# Microsoft Intune

The NetSPI Platform has a broad integration with Microsoft Intune.

This integration supports the Microsoft Intune product, which must be properly licensed in order for the integration to work. The Microsoft Intune license provides more data for systems even if Intune policies are not selected.

Similar to our other integrations, the Microsoft Intune integration is read-only and does not perform actions to configure systems or otherwise change anything about your Microsoft Intune system.

# Supported asset types

The Microsoft Intune integration provides the NetSPI Platform visibility into the following asset types:

  • Applications
  • Systems
  • Users

# Endpoints used

This integration needs access to the following API endpoints:

# Required permissions

This integration needs an API key with the following access permissions:

  • Device.Read.All
  • DeviceManagementConfiguration.Read.All
  • DeviceManagementManagedDevices.Read.All
  • DeviceManagementApps.Read.All
  • DeviceManagementRBAC.Read.All
  • DeviceManagementServiceConfig.Read.All
  • Directory.Read.All
  • User.Read
  • User.Read.All
  • AuditLogs.Read.All
  • UserAuthenticationMethod.Read.All
  • Vulnerability.Read.All
  • Software.Read.All
  • Machine.Read.All (for DefenderATP only)

# Configuration steps

Use the section below for configuring Microsoft Intune to integrate with the NetSPI Platform.

# Step one: Microsoft Intune system configuration

  1. Sign in to the Microsoft Entra ID portal (https://portal.azure.com/), and select View for the Manage Microsfot Entra ID option.

    MS Graph Config Step 1

  2. Select App registrations in the left pane.

    MS Graph Config Step 2

  1. Select New registration along the top row of tabs.

    MS Graph Config Step 3

  2. Provide a descriptive name for the registration and select Register at the bottom.

    MS Graph Config Step 4

  3. Copy the values for Application (client) ID and Directory (tenant) ID as they will be needed when configuring the integration in the NetSPI Platform. Once copied, select Certificates & secrets in the left pane.

    MS Graph Config Step 5

  4. On the Client secrets tab, select New client secret.

    MS Graph Config Step 6

  5. Select an appropriate expiration period for the client secret and then select the Add button.

    MS Graph Config Step 7

  6. Once the client secret has been created, select the Copy icon to the right of the Value field and record the value as it will be needed when configuring the integration in the NetSPI Platform.

    MS Graph Config Step 8

  7. When completing steps 9 - 12, use the appropriate API permissions to add:

  8. Repeat the steps, granting both application permissions and delegated permissions to the application.

  9. When complete, the permissions list should look like the following:

MS Graph Config Step 11

  1. Select the Grant admin consent for <your domain> button and then select yes.

# Step two: NetSPI Platform CAASM module configuration

Use the steps below to configure the Microsoft Intune Integration in the NetSPI Platform.

  1. Log into the NetSPI Platform as a Client Admin user.

  2. Navigate to Settings -> CAASM Integrations to display the Integrations page.

    Platform Integrations page

  3. Select the Integration Library tab -> Integration Categories / Unified Endpoint Management (UEM) -> Microsoft Intune Integration.

    Integration Library tab

    This brings the Microsoft Intune integration card into focus.

  4. Select the Add button on the Microsoft Intune card to display the Microsoft Intune integration configuration page.

    MS Intune integration page

  5. Select and enter values for the following fields.

    1. Select the integration type from the Integration drop-down list. In this case, Microsoft Intune Integration, which is already selected by default.

    2. Select the integration scope from the Scope drop-down list. The Microsoft Intune integration can only run on a cloud scope, which was configured by NetSPI and Cloud displays as the default value.

    3. Enter an integration name and description in the Integration Name and Description fields.

    4. Select the Enabled slider button to display as either on (blue) or off (light gray).

    5. In the Microsoft Intune Parameters field group, enter or select the following in the corresponding fields:

      Field Value
      Tenant ID The Directory (tenant) ID from step 5 in the section above
      Client ID the Application (client) ID from step 5 in the section above
      OAuth2 Secret The client secret generated in step 8 in the section above
      Type of Data to ingest drop-down list Select the type of data you want the CAASM module in the NetSPI Platform to ingest from your Microsoft Intune instance. Device and Users, Applications, and Intune Compliance are the three available options.
    6. In the Intune Policy ID(s) field group, enter an optional policy ID in the Policy ID field. Specifying one or more Microsoft Intune Policy ID's to check for asset compliance will cause any assets that are non-compliant with one or more of the specified policies to be automatically tagged by the NetSPI Platform as non-compliant. Likewise, any assets that are in full compliance with all the policy ID’s specified will be tagged as compliant. Once the desired policy ID's have been specified, ensure that the optional Intune Compliance checkbox is selected.

  6. Select Create to create the integration. The new integration now displays on the Applied Integrations tab with its statuses: current and last run, last run time, and status (enabled/disabled).