Intune configuration
Configuration profiles
The following can be found at Intune > Devices > Configuration profiles
ACSC-Jan2020-MacroSecurity
- Name:
ACSC-Jan2020-MacroSecurity - Description:
Only digitally signed macros are enabled (hardened implementation) - Type:
Windows 10 and later - Profile Type:
Administrative Templates - Scope tags:
Default - Assignments
- Included groups:
rol-Agency-Administrators,rol-Agency-Users - Excluded groups: -
- Included groups:
Configuration settings
| ClassType | CategoryPath | DisplayName | Value | Enabled |
|---|---|---|---|---|
| user | \Microsoft Publisher 2016\Disable Items in User Interface\Custom | Disable commands | true | |
| user | \Microsoft Excel 2016\Excel Options\Security\Trust Center | VBA Macro Notification Settings | 3 | true |
| user | \Microsoft Excel 2016\Excel Options\Security\Trust Center | Turn off trusted documents | true | |
| user | \Microsoft Excel 2016\Excel Options\Security\Trust Center | Turn off Trusted Documents on the network | true | |
| user | \Microsoft Excel 2016\Excel Options\Security\Trust Center | Block macros from running in Office files from the Internet | true | |
| user | \Microsoft Excel 2016\Excel Options\Security\Trust Center | Trust access to Visual Basic Project | False | |
| user | \Microsoft Excel 2016\Excel Options\Security\Trust Center\Trusted Locations | Disable all trusted locations | true | |
| user | \Microsoft Excel 2016\Excel Options\Security\Trust Center\Trusted Locations | Allow Trusted Locations on the network | false | |
| user | \Microsoft Excel 2016\Disable Items in User Interface\Custom | Disable commands | true | |
| user | \Microsoft Excel 2016\Excel Options\Security | Scan encrypted macros in Excel Open XML workbooks | 0 | true |
| user | \Microsoft Access 2016\Application Settings\Security\Trust Center | Turn off Trusted Documents on the network | true | |
| user | \Microsoft Access 2016\Application Settings\Security\Trust Center\Trusted Locations | Disable all trusted locations | true | |
| user | \Microsoft Access 2016\Application Settings\Security\Trust Center | Turn off trusted documents | true | |
| user | \Microsoft Access 2016\Application Settings\Security\Trust Center | VBA Macro Notification Settings | 3 | true |
| user | \Microsoft Access 2016\Application Settings\Security\Trust Center\Trusted Locations | Allow Trusted Locations on the network | false | |
| user | \Microsoft Access 2016\Disable Items in User Interface\Custom | Disable commands | true | |
| user | \Microsoft Word 2016\Word Options\Security\Trust Center | Turn off trusted documents | true | |
| user | \Microsoft Word 2016\Word Options\Security\Trust Center\Trusted Locations | Disable all trusted locations | true | |
| user | \Microsoft Word 2016\Disable Items in User Interface\Custom | Disable commands | true | |
| user | \Microsoft Word 2016\Word Options\Security\Trust Center | Block macros from running in Office files from the Internet | true | |
| user | \Microsoft Word 2016\Word Options\Security\Trust Center | Trust access to Visual Basic Project | false | |
| user | \Microsoft Word 2016\Word Options\Security\Trust Center | Turn off Trusted Documents on the network | true | |
| user | \Microsoft Word 2016\Word Options\Security\Trust Center\Trusted Locations | Allow Trusted Locations on the network | false | |
| user | \Microsoft Word 2016\Word Options\Security\Trust Center | Scan encrypted macros in Word Open XML documents | 0 | true |
| user | \Microsoft Word 2016\Word Options\Security\Trust Center | VBA Macro Notification Settings | 3 | true |
| user | \Microsoft PowerPoint 2016\PowerPoint Options\Security\Trust Center | Turn off trusted documents | true | |
| user | \Microsoft PowerPoint 2016\PowerPoint Options\Security\Trust Center\Trusted Locations | Disable all trusted locations | true | |
| user | \Microsoft PowerPoint 2016\PowerPoint Options\Security\Trust Center\Trusted Locations | Allow Trusted Locations on the network | false | |
| user | \Microsoft PowerPoint 2016\PowerPoint Options\Security | Scan encrypted macros in PowerPoint Open XML presentations | 0 | true |
| user | \Microsoft PowerPoint 2016\PowerPoint Options\Security\Trust Center | Trust access to Visual Basic Project | false | |
| user | \Microsoft PowerPoint 2016\Disable Items in User Interface\Custom | Disable commands | true | |
| user | \Microsoft PowerPoint 2016\PowerPoint Options\Security\Trust Center | Turn off Trusted Documents on the network | true | |
| user | \Microsoft PowerPoint 2016\PowerPoint Options\Security\Trust Center | VBA Macro Notification Settings | 3 | true |
| user | \Microsoft PowerPoint 2016\PowerPoint Options\Security\Trust Center | Block macros from running in Office files from the Internet | true | |
| user | \Microsoft Project 2016\Project Options\Security\Trust Center | VBA Macro Notification Settings | 3 | true |
| user | \Microsoft Project 2016\Project Options\Security\Trust Center | Disable all trusted locations | true | |
| user | \Microsoft Project 2016\Project Options\Security\Trust Center | Allow Trusted Locations on the network | false | |
| user | \Microsoft Visio 2016\Visio Options\Security\Trust Center | Allow Trusted Locations on the network | false | |
| user | \Microsoft Visio 2016\Visio Options\Security\Trust Center | Turn off trusted documents | true | |
| user | \Microsoft Visio 2016\Visio Options\Security\Trust Center | VBA Macro Notification Settings | 3 | true |
| user | \Microsoft Visio 2016\Visio Options\Security\Trust Center | Block macros from running in Office files from the Internet | true | |
| user | \Microsoft Visio 2016\Disable Items in User Interface\Custom | Disable commands | true | |
| user | \Microsoft Visio 2016\Visio Options\Security\Trust Center | Disable all trusted locations | true | |
| user | \Microsoft Visio 2016\Visio Options\Security\Macro Security | Load Microsoft Visual Basic for Applications projects from text | false | |
| user | \Microsoft Visio 2016\Visio Options\Security\Trust Center | Turn off Trusted Documents on the network | true | |
| user | \Microsoft Visio 2016\Visio Options\Security\Macro Security | Enable Microsoft Visual Basic for Applications project creation | false | |
| user | \Microsoft Office 2016\Security Settings\Trust Center | Allow mix of policy and user locations | false | |
| user | \Microsoft Office 2016\Security Settings | Disable VBA for Office applications | false | |
| user | \Microsoft Office 2016\Security Settings | Macro Runtime Scan Scope | 2 | true |
| user | \Microsoft Office 2016\Security Settings | Disable all Trust Bar notifications for security issues | true | |
| user | \Microsoft Office 2016\Security Settings | Automation Security | 2 | true |
| user | \Microsoft Outlook 2016\Security\Trust Center | Apply macro security settings to macros, add-ins and additional actions | true | |
| user | \Microsoft Outlook 2016\Security\Trust Center | Security setting for macros | 3 | true |
| user | \Microsoft Outlook 2016\Disable Items in User Interface\Custom | Disable command bar buttons and menu items | true | |
| user | \Microsoft Publisher 2016\Security\Trust Center | VBA Macro Notification Settings | 3 | true |
| user | \Microsoft Publisher 2016\Security | Publisher Automation Security Level | 2 | true |
ACSC-Surface2BIOS
- Name:
ACSC-Surface2BIOS - Description: -
- Type:
Windows 10 and later - Profile Type:
Device Firmware Configuration Interface - Configuration settings
- Allow local user to change UEFI settings:
None - CPU and IO virtualization:
Enabled - Cameras:
Enabled - Microphones and speakers:
Enabled - Radios (Bluetooth, Wi-Fi, NFC, etc..):
Enabled - Boot from external media (USB, SD):
Disabled - Boot from network adapters:
Disabled
- Allow local user to change UEFI settings:
- Scope tags:
Default - Assignments
- Included groups:
rol-Surface2-Devices - Excluded groups: -
- Included groups:
ACSC-WindowsHelloforBusiness
- Name:
ACSC-WindowsHelloforBusiness - Description: -
- Type:
Windows 10 and later - Profile Type:
Identity protection - Configuration settings
- Configure Windows Hello for Business:
Disable - Use security keys for sign-in:
Not configured
- Configure Windows Hello for Business:
- Scope tags:
Default - Assignments
- Included groups:
rol-Agency-Administrators,rol-Agency-Users - Excluded groups:
grp-iPhone-Devices,grp-iOS-Devices
- Included groups:
Agency-BlockAdminTerminal-User
- Name:
Agency-BlockAdminTerminal-User - Description:
This policy blocks users from accessing CMD & PowerShell terminals - Type:
Windows 10 and later - Profile Type:
Custom - Configuration settings
- OMA-URI Settings
- Name:
Agency-BlockAdminTerminal-User - Description:
This policy blocks users from accessing CMD & PowerShell terminals - OMA-URI:
./Vendor/MSFT/AppLocker/ApplicationLaunchRestrictions/000000001/EXE/Policy - Custom XML:
- Name:
- OMA-URI Settings
<RuleCollection Type="Exe" EnforcementMode="Enabled">
<FilePathRule Id="e16ce5e4-67f2-4ebf-ad01-c81fc8f28cd5" Name="All Files" Description="" UserOrGroupSid="S-1-5-32-544" Action="Allow">
<Conditions>
<FilePathCondition Path="*"/>
</Conditions>
</FilePathRule>
<FilePathRule Id="9eb15b2e-f9c2-42d4-8692-ad1a0f6a0722" Name="All files" Description="Allows user to run files execpt powershell" UserOrGroupSid="S-1-1-0" Action="Allow">
<Conditions>
<FilePathCondition Path="*"/>
</Conditions>
<Exceptions>
<FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT® WINDOWS® OPERATING SYSTEM" BinaryName="POWERSHELL.EXE">
<BinaryVersionRange LowSection="*" HighSection="*"/>
</FilePublisherCondition>
<FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT® WINDOWS® OPERATING SYSTEM" BinaryName="POWERSHELL_ISE.EXE">
<BinaryVersionRange LowSection="*" HighSection="*"/>
</FilePublisherCondition>
<FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT® WINDOWS® OPERATING SYSTEM" BinaryName="CMD.EXE">
<BinaryVersionRange LowSection="*" HighSection="*"/>
</FilePublisherCondition>
<FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT® WINDOWS® OPERATING SYSTEM" BinaryName="REGEDIT.EXE">
<BinaryVersionRange LowSection="*" HighSection="*"/>
</FilePublisherCondition>
</Exceptions>
</FilePathRule>
</RuleCollection>
- Scope tags:
Default - Assignments
- Included groups:
rol-Agency-Users - Excluded groups: -
- Included groups:
Agency-DeliveryOptimisation
- Name:
Agency-DeliveryOptimisation - Description: -
- Type:
Windows 10 and later - Profile Type:
Delivery Optimization - Configuration settings
- Download mode:
HTTP blended with peering behind same NAT (1) - Bandwidth optimization type:
Percentage - Maximum foreground download bandwidth (in %):
70 - Maximum background download bandwidth (in %):
25 - Delay background HTTP download bandwidth (in seconds):
60 - Delay foreground HTTP download bandwidth (in seconds):
60 - Minimum RAM required for peer caching (in GB):
4 - Minimum disk size required for peer caching (in GB):
32 - Minimum content file size for peer caching (in MB):
5 - Minimum battery level required to upload (in %):
40 - Maximum cache age (in days):
7 - Maximum cache size type:
Percentage - Maximum cache size (in %):
20
- Download mode:
- Scope tags:
Default - Assignments
- Included groups: All devices
- Excluded groups: -
Agency-DisableAdobeFlashIE-User
- Name:
Agency-DisableAdobeFlashIE-User - Description:
This policy setting turns off Adobe Flash in Internet Explorer and prevents application from using Internet Explorer technology to instantiate Flash object - Type:
Windows 10 and later - Profile Type:
Administrative Templates - Configuration settings
- Turn off Adobe Flash in Internet Explorer and prevent applications from using Internet Explorer technology to instantiate Flash objects:
None
- Turn off Adobe Flash in Internet Explorer and prevent applications from using Internet Explorer technology to instantiate Flash objects:
- Scope tags:
Default - Assignments
- Included groups: All users, All devices
- Excluded groups: -
Agency-MicrosoftStore-User
- Name:
Agency-MicrosoftStore-User - Description:
This policy blocks the Windows 10 public store but allows access to the business store - Type:
Windows 10 and later - Profile Type:
Custom - Configuration settings
- OMA-URI Settings
- Name:
BlockWindows10Store - Description:
Not configured - OMA-URI:
./Vendor/MSFT/Policy/Config/ApplicationManagement/RequirePrivateStoreOnly - Data Type:
Integer - Integer value:
1
- Name:
- OMA-URI Settings
- Scope tags:
Default - Assignments
- Included groups: All users, All devices
- Excluded groups: -
Agency-MSDefenderATP
- Name:
Agency-MSDefenderATP - Description: -
- Type:
Windows 10 and later - Profile Type:
Microsoft Defender ATP (Windows 10 Desktop) - Configuration settings
- Microsoft Defender ATP client configuration package type:
Onboard - Sample sharing for all files:
Enabled - Expedite telemetry reporting frequency:
Enabled
- Microsoft Defender ATP client configuration package type:
- Scope tags:
Default - Assignments
- Included groups:
rol-Agency-Administrators,rol-Agency-Users - Excluded groups: -
- Included groups:
Agency-Network-Boundary
- Name:
Agency-Network-Boundary - Description: -
- Type:
Windows 10 and later - Profile Type:
Network Boundary - Configuration settings
- Network Boundary
- Boundary type:
Cloud resources - Value:
<Agency>.sharepoint.com|<Agency>-my.sharepoint.com|<Agency>-files.sharepoint.com|tasks.office.com|protection.office.com|meet.lync.com|teams.microsoft.com|www.yammer.com|yammer.com|persona.yammer.com|outlook.office.com|outlook.office365.com|attachments.office.net|<Agency>.crm.dynamics.com|<Agency>.visualstudio.com|<Agency>.powerbi.com
- Boundary type:
- Network Boundary
- Scope tags:
Default - Assignments
- Included groups:
rol-Agency-Administrators,rol-Agency-Users - Excluded groups: -
- Included groups:
Agency-OneDrive-Device
- Name:
Agency-OneDrive-Device - Description: -
- Type:
Windows 10 and later - Profile Type:
Administrative Templates - Scope tags:
Default - Assignments
- Included groups:
rol-Agency-Administrators,rol-Agency-Users - Excluded groups: -
- Included groups:
Configuration settings
| ClassType | CategoryPath | DisplayName | Value | Enabled |
|---|---|---|---|---|
| machine | All Settings\OneDrive | Silently sign in users to the OneDrive sync client with their Windows credentials | true | |
| machine | All Settings\OneDrive | Silently move Windows known folders to OneDrive | xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx | true |
| machine | All Settings\OneDrive | Prevent users from syncing libraries and folders shared from other organizations | true | |
| machine | All Settings\OneDrive | Require users to confirm large delete operations | true | |
| machine | All Settings\OneDrive | Set the sync client update ring | Enterprise | true |
| machine | All Settings\OneDrive | Prevent users from redirecting their Windows known folders to their PC | true | |
| machine | All Settings\OneDrive | Use OneDrive Files On-Demand | xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx | true |
Agency-OneDrive-User
- Name:
Agency-OneDrive-User - Description: -
- Type:
Windows 10 and later - Profile Type:
Administrative Templates - Scope tags:
Default - Assignments
- Included groups:
rol-Agency-Administrators,rol-Agency-Users - Excluded groups: -
- Included groups:
Configuration settings
| ClassType | CategoryPath | DisplayName | Value | Enabled |
|---|---|---|---|---|
| user | \OneDrive | Coauthor and share in Office desktop apps | true | |
| user | \OneDrive | Prevent users from syncing personal OneDrive accounts | true |
Agency-TimeZoneEST
- Name:
Agency-TimeZoneEST - Description:
AUS Eastern Standard Time - Type:
Windows 10 and later - Profile Type:
Custom - Configuration settings
- OMA-URI Settings
- Name:
Set TimeZone - Description:
Set TimeZone - OMA-URI:
./Device/Vendor/MSFT/Policy/TimeLanguageSettings/ConfigureTimeZone - Data type:
String - Value:
AUS Eastern Standard Time
- Name:
- OMA-URI Settings
- Scope tags:
Default - Assignments
- Included groups:
grp-Windows-10-Devices,rol-Agency-Administrators,rol-Agency-Users - Excluded groups: -
- Included groups:
Wi-Fi Configuration
- Name:
WiFi SSID - Description: -
- Type:
Windows 10 and later - Profile Type:
Wi-Fi - Configuration settings
- Wi-Fi type:
Basic - Wi-Fi name (SSID):
WiFi SSID - Connection Name:
WiFi SSID - Connect automatically when in range:
Yes - Connect to this network even when it is not broadcasting its SSID:
No - Metered Connection Limit:
Unrestricted - Wireless Security Type:
WPA/WPA2-Personal - Pre-shared key:
******** - Force Wi-Fi profile to be complaint with the Federal Information Processing Standard (FIPS):
No - Company proxy settings:
None
- Wi-Fi type:
- Scope tags:
Default - Assignments
- Included groups:
rol-Agency-Administrators,rol-Agency-Users - Excluded groups:
grp-Virtual-Machines
- Included groups:
iOS device restrictions
- Name:
iOS device restrictions - Description: -
- Type:
iOS/iPadOS - Profile Type:
Device restrictions - Configuration settings
- Cloud and Storage
- Force encrypted backup:
Require
- Force encrypted backup:
- Password
- Require password:
Require - Simple passwords:
Block - Required password type:
Alphanumeric - Minimum password length:
14 - Number of sign-in failures:
4 - Maximum minutes after screen lock before password is required:
Immediately - Maximum minutes of inactivity until screen locks:
3 - Password expiration (days):
365 - Touch ID and Face ID unlock:
Require
- Require password:
- Cloud and Storage
- Scope tags:
Default - Assignments
- Included groups:
rol-Agency-Administrators,rol-Agency-Users - Excluded groups:
grp-Windows-10-Devices
- Included groups:
iOS email configuration
- Name:
iOS email configuration - Description: -
- Type:
iOS/iPadOS - Profile Type:
Email - Configuration settings
- Email server:
outlook.office365.com - Account name:
Corporate Email - Username attribute from AAD:
User Principal Name - Email address attribute from AAD:
Primary SMTP Address - Authentication method:
Username and password - SSL:
Enable - Exchange data to sync:
All data - Allow users to change sync settings:
Yes - S/MIME:
Disable S/MIME - Allow messages to be moved to other email accounts:
Disable - Allow email to be sent from third party applications:
Disable - Synchronize recently used email addresses :
Disable
- Email server:
- Scope tags:
Default - Assignments
- Included groups:
rol-Agency-Administrators,rol-Agency-Users - Excluded groups:
grp-Windows-10-Devices
- Included groups:
SecBaselineFix-AT
- Name:
SecBaselineFix-AT - Description: -
- Type:
Windows 10 and later - Profile Type:
Administrative Templates - Scope tags:
Default - Assignments
- Included groups:
rol-Agency-Administrators,rol-Agency-Users - Excluded groups: -
- Included groups:
Configuration settings
| ClassType | CategoryPath | DisplayName | Value | Enabled |
|---|---|---|---|---|
| computer | \Windows Components\Internet Explorer\Security Features\Add-On Management | Turn off Adobe Flash in Internet Explorer and prevent applications from using Internet Explorer technology to instantiate Flash object | true |
SecBaselineFix-EP
- Name:
SecBaselineFix-EP - Description: -
- Type:
Windows 10 and later - Profile Type:
Endpoint protection - Configuration settings
- Microsoft Defender Exploit Guard
- Flag credential stealing from the Windows local security authority subsystem:
Enable - Process creation from Adobe Reader (beta):
Enable - Office apps injecting into other processes (no exceptions):
Block - Office apps/macros creating executable content:
Block - Office apps launching child processes :
Block - Win32 imports from Office macro code:
Block - Process creation from Office communication products (beta):
Enable - Obfuscated js/vbs/ps/macro code:
Block - js/vbs executing payload downloaded from Internet (no exceptions):
Block - Untrusted and unsigned processes that run from USB:
Block - Execution of executable content (exe, dll, ps, js, vbs, etc.) dropped from email (webmail/mail client) (no exceptions):
Block - Folder protection :
Audit only - Network protection:
Enable
- Flag credential stealing from the Windows local security authority subsystem:
- Microsoft Defender Exploit Guard
- Scope tags:
Default - Assignments
- Included groups:
rol-Agency-Administrators,rol-Agency-Users - Excluded groups:
grp-NCSC-Devices,grp-ACSC-Devices
- Included groups:
Windows 10 BitLocker
- Name:
Windows 10 BitLocker - Description: -
- Type:
Windows 10 and later - Profile Type:
Endpoint protection - Configuration settings
- Windows Encryption
- Encrypt devices:
Require - Warning for other disk encryption:
Block - Allow standard users to enable encryption during Azure AD Join:
Allow - Configure encryption methods:
Enable - Encryption for operation system drives:
XTS-AES 256-bit - Encryption for fixed data-drives:
XTS-AES 256-bit - Encryption for removable data-drives:
XTS-AES 256-bit - Additional authentication at startup:
Require - OS drive recovery:
Enable - Recovery options in the BitLocker setup wizard:
Block - Save BitLocker recovery information to Azure Active Directory:
Enable - Client-driven recovery password rotation:
Key rotation enabled for Azure AD-joined devices - Store recovery information in Azure Active Directory before enabling BitLocker:
Require - Write access to fixed data-drive not protected by BitLocker:
Block - Fixed drive recovery:
Enable - Write access to removable data-drive not protected by BitLocker:
Block
- Encrypt devices:
- Windows Encryption
- Scope tags:
Default - Assignments
- Included groups:
grp-Security-Baseilnes,rol-Agency-Administrators,rol-Agency-Users - Excluded groups: -
- Included groups:
Windows 10 Enterprise activation
- Name:
Windows 10 Enterprise Activation - Description: -
- Type:
Windows 10 and later - Profile Type:
Edition upgrade or mode switch - Configuration settings
- Edition to upgrade to:
Windows 10 Enterprise - Product Key:
#####-#####-#####-#####-#####
- Edition to upgrade to:
- Scope tags:
Default - Assignments
- Included groups:
rol-Agency-Administrators,rol-Agency-Users - Excluded groups: -
- Included groups:
- Applicability Rules
- Rule:
Assign profile if - Property:
OS edition - Value:
Windows 10 Professional
- Rule:
Windows Defender ATP offboarding
- Name:
Windows Defender ATP offboarding - Description: -
- Type:
Windows 10 and later - Profile Type:
Custom - Configuration settings
- OMA-URI Settings
- Name:
Defender ATP offboarding - Description:
Not configured - OMA-URI:
./Device/Vendor/MSFT/WindowsAdvancedThreatProtection/Offboarding - Data Type:
String - Value:
{"body":"{\"orgIds\":[\"ec4ecef5-068d-4d33-8baf-93bca8a6bdc8\"],\"orgId\":\"ec4ecef5-068d-4d33-8baf-93bca8a6bdc8\",\"expirationTimestamp\":132255273658317066,\"version\":\"1.24\"}","sig":"lA+/Tjbd3aBLuue1eugXQ0CuKTX4zB2xyK22XNgTo9GGQnEY1NNHPKYCthtUWZs/hhYJOaOTfVaM4qf+tgsWeakiMO3D1+SXQJWx4HIAQFsDyXqq0H4mgXVEll4ggwdWw+cM+1gPqmB8vL9rNl+AOIu+w/kqoIwnODINXV8+G+1Ako3zgmvkAN+OeslY0QIonjMh6u9kaHY+pV/RFJBierBOEJSEJTOmj4MufT21r5fkPITwarMuXXZDzOPna16WehawzvoomRVUGcJ+Qs89h0gTOGAleWCnEjInMGWNNymdFxKVkyAy0yv8pYpiOJgfgZCJyj0Szd4MJeCGEscS0w==","sha256sig":"BdDJy+l+wVnSwEoyYiThOEnSCGY8smqXQ3NGeXTfwjWD/gP41+QE0MefYba8LW+pI+2IOCJGmxlo2qf59bPTWP8kX5vieXARhT3pCuIKsBb0/JnaZ1Y+7wvTTM/xNIV/he4DkDfVinIhIUF1AkmCGZCqFyF36MO/l7GUZsDp3Ru4R1o6ObVFQCGkJ6DQUtfmp5MZS5Ee8TNiHOvB64O62O93CKmdJZkc/1D77TSuc4VYQzj5MN7zgY4/kl65lD1koMTHZG67dJvGzafAyUrEA5eLO61TrG8dDPVMjvc887OhLu4hnAKtr0hs2sU4tChzmb1l9/6bXUzY007iYdHLaA==","cert":"MIIF5jCCA86gAwIBAgITMwAAAVuli06SYJv4gAAAAAABWzANBgkqhkiG9w0BAQsFADB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQgU2VjdXJlIFNlcnZlciBDQSAyMDExMB4XDTE5MDgyMDE4MjI1OFoXDTIwMTEyMDE4MjI1OFowgYoxCzAJBgNVBAYTAlVTMQswCQYDVQQIEwJXQTEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQLExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xHDAaBgNVBAMTE1NldmlsbGUuV2luZG93cy5jb20wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDrc1hYQKkss1MF5Hhtzpv0mUeTXvdwo+rDuJeUh0WLC5CAEaHFaUwtxQebgV0eWBmtfbGM+Y1brsujD43aKlildJ1blbrd0EK08rq4qDF0p2H02YtVez9MUpo7B1zLIfDnur+NWarEjjb3RiZUgtUjoSD/0nFxkBZDTFxF3KDKYSiUtU0vbJY2gvw5vWbaRi4D8pTSivvHb169JUaWjdw4xRzY/dfOAD88iwHIANO4VtDgg/D2U4+JJINfEeNnbfbvvkXqQQmeIaffBhIWe/xTUxZS9Gapi47FJAtXFE6503h/T05I4C5flcKhSv2ZyQYGgXtcnGhlCZO9XkBlrGqdAgMBAAGjggFOMIIBSjAOBgNVHQ8BAf8EBAMCB4AwEwYDVR0lBAwwCgYIKwYBBQUHAwEwHQYDVR0OBBYEFF4LxZDKwwzwK0kpN3XC2uYzqXkvMB4GA1UdEQQXMBWCE1NldmlsbGUuV2luZG93cy5jb20wHwYDVR0jBBgwFoAUNlaJZUnLW5svPKxCFlBNkbkz15EwUwYDVR0fBEwwSjBIoEagRIZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWljU2VjU2VyQ0EyMDExXzIwMTEtMTAtMTguY3JsMGAGCCsGAQUFBwEBBFQwUjBQBggrBgEFBQcwAoZEaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNTZWNTZXJDQTIwMTFfMjAxMS0xMC0xOC5jcnQwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQsFAAOCAgEABkE/yF7fn5ql6oi9IcYhz8ey1GJ1yDy9MC+MMB5cq11Mubgg5tt9pTg4Wfc0YbDWWoTNN31zpa1MLKpwgG8ClSEDF327U/r/+DrKvozK6uERa/x1X0WwtsEJj6+HIjkxQ4QhDPWxK0AKW6J8vgO4Fz5bhQa6Sz43KCAYw2fbEiXbQjW8AbTbr+Unat2xEw5dixzMBz8x8zO5lhSLeAX+C2LQGNjDGPlk1iiUlGpFAXkrplTMejlKxBnmAPz8I8YoikJdl/iOVSyza5e8XCwQV21EqlRgr8CaSrY5Dpdx8P4UFKBSYPlW0P7+dB+ab8OXr7zPZB9YWusjeA/CFJ6kpI0O/v0SThMzXmQQh2vWlqzBvPgsekMHXhKEbZCg83dWSN1Y37AedyGQ0XfM2ySMxi3DjIN6Hbav/kd8/HQLNFIjN09edUMs/jS84KU+EKd9lFxSMjGmKLR3ldL2Fqqzh+uluFIluRNqq7/DhSGEh8SlVJgiWeG1K4vLmta2xdgtrCR/V6qk8w0c6pHbipkmvPgFx8YHTP/HReGVn9UkZfimwOyPpf4xdUHMeJj9WHkVtbBI1wZ3mNHXrE7NEtas7ePv9VDeXNlNV0KEVGcJWOXNydpaI7uvz1mq+njUpsXimYujsfBnMc2FV6sUlEF6LrRLPSPXdP0B8Exm2nEotS8=","chain":["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","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"]}
- Name:
- OMA-URI Settings
- Scope tags:
Default - Assignments
- Included groups:
grp-RemoveFromDefenderATP - Excluded groups: -
- Included groups:
Scripts
The following can be found at Intune > Devices > Scripts
Intune log folder shortcut
- Profile name:
Intune log folder shortcut - Script settings
- PowerShell script:
IntuneLogFolder.ps1 - Run this script using the logged-on credentials:
No - Enforce script signature check:
No - Run script in 64 bit PowerShell Host:
No
- PowerShell script:
- Scope tags:
Default - Assignments
- Included groups:
rol-Agency-Administrators,rol-Agency-Users - Excluded groups: -
- Included groups:
# Create a Shortcut to the Intune Logs folder with Windows PowerShell
$TargetPath = "$env:ProgramData\Microsoft\IntuneManagementExtension\Logs"
$ShortcutFile = "$env:Public\Desktop\IntuneLogs.lnk"
$WScriptShell = New-Object -ComObject WScript.Shell
$Shortcut = $WScriptShell.CreateShortcut($ShortcutFile)
$Shortcut.TargetPath = $TargetPath
$Shortcut.Save()
Remove built-in apps
- Profile name:
RemoveBuiltInApps - Script settings
- PowerShell script:
RemoveBuiltInApps.ps1 - Run this script using the logged-on credentials:
No - Enforce script signature check:
No - Run script in 64 bit PowerShell Host:
No
- PowerShell script:
- Scope tags:
Default - Assignments
- Included groups:
grp-Windows-10-Devices - Excluded groups: -
- Included groups:
Begin {
# White list of Features On Demand V2 packages
$WhiteListOnDemand = "NetFX3|Tools.Graphics.DirectX|Tools.DeveloperMode.Core|Language|Browser.InternetExplorer|ContactSupport|OneCoreUAP|Media.WindowsMediaPlayer|Hello.Face"
# White list of appx packages to keep installed
$WhiteListedApps = New-Object -TypeName System.Collections.ArrayList
$WhiteListedApps.AddRange(@(
"Microsoft.DesktopAppInstaller",
"Microsoft.Messaging",
"Microsoft.MSPaint",
"Microsoft.Windows.Photos",
"Microsoft.StorePurchaseApp",
"Microsoft.MicrosoftOfficeHub",
"Microsoft.MicrosoftStickyNotes",
"Microsoft.WindowsAlarms",
"Microsoft.WindowsCalculator",
"Microsoft.WindowsSoundRecorder",
"Microsoft.WindowsStore"
))
# Windows 10 version 1809
$WhiteListedApps.AddRange(@(
"Microsoft.ScreenSketch",
"Microsoft.HEIFImageExtension",
"Microsoft.VP9VideoExtensions",
"Microsoft.WebMediaExtensions",
"Microsoft.WebpImageExtension"
))
# Windows 10 version 1903
# No new apps
}
Process {
# Functions
function Write-LogEntry {
param(
[parameter(Mandatory=$true, HelpMessage="Value added to the RemovedApps.log file.")]
[ValidateNotNullOrEmpty()]
[string]$Value,
[parameter(Mandatory=$false, HelpMessage="Name of the log file that the entry will written to.")]
[ValidateNotNullOrEmpty()]
[string]$FileName = "RemovedApps.log"
)
# Determine log file location
$LogFilePath = Join-Path -Path $env:windir -ChildPath "Temp\$($FileName)"
# Add value to log file
try {
Out-File -InputObject $Value -Append -NoClobber -Encoding Default -FilePath $LogFilePath -ErrorAction Stop
}
catch [System.Exception] {
Write-Warning -Message "Unable to append log entry to $($FileName) file"
}
}
# Initial logging
Write-LogEntry -Value "Starting built-in AppxPackage, AppxProvisioningPackage and Feature on Demand V2 removal process"
# Determine provisioned apps
$AppArrayList = Get-AppxProvisionedPackage -Online | Select-Object -ExpandProperty DisplayName
# Loop through the list of appx packages
foreach ($App in $AppArrayList) {
Write-LogEntry -Value "Processing appx package: $($App)"
# If application name not in appx package white list, remove AppxPackage and AppxProvisioningPackage
if (($App -in $WhiteListedApps)) {
Write-LogEntry -Value "Skipping excluded application package: $($App)"
}
else {
# Gather package names
$AppPackageFullName = Get-AppxPackage -Name $App | Select-Object -ExpandProperty PackageFullName -First 1
$AppProvisioningPackageName = Get-AppxProvisionedPackage -Online | Where-Object { $_.DisplayName -like $App } | Select-Object -ExpandProperty PackageName -First 1
# Attempt to remove AppxPackage
if ($AppPackageFullName -ne $null) {
try {
Write-LogEntry -Value "Removing AppxPackage: $($AppPackageFullName)"
Remove-AppxPackage -Package $AppPackageFullName -ErrorAction Stop | Out-Null
}
catch [System.Exception] {
Write-LogEntry -Value "Removing AppxPackage '$($AppPackageFullName)' failed: $($_.Exception.Message)"
}
}
else {
Write-LogEntry -Value "Unable to locate AppxPackage for current app: $($App)"
}
# Attempt to remove AppxProvisioningPackage
if ($AppProvisioningPackageName -ne $null) {
try {
Write-LogEntry -Value "Removing AppxProvisioningPackage: $($AppProvisioningPackageName)"
Remove-AppxProvisionedPackage -PackageName $AppProvisioningPackageName -Online -ErrorAction Stop | Out-Null
}
catch [System.Exception] {
Write-LogEntry -Value "Removing AppxProvisioningPackage '$($AppProvisioningPackageName)' failed: $($_.Exception.Message)"
}
}
else {
Write-LogEntry -Value "Unable to locate AppxProvisioningPackage for current app: $($App)"
}
}
}
Write-LogEntry -Value "Starting Features on Demand V2 removal process"
# Get Features On Demand that should be removed
try {
$OSBuildNumber = Get-WmiObject -Class "Win32_OperatingSystem" | Select-Object -ExpandProperty BuildNumber
# Handle cmdlet limitations for older OS builds
if ($OSBuildNumber -le "16299") {
$OnDemandFeatures = Get-WindowsCapability -Online -ErrorAction Stop | Where-Object { $_.Name -notmatch $WhiteListOnDemand -and $_.State -like "Installed"} | Select-Object -ExpandProperty Name
}
else {
$OnDemandFeatures = Get-WindowsCapability -Online -LimitAccess -ErrorAction Stop | Where-Object { $_.Name -notmatch $WhiteListOnDemand -and $_.State -like "Installed"} | Select-Object -ExpandProperty Name
}
foreach ($Feature in $OnDemandFeatures) {
try {
Write-LogEntry -Value "Removing Feature on Demand V2 package: $($Feature)"
# Handle cmdlet limitations for older OS builds
if ($OSBuildNumber -le "16299") {
Get-WindowsCapability -Online -ErrorAction Stop | Where-Object { $_.Name -like $Feature } | Remove-WindowsCapability -Online -ErrorAction Stop | Out-Null
}
else {
Get-WindowsCapability -Online -LimitAccess -ErrorAction Stop | Where-Object { $_.Name -like $Feature } | Remove-WindowsCapability -Online -ErrorAction Stop | Out-Null
}
}
catch [System.Exception] {
Write-LogEntry -Value "Removing Feature on Demand V2 package failed: $($_.Exception.Message)"
}
}
}
catch [System.Exception] {
Write-LogEntry -Value "Attempting to list Feature on Demand V2 packages failed: $($_.Exception.Message)"
}
# Complete
Write-LogEntry -Value "Completed built-in AppxPackage, AppxProvisioningPackage and Feature on Demand V2 removal process"
}