Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Release 1.25.226.1 #5846

Merged
merged 62 commits into from
Feb 26, 2025
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
62 commits
Select commit Hold shift + click to select a range
59ebca1
Add new properties
JuliusRauschen Feb 10, 2025
dcae1d7
Merge branch 'Dev' into spo-tenant-settings-new-parameter
NikCharlebois Feb 12, 2025
6fdf264
Remove properties already present in SPOSharingSettings
JuliusRauschen Feb 13, 2025
e3e2353
Fix #5742: Ensure TermsOfUse is an array in AADConditionalAccessPolicy
Pranaykarvi Feb 14, 2025
d26f0f8
Merge branch 'Dev' into spo-tenant-settings-new-parameter
JuliusRauschen Feb 14, 2025
b20e3e8
Update MSFT_AADPasswordRuleSettings.schema.mof
salbeck-sit Feb 17, 2025
ac11ad0
Merge branch 'microsoft:Dev' into AADPasswordRuleSettings
salbeck-sit Feb 17, 2025
c7c1b30
Update CHANGELOG.md
salbeck-sit Feb 17, 2025
331519e
Update MSFT_AADConditionalAccessPolicy.psm1
Pranaykarvi Feb 17, 2025
51e81e6
Merge branch 'microsoft:Dev' into fix-terms-of-use-array
Pranaykarvi Feb 17, 2025
6fbba5b
Update CHANGELOG.md
Pranaykarvi Feb 17, 2025
275334b
Update CHANGELOG.md
Pranaykarvi Feb 17, 2025
0cfb696
Update CHANGELOG.md
Pranaykarvi Feb 17, 2025
f0c30f6
Update CHANGELOG.md
Pranaykarvi Feb 17, 2025
962ee65
Update CHANGELOG.md
Pranaykarvi Feb 17, 2025
3c4c4d5
Update SPOSiteScript.psm1 and Microsoft365DSC.SPOSiteScript.Tests.ps1
salbeck-sit Feb 21, 2025
87b4505
updated unit-tests
salbeck-sit Feb 21, 2025
7f6fa1e
updated changelog
salbeck-sit Feb 21, 2025
b8a87b8
updated Set-TargetResource and unit-tests
salbeck-sit Feb 21, 2025
d59e6bf
updated unit-tests of removal/absent
salbeck-sit Feb 21, 2025
d7e5d0c
Added Remove-PnpSIteScript to Microsoft365 stubs
salbeck-sit Feb 21, 2025
f7d125c
Fix handling of DeviceCompliancePolicyScript property
Feb 21, 2025
324907d
Update CHANGELOG.md
salbeck-sit Feb 24, 2025
b629fc3
Merge branch 'Dev' into fix/device-compliance-policy
NikCharlebois Feb 24, 2025
2fcf01d
Merge branch 'Dev' into SPOSiteScript
NikCharlebois Feb 24, 2025
ffd6d23
Update CHANGELOG.md
Pranaykarvi Feb 25, 2025
0483c6f
Update CHANGELOG.md
Pranaykarvi Feb 25, 2025
5b4fdbf
Merge branch 'Dev' into fix/device-compliance-policy
FabienTschanz Feb 25, 2025
b1a84a4
Merge branch 'Dev' into SPOSiteScript
NikCharlebois Feb 26, 2025
459ab27
Merge branch 'Dev' into fix/device-compliance-policy
FabienTschanz Feb 26, 2025
f0e8c48
Merge branch 'Dev' into spo-tenant-settings-new-parameter
JuliusRauschen Feb 26, 2025
b83a4fe
Apply ordering during export for Get-Team cmdlet
Feb 26, 2025
4fc2ffa
Correct schema
ykuijs Feb 26, 2025
2c253fc
Correct schema
ykuijs Feb 26, 2025
b82f730
Merge branch 'Dev' of https://github.com/ykuijs/Microsoft365DSC into Dev
ykuijs Feb 26, 2025
13720d3
Corrected changelog
ykuijs Feb 26, 2025
3edd21d
Merge pull request #5842 from FabienTschanz/feat/teams-ordering
ykuijs Feb 26, 2025
d4a1678
Merge branch 'Dev' into Dev
ykuijs Feb 26, 2025
0d0a9a9
Merge branch 'Dev' into fix/device-compliance-policy
FabienTschanz Feb 26, 2025
b2e93a6
Merge branch 'Dev' into SPOSiteScript
NikCharlebois Feb 26, 2025
bfb6c5a
Merge pull request #5843 from ykuijs/Dev
ykuijs Feb 26, 2025
aa1714f
Updated Resources and Cmdlet documentation pages
NikCharlebois Feb 26, 2025
da304e5
Merge branch 'Dev' into SPOSiteScript
NikCharlebois Feb 26, 2025
5673e39
Merge branch 'Dev' into fix/device-compliance-policy
FabienTschanz Feb 26, 2025
0340906
Merge pull request #5822 from salbeck-sit/SPOSiteScript
NikCharlebois Feb 26, 2025
01eddc9
Merge pull request #5828 from FabienTschanz/fix/device-compliance-policy
NikCharlebois Feb 26, 2025
427b4ec
Updated Resources and Cmdlet documentation pages
NikCharlebois Feb 26, 2025
fe4112c
Merge branch 'Dev' into AADPasswordRuleSettings
NikCharlebois Feb 26, 2025
4f0f351
Updated Schema Definition
NikCharlebois Feb 26, 2025
b4fd3fa
Merge pull request #5786 from salbeck-sit/AADPasswordRuleSettings
NikCharlebois Feb 26, 2025
01a4b32
Updated Resources and Cmdlet documentation pages
NikCharlebois Feb 26, 2025
86c4fdb
Merge branch 'Dev' into fix-terms-of-use-array
NikCharlebois Feb 26, 2025
a5e1787
Merge pull request #5772 from Pranaykarvi/fix-terms-of-use-array
NikCharlebois Feb 26, 2025
616904b
Merge branch 'Dev' into spo-tenant-settings-new-parameter
NikCharlebois Feb 26, 2025
711f0dc
Merge pull request #5749 from JuliusRauschen/spo-tenant-settings-new-…
NikCharlebois Feb 26, 2025
8d014a3
Updated Resources and Cmdlet documentation pages
NikCharlebois Feb 26, 2025
ba50750
Updated Schema Definition
NikCharlebois Feb 26, 2025
b0352a4
Release 1.25.226.1
NikCharlebois Feb 26, 2025
369c4a4
Release 1.25.226.1
NikCharlebois Feb 26, 2025
302826b
Updated MSCloudLoginAssistant
NikCharlebois Feb 26, 2025
5d2f321
Merge pull request #5845 from NikCharlebois/Release-1.25.226.1
NikCharlebois Feb 26, 2025
2be9cc2
Updated Resources and Cmdlet documentation pages
NikCharlebois Feb 26, 2025
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
32 changes: 32 additions & 0 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,37 @@
# Change log for Microsoft365DSC

# 1.25.226.1

* AADConditionalAccessPolicy
* Fixed an issue where `TermsOfUse` was not passed as an array, causing failures in GCC-High environments.
FIXES [#5742](https://github.com/microsoft/Microsoft365DSC/issues/5742)
* Added verbose to the Get-TargetResource function to print out the retrieved
policies from calling the cmdlet.
* AADPasswordRuleSettings
* Updated schema to only accept values 'Enforced' and 'Audit' for parameter BannedPasswordCheckOnPremisesMode
* IntuneDeviceCompliancePolicyWindows10
* Fixes the handling of the `DeviceCompliancePolicyScript` property.
FIXES [#5510](https://github.com/microsoft/Microsoft365DSC/issues/5510)
* O365OrgSettings
* Added support for the AllowPlannerCopilot setting.
* PPTenantSettings
* Corrected issue in the resource schema. The description was a multi-line
string, which is not allowed.
* SPOSiteScript
* Fix error in Get-TargetResource when a site-script is identified by title only
FIXES [#5821](https://github.com/microsoft/Microsoft365DSC/issues/5821)
* SPOTenantSettings
* Add EnableAzureADB2BIntegration and OneDriveSharingCapability properties
* TeamsChannel
* Apply ordering during export.
FIXES [#5829](https://github.com/microsoft/Microsoft365DSC/issues/5829)
* TeamsTeam
* Apply ordering during export.
* TeamsUser
* Apply ordering during export.
* DEPENDENCIES
* Updated MSCloudLoginAssistant to version 1.1.39.

# 1.25.219.3

* AADApplication
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -287,11 +287,16 @@ function Get-TargetResource
try
{
$Policy = Get-MgBetaIdentityConditionalAccessPolicy -ConditionalAccessPolicyId $Id -ErrorAction Stop
$jsonPolicy = ConvertTo-Json $Policy -ErrorAction SilentlyContinue
Write-Verbose -Message "Retrieved policy:`r`n$($jsonPolicy)"
}
catch
{
Write-Verbose -Message "Couldn't find existing policy by ID {$Id}"
$Policy = Get-MgBetaIdentityConditionalAccessPolicy -Filter "DisplayName eq '$DisplayName'"
$jsonPolicy = ConvertTo-Json $Policy -ErrorAction SilentlyContinue
Write-Verbose -Message "Retrieved policy:`r`n$($jsonPolicy)"

if ($Policy.Length -gt 1)
{
throw "Duplicate CA Policies named $DisplayName exist in tenant"
Expand All @@ -303,6 +308,9 @@ function Get-TargetResource
Write-Verbose -Message 'Id was NOT specified'
## Can retreive multiple CA Policies since displayname is not unique
$Policy = Get-MgBetaIdentityConditionalAccessPolicy -Filter "DisplayName eq '$DisplayName'"
$jsonPolicy = ConvertTo-Json $Policy -ErrorAction SilentlyContinue
Write-Verbose -Message "Retrieved policy:`r`n$($jsonPolicy)"

if ($Policy.Length -gt 1)
{
throw "Duplicate CA Policies named $DisplayName exist in tenant"
Expand Down Expand Up @@ -1778,12 +1786,13 @@ function Set-TargetResource
}
}

if ($TermsOfUse)
{
Write-Verbose -Message "Gettign Terms of Use {$TermsOfUse}"
$TermsOfUseObj = Get-MgBetaAgreement | Where-Object -FilterScript { $_.DisplayName -eq $TermsOfUse }
$GrantControls.Add('termsOfUse', $TermsOfUseObj.Id)
}
if ($TermsOfUse)
{
Write-Verbose -Message "Getting Terms of Use {$TermsOfUse}"
$TermsOfUseObj = Get-MgBetaAgreement | Where-Object -FilterScript { $_.DisplayName -eq $TermsOfUse }
$GrantControls.Add('termsOfUse', @($TermsOfUseObj.Id))
}


#no translation or conversion needed
Write-Verbose -Message 'Set-Targetresource: Adding processed grant controls'
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@ class MSFT_AADPasswordRuleSettings : OMI_BaseResource
[Write, Description("The duration in seconds of the initial lockout period.")] UInt32 LockoutDurationInSeconds;
[Write, Description("Boolean indicating if the banned password check for tenant specific banned password list is turned on or not.")] Boolean EnableBannedPasswordCheck;
[Write, Description("A list of banned words in passwords.")] String BannedPasswordList[];
[Write, Description("How should we enforce password policy check in on-premises system.")] String BannedPasswordCheckOnPremisesMode;
[Write, Description("How should we enforce password policy check in on-premises system."), ValueMap{"Enforced","Audit"}, Values{"Enforced","Audit"}] String BannedPasswordCheckOnPremisesMode;
[Write, Description("Boolean indicating if the banned password check is turned on or not for on-premises system.")] Boolean EnableBannedPasswordCheckOnPremises;
[Write, Description("Specify if the Azure AD Password Rule Settings should exist or not."), ValueMap{"Present","Absent"}, Values{"Present","Absent"}] String Ensure;
[Write, Description("Credentials for the Microsoft Graph delegated permissions."), EmbeddedInstance("MSFT_Credential")] string Credential;
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -135,7 +135,7 @@ function Get-TargetResource
$TpmRequired,

[Parameter()]
[System.String]
[Microsoft.Management.Infrastructure.CimInstance]
$DeviceCompliancePolicyScript,

[Parameter()]
Expand Down Expand Up @@ -206,10 +206,9 @@ function Get-TargetResource

$devicePolicy = Get-MgBetaDeviceManagementDeviceCompliancePolicy `
-All `
-ErrorAction SilentlyContinue | Where-Object `
-FilterScript { $_.AdditionalProperties.'@odata.type' -eq '#microsoft.graph.windows10CompliancePolicy' -and `
$_.displayName -eq $($DisplayName) }
if (([array]$devicePolicy).count -gt 1)
-Filter "displayName eq '$DisplayName' and isof('microsoft.graph.windows10CompliancePolicy')" `
-ErrorAction SilentlyContinue
if (([array]$devicePolicy).Count -gt 1)
{
throw "A policy with a duplicated displayName {'$DisplayName'} was found - Ensure displayName is unique"
}
Expand Down Expand Up @@ -246,6 +245,19 @@ function Get-TargetResource
}
}

$complexDeviceCompliancePolicyScript = @{}
if ($null -ne $devicePolicy.AdditionalProperties.deviceCompliancePolicyScript)
{
Write-Verbose -Message "Resolving Device Compliance Policy Script with Id {$($devicePolicy.AdditionalProperties.deviceCompliancePolicyScript.deviceComplianceScriptId)}"
$policyScript = Invoke-MgGraphRequest -Uri "/beta/deviceManagement/deviceComplianceScripts/$($devicePolicy.AdditionalProperties.deviceCompliancePolicyScript.deviceComplianceScriptId)" -Method GET
$complexDeviceCompliancePolicyScript.Add('DisplayName', $policyScript.displayName)
$complexDeviceCompliancePolicyScript.Add('RulesContent', [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($devicePolicy.AdditionalProperties.deviceCompliancePolicyScript.rulesContent)))
}
if ($complexDeviceCompliancePolicyScript.Keys.Count -eq 0)
{
$complexDeviceCompliancePolicyScript = $null
}

Write-Verbose -Message "Found Windows 10 Device Compliance Policy with displayName {$DisplayName}"
$results = @{
DisplayName = $devicePolicy.DisplayName
Expand Down Expand Up @@ -280,7 +292,7 @@ function Get-TargetResource
DeviceThreatProtectionRequiredSecurityLevel = $devicePolicy.AdditionalProperties.deviceThreatProtectionRequiredSecurityLevel
ConfigurationManagerComplianceRequired = $devicePolicy.AdditionalProperties.configurationManagerComplianceRequired
TpmRequired = $devicePolicy.AdditionalProperties.tpmRequired
DeviceCompliancePolicyScript = $devicePolicy.AdditionalProperties.deviceCompliancePolicyScript
DeviceCompliancePolicyScript = $complexDeviceCompliancePolicyScript
ValidOperatingSystemBuildRanges = $complexValidOperatingSystemBuildRanges
Ensure = 'Present'
Credential = $Credential
Expand Down Expand Up @@ -453,7 +465,7 @@ function Set-TargetResource
$TpmRequired,

[Parameter()]
[System.String]
[Microsoft.Management.Infrastructure.CimInstance]
$DeviceCompliancePolicyScript,

[Parameter()]
Expand Down Expand Up @@ -515,13 +527,7 @@ function Set-TargetResource
#endregion

$currentDeviceWindows10Policy = Get-TargetResource @PSBoundParameters

$PSBoundParameters.Remove('Ensure') | Out-Null
$PSBoundParameters.Remove('Credential') | Out-Null
$PSBoundParameters.Remove('ApplicationId') | Out-Null
$PSBoundParameters.Remove('TenantId') | Out-Null
$PSBoundParameters.Remove('ApplicationSecret') | Out-Null
$PSBoundParameters.Remove('AccessTokens') | Out-Null
$BoundParameters = Remove-M365DSCAuthenticationParameter -BoundParameters $PSBoundParameters

$scheduledActionsForRule = @{
'@odata.type' = '#microsoft.graph.deviceComplianceScheduledActionForRule'
Expand All @@ -534,14 +540,34 @@ function Set-TargetResource
)
}

if ($null -ne $BoundParameters.DeviceCompliancePolicyScript)
{
$script = $BoundParameters.DeviceCompliancePolicyScript
$scriptName = $script.Displayname
$scriptRulesContent = $script.RulesContent

$complianceScript = (Invoke-MgGraphRequest -Uri "/beta/deviceManagement/deviceComplianceScripts?`$filter=displayName eq '$scriptName'" -Method GET).value
if ($complianceScript.Count -eq 0)
{
throw "The referenced Intune Device Compliance Script with DisplayName {$scriptName} was not found"
}

$script = @{
deviceComplianceScriptId = $complianceScript.id
rulesContent = [System.Convert]::ToBase64String([System.Text.Encoding]::UTF8.GetBytes($scriptRulesContent))
}
$BoundParameters.Remove('DeviceCompliancePolicyScript') | Out-Null
$BoundParameters.Add('DeviceCompliancePolicyScript', $script)
}

if ($Ensure -eq 'Present' -and $currentDeviceWindows10Policy.Ensure -eq 'Absent')
{
Write-Verbose -Message "Creating new Intune Device Compliance Windows 10 Policy {$DisplayName}"
$PSBoundParameters.Remove('DisplayName') | Out-Null
$PSBoundParameters.Remove('Description') | Out-Null
$PSBoundParameters.Remove('Assignments') | Out-Null
$BoundParameters.Remove('DisplayName') | Out-Null
$BoundParameters.Remove('Description') | Out-Null
$BoundParameters.Remove('Assignments') | Out-Null

$AdditionalProperties = Get-M365DSCIntuneDeviceCompliancePolicyWindows10AdditionalProperties -Properties ([System.Collections.Hashtable]$PSBoundParameters)
$AdditionalProperties = Get-M365DSCIntuneDeviceCompliancePolicyWindows10AdditionalProperties -Properties ([System.Collections.Hashtable]$BoundParameters)
$policy = New-MgBetaDeviceManagementDeviceCompliancePolicy -DisplayName $DisplayName `
-Description $Description `
-AdditionalProperties $AdditionalProperties `
Expand All @@ -563,11 +589,11 @@ function Set-TargetResource
-FilterScript { $_.AdditionalProperties.'@odata.type' -eq '#microsoft.graph.windows10CompliancePolicy' -and `
$_.displayName -eq $($DisplayName) }

$PSBoundParameters.Remove('DisplayName') | Out-Null
$PSBoundParameters.Remove('Description') | Out-Null
$PSBoundParameters.Remove('Assignments') | Out-Null
$BoundParameters.Remove('DisplayName') | Out-Null
$BoundParameters.Remove('Description') | Out-Null
$BoundParameters.Remove('Assignments') | Out-Null

$AdditionalProperties = Get-M365DSCIntuneDeviceCompliancePolicyWindows10AdditionalProperties -Properties ([System.Collections.Hashtable]$PSBoundParameters)
$AdditionalProperties = Get-M365DSCIntuneDeviceCompliancePolicyWindows10AdditionalProperties -Properties ([System.Collections.Hashtable]$BoundParameters)
Update-MgBetaDeviceManagementDeviceCompliancePolicy -AdditionalProperties $AdditionalProperties `
-Description $Description `
-DeviceCompliancePolicyId $configDevicePolicy.Id
Expand Down Expand Up @@ -729,7 +755,7 @@ function Test-TargetResource
$TpmRequired,

[Parameter()]
[System.String]
[Microsoft.Management.Infrastructure.CimInstance]
$DeviceCompliancePolicyScript,

[Parameter()]
Expand Down Expand Up @@ -795,7 +821,7 @@ function Test-TargetResource
throw "An error occured in Get-TargetResource, the policy {$displayName} will not be processed. Refer to the event viewer logs for more information."
}

$ValuesToCheck = ([Hashtable]$PSBoundParameters).clone()
$ValuesToCheck = ([Hashtable]$PSBoundParameters).Clone()
$testResult = $true

#Compare Cim instances
Expand Down Expand Up @@ -952,6 +978,20 @@ function Export-TargetResource
$Results.Remove('ValidOperatingSystemBuildRanges') | Out-Null
}
}
if ($null -ne $Results.DeviceCompliancePolicyScript)
{
$complexTypeStringResult = Get-M365DSCDRGComplexTypeToString `
-ComplexObject $Results.DeviceCompliancePolicyScript `
-CIMInstanceName 'MicrosoftGraphDeviceCompliancePolicyScript'
if (-not [string]::IsNullOrWhiteSpace($complexTypeStringResult))
{
$Results.DeviceCompliancePolicyScript = $complexTypeStringResult
}
else
{
$Results.Remove('DeviceCompliancePolicyScript') | Out-Null
}
}
if ($null -ne $Results.Assignments)
{
$complexMapping = @(
Expand Down Expand Up @@ -980,7 +1020,7 @@ function Export-TargetResource
-ModulePath $PSScriptRoot `
-Results $Results `
-Credential $Credential `
-NoEscape @('ValidOperatingSystemBuildRanges', 'Assignments')
-NoEscape @('ValidOperatingSystemBuildRanges', 'DeviceCompliancePolicyScript', 'Assignments')

$dscContent += $currentDSCBlock

Expand Down Expand Up @@ -1041,82 +1081,4 @@ function Get-M365DSCIntuneDeviceCompliancePolicyWindows10AdditionalProperties
return $results
}

function Get-M365DSCAssignmentsAsString
{
[CmdletBinding()]
[OutputType([System.String])]
param(
[Parameter()]
[System.Object[]]
$Params
)

if ($null -eq $params)
{
return $null
}
$currentProperty = "@(`r`n"
$space = ' '
$nbParam = 0
$hasValue = $false
foreach ($rule in $params)
{

$currentProperty += "$($space)MSFT_DeviceManagementConfigurationPolicyAssignments{`r`n"
foreach ($key in $rule.Keys)
{
$value = $rule[$key]
if (-not [System.String]::IsNullOrEmpty($value))
{
$currentProperty += ' ' + $key + " = '" + $value + "'`r`n"
$hasValue = $true
}

}
$currentProperty += ' }'
if ($nbParam -lt ($params.Count - 1) )
{
$nbParam++
$currentProperty += "`r`n"
}

}
$currentProperty += ')'
if (-not $hasValue)
{
return '@()'
}
return $currentProperty
}

function Get-M365DSCAssignmentsAsHashtable
{
[CmdletBinding()]
param(
[Parameter()]
[Microsoft.Management.Infrastructure.CimInstance]
$CIMAssignment
)

if ($null -eq $CIMAssignment)
{
return $null
}
$CIMAssignmentAsHash = @{}
$keys = $CIMAssignment | Get-Member -MemberType Properties

foreach ($key in $keys)
{
if ($CIMAssignment.$($key.Name))
{
$CIMAssignmentAsHash.Add($key.Name, $CIMAssignment.$($key.Name))
}
}
if ($CIMAssignmentAsHash.Count -eq 0)
{
return $null
}
return $CIMAssignmentAsHash
}

Export-ModuleMember -Function *-TargetResource
Original file line number Diff line number Diff line change
Expand Up @@ -17,6 +17,13 @@ class MSFT_MicrosoftGraphOperatingSystemVersionRange
[Write, Description("The highest inclusive version that this range contains.")] String HighestVersion;
};

[ClassVersion("1.0.0.0")]
class MSFT_MicrosoftGraphDeviceCompliancePolicyScript
{
[Key, Description("Device compliance script name.")] String DisplayName;
[Write, Description("Rules content of the custom settings.")] String RulesContent;
};

[ClassVersion("1.0.0.0"), FriendlyName("IntuneDeviceCompliancePolicyWindows10")]
class MSFT_IntuneDeviceCompliancePolicyWindows10 : OMI_BaseResource
{
Expand Down Expand Up @@ -53,7 +60,7 @@ class MSFT_IntuneDeviceCompliancePolicyWindows10 : OMI_BaseResource
[Write, Description("DeviceThreatProtectionRequiredSecurityLevel of the Windows 10 device compliance policy."), ValueMap{"Unavailable","Secured","Low", "Medium","High","NotSet"}, Values{"Unavailable","Secured","Low", "Medium","High","NotSet"}] String DeviceThreatProtectionRequiredSecurityLevel;
[Write, Description("ConfigurationManagerComplianceRequired of the Windows 10 device compliance policy.")] Boolean ConfigurationManagerComplianceRequired;
[Write, Description("TpmRequired of the Windows 10 device compliance policy.")] Boolean TpmRequired;
[Write, Description("DeviceCompliancePolicyScript of the Windows 10 device compliance policy.")] String DeviceCompliancePolicyScript;
[Write, Description("DeviceCompliancePolicyScript of the Windows 10 device compliance policy."), EmbeddedInstance("MSFT_MicrosoftGraphDeviceCompliancePolicyScript")] String DeviceCompliancePolicyScript;
[Write, Description("ValidOperatingSystemBuildRanges of the Windows 10 device compliance policy."), EmbeddedInstance("MSFT_MicrosoftGraphOperatingSystemVersionRange")] String ValidOperatingSystemBuildRanges[];
[Write, Description("Present ensures the policy exists, absent ensures it is removed."), ValueMap{"Present","Absent"}, Values{"Present","Absent"}] string Ensure;
[Write, Description("Credentials of the Intune Admin"), EmbeddedInstance("MSFT_Credential")] string Credential;
Expand Down
Loading