IntuneMobileThreatDefenseConnector

Parameters

Parameter Attribute DataType Description Allowed Values
Id Key String The unique identifier for an entity. Read-only.
DisplayName Write String The DisplayName of the Mobile Threat Defense Connector partner. NOTE: Hard coded for convenience, not returned by the Graph API.
AllowPartnerToCollectIosApplicationMetadata Write Boolean When TRUE, indicates the Mobile Threat Defense partner may collect metadata about installed applications from Intune for IOS devices. When FALSE, indicates the Mobile Threat Defense partner may not collect metadata about installed applications from Intune for IOS devices. Default value is FALSE.
AllowPartnerToCollectIosPersonalApplicationMetadata Write Boolean When TRUE, indicates the Mobile Threat Defense partner may collect metadata about personally installed applications from Intune for IOS devices. When FALSE, indicates the Mobile Threat Defense partner may not collect metadata about personally installed applications from Intune for IOS devices. Default value is FALSE.
AndroidDeviceBlockedOnMissingPartnerData Write Boolean For Android, set whether Intune must receive data from the Mobile Threat Defense partner prior to marking a device compliant.
AndroidEnabled Write Boolean For Android, set whether data from the Mobile Threat Defense partner should be used during compliance evaluations.
AndroidMobileApplicationManagementEnabled Write Boolean When TRUE, indicates that data from the Mobile Threat Defense partner can be used during Mobile Application Management (MAM) evaluations for Android devices. When FALSE, indicates that data from the Mobile Threat Defense partner should not be used during Mobile Application Management (MAM) evaluations for Android devices. Only one partner per platform may be enabled for Mobile Application Management (MAM) evaluation. Default value is FALSE.
IosDeviceBlockedOnMissingPartnerData Write Boolean For IOS, set whether Intune must receive data from the Mobile Threat Defense partner prior to marking a device compliant.
IosEnabled Write Boolean For IOS, get or set whether data from the Mobile Threat Defense partner should be used during compliance evaluations.
IosMobileApplicationManagementEnabled Write Boolean When TRUE, indicates that data from the Mobile Threat Defense partner can be used during Mobile Application Management (MAM) evaluations for IOS devices. When FALSE, indicates that data from the Mobile Threat Defense partner should not be used during Mobile Application Management (MAM) evaluations for IOS devices. Only one partner per platform may be enabled for Mobile Application Management (MAM) evaluation. Default value is FALSE.
LastHeartbeatDateTime Write DateTime DateTime of last Heartbeat received from the Mobile Threat Defense partner.
MicrosoftDefenderForEndpointAttachEnabled Write Boolean When TRUE, indicates that configuration profile management via Microsoft Defender for Endpoint is enabled. When FALSE, inidicates that configuration profile management via Microsoft Defender for Endpoint is disabled. Default value is FALSE.
PartnerState Write String Partner state of this tenant.
PartnerUnresponsivenessThresholdInDays Write UInt32 Get or Set days the per tenant tolerance to unresponsiveness for this partner integration.
PartnerUnsupportedOSVersionBlocked Write Boolean Get or set whether to block devices on the enabled platforms that do not meet the minimum version requirements of the Mobile Threat Defense partner.
WindowsDeviceBlockedOnMissingPartnerData Write Boolean When TRUE, indicates that Intune must receive data from the Mobile Threat Defense partner prior to marking a device compliant for Windows. When FALSE, indicates that Intune may make a device compliant without receiving data from the Mobile Threat Defense partner for Windows. Default value is FALSE.
WindowsEnabled Write Boolean When TRUE, indicates that data from the Mobile Threat Defense partner can be used during compliance evaluations for Windows. When FALSE, it indicates that data from the Mobile Threat Defense partner should not be used during compliance evaluations for Windows. Default value is FALSE.
Ensure Write String Present ensures the instance exists, absent ensures it is removed. Present, Absent
Credential Write PSCredential Credentials of the workload's Admin
ApplicationId Write String Id of the Azure Active Directory application to authenticate with.
TenantId Write String Id of the Azure Active Directory tenant used for authentication.
CertificateThumbprint Write String Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.
ApplicationSecret Write PSCredential Secret of the Azure Active Directory tenant used for authentication.
ManagedIdentity Write Boolean Managed ID being used for authentication.
AccessTokens Write StringArray[] Access token used for authentication.

Description

This resource configures a connection to Mobile Threat Defense partner.

Permissions

Microsoft Graph

To authenticate with the Microsoft Graph API, this resource required the following permissions:

Delegated permissions

  • Read

    • DeviceManagementServiceConfig.Read.All
  • Update

    • DeviceManagementServiceConfig.ReadWrite.All

Application permissions

  • Read

    • DeviceManagementServiceConfig.Read.All
  • Update

    • DeviceManagementServiceConfig.ReadWrite.All

Examples

Example 1

This example is used to test new resources and showcase the usage of new resources being worked on. It is not meant to use as a production baseline.

Configuration Example
{
    param(
        [Parameter()]
        [System.String]
        $ApplicationId,

        [Parameter()]
        [System.String]
        $TenantId,

        [Parameter()]
        [System.String]
        $CertificateThumbprint
    )

    Import-DscResource -ModuleName Microsoft365DSC

    node localhost
    {
        IntuneMobileThreatDefenseConnector "IntuneMobileThreatDefenseConnector-Microsoft Defender for Endpoint"
        {
            AllowPartnerToCollectIosApplicationMetadata         = $False;
            AllowPartnerToCollectIosPersonalApplicationMetadata = $False;
            AndroidDeviceBlockedOnMissingPartnerData            = $False;
            AndroidEnabled                                      = $False;
            AndroidMobileApplicationManagementEnabled           = $False;
            DisplayName                                         = "Microsoft Defender for Endpoint";
            Id                                                  = "fc780465-2017-40d4-a0c5-307022471b92";
            IosDeviceBlockedOnMissingPartnerData                = $False;
            IosEnabled                                          = $False;
            IosMobileApplicationManagementEnabled               = $False;
            LastHeartbeatDateTime                               = "1/1/0001 12:00:00 AM";
            MicrosoftDefenderForEndpointAttachEnabled           = $False;
            PartnerState                                        = "notSetUp";
            PartnerUnresponsivenessThresholdInDays              = 7;
            PartnerUnsupportedOSVersionBlocked                  = $False;
            WindowsDeviceBlockedOnMissingPartnerData            = $False;
            WindowsEnabled                                      = $False;
            Ensure                                              = "Present";
            ApplicationId         = $ApplicationId;
            TenantId              = $TenantId;
            CertificateThumbprint = $CertificateThumbprint;
        }
    }
}

Example 2

This example is used to test new resources and showcase the usage of new resources being worked on. It is not meant to use as a production baseline.

Configuration Example
{
    param(
        [Parameter()]
        [System.String]
        $ApplicationId,

        [Parameter()]
        [System.String]
        $TenantId,

        [Parameter()]
        [System.String]
        $CertificateThumbprint
    )

    Import-DscResource -ModuleName Microsoft365DSC

    node localhost
    {
        IntuneMobileThreatDefenseConnector "IntuneMobileThreatDefenseConnector-Microsoft Defender for Endpoint"
        {
            AllowPartnerToCollectIosApplicationMetadata         = $False;
            AllowPartnerToCollectIosPersonalApplicationMetadata = $False;
            AndroidDeviceBlockedOnMissingPartnerData            = $False;
            AndroidEnabled                                      = $True; #drift
            AndroidMobileApplicationManagementEnabled           = $False;
            DisplayName                                         = "Microsoft Defender for Endpoint";
            Id                                                  = "fc780465-2017-40d4-a0c5-307022471b92";
            IosDeviceBlockedOnMissingPartnerData                = $False;
            IosEnabled                                          = $False;
            IosMobileApplicationManagementEnabled               = $False;
            LastHeartbeatDateTime                               = "1/1/0001 12:00:00 AM";
            MicrosoftDefenderForEndpointAttachEnabled           = $False;
            PartnerState                                        = "notSetUp";
            PartnerUnresponsivenessThresholdInDays              = 7;
            PartnerUnsupportedOSVersionBlocked                  = $False;
            WindowsDeviceBlockedOnMissingPartnerData            = $False;
            WindowsEnabled                                      = $False;
            Ensure                                              = "Present";
            ApplicationId         = $ApplicationId;
            TenantId              = $TenantId;
            CertificateThumbprint = $CertificateThumbprint;
        }
    }
}

Example 3

This example is used to test new resources and showcase the usage of new resources being worked on. It is not meant to use as a production baseline.

Configuration Example
{
    param(
        [Parameter()]
        [System.String]
        $ApplicationId,

        [Parameter()]
        [System.String]
        $TenantId,

        [Parameter()]
        [System.String]
        $CertificateThumbprint
    )

    Import-DscResource -ModuleName Microsoft365DSC

    node localhost
    {
        IntuneMobileThreatDefenseConnector "IntuneMobileThreatDefenseConnector-Microsoft Defender for Endpoint"
        {
            AllowPartnerToCollectIosApplicationMetadata         = $False;
            AllowPartnerToCollectIosPersonalApplicationMetadata = $False;
            AndroidDeviceBlockedOnMissingPartnerData            = $False;
            AndroidEnabled                                      = $False;
            AndroidMobileApplicationManagementEnabled           = $False;
            DisplayName                                         = "Microsoft Defender for Endpoint";
            Id                                                  = "fc780465-2017-40d4-a0c5-307022471b92";
            IosDeviceBlockedOnMissingPartnerData                = $False;
            IosEnabled                                          = $False;
            IosMobileApplicationManagementEnabled               = $False;
            LastHeartbeatDateTime                               = "1/1/0001 12:00:00 AM";
            MicrosoftDefenderForEndpointAttachEnabled           = $False;
            PartnerState                                        = "notSetUp";
            PartnerUnresponsivenessThresholdInDays              = 7;
            PartnerUnsupportedOSVersionBlocked                  = $False;
            WindowsDeviceBlockedOnMissingPartnerData            = $False;
            WindowsEnabled                                      = $False;
            Ensure                                              = "Absent";
            ApplicationId         = $ApplicationId;
            TenantId              = $TenantId;
            CertificateThumbprint = $CertificateThumbprint;
        }
    }
}