This video will show you a demonstration of deploying a security baseline with Microsoft Intune. Get a discount on all my courses at: examlabpractice.com/courses
Пікірлер: 5
@dtitan19932 ай бұрын
How long does it usually take to enroll a device to intune and get apps or settings without forcing a sync?
@petephelp97114 күн бұрын
When you're using the trial up to 6 hours because microsoft seriously de-prioritizes your licenses
@davegilden66032 ай бұрын
Is it possible to manage these in a scripted manner, perhaps with Graph? I am exploring how this can be managed for multiple client tenant accounts and it seems a very manual procesw
@examlabpractice2 ай бұрын
Yes, you can manage security baselines in Microsoft Intune using a scripted approach with Microsoft Graph. Microsoft Graph allows you to interact programmatically with various Microsoft 365 services, including Intune, and it supports operations like creating, listing, updating, and deleting security baselines. Here’s how you can use Microsoft Graph to manage security baselines: 1. **Authentication**: First, you need to authenticate to Microsoft Graph. This typically involves registering an application in Azure AD and obtaining the necessary permissions. 2. **Permissions**: Ensure your application has the required permissions. For managing security baselines, you might need permissions like `DeviceManagementConfiguration.ReadWrite.All`. 3. **API Calls**: Use the Microsoft Graph API to manage security baselines. Here’s a brief overview of the endpoints you might interact with: - **List security baselines**: Retrieve all security baselines available in your tenant. - **Get baseline details**: Fetch details of a specific security baseline. - **Create or update baseline policies**: Apply security baseline settings to a group of devices or update existing baseline policies. - **Delete baseline policies**: Remove baseline policies that are no longer needed. 4. **Automation**: You can automate these API calls using PowerShell, a custom application, or any other method that can make HTTP requests and handle OAuth authentication. 5. **Monitoring and Compliance**: Besides managing the baselines, you can also use Microsoft Graph to monitor compliance against these baselines and generate reports. If you're familiar with PowerShell, you might find it convenient to use the PowerShell SDK for Microsoft Graph to script these operations. Alternatively, you can make direct HTTP requests in any programming language that supports HTTP requests. Would you like to see an example of how to use Microsoft Graph to manage security baselines, possibly with PowerShell or another scripting language?