Intune Monitoring
Free, customizable Azure Workbook dashboard templates for monitoring Microsoft Intune environments. Provides real-time visibility into device compliance, enrollment status, application deployments, security posture, and OS updates. Deploys in under 60 seconds with no app registration or custom permissions required. Data remains within your tenant with full customization support for queries, branding, and visualizations.
Security Analysis
No scannable code files found. This repository may contain only binaries, documentation, or unsupported file types.
Swipe to see more
You might also like
Intune Change Tracking
An Azure Workbook for analyzing and tracking changes within Microsoft Intune environments. Provides rich audit log analysis with filters, profile type search with value change tracking, device identity and Autopilot hash tracking, and device operations audit logs.
Fleetly
An iOS application for managing and monitoring Microsoft Intune-enrolled devices on the go. Features Azure AD authentication, real-time device inventory across all platforms, remote actions (sync, restart, lock, wipe), compliance monitoring, and multi-tenant support with biometric authentication.
Intune Changelog
A web-based tool for visualizing and tracking Microsoft Intune configuration changes. Displays audit logs in a beautiful, interactive timeline interface for easy monitoring of system modifications. Features a privacy-first approach with all data processing happening client-side in your browser without server transmission.
IntuneComplianceMaintainer
IntuneComplianceMaintainer is a PowerShell automation script that keeps Microsoft Intune compliance and app-protection policies up to date with the latest supported OS minimums across iOS, iPadOS, macOS, Android, and Windows. It uses endoflife.date and the Graph Windows Update Catalog to drive cadence-based updates, with flexible authentication (Managed Identity, App Registration with certificate or secret, plus Key Vault integration) and safety features like dry-run and downgrade protection. It provides comprehensive logging and built-in retry logic for resilience.

