IntuneDeviceConfigurationWiredNetworkPolicyWindows10

Parameters

Parameter Attribute DataType Description Allowed Values
AuthenticationBlockPeriodInMinutes Write UInt32 Specify the duration for which automatic authentication attempts will be blocked from occuring after a failed authentication attempt.
AuthenticationMethod Write String Specify the authentication method. Possible values are: certificate, usernameAndPassword, derivedCredential. Possible values are: certificate, usernameAndPassword, derivedCredential, unknownFutureValue. certificate, usernameAndPassword, derivedCredential, unknownFutureValue
AuthenticationPeriodInSeconds Write UInt32 Specify the number of seconds for the client to wait after an authentication attempt before failing. Valid range 1-3600.
AuthenticationRetryDelayPeriodInSeconds Write UInt32 Specify the number of seconds between a failed authentication and the next authentication attempt. Valid range 1-3600.
AuthenticationType Write String Specify whether to authenticate the user, the device, either, or to use guest authentication (none). If you're using certificate authentication, make sure the certificate type matches the authentication type. Possible values are: none, user, machine, machineOrUser, guest. Possible values are: none, user, machine, machineOrUser, guest, unknownFutureValue. none, user, machine, machineOrUser, guest, unknownFutureValue
CacheCredentials Write Boolean When TRUE, caches user credentials on the device so that users don't need to keep entering them each time they connect. When FALSE, do not cache credentials. Default value is FALSE.
DisableUserPromptForServerValidation Write Boolean When TRUE, prevents the user from being prompted to authorize new servers for trusted certification authorities when EAP type is selected as PEAP. When FALSE, does not prevent the user from being prompted. Default value is FALSE.
EapolStartPeriodInSeconds Write UInt32 Specify the number of seconds to wait before sending an EAPOL (Extensible Authentication Protocol over LAN) Start message. Valid range 1-3600.
EapType Write String Extensible Authentication Protocol (EAP). Indicates the type of EAP protocol set on the Wi-Fi endpoint (router). Possible values are: eapTls, leap, eapSim, eapTtls, peap, eapFast, teap. Possible values are: eapTls, leap, eapSim, eapTtls, peap, eapFast, teap. eapTls, leap, eapSim, eapTtls, peap, eapFast, teap
Enforce8021X Write Boolean When TRUE, the automatic configuration service for wired networks requires the use of 802.1X for port authentication. When FALSE, 802.1X is not required. Default value is FALSE.
ForceFIPSCompliance Write Boolean When TRUE, forces FIPS compliance. When FALSE, does not enable FIPS compliance. Default value is FALSE.
InnerAuthenticationProtocolForEAPTTLS Write String Specify inner authentication protocol for EAP TTLS. Possible values are: unencryptedPassword, challengeHandshakeAuthenticationProtocol, microsoftChap, microsoftChapVersionTwo. Possible values are: unencryptedPassword, challengeHandshakeAuthenticationProtocol, microsoftChap, microsoftChapVersionTwo. unencryptedPassword, challengeHandshakeAuthenticationProtocol, microsoftChap, microsoftChapVersionTwo
MaximumAuthenticationFailures Write UInt32 Specify the maximum authentication failures allowed for a set of credentials. Valid range 1-100.
MaximumEAPOLStartMessages Write UInt32 Specify the maximum number of EAPOL (Extensible Authentication Protocol over LAN) Start messages to be sent before returning failure. Valid range 1-100.
OuterIdentityPrivacyTemporaryValue Write String Specify the string to replace usernames for privacy when using EAP TTLS or PEAP.
PerformServerValidation Write Boolean When TRUE, enables verification of server's identity by validating the certificate when EAP type is selected as PEAP. When FALSE, the certificate is not validated. Default value is TRUE.
RequireCryptographicBinding Write Boolean When TRUE, enables cryptographic binding when EAP type is selected as PEAP. When FALSE, does not enable cryptogrpahic binding. Default value is TRUE.
SecondaryAuthenticationMethod Write String Specify the secondary authentication method. Possible values are: certificate, usernameAndPassword, derivedCredential. Possible values are: certificate, usernameAndPassword, derivedCredential, unknownFutureValue. certificate, usernameAndPassword, derivedCredential, unknownFutureValue
TrustedServerCertificateNames Write StringArray[] Specify trusted server certificate names.
RootCertificatesForServerValidationIds Write StringArray[] Specify root certificates for server validation. This collection can contain a maximum of 500 elements.
RootCertificatesForServerValidationDisplayNames Write StringArray[] Specify root certificate display names for server validation. This collection can contain a maximum of 500 elements.
IdentityCertificateForClientAuthenticationId Write String Specify identity certificate for client authentication.
IdentityCertificateForClientAuthenticationDisplayName Write String Specify identity certificate display name for client authentication.
SecondaryIdentityCertificateForClientAuthenticationId Write String Specify root certificate for client validation
SecondaryIdentityCertificateForClientAuthenticationDisplayName Write String Specify root certificate display name for client validation
RootCertificateForClientValidationId Write String Specify root certificate for client validation.
RootCertificateForClientValidationDisplayName Write String Specify root certificate display name for client validation.
SecondaryRootCertificateForClientValidationId Write String Specify secondary root certificate for client validation.
SecondaryRootCertificateForClientValidationDisplayName Write String Specify secondary root certificate display name for client validation.
Description Write String Admin provided description of the Device Configuration.
DisplayName Key String Admin provided name of the device configuration.
Id Write String The unique identifier for an entity. Read-only.
Assignments Write MSFT_DeviceManagementConfigurationPolicyAssignments[] Represents the assignment to the Intune policy.
Ensure Write String Present ensures the policy exists, absent ensures it is removed. Present, Absent
Credential Write PSCredential Credentials of the Admin
ApplicationId Write String Id of the Azure Active Directory application to authenticate with.
TenantId Write String Id of the Azure Active Directory tenant used for authentication.
ApplicationSecret Write PSCredential Secret of the Azure Active Directory tenant used for authentication.
CertificateThumbprint Write String Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.
ManagedIdentity Write Boolean Managed ID being used for authentication.
AccessTokens Write StringArray[] Access token used for authentication.

MSFT_DeviceManagementConfigurationPolicyAssignments

Parameters

Parameter Attribute DataType Description Allowed Values
dataType Write String The type of the target assignment. #microsoft.graph.groupAssignmentTarget, #microsoft.graph.allLicensedUsersAssignmentTarget, #microsoft.graph.allDevicesAssignmentTarget, #microsoft.graph.exclusionGroupAssignmentTarget, #microsoft.graph.configurationManagerCollectionAssignmentTarget
deviceAndAppManagementAssignmentFilterType Write String The type of filter of the target assignment i.e. Exclude or Include. Possible values are:none, include, exclude. none, include, exclude
deviceAndAppManagementAssignmentFilterId Write String The Id of the filter for the target assignment.
groupId Write String The group Id that is the target of the assignment.
groupDisplayName Write String The group Display Name that is the target of the assignment.
collectionId Write String The collection Id that is the target of the assignment.(ConfigMgr)

Description

Intune Device Configuration Wired Network Policy for Windows10

Permissions

Microsoft Graph

To authenticate with the Microsoft Graph API, this resource required the following permissions:

Delegated permissions

  • Read

    • Group.Read.All, DeviceManagementConfiguration.Read.All
  • Update

    • Group.Read.All, DeviceManagementConfiguration.ReadWrite.All

Application permissions

  • Read

    • Group.Read.All, DeviceManagementConfiguration.Read.All
  • Update

    • Group.Read.All, DeviceManagementConfiguration.ReadWrite.All

Examples

Example 1

This example is used to test new resources and showcase the usage of new resources being worked on. It is not meant to use as a production baseline.

Configuration Example
{
    param(
        [Parameter()]
        [System.String]
        $ApplicationId,

        [Parameter()]
        [System.String]
        $TenantId,

        [Parameter()]
        [System.String]
        $CertificateThumbprint
    )
    Import-DscResource -ModuleName Microsoft365DSC

    node localhost
    {
        IntuneDeviceConfigurationWiredNetworkPolicyWindows10 'Example'
        {
            Assignments                                           = @(
                MSFT_DeviceManagementConfigurationPolicyAssignments
                {
                    deviceAndAppManagementAssignmentFilterType = 'none'
                    dataType                                   = '#microsoft.graph.allDevicesAssignmentTarget'
                }
            )
            AuthenticationBlockPeriodInMinutes                    = 5
            AuthenticationMethod                                  = 'usernameAndPassword'
            AuthenticationPeriodInSeconds                         = 60
            AuthenticationRetryDelayPeriodInSeconds               = 5
            AuthenticationType                                    = 'machine'
            CacheCredentials                                      = $True
            DisplayName                                           = 'Wired Network'
            EapolStartPeriodInSeconds                             = 5
            EapType                                               = 'teap'
            Enforce8021X                                          = $True
            Ensure                                                = 'Present'
            MaximumAuthenticationFailures                         = 5
            MaximumEAPOLStartMessages                             = 5
            SecondaryAuthenticationMethod                         = 'certificate'
            TrustedServerCertificateNames                         = @('srv.domain.com')
            RootCertificatesForServerValidationIds                = @('a485d322-13cd-43ef-beda-733f656f48ea', '169bf4fc-5914-40f4-ad33-48c225396183')
            SecondaryIdentityCertificateForClientAuthenticationId = '0b9aef2f-1671-4260-8eb9-3ab3138e176a'
            ApplicationId         = $ApplicationId;
            TenantId              = $TenantId;
            CertificateThumbprint = $CertificateThumbprint;
        }
    }
}

Example 2

This example is used to test new resources and showcase the usage of new resources being worked on. It is not meant to use as a production baseline.

Configuration Example
{
    param(
        [Parameter()]
        [System.String]
        $ApplicationId,

        [Parameter()]
        [System.String]
        $TenantId,

        [Parameter()]
        [System.String]
        $CertificateThumbprint
    )
    Import-DscResource -ModuleName Microsoft365DSC

    node localhost
    {
        IntuneDeviceConfigurationWiredNetworkPolicyWindows10 'Example'
        {
            Assignments                                           = @(
                MSFT_DeviceManagementConfigurationPolicyAssignments
                {
                    deviceAndAppManagementAssignmentFilterType = 'none'
                    dataType                                   = '#microsoft.graph.allDevicesAssignmentTarget'
                }
            )
            AuthenticationBlockPeriodInMinutes                    = 5
            AuthenticationMethod                                  = 'usernameAndPassword'
            AuthenticationPeriodInSeconds                         = 55 # Updated Property
            AuthenticationRetryDelayPeriodInSeconds               = 5
            AuthenticationType                                    = 'machine'
            CacheCredentials                                      = $True
            DisplayName                                           = 'Wired Network'
            EapolStartPeriodInSeconds                             = 5
            EapType                                               = 'teap'
            Enforce8021X                                          = $True
            Ensure                                                = 'Present'
            MaximumAuthenticationFailures                         = 5
            MaximumEAPOLStartMessages                             = 5
            SecondaryAuthenticationMethod                         = 'certificate'
            TrustedServerCertificateNames                         = @('srv.domain.com')
            RootCertificatesForServerValidationIds                = @('a485d322-13cd-43ef-beda-733f656f48ea', '169bf4fc-5914-40f4-ad33-48c225396183')
            SecondaryIdentityCertificateForClientAuthenticationId = '0b9aef2f-1671-4260-8eb9-3ab3138e176a'
            ApplicationId         = $ApplicationId;
            TenantId              = $TenantId;
            CertificateThumbprint = $CertificateThumbprint;
        }
    }
}

Example 3

This example is used to test new resources and showcase the usage of new resources being worked on. It is not meant to use as a production baseline.

Configuration Example
{
    param(
        [Parameter()]
        [System.String]
        $ApplicationId,

        [Parameter()]
        [System.String]
        $TenantId,

        [Parameter()]
        [System.String]
        $CertificateThumbprint
    )
    Import-DscResource -ModuleName Microsoft365DSC

    node localhost
    {
        IntuneDeviceConfigurationWiredNetworkPolicyWindows10 'Example'
        {
            DisplayName                                           = 'Wired Network'
            Ensure                                                = 'Present'
            ApplicationId         = $ApplicationId;
            TenantId              = $TenantId;
            CertificateThumbprint = $CertificateThumbprint;
        }
    }
}