Posts

Showing posts from 2022

Import ACSC Windows Hardening Policies in Intune - Step by Step Instructions

Image
Step by Step instructions to create ACSC Windows 10 hardening settings in Intune using Graph API Microsoft have published Intune policies to comply with   Australian Cyber Security Centre's (ACSC) Windows 10 Hardening Guidance .    This policies are quite easy to import using graph explorer using official instruction provided at  https://github.com/microsoft/Intune-ACSC-Windows-Hardening-Guidelines.  However, this guide provides detailed steps by step instructions and screenshots to simply this process.  To import these settings in Intune follow these steps 1. Navigate to  Microsoft Graph Explorer . 2. Click on Sign in, login  using authorised privileges in respective tenant i.e. Global Administrator   3. You may get a prompt to accept the consent,   select  Consent on behalf of your organization then   click Accept. 4. Create a post request using Beta schema and type following query as shown in the screenshot, https://graph.microsoft.com/beta/deviceManagement/configurationPolicie

Create a Windows 10 settings catalog from group policies using CIS Benchmark for Windows 10, Edge or Chrome

Image
Microsoft have released new feature in Intune Service release 2204 (April 2022) that allows to create a settings Catalog policy using imported GPOs from Intune Group Policy Analytics, please note that this feature is in public preview so it can only get better from here ! you can learn more about functionality and official announcement here   link . In this blog, we will import the CIS Benchmark for Windows 10 21H2 Group Policies settings in Intune then covert to Settings Catalog. CIS Secure Suite membership is required to download automated build kits make it fast and easy to configure your systems in accordance with a CIS Benchmark. You can also download sample build Kit for free from here . About CIS As per the official Microsoft Document - CISbenchmarks are internationally recognized as security standards for defendingIT systems and data against cyberattacks. Used by thousands of businesses, theyoffer prescriptive guidance for establishing a secure baseline configuration. Y