Microsoft has updated the Windows Security Baseline for Endpoint Security in Intune to 24H2 as shown above. Baselines are an easy way to set a vast array of best practice settings across your Windows devices in a single policy, already pre-configured by Microsoft.
I have extracted the policy to a JSON file and made it available at:
https://github.com/directorcia/bp/blob/main/Intune/Policies/Endpoint/Baselines/win.json
and the previous one is here:
https://github.com/directorcia/bp/blob/main/Intune/Policies/Endpoint/Baselines/Archive/win.json
You can now simply import that directly into your environment programmatically using something like PowerShell.
I will note that when I initially exported the templated and tried to import it back I got the error:
Invalid Reference id found in Policy
after a lot of troubleshooting (and I mean a LOT) I tracked down the issue to be related to id 241:
{
“id”: “241”,
“settingInstance”: {
“choiceSettingValue”: {
“value”: “device_vendor_msft_policy_config_deviceguard_machineidentityisolation_0”,
“children”: [],
“settingValueTemplateReference”: {
“useTemplateDefault”: false,
“settingValueTemplateId”: “6a208e4b-0e34-4d12-a821-3173e99f3ce0”
}
},
“@odata.type”: “#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance”,
“settingDefinitionId”: “device_vendor_msft_policy_config_deviceguard_machineidentityisolation”,
“settingInstanceTemplateReference”: {
“settingInstanceTemplateId”: “1fa97457-2a1f-4e33-b3c2-9a4c8930510d”
}
}
}
removing that from teh template allowed the rest of the template to import. I’ll have to spend some more time working out the exact settings and hopefully by then Microsoft fixes the issue and I’ll update the JSON in my Best Practices repository. However, for now the JSON at the URL can be imported.
I currently have the same problem. Any new insights into what is wrong here?
LikeLike
Fixed. My Json version is at – https://github.com/directorcia/bp/blob/main/Intune/Policies/Endpoint/Baselines/win.json
Trick is to use paging to get ALL the many parameters and then just one seems to cause a problem. So I eliminated that and now all good.
LikeLike
I encountered the same issue.
Investigating the actual request made by Microsoft when creating such a policy revealed that, for some reason, the ID they’re using is in all caps:
“choiceSettingValue”: {
“@odata.type”: “#microsoft.graph.deviceManagementConfigurationChoiceSettingValue”,
“value”: “device_vendor_msft_policy_config_deviceguard_machineidentityisolation_0”,
“children”: [],
“settingValueTemplateReference”: {
“settingValueTemplateId”: “6A208E4B-0E34-4D12-A821-3173E99F3CE0”
}
},
“settingInstanceTemplateReference”: {
“settingInstanceTemplateId”: “1FA97457-2A1F-4E33-B3C2-9A4C8930510D”
}
Adjusting my policies to match the same format (in this specific setting value) solved the issue… 🤦🏽♀️
LikeLike