Skip to main content

Intune Adapt Policy Setup

Beta Feature

This article is subject to change as the feature develops and we make improvements.

API Calls

The calls to perform CRUD operations and to test HYPR Adapt Risk Policies, including the allowlisting of users, can be found here in the HYPR Passwordless API collection.

This documentation will give you a clear understanding on how to set up the Intune Adapt policy and how it works. The Intune Adapt policy is currently set up in two parts: The policy itself, and the signal handler. Both of them are available in the HYPR Control Center. For HYPR control center to communicate with Entra, an App Registration must be configured with the correct permissions.

Entra Configuration

With a HYPR Entra Integration

When configuring Entra with HYPR you are required to create an App Registration (see the Instructions here). Within the HYPRAuthApp, add the following API permission as an application type (DeviceManagementManagedDevices.Read.All). Make sure after you add the permissions to click on, “Grant admin consent for”.

Without a HYPR Entra Integration

If you are not using the Entra integration with HYPR, you must create a new App Registration and add the correct permissions.

  1. Open Entra ID and click on App Registrations on the left side.

  2. Click on New Registration.

  3. Name it 'Intune Adapt Policy'.

  4. You will see the new App Registration. Click on API Permissions at left.

  5. Click Add a Permission, then select Microsoft Graph and Application permissions.

  6. Look for DeviceManagementManagedDevices.Read.All. Select the permission.

  7. Click Add Permissions.

  8. Once the permissions have been added, select Grant admin consent for.

HYPR Adapt Policy Config: Risk Policies

Prerequisites

  • Contact HYPR Support to enable the Adapt Policies feature.

  • Obtain the latest version of the Intune Adapt Policy from HYPR

Configure the Intune Policy in Control Center

We will now configure the Intune Adapt policy within HYPR Control Center.

  1. Log in to the HYPR Control Center as an Admin.

  2. Click +Risk Policy.

  3. Select Workstation Unlock, then Custom.

  4. Name the policy Intune Policy.

  5. Once created, click the policy and select Configuration.

  6. Select the Test tab and paste the policy code into the form. It will look similar to the following example.

    package authz
    import future.keywords
    import future.keywords.if

    # Converted system time from nanoseconds to milliseconds for proper comparison
    currentSystemTime := time.now_ns()/1000000

    # Required
    default allowed := false
    default allowedAuthenticators = []
    default message = "OK"

    #######################################
    # Get WFA serial number from signal
    #######################################
    latestWFASignalSerialNumber = result {
    filtered_events := [e |
    e := input.events[_]
    e.eventName == "WORKSTATION_SIGNAL_RECEIVED"
    e.isSuccessful == true
    ]

    # Extract event times from the filtered events
    event_times := [e.eventTimeInUTC | e := filtered_events[_]]

    sorted_times := sort(event_times)

    # Get the last event time
    last_time := sorted_times[count(sorted_times) - 1]

    # Find the event with the last event time
    event := filtered_events[_]
    event.eventTimeInUTC == last_time

    serialNumber := event.additionalDetails.workstationSignal.system.biosSerialNumber
    result = removeSpaces(serialNumber)
    }

    #######################################
    # Get latest Intune Compliance event for machine
    #######################################
    latestMachineIntuneEvent = result {
    machineEvents := getMachineIntuneEvents

    # Extract event times from the filtered events
    event_times := [e.eventTimeInUTC | e := machineEvents[_]]

    sorted_times := sort(event_times)

    # Get the last event time
    last_time := sorted_times[count(sorted_times) - 1]

    # Find the event with the last event time
    event := machineEvents[_]
    event.eventTimeInUTC == last_time

    result := event
    }

    #######################################
    # HELPER FUNCTIONS
    #######################################
    # Function to check if a value exists and is not null
    existsNotNull(value) = true {
    value != null
    } else = false {
    value == null
    }

    removeSpaces(serialNumber) = output {
    parts := split(serialNumber, " ")
    output := concat("", parts)
    }

    # Boolean value that checks if either of two objects is not null or exists
    serialNumberFound = true {
    existsNotNull(latestWFASignalSerialNumber)
    } else = false

    # Boolean value that checks if either of two objects is not null or exists
    complianceEventFound = true {
    existsNotNull(latestMachineIntuneEvent)
    } else = false

    machineIsCompliant = {
    latestMachineIntuneEvent
    }

    #######################################
    # Allowed and Message Statements
    #######################################

    allowed if {
    not serialNumberFound
    }

    allowed if {
    not complianceEventFound
    }

    allowed if {
    machineIsCompliant
    }

    message = "Machine is in compliance with Intune policy" if {
    machineIsCompliant
    }

    message = "Machine is not in compliance with Intune policy" if {
    not machineIsCompliant
    serialNumberFound
    complianceEventFound
    }

    message = "Could not find compliance event for machine serial number" if {
    not machineIsCompliant
    serialNumberFound
    not complianceEventFound
    }

    message = "No serial number found from user WFA signals. No compliance result can be checked" if {
    not serialNumberFound
    not machineIsCompliant
    }

    #######################################
    # Query Local Dynamo Events for machines serial number
    #######################################
    current_time_millis := time_millis {
    nanos := time.now_ns()
    time_millis := nanos / 1000000
    }
    # Function to get the time one day ago in milliseconds
    one_day_ago_millis := time_millis {
    nanos := time.now_ns()
    one_day_nanos := 24 * 60 * 60 * 1000000000
    time_millis := (nanos - one_day_nanos) / 1000000
    }

    getMachineIntuneEvents = response {
    serialNumber = latestWFASignalSerialNumber

    # Define the input object structure
    input_object := {
    "securityToken": input.data.securityToken,
    "entityIdOrName": serialNumber,
    "startDate": one_day_ago_millis,
    "endDate": current_time_millis
    }

    # Set up the HTTP request parameters
    request := {
    "method": "POST",
    "url": "http://localhost:8182/local_search_events",
    "headers": {
    "Content-Type": "application/json"
    },
    "body": input_object
    }

    # Send the HTTP request and capture the response
    response := http.send(request).body
    }

    http_send = response {

    # Define the input object structure
    input_object := {
    "securityToken": input.data.securityToken,
    "entityIdOrName": "NON_SENSE",
    "startDate": one_day_ago_millis,
    "endDate": current_time_millis
    }

    # Set up the HTTP request parameters
    request := {
    "method": "POST",
    "url": "http://localhost:8182/local_search_events",
    "headers": {
    "Content-Type": "application/json"
    },
    "body": input_object
    }

    # Send the HTTP request and capture the response
    response := http.send(request)
    }
  7. Save the policy.

  8. Select Policy Assignments.

  9. Leave the configuration tab as is. Open the Test tab and conplete the fields as follows:

    ApplicationSelect your workstation RP App
    Evaluation PointWorkstation Pre-Unlock
    Evaluation Response Unavailable FallbackStandard Workflow
  10. Once you are finished, click Save.

  11. In Policy Assignment, select +Policy Assignment.