maciejrebisz.com

IT

Start using Intune Security Baseline – Mobile-First Cloud-First

maximios June 28, 2022

With the release of Microsoft Intune 1901 we finally got MDM security baseline, the first time Microsoft talked public about this was at Ignite 2018, everybody I have talked to since has been waiting for this feature, in the waiting time we have been using other security baseline like the one from NCSC.
When doing Windows management today we need to look at the security part of hardening Windows. MDM security baseline is build based on Windows Security baseline it is more and more important to remove local administrator rights and create a baseline for securing your Windows Desktop. You don’t need to follow the Microsoft Security baseline, but it is a great starting point, then you can add or remove settings so that your users can still do there work and you line of business applications are working as expected.

This baseline is built as a generic infrastructure that allows IT admins to eventually import other security baselines based on CIS, NIST, and other standards. Currently, it’s available for Windows and will eventually include iOS and Android.

After Intune service release 1901 Security Baseline is in public preview for all tenants – so there is no excuse not to start testing it.

How to configure Windows 10 Security baseline in Intune

  1. Click on Security Baseline (Preview)

  1. Click on MDM Security Baseline for October 2018 (This security baseline is for Windows 10 1809)

  1. Enter a Name : Windows MDM Security Baseline for October 2018
  2. Click to expand settings

Then you can go expand all the category and see if all the settings is as you want.
Many of the settings are also to be found in other Intune profiles but many are also ADMX based policy settings that are now in the GUI in the security baseline an example is Internet explorer

There is other settings that are not configured that you maybe want to to use an example is in Windows Defender – if you are running 3 part. anti malware solution you may change some of the default configuration

If you are running Windows Defender you may to change Defender cloud block level from Not Configured

To Zero tolerance

When you have made your change so that the security baseline match your requirements you need to assign it.

  1. Click Policies created
  2. Click on the policy you just created

  1. Click Assignments
  2. Click Select groups to include and find your test group

How to monitor you security baseline

Like all other policies in Intune there is a overview when you have deploy a policy, in the security baseline case there is 4 state that a policy can be in:

  • Matches baseline
  • Does not match baseline
  • Misconfigured
  • Not applicable

On the device it self in Intune you got a new monitor area – Security baseline:

  1. Select the Security baseline
  2. Click Preview: MDM Security Baseline for October 2018

Then you can see all the settings name and you can expand them.
The easy way is to filter on the state so you are only looking for the settings that are not working as expected

Then you can expand the setting name

  1. Find the settings name that you want to see
  2. Only look for the Misconfigured in this case

You can also look at it from the security baseline policy it self in the monitor section

When you are looking in the Per-setting status it is easy to sort the setting after the status:

In this case after conflict

In this case error

in this case not applicable

Then you can start changing you baseline or find the Intune profile where you have the setting configured.

At my first test on a AzureAD joined device with out any changes to the security baseline I was not able to login.

Happy testing 🙂

Read more:

Create a Windows 10 security baseline in Intune

Related Posts

IT /

Intune – Windows device enrollment restrictions – Cloud First

IT /

How to add “hidden” Windows UWP to Windows Store for Business – Cloud First

IT /

Office 2016 Active Directory-Based activation – Cloud First

‹ Start using Intune Security Baseline – Mobile-First Cloud-First › How to deploy Autopilot device fast with MDT – Mobile-First Cloud-First

Recent Posts

  • Intune – Windows device enrollment restrictions – Cloud First
  • How to add “hidden” Windows UWP to Windows Store for Business – Cloud First
  • Office 2016 Active Directory-Based activation – Cloud First
  • How to deploy Windows Local Experience Packs with Intune – Cloud First
  • Conditional Access for Outlook Web Access (OWA) – Cloud First

Recent Comments

No comments to show.

Archives

  • November 2025
  • October 2025
  • August 2025
  • July 2025
  • June 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • November 2024
  • September 2024
  • July 2024
  • June 2024
  • March 2024
  • December 2023
  • August 2023
  • June 2023
  • March 2023
  • February 2023
  • December 2022
  • September 2022
  • August 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • January 2022
  • December 2021
  • October 2021
  • September 2021
  • August 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • February 2020
  • January 2020
  • December 2019
  • October 2019
  • September 2019
  • June 2019
  • April 2019
  • March 2019
  • February 2019
  • March 2018
  • February 2018
  • December 2017
  • October 2017
  • August 2017

Categories

  • IT

Back to Top

© maciejrebisz.com 2026
Powered by WordPress • Themify WordPress Themes