by Scott Muniz | Sep 21, 2020 | Uncategorized
This article is contributed. See the original author and article here.
By: Laura Arrizza – Program Manager | Microsoft Endpoint Manager – Intune
Security baselines are one of the configuration options available in Microsoft Endpoint Manager to configure Windows 10 profiles to help you secure and protect your devices and users. Security baselines act as a template for pre-configured groups of Windows settings and values recommended by security experts. When you create a baseline profile, you are creating a template of multiple device configuration profiles.
You can expect some improvements and changes to this feature area which are highlighted in this post.
Updated baseline content
We updated the existing Windows 10 MDM and Microsoft Defender ATP security baselines to the latest available version with our 2009 September release. With the latest versions, you can see which settings have been added, removed, and/or modified so you can ensure your endpoints stay secure. Also, the baselines have been refreshed to address any conflicting setting values between the two. Now with the updated versions, there should be no out-of-the-box conflicts.

The Windows 10 MDM security baseline represent the recommendations for configuring Windows for security conscious customers using the Microsoft security stack or a 3rd party security stack. The Microsoft Defender ATP security baseline represents the recommendations for configuring MD-ATP for customers using Microsoft’s full security stack. Going forward, the two baselines are aimed to be serviced at the same cadence to ensure the content does not contain conflicting setting values so you can update your baseline versions with confidence.
To update your baseline profiles to the latest version, go to Endpoint Security > Security baselines > **select a baseline** > Versions and see that the latest version is now available. To understand what has been changed between versions, use the checkboxes for two different versions and select “Compare baselines”. You are then prompted to download a CSV file that shows the differences before opting to update. For more information, see: Use security baselines to configure Windows 10 devices in Intune to learn more.

Improvements to baseline reporting
We have made a few enhancements to the security baselines experience to improve our reporting to make it easier to monitor your devices targeted by baseline profiles.
Under Endpoint Security > Security Baselines > **select a baseline** we now take you straight to the list of profiles and available versions that are in your tenant. Once you select a baseline version, you can see information on the baseline posture states across your devices with updated terminology and definitions. The common labels and definitions we use for status are more granular to help describes the intent of the status:
- “Matches baseline” will update to “Matches default settings”, which better describes the intent to identify when a devices configuration matches the default (unmodified) baseline configuration.
- “Does not match baseline” will update to “Matches custom settings”, to identify the devices that are in success against a modified baseline configuration.
- “Misconfigured” will be broken out into more specific details to help identify where things need your attention, like “Error”, “Conflict” and “Pending”.
- “Not applicable” will stay the same to call out when a setting is not applicable and not applied to the device.
The new states will bring consistency to other areas of the console. This is applicable to the security baseline posture aggregate charts on the Overview page and the “Device Status” list report found in the screenshots below:

In addition to this, you can select a device to view the list of endpoint security profiles and baselines assigned to the device. We’ve added additional information to this report to be able to see the user principal name to help you monitor your profiles against the device.

Once you select one of the profiles, you can look at the list of settings applied to the device and the category. We’ve recently flattened the list to make it easier to view. Also, the setting status is consistent with the updated posture states to help identify where errors and conflicts occur. You can use the filter dropdown to have this in your view.

From here, you can select the setting to look at additional details and identify where any conflicts may occur from device configuration profiles, other baseline profiles or endpoint security profiles. The ones listed will navigate you to the profile resource to start troubleshooting the conflict. This is more consistent with the device configuration experience.

Overall, these improvements will help with the troubleshooting flow and bring more consistency to the device configuration experience.
More to come for baseline improvements
We plan to continue the improvements to the baselines experience by publishing new content, like the Office security baseline and Update security baseline through Intune and keep up to date with the latest versions available for our existing baselines.
In addition, more reporting improvements are in the works to help you identify conflicts, errors, and see more data to monitor your baseline profiles.
How can you reach us?
Keep up to date via Intune docs and provide feedback below on what you want to see! Let us know if you have any additional questions on this by replying back to this post or tagging @IntuneSuppTeam out on Twitter.
by Scott Muniz | Sep 21, 2020 | Uncategorized
This article is contributed. See the original author and article here.
By: Laura Arrizza – Program Manager | Microsoft Endpoint Manager – Intune
We are introducing new Microsoft Defender Antivirus reports in the Microsoft Endpoint Manager admin center to help you monitor your devices for status on malware and Antivirus states. You will be able to use two new operational reports to see which devices need your attention and two organizational reports to view general AV information.
New Operational Reports in Endpoint Security
Under the “Endpoint Security” node, you can navigate to the “Antivirus” section to see summary aggregates and new operational reports to help you monitor the devices that need your attention.
On the “Summary” tab, you can see aggregate information for the count of devices with a given threat agent status and active malware category. Both aggregates show the top eight categories and correspond to the operational reports in the other tabs. If there are no devices in any of the states, you will be informed that there are no results to display.

On the “Windows 10 unhealthy endpoints” tab, you can view the operational report for the threat agent status on devices and users to outline which are in a state that requires your attention. Each record will tell you if malware protection, real-time protection, and network protection are enabled or disabled. You can view the state of the device and additional information found in the extra columns to help identify next steps for troubleshooting.

As with all of the reports, you have the ability to use upgraded grid controls to search across the records, sort on every column, view the number of records in the report, use paging controls for large sets of records, and export the list of records to a .csv file to save locally. The reports will refresh the data around 20 minutes or so. show fresh data around ~20 minutes or so.

On the “Windows 10 detected malware” tab, you can view the operational report to see the list of devices and users with detected malware with details of the malware category. This will show the malware state of the device and counts of malware found on the device. You can take remote actions here including restart, quick scan, full scan, or update signatures to help remediate your devices.

Organizational Reports
Under the “Reports” node, you can navigate to the “Windows Defender Antivirus Reports (preview)” page to see links to two new organizational reports.

The first report, “Antivirus agent status” allows you to generate a report to view the list of devices, users and antivirus agent status information. You can start by selecting the filter for device state (i.e. clean, critical, reboot pending etc.) and select the columns you wish to have in view. Once the report has been generated, a timestamp shows how fresh the data is. You can search across the results, sort, use paging controls, see the number of records, and export to a .csv file. The data within the report will remain in your console up to 3 days before requiring you to generate again.

The second organizational report, “Detected malware”, works the same in such you can select the filters for severity and execution state to generate your report. This will show the list of devices and users with the count of detections found, the execution state, detection time, and malware state/category.

Existing Threat Agent Status Report
The new reports are meant to replace the existing “Threat Agent Status” report which is found under the Devices > Monitor > Threat Agent Status section of the console. The new reports provide more information, better organization, fresher data, and improved data usability. We will maintain the existing report to give you time to get used to the new reports, update any helpdesk training, and migrate any existing automation to use the new reports. Note, the existing report uses the Intune Graph API from: https://graph.microsoft.com/beta/deviceManagement/managedDevices$expand=windowsProtectionState, and the new reports reference: https://graph.microsoft.com/beta/deviceManagement/reports/getUnhealthyDefenderAgentsReport.
We encourage you to try out the new reports and provide any feedback in the comments below. We will be adding more functionality to the reports in the future too!

How can you reach us?
Let us know if you have any additional questions on this by replying back to this post or tagging @IntuneSuppTeam out on Twitter.
by Scott Muniz | Sep 21, 2020 | Azure, Technology, Uncategorized
This article is contributed. See the original author and article here.
It’s exciting to develop applications for the Internet of Things (IoT), but implementing IoT solutions is a balancing act—you need the right skills. If you have those skills, why not let the world—including current and prospective employers—know that you do?
The Azure IoT Developer Specialty certification offers you the opportunity to prove your subject matter expertise as a developer of cloud and edge components for Azure IoT solutions. To earn it, pass Exam AZ-220: Microsoft Azure IoT Developer.
Is this certification a good fit for you?
Do you manage the IoT device lifecycle—setup, configuration, and maintenance—using cloud services and other tools? If so, this could be just the right certification for you. You should also have experience implementing designs for Azure IoT solutions, including device topology, connectivity, debugging, and security, in addition to solutions to manage, monitor, and transform IoT-related data pipelines. Additionally, you need to be able to deploy Azure IoT Edge components and configure device networking on the edge. Experience working with stakeholders to ensure successful business integration is a must.
If you implement the Azure services that form an IoT solution, including data storage options, data analysis, data processing, and platform-as-a-service options, consider earning this certification. You should also be able to recognize Azure IoT service configuration settings within the code portion of an IoT solution and to perform specific IoT coding tasks in at least one Azure-supported language, such as C#, Node, C, or Python.
How can you get ready?
To help you plan your journey, check out our infographic, The journey to Microsoft Certified: Azure IoT Developer Specialty. You can also find it in the resources section on the certification page, which contains other valuable help for Azure IoT developers.
Azure IoT Developer Specialty certification journey
To map out your journey, follow the sequence in the infographic. First, decide whether this is the right certification for you and be sure that you’ve mastered the basics.
Next, to understand what you’ll be measured on when taking Exam AZ-220, review the skills outline guide on the exam page.
Sign up for training that fits your learning style and experience:
Complement your training with additional resources, like Microsoft Docs, the Developer’s Guide to Azure, or the Azure Architecture Center.
And there’s more. Check out the Internet of Things Show on Channel 9, especially the episode dedicated to the Azure IoT Developer Specialty certification. In this episode, find out about the certification and additional resources to learn how to build IoT solutions with Azure.
Then, take a trial run with the Microsoft Official Practice Test for Exam AZ-220: Microsoft IoT Developer. All the objectives of the exam are covered in depth, so you’ll find what you need to be ready for any question.
After you pass the exam and earn your certification, check out the many other training and certification opportunities. Want to add to your toolkit? Look into more Microsoft Learn training to enhance your IoT solutions with artificial intelligence (AI) features. Or, to find your next certification based on your profession (or the one you aspire to)—review our blog post, Finding the right Microsoft Azure certification for you.
Note: Remember that Microsoft certifications assess how well you apply what you know to solve real business challenges. Our training resources are useful for reinforcing your knowledge, but you’ll always need experience in the role and with the platform.
It’s time to level up!
No matter where you are—or which language or framework you operate in—Azure certifications can help give you an edge with industry-recognized skills and credentials that show current and future employers that you’re keeping pace with the latest technical roles and requirements.
Related announcements
Understanding Microsoft Azure certifications
Finding the right Microsoft Azure certification for you
Master the basics with Microsoft Certified: Azure Fundamentals
by Scott Muniz | Sep 21, 2020 | Uncategorized
This article is contributed. See the original author and article here.
Raven is a Miniature Schnauzer that doesn’t like small critters in the yard unless they can fly. This gives Raven an insurmountable challenge, since my wife is such an avid gardener. We live on the side of a hill and at the top of the backyard is a manmade bog which feeds a downhill river to a to a pond with trees and flowers everywhere. Along with this are bird feeders and some birds love to scatter the feed from the feeders to the ground. So, our back yard is a perfect setting to get a lot of squirrels’, chipmunks, etc… When we go out the back door to the yard, Raven races out trying to catch up with the critters, but she just isn’t fast enough, and all the animals disperse quickly.
This chaos makes me think about some enterprise admins who are concerned about having to control the dispersion of enterprise data being stored on unapproved USB devices. The expectation that users are to only use USB data storage devices that are approved by corporate guidelines, without built-in security controls, is a task admins will never be able to achieve. This expectation is similar to the position of Raven ever catching a squirrel out back, it just won’t happen. Someone will forget a device, or they just don’t appreciate the governance definition and will plug in any storage device they have access to. Even though there are many stories on the internet that talk about attackers loading USB storage devices with malware and intentionally placing them into a location that a target victim will find. The victim then connects the USB device into their workstations and unknowingly gets compromised.
Fortunately, Microsoft has built in security controls in our modern o/s’s to assist our customers in controlling the use of defined USB devices. The explanation below covers USB storage, but it really pertains to ALL USB devices that can be controlled. So, lets walk through the device management and control of devices.
USB Device management on Windows
Once a USB device has been inserted within the windows ecosystem, the device driver(s) have been installed and the ability to prevent use is no longer available, until the driver(s) have been removed/uninstalled. The steps for uninstall/removal are defined later in this document, Revoke previously used USB storage.
NOTE Always test and refine these settings with a pilot group of users and devices first, before widely distributing to your organization!
USB device management with Group Policy
To block all removable storage
Computer Configuration > Policies > Administrative Templates > System > Removable Storage Access:
- “Set time (in seconds) to force reboot”
- 3600
- Note: If no reboot is forced, the access right does not take effect until the operating system is restarted.
- The example setting above gives the user one hour before the system reboots
- “All Removable Storage classes: Deny all Access”
Manage what type of USB devices can be used
The Group Policy controls are located at:
Computer Configuration > Policies > Administrative Templates > System > Device Installation > Device Installation Restrictions
To allow certain storage types
- “Set time (in seconds) to force reboot
- 3600
- Note: If no reboot is forced, the access right does not take effect until the operating system is restarted.
- The example setting above gives the user one hour before the system reboots
- Prevent installation of devices not described by other policy settings
- Enabled
- If you enable this policy setting, Windows is prevented from installing or updating the device driver for any device that is not described by either the “Allow installation of devices that match any of these device IDs” or the “Allow installation of devices for these device classes” policy setting.
To define unique devices allowed to be installed
- “Allow installation of devices that match any of these device IDs”
- Enabled
- Show
- Value = Hardware Id’s (captured from device manager)


To define unique classes of devices
- “Allow installation of devices for these device setup classes”
- Enabled
- Show
- Value – {4D36E96B-E325-11CE-BFC1-08002BE10318}
- Value – {4D36E96F-E325-11CE-BFC1-08002BE10318}
Example highlighted in yellow for keyboard and mouse classes.


Notifications to users
- “Display a custom message title when device installation is prevented by a policy setting”
- Message “Title” for a pop box when the user attempts to install an unapproved device
- “Display a custom message when installation is prevented by a policy setting”
- Message “Body” for a pop box when the user attempts to install an unapproved device
USB device management with Intune
To block all removable storage
- Ensure that the device is a Modern Managed Intune device
- Portal – https://endpoint.microsoft.com/#home
- Microsoft Modern Managed Desktop
- Select “Devices”
- Select “Configuration profiles”
- Select “+ Create profile”
- Platform = “Windows 10 and later”
- Profile = “Device Restrictions”
- Name = “Block All USB Storage”
- Description = “Optional”
- Select “General”
- “Removable storage” = “Block”
- Next
- Select “+ Select groups to include”
- Select user(s)/group(s)
- Next
- Next
- Create
Manage what type of USB devices can be used
To manage USB control from Intune, a “Configuration Profile” will need to be created.
https://endpoint.microsoft.com
- Select “Devices”
- Select “Configuration profiles”
- Select “+ Create profile”
- Platform = “Windows 10 and later”
- Profile = “Administrative Templates”
- Name = “USB Storage Control”
- Description = “Optionally enter a value”
- Computer Configuration > System > Device Installation > Device Installation Restrictions

There are 5 configuration settings that will allow you to control the use of USB devices.
- Allow installation of devices that match any of these device IDs
- Define the set of Hardware devices allowed for the managed devices by this Policy
- Allow installation of devices using drivers that match these device setup classes
- Define the set of Hardware devices allowed for the managed devices by this Policy
- Prevent installation of devices not described by other policy settings
- If enabled only the policy defined settings will work or be denied
- Prevent installation of devices that match any of these device IDs
- Define the set of Hardware devices denied for the managed devices by this Policy
- Prevent installation of devices using drivers that match these device setup classes
- Define the set of Hardware devices denied for the managed devices by this Policy
To enable the ability to restrict devices
- “Enable” – Prevent installation of devices not described by other policy settings

To define unique devices allowed to be installed
- Allow installation of devices that match any of these device IDs
- Enabled
- Value = Hardware Id’s (captured from device manager)


To define unique classes of devices
- “Allow installation of devices using drivers that match these device setup classes”
- Enabled
- Value = {4D36E96B-E325-11CE-BFC1-08002BE10318}
- Value = {4D36E96F-E325-11CE-BFC1-08002BE10318}
Example highlighted in yellow for keyboard and mouse classes.


Revoke previously used USB storage
Uninstall device driver(s) via Device Manager
USB devices that have already been used have had the device driver installed, therefore the control of these devices won’t work until the drivers have first been uninstalled. Looking at the Device Manager console image below, there are two USB storage devices in use. An approved SanDisk and an unapproved Generic USB drive.

Right clicking on the device will provide the admin with the ability to select, “Uninstall”. Once the device has been uninstalled the device will no longer be able to be used on this host. Since the policy controls the installation of the driver for the USB device.

Uninstall device driver(s) via Devcon
In a large enterprise visiting individual workstations isn’t a reasonable situation, therefore processing from a command line will be necessary.
Devcon is a part of the Windows Driver Kit (WDK) so in order to gain access an instance of WDK will be required to be installed. Installing by itself won’t make the WDK fully usable since it requires Visual Studio. Since you are looking to gain access to Devcon, there is no need to install Visual Studio (VS). It would probably be best that this install be completed on a lab device to not pollute a desktop with unnecessary binaries and just copy the files needed.
Downloads:
https://docs.microsoft.com/en-us/windows-hardware/drivers/download-the-wdk
Steps required to install WDK to gain access to Devcon
- Download WDK for Windows 10, version 9999

Next

Next

Next

Accept


Close

Once completed find the binaries that will be needed. Generally, it will be x64 and possibly x86 but x64, x86, arm and arm64 will all be available. Copy the files to desired host.

Subset of Devcon commands for USB storage
Note: Be extremely careful! ALL devices for the host are exposed with this utility. You could damage the host irreparably if the wrong drivers are removed.
Devcon Examples:
Change directory to the Devcon binary that will be used for the process
Example: cd C:Program Files (x86)Windows Kits10Toolsx64
List all connected disk drives
This isn’t just USB drives shown in this command
devcon hwids =diskDrive
Remove specific drivers for defined USB drives
If a drive was added prior to the policy, then the driver already exists and will allow the user to continue to use an unapproved device
devcon /r remove <HdwId>
Example: devcon /r remove USBSTORDisk________________________0.00
Devcon command line syntax
https://docs.microsoft.com/en-us/windows-hardware/drivers/devtest/devcon-examples
Find USB Storage in use with Microsoft Defender ATP
With Microsoft Defender ATP you can use the “Advanced Hunting” portal to search for USB devices that have been mounted on your users devices that are being managed by MD ATP.
Advanced Hunting
https://securitycenter.windows.com/
- Select “Advanced Hunting”
- Select the “Query” tab
- Copy and paste the one of the below into the Query window

Query for Mounted Storage
The query below will list ALL Defender clients that have mounted a USB storage device in the past day. This can extend backwards further by adjusting the Timestamp variable.
// Find all “Mounted” storage activity within the past day
DeviceEvents
| where ActionType == “UsbDriveMount” and Timestamp > ago(1d)
| extend DriveLetter = parse_json(AdditionalFields).DriveLetter
| extend BusType = parse_json(AdditionalFields).BusType
| extend ProductName = parse_json(AdditionalFields).ProductName
| extend ProductRevision = parse_json(AdditionalFields).ProductRevision
| extend SerialNumber = parse_json(AdditionalFields).SerialNumber
| extend Manufacturer = parse_json(AdditionalFields).Manufacturer
| extend Volume = parse_json(AdditionalFields).Volume
| project DeviceName, DeviceId, Timestamp, DriveLetter, Manufacturer, ProductName, BusType, ProductRevision, SerialNumber, Volume
Query for Mounted Storage that isn’t approved
The query below will list ALL Defender clients that have mounted a USB storage device in the past day but aren’t a part of a defined set of approved Manufacturer and Product Name. This can extend backwards further by adjusting the Timestamp variable.
// Find all “Mounted” storage activity that isn’t approved via “Manufacturer” and “ProductName” within the past day
DeviceEvents
| where ActionType == “UsbDriveMount” and Timestamp > ago(1d)
| extend DriveLetter = parse_json(AdditionalFields).DriveLetter
| extend BusType = parse_json(AdditionalFields).BusType
| extend ProductName = parse_json(AdditionalFields).ProductName
| extend ProductRevision = parse_json(AdditionalFields).ProductRevision
| extend SerialNumber = parse_json(AdditionalFields).SerialNumber
| extend Manufacturer = parse_json(AdditionalFields).Manufacturer
| extend Volume = parse_json(AdditionalFields).Volume
| extend ClassName = parse_json(AdditionalFields).ClassName
| where Manufacturer !startswith “SanDisk” and ProductName !startswith “Extreme Pro”
| project ClassName, DeviceName, DeviceId, Timestamp, DriveLetter, Manufacturer, ProductName, BusType, ProductRevision, SerialNumber, Volume
Query for storage connectivity attempts
The query below will list ALL Defender clients that have attempted to mount a USB storage device. This includes both successful and unsuccessful attempts This can extend backwards further by adjusting the Timestamp variable.
// Find all storage device connection activity in the past day
DeviceEvents
| where ActionType == “PnpDeviceConnected” and Timestamp > ago(1d)
| extend ClassName = parse_json(AdditionalFields).ClassName
| extend DeviceId = parse_json(AdditionalFields).DeviceId
| extend VendorIds = parse_json(AdditionalFields).VendorIds
| extend DeviceDescription = parse_json(AdditionalFields).DeviceDescription
| project ClassName, DeviceDescription, Timestamp, DeviceId, VendorIds, DeviceName
| where ClassName contains “drive” or ClassName contains “usb”
Query for storage connectivity attempts or mounts
The query below will list ALL Defender clients that have attempted to connect or mount a USB storage device. This includes both successful and unsuccessful attempts This can extend backwards further by adjusting the Timestamp variable.
// List all Disk storage connection or mount activities in the past day
DeviceEvents
| where (ActionType == “UsbDriveMount” or ActionType == “PnpDeviceConnected”) and Timestamp > ago(1d)
| extend DriveLetter = parse_json(AdditionalFields).DriveLetter
| extend BusType = parse_json(AdditionalFields).BusType
| extend ProductName = parse_json(AdditionalFields).ProductName
| extend ProductRevision = parse_json(AdditionalFields).ProductRevision
| extend SerialNumber = parse_json(AdditionalFields).SerialNumber
| extend Manufacturer = parse_json(AdditionalFields).Manufacturer
| extend ClassName = parse_json(AdditionalFields).ClassName
| extend Volume = parse_json(AdditionalFields).Volume
| extend DeviceDescription = parse_json(AdditionalFields).DeviceDescription
| project Timestamp, DeviceName, DriveLetter, Manufacturer, ProductName, BusType, ProductRevision, SerialNumber, Volume, ClassName, DeviceDescription, DeviceId
| where ClassName contains “drive” or ClassName contains “usb” or DriveLetter contains “:”
Well that covers it for this edition of USB management control. So unfortunately for Raven, there is no way for her to define “Critters allowed in the yard” but there are built-in control features available for Windows desktop and server admins to control what USB devices can be plugged into managed devices.
Reference
Recent Comments