Connect Microsoft Intune

Elisity supports simple API connectivity to Microsoft Intune as a method to enrich IT device discovery and identity. This enables asset data from Microsoft Intune to be imported into IdentityGraph for all assets that appear on your Elisity-secured network. This enhances the precision and effectiveness of asset classification.

 

Prerequisites

  • Microsoft Intune Tenant ID
  • Microsoft Intune App ID

  • Microsoft Intune App Secret

Steps to Connect Microsoft Intune

Step 1. Access the Enterprise Application Registration page in Microsoft Entra.

Step 2. Click on the New Registration button. 

Step 3. Enter a name for the Application: Elisity CCC Intune API Access

Step 4. Select Accounts in this organization only

Step 5. Enter https://portal.azure.com as the Redirect URI. This is only used as a redirect for the application authorization for your Entra tenant. Click Register.

 

Step 6.After the application is created, navigate to the API Permissions link in the left panel and click on the Add Permission button.

Step 7. Click on the Add Permission button

Step 8. Click on the APIs My Organization Uses tab and select Microsoft Graph

Step 9. In the new panel, select Application Permissions then search for “DeviceManagementManagedDevices”

Step 10. Click the dropdown arrow beside “DeviceManagementManagedDevices” then click the checkbox beside “DeviceManagementManagedDevices.Read.All” as shown in the below image.

You may remove the default “User.Read” permission for this App Registration if desired, it is not required for Intune API Access.

 

Step 11. After clicking the Add Permissions button, ensure you select the Grant Admin Consent for {Organization} to complete the permissions grant process

Step 12. Navigate to the Certificates & secrets panel in the left side menu.

Step 13. Make sure the Client Secrets pane is selected then click on the + New client secret button

Step 14. Enter “Elisity CCC Intune Connector” as the description for the client secret and choose a suitable expiration interval based on your organizations policies for API credential rotation

Step 15. After the Client Credential is created be sure to copy the “Value” field as it will not be displayed after navigating from this page. A sample of a successfully created credential screen is shown below.

 

Step 16.Navigate to the Overview page in the left side menu

Step 17. Note the “Application (client) ID” and “Directory (tenant) ID” as these will be used with the Client Secret from above to authenticate Elisity CCC for API access.

Step 18.Lastly the Application must be authorized in Entra. Navigate to the following URL while logged in as an Entra Administrator where 00000000-0000-0000-0000-000000000000 is the Client ID from the overview page above.

https://login.microsoftonline.com/common/oauth2/authorize?prompt=consent&client_id=00000000-0000-0000-0000-000000000000&response_type=code&sso_reload=true

Step 19. Log into Elisity Cloud Control Center and navigate to Settings > Connectors and select + Add Connector button. 

Step 20. A list of tiles will slide out from the right side of the screen. Select configure on the Microsoft Intune connector. 

 

Step 21. Input the Tenant ID, the App ID and the App Secret and select Submit.

 

Step 22 (optional). Configure advanced settings for the Microsoft Intune connector.

 

The following chart provides details about each advanced setting

Global Timer The frequency at which Cloud Control Center queries Microsoft Intune for updates. From 1 to 168 hours. Default is 24 hours.
Initial Delay The delay in seconds before Cloud Control Center initiates the first query to Microsoft Intune after initially discovering a new device. Default is 0 seconds
Query Exclusion Rules Limit the scope of Cloud Control Center queries by specifying Subnets and Virtual Edge Nodes, and by enabling or disabling the querying of devices with Random MAC addresses.
Connector Data Purging When the Connector Data Purging feature is enabled, Cloud Control Center will purge all data learned about the device from this connector if the device is no longer found when querying the connected application. The time period between purge events is configurable and can be set between 1 and 90 days. The connector status will change from "Up to Date" to "Stale" if the device is no longer known by the connector but prior to the purge event. 

 

Step 23. If all of the required connector values are correct, all checks will pass and the connector will be created. 

After successfully configuring the Microsoft Intune connector, you should begin to see newly discovered assets enriched with data from Microsoft Intune in IdentityGraph. Any devices learned by Elisity prior to the connector being configured will be automatically scheduled for enrichment during the next 24 hour cycle and based on their attachment timestamp. Alternatively, you can force a refresh by selecting the refresh button on the Microsoft Intune tile under the Trust Attributes section of IdentityGraph.

 

Connector Status

The Connector status reflects its health and availability based on recent query performance. To ensure accuracy and reduce false positives, the status is determined using a rolling 15-minute evaluation window.

Connector Status Levels:

  • Active: Normal operation with minimal query failures.
  • Degraded: Increased query failures detected, but the connector is still operational.
  • Inactive: The connector is unresponsive due to persistent failures.

Failures are defined as unsuccessful query responses, and the platform continuously monitors performance to update the status accordingly. These status changes are visible in the UI, event logs, and notifications pane for better troubleshooting. Email alerts can also be configured for connector status changes.

If the connector has not been queried within the evaluation window, the last known status is retained. This approach ensures reliable status reporting and helps identify potential issues before they impact operations.

 

Leveraging Microsoft Intune with Elisity

When Elisity discovers a new asset on the network and the Microsoft Intune connector is active, Cloud Control Center queries the Microsoft Intune platform via API for additional device attributes in order to enrich IdentityGraph. This enriched data is displayed in the IdentityGraph tab of the device and can be leveraged in Policy Group definition. 

If a device discovered by Elisity is also known in Microsoft Intune, the Trust Attribute flag for "Known in Microsoft Intune" will be set to Yes. You can then leverage this trust attribute as match criteria in Policy Group definition. 

To learn more about how to leverage IdentityGraph Trust Attributes review the Leveraging Trust Attributes for Policy Group Definition article.

 

Was this article helpful?
0 out of 0 found this helpful