.Object[]; blockedSkus=System.Object[]}
macOSRestriction @{platformBlocked=False; personalDeviceEnrollmentBlocked=False; osMinimumVersion=; osMaximumVersion=; blockedManufacturers=System.Object[]; blockedSkus=System.Object[]}

Assignments

Name MemberCount GroupType DynamicRule Intent Source AssignType
All Devices - BuilIn - - direct Include

Windows Hello for Business - All users and all devices

This is the default Windows Hello for Business configuration applied with the lowest priority to all users regardless of group membership.

All users and all devices

Property Value
@odata.type #microsoft.graph.deviceEnrollmentWindowsHelloForBusinessConfiguration
id aeaba85a-84ce-4deb-b0fd-e22de311a7a7_DefaultWindowsHelloForBusiness
displayName All users and all devices
description This is the default Windows Hello for Business configuration applied with the lowest priority to all users regardless of group membership.
priority
createdDateTime 01/01/0001 00:00:00
lastModifiedDateTime 06/19/2024 21:08:37
version
roleScopeTagIds
deviceEnrollmentConfigurationType windowsHelloForBusiness
pinMinimumLength 6
pinMaximumLength 127
pinUppercaseCharactersUsage allowed
pinLowercaseCharactersUsage allowed
pinSpecialCharactersUsage allowed
state enabled
securityDeviceRequired
unlockWithBiometricsEnabled True
remotePassportEnabled True
pinPreviousBlockCount 5
pinExpirationInDays
enhancedBiometricsState enabled
securityKeyForSignIn enabled
enhancedSignInSecurity

Assignments

Name MemberCount GroupType DynamicRule Intent Source AssignType
All Devices - BuilIn - - direct Include

ESP - All users and all devices

This is the default enrollment status screen configuration applied with the lowest priority to all users and all devices regardless of group membership.

All users and all devices

Property Value
@odata.type #microsoft.graph.windows10EnrollmentCompletionPageConfiguration
id aeaba85a-84ce-4deb-b0fd-e22de311a7a7_DefaultWindows10EnrollmentCompletionPageConfiguration
displayName All users and all devices
description This is the default enrollment status screen configuration applied with the lowest priority to all users and all devices regardless of group membership.
priority
createdDateTime 01/01/0001 00:00:00
lastModifiedDateTime 06/19/2024 21:08:37
version
roleScopeTagIds
deviceEnrollmentConfigurationType windows10EnrollmentCompletionPageConfiguration
showInstallationProgress
blockDeviceSetupRetryByUser True
allowDeviceResetOnInstallFailure
allowLogCollectionOnInstallFailure
customErrorMessage
installProgressTimeoutInMinutes
allowDeviceUseOnInstallFailure
selectedMobileAppIds
allowNonBlockingAppInstallation
installQualityUpdates
trackInstallProgressForAutopilotOnly
disableUserStatusTrackingAfterFirstUser

Assignments

Name MemberCount GroupType DynamicRule Intent Source AssignType
All Devices - BuilIn - - direct Include

ESP - Basics

Basics

Property Value
@odata.type #microsoft.graph.windows10EnrollmentCompletionPageConfiguration
id 9f9dc144-f24f-451b-a1fd-8893946fa431_Windows10EnrollmentCompletionPageConfiguration
displayName Basics
description
priority 1
createdDateTime 06/13/2023 21:55:48
lastModifiedDateTime 06/15/2023 18:36:22
version 4
roleScopeTagIds 0
deviceEnrollmentConfigurationType windows10EnrollmentCompletionPageConfiguration
showInstallationProgress True
blockDeviceSetupRetryByUser
allowDeviceResetOnInstallFailure True
allowLogCollectionOnInstallFailure True
customErrorMessage Setup could not be completed. Please try again or contact your support person for help.
installProgressTimeoutInMinutes 60
allowDeviceUseOnInstallFailure True
selectedMobileAppIds
allowNonBlockingAppInstallation
installQualityUpdates
trackInstallProgressForAutopilotOnly True
disableUserStatusTrackingAfterFirstUser True

Assignments

Name MemberCount GroupType DynamicRule Intent Source AssignType
Autopilot 1 DynamicDevice (device.devicePhysicalIDs -any (_ -contains “[ZTDID]”)) - direct Include

Device Management Partners

This section contains all device management partners defined in Intune.

Jamf

Property Value
id 007d2fff-e0dd-4b28-8595-cec005efe5cd
lastHeartbeatDateTime 01/01/0001 00:00:00
partnerState unknown
partnerAppType singleTenantApp
singleTenantAppId
displayName Jamf
isConfigured
whenPartnerDevicesWillBeRemovedDateTime
whenPartnerDevicesWillBeMarkedAsNonCompliantDateTime
groupsRequiringPartnerEnrollment

PowerShell Scripts

This section contains a list of all PowerShell scripts available in Intune.

Disable Fastboot

Some lab software requires fastboot to be disabled; such as NI MAX.

Property Value
id 0f2e88d4-cfce-40f4-9d83-7e68493c3c23
displayName Disable Fastboot
description Some lab software requires fastboot to be disabled; such as NI MAX.
enforceSignatureCheck
runAs32Bit
runAsAccount system
fileName disable-fastboot.ps1
scriptContent Path = “HKLM:\SYSTEM\CurrentControlSet\Control\Session Manager\Power” $Name = “HiberbootEnabled” $Type = “DWORD” $Value = 1 Try { $Registry = Get-ItemProperty -Path $Path -Name $Name -ErrorAction Stop

Assignments

Name MemberCount GroupType DynamicRule Intent Source AssignType
Lab Computers 1 DynamicDevice (device.displayName -startsWith “lab-”) - Include

Patch CVE-2022-30190

https://github.com/XenterMD/CVE-Patching/blob/main/2022/cve-2022-30190.ps1

Property Value
id 1570d01f-89a4-41d1-8bf6-d7ca844d1b17
displayName Patch CVE-2022-30190
description https://github.com/XenterMD/CVE-Patching/blob/main/2022/cve-2022-30190.ps1
enforceSignatureCheck
runAs32Bit True
runAsAccount system
fileName cve-2022-30190.ps1
scriptContent <# Source: https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/ On Monday May 30, 2022, Microsoft issued CVE-2022-30190 regarding the Microsoft Support Diagnostic Tool (MSDT) in Windows vulnerability. A remote code execution vulnerability exists when MSDT is called using the URL protocol from a calling application such as Word. An attacker who successfully exploits this vulnerability can run arbitrary code with the privileges of the calling application. The attacker can then install programs, view, change, or delete data, or create new accounts in the context allowed by the user’s rights. Workaround: To disable the MSDT URL Protocol Disabling MSDT URL protocol prevents troubleshooters being launched as links including links throughout the operating system. Troubleshooters can still be accessed using the Get Help application and in system settings as other or additional troubleshooters. Follow these steps to disable: 1. Run Command Prompt as Administrator. 2. To back up the registry key, execute the command “reg export HKEY_CLASSES_ROOT\ms-msdt filename“ 3. Execute the command “reg delete HKEY_CLASSES_ROOT\ms-msdt /f”. How to undo the workaround 1. Run Command Prompt as Administrator. 2. To back up the registry key, execute the command “reg import filename” Microsoft Defender Detections & Protections Customers with Microsoft Defender Antivirus should turn-on cloud-delivered protection and automatic sample submission. These capabilities use artificial intelligence and machine learning to quickly identify and stop new and unknown threats. Customers of Microsoft Defender for Endpoint can enable attack surface reduction rule “BlockOfficeCreateProcessRule” that blocks Office apps from creating child processes. Creating malicious child processes is a common malware strategy. For more information see Attack surface reduction rules overview. Microsoft Defender Antivirus provides detections and protections for possible vulnerability exploitation under the following signatures using detection build 1.367.719.0 or newer: - Trojan:Win32/Mesdetty.A  (blocks msdt command line) - Trojan:Win32/Mesdetty.B  (blocks msdt command line) - Behavior:Win32/MesdettyLaunch.A!blk (terminates the process that launched msdt command line) Microsoft Defender for Endpoint provides customers detections and alerts. The following alert title in the Microsoft 365 Defender portal can indicate threat activity on your network: - Suspicious behavior by an Office application - Suspicious behavior by Msdt.exe #> # Define registry key $regkey = “HKEY_CLASSES_ROOT\ms-msdt” # Define backup location \(bak = "C:\\registry\_ms-msdt.reg.bak" \# If regkey exists if (Test-Path -Path registry::\)regkey) { Write-Host -ForegroundColor Red “Vulnerability detected: CVE-2022-30190. Beginning remediation…” # Backup registry key reg export $regkey $bak /y

Assignments

Name MemberCount GroupType DynamicRule Intent Source AssignType
Windows 1 DynamicDevice (device.deviceOSType -eq “Windows”) - Include

Enable WSL

Property Value
id 7e9a029a-7b70-4473-b044-747dc02425dc
displayName Enable WSL
description
enforceSignatureCheck
runAs32Bit
runAsAccount system
fileName Enable-Wsl.ps1
scriptContent nable-WindowsOptionalFeature -Online -FeatureName “Microsoft-Windows-Subsystem-Linux” -All -NoRestart

Assignments

Name MemberCount GroupType DynamicRule Intent Source AssignType
All Users 1 DynamicUser (user.userType -eq “Member”) - Include

Update Python for LabPC

Update to add new python pacakges to lab computers.

Property Value
id 974d28dc-2dc6-47d4-a27c-25c8aa5de855
displayName Update Python for LabPC
description Update to add new python pacakges to lab computers.
enforceSignatureCheck
runAs32Bit
runAsAccount system
fileName pythonupdate.ps1
scriptContent # This script is used to configure a lab PC for use. The following steps are taken: 1. Install Pip Packages 2. Add Python to system PATH #> $pythonPath=‘C:\Users\LabUser\AppData\Local\Microsoft\WindowsApps\PythonSoftwareFoundation.Python.3.8_qbz5n2kfra8p0’ $PathArray = $Env:PSModulePath.Split(“;”) # Install pip packages using pip from \(pythonPath & "\)pythonPath\pip.exe” install pyvisa pyusb zeroconf numpy matplotlib pdfkit qrcode pandas tkcalendar # Add Python to path if($PathArray -notcontains \(pythonPath) { \[Environment\]::SetEnvironmentVariable( "Path", \[Environment\]::GetEnvironmentVariable("Path", \[EnvironmentVariableTarget\]::Machine) + ";\)pythonPath”, [EnvironmentVariableTarget]::Machine) write-host “Added Python to System Path” } # Reload PATH $env:Path = [System.Environment]::GetEnvironmentVariable(“Path”,“Machine”) + “;” + [System.Environment]::GetEnvironmentVariable(“Path”,“User”)

Assignments

Name MemberCount GroupType DynamicRule Intent Source AssignType
Lab Computers 1 DynamicDevice (device.displayName -startsWith “lab-”) - Include

Disable WSL

Property Value
id a5da6193-1070-4fa9-a6f9-ce43b7c4e53e
displayName Disable WSL
description
enforceSignatureCheck
runAs32Bit
runAsAccount system
fileName Disable-Wsl.ps1
scriptContent isable-WindowsOptionalFeature -Online -FeatureName “Microsoft-Windows-Subsystem-Linux” -NoRestart

lab-pc-configuration

This script is used to configure a lab PC for use. The following steps are taken:
1. Install Pip Packages
2. Add nipkg, python, libusb to system PATH
3. Set computers to never sleep
4. Install NI Packages

Property Value
id c4f64c6f-7105-4f2e-b913-fbfb5591b053
displayName lab-pc-configuration
description This script is used to configure a lab PC for use. The following steps are taken: 1. Install Pip Packages 2. Add nipkg, python, libusb to system PATH 3. Set computers to never sleep 4. Install NI Packages
enforceSignatureCheck
runAs32Bit
runAsAccount system
fileName lab-pc-configuration.ps1
scriptContent # This script is used to configure a lab PC for use. The following steps are taken: 1. Install Pip Packages 2. Add nipkg, python, libusb to system PATH 3. Install NI Packages 4. Set computers to never sleep #> $pythonPath=‘C:\Users\LabUser\AppData\Local\Microsoft\WindowsApps\PythonSoftwareFoundation.Python.3.8_qbz5n2kfra8p0’ $libusbPath=‘C:\Users\LabUser\AppData\Local\Packages\PythonSoftwareFoundation.Python.3.8_qbz5n2kfra8p0\LocalCache\local-packages\Python38\site-packages\libusb\_platform\_windows\x64’ $nipkgPath=‘C:\Program Files\National Instruments\NI Package Manager’ $PathArray = \(Env:PSModulePath.Split(";") \#\)envPath=[Environment]::GetEnvironmentVariable(“Path”) # Install pip packages using pip from \(pythonPath & "\)pythonPath\pip.exe” install pyvisa libusb pyusb zeroconf numpy matplotlib pdfkit qrcode pandas # Add programs to path if($PathArray -notcontains \(pythonPath) { \[Environment\]::SetEnvironmentVariable( "Path", \[Environment\]::GetEnvironmentVariable("Path", \[EnvironmentVariableTarget\]::Machine) + ";\)pythonPath”, [EnvironmentVariableTarget]::Machine) write-host “Added Python to System Path” } if($PathArray -notcontains \(libusbPath) { \[Environment\]::SetEnvironmentVariable( "Path", \[Environment\]::GetEnvironmentVariable("Path", \[EnvironmentVariableTarget\]::Machine) + ";\)libusbPath”, [EnvironmentVariableTarget]::Machine) write-host “Added LibUSB to System Path” } if($PathArray -notcontains \(nipkgPath) { \[Environment\]::SetEnvironmentVariable( "Path", \[Environment\]::GetEnvironmentVariable("Path", \[EnvironmentVariableTarget\]::Machine) + ";\)nipkgPath”, [EnvironmentVariableTarget]::Machine) write-host “Added nipkg to System Path” } # Reload PATH $env:Path = [System.Environment]::GetEnvironmentVariable(“Path”,“Machine”) + “;” + [System.Environment]::GetEnvironmentVariable(“Path”,“User”) # Configure computer to never sleep (set to 0 to never sleep) powercfg -change -standby-timeout-ac 0 # Install NI Packages nipkg.exe install –accept-eulas ni-system-configuration ni-visa ni-hwcfg-utility ni-max ni-syscfg-dotnet-runtime ni-syscfg-cvi-support ni-usblandevice ni-web-based-configuration

Assignments

Name MemberCount GroupType DynamicRule Intent Source AssignType
Lab Computers 1 DynamicDevice (device.displayName -startsWith “lab-”) - Include

Disable Application Guard

Disable application guard because it has been depreceated by Microsoft

Property Value
id c547194e-2180-4764-bb7f-11911ebefded
displayName Disable Application Guard
description Disable application guard because it has been depreceated by Microsoft
enforceSignatureCheck
runAs32Bit
runAsAccount system
fileName disable application guard.ps1
scriptContent Set execution policy for the current session Set-ExecutionPolicy -Scope Process -ExecutionPolicy Bypass -Force try { if ((Get-WindowsOptionalFeature -FeatureName Windows-Defender-ApplicationGuard -Online).State -eq “Enabled”) { Disable-WindowsOptionalFeature -Online -FeatureName Windows-Defender-ApplicationGuard -NoRestart } } catch { Write-Output “An error occurred: \((\)_.Exception.Message)” }

Assignments

Name MemberCount GroupType DynamicRule Intent Source AssignType
All Users - BuilIn - - Include

Windows Update Configuration

This section contains a list of all Windows Update configuration profiles available in Intune.

Update policy for Windows 10 devices

Property Value
@odata.type #microsoft.graph.windowsUpdateForBusinessConfiguration
id b1845d94-b421-44be-855b-35449c956e7c
lastModifiedDateTime 11/01/2021 21:44:07
roleScopeTagIds 0
supportsScopeTags True
deviceManagementApplicabilityRuleOsEdition
deviceManagementApplicabilityRuleOsVersion
deviceManagementApplicabilityRuleDeviceMode
createdDateTime 09/09/2021 16:45:43
description
displayName Update policy for Windows 10 devices
version 2
deliveryOptimizationMode httpWithPeeringNat
prereleaseFeatures userDefined
automaticUpdateMode autoInstallAtMaintenanceTime
microsoftUpdateServiceAllowed True
driversExcluded
qualityUpdatesDeferralPeriodInDays
featureUpdatesDeferralPeriodInDays
qualityUpdatesPaused
featureUpdatesPaused
qualityUpdatesPauseExpiryDateTime 01/01/0001 00:00:00
featureUpdatesPauseExpiryDateTime 01/01/0001 00:00:00
businessReadyUpdatesOnly all
skipChecksBeforeRestart
updateWeeks
qualityUpdatesPauseStartDate
featureUpdatesPauseStartDate
featureUpdatesRollbackWindowInDays
qualityUpdatesWillBeRolledBack
featureUpdatesWillBeRolledBack
qualityUpdatesRollbackStartDateTime 01/01/0001 00:00:00
featureUpdatesRollbackStartDateTime 01/01/0001 00:00:00
engagedRestartDeadlineInDays
engagedRestartSnoozeScheduleInDays
engagedRestartTransitionScheduleInDays
deadlineForFeatureUpdatesInDays
deadlineForQualityUpdatesInDays
deadlineGracePeriodInDays
postponeRebootUntilAfterDeadline
autoRestartNotificationDismissal notConfigured
scheduleRestartWarningInHours
scheduleImminentRestartWarningInMinutes
userPauseAccess notConfigured
userWindowsUpdateScanAccess notConfigured
updateNotificationLevel notConfigured
allowWindows11Upgrade
installationSchedule @{@odata.type=#microsoft.graph.windowsUpdateActiveHoursInstall; activeHoursStart=06:00:00.0000000; activeHoursEnd=22:00:00.0000000}

Assignments

Name MemberCount GroupType DynamicRule Intent Source AssignType
All Users 1 DynamicUser (user.userType -eq “Member”) apply direct Include

Mobile Apps

This section contains a list of all applications available in Intune.

Publisher DisplayName Type Assignments
com.microsoft.math androidManagedStoreApp All Users - Intent:available
15Five Inc 15Five androidManagedStoreApp allLicensedUsersAssignmentTarget - Intent:available
8bit Solutions LLC Bitwarden winGetApp allLicensedUsersAssignmentTarget - Intent:uninstall allDevicesAssignmentTarget - Intent:uninstall
8bit Solutions LLC Bitwarden Password Manager iosStoreApp Apple Business - Intent:availableWithoutEnrollment
Adobe Adobe Acrobat Reader win32LobApp allDevicesAssignmentTarget - Intent:required
Adobe Adobe Acrobat Reader DC win32LobApp allDevicesAssignmentTarget - Intent:uninstall
Adobe Adobe Acrobat Reader: Edit PDF androidManagedStoreApp allLicensedUsersAssignmentTarget - Intent:available
Adobe Adobe Acrobat Sign androidManagedStoreApp allLicensedUsersAssignmentTarget - Intent:available
Amazon Mobile LLC Amazon Shopping androidManagedStoreApp allLicensedUsersAssignmentTarget - Intent:available
Apple Apple Configurator iosStoreApp Information Technology - Intent:available - Intent:available
AQA Company ISOXpress winMobileMSI allLicensedUsersAssignmentTarget - Intent:available
Ashish Kulkarni wkhtmltopdf win32LobApp Lab Computers - Intent:required
Atlassian Jira Cloud by Atlassian androidManagedStoreApp allLicensedUsersAssignmentTarget - Intent:available
Authy Twilio Authy Authenticator androidManagedStoreApp allLicensedUsersAssignmentTarget - Intent:available
AWS Mobile LLC AWS Console androidManagedStoreApp allLicensedUsersAssignmentTarget - Intent:available
Bill.com Inc. BILL Spend & Expense (Divvy) androidManagedStoreApp allLicensedUsersAssignmentTarget - Intent:available
Bitwarden Bitwarden macOSDmgApp Apple Business - Intent:required
Bitwarden Inc Bitwarden win32LobApp allDevicesAssignmentTarget - Intent:required
Bitwarden Inc. Bitwarden Password Manager androidManagedStoreApp - Intent:availableWithoutEnrollment
Brother Industries, Ltd. Brother Print Service Plugin androidManagedStoreApp allLicensedUsersAssignmentTarget - Intent:available
Canonical Group Limited Ubuntu 20.04.6 LTS winGetApp allLicensedUsersAssignmentTarget - Intent:available
Dynalist Inc. Obsidian androidManagedStoreApp allLicensedUsersAssignmentTarget - Intent:available
GitHub GitHub androidManagedStoreApp allLicensedUsersAssignmentTarget - Intent:available
GLPI GLPI Agent win32LobApp allDevicesAssignmentTarget - Intent:required
Google Google Chrome winMobileMSI allLicensedUsersAssignmentTarget - Intent:available Lab Computers - Intent:required
Google LLC Gboard - the Google Keyboard androidManagedStoreApp allLicensedUsersAssignmentTarget - Intent:available
Google LLC Gmail androidManagedStoreApp allLicensedUsersAssignmentTarget - Intent:available
Google LLC Google Authenticator androidManagedStoreApp allLicensedUsersAssignmentTarget - Intent:available
Google LLC Google Chrome androidManagedStoreApp allLicensedUsersAssignmentTarget - Intent:available
Kenji Mouri NanaZip winGetApp allDevicesAssignmentTarget - Intent:required
LENOVO INC. Lenovo Vantage winGetApp allDevicesAssignmentTarget - Intent:required
LinkedIn LinkedIn: Jobs & Business News androidManagedStoreApp allLicensedUsersAssignmentTarget - Intent:available
Logitech Logitech G HUB win32LobApp allLicensedUsersAssignmentTarget - Intent:available
Microsoft Microsoft 365 Apps for macOS macOSOfficeSuiteApp Apple Business - Intent:required allLicensedUsersAssignmentTarget - Intent:available
Microsoft Microsoft 365 Apps for Windows 10 and later officeSuiteApp allLicensedUsersAssignmentTarget - Intent:available allDevicesAssignmentTarget - Intent:required
Microsoft Microsoft Azure CLI (64-bit) winMobileMSI Information Technology - Intent:available
Microsoft Microsoft Defender for Endpoint (macOS) macOSMicrosoftDefenderApp allDevicesAssignmentTarget - Intent:required
Microsoft Microsoft Edge for macOS macOSMicrosoftEdgeApp allLicensedUsersAssignmentTarget - Intent:available
Microsoft Powershell 7.2.5 macOSLobApp allLicensedUsersAssignmentTarget - Intent:available
Microsoft Project officeSuiteApp Visio - Intent:available Microsoft Project - Intent:required
Microsoft SQL Server Management Studio win32LobApp Software - Intent:available
Microsoft Visio officeSuiteApp Visio - Intent:available
Microsoft VS Code win32LobApp allLicensedUsersAssignmentTarget - Intent:available Lab Computers - Intent:required
Microsoft Corporation Azure Information Protection androidManagedStoreApp allLicensedUsersAssignmentTarget - Intent:available
Microsoft Corporation Company Portal winGetApp allLicensedUsersAssignmentTarget - Intent:required
Microsoft Corporation Dynamics 365 Business Central androidManagedStoreApp allLicensedUsersAssignmentTarget - Intent:available
Microsoft Corporation HEIF Image Extensions winGetApp allLicensedUsersAssignmentTarget - Intent:required
Microsoft Corporation Intune Company Portal androidManagedStoreApp allLicensedUsersAssignmentTarget - Intent:availableWithoutEnrollment allDevicesAssignmentTarget - Intent:required
Microsoft Corporation Link to Windows androidManagedStoreApp allLicensedUsersAssignmentTarget - Intent:available
Microsoft Corporation Microsoft 365 Admin androidManagedStoreApp Information Technology - Intent:available - Intent:available
Microsoft Corporation Microsoft 365 Copilot androidManagedStoreApp allLicensedUsersAssignmentTarget - Intent:available
Microsoft Corporation Microsoft Authenticator androidManagedStoreApp allLicensedUsersAssignmentTarget - Intent:available
Microsoft Corporation Microsoft Azure androidManagedStoreApp allLicensedUsersAssignmentTarget - Intent:available
Microsoft Corporation Microsoft Edge: AI browser androidManagedStoreApp allLicensedUsersAssignmentTarget - Intent:available
Microsoft Corporation Microsoft Edge: Web Browser iosStoreApp allLicensedUsersAssignmentTarget - Intent:available
Microsoft Corporation Microsoft Excel iosStoreApp allLicensedUsersAssignmentTarget - Intent:available
Microsoft Corporation Microsoft Excel: Spreadsheets androidManagedStoreApp allLicensedUsersAssignmentTarget - Intent:available
Microsoft Corporation Microsoft Intune androidManagedStoreApp allLicensedUsersAssignmentTarget - Intent:availableWithoutEnrollment allDevicesAssignmentTarget - Intent:required
Microsoft Corporation Microsoft Intune Company Portal iosStoreApp allLicensedUsersAssignmentTarget - Intent:required
Microsoft Corporation Microsoft Launcher androidManagedStoreApp allLicensedUsersAssignmentTarget - Intent:available
Microsoft Corporation Microsoft Lens - PDF Scanner androidManagedStoreApp allLicensedUsersAssignmentTarget - Intent:available
Microsoft Corporation Microsoft Loop winGetApp allLicensedUsersAssignmentTarget - Intent:available
Microsoft Corporation Microsoft Office iosStoreApp allDevicesAssignmentTarget - Intent:required
Microsoft Corporation Microsoft OneDrive androidManagedStoreApp allLicensedUsersAssignmentTarget - Intent:available
Microsoft Corporation Microsoft OneDrive iosStoreApp allLicensedUsersAssignmentTarget - Intent:available
Microsoft Corporation Microsoft OneNote iosStoreApp allLicensedUsersAssignmentTarget - Intent:available
Microsoft Corporation Microsoft OneNote: Save Notes androidManagedStoreApp allLicensedUsersAssignmentTarget - Intent:available
Microsoft Corporation Microsoft Outlook iosStoreApp allLicensedUsersAssignmentTarget - Intent:available
Microsoft Corporation Microsoft Outlook androidManagedStoreApp allLicensedUsersAssignmentTarget - Intent:available
Microsoft Corporation Microsoft Planner androidManagedStoreApp allLicensedUsersAssignmentTarget - Intent:available
Microsoft Corporation Microsoft Power BI androidManagedStoreApp allLicensedUsersAssignmentTarget - Intent:available
Microsoft Corporation Microsoft PowerPoint iosStoreApp allLicensedUsersAssignmentTarget - Intent:available
Microsoft Corporation Microsoft PowerPoint androidManagedStoreApp allLicensedUsersAssignmentTarget - Intent:available
Microsoft Corporation Microsoft SharePoint androidManagedStoreApp allLicensedUsersAssignmentTarget - Intent:available
Microsoft Corporation Microsoft Teams androidManagedStoreApp allLicensedUsersAssignmentTarget - Intent:available
Microsoft Corporation Microsoft Teams iosStoreApp allLicensedUsersAssignmentTarget - Intent:available
Microsoft Corporation Microsoft To Do: Lists & Tasks androidManagedStoreApp All Users - Intent:available
Microsoft Corporation Microsoft Translator androidManagedStoreApp All Users - Intent:available
Microsoft Corporation Microsoft Word iosStoreApp allLicensedUsersAssignmentTarget - Intent:available
Microsoft Corporation Microsoft Word: Edit Documents androidManagedStoreApp allLicensedUsersAssignmentTarget - Intent:available
Microsoft Corporation Power Apps androidManagedStoreApp allLicensedUsersAssignmentTarget - Intent:available
Microsoft Corporation Power Automate androidManagedStoreApp allLicensedUsersAssignmentTarget - Intent:available
Microsoft Corporation Remote Desktop androidManagedStoreApp allLicensedUsersAssignmentTarget - Intent:available
Microsoft Corporation VP9 Video Extensions winGetApp allLicensedUsersAssignmentTarget - Intent:required
Mozilla Firefox Fast & Private Browser androidManagedStoreApp allLicensedUsersAssignmentTarget - Intent:available
Mozilla Mozilla Firefox winGetApp allLicensedUsersAssignmentTarget - Intent:available
mRemoteNG mRemoteNG winMobileMSI allLicensedUsersAssignmentTarget - Intent:available
National Instruments NI Package Manager win32LobApp allLicensedUsersAssignmentTarget - Intent:available Lab Computers - Intent:required
OBSBOT Obsbot win32LobApp allLicensedUsersAssignmentTarget - Intent:available
Okta Inc. Okta Verify androidManagedStoreApp allLicensedUsersAssignmentTarget - Intent:available
OpenVPN OpenVPN Connect – OpenVPN App androidManagedStoreApp allLicensedUsersAssignmentTarget - Intent:available
Oracle America, Inc. NetSuite androidManagedStoreApp allLicensedUsersAssignmentTarget - Intent:available
People Center Inc. Rippling - HR, IT & Finance androidManagedStoreApp allLicensedUsersAssignmentTarget - Intent:available
People Center Inc. Rippling - Time Clock androidManagedStoreApp allLicensedUsersAssignmentTarget - Intent:available
Pritunl Pritunl win32LobApp allLicensedUsersAssignmentTarget - Intent:required allDevicesAssignmentTarget - Intent:required
Pritunl, Inc. Pritunl macOSLobApp Apple Business - Intent:available
Python Software Foundation Python 3.8 win32LobApp allLicensedUsersAssignmentTarget - Intent:available
RealVNC Limited RealVNC Viewer: Remote Desktop androidManagedStoreApp allLicensedUsersAssignmentTarget - Intent:available
Rippling People Center Inc. Rippling macOSDmgApp Apple Business - Intent:required allDevicesAssignmentTarget - Intent:required
Royal Apps GmbH Royal TSD Lite androidManagedStoreApp allLicensedUsersAssignmentTarget - Intent:available
Royal Apps GmbH Royal TSX macOSDmgApp Information Technology - Intent:required
scloud Screensaver Deployment win32LobApp allLicensedUsersAssignmentTarget - Intent:required
Spiceworks Spiceworks Agent Shell winMobileMSI allLicensedUsersAssignmentTarget - Intent:required
SwiftKey Microsoft SwiftKey AI Keyboard androidManagedStoreApp allLicensedUsersAssignmentTarget - Intent:available
Termius Corporation Termius - Modern SSH Client androidManagedStoreApp allLicensedUsersAssignmentTarget - Intent:available
The Python Software Foundation Python 3.12 win32LobApp allLicensedUsersAssignmentTarget - Intent:available
Vibe Inc Vibe Canvas androidManagedStoreApp allLicensedUsersAssignmentTarget - Intent:available
Zoom Video Communications, Inc. Zoom Client macOSLobApp allLicensedUsersAssignmentTarget - Intent:available
Zoom Video Communications, Inc. Zoom Outlook Plugin macOSLobApp allLicensedUsersAssignmentTarget - Intent:available
Zoom Video Communications, Inc. Zoom Workplace (64-bit) winMobileMSI allDevicesAssignmentTarget - Intent:required
zoom.com Zoom Rooms Controller androidManagedStoreApp allLicensedUsersAssignmentTarget - Intent:availableWithoutEnrollment
zoom.com Zoom Workplace androidManagedStoreApp allLicensedUsersAssignmentTarget - Intent:availableWithoutEnrollment
zoom.com Zoom Workplace for Intune androidManagedStoreApp allLicensedUsersAssignmentTarget - Intent:available

Mobile App Management

This section contains a list of all mobile applications management policies available in Intune.

OneDrive mobile policy

OneDrive mobile policy UX set via Admin UX

Property Value
@odata.type #microsoft.graph.defaultManagedAppProtection
displayName OneDrive mobile policy
description OneDrive mobile policy UX set via Admin UX
createdDateTime 08/13/2020 16:10:52
lastModifiedDateTime 01/05/2022 00:06:26
roleScopeTagIds 0
id G_4ef35a8f-185a-4b67-8210-278957c7b64c
version “20002f81-0000-0300-0000-61d4e1020000”
periodOfflineBeforeAccessCheck PT1H30M
periodOnlineBeforeAccessCheck P7D
allowedInboundDataTransferSources allApps
allowedOutboundDataTransferDestinations allApps
organizationalCredentialsRequired
allowedOutboundClipboardSharingLevel allApps
dataBackupBlocked
deviceComplianceRequired
managedBrowserToOpenLinksRequired
saveAsBlocked
periodOfflineBeforeWipeIsEnforced P720D
pinRequired
maximumPinRetries 5
simplePinBlocked
minimumPinLength 8
pinCharacterSet numeric
periodBeforePinReset PT0S
allowedDataStorageLocations
contactSyncBlocked
printBlocked
fingerprintBlocked
disableAppPinIfDevicePinIsSet
maximumRequiredOsVersion
maximumWarningOsVersion
maximumWipeOsVersion
minimumRequiredOsVersion
minimumWarningOsVersion
minimumRequiredAppVersion
minimumWarningAppVersion
minimumWipeOsVersion
minimumWipeAppVersion
appActionIfDeviceComplianceRequired block
appActionIfMaximumPinRetriesExceeded block
pinRequiredInsteadOfBiometricTimeout
allowedOutboundClipboardSharingExceptionLength
notificationRestriction allow
previousPinBlockCount
managedBrowser notConfigured
maximumAllowedDeviceThreatLevel notConfigured
mobileThreatDefenseRemediationAction block
mobileThreatDefensePartnerPriority
blockDataIngestionIntoOrganizationDocuments
allowedDataIngestionLocations
appActionIfUnableToAuthenticateUser
dialerRestrictionLevel allApps
gracePeriodToBlockAppsDuringOffClockHours
protectedMessagingRedirectAppType anyApp
appDataEncryptionType useDeviceSettings
screenCaptureBlocked
allowWidgetContentSync
encryptAppData
disableAppEncryptionIfDeviceEncryptionIsEnabled
minimumRequiredSdkVersion
deployedAppCount
minimumRequiredPatchVersion 0000-00-00
minimumWarningPatchVersion 0000-00-00
faceIdBlocked
minimumWipeSdkVersion
minimumWipePatchVersion 0000-00-00
allowedIosDeviceModels
appActionIfIosDeviceModelNotAllowed block
allowedAndroidDeviceManufacturers
appActionIfAndroidDeviceManufacturerNotAllowed block
thirdPartyKeyboardsBlocked
filterOpenInToOnlyManagedApps
disableProtectionOfManagedOutboundOpenInData
protectInboundDataFromUnknownSources
requiredAndroidSafetyNetDeviceAttestationType none
appActionIfAndroidSafetyNetDeviceAttestationFailed block
requiredAndroidSafetyNetAppsVerificationType none
appActionIfAndroidSafetyNetAppsVerificationFailed block
customBrowserProtocol
customBrowserPackageId
customBrowserDisplayName
minimumRequiredCompanyPortalVersion
minimumWarningCompanyPortalVersion
minimumWipeCompanyPortalVersion
allowedAndroidDeviceModels
appActionIfAndroidDeviceModelNotAllowed block
customDialerAppProtocol
customDialerAppPackageId
customDialerAppDisplayName
biometricAuthenticationBlocked
requiredAndroidSafetyNetEvaluationType basic
blockAfterCompanyPortalUpdateDeferralInDays
warnAfterCompanyPortalUpdateDeferralInDays
wipeAfterCompanyPortalUpdateDeferralInDays
deviceLockRequired
appActionIfDeviceLockNotSet block
connectToVpnOnLaunch
appActionIfDevicePasscodeComplexityLessThanLow
appActionIfAccountIsClockedOut
appActionIfDevicePasscodeComplexityLessThanMedium
appActionIfDevicePasscodeComplexityLessThanHigh
requireClass3Biometrics
requirePinAfterBiometricChange
fingerprintAndBiometricEnabled
minimumWarningSdkVersion
messagingRedirectAppUrlScheme
messagingRedirectAppDisplayName
messagingRedirectAppPackageId
customSettings
exemptedAppProtocols
exemptedAppPackages

OneDrive mobile policy

OneDrive mobile policy UX set via Admin UX

Property Value
@odata.type #microsoft.graph.defaultManagedAppProtection
displayName OneDrive mobile policy
description OneDrive mobile policy UX set via Admin UX
createdDateTime 08/13/2020 16:11:25
lastModifiedDateTime 01/05/2022 00:06:26
roleScopeTagIds 0
id G_7db7347d-71bd-4eb6-8d28-3103c1fc24bb
version “11008d05-0000-0300-0000-61d4e1020000”
periodOfflineBeforeAccessCheck PT1H30M
periodOnlineBeforeAccessCheck P7D
allowedInboundDataTransferSources allApps
allowedOutboundDataTransferDestinations allApps
organizationalCredentialsRequired
allowedOutboundClipboardSharingLevel allApps
dataBackupBlocked
deviceComplianceRequired
managedBrowserToOpenLinksRequired
saveAsBlocked
periodOfflineBeforeWipeIsEnforced P720D
pinRequired
maximumPinRetries 5
simplePinBlocked
minimumPinLength 8
pinCharacterSet numeric
periodBeforePinReset PT0S
allowedDataStorageLocations
contactSyncBlocked
printBlocked
fingerprintBlocked
disableAppPinIfDevicePinIsSet
maximumRequiredOsVersion
maximumWarningOsVersion
maximumWipeOsVersion
minimumRequiredOsVersion
minimumWarningOsVersion
minimumRequiredAppVersion
minimumWarningAppVersion
minimumWipeOsVersion
minimumWipeAppVersion
appActionIfDeviceComplianceRequired block
appActionIfMaximumPinRetriesExceeded block
pinRequiredInsteadOfBiometricTimeout
allowedOutboundClipboardSharingExceptionLength
notificationRestriction allow
previousPinBlockCount
managedBrowser notConfigured
maximumAllowedDeviceThreatLevel notConfigured
mobileThreatDefenseRemediationAction block
mobileThreatDefensePartnerPriority
blockDataIngestionIntoOrganizationDocuments
allowedDataIngestionLocations
appActionIfUnableToAuthenticateUser
dialerRestrictionLevel allApps
gracePeriodToBlockAppsDuringOffClockHours
protectedMessagingRedirectAppType anyApp
appDataEncryptionType useDeviceSettings
screenCaptureBlocked
allowWidgetContentSync
encryptAppData True
disableAppEncryptionIfDeviceEncryptionIsEnabled
minimumRequiredSdkVersion
deployedAppCount 2
minimumRequiredPatchVersion 0000-00-00
minimumWarningPatchVersion 0000-00-00
faceIdBlocked
minimumWipeSdkVersion
minimumWipePatchVersion 0000-00-00
allowedIosDeviceModels
appActionIfIosDeviceModelNotAllowed block
allowedAndroidDeviceManufacturers
appActionIfAndroidDeviceManufacturerNotAllowed block
thirdPartyKeyboardsBlocked
filterOpenInToOnlyManagedApps
disableProtectionOfManagedOutboundOpenInData
protectInboundDataFromUnknownSources
requiredAndroidSafetyNetDeviceAttestationType none
appActionIfAndroidSafetyNetDeviceAttestationFailed block
requiredAndroidSafetyNetAppsVerificationType none
appActionIfAndroidSafetyNetAppsVerificationFailed block
customBrowserProtocol
customBrowserPackageId
customBrowserDisplayName
minimumRequiredCompanyPortalVersion
minimumWarningCompanyPortalVersion
minimumWipeCompanyPortalVersion
allowedAndroidDeviceModels
appActionIfAndroidDeviceModelNotAllowed block
customDialerAppProtocol
customDialerAppPackageId
customDialerAppDisplayName
biometricAuthenticationBlocked
requiredAndroidSafetyNetEvaluationType basic
blockAfterCompanyPortalUpdateDeferralInDays
warnAfterCompanyPortalUpdateDeferralInDays
wipeAfterCompanyPortalUpdateDeferralInDays
deviceLockRequired
appActionIfDeviceLockNotSet block
connectToVpnOnLaunch
appActionIfDevicePasscodeComplexityLessThanLow
appActionIfAccountIsClockedOut
appActionIfDevicePasscodeComplexityLessThanMedium
appActionIfDevicePasscodeComplexityLessThanHigh
requireClass3Biometrics
requirePinAfterBiometricChange
fingerprintAndBiometricEnabled
minimumWarningSdkVersion
messagingRedirectAppUrlScheme
messagingRedirectAppDisplayName
messagingRedirectAppPackageId
customSettings
exemptedAppProtocols
exemptedAppPackages

Default iOS Policy

{}

Property Value
@odata.type #microsoft.graph.iosManagedAppProtection
displayName Default iOS Policy
description {}
createdDateTime 08/21/2020 02:22:28
lastModifiedDateTime 01/04/2022 21:52:23
roleScopeTagIds 0
id T_59f5d989-43c2-499f-a5a4-d3f335855a4d
version “0b00b4a3-0000-0300-0000-61d4c1970000”
periodOfflineBeforeAccessCheck PT12H
periodOnlineBeforeAccessCheck PT12H
allowedInboundDataTransferSources allApps
allowedOutboundDataTransferDestinations allApps
organizationalCredentialsRequired
allowedOutboundClipboardSharingLevel allApps
dataBackupBlocked
deviceComplianceRequired
managedBrowserToOpenLinksRequired
saveAsBlocked
periodOfflineBeforeWipeIsEnforced P1D
pinRequired
maximumPinRetries 5
simplePinBlocked
minimumPinLength 4
pinCharacterSet numeric
periodBeforePinReset PT0S
allowedDataStorageLocations
contactSyncBlocked
printBlocked
fingerprintBlocked
disableAppPinIfDevicePinIsSet
maximumRequiredOsVersion
maximumWarningOsVersion
maximumWipeOsVersion
minimumRequiredOsVersion
minimumWarningOsVersion
minimumRequiredAppVersion
minimumWarningAppVersion
minimumWipeOsVersion
minimumWipeAppVersion
appActionIfDeviceComplianceRequired block
appActionIfMaximumPinRetriesExceeded block
pinRequiredInsteadOfBiometricTimeout
allowedOutboundClipboardSharingExceptionLength
notificationRestriction allow
previousPinBlockCount
managedBrowser notConfigured
maximumAllowedDeviceThreatLevel notConfigured
mobileThreatDefenseRemediationAction block
mobileThreatDefensePartnerPriority
blockDataIngestionIntoOrganizationDocuments
allowedDataIngestionLocations
appActionIfUnableToAuthenticateUser
dialerRestrictionLevel allApps
gracePeriodToBlockAppsDuringOffClockHours
protectedMessagingRedirectAppType anyApp
isAssigned True
targetedAppManagementLevels unspecified
appGroupType selectedPublicApps
appDataEncryptionType useDeviceSettings
minimumRequiredSdkVersion
deployedAppCount
faceIdBlocked
allowWidgetContentSync
minimumWipeSdkVersion
allowedIosDeviceModels
appActionIfIosDeviceModelNotAllowed block
appActionIfAccountIsClockedOut
thirdPartyKeyboardsBlocked
filterOpenInToOnlyManagedApps
disableProtectionOfManagedOutboundOpenInData
protectInboundDataFromUnknownSources
customBrowserProtocol
customDialerAppProtocol
managedUniversalLinks http://*.sharepoint.com/* http://*.sharepoint-df.com/* http://*.yammer.com/* http://*.onedrive.com/* http://tasks.office.com/* http://to-do.microsoft.com/sharing* http://web.microsoftstream.com/video/* http://msit.microsoftstream.com/video/* http://*.powerbi.com/* http://app.powerbi.cn/* http://app.powerbigov.us/* http://app.powerbi.de/* http://*.service-now.com/* http://*.appsplatform.us/* http://*.powerapps.cn/* http://*.powerapps.com/* http://*.powerapps.us/* http://*teams.microsoft.com/l/* http://*devspaces.skype.com/l/* http://*teams.live.com/l/* http://*collab.apps.mil/l/* http://*teams.microsoft.us/l/* http://*teams-fl.microsoft.com/l/* http://*.zoom.us/* http://zoom.us/* https://*.sharepoint.com/* https://*.sharepoint-df.com/* https://*.yammer.com/* https://*.onedrive.com/* https://tasks.office.com/* https://to-do.microsoft.com/sharing* https://web.microsoftstream.com/video/* https://msit.microsoftstream.com/video/* https://*.powerbi.com/* https://app.powerbi.cn/* https://app.powerbigov.us/* https://app.powerbi.de/* https://*.service-now.com/* https://*.appsplatform.us/* https://*.powerapps.cn/* https://*.powerapps.com/* https://*.powerapps.us/* https://*teams.microsoft.com/l/* https://*devspaces.skype.com/l/* https://*teams.live.com/l/* https://*collab.apps.mil/l/* https://*teams.microsoft.us/l/* https://*teams-fl.microsoft.com/l/* https://*.zoom.us/* https://zoom.us/*
exemptedUniversalLinks http://maps.apple.com https://maps.apple.com http://facetime.apple.com https://facetime.apple.com
minimumWarningSdkVersion
messagingRedirectAppUrlScheme
exemptedAppProtocols
Targeted Apps

Assignments

Name MemberCount GroupType DynamicRule Intent Source AssignType
All Users 1 DynamicUser (user.userType -eq “Member”) - direct Include

Default Android Policy

{}

Property Value
@odata.type #microsoft.graph.androidManagedAppProtection
displayName Default Android Policy
description {}
createdDateTime 08/21/2020 01:45:36
lastModifiedDateTime 01/04/2022 21:52:25
roleScopeTagIds 0
id T_52e262b6-b544-4544-82f3-9f636563cb2e
version “0b0095a8-0000-0300-0000-61d4c1990000”
periodOfflineBeforeAccessCheck PT12H
periodOnlineBeforeAccessCheck PT12H
allowedInboundDataTransferSources allApps
allowedOutboundDataTransferDestinations allApps
organizationalCredentialsRequired
allowedOutboundClipboardSharingLevel allApps
dataBackupBlocked
deviceComplianceRequired
managedBrowserToOpenLinksRequired
saveAsBlocked
periodOfflineBeforeWipeIsEnforced P1D
pinRequired
maximumPinRetries 5
simplePinBlocked
minimumPinLength 4
pinCharacterSet numeric
periodBeforePinReset PT0S
allowedDataStorageLocations
contactSyncBlocked
printBlocked
fingerprintBlocked
disableAppPinIfDevicePinIsSet
maximumRequiredOsVersion
maximumWarningOsVersion
maximumWipeOsVersion
minimumRequiredOsVersion
minimumWarningOsVersion
minimumRequiredAppVersion
minimumWarningAppVersion
minimumWipeOsVersion
minimumWipeAppVersion
appActionIfDeviceComplianceRequired block
appActionIfMaximumPinRetriesExceeded block
pinRequiredInsteadOfBiometricTimeout
allowedOutboundClipboardSharingExceptionLength
notificationRestriction allow
previousPinBlockCount
managedBrowser notConfigured
maximumAllowedDeviceThreatLevel notConfigured
mobileThreatDefenseRemediationAction block
mobileThreatDefensePartnerPriority
blockDataIngestionIntoOrganizationDocuments
allowedDataIngestionLocations
appActionIfUnableToAuthenticateUser
dialerRestrictionLevel allApps
gracePeriodToBlockAppsDuringOffClockHours
protectedMessagingRedirectAppType anyApp
isAssigned True
targetedAppManagementLevels unspecified
appGroupType selectedPublicApps
screenCaptureBlocked
disableAppEncryptionIfDeviceEncryptionIsEnabled
encryptAppData
deployedAppCount
minimumRequiredPatchVersion 0000-00-00
minimumWarningPatchVersion 0000-00-00
minimumWipePatchVersion 0000-00-00
allowedAndroidDeviceManufacturers
appActionIfAndroidDeviceManufacturerNotAllowed block
appActionIfAccountIsClockedOut
appActionIfSamsungKnoxAttestationRequired
requiredAndroidSafetyNetDeviceAttestationType none
appActionIfAndroidSafetyNetDeviceAttestationFailed block
requiredAndroidSafetyNetAppsVerificationType none
appActionIfAndroidSafetyNetAppsVerificationFailed block
customBrowserPackageId
customBrowserDisplayName
minimumRequiredCompanyPortalVersion
minimumWarningCompanyPortalVersion
minimumWipeCompanyPortalVersion
keyboardsRestricted
allowedAndroidDeviceModels
appActionIfAndroidDeviceModelNotAllowed block
customDialerAppPackageId
customDialerAppDisplayName
biometricAuthenticationBlocked
requiredAndroidSafetyNetEvaluationType basic
blockAfterCompanyPortalUpdateDeferralInDays
warnAfterCompanyPortalUpdateDeferralInDays
wipeAfterCompanyPortalUpdateDeferralInDays
deviceLockRequired
appActionIfDeviceLockNotSet block
connectToVpnOnLaunch
appActionIfDevicePasscodeComplexityLessThanLow
appActionIfDevicePasscodeComplexityLessThanMedium
appActionIfDevicePasscodeComplexityLessThanHigh
requireClass3Biometrics
requirePinAfterBiometricChange
fingerprintAndBiometricEnabled
messagingRedirectAppPackageId
messagingRedirectAppDisplayName
exemptedAppPackages
approvedKeyboards
Targeted Apps

Assignments

Name MemberCount GroupType DynamicRule Intent Source AssignType
All Users 1 DynamicUser (user.userType -eq “Member”) - direct Include

Default Windows 10 Application Policy

{}

Property Value
@odata.type #microsoft.graph.mdmWindowsInformationProtectionPolicy
displayName Default Windows 10 Application Policy
description {}
createdDateTime 08/13/2020 20:14:02
lastModifiedDateTime 11/16/2021 21:45:58
roleScopeTagIds 0
id M_81118850-9b16-465e-9d2a-83af981ae866
version 7
enforcementLevel noProtection
enterpriseDomain xentermd.com
protectionUnderLockConfigRequired True
revokeOnUnenrollDisabled
rightsManagementServicesTemplateId
azureRightsManagementServicesAllowed
iconsVisible True
enterpriseIPRangesAreAuthoritative
enterpriseProxyServersAreAuthoritative
indexingEncryptedStoresOrItemsBlocked
isAssigned True
enterpriseProtectedDomainNames
dataRecoveryCertificate @{subjectName=OU=EFS File Encryption Certificate, L=EFS, CN=RexLinder; description=dra_recovery_key_microsoft365.CER; expirationDateTime=07/20/2120 02:50:05; certificate=}
protectedApps Internet Explorer, Word, Excel, PowerPoint, OneDrive, OneNote, Mail and Calendar, Skype for Business, Microsoft Edge
exemptApps
enterpriseNetworkDomainNames
enterpriseProxiedDomains
enterpriseIPRanges
enterpriseProxyServers
enterpriseInternalProxyServers
neutralDomainResources
smbAutoEncryptedFileExtensions

Assignments

Name MemberCount GroupType DynamicRule Intent Source AssignType
All Users 1 DynamicUser (user.userType -eq “Member”) - direct Include
Back to top