Getting started with Security Baselines: Moving from Group Policy to Microsoft Intune

Introduction

Another delicious feature went GA (General Availability) this week: Security Baselines in Microsoft Intune.

The Security Baselines in Intune is the equivalent to what we have done with Group Policy for some years now, and is basically a set of pre-configured Windows settings, which are recommended for the enterprise by Microsoft.

This post is not a typical A-Z guide, but rather a first look into the feature and what initial experiences I had with moving from Security Baselines with Group Policy to Security Baselines with Intune in a Co-management scenario.

Creating the Security Baseline

First things first. A few steps covering how to create the baseline. This is pretty easy and straightforward and something that is a lot easier coming from doing this with Group Policy. If you are familiar with this process, go ahead and ignore the following paragraph 🙂

  • Locate Profiles and click + Create profile

  • Step 1. Give the Security Baseline a suitable name
    • Mine in this example is called: Windows 10 1903 Security Baseline

  • Step 2. Initially I’m keeping the defaults and thus not doing any changes to the settings of the baseline

  • Step 3. Not using scope tags either. Leaving blank

  • Step 4. Also leaving Assignments blank for now. Everything in here can be modified later on

  • Step 5. Review the summary and create the baseline

Group for Assignment

As told in the beginning, this is not a typical A-Z guide, but rather some detailed information on what I did.

My intention here is to only target this to my Windows 10 1903 devices (The requirement for using the Baselines in Intune is minimum Windows 10 1809).

  • Locate Groups -> All groups and click + New group

  • Group type: Security
  • Group name: Fill in with a suitable name
  • Membership type: Dynamic Device
  • Dynamic device members: (device.deviceOSVersion -contains “10.0 (18362)”) -or (device.deviceOSVersion -contains “10.0.18362”)

Assignment

  • Head back and edit your newly created Security Baseline and add the assignment of the group you just created

Monitoring

  • Watch the overview for the entire MDM Security Baseline section. In my scenario, the status came out as misconfigured as shown below

  • Drilling into the posture by category, the overview highlights that something in the Windows Defender category is noted as misconfigured

  • And drilling further into the overview for the actual baseline, the devices are noted as in conflict

  • Further to browsing the specific baseline, you will find a section called Per-setting status. Looking at this in particular, you will find the actual setting which is in conflict. In this scenario that is network protection

Reason for Conflicts

The reason for the conflicts happening in my scenario, is due to me having Network Protection in Windows Defender set to something else than what the baseline by default is dictating.

  • This is confirmed by taking a look on the Device Configuration Profile for Windows Defender also assigned to the device. See below illustration

  • And when comparing that to the Security Baseline, you will see a difference. I’m configuring network protection to Audit Only, where the Security Baselines wants this to be set to Enable

  • In order to fix the conflict, I’m going to change the Security Baseline to also set Network Protection to Audit
    • I currently don’t want Network Protection enabled and in this scenario the separate Configuration Profile wins while the Security Baseline will report a conflict

Monitoring again

  • Following above changes to the Security Baseline, we head back to the monitoring part and you will now notice that the overall posture will move the devices into Does not match baseline. This is expected, as we now differ from the default settings in the Security Baseline

  • And as previously, when drilling into the actual Security Baseline, the devices are moving from conflict into Succeeded as no settings are no longer conflicting with each other

Moving from GPO to Intune

When coming from Security Baselines with Group Policy into Security Baselines in Microsoft Intune, there are 2 additional things that might be interesting.

MDMWinsOverGP

This is a CSP policy, which when assigned to the device, can make sure that the MDM policy wins when its equivalent Group Policy also is applied to the device.

More info here: https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-controlpolicyconflict

WMI Filter

If you currently have the Security Baseline applied with Group Policy, consider making the switch to Microsoft Intune following a new version of Windows 10 and leverage a WMI filter on the GPO.

Below is an example, where my “old” Security Baseline only applies to Windows 10 versions less than 1903, making sure that my 1903 devices moving forward only is targeted with the settings from Intune.

ENJOY 🙂

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.