diff --git a/CHANGELOG.md b/CHANGELOG.md index 318d95531d..42c3f6c396 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -25,6 +25,8 @@ FIXES [#3582](https://github.com/microsoft/Microsoft365DSC/issues/3582) * MISC * Added a QA check to test if all used subclasses actually exist in the MOF schema. +* DEPENDENCIES + * Updated Microsoft. Graph dependencies to version 2.9.0. # 1.23.1108.1 diff --git a/Modules/Microsoft365DSC/DSCResources/MSFT_IntuneAccountProtectionLocalAdministratorPasswordSolutionPolicy/MSFT_IntuneAccountProtectionLocalAdministratorPasswordSolutionPolicy.schema.mof b/Modules/Microsoft365DSC/DSCResources/MSFT_IntuneAccountProtectionLocalAdministratorPasswordSolutionPolicy/MSFT_IntuneAccountProtectionLocalAdministratorPasswordSolutionPolicy.schema.mof index e2b37594e8..82b0d86c8c 100644 --- a/Modules/Microsoft365DSC/DSCResources/MSFT_IntuneAccountProtectionLocalAdministratorPasswordSolutionPolicy/MSFT_IntuneAccountProtectionLocalAdministratorPasswordSolutionPolicy.schema.mof +++ b/Modules/Microsoft365DSC/DSCResources/MSFT_IntuneAccountProtectionLocalAdministratorPasswordSolutionPolicy/MSFT_IntuneAccountProtectionLocalAdministratorPasswordSolutionPolicy.schema.mof @@ -1,5 +1,5 @@ [ClassVersion("1.0.0.0")] -class MSFT_DeviceManagementConfigurationPolicyAssignments +class MSFT_IntuneAccountProtectionLocalAdministratorPasswordSolutionPolicyAssignments { [Write, Description("The type of the target assignment."), ValueMap{"#microsoft.graph.groupAssignmentTarget","#microsoft.graph.allLicensedUsersAssignmentTarget","#microsoft.graph.allDevicesAssignmentTarget","#microsoft.graph.exclusionGroupAssignmentTarget","#microsoft.graph.configurationManagerCollectionAssignmentTarget"}, Values{"#microsoft.graph.groupAssignmentTarget","#microsoft.graph.allLicensedUsersAssignmentTarget","#microsoft.graph.allDevicesAssignmentTarget","#microsoft.graph.exclusionGroupAssignmentTarget","#microsoft.graph.configurationManagerCollectionAssignmentTarget"}] String dataType; [Write, Description("The type of filter of the target assignment i.e. Exclude or Include. Possible values are:none, include, exclude."), ValueMap{"none","include","exclude"}, Values{"none","include","exclude"}] String deviceAndAppManagementAssignmentFilterType; @@ -14,7 +14,7 @@ class MSFT_IntuneAccountProtectionLocalAdministratorPasswordSolutionPolicy : OMI [Key, Description("Identity of the account protection local administrator password solution policy.")] String Identity; [Required, Description("Display name of the account protection local administrator password solution policy.")] String DisplayName; [Write, Description("Description of the account protection local administrator password solution policy.")] String Description; - [Write, Description("Assignments of the account protection local administrator password solution policy."), EmbeddedInstance("MSFT_DeviceManagementConfigurationPolicyAssignments")] String Assignments[]; + [Write, Description("Assignments of the account protection local administrator password solution policy."), EmbeddedInstance("MSFT_IntuneAccountProtectionLocalAdministratorPasswordSolutionPolicyAssignments")] String Assignments[]; [Write, Description("Configures which directory the local admin account password is backed up to. 0 - Disabled, 1 - Azure AD, 2 - AD"), ValueMap{"0", "1", "2"}, Values{"0", "1", "2"}] UInt32 BackupDirectory; [Write, Description("Configures the maximum password age of the managed local administrator account for Azure AD. Minimum - 7, Maximum - 365")] UInt32 PasswordAgeDays_AAD; [Write, Description("Configures the maximum password age of the managed local administrator account for Active Directory. Minimum - 1, Maximum - 365")] UInt32 PasswordAgeDays; diff --git a/Modules/Microsoft365DSC/DSCResources/MSFT_IntuneAccountProtectionLocalUserGroupMembershipPolicy/MSFT_IntuneAccountProtectionLocalUserGroupMembershipPolicy.schema.mof b/Modules/Microsoft365DSC/DSCResources/MSFT_IntuneAccountProtectionLocalUserGroupMembershipPolicy/MSFT_IntuneAccountProtectionLocalUserGroupMembershipPolicy.schema.mof index c37093d4a1..4b093ec012 100644 Binary files a/Modules/Microsoft365DSC/DSCResources/MSFT_IntuneAccountProtectionLocalUserGroupMembershipPolicy/MSFT_IntuneAccountProtectionLocalUserGroupMembershipPolicy.schema.mof and b/Modules/Microsoft365DSC/DSCResources/MSFT_IntuneAccountProtectionLocalUserGroupMembershipPolicy/MSFT_IntuneAccountProtectionLocalUserGroupMembershipPolicy.schema.mof differ diff --git a/Modules/Microsoft365DSC/DSCResources/MSFT_IntuneAccountProtectionPolicy/MSFT_IntuneAccountProtectionPolicy.schema.mof b/Modules/Microsoft365DSC/DSCResources/MSFT_IntuneAccountProtectionPolicy/MSFT_IntuneAccountProtectionPolicy.schema.mof index e3e884d13c..63b23f757a 100644 Binary files a/Modules/Microsoft365DSC/DSCResources/MSFT_IntuneAccountProtectionPolicy/MSFT_IntuneAccountProtectionPolicy.schema.mof and b/Modules/Microsoft365DSC/DSCResources/MSFT_IntuneAccountProtectionPolicy/MSFT_IntuneAccountProtectionPolicy.schema.mof differ diff --git a/Modules/Microsoft365DSC/Dependencies/Manifest.psd1 b/Modules/Microsoft365DSC/Dependencies/Manifest.psd1 index 145747cf7c..5dc62b4ada 100644 --- a/Modules/Microsoft365DSC/Dependencies/Manifest.psd1 +++ b/Modules/Microsoft365DSC/Dependencies/Manifest.psd1 @@ -10,71 +10,71 @@ }, @{ ModuleName = 'Microsoft.Graph.Applications' - RequiredVersion = '2.8.0' + RequiredVersion = '2.9.0' }, @{ ModuleName = 'Microsoft.Graph.Authentication' - RequiredVersion = '2.8.0' + RequiredVersion = '2.9.0' }, @{ ModuleName = 'Microsoft.Graph.Beta.DeviceManagement' - RequiredVersion = '2.8.0' + RequiredVersion = '2.9.0' }, @{ ModuleName = 'Microsoft.Graph.Beta.Devices.CorporateManagement' - RequiredVersion = '2.8.0' + RequiredVersion = '2.9.0' }, @{ ModuleName = 'Microsoft.Graph.Beta.DeviceManagement.Administration' - RequiredVersion = '2.8.0' + RequiredVersion = '2.9.0' }, @{ ModuleName = 'Microsoft.Graph.Beta.DeviceManagement.Enrollment' - RequiredVersion = '2.8.0' + RequiredVersion = '2.9.0' }, @{ ModuleName = 'Microsoft.Graph.Beta.Identity.DirectoryManagement' - RequiredVersion = '2.8.0' + RequiredVersion = '2.9.0' }, @{ ModuleName = 'Microsoft.Graph.Beta.Identity.Governance' - RequiredVersion = '2.8.0' + RequiredVersion = '2.9.0' }, @{ ModuleName = 'Microsoft.Graph.Beta.Identity.SignIns' - RequiredVersion = '2.8.0' + RequiredVersion = '2.9.0' }, @{ ModuleName = 'Microsoft.Graph.Beta.Reports' - RequiredVersion = '2.8.0' + RequiredVersion = '2.9.0' }, @{ ModuleName = 'Microsoft.Graph.Beta.Teams' - RequiredVersion = '2.8.0' + RequiredVersion = '2.9.0' }, @{ ModuleName = 'Microsoft.Graph.DeviceManagement.Administration' - RequiredVersion = '2.8.0' + RequiredVersion = '2.9.0' }, @{ ModuleName = 'Microsoft.Graph.Beta.DirectoryObjects' - RequiredVersion = '2.8.0' + RequiredVersion = '2.9.0' }, @{ ModuleName = 'Microsoft.Graph.Groups' - RequiredVersion = '2.8.0' + RequiredVersion = '2.9.0' }, @{ ModuleName = 'Microsoft.Graph.Planner' - RequiredVersion = '2.8.0' + RequiredVersion = '2.9.0' }, @{ ModuleName = 'Microsoft.Graph.Users' - RequiredVersion = '2.8.0' + RequiredVersion = '2.9.0' }, @{ ModuleName = 'Microsoft.Graph.Users.Actions' - RequiredVersion = '2.8.0' + RequiredVersion = '2.9.0' }, @{ ModuleName = 'Microsoft.PowerApps.Administration.PowerShell' diff --git a/Modules/Microsoft365DSC/Examples/Resources/IntuneAccountProtectionLocalAdministratorPasswordSolutionPolicy/1-ConfigureIntuneAccountProtectionLocalAdministratorPasswordSolutionPolicy.ps1 b/Modules/Microsoft365DSC/Examples/Resources/IntuneAccountProtectionLocalAdministratorPasswordSolutionPolicy/1-ConfigureIntuneAccountProtectionLocalAdministratorPasswordSolutionPolicy.ps1 index 3aba9c7a5d..fa0b3f5bd8 100644 --- a/Modules/Microsoft365DSC/Examples/Resources/IntuneAccountProtectionLocalAdministratorPasswordSolutionPolicy/1-ConfigureIntuneAccountProtectionLocalAdministratorPasswordSolutionPolicy.ps1 +++ b/Modules/Microsoft365DSC/Examples/Resources/IntuneAccountProtectionLocalAdministratorPasswordSolutionPolicy/1-ConfigureIntuneAccountProtectionLocalAdministratorPasswordSolutionPolicy.ps1 @@ -22,7 +22,7 @@ Configuration Example Ensure = "Present"; Credential = $credsGlobalAdmin Assignments = @( - MSFT_DeviceManagementConfigurationPolicyAssignments{ + MSFT_IntuneAccountProtectionLocalAdministratorPasswordSolutionPolicyAssignments{ deviceAndAppManagementAssignmentFilterType = 'none' dataType = '#microsoft.graph.allLicensedUsersAssignmentTarget' } diff --git a/Modules/Microsoft365DSC/Examples/Resources/IntuneAccountProtectionLocalUserGroupMembershipPolicy/1-ConfigureIntuneAccountProtectionLocalUserGroupMembershipPolicy.ps1 b/Modules/Microsoft365DSC/Examples/Resources/IntuneAccountProtectionLocalUserGroupMembershipPolicy/1-ConfigureIntuneAccountProtectionLocalUserGroupMembershipPolicy.ps1 index 9a7fd56a0a..fea7287275 100644 --- a/Modules/Microsoft365DSC/Examples/Resources/IntuneAccountProtectionLocalUserGroupMembershipPolicy/1-ConfigureIntuneAccountProtectionLocalUserGroupMembershipPolicy.ps1 +++ b/Modules/Microsoft365DSC/Examples/Resources/IntuneAccountProtectionLocalUserGroupMembershipPolicy/1-ConfigureIntuneAccountProtectionLocalUserGroupMembershipPolicy.ps1 @@ -22,7 +22,7 @@ Configuration Example Ensure = "Present"; Credential = $credsGlobalAdmin Assignments = @( - MSFT_DeviceManagementConfigurationPolicyAssignments{ + MSFT_IntuneAccountProtectionLocalUserGroupMembershipPolicyAssignments{ deviceAndAppManagementAssignmentFilterType = 'none' dataType = '#microsoft.graph.allLicensedUsersAssignmentTarget' } diff --git a/Tests/Unit/Microsoft365DSC/Microsoft365DSC.IntuneAccountProtectionLocalAdministratorPasswordSolutionPolicy.Tests.ps1 b/Tests/Unit/Microsoft365DSC/Microsoft365DSC.IntuneAccountProtectionLocalAdministratorPasswordSolutionPolicy.Tests.ps1 index 4c725552f2..2ed971ac91 100644 --- a/Tests/Unit/Microsoft365DSC/Microsoft365DSC.IntuneAccountProtectionLocalAdministratorPasswordSolutionPolicy.Tests.ps1 +++ b/Tests/Unit/Microsoft365DSC/Microsoft365DSC.IntuneAccountProtectionLocalAdministratorPasswordSolutionPolicy.Tests.ps1 @@ -85,7 +85,7 @@ Describe -Name $Global:DscHelper.DescribeHeader -Fixture { BeforeAll { $testParams = @{ Assignments = @( - (New-CimInstance -ClassName MSFT_DeviceManagementConfigurationPolicyAssignments -Property @{ + (New-CimInstance -ClassName MSFT_IntuneAccountProtectionLocalAdministratorPasswordSolutionPolicyAssignments -Property @{ DataType = '#microsoft.graph.exclusionGroupAssignmentTarget' CollectionId = '26d60dd1-fab6-47bf-8656-358194c1a49d' } -ClientOnly) @@ -121,7 +121,7 @@ Describe -Name $Global:DscHelper.DescribeHeader -Fixture { BeforeAll { $testParams = @{ Assignments = [CimInstance[]]@( - (New-CimInstance -ClassName MSFT_DeviceManagementConfigurationPolicyAssignments -Property @{ + (New-CimInstance -ClassName MSFT_IntuneAccountProtectionLocalAdministratorPasswordSolutionPolicyAssignments -Property @{ DataType = '#microsoft.graph.exclusionGroupAssignmentTarget' CollectionId = '26d60dd1-fab6-47bf-8656-358194c1a49d' } -ClientOnly) @@ -189,7 +189,7 @@ Describe -Name $Global:DscHelper.DescribeHeader -Fixture { Ensure = 'Present' Identity = '619bd4a4-3b3b-4441-bd6f-3f4c0c444870' Assignments = [CimInstance[]]@( - (New-CimInstance -ClassName MSFT_DeviceManagementConfigurationPolicyAssignments -Property @{ + (New-CimInstance -ClassName MSFT_IntuneAccountProtectionLocalAdministratorPasswordSolutionPolicyAssignments -Property @{ DataType = '#microsoft.graph.exclusionGroupAssignmentTarget' CollectionId = '26d60dd1-fab6-47bf-8656-358194c1a49d' } -ClientOnly) @@ -236,7 +236,7 @@ Describe -Name $Global:DscHelper.DescribeHeader -Fixture { BeforeAll { $testParams = @{ Assignments = @( - (New-CimInstance -ClassName MSFT_DeviceManagementConfigurationPolicyAssignments -Property @{ + (New-CimInstance -ClassName MSFT_IntuneAccountProtectionLocalAdministratorPasswordSolutionPolicyAssignments -Property @{ DataType = '#microsoft.graph.exclusionGroupAssignmentTarget' CollectionId = '26d60dd1-fab6-47bf-8656-358194c1a49d' } -ClientOnly) diff --git a/Tests/Unit/Microsoft365DSC/Microsoft365DSC.IntuneAccountProtectionLocalUserGroupMembershipPolicy.Tests.ps1 b/Tests/Unit/Microsoft365DSC/Microsoft365DSC.IntuneAccountProtectionLocalUserGroupMembershipPolicy.Tests.ps1 index f25796d01b..d7c738d6a1 100644 --- a/Tests/Unit/Microsoft365DSC/Microsoft365DSC.IntuneAccountProtectionLocalUserGroupMembershipPolicy.Tests.ps1 +++ b/Tests/Unit/Microsoft365DSC/Microsoft365DSC.IntuneAccountProtectionLocalUserGroupMembershipPolicy.Tests.ps1 @@ -69,7 +69,7 @@ Describe -Name $Global:DscHelper.DescribeHeader -Fixture { BeforeAll { $testParams = @{ Assignments = @( - (New-CimInstance -ClassName MSFT_DeviceManagementConfigurationPolicyAssignments -Property @{ + (New-CimInstance -ClassName MSFT_IntuneAccountProtectionLocalUserGroupMembershipPolicyAssignments -Property @{ DataType = '#microsoft.graph.exclusionGroupAssignmentTarget' DeviceAndAppManagementAssignmentFilterType = 'none' GroupId = '26d60dd1-fab6-47bf-8656-358194c1a49d' @@ -113,7 +113,7 @@ Describe -Name $Global:DscHelper.DescribeHeader -Fixture { BeforeAll { $testParams = @{ Assignments = [CimInstance[]]@( - (New-CimInstance -ClassName MSFT_DeviceManagementConfigurationPolicyAssignments -Property @{ + (New-CimInstance -ClassName MSFT_IntuneAccountProtectionLocalUserGroupMembershipPolicyAssignments -Property @{ DataType = '#microsoft.graph.exclusionGroupAssignmentTarget' DeviceAndAppManagementAssignmentFilterType = 'none' GroupId = '26d60dd1-fab6-47bf-8656-358194c1a49d' @@ -238,7 +238,7 @@ Describe -Name $Global:DscHelper.DescribeHeader -Fixture { Ensure = 'Present' Identity = '619bd4a4-3b3b-4441-bd6f-3f4c0c444870' Assignments = [CimInstance[]]@( - (New-CimInstance -ClassName MSFT_DeviceManagementConfigurationPolicyAssignments -Property @{ + (New-CimInstance -ClassName MSFT_IntuneAccountProtectionLocalUserGroupMembershipPolicyAssignments -Property @{ DataType = '#microsoft.graph.exclusionGroupAssignmentTarget' DeviceAndAppManagementAssignmentFilterType = 'none' GroupId = '26d60dd1-fab6-47bf-8656-358194c1a49d' @@ -342,7 +342,7 @@ Describe -Name $Global:DscHelper.DescribeHeader -Fixture { BeforeAll { $testParams = @{ Assignments = @( - (New-CimInstance -ClassName MSFT_DeviceManagementConfigurationPolicyAssignments -Property @{ + (New-CimInstance -ClassName MSFT_IntuneAccountProtectionLocalUserGroupMembershipPolicyAssignments -Property @{ DataType = '#microsoft.graph.exclusionGroupAssignmentTarget' DeviceAndAppManagementAssignmentFilterType = 'none' GroupId = '26d60dd1-fab6-47bf-8656-358194c1a49d' diff --git a/Tests/Unit/Microsoft365DSC/Microsoft365DSC.IntuneAccountProtectionPolicy.Tests.ps1 b/Tests/Unit/Microsoft365DSC/Microsoft365DSC.IntuneAccountProtectionPolicy.Tests.ps1 index 9f79fe6d48..e9548f18af 100644 --- a/Tests/Unit/Microsoft365DSC/Microsoft365DSC.IntuneAccountProtectionPolicy.Tests.ps1 +++ b/Tests/Unit/Microsoft365DSC/Microsoft365DSC.IntuneAccountProtectionPolicy.Tests.ps1 @@ -94,7 +94,7 @@ Describe -Name $Global:DscHelper.DescribeHeader -Fixture { BeforeAll { $testParams = @{ Assignments = @( - (New-CimInstance -ClassName MSFT_DeviceManagementConfigurationPolicyAssignments -Property @{ + (New-CimInstance -ClassName MSFT_IntuneAccountProtectionPolicyAssignments -Property @{ DataType = '#microsoft.graph.exclusionGroupAssignmentTarget' deviceAndAppManagementAssignmentFilterType = 'none' groupId = '26d60dd1-fab6-47bf-8656-358194c1a49d' @@ -131,7 +131,7 @@ Describe -Name $Global:DscHelper.DescribeHeader -Fixture { BeforeAll { $testParams = @{ Assignments = [CimInstance[]]@( - (New-CimInstance -ClassName MSFT_DeviceManagementConfigurationPolicyAssignments -Property @{ + (New-CimInstance -ClassName MSFT_IntuneAccountProtectionPolicyAssignments -Property @{ DataType = '#microsoft.graph.exclusionGroupAssignmentTarget' deviceAndAppManagementAssignmentFilterType = 'none' groupId = '26d60dd1-fab6-47bf-8656-358194c1a49d' @@ -194,7 +194,7 @@ Describe -Name $Global:DscHelper.DescribeHeader -Fixture { Ensure = 'Present' Identity = '619bd4a4-3b3b-4441-bd6f-3f4c0c444870' Assignments = [CimInstance[]]@( - (New-CimInstance -ClassName MSFT_DeviceManagementConfigurationPolicyAssignments -Property @{ + (New-CimInstance -ClassName MSFT_IntuneAccountProtectionPolicyAssignments -Property @{ DataType = '#microsoft.graph.exclusionGroupAssignmentTarget' deviceAndAppManagementAssignmentFilterType = 'none' GroupId = '26d60dd1-fab6-47bf-8656-358194c1a49d' @@ -232,7 +232,7 @@ Describe -Name $Global:DscHelper.DescribeHeader -Fixture { BeforeAll { $testParams = @{ Assignments = @( - (New-CimInstance -ClassName MSFT_DeviceManagementConfigurationPolicyAssignments -Property @{ + (New-CimInstance -ClassName MSFT_IntuneAccountProtectionPolicyAssignments -Property @{ DataType = '#microsoft.graph.exclusionGroupAssignmentTarget' deviceAndAppManagementAssignmentFilterType = 'none' GroupId = '26d60dd1-fab6-47bf-8656-358194c1a49d' diff --git a/docs/docs/resources/intune/IntuneAccountProtectionLocalAdministratorPasswordSolutionPolicy.md b/docs/docs/resources/intune/IntuneAccountProtectionLocalAdministratorPasswordSolutionPolicy.md index d4dab37399..7160360ba9 100644 --- a/docs/docs/resources/intune/IntuneAccountProtectionLocalAdministratorPasswordSolutionPolicy.md +++ b/docs/docs/resources/intune/IntuneAccountProtectionLocalAdministratorPasswordSolutionPolicy.md @@ -7,7 +7,7 @@ | **Identity** | Key | String | Identity of the account protection local administrator password solution policy. | | | **DisplayName** | Required | String | Display name of the account protection local administrator password solution policy. | | | **Description** | Write | String | Description of the account protection local administrator password solution policy. | | -| **Assignments** | Write | MSFT_DeviceManagementConfigurationPolicyAssignments[] | Assignments of the account protection local administrator password solution policy. | | +| **Assignments** | Write | MSFT_IntuneAccountProtectionLocalAdministratorPasswordSolutionPolicyAssignments[] | Assignments of the account protection local administrator password solution policy. | | | **BackupDirectory** | Write | UInt32 | Configures which directory the local admin account password is backed up to. 0 - Disabled, 1 - Azure AD, 2 - AD | `0`, `1`, `2` | | **PasswordAgeDays_AAD** | Write | UInt32 | Configures the maximum password age of the managed local administrator account for Azure AD. Minimum - 7, Maximum - 365 | | | **PasswordAgeDays** | Write | UInt32 | Configures the maximum password age of the managed local administrator account for Active Directory. Minimum - 1, Maximum - 365 | | @@ -28,7 +28,7 @@ | **CertificateThumbprint** | Write | String | Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication. | | | **ManagedIdentity** | Write | Boolean | Managed ID being used for authentication. | | -### MSFT_DeviceManagementConfigurationPolicyAssignments +### MSFT_IntuneAccountProtectionLocalAdministratorPasswordSolutionPolicyAssignments #### Parameters @@ -98,7 +98,7 @@ Configuration Example Ensure = "Present"; Credential = $credsGlobalAdmin Assignments = @( - MSFT_DeviceManagementConfigurationPolicyAssignments{ + MSFT_IntuneAccountProtectionLocalAdministratorPasswordSolutionPolicyAssignments{ deviceAndAppManagementAssignmentFilterType = 'none' dataType = '#microsoft.graph.allLicensedUsersAssignmentTarget' } diff --git a/docs/docs/resources/intune/IntuneAccountProtectionLocalUserGroupMembershipPolicy.md b/docs/docs/resources/intune/IntuneAccountProtectionLocalUserGroupMembershipPolicy.md index 773baaac2e..0c51678e2e 100644 --- a/docs/docs/resources/intune/IntuneAccountProtectionLocalUserGroupMembershipPolicy.md +++ b/docs/docs/resources/intune/IntuneAccountProtectionLocalUserGroupMembershipPolicy.md @@ -7,7 +7,7 @@ | **Identity** | Key | String | Identity of the account protection policy. | | | **DisplayName** | Required | String | Display name of the account protection rules policy. | | | **Description** | Write | String | Description of the account protection rules policy. | | -| **Assignments** | Write | MSFT_DeviceManagementConfigurationPolicyAssignments[] | Assignments of the Intune Policy. | | +| **Assignments** | Write | MSFT_IntuneAccountProtectionLocalUserGroupMembershipPolicyAssignments[] | Assignments of the Intune Policy. | | | **LocalUserGroupCollection** | Write | MSFT_IntuneAccountProtectionLocalUserGroupCollection[] | Local User Group Collections of the Intune Policy. | | | **Ensure** | Write | String | Present ensures the site collection exists, absent ensures it is removed | `Present`, `Absent` | | **Credential** | Write | PSCredential | Credentials of the Intune Admin | | @@ -17,7 +17,7 @@ | **CertificateThumbprint** | Write | String | Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication. | | | **ManagedIdentity** | Write | Boolean | Managed ID being used for authentication. | | -### MSFT_DeviceManagementConfigurationPolicyAssignments +### MSFT_IntuneAccountProtectionLocalUserGroupMembershipPolicyAssignments #### Parameters @@ -99,7 +99,7 @@ Configuration Example Ensure = "Present"; Credential = $credsGlobalAdmin Assignments = @( - MSFT_DeviceManagementConfigurationPolicyAssignments{ + MSFT_IntuneAccountProtectionLocalUserGroupMembershipPolicyAssignments{ deviceAndAppManagementAssignmentFilterType = 'none' dataType = '#microsoft.graph.allLicensedUsersAssignmentTarget' } diff --git a/docs/docs/resources/intune/IntuneAccountProtectionPolicy.md b/docs/docs/resources/intune/IntuneAccountProtectionPolicy.md index 61f7c7ae5c..60fca3ae0e 100644 --- a/docs/docs/resources/intune/IntuneAccountProtectionPolicy.md +++ b/docs/docs/resources/intune/IntuneAccountProtectionPolicy.md @@ -7,7 +7,7 @@ | **Identity** | Key | String | Identity of the account protection policy. | | | **DisplayName** | Required | String | Display name of the account protection rules policy. | | | **Description** | Write | String | Description of the account protection rules policy. | | -| **Assignments** | Write | MSFT_DeviceManagementConfigurationPolicyAssignments[] | Assignments of the Intune Policy. | | +| **Assignments** | Write | MSFT_IntuneAccountProtectionPolicyAssignments[] | Assignments of the Intune Policy. | | | **WindowsHelloForBusinessBlocked** | Write | String | Block Windows Hello for Business. | `notConfigured`, `true`, `false` | | **PinMinimumLength** | Write | UInt32 | Minimum PIN length must be between 4 and 127. (4-127) | | | **PinMaximumLength** | Write | UInt32 | Maximum PIN length must be between 4 and 127. (4-127) | | @@ -31,7 +31,7 @@ | **CertificateThumbprint** | Write | String | Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication. | | | **ManagedIdentity** | Write | Boolean | Managed ID being used for authentication. | | -### MSFT_DeviceManagementConfigurationPolicyAssignments +### MSFT_IntuneAccountProtectionPolicyAssignments #### Parameters