From 79f3c61e56118342f1bb3acc1696317e47c6d796 Mon Sep 17 00:00:00 2001 From: Ricardo Mestre Date: Thu, 14 Dec 2023 18:25:51 +0000 Subject: [PATCH 1/9] Use correct var --- .../MSFT_IntuneEndpointDetectionAndResponsePolicyWindows10.psm1 | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/Modules/Microsoft365DSC/DSCResources/MSFT_IntuneEndpointDetectionAndResponsePolicyWindows10/MSFT_IntuneEndpointDetectionAndResponsePolicyWindows10.psm1 b/Modules/Microsoft365DSC/DSCResources/MSFT_IntuneEndpointDetectionAndResponsePolicyWindows10/MSFT_IntuneEndpointDetectionAndResponsePolicyWindows10.psm1 index bd8c2e719d..d5bc1f3b75 100644 --- a/Modules/Microsoft365DSC/DSCResources/MSFT_IntuneEndpointDetectionAndResponsePolicyWindows10/MSFT_IntuneEndpointDetectionAndResponsePolicyWindows10.psm1 +++ b/Modules/Microsoft365DSC/DSCResources/MSFT_IntuneEndpointDetectionAndResponsePolicyWindows10/MSFT_IntuneEndpointDetectionAndResponsePolicyWindows10.psm1 @@ -372,7 +372,7 @@ function Set-TargetResource elseif ($Ensure -eq 'Absent' -and $currentPolicy.Ensure -eq 'Present') { Write-Verbose -Message "Removing Endpoint Protection Policy {$($currentPolicy.DisplayName)}" - Remove-MgBetaDeviceManagementConfigurationPolicy -DeviceManagementConfigurationPolicyId $Identity + Remove-MgBetaDeviceManagementConfigurationPolicy -DeviceManagementConfigurationPolicyId $currentPolicy.Identity } } From c3ed8bc19d5cf3e9131c7a5bd47f856568926884 Mon Sep 17 00:00:00 2001 From: Ricardo Mestre Date: Thu, 14 Dec 2023 18:26:06 +0000 Subject: [PATCH 2/9] Update CHANGELOG.md --- CHANGELOG.md | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/CHANGELOG.md b/CHANGELOG.md index 8f48faddcf..9c728e587c 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -1,5 +1,12 @@ # Change log for Microsoft365DSC +# UNRELEASED + +* IntuneEndpointDetectionAndResponsePolicyWindows10 + * Fix issue when trying to remove policy and an Identity set to a random GUID + or from another tenant + FIXES [#4041](https://github.com/microsoft/Microsoft365DSC/issues/4041) + # 1.23.1213.1 * IntuneEndpointDetectionAndResponsePolicyWindows10 From 00b0519aa24b3d8c9cc58777532d990e0ff1abbd Mon Sep 17 00:00:00 2001 From: Ricardo Mestre Date: Thu, 14 Dec 2023 18:27:09 +0000 Subject: [PATCH 3/9] Update CHANGELOG.md --- CHANGELOG.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/CHANGELOG.md b/CHANGELOG.md index 9c728e587c..b4c99e3cc9 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -3,8 +3,8 @@ # UNRELEASED * IntuneEndpointDetectionAndResponsePolicyWindows10 - * Fix issue when trying to remove policy and an Identity set to a random GUID - or from another tenant + * Fix issue when trying to remove policy and set Identity to a random GUID or + from another tenant FIXES [#4041](https://github.com/microsoft/Microsoft365DSC/issues/4041) # 1.23.1213.1 From cd5a70722b7d9b7b8548278226ab80c2df53388c Mon Sep 17 00:00:00 2001 From: Ricardo Mestre Date: Thu, 14 Dec 2023 18:32:44 +0000 Subject: [PATCH 4/9] Same as previous --- CHANGELOG.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/CHANGELOG.md b/CHANGELOG.md index b4c99e3cc9..e54f0c3ea4 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -3,8 +3,8 @@ # UNRELEASED * IntuneEndpointDetectionAndResponsePolicyWindows10 - * Fix issue when trying to remove policy and set Identity to a random GUID or - from another tenant + * Fix issue when trying to remove policy and Identity is set to a random GUID + or from another tenant FIXES [#4041](https://github.com/microsoft/Microsoft365DSC/issues/4041) # 1.23.1213.1 From de4ed9f2d4b9b2c7c692c54b3a5f2f2a19701318 Mon Sep 17 00:00:00 2001 From: Ricardo Mestre Date: Fri, 15 Dec 2023 14:04:38 +0000 Subject: [PATCH 5/9] Fix code coverage workflow --- .github/workflows/CodeCoverage.yml | 1 + 1 file changed, 1 insertion(+) diff --git a/.github/workflows/CodeCoverage.yml b/.github/workflows/CodeCoverage.yml index 12de9e7d3b..e636034445 100644 --- a/.github/workflows/CodeCoverage.yml +++ b/.github/workflows/CodeCoverage.yml @@ -18,6 +18,7 @@ jobs: shell: pwsh run: | Install-Module ReverseDSC -Force -Scope AllUsers + Install-Module DSCParser -Force -Scope AllUsers Install-Module PSDesiredStateConfiguration -Force -Scope AllUsers Install-Module Pester -Force -SkipPublisherCheck -Scope AllUsers [System.Environment]::SetEnvironmentVariable('M365DSCTelemetryEnabled', $false, [System.EnvironmentVariableTarget]::Machine); From 65dd73b4d27183e093d090e6e6ccf394d8ed998f Mon Sep 17 00:00:00 2001 From: Nik Charlebois Date: Tue, 19 Dec 2023 09:06:16 -0500 Subject: [PATCH 6/9] Various Intune Related Fixes --- .../MSFT_IntuneAppConfigurationPolicy.psm1 | 2 +- ...MSFT_IntuneAppProtectionPolicyAndroid.psm1 | 30 +++++-------------- .../MSFT_IntuneAppProtectionPolicyiOS.psm1 | 11 ++++++- ...tionRulesPolicyWindows10ConfigManager.psm1 | 11 +++++-- ...FT_IntuneWifiConfigurationPolicyMacOS.psm1 | 2 +- .../MSFT_M365DSCRuleEvaluation.psm1 | 2 +- .../1-Create.ps1 | 2 +- .../2-Update.ps1 | 2 +- ...M365DSCIntegration.INTUNE.Create.Tests.ps1 | 10 +++---- 9 files changed, 35 insertions(+), 37 deletions(-) diff --git a/Modules/Microsoft365DSC/DSCResources/MSFT_IntuneAppConfigurationPolicy/MSFT_IntuneAppConfigurationPolicy.psm1 b/Modules/Microsoft365DSC/DSCResources/MSFT_IntuneAppConfigurationPolicy/MSFT_IntuneAppConfigurationPolicy.psm1 index f23dcedeb0..e2fe67a6e1 100644 --- a/Modules/Microsoft365DSC/DSCResources/MSFT_IntuneAppConfigurationPolicy/MSFT_IntuneAppConfigurationPolicy.psm1 +++ b/Modules/Microsoft365DSC/DSCResources/MSFT_IntuneAppConfigurationPolicy/MSFT_IntuneAppConfigurationPolicy.psm1 @@ -326,7 +326,7 @@ function Test-TargetResource Write-Verbose -Message "Current Values: $(Convert-M365DscHashtableToString -Hashtable $CurrentValues)" Write-Verbose -Message "Target Values: $(Convert-M365DscHashtableToString -Hashtable $PSBoundParameters)" - if ($null -ne $CurrentValues.CustomSettings -and $null -ne $CustomSettings) + if ($null -ne $CurrentValues.CustomSettings -and $CurrentValues.CustomSettings.Length -gt 0 -and $null -ne $CustomSettings) { $value = Test-M365DSCAppConfigurationPolicyCustomSetting -Current $CurrentValues.CustomSettings -Desired $CustomSettings if ($value -eq $false) diff --git a/Modules/Microsoft365DSC/DSCResources/MSFT_IntuneAppProtectionPolicyAndroid/MSFT_IntuneAppProtectionPolicyAndroid.psm1 b/Modules/Microsoft365DSC/DSCResources/MSFT_IntuneAppProtectionPolicyAndroid/MSFT_IntuneAppProtectionPolicyAndroid.psm1 index a2a3e83184..00d2809bc4 100644 --- a/Modules/Microsoft365DSC/DSCResources/MSFT_IntuneAppProtectionPolicyAndroid/MSFT_IntuneAppProtectionPolicyAndroid.psm1 +++ b/Modules/Microsoft365DSC/DSCResources/MSFT_IntuneAppProtectionPolicyAndroid/MSFT_IntuneAppProtectionPolicyAndroid.psm1 @@ -246,8 +246,9 @@ function Get-TargetResource if ($null -eq $policyInfo) { Write-Verbose -Message "Searching for Policy using DisplayName {$DisplayName}" - $policyInfo = Get-MgBetaDeviceAppManagementAndroidManagedAppProtection -Filter "displayName eq '$DisplayName'" -ExpandProperty Apps, assignments ` - -ErrorAction Stop + $policyInfoArray = Get-MgBetaDeviceAppManagementAndroidManagedAppProtection -ExpandProperty Apps, assignments ` + -ErrorAction Stop -All:$true + $policyInfo = $policyInfoArray | Where-Object -FilterScript {$_.displayName -eq $DisplayName} } if ($null -eq $policyInfo) { @@ -628,10 +629,6 @@ function Set-TargetResource } } } - else - { - #write-host 'value' $param 'not specified' - } } # handle complex parameters - manually for now @@ -992,29 +989,22 @@ function Test-TargetResource Write-Verbose -Message ('Unspecified Parameter in Config: ' + $param + ' Current Value Will be retained: ' + $CurrentValues.$param) } } - + Write-Verbose -Message "Starting Assignments Check" # handle complex parameters - manually for now if ($PSBoundParameters.keys -contains 'Assignments' ) { $targetvalues.add('Assignments', $psboundparameters.Assignments) } - else - { - Write-Verbose -Message 'Unspecified Parameter in Config: Assignments - Current Value is:' $CurrentValues.Assignments ` - "`r`nNOTE: Assignments interacts with other values - not specifying may lead to unexpected output" - } + Write-Verbose -Message "Starting Exluded Groups Check" if ($PSBoundParameters.keys -contains 'ExcludedGroups' ) { $targetvalues.add('ExcludedGroups', $psboundparameters.ExcludedGroups) } - else - { - Write-Verbose -Message 'Unspecified Parameter in Config: ExcludedGroups - Current Value is:' $CurrentValues.ExcludedGroups ` - "`r`nNOTE: ExcludedGroups interacts with other values - not specifying may lead to unexpected output" - } # set the apps values + Write-Verbose -Message "AppGroupType: $AppGroupType" + Write-Verbose -Message "apps: $apps" $AppsHash = set-AppsHash -AppGroupType $AppGroupType -apps $apps $targetvalues.add('Apps', $AppsHash.Apps) $targetvalues.add('AppGroupType', $AppsHash.AppGroupType) @@ -1285,12 +1275,8 @@ function Set-ManagedBrowserValues # edge - edge, true, empty id strings # any app - not configured, false, empty strings # unmanaged browser not configured, true, strings must not be empty - - Write-Host 'Setting Managed Browser Properties' - if (!$ManagedBrowserToOpenLinksRequired) { - Write-Host 'Setting Managed Browser to Any App' $ManagedBrowser = 'notConfigured' $ManagedBrowserToOpenLinksRequired = $false $CustomBrowserDisplayName = '' @@ -1301,7 +1287,6 @@ function Set-ManagedBrowserValues { if (($CustomBrowserDisplayName -ne '') -and ($CustomBrowserPackageId -ne '')) { - Write-Host 'Setting Managed Browser to Custom Browser' $ManagedBrowser = 'notConfigured' $ManagedBrowserToOpenLinksRequired = $true $CustomBrowserDisplayName = $CustomBrowserDisplayName @@ -1309,7 +1294,6 @@ function Set-ManagedBrowserValues } else { - Write-Host 'Setting Managed Browser to Microsoft Edge' $ManagedBrowser = 'microsoftEdge' $ManagedBrowserToOpenLinksRequired = $true $CustomBrowserDisplayName = '' diff --git a/Modules/Microsoft365DSC/DSCResources/MSFT_IntuneAppProtectionPolicyiOS/MSFT_IntuneAppProtectionPolicyiOS.psm1 b/Modules/Microsoft365DSC/DSCResources/MSFT_IntuneAppProtectionPolicyiOS/MSFT_IntuneAppProtectionPolicyiOS.psm1 index d1ad6a0058..b5d2b73345 100644 --- a/Modules/Microsoft365DSC/DSCResources/MSFT_IntuneAppProtectionPolicyiOS/MSFT_IntuneAppProtectionPolicyiOS.psm1 +++ b/Modules/Microsoft365DSC/DSCResources/MSFT_IntuneAppProtectionPolicyiOS/MSFT_IntuneAppProtectionPolicyiOS.psm1 @@ -725,7 +725,16 @@ function Set-TargetResource { if (-not [String]::IsNullOrEmpty($createParameters.$duration)) { - $createParameters.$duration = [TimeSpan]::parse($createParameters.$duration) + Write-Verbose -Message "Parsing {$($createParameters.$duration)} into TimeSpan" + if ($createParameters.$duration.startswith('P')) + { + $timespan = [System.Xml.XmlConvert]::ToTimeSpan($createParameters.$duration) + } + else + { + $timespan = [TimeSpan]$createParameters.$duration + } + $createParameters.$duration = $timespan } } $myExemptedAppProtocols = @() diff --git a/Modules/Microsoft365DSC/DSCResources/MSFT_IntuneAttackSurfaceReductionRulesPolicyWindows10ConfigManager/MSFT_IntuneAttackSurfaceReductionRulesPolicyWindows10ConfigManager.psm1 b/Modules/Microsoft365DSC/DSCResources/MSFT_IntuneAttackSurfaceReductionRulesPolicyWindows10ConfigManager/MSFT_IntuneAttackSurfaceReductionRulesPolicyWindows10ConfigManager.psm1 index c06715c2da..50ba894304 100644 --- a/Modules/Microsoft365DSC/DSCResources/MSFT_IntuneAttackSurfaceReductionRulesPolicyWindows10ConfigManager/MSFT_IntuneAttackSurfaceReductionRulesPolicyWindows10ConfigManager.psm1 +++ b/Modules/Microsoft365DSC/DSCResources/MSFT_IntuneAttackSurfaceReductionRulesPolicyWindows10ConfigManager/MSFT_IntuneAttackSurfaceReductionRulesPolicyWindows10ConfigManager.psm1 @@ -176,8 +176,10 @@ function Get-TargetResource try { #Retrieve policy general settings - $policy = Get-MgBetaDeviceManagementConfigurationPolicy -DeviceManagementConfigurationPolicyId $Identity -ErrorAction Stop - + if (-not [System.String]::IsNullOrEmpty($Identity)) + { + $policy = Get-MgBetaDeviceManagementConfigurationPolicy -DeviceManagementConfigurationPolicyId $Identity -ErrorAction Stop + } if ($null -eq $policy) { Write-Verbose -Message "No Endpoint Protection Policy {id: '$Identity'} was found" @@ -957,7 +959,10 @@ function Get-IntuneSettingCatalogPolicySetting -SettingValueName $settingValueName ` -SettingValueType $settingValueType ` -SettingValueTemplateId $settingValueTemplateId - $settingInstance += ($settingValue) + if ($null -ne $settingValue) + { + $settingInstance += [Hashtable]$settingValue + } $settingInstances += @{ '@odata.type' = '#microsoft.graph.deviceManagementConfigurationSetting' diff --git a/Modules/Microsoft365DSC/DSCResources/MSFT_IntuneWifiConfigurationPolicyMacOS/MSFT_IntuneWifiConfigurationPolicyMacOS.psm1 b/Modules/Microsoft365DSC/DSCResources/MSFT_IntuneWifiConfigurationPolicyMacOS/MSFT_IntuneWifiConfigurationPolicyMacOS.psm1 index 7014110412..47699b2efa 100644 --- a/Modules/Microsoft365DSC/DSCResources/MSFT_IntuneWifiConfigurationPolicyMacOS/MSFT_IntuneWifiConfigurationPolicyMacOS.psm1 +++ b/Modules/Microsoft365DSC/DSCResources/MSFT_IntuneWifiConfigurationPolicyMacOS/MSFT_IntuneWifiConfigurationPolicyMacOS.psm1 @@ -363,7 +363,7 @@ function Set-TargetResource if ($policy.id) { - Update-MgDeviceConfigurationPolicyAssignment -DeviceConfigurationPolicyId $policy.id ` + Update-MgBetaDeviceManagementConfigurationPolicyAssignment -DeviceConfigurationPolicyId $policy.id ` -Targets $assignmentsHash ` -Repository 'deviceManagement/deviceConfigurations' } diff --git a/Modules/Microsoft365DSC/DSCResources/MSFT_M365DSCRuleEvaluation/MSFT_M365DSCRuleEvaluation.psm1 b/Modules/Microsoft365DSC/DSCResources/MSFT_M365DSCRuleEvaluation/MSFT_M365DSCRuleEvaluation.psm1 index 01a227e082..41367ee930 100644 --- a/Modules/Microsoft365DSC/DSCResources/MSFT_M365DSCRuleEvaluation/MSFT_M365DSCRuleEvaluation.psm1 +++ b/Modules/Microsoft365DSC/DSCResources/MSFT_M365DSCRuleEvaluation/MSFT_M365DSCRuleEvaluation.psm1 @@ -203,7 +203,7 @@ function Test-TargetResource Write-Verbose -Message "Identified {$($instances.Length)} instances matching rule." } - $result = ($instances.Length -$DSCConvertedInstances.Length) -eq 0 + $result = ($instances.Length - $DSCConvertedInstances.Length) -eq 0 if (-not [System.String]::IsNullOrEmpty($AfterRuleCountQuery)) { diff --git a/Modules/Microsoft365DSC/Examples/Resources/IntuneAccountProtectionPolicy/1-Create.ps1 b/Modules/Microsoft365DSC/Examples/Resources/IntuneAccountProtectionPolicy/1-Create.ps1 index 2194ba0495..cb6919ab1d 100644 --- a/Modules/Microsoft365DSC/Examples/Resources/IntuneAccountProtectionPolicy/1-Create.ps1 +++ b/Modules/Microsoft365DSC/Examples/Resources/IntuneAccountProtectionPolicy/1-Create.ps1 @@ -18,7 +18,7 @@ Configuration Example { DisplayName = 'test' deviceGuardLocalSystemAuthorityCredentialGuardSettings = "notConfigured" - WindowsHelloForBusinessBlocked = $true + WindowsHelloForBusinessBlocked = $false PinMinimumLength = 5 PinSpecialCharactersUsage = 'required' Ensure = 'Present' diff --git a/Modules/Microsoft365DSC/Examples/Resources/IntuneAccountProtectionPolicy/2-Update.ps1 b/Modules/Microsoft365DSC/Examples/Resources/IntuneAccountProtectionPolicy/2-Update.ps1 index a337d210ae..f87d9a4e39 100644 --- a/Modules/Microsoft365DSC/Examples/Resources/IntuneAccountProtectionPolicy/2-Update.ps1 +++ b/Modules/Microsoft365DSC/Examples/Resources/IntuneAccountProtectionPolicy/2-Update.ps1 @@ -18,7 +18,7 @@ Configuration Example { DisplayName = 'test' deviceGuardLocalSystemAuthorityCredentialGuardSettings = "notConfigured" - WindowsHelloForBusinessBlocked = $true + WindowsHelloForBusinessBlocked = $false PinMinimumLength = 10 # Updated Property PinSpecialCharactersUsage = 'required' Ensure = 'Present' diff --git a/Tests/Integration/Microsoft365DSC/M365DSCIntegration.INTUNE.Create.Tests.ps1 b/Tests/Integration/Microsoft365DSC/M365DSCIntegration.INTUNE.Create.Tests.ps1 index 50109f3ff3..1d139f02b8 100644 --- a/Tests/Integration/Microsoft365DSC/M365DSCIntegration.INTUNE.Create.Tests.ps1 +++ b/Tests/Integration/Microsoft365DSC/M365DSCIntegration.INTUNE.Create.Tests.ps1 @@ -60,7 +60,7 @@ { DisplayName = 'test' deviceGuardLocalSystemAuthorityCredentialGuardSettings = "notConfigured" - WindowsHelloForBusinessBlocked = $true + WindowsHelloForBusinessBlocked = $false PinMinimumLength = 5 PinSpecialCharactersUsage = 'required' Ensure = 'Present' @@ -308,7 +308,7 @@ ManagedEmailProfileRequired = $True Ensure = 'Present' Credential = $Credscredential - + } IntuneDeviceCompliancePolicyMacOS 'ConfigureDeviceCompliancePolicyMacOS' { @@ -412,7 +412,7 @@ { Name = 'hosted_app' } - + MSFT_IntuneGroupPolicyDefinitionValuePresentationValueKeyValuePair { Name = 'user_script' @@ -446,7 +446,7 @@ Id = '14c48993-35af-4b77-a4f8-12de917b1bb9' odataType = '#microsoft.graph.groupPolicyPresentationValueDecimal' } - + MSFT_IntuneGroupPolicyDefinitionValuePresentationValue { presentationDefinitionId = '98998e7f-cc2a-4d96-8c47-35dd4b2ce56b' @@ -455,7 +455,7 @@ Id = '4d654df9-6826-470f-af4e-d37491663c76' odataType = '#microsoft.graph.groupPolicyPresentationValueDecimal' } - + MSFT_IntuneGroupPolicyDefinitionValuePresentationValue { presentationDefinitionId = '6900e752-4bc3-463b-9fc8-36d78c77bc3e' From a03d49029b7df64b53be37a16e950b31e421f66c Mon Sep 17 00:00:00 2001 From: NikCharlebois Date: Tue, 19 Dec 2023 14:18:13 +0000 Subject: [PATCH 7/9] Updated Resources and Cmdlet documentation pages --- docs/docs/resources/intune/IntuneAccountProtectionPolicy.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/docs/docs/resources/intune/IntuneAccountProtectionPolicy.md b/docs/docs/resources/intune/IntuneAccountProtectionPolicy.md index c9358fc50d..734b5707f4 100644 --- a/docs/docs/resources/intune/IntuneAccountProtectionPolicy.md +++ b/docs/docs/resources/intune/IntuneAccountProtectionPolicy.md @@ -99,7 +99,7 @@ Configuration Example { DisplayName = 'test' deviceGuardLocalSystemAuthorityCredentialGuardSettings = "notConfigured" - WindowsHelloForBusinessBlocked = $true + WindowsHelloForBusinessBlocked = $false PinMinimumLength = 5 PinSpecialCharactersUsage = 'required' Ensure = 'Present' @@ -130,7 +130,7 @@ Configuration Example { DisplayName = 'test' deviceGuardLocalSystemAuthorityCredentialGuardSettings = "notConfigured" - WindowsHelloForBusinessBlocked = $true + WindowsHelloForBusinessBlocked = $false PinMinimumLength = 10 # Updated Property PinSpecialCharactersUsage = 'required' Ensure = 'Present' From 78e74cc0e02fa0b2b954894625d5c37e23423b0d Mon Sep 17 00:00:00 2001 From: NikCharlebois Date: Tue, 19 Dec 2023 14:20:27 +0000 Subject: [PATCH 8/9] Updated {Create} Intune Integration Tests --- .../M365DSCIntegration.INTUNE.Create.Tests.ps1 | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/Tests/Integration/Microsoft365DSC/M365DSCIntegration.INTUNE.Create.Tests.ps1 b/Tests/Integration/Microsoft365DSC/M365DSCIntegration.INTUNE.Create.Tests.ps1 index 1d139f02b8..89fc69d581 100644 --- a/Tests/Integration/Microsoft365DSC/M365DSCIntegration.INTUNE.Create.Tests.ps1 +++ b/Tests/Integration/Microsoft365DSC/M365DSCIntegration.INTUNE.Create.Tests.ps1 @@ -308,7 +308,7 @@ ManagedEmailProfileRequired = $True Ensure = 'Present' Credential = $Credscredential - + } IntuneDeviceCompliancePolicyMacOS 'ConfigureDeviceCompliancePolicyMacOS' { @@ -412,7 +412,7 @@ { Name = 'hosted_app' } - + MSFT_IntuneGroupPolicyDefinitionValuePresentationValueKeyValuePair { Name = 'user_script' @@ -446,7 +446,7 @@ Id = '14c48993-35af-4b77-a4f8-12de917b1bb9' odataType = '#microsoft.graph.groupPolicyPresentationValueDecimal' } - + MSFT_IntuneGroupPolicyDefinitionValuePresentationValue { presentationDefinitionId = '98998e7f-cc2a-4d96-8c47-35dd4b2ce56b' @@ -455,7 +455,7 @@ Id = '4d654df9-6826-470f-af4e-d37491663c76' odataType = '#microsoft.graph.groupPolicyPresentationValueDecimal' } - + MSFT_IntuneGroupPolicyDefinitionValuePresentationValue { presentationDefinitionId = '6900e752-4bc3-463b-9fc8-36d78c77bc3e' From 5f45970c8afa475d8dae930f7f8d6fbb2920ab19 Mon Sep 17 00:00:00 2001 From: Ricardo Mestre Date: Tue, 19 Dec 2023 14:21:23 +0000 Subject: [PATCH 9/9] .