#
Microsoft Intune
The NetSPI Platform has a broad integration with Microsoft Intune.
This integration supports the Microsoft Intune product, which must be properly licensed in order for the integration to work. The Microsoft Intune license provides more data for systems even if Intune policies are not selected.
Similar to our other integrations, the Microsoft Intune integration is read-only and does not perform actions to configure systems or otherwise change anything about your Microsoft Intune system.
#
Supported asset types
The Microsoft Intune integration provides the NetSPI Platform visibility into the following asset types:
- Applications
- Systems
- Users
#
Endpoints used
This integration needs access to the following API endpoints:
- https://graph.microsoft.com/v1.0/devices
- https://graph.microsoft.com/v1.0/devices/{device['id']}/registeredUsers
- https://api.securitycenter.microsoft.com/api/machines
- https://graph.microsoft.com/v1.0/deviceManagement
- https://graph.microsoft.com/v1.0/deviceManagement/detectedApps/{application['id']}/managedDevices/
- https://graph.microsoft.com/v1.0/deviceManagement/managedDevices
- https://graph.microsoft.com/v1.0/deviceManagement/detectedApps/
- https://graph.microsoft.com/v1.0/deviceManagement/deviceCompliancePolicies//assignments
- https://graph.microsoft.com/v1.0/groups//members
- https://graph.microsoft.com/beta/deviceManagement/managedDevices/{system['id']}
- https://graph.microsoft.com/v1.0/deviceManagement/deviceCompliancePolicies//assignments
- https://graph.microsoft.com/beta/deviceManagement
#
Required permissions
This integration needs an API key with the following access permissions:
- Device.Read.All
- DeviceManagementConfiguration.Read.All
- DeviceManagementManagedDevices.Read.All
- DeviceManagementApps.Read.All
- DeviceManagementRBAC.Read.All
- DeviceManagementServiceConfig.Read.All
- Directory.Read.All
- User.Read
- User.Read.All
- AuditLogs.Read.All
- UserAuthenticationMethod.Read.All
- Vulnerability.Read.All
- Software.Read.All
- Machine.Read.All (for DefenderATP only)
#
Configuration steps
Use the section below for configuring Microsoft Intune to integrate with the NetSPI Platform.
#
Step one: Microsoft Intune system configuration
Sign in to the Microsoft Entra ID portal (https://portal.azure.com/), and select View for the Manage Microsfot Entra ID option.
Select App registrations in the left pane.
Select New registration along the top row of tabs.
Provide a descriptive name for the registration and select Register at the bottom.
Copy the values for Application (client) ID and Directory (tenant) ID as they will be needed when configuring the integration in the NetSPI Platform. Once copied, select Certificates & secrets in the left pane.
On the Client secrets tab, select New client secret.
Select an appropriate expiration period for the client secret and then select the Add button.
Once the client secret has been created, select the Copy icon to the right of the Value field and record the value as it will be needed when configuring the integration in the NetSPI Platform.
Don't forget
Make a note of the Client ID, Tenant ID, and Secret Value during the app registration process to be used when configuring the Microsoft Intune integration in the NetSPI Platform.
When completing steps 9 - 12, use the appropriate API permissions to add:
* Microsoft Defender permissions required for "Devices and Users", "Applications" and "Intune Compliance" checkboxes on the NetSPI Platform integration configuration page:
Device.Read.All
DeviceManagementConfiguration.Read.All
DeviceManagementManagedDevices.Read.All
DeviceManagementApps.Read.All
DeviceManagementRBAC.Read.All
DeviceManagementServiceConfig.Read.All
Directory.Read.All
User.Read
User.Read.All
AuditLogs.Read.All
UserAuthenticationMethod.Read.All
Vulnerability.Read.All
Software.Read.All
Machine.Read.All
Repeat the steps, granting both application permissions and delegated permissions to the application.
When complete, the permissions list should look like the following:
- Select the Grant admin consent for <your domain> button and then select yes.
#
Step two: NetSPI Platform CAASM module configuration
Use the steps below to configure the Microsoft Intune Integration in the NetSPI Platform.
Log into the NetSPI Platform as a Client Admin user.
Navigate to Settings -> CAASM Integrations to display the Integrations page.
Select the Integration Library tab -> Integration Categories / Unified Endpoint Management (UEM) -> Microsoft Intune Integration.
This brings the Microsoft Intune integration card into focus.
Note
You can also locate the integration card by:
- Scrolling down the page on the Integration Library tab
- Filter the integration options displayed by selecting any of the other left navigation choices besides Integration Categories, e.g., by Modules or Integration Scopes (cloud or on premise)
- Enter the integration name in the Search integration bar
Select the Add button on the Microsoft Intune card to display the Microsoft Intune integration configuration page.
Select and enter values for the following fields.
Select the integration type from the Integration drop-down list. In this case, Microsoft Intune Integration, which is already selected by default.
Select the integration scope from the Scope drop-down list. The Microsoft Intune integration can only run on a cloud scope, which was configured by NetSPI and Cloud displays as the default value.
Enter an integration name and description in the Integration Name and Description fields.
Select the Enabled slider button to display as either on (blue) or off (light gray).
In the Microsoft Intune Parameters field group, enter or select the following in the corresponding fields:
In the Intune Policy ID(s) field group, enter an optional policy ID in the Policy ID field. Specifying one or more Microsoft Intune Policy ID's to check for asset compliance will cause any assets that are non-compliant with one or more of the specified policies to be automatically tagged by the NetSPI Platform as non-compliant. Likewise, any assets that are in full compliance with all the policy ID’s specified will be tagged as compliant. Once the desired policy ID's have been specified, ensure that the optional Intune Compliance checkbox is selected.
Select Create to create the integration. The new integration now displays on the Applied Integrations tab with its statuses: current and last run, last run time, and status (enabled/disabled).