Skip to content

Commit ce03497

Browse files
authored
Merge pull request #4 from Get-Nerdio/readme
Add README files
2 parents a672d59 + cc7e72d commit ce03497

File tree

16 files changed

+181
-208
lines changed

16 files changed

+181
-208
lines changed

POLICIES.md

Lines changed: 0 additions & 207 deletions
This file was deleted.

macos/macos-baseline/README.md

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,10 @@
1+
# macos-baseline
2+
3+
| Name | Description |
4+
| ---- | ----------- |
5+
| Prod-macOS-CompliancePolicy | Compliance policy for all macOS devices. Apply by default to All Users. Note - changing the device password requirements will force a password change on all existing devices that have received this policy |
6+
| Prod-macOS-EntraIDSingleSignOn-Device | Enable Entra ID single sign-on |
7+
| Prod-macOS-MicrosoftEdge-Custom-Device | Microsoft Edge preferences file for default settings and settings not available in the Settings Catalog. |
8+
| Prod-macOS-MicrosoftEdge-Device | Baseline Microsoft Edge settings - enforce SmartScreen, sync, basic browser settings. Apply to All Devices (optionally with filters) or Entra ID device groups. |
9+
| Prod-macOS-MicrosoftEdge-Extensions-Device | Configures extension settings in Microsoft Edge - prevents users from adding extensions, and configures a list of force installed extensions. Adds: Microsoft Editor, uBlock Origin, My Apps Secure Sign-in Extension. Also enables the Edge sidebar & Copilot default extensions. Apply to All Devices (optionally with filters) or Entra ID device groups. |
10+

macos/macos-extras/README.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
# macos-extras
2+
3+
| |
4+
||
5+
Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,8 @@
1+
# attacksurfacereduction
2+
3+
| Name | Description |
4+
| ---- | ----------- |
5+
| 0_Prod-Windows-ASR-AllAudit-Device | All Attack Surface Reduction rules in Audit mode. https://learn.microsoft.com/en-us/defender-endpoint/attack-surface-reduction-rules-reference. Apply to All Devices (optionally with filters) or Entra ID device groups. |
6+
| 1_Prod-Windows-ASR-StandardBlock-Device | Standard Protection Attack Surface Reduction rules in Block mode, with all other ASR rules in Audit mode. https://learn.microsoft.com/en-us/defender-endpoint/attack-surface-reduction-rules-reference. Apply to All Devices (optionally with filters) or Entra ID device groups. |
7+
| 2_Prod-Windows-ASR-AllBlock-Device | Puts all rules into block mode - this includes 'Block execution of potentially obfuscated scripts' which affects AVD session hosts. https://learn.microsoft.com/en-us/defender-endpoint/attack-surface-reduction-rules-reference. Apply to All Devices (optionally with filters) or Entra ID device groups. |
8+

windows/avd-w365/README.md

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,10 @@
1+
# avd-w365
2+
3+
| Name | Description |
4+
| ---- | ----------- |
5+
| Windows-Avd-AllSessionHosts | Filter for all Azure Virtual Desktop session hosts - single session and multi-session |
6+
| Windows-Avd-MultiSession | Filter for Virtual machines running Windows 10/11 multi-session on Azure Virtual Desktop |
7+
| Windows-Avd-SingleSession | Filter for Azure Virtual Desktop single session machines |
8+
| Windows-Windows365 | Filter for Windows 365 Cloud PCs |
9+
| Prod-Windows-AzureVirtualDesktop-RemoteDesktop-Baseline-Device | Remote Desktop settings to apply to Azure Virtual Desktop and Windows 365 devices. Apply to All Devices (optionally with filters) or Entra ID device groups. |
10+

windows/google-chrome/README.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,7 @@
1+
# google-chrome
2+
3+
| Name | Description |
4+
| ---- | ----------- |
5+
| Prod-Windows-GoogleChrome-Baseline-Device | Baseline application policy settings for Google Chrome. This policy will lockdown Chrome, including preventing signing into the browser with a Google account. Apply to All Devices (optionally with filters) or Entra ID device groups. |
6+
| Prod-Windows-GoogleChrome-Extensions-Baseline-Device | Configures extension settings in Google Chrome - prevents users from adding extensions, and configures a list of force installed extensions. Apply to All Devices (optionally with filters) or Entra ID device groups. |
7+
Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,8 @@
1+
# microsoft-365apps
2+
3+
| Name | Description |
4+
| ---- | ----------- |
5+
| Prod-Windows-Microsoft365Apps-Baseline-Device | Configure Microsoft 365 Apps settings - validate channel. Assumes a single Microsoft 365 Apps package has been deployed, including Project and Visio - viewer mode is enabled so that users without a license can use these applications in viewer mode. Apply to All Devices (optionally with filters) or Entra ID device groups. |
6+
| Prod-Windows-Microsoft365Apps-Baseline-User | Configure user targeted policy settings for the Microsoft 365 Apps. Apply to All Users (optionally with filters) or Entra ID user groups. |
7+
| Prod-Windows-MicrosoftOneDrive-Baseline-Device | Configure OneDrive for Business including SSO and Known Folder Move. Important - Update tenant GUID from the Entra ID. Apply to All Devices (optionally with filters) or Entra ID device groups. |
8+
Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,8 @@
1+
# microsoft-defender
2+
3+
| Name | Description |
4+
| ---- | ----------- |
5+
| Prod-Windows-MicrosoftDefenderAntivirus-Baseline-Device | Microsoft Defender antivirus and antimalware settings. Note 'Local Admin Merge' is enabled. Apply to All Devices (optionally with filters) or Entra ID device groups. |
6+
| Prod-Windows-MicrosoftDefenderExclusions-Baseline-Device | Folder path exclusions to support Intune clients. Exclusions may need to be updated in MDE as well. Apply to All Devices (optionally with filters) or Entra ID device groups. |
7+
| Prod-Windows-MicrosoftDefenderUpdateControls-Device | Configures Microsoft Defender update channels. Apply to All Devices (optionally with filters) or Entra ID device groups. |
8+

windows/microsoft-edge/README.md

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,9 @@
1+
# microsoft-edge
2+
3+
| Name | Description |
4+
| ---- | ----------- |
5+
| Prod-Windows-MicrosoftEdge-Baseline-Device | Baseline Microsoft Edge settings - enforce SmartScreen, sync, basic browser settings. Apply to All Devices (optionally with filters) or Entra ID device groups. |
6+
| Prod-Windows-MicrosoftEdge-Extensions-AVDW365-Baseline-Device | Configures extension settings in Microsoft Edge - prevents users from adding extensions, and configures a list of force installed extensions. Adds: Microsoft Editor, uBlock Origin, My Apps Secure Sign-in Extension, Multimedia Redirection. Also enables the Edge sidebar & Copilot default extensions. Apply to All Devices (optionally with filters) or Entra ID device groups. |
7+
| Prod-Windows-MicrosoftEdge-Extensions-Physical-Baseline-Device | Configures extension settings in Microsoft Edge - prevents users from adding extensions, and configures a list of force installed extensions. Adds: Microsoft Editor, uBlock Origin, My Apps Secure Sign-in Extension. Also enables the Edge sidebar & Copilot default extensions. Apply to All Devices (optionally with filters) or Entra ID device groups. |
8+
| Prod-Windows-MicrosoftEdge-ProgressiveWebApps-User | Configure list of force-installed Microsoft 365 Progessive Web Apps that have no Store or Win32 application equivalent. Apply to All Users (optionally with filters) or Entra ID user groups. |
9+

windows/windows-CIS/README.md

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
# windows-CIS
2+
3+
| Name | Description |
4+
| ---- | ----------- |
5+
| GoLive - CIS (L1) Admin Templates - System - Windows 11 Intune 3.0.0 | Cloned policy from CIS (L1) Admin Templates - System - Windows 11 Intune 3.0.0 |
6+
| GoLive - CIS (L1) Admin Templates - Windows Components - Windows 11 Intune 3.0.0 | Cloned policy from CIS (L1) Admin Templates - Windows Components - Windows 11 Intune 3.0.0 |
7+
| GoLive - CIS (L1) Auditing - Windows 11 Intune 3.0.0 | Cloned policy from CIS (L1) Auditing - Windows 11 Intune 3.0.0 |
8+
| GoLive - CIS (L1) Defender - Windows 11 Intune 3.0.0 | Cloned policy from CIS (L1) Defender - Windows 11 Intune 3.0.0 |
9+
| GoLive - CIS (L1) Device Lock & WHFB - Windows 11 Intune 3.0.0 | Cloned policy from CIS (L1) Device Lock & WHFB - Windows 11 Intune 3.0.0 |
10+
| GoLive - CIS (L1) Firewall - Windows 11 Intune 3.0.0" | Cloned policy from CIS (L1) Firewall - Windows 11 Intune 3.0.0 |
11+
| GoLive - CIS (L1) Section 1 - 3.9.1.1 - Windows 11 Intune 3.0.0 | Cloned policy from CIS (L1) Section 1 - 3.9.1.1 - Windows 11 Intune 3.0.0 |
12+
| GoLive - CIS (L1) Section 22 - 80 - Windows 11 Intune 3.0.0 | Cloned policy from CIS (L1) Section 22 - 80 - Windows 11 Intune 3.0.0 |
13+
| GoLive - CIS (L1) System Services - Windows 11 Intune 3.0.0 | Cloned policy from CIS (L1) System Services - Windows 11 Intune 3.0.0 |
14+
| GoLive - CIS (L1) User Rights - Windows 11 Intune 3.0.0 | Cloned policy from CIS (L1) User Rights - Windows 11 Intune 3.0.0 |
15+

0 commit comments

Comments
 (0)