You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: memdocs/intune/protect/compliance-custom-json.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,17 +27,17 @@ ms.custom: intune-azure
27
27
ms.collection: M365-identity-device-management
28
28
---
29
29
30
-
# Custom compliance JSON files
30
+
# Custom compliance JSON files for Microsoft Intune
31
31
32
-
To support [custom settings for compliance](../protect/compliance-use-custom-settings.md), you create a JSON file that identifies the settings and value pairs that you want to use for custom compliance. The JSON defines what a PowerShell discovery script will evaluate for compliance on the device.
32
+
To support [custom settings for compliance](../protect/compliance-use-custom-settings.md) for Microsoft Intune, you create a JSON file that identifies the settings and value pairs that you want to use for custom compliance. The JSON defines what a discovery script will evaluate for compliance on the device.
33
33
34
-
You’ll upload the JSON file when you create a compliance policy that includes custom compliance settings.
34
+
You’ll upload the JSON file when you create a compliance policy that includes custom compliance settings.
35
35
36
36
A correctly formatted JSON file must include the following information:
37
37
38
38
-**SettingName** - The name of the custom setting to use for base compliance.
39
-
-**Operator** - Represents a specific action that is used to build a compliance rule. For options, see the following list of supported operators.
40
-
-**DataType** - The type of data that you can use to build your compliance rule. For options, see the following list of supported DataTypes.
39
+
-**Operator** - Represents a specific action that is used to build a compliance rule. For options, see the following list of *supported operators*.
40
+
-**DataType** - The type of data that you can use to build your compliance rule. For options, see the following list of *supported DataTypes*.
41
41
-**Operand** - Represent the values that the operator works on.
42
42
-**MoreInfoURL** - A URL that’s shown to device users so they can learn more about the compliance requirement when their device is noncompliant for a setting. You can also use this to link to instructions to help users bring their device into compliance for this setting.
43
43
-**RemediationStrings** - Information that gets displayed in the Company Portal when a device is noncompliant to a setting. This information is intended to help users understand the remediation options to bring a device to a compliant state.
@@ -84,7 +84,7 @@ A correctly formatted JSON file must include the following information:
84
84
85
85
For more information, see [Available languages for Windows](/windows-hardware/manufacture/desktop/available-language-packs-for-windows).
Copy file name to clipboardExpand all lines: memdocs/intune/protect/compliance-use-custom-settings.md
+8-17Lines changed: 8 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -33,14 +33,14 @@ To expand on Intune’s built-in device compliance options, you can add custom c
33
33
34
34
This feature applies to:
35
35
36
-
- Linux – Ubuntu Desktop, version 20.04 LTS
36
+
- Linux – Ubuntu Desktop, version 20.04 LTS and 22.04 LTS
37
37
- Windows 10/11
38
38
39
-
Before you can add custom settings to a policy, you’ll need to prepare a JSON file and a detection script for use with each supported platform. Both the script and JSON become part of the compliance policy. Each compliance policy supports a single script, and each script can detect multiple settings:
39
+
Before you can add custom settings to a policy, you’ll need to prepare a JSON file, and a detection script for use with each supported platform. Both the script and JSON become part of the compliance policy. Each compliance policy supports a single script, and each script can detect multiple settings:
40
40
41
41
- The JSON file defines the custom settings and the values that are considered as compliant. You can also configure messages for users to tell them how to restore compliance for each setting. You add your JSON file while creating a compliance policy, just after you select a discovery script for that policy.
42
42
43
-
- Scripts are specific to different platforms and delivered to devices through the compliance policy. When policy is evaluated, the script detects the settings from the JSON file and then reports the results to Intune. Windows uses a PowerShell script and Linux uses a Bash script.
43
+
- Scripts are specific to different platforms and delivered to devices through the compliance policy. When policy is evaluated, the script detects the settings from the JSON file, and then reports the results to Intune. Windows uses a PowerShell script and Linux uses a Bash script.
44
44
45
45
The scripts must be uploaded to the Microsoft Endpoint Manager admin center before you create a compliance policy. You select the script when you’re configuring a policy to support custom settings.
46
46
@@ -140,9 +140,9 @@ Policies support the use of a single script. However, each script supports check
140
140
141
141
## Additional troubleshooting for Linux devices
142
142
143
-
To identify settings that are not compliant for a device:
143
+
To identify settings that aren't compliant for a device:
144
144
145
-
-[In the Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), you can identify devices that are not compliant with policy. **Navigate** to **Reports** > **Device compliance**, select the *Reports* tab, and then select the tile for **Noncompliant devices and settings**. Use the drop-downs to configure the report you want, and then select **Generate** report.
145
+
-[In the Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), you can identify devices that aren't compliant with policy. **Navigate** to **Reports** > **Device compliance**, select the *Reports* tab, and then select the tile for **Noncompliant devices and settings**. Use the drop-downs to configure the report you want, and then select **Generate** report.
146
146
147
147
The admin center displays a separate line for each setting that isn’t compliant on a device.
148
148
@@ -165,15 +165,6 @@ To be compliant with *Password Policy* settings, configure the Linux system to u
165
165
- Passwords that include a minimum number of letters, digits, or special characters
166
166
- Passwords of a minimum length
167
167
168
-
Intune uses the **pam_pwquality** module to ensure password rules meet your organization’s standards. For more information on how to configure the parameters in **pam_pwquality**, refer to the Ubuntu documentation. As an example, following is a sample configuration line from the */etc/pam.d/common-password* file that enforces passwords that have at least one digit, one uppercase letter, and are at least twelve characters long: `password required pam_pwquality.so dcredit=-1 ucredit=-1 ocredit=-1 minlen=12`
169
-
170
-
We recommend you update the pwquality file before you run the pam-auth-update tool:
171
-
172
-
1. First *edit /usr/share/pam-configs/pwquality* to have the right password policy settings.
173
-
2. Save the file.
174
-
3. Run `sudo pam-auth-update --enable pwquality`
175
-
4. Verify that the common password file at /etc/pam.d/common-password has updated to match the update made in the pwquality file.
176
-
177
168
#### Device encryption
178
169
179
170
Users of devices that don’t meet compliance settings for disk and partition encryption might receive a message that they must encrypt the device drives.
@@ -185,7 +176,7 @@ There are several options for disk and partition encryption on Linux operating s
185
176
The following is general guidance when encrypting disk and partitions:
186
177
187
178
- Encrypting Linux system volumes after installation is possible, but potentially time consuming. We recommend setting up disk encryption while installing the operating system.
188
-
- Not all filesystem partitions need to be encrypted for a device to meet organizational standards. The following are not evaluated by the built-in device encryption settings:
179
+
- Not all filesystem partitions need to be encrypted for a device to meet organizational standards. The following aren't evaluated by the built-in device encryption settings:
189
180
- Read-only partitions
190
181
- Pseudo-filesystems, like `/proc` or `tmpfs`
191
182
- The `/boot` or `/boot/efi` partitions
@@ -194,8 +185,8 @@ The following is general guidance when encrypting disk and partitions:
194
185
195
186
After making changes to a device to bring it into compliance, refresh the device status with Intune:
196
187
197
-
- If the Microsoft Intune app is still running, select **Refresh** on either the device details page or the compliance issues page to start a new check-in with Intune.
198
-
- If the Microsoft Intune app is not running, sign into the app, which will start a new check-in.
188
+
- If the Microsoft Intune app is still running, select **Refresh** on the device details page, or on the compliance issues page to start a new check-in with Intune.
189
+
- If the Microsoft Intune app isn't running, sign into the app, which will start a new check-in.
199
190
- After installation, the Microsoft Intune app periodically checks-in with Intune on its own, so long as the device is on, and a user is signed in to it.
Copy file name to clipboardExpand all lines: memdocs/intune/protect/create-compliance-policy.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -55,17 +55,17 @@ To use device compliance policies, be sure you:
55
55
- Android AOSP
56
56
- Android Enterprise
57
57
- iOS
58
-
- Linux - Ubuntu Desktop, version 20.04 LTS
58
+
- Linux - Ubuntu Desktop, version 20.04 LTS and 22.04 LTS
59
59
- macOS
60
60
- Windows 10/11
61
61
62
62
- Enroll devices in Intune (required to see the compliance status)
63
63
64
64
- Enroll devices to one user, or enroll without a primary user. Single devices cannot be enrolled to multiple users.
65
65
66
-
In addition to compliance settings that are built-in to Intune, the following platforms support adding custom compliance settings to compliance policies:
66
+
In addition to compliance settings that are builtin to Intune, the following platforms support adding custom compliance settings to compliance policies:
67
67
68
-
- Ubuntu Desktop, version 20.04 LTS
68
+
- Ubuntu Desktop, version 20.04 LTS and 22.04 LTS
69
69
- Windows 10/11
70
70
71
71
Before you can add custom settings, you must prepare a custom JSON file that defines the settings you want to base your custom compliance on, and a script that runs on devices to detect the settings defined in the JSON.
@@ -83,7 +83,7 @@ For more information about using custom compliance settings, including supported
83
83
-*Android (AOSP)*
84
84
-*Android Enterprise*
85
85
-*iOS/iPadOS*
86
-
- Linux (Ubuntu Desktop, version 20.04 LTS)
86
+
- Linux - Ubuntu Desktop, version 20.04 LTS and 22.04 LTS)
87
87
-*macOS*
88
88
-*Windows 8.1 and later*
89
89
-*Windows 10 and later*
@@ -116,14 +116,14 @@ For more information about using custom compliance settings, including supported
116
116
- Device Encryption
117
117
- Password Policy
118
118
119
-
Dedicated content for the settings in the settings catalog is not available.
119
+
Dedicated content for the settings in the settings catalog isn't available.
120
120
121
121
6. Add custom settings to policies for supported platforms.
122
122
123
123
> [!TIP]
124
124
> This is an optional step that’s supported only for the following platforms:
125
125
>
126
-
> - Linux - Ubuntu Desktop, version 20.04 LTS
126
+
> - Linux - Ubuntu Desktop, version 20.04 LTS and 22.04 LTS
127
127
> - Windows 10/11
128
128
> Before you can add custom settings to a policy, you must have uploaded a detection script to Intune, and have ready a JSON file that defines the settings you want to use for compliance. See [Custom compliance settings](../protect/compliance-use-custom-settings.md) for more information.
129
129
@@ -159,7 +159,7 @@ For more information about using custom compliance settings, including supported
159
159
160
160
Select **+ Select groups to include** and then assign the policy to one or more groups. The policy will apply to these groups when you save the policy after the next step.
161
161
162
-
Policies for Linux do not support user-based assignments and can only be assigned to device groups.
162
+
Policies for Linux don't support user-based assignments and can only be assigned to device groups.
163
163
164
164
10. On the **Review + create** tab, review the settings and select **Create** when ready to save the compliance policy.
Intune also supports compliance policy for Linux (Ubuntu Desktop, version 20.04 LTS), which uses the Settings catalog format instead of templates. Dedicated content for the settings in the settings catalog is not available, but information is available from within the Settings catalog.
135
+
Intune also supports compliance policy for Linux (Ubuntu Desktop, version 20.04 LTS and 22.04 LTS), which use the Settings catalog format instead of templates. Dedicated content for the settings in the settings catalog isn't available, but information is available from within the Settings catalog.
139
136
140
137
-[**Custom compliance settings**](compliance-use-custom-settings.md) – With custom compliance settings you can expand on Intune’s built-in device compliance options. Custom settings provide flexibility to base compliance on the settings that are available on a device without having to wait for Intune to add those settings.
141
138
142
139
You can use custom compliance settings with the following platforms:
143
-
- Linux – Ubuntu Desktop, version 20.04 LTS
140
+
- Linux – Ubuntu Desktop, version 20.04 LTS and 22.04 LTS
144
141
- Windows 10/11
145
142
146
143
## Monitor compliance status
@@ -176,14 +173,14 @@ The following table describes how noncompliant settings are managed when a compl
176
173
177
174
|**Policy setting**|**Platform**|
178
175
| --- | ----|
179
-
|**PIN or password configuration**|- **Android 4.0 and later**: Quarantined<br>- **Samsung Knox Standard 4.0 and later**: Quarantined<br>- **Android Enterprise**: Quarantined <br> <br>- **iOS 8.0 and later**: Remediated<br>- **macOS 10.11 and later**: Remediated <br> <br>- **Windows 10/11**: Remediated|
180
-
|**Device encryption**| - **Android 4.0 and later**: Quarantined<br>- **Samsung Knox Standard 4.0 and later**: Quarantined<br>- **Android Enterprise**: Quarantined<br><br>- **iOS 8.0 and later**: Remediated (by setting PIN)<br>- **macOS 10.11 and later**: Quarantined<br><br>- **Windows 10/11**: Quarantined|
181
-
|**Jailbroken or rooted device**| - **Android 4.0 and later**: Quarantined (not a setting)<br>- **Samsung Knox Standard 4.0 and later**: Quarantined (not a setting)<br>- **Android Enterprise**: Quarantined (not a setting)<br><br>- **iOS 8.0 and later**: Quarantined (not a setting)<br>- **macOS 10.11 and later**: Not applicable<br><br>- **Windows 10/11**: Not applicable |
182
-
|**Email profile**| - **Android 4.0 and later**: Not applicable<br>- **Samsung Knox Standard 4.0 and later**: Not applicable<br>- **Android Enterprise**: Not applicable<br><br>- **iOS 8.0 and later**: Quarantined<br>- **macOS 10.11 and later**: Quarantined<br><br>- **Windows 10/11**: Not applicable |
183
-
|**Minimum OS version**| - **Android 4.0 and later**: Quarantined<br>- **Samsung Knox Standard 4.0 and later**: Quarantined<br>- **Android Enterprise**: Quarantined<br><br>- **iOS 8.0 and later**: Quarantined<br>- **macOS 10.11 and later**: Quarantined<br><br>- **Windows 10/11**: Quarantined|
184
-
|**Maximum OS version**| - **Android 4.0 and later**: Quarantined<br>- **Samsung Knox Standard 4.0 and later**: Quarantined<br>- **Android Enterprise**: Quarantined<br><br>- **iOS 8.0 and later**: Quarantined<br>- **macOS 10.11 and later**: Quarantined<br><br>- **Windows 10/11**: Quarantined|
185
-
|**Windows health attestation**| - **Android 4.0 and later**: Not applicable<br>- **Samsung Knox Standard 4.0 and later**: Not applicable<br>- **Android Enterprise**: Not applicable<br><br>- **iOS 8.0 and later**: Not applicable<br>- **macOS 10.11 and later**: Not applicable<br><br>- **Windows 10/11**: Quarantined<br>- **Windows 10/11**: Quarantined |
|**Device encryption**| - **Android 4.0 and later**: Quarantined<br>- **Samsung Knox Standard 4.0 and later**: Quarantined<br>- **Android Enterprise**: Quarantined<br><br>- **iOS 8.0 and later**: Remediated (by setting PIN)<br>- **macOS 10.11 and later**: Quarantined <br><br>- **Linux**: Quarantined <br><br>- **Windows 10/11**: Quarantined|
178
+
|**Email profile**| - **Android 4.0 and later**: Not applicable<br>- **Samsung Knox Standard 4.0 and later**: Not applicable<br>- **Android Enterprise**: Not applicable<br><br>- **iOS 8.0 and later**: Quarantined <br>- **macOS 10.11 and later**: Quarantined <br><br>- **Linux**: Not applicable<br><br>- **Windows 10/11**: Not applicable |
179
+
|**Jailbroken or rooted device**| - **Android 4.0 and later**: Quarantined (not a setting) <br>- **Samsung Knox Standard 4.0 and later**: Quarantined (not a setting)<br>- **Android Enterprise**: Quarantined (not a setting) <br><br>- **iOS 8.0 and later**: Quarantined (not a setting) <br>- **macOS 10.11 and later**: Not applicable <br><br>- **Linux**: Not applicable <br><br>- **Windows 10/11**: Not applicable |
180
+
|**Maximum OS version**| - **Android 4.0 and later**: Quarantined<br>- **Samsung Knox Standard 4.0 and later**: Quarantined<br>- **Android Enterprise**: Quarantined<br><br>- **iOS 8.0 and later**: Quarantined<br>- **macOS 10.11 and later**: Quarantined<br><br>- **Linux**: See *Allowed Distros* <br><br>- **Windows 10/11**: Quarantined|
181
+
|**Minimum OS version**| - **Android 4.0 and later**: Quarantined<br>- **Samsung Knox Standard 4.0 and later**: Quarantined<br>- **Android Enterprise**: Quarantined<br><br>- **iOS 8.0 and later**: Quarantined<br>- **macOS 10.11 and later**: Quarantined<br><br>- **Linux**: See *Allowed Distros* <br><br>- **Windows 10/11**: Quarantined|
182
+
|**PIN or password configuration**| - **Android 4.0 and later**: Quarantined <br>- **Samsung Knox Standard 4.0 and later**: Quarantined <br>- **Android Enterprise**: Quarantined <br><br>- **iOS 8.0 and later**: Remediated <br>- **macOS 10.11 and later**: Remediated <br><br>- **Linux**: Quarantined<br> <br>- **Windows 10/11**: Remediated|
183
+
|**Windows health attestation**| - **Android 4.0 and later**: Not applicable <br>- **Samsung Knox Standard 4.0 and later**: Not applicable <br>- **Android Enterprise**: Not applicable <br><br>- **iOS 8.0 and later**: Not applicable <br>- **macOS 10.11 and later**: Not applicable <br><br>- **Linux**: Not applicable <br><br>- **Windows 10/11**: Quarantined |
0 commit comments