Skip to main content

Intune Integration Guide (For Mac Devices)

This article covers setting up Intune for macOS devices.

Updated this week

The Intune (Mac) integration enables IT and security teams to enforce and monitor macOS device compliance via MDM. It connects Drata to Microsoft Intune so your team can synchronize policies and device posture to meet compliance requirements.

When the connection is complete, you can enable Workstation Configuration Monitoring on your Company's Internal Security settings. If the Drata Agent is not present and active, it will then proceed to obtain workstation configuration info from the Intune instance for compliance purposes.

Key Capabilities

  • Device compliance posture (macOS): Syncs compliance results (e.g., FileVault, firewall, lock screen, software updates).

  • Policy existence & assignment checks: Confirms policies are mapped to devices and devices are compliant with those policies.

Prerequisites & Data Access

  • Must have Admin, Information Security Lead, DevOps Engineer, or Workspace Manager roles in Drata.

  • Devices to be monitored must be enrolled through Intune Company Portal website or app (multiple enrollment methods supported).

    • Devices can be enrolled by any of these methods.

    • If your employees are already enrolled, it is not necessary for them to install the Company Portal application.

  • Make sure that your Entra (formerly Azure) account has already been populated with users.

  • A Microsoft Endpoint Manager (Intune) group containing all users to be monitored (both “Microsoft 365” and “Security” group types supported).

  • Each device must have the user’s email address in the User Principal Name field, matching the Personnel email in Drata.

  • A Global Administrator account is required to set up in Entra/Intune.

Important Notes

Device Note

Compliance Note

At this time, Drata’s device compliance checks using the Intune connection directly verify Hard Disk Encryption settings. For all other checks, Drata confirms the following:

  • Does the policy of the required name and/or type exist?

  • Is that policy mapped to the device?

  • Is that device compliant with that policy?

If all three of the above criteria are met, Drata will show that device as passing for the other device compliance checks.

Additional Considerations

Permissions & Data Table

Permission/Scope

Why It’s Needed

Data Accessed (Read Only)

DeviceManagementManagedDevices.Read.All

Read device compliance and inventory for macOS devices

Managed device details & compliance states

DeviceManagementConfiguration.Read.All

Read compliance & configuration policy definitions

Policies and their assignments

DeviceManagementApps.Read.All

Read discovered and managed apps for compliance checks

App inventory (Discovered Apps, Managed Apps)

User.Read.All

Map devices to users and groups for assignments

Basic user directory info

DeviceManagementScripts.Read.All

Read device management scripts relevant to posture

Script metadata associated with device management

Step-by-Step Setup

  1. Create compliance policies on Microsoft Endpoint Manager. These are necessary for:

    • MacOS Auto Updates,

    • Firewall,

    • Disk Encryption,

    • Lock Screen, and

    • Antivirus compliance data.

  2. Sync devices to get the latest policies and actions from Intune.

  3. Create an Intune OAuth app on Entra ID and obtain the app’s Application ID (client ID), Tenant ID, and app secret.

  4. Grant permissions to the app.

  5. Connect to your Intune instance in Drata.

Step 1: Create a macOS Compliance Policy (Intune)

  1. Sign in to Microsoft Endpoint Manager admin centerDevices > Compliance Policies > Policies > Create Policy.

  2. Select macOS as the platform.

  3. Name and describe the policy (e.g., “Drata – macOS Compliance”).

  4. Configure Compliance settings:

    • Device HealthRequire system integrity protection: Require.

    • System SecurityRequire a password to unlock devices: Require.

    • System SecurityMaximum minutes of inactivity before password is required: 15 minutes.

    • EncryptionRequire encryption of data storage on device: Require.

    • Device SecurityFirewall: Enable.

    • Gatekeeper → Allow apps downloaded from these locations: Mac App Store and identified developers.

    • Configure any additional settings per business requirements.

  5. (Optional) Configure Actions for noncompliance.

  6. Assign to the appropriate user groups (or All users).

  7. After assignment of policy to the users, you should see the 'Review + Create' section. Click on the 'Create' button to complete this step.

Step 2: Create a macOS Updates Configuration Profile

Note: If you already have an existing MacOS Updates profile, you may submit that profile's name to our Support team and Drata will apply it after your connection is made.

  1. Devices > Configuration Profiles > Create profile.

    • Platform: macOS

    • Profile Type: Templates

    • Template name: Custom

  2. On the 'Basics' page, enter the following name exactly as provided:

    • Drata - Software Updates

  3. Add an optional description → Next.

  4. Configuration settings:

    • Custom configuration profile name: Drata - Software Updates (match the overall profile name).

    • Deployment Channel: Device Channel.

    • Create a local XML file (e.g., any-name.xml) with the following contents and upload it as the Configuration profile file:

  5. On the 'Configuration settings' tab:

    • Custom configuration profile name: Drata - Software Updates (match the overall profile name).

    • Deployment Channel: Device Channel.

  6. Create a local XML file (e.g., any-name.xml) with the following contents and upload it as the Configuration profile file:

    <?xml version="1.0" encoding="UTF-8"?>
    <!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
    <plist version="1.0">
    <dict>
    <key>PayloadContent</key>
    <array>
    <dict>
    <key>AutomaticallyInstallMacOSUpdates</key>
    <true/>
    <key>AutomaticallyInstallAppUpdates</key>
    <true/>
    <key>AutomaticCheckEnabled</key>
    <true/>
    <key>CriticalUpdateInstall</key>
    <true/>
    <key>PayloadDisplayName</key>
    <string>Software Update</string>
    <key>PayloadIdentifier</key>
    <string>com.apple.SoftwareUpdate.4bb5aca5-cd0c-4562-bac4-e87c835b29cf</string>
    <key>PayloadType</key>
    <string>com.apple.SoftwareUpdate</string>
    <key>PayloadUUID</key>
    <string>de247aa4-10db-4f48-8dda-91aff64fcdfe</string>
    <key>PayloadVersion</key>
    <integer>1</integer>
    </dict>
    </array>
    <key>PayloadDisplayName</key>
    <string>Software Update</string>
    <key>PayloadIdentifier</key>
    <string>Software&amp;SecurityUpdates1.0.cf7e812a-9415-47e9-909b-f1560532d5ce</string>
    <key>PayloadType</key>
    <string>Configuration</string>
    <key>PayloadUUID</key>
    <string>da7e79e8-6311-4266-9621-c1b7b3496893</string>
    <key>PayloadVersion</key>
    <integer>1</integer>
    </dict>
    </plist>

  7. Once the file has been created, upload it to the Configuration profile file.

  8. Assign to the appropriate groups/devices. You can do so by selecting 'Add groups,' 'Add all users,' or 'Add all devices' based on your company’s configuration.

  9. Go to 'Review + create' tab, review your settings, and click 'Create' when ready to save your new profile.

Step 3: Create a Lock Screen (Screen Saver) Profile

Note: If you already have an existing one you may submit that profile's name to our Support team and Drata will apply it after your connection is made.

  1. Devices > Configuration profiles > Create profile.

    • Platform: macOS

    • Profile Type: Templates

    • Template name: Custom

  2. Name it Drata - Screen Saver (exactly) → optional description → Next.

  3. Configuration settings:

    • Deployment Channel: Device Channel.

    • Upload your xml file to the 'Configuration Profile File' section and verify your configuration matches the image below. Create and upload an XML file with 10-minute (600s) timeouts:

    <?xml version="1.0" encoding="UTF-8"?>
    <!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
    <plist version="1.0">
    <dict>
    <key>PayloadContent</key>
    <array>
    <dict>
    <key>idleTime</key>
    <integer>600</integer>
    <key>loginWindowIdleTime</key>
    <integer>600</integer>
    <key>PayloadType</key>
    <string>com.apple.screensaver</string>
    <key>PayloadIdentifier</key>
    <string>com.apple.screensaver.4bb5aca5-cd0c-4562-bac4-e87c835b29cf</string>
    <key>PayloadUUID</key>
    <string>ba9abec1-ee44-413d-b75f-63748644ca71</string>
    <key>PayloadVersion</key>
    <integer>1</integer>
    </dict>
    </array>
    <key>PayloadDisplayName</key>
    <string>Screen Saver Device</string>
    <key>PayloadType</key>
    <string>com.apple.screensaver</string>
    <key>PayloadUUID</key>
    <string>4ffe721a-f2e6-4191-a3fe-1d1a463fbbac</string>
    <key>PayloadVersion</key>
    <integer>1</integer>
    </dict>
    </plist>

  4. Assign to the appropriate groups/devices. You can do so by selecting 'Add groups,' 'Add all users,' or 'Add all devices' based on your company’s configuration.

  5. Go to 'Review + create' tab, review your settings, and click 'Create' when ready to save your new profile.

  6. Finally, go to 'Review + create' tab to review and click on 'Create'.

Step 4: Create a FileVault Profile

  1. In Intune: Endpoint security > Disk Encryption > + Create Policy.

    • Platform: macOS

    • Profile: FileVault

  2. Create, then name/describe. We recommend using Drata - FileVault for the name.

  3. Select 'Yes' for 'Enable FileVault'.

  4. Configuration settings:

    • Escrow location description of personal recovery key: Add guidance for users on how to retrieve the recovery key for their device.

      • For example: “You can retrieve the personal recovery key for your macOS device from the Microsoft Intune app or Company Portal.”

      • Note: This information can be useful for your users when you use the setting for personal recovery key rotation, which can automatically generate a new recovery key for a device periodically.

    • Configure any other settings per business requirements.

  5. Assign this new profile to users. You can do so by selecting 'Add groups,' 'Add all users,' or 'Add all devices' based on your company’s configuration.

  6. Go to Review and Create and verify your configuration.

Step 5: Sync Devices (Bulk) in Intune

The Sync device action forces the selected device(s) to immediately check in with Intune. When a device checks in, it receives any pending actions or policies that have been assigned to it.

This feature can help you immediately validate and troubleshoot policies you've assigned, without waiting for the next scheduled check-in.

Sync devices to get the latest policies and actions with Intune:

  1. Select Devices > All devices > Bulk Device Actions.

    User-uploaded Image
  2. On the 'Basics' page, enter the following:

    • Select macOS for OS

    • Select Sync for Device action

  3. On the 'Devices' page, select from 1 to 100 devices.

  4. Go to 'Review + create' page, ensure your settings are correct, and click 'Create'. You will be taken back to the Devices page.

Step 6: Create an App Registration in Entra ID

Note: Alternatively, for steps 1-3, you can go to portal.azure.com.

  1. Click on Microsoft Entra ID

  2. Click on App registrations in the left sidebar

  3. Select + New registration.

  1. From the Microsoft Intune admin center: Select All services > Microsoft Entra (opens Entra admin center).

  2. Select Identity > Applications > App registrations.

  3. Select + New registration.

    • Name: Drata - Intune App (exactly).

    • Supported account types: 'Accounts in this organizational directory only (<directory name> only - Single tenant).

  4. Click 'Register'. You are taken back to the app's Overview page.

  5. From the app Overview, copy Application (client) ID and Directory (tenant) ID. Save these for the Drata connection step later.

  6. Click 'Add a certificate or secret'.

  7. Go to Certificates & secrets+ New client secret.

    User-uploaded Image
  8. Add Description, set Expires = 24 months, Add.

  9. Note the expiration date for future rotation.

    User-uploaded Image
  10. Copy the Value and refresh the page to activate the value. This value will be entered in the Application Secret field within Drata during the connection process.

    • ⚠️ Do NOT copy the Secret ID.

  11. Be sure to refresh the Azure Certificates and Secrets screen to make the secret Value useable (Microsoft holds it in a pending state until the screen is refreshed).

Step 7: Grant Microsoft Graph Application Permissions

Microsoft Graph has two types of permissions: Delegated and Application. The Drata OAuth app needs Application permissions.

  1. In the app: API permissions

  2. Select + Add a permission.

  3. Then, Microsoft Graph.

    User-uploaded Image
  4. Then, Application permissions.

  5. Add these permissions:

    • DeviceManagementManagedDevices.Read.All

    • DeviceManagementConfiguration.Read.All

    • DeviceManagementApps.Read.All

    • User.Read.All

    • DeviceManagementScripts.Read.All

  6. Click Add permissions.

    User-uploaded Image
  7. Click Grant admin consent and confirm. Ensure Status = Granted for all five.

  8. Click 'Yes' in the 'Grant admin consent confirmation' popup.

  9. Once the grant consent is successful, confirm that the Status column now says Granted.

Complete the Connection

In Drata’s Connections page, enter the following information:

Drata Field

Intune (Mac) Value

Directory (tenant) ID

Directory (tenant) ID from Entra App Registration

Application (client) ID

Application (client) ID from Entra App Registration

Application Secret

Value of the client secret (copied at creation time)

For steps on accessing and using the Connections page in Drata, refer to The Connections Page in Drata.

Configure Intune as the MDM Source in Drata

  1. In Drata: go to your User ProfileSettingsInternal Security.

  2. Toggle Automated via Intune on

  3. Toggle Automated via Drata Agent off (agent takes precedence if both are on).

NOTE: If both remain on, and the Drata agent is installed on an employee computer, the Drata agent will take precedence; meaning, employee compliance checks will come from the agent.

Government Support for Microsoft Intune GCC High

Drata supports Microsoft Intune GCC High for your MDM Connection. All of the same support and services as Microsoft Intune (outlined above) carry over to the GCC High connection as well. See image below to better understand standards for usage of the varied Microsoft Intune solutions.

Did this answer your question?