From Data to Presentation in Minutes with Researcher
May 6, 2025What’s in store for software companies at Microsoft Build 2025
May 6, 2025Introduction
In today’s digital landscape, ensuring the security and compliance of IT infrastructure is paramount. The Defense Information Systems Agency (DISA) provides Security Technical Implementation Guides (STIGs) to optimize security for various software and systems. Utilizing Microsoft Intune, administrators can create configuration profiles that adhere to these STIGs, thereby enhancing their organization’s security posture. This blog will walk you through the process of creating Intune Configuration Profiles for DISA STIGs, complete with screenshots and detailed steps.
Prerequisites
Before diving into the configuration process, ensure you have the following:
- Access to the Intune admin center.
- Appropriate administrative privileges to create and manage configuration profiles.
- Familiarity with DISA STIGs and their requirements.
Step-by-Step Guide
Step 1: Access Intune
- Acquire DISA STIG Files: The first step in this process is to acquire the DISA STIG files from their official website (Group Policy Objects – DoD Cyber Exchange). These files contain the specific security guidelines and requirements you need to implement. Visit the DISA website, locate the relevant STIG files for your systems, and download them to your local machine.
- Prep files: Unzip the file you just downloaded then inside you should find another zipped file named like “Intune STIG Policy Baselines.” Unzip this file as well.
- Login to Intune with proper permissions: To begin, navigate to the Intune admin center at https://intune.microsoft.com or https://Intune.microsoft.us for Intune Government GCC-H/DoD (I am using a GCC-H instance of Intune, but these steps should be the same no matter what impact level you are using).
- Sign in with your administrator credentials: If you are using RBAC and least privilege you will need to have at least the “Policy and Profile Manager” role.
Step 2: Create a New Configuration Profile
Once logged in, follow these steps to create a new configuration profile:
- In the left-hand menu, select Devices -> Configuration profiles.
- Click on the Create profile button at the top, select “import policy”
- Select “Browse for files” and browse to the location where you unzipped the Intune STIG Policy Baselines, inside that folder go to the Intune Policies folder then Settings Catalog.
- Select your STIG of choice and provide a meaningful name and description for the profile and select save.
Step 3: Configure Profile Settings
Next, verify the profile settings align with the DISA STIG requirements:
- Once the profile has been created select view policy.
- Navigate through the settings and ensure every setting is meticulously configured to meet the STIG compliance guidelines. This may include settings such as password policies, encryption, and network security configurations.
- Ensure every setting meets the compliance standards of your organization. For example, Windows Spotlight is a feature that rotates the wallpaper and screensaver randomly if your organization uses custom wallpaper or screensavers you may want to have this completely disabled.
Step 4: Assign the Profile and TEST, TEST, and TEST Again!!
After configuring the profile settings, assign the profile to the appropriate groups:
- Next to Assignments select edit.
- Select the user or device groups that the profile should apply to, this should be a small but diverse group of devices or users that can provide feedback on the user experience of the settings being applied and or issues they cause because STIGS never break anything right!?
- Once you have assigned your groups click Review & Save then Save.
Conclusion
Creating Intune Configuration Profiles for DISA STIGs is a crucial step in maintaining robust security and compliance within your organization. By following this step-by-step guide, you can effectively configure and deploy profiles that adhere to stringent security standards, safeguarding your IT infrastructure. Stay vigilant and periodically review your profiles to ensure they remain compliant with evolving STIG requirements.
Disclaimer
While DISA has made this a fairly easy process with Microsoft Intune there are some caveats. In the folder where we found the Intune policies is a “Support files” folder which hold an excel spreadsheet with valuable information. There are still several STIG settings that are not natively set by Intune for various reasons (Not in Windows CSP, organization specific settings, etc.) They have also provided the Desired State Configuration (DSC) files to set a lot of these settings that will need to be deployed as a Win32_APP. This is outside the scope of this blog but stay tuned! Lastly, the spreadsheet provides STIG settings that will be a false positive when you use the Security Content Automation Protocol (SCAP) tool. This is due to the settings being set now through the Configuration Service Providers (CSP) and the tool is looking at the legacy registry locations. Unfortunately, until that tool gets updated to look in the new locations we will need to provide that to prove the settings have been configured.
All screenshots and folder paths are from a non-production lab environment and can/will vary per environment. All processes and directions are of my own opinion and not of Microsoft and are from my years of experience with the Intune product in multiple customer environments
Additional Resources
- Microsoft Intune Documentation: Microsoft Intune documentation | Microsoft Learn
- DISA STIGs: Security Technical Implementation Guides (STIGs) – DoD Cyber Exchange
- Intune Admin Center: intune.microsoft.com (Commercial/GCC) or Intune.microsoft.us for government (GCC-High/DoD)
Stay tuned for future posts where we delve deeper into advanced configurations and best practices. Happy securing!