Product Guide

Veri-Tune

Veri-Tune — Complete Product Guide

How Veri-Tune scans your Microsoft Intune tenant against ~379 controls across 4 platforms (Windows, macOS, iOS, Android), surfaces every misconfigured policy, and remediates them under Just-in-Time write permissions — page by page, from the Veri-Tune overview through your first scan to remediation, drift analysis, and recurring scheduling.

This guide walks every Veri-Tune surface in the order you'll encounter it — from the dashboard tile through the Veri-Tune overview, the new-assessment wizard, a live scan, the results page, the remediation flow, and the drift / history / scheduling pages that close the monitoring loop.


1 · What Veri-Tune is

Veri-Tune is a Microsoft Intune configuration assessment and remediation engine. It connects to your tenant over the Microsoft Graph API, reads the device-management configuration that's actually deployed — Configuration Profiles, Compliance Policies, App Protection (MAM) Policies, Security Baselines, Endpoint Security policies, and Settings Catalog policies — and scores it against community-curated baselines including the OpenIntuneBaseline (OIB) and Veri-Tech's own Veri-Tune Level-1 / Level-2 baselines for Windows, macOS, iOS / iPadOS, and Android.

Veri-Tune is unique in that it scores every control on two axes: Protection (the policy is actually enforced on devices) and Readiness (the policy is configured correctly in the tenant). A policy that's perfectly configured but unassigned to any device group lands at 100% Readiness and 0% Protection — a real gap that single-axis tools miss.

The default operating mode is read-only. When you choose to deploy a missing baseline policy, update a misconfigured setting, or assign an unassigned policy to a device group, Veri-Tune requests Just-in-Time write permissions, applies the change, and surrenders the elevated access. Standing access stays read-only — the same Just-in-Time model that runs Veri-Guard runs Veri-Tune.


2 · Where you'll find Veri-Tune in your portal

Veri-Tune lives behind one card on your dashboard.

Dashboard card for Veri-Tune showing the Intune endpoint security baseline assessment tagline and a Professional+ tier badge
Dashboard — the Veri-Tune tile. Available from the Professional tier; bulk JIT-consented assignment and auto-revoke ship at the same tier.

Clicking through lands you on the Veri-Tune overview at /tune. This is the home page for every Veri-Tune surface — a tab strip at the top exposes Overview, Setup, New Scan, History, Compare, and Scheduling, and the body of the Overview tab is what's pictured below: a hero band with the four headline stats, the three-step process cards, the last-scan configuration row, and the Recent Activity log.

Veri-Tune overview at /tune showing the tab strip, Veri-Tune hero with four stat chips, three step cards Setup/Assess/Automate, Last Scan Configuration row, and Recent Activity panel
Veri-Tune overview at /tune — tab strip (Overview, Setup, New Scan, History, Compare, Scheduling), hero with four stat chips, the three step cards, the last-scan configuration row, and Recent Activity. Everything else in this guide is reached from here.

The three step cards across the middle of the overview are the conceptual model for the entire product. §3 walks each one in turn.


3 · How Veri-Tune works

Veri-Tune is organized around a three-step flow: a one-time guided setup of your Intune tenant, a parameterized assessment that scores it against ~379 controls, and (optionally) a recurring schedule that re-runs the assessment without you having to remember to.

Step 01 — Setup

Step 01 card on the Veri-Tune overview: Setup, multi-step guided configuration
Step 01 — Setup. Click 'Start setup' to open the multi-step guided Intune configuration checklist.

From the Veri-Tune overview, click "Start setup" on the Step 01 card to open the Guided Setup page at /tune/setup. The page walks the prerequisites Intune needs before any device-policy assessment is meaningful: connect Intune via the Graph API, verify Intune licensing, set the MDM authority, enable Windows auto-enrollment, configure enrollment restrictions, set up Conditional Access, create an emergency-access account, choose the endpoint-security platform, brand the Company Portal, configure Autopilot, and so on. §7.1 walks the page in detail.

Step 02 — Assess

Step 02 card on the Veri-Tune overview: Scan 350+ controls across 4 platforms
Step 02 — Assess. Click 'Configure scan' to open the New Assessment wizard. The Veri-Tune control registry covers Windows, macOS, iOS / iPadOS, and Android.

The New Assessment wizard (/tune/onboarding) is a five-step parameter selector — Managed Platforms, Device Ownership, Update Management, Endpoint Security, and a Review & Start screen — that pre-fills from your last scan so most of the steps are click-Next-to-confirm. The Graph API reads your tenant's full Intune configuration and finishes a four-platform scan in roughly thirty seconds. §7.2–§7.6 walk each wizard step.

Step 03 — Automate

Step 03 card on the Veri-Tune overview: Recurring scans with notifications
Step 03 — Automate. Click 'Set schedule' to configure recurring scans. Email and webhook notifications fire on completion.

After your first scan, Veri-Tune can run the same assessment on a schedule (daily, weekly, monthly, or custom). Drift between the previous and current scores is highlighted on the Score Trends page; configurable email and webhook notifications fire when a run completes. §10 covers drift, history, and scheduling in detail.


4 · Data handling and Graph permissions

Two things are true of Veri-Tune's data handling and they're enforced at the Graph permission boundary:

  1. The default operating mode is read-only. Veri-Tune's standing permissions read your Intune configuration — never your device data. No telemetry events, no installed-app inventories, no diagnostic uploads, no user passwords.
  2. Write permissions are Just-in-Time. When you click Remediate, Update Settings, or Assign Existing Policies, Veri-Tune requests the specific write scope it needs, performs the change, and the elevated grant lapses. Your tenant never has standing write access from Veri-Tune.

Standing read scopes (active for assessment):

  • DeviceManagementConfiguration.Read.All — Configuration Profiles, Settings Catalog policies, baseline policies
  • DeviceManagementApps.Read.All — App Protection (MAM) Policies, App Configuration, app assignments
  • DeviceManagementServiceConfig.Read.All — Intune service settings, MDM authority, enrollment restrictions
  • DeviceManagementManagedDevices.Read.All — managed device inventory and assignment status
  • Group.Read.All and Directory.Read.All — to resolve assigned device / user groups

Just-in-Time write scopes (only activated by an explicit remediation click):

  • DeviceManagementConfiguration.ReadWrite.All — for Settings Catalog and Configuration Profile remediation
  • DeviceManagementApps.ReadWrite.All — for App Protection Policy remediation
  • DeviceManagementServiceConfig.ReadWrite.All — for tenant-level Intune service-settings changes

The Microsoft consent screen at the JIT moment enumerates every scope line by line; nothing is hidden behind a single coarse permission.


5 · Safety controls and remediation guarantees

Veri-Tune's automation model exists to not break your device fleet. The same eight guarantees that govern Veri-Guard remediation govern Veri-Tune:

  • Per-policy scope. Every write operation targets one specific policy; bulk operations are explicit batches you assemble in the planner, not background mass writes.
  • JIT write permissions. Granted at the moment of remediation and lapse with the access token's one-hour TTL. Standing access stays read-only.
  • Disruption risk ratings are surfaced before every remediation click — calibrated to the specific change being deployed (low for App Protection updates, higher for Conditional-Access-adjacent compliance policies).
  • Prerequisite checks automatically skip controls whose required Intune licenses or service prerequisites aren't present in your tenant.
  • Policy assignment is opt-in. Newly created or updated policies are deployed but never assigned to a device group automatically — you assign them yourself via the Assign Existing Policies card or the Intune admin portal.
  • Plan-Guided Remediation classifies every failing control into Auto-Deploy, Override (update existing), Runbook Only, or Accept Risk so you always see what's about to happen before granting write consent.
  • Full audit trail logs every write with before-and-after values and the admin who authorized it.
  • The plan-guided "Excluded" bucket captures controls that are missing licenses, end-of-life, require your input, or are not applicable — you're never asked to consent to write operations that are guaranteed to fail.

6 · Baselines and frameworks covered

Veri-Tune assesses against a per-platform control registry. As of the current release, the registry version is v4.5.0 with ~379 controls spread across:

  • Windows — ~265 controls. OpenIntuneBaseline (OIB) Windows + Veri-Tune Windows L1 / L2 + EIDSCA-mapped device-side controls.
  • macOS — ~35 controls. CIS Apple macOS benchmark + Veri-Tune macOS L1 / L2.
  • iOS / iPadOS — ~43 controls. Veri-Tune iOS L1 / L2 + App Protection Policy (MAM) baseline.
  • Android — ~50 controls. Veri-Tune Android L1 / L2 + Android Enterprise work-profile baseline + App Protection Policy (MAM) baseline.

Beyond per-platform baselines, every control is cross-mapped to the relevant compliance framework so one Veri-Tune assessment populates evidence for every framework you report against:

  • CIS Microsoft 365 (Intune-mapped sections)
  • NIST 800-53 and NIST CSF (configuration-management and access-control families)
  • ISO 27001 (Annex A.8 asset management, A.9 access control)
  • SOC 2 Type II (Trust Services Criteria CC6 logical access)
  • HIPAA (Technical Safeguards — paired with the HIPAA add-on for full coverage)
  • CISA SCuBA (mobile / endpoint configuration baselines)

The exact registry version and platform set used for any given scan is shown next to the H1 on the results page — so an audit reviewer can always reproduce the registry state behind a specific evidence package.


7 · Running your first scan

From the moment you click "Start setup" or "Configure scan," the next surfaces — the guided setup page, the five-step new-assessment wizard, and the in-flight scan progress — are the entire first-scan experience.

7.1 · Guided Setup (/tune/setup)

The Guided Setup page is the prerequisite checklist Intune needs before a device-policy assessment is meaningful. The page header carries a progress counter ("4 of 13 complete" in the devlab example below) and the highest-priority "NEXT STEP" card tells you what to do next.

Guided Setup page at /tune/setup with progress counter, Next Step callout, Full Prerequisite Scan CTA, and the first six prerequisite steps (Connect Intune, Verify Intune Licensing, Set MDM Authority, Enable Windows Auto-Enrollment, Configure Enrollment Restrictions, Set Up Conditional Access)
Guided Setup at /tune/setup — progress counter, the Next Step card pointing to the highest-priority item, the Full Prerequisite Scan CTA at the top, and the prerequisite checklist (each step with Active / Action Needed / Complete status, a short explanation, and Open Microsoft Learn / Scan Prerequisites / I've configured this / Skip for now actions).

Each prerequisite row is a self-contained gate: a one-line description of what Intune needs, an "Action Needed" / "Active" / "Complete" status, an inline explanation of what Veri-Tune will check for, and four actions — Open Microsoft Learn (deep-link to the relevant Microsoft docs page), Scan Prerequisites (re-check this specific item only), I've configured this (manual mark-complete), or Skip for now.

The full thirteen-step list covers tenant connection, licensing, MDM authority, Windows auto-enrollment, enrollment restrictions, Conditional Access, an emergency-access account, the endpoint-security platform choice, Company Portal branding, Autopilot Deployment Profile, Enrollment Status Page, Autopilot Device Group, and Autopilot Device Registration. You don't need every step done before running a scan — but unmet prerequisites surface as failed controls in the assessment, so working through them up front gives you a cleaner first scan.

7.2 · New Assessment wizard, step 1 — Managed Platforms (/tune/onboarding)

Click "New Scan" in the tab strip (or "Configure scan" on the Step 02 card) to open the New Assessment wizard. Step 1 picks the device platforms to scan.

New Assessment wizard step 1 Managed Platforms with checkboxes for Windows, macOS, iOS / iPadOS, and Android
Step 1 — Managed Platforms. Pick every platform you manage or plan to manage with Intune; controls for unselected platforms are excluded from the scan and the score.

The four platforms are independent — selecting macOS only is valid for a Mac-only tenant, but the scan will only execute the ~35 macOS controls and the score will reflect that smaller registry. The wizard pre-fills from your last scan's selection so most subsequent runs are a click-Next confirmation.

7.3 · Step 2 — Device Ownership

New Assessment wizard step 2 Device Ownership with three options: Company-owned only, Personal devices BYOD, Both company-owned and BYOD
Step 2 — Device Ownership. Determines which control families apply: full-MDM controls run for company-owned devices; App Protection Policy (MAM) controls run for BYOD.

The choice between Company-owned, BYOD, and Both is meaningful: full-MDM controls (Configuration Profiles, Compliance Policies that apply at the device level) run for company-owned devices, and App Protection Policy (MAM) controls run for personal devices. The "Both" option runs both control sets and the assessment scores them together — the right choice for most enterprises mixing corporate-issued laptops with employee phones.

7.4 · Step 3 — Update Management

New Assessment wizard step 3 Update Management with Yes / No for Intune-managed Windows updates, driver-update toggle, and three mobile OS update options
Step 3 — Update Management. Whether Windows updates flow through Intune, whether driver updates are managed, and how mobile OS updates are handled. Update-Ring controls are scored only when these are turned on.

If you don't use Intune for Windows updates (you're on WSUS, SCCM, or relying on Windows Update default behavior), the Update Ring controls are excluded from your scan and your score; same for mobile OS updates. The driver-update toggle adds the Driver Update Profile controls.

7.5 · Step 4 — Endpoint Security

New Assessment wizard step 4 Endpoint Security with three options: Microsoft Defender for Endpoint, Third-party security platform, Neither / Not sure
Step 4 — Endpoint Security. Controls that depend on a Defender connector vs a third-party MTD connector vs neither. The 'Neither / Not sure' option lets Veri-Tune detect what's actually licensed and present in the tenant.

The choice changes which Endpoint Security controls run: Defender-specific compliance signals only score for Defender tenants, MTD-connector controls only score for third-party MTD tenants. "Neither / Not sure" runs the assessment in a license-aware mode that detects what's actually present.

7.6 · Step 5 — Review & Start

New Assessment wizard step 5 Review & Start showing all selections, the What Happens Next bullet list, and the Start Assessment CTA
Step 5 — Review & Start. Confirms every selection, the "What happens next" bullet list (verify enrollment restrictions; scan Settings Catalog, Security Baselines, Device Configs, Compliance, App Protection; check assignment status; score against frameworks; ~40s wall-clock), and the Start Assessment CTA.

Click "Start Assessment." Veri-Tune connects to Graph, runs the registry against your tenant in roughly thirty to sixty seconds, and auto-advances to the results view at /tune/[jobId]. That's §8.


8 · Reading the results

The results page (/tune/[jobId]) is the densest surface in the product. Every analysis tool, export action, attestation builder, and the formal scored compliance picture itself all live on one scrollable page. Read top to bottom, the page organizes itself into three bands:

  1. Page header + cross-product entry-points — the H1 with the registry version and Job ID, an Export menu, the Generate Device-Compromise Tabletop card, the Policy Insights summary, and the Remediation Planner entry.
  2. The scored picture — Assessment Score (Protection + Readiness donuts), Assign Existing Policies (the JIT-revoked-but-still-ready cleanup), Cross-Product Controls (controls owned by other Veri-Tech products that affect your Tune score), and the Remediation Impact Estimator.
  3. The detail surfaces — Framework Compliance, Control Results table, and Remediation History.

The rest of this section walks each in that order.

8.1 · Page header and Export

Results page header showing the H1 'Intune Baseline Assessment (379 controls)', the registry version v4.5.0 with platform list, the Job ID, and an Export menu button
Page header — H1 with the live control count, the registry version + scanned platforms + ownership scope, the Job ID for cross-referencing in support tickets and audit records, and the Export menu (HTML / Markdown / JSON / PDF formats).

The H1 carries the live control count for this scan (379 in the devlab example because all four platforms + corporate + BYOD were selected). The line below pins the exact registry version, scanned platforms, and ownership scope so the same scan parameters are auditable later. The Job ID is the unique identifier you cite in support tickets and your own change records.

8.2 · Generate Device-Compromise Tabletop

Veri-Tune ships a Device-Compromise tabletop generator that takes your scan data and produces a facilitator-ready incident-response exercise — scenarios drawn from the actual device-policy gaps in your tenant, injects timed for a live drill, and a scoring rubric to grade your team's response.

Generate Device-Compromise Tabletop card with example scenario 'Personal phone with no MAM policy leaks corporate Outlook cache', drill-sized-for chip, an Auditor-grade IR Evidence note, and the Generate IR Tabletop CTA
Generate Device-Compromise Tabletop — auditor-grade IR exercise drawn from your scan gaps. Sized to your org-shape (8 roles configured in the devlab example). Satisfies HIPAA §164.308(a)(8), SOC 2 CC7.4, and ISO 27001 A.5.24 evaluation requirements. The 'Preview a sample tabletop' link shows the artifact shape before you generate one against your own data.

Click "Generate IR Tabletop" and the exercise runs as a Veri-Vault tabletop session — facilitator dashboard, attendee read-only view, the works. Generation takes three to five minutes; output lands in Veri-Vault as a tabletop artifact you can share with auditors or run live with your team.

8.3 · Policy Insights

The Policy Insights summary surfaces an underappreciated source of Intune risk: settings that exist in multiple policies and disagree on the correct value.

Policy Insights summary card showing 'We found 179 settings that exist in multiple Intune policies' with three breakouts: 140 Conflicts, 29 Redundant, 10 Unassigned Duplicates, and a View Policy Insights button
Policy Insights — counts of conflicts (settings disagreed across policies), redundant (same setting in multiple policies, same value), and unassigned duplicates (inactive policies that can be cleaned up). Click 'View Policy Insights' to see each one and the policies involved.

The detailed view (/tune/[jobId]/policy-insights) lists every conflicting or redundant setting with the policies that contain it, the values each policy sets, and a remediation hint — typically consolidate the conflicting policies into one source of truth or delete the inactive duplicate.

8.4 · Remediation Planner entry

The Remediation Planner card is a thin entry point — it generates an AI plan that classifies every failing control for auto-deployment, runbook generation, or risk exception, and queues them up for the full Remediation flow. The deep walkthrough of the planner — Plan-Guided Remediation, Selection Summary, Projected Impact, the action table, the JIT consent moment — lives in §9.

Remediation Planner entry card on the results page showing the three bullet points (auto-deploy fixes, generate runbooks, set risk exceptions) and the Plan Remediation for N Controls primary CTA
Remediation Planner entry — summary of what the planner does and the "Plan Remediation for N Controls" button that triggers AI plan generation and takes you to the full flow in §9.

From the results page, just know: click "Plan Remediation for N Controls," wait twenty to thirty seconds for the AI to classify each failing control, then click "Open Remediation Planner" to land on the full flow. The full multi-step remediation story is §9.

8.5 · Assessment Score

Below the cross-product entry points sits the formal scored picture of your tenant — the Assessment Score panel.

Assessment Score card with two headline percentages (90% Protection / 91% Readiness), control counts (338 Passing, 1 Not Assigned, 1 Report-Only, 39 Misconfigured, 0 Missing), two donut charts, score breakdown bars, control status legend, and platform chips
Assessment Score — the dual-axis Protection / Readiness model, raw control counts by status, a 90% protected donut, a 379-control-total donut with status breakdown, and the platform chips (windows, macos, ios, android). The amber band at the bottom calls out the 0.8% gap from policies configured but not assigned.

Two donut charts pack a lot of information into a small area; here's how to read them:

  • Protection (90% in the example) — Actively enforced. The percentage of controls whose policy is both configured correctly and assigned to a device or user group. This is the "what's actually protecting your fleet right now" number.
  • Readiness (91% in the example) — Configured correctly. The percentage of controls whose policy is configured correctly, regardless of assignment. The gap between Readiness and Protection is your unassigned-but-correct surface — policies you've built but haven't deployed.
  • Passing / Not Assigned / Report-Only / Misconfigured / Missing — the raw control-level counts. Not Assigned is the count of controls Readiness counts but Protection doesn't; Report-Only is for compliance policies in monitoring-only mode; Misconfigured is policies with wrong values; Missing is controls with no matching policy at all.
  • The amber band at the bottom flags the gap to close: "1 control correctly configured but not assigned to any device group. Assign these policies to close the gap." Click "Assign Existing Policies" (next subsection) to do that in one step.

The dual-axis model is the difference that matters most in Intune: a tenant can have a beautifully configured Compliance Policy that nobody has deployed, scoring 100% on Readiness and 0% on Protection. Single-axis tools either overcount (treating Readiness as the score) or undercount (treating Protection as the score). Veri-Tune shows both.

8.6 · Assign Existing Policies

Right under the Assessment Score sits the Assign Existing Policies card — the one-click cleanup for the gap the amber band just flagged.

Assign Existing Policies card with JIT Revoked badge, 'Android: 1' control breakdown, and Grant Write Access / Preview policies CTAs
Assign Existing Policies — the cleanup for unassigned-but-correct policies. Per-platform count, a Grant Write Access CTA that initiates the JIT consent flow scoped to the assignment writes only, and a Preview policies link to inspect what would change before consenting.

Click "Preview policies" to see exactly which policies would be assigned and to which groups; click "Grant Write Access" to initiate the JIT consent flow scoped to the assignment-only writes. The JIT consent for Assign Existing is narrower than the consent for full remediation — it only requests the device-management write scopes needed for assignment, nothing else.

8.7 · Cross-Product Controls

Cross-Product Controls collapsed entry card showing '1 controls affecting your Tune score are managed by other Veri-Tech products' with a ~10 score weight chip
Cross-Product Controls — entry card. Some Tune controls (Conditional Access prerequisites, Defender connector, etc.) are owned by Veri-Guard and surface here so the score reflects that dependency. Click to expand and see which controls and which product owns them.

A small subset of Tune controls have their primary configuration in another Veri-Tech product (typically Veri-Guard for Conditional Access prerequisites or Defender-side configuration). The Cross-Product Controls card surfaces those so you don't try to remediate them inside the Veri-Tune planner — the remediation lives in the owning product's flow.

8.8 · Remediation Impact Estimator

The Remediation Impact Estimator is the planning tool — it lets you preview which controls move the score most before you actually run the remediations.

Remediation Impact Estimator card with tabs Quick Wins / Severity Risk Matrix / Severity Distribution / Top Failing Policies / Category Treemap / Framework Radar
Remediation Impact Estimator — six visualizations of your remediation surface in tabs. Quick Wins ranks single-control fixes by score lift; Severity Matrix plots disruption-risk vs score-lift; Top Failing Policies clusters by underlying policy; Category Treemap and Framework Radar are framework-faceted views.

The six tabs are different lenses on the same underlying data:

  • Quick Wins — controls that move the score most for the least disruption. Sort and pick the top of the list to maximize score lift per JIT consent batch.
  • Severity Risk Matrix — controls plotted on a disruption-risk vs score-lift grid. Pick the upper-left quadrant (high lift, low disruption) for safe one-pass remediation.
  • Severity Distribution — histogram of failing controls by severity. Useful when leadership asks "how many critical issues are outstanding."
  • Top Failing Policies — clusters failing controls by their underlying Intune policy, so you can see which one or two policies own most of the deficit.
  • Category Treemap — visual breakdown by control category (Identity, Endpoint Security, Compliance, etc.) for prioritization conversations with the owning team.
  • Framework Radar — the framework view (CIS / NIST / ISO / SOC 2 / HIPAA) plotted radially so you can see which framework's mapped controls are weakest.

8.9 · Framework Compliance

Framework Compliance entry card collapsed
Framework Compliance — the auditor-facing view, collapsed by default. Click to expand and see per-framework progress bars (CIS, NIST 800-53, NIST CSF, ISO 27001, SOC 2, HIPAA, CISA SCuBA) with the failing controls per framework.

The Framework Compliance card is the surface to share with an auditor: one row per framework, one progress bar per row showing how many of the framework's mapped controls passed. If an auditor only wants ISO 27001 evidence, expand the framework, filter the Control Results table below to ISO 27001-mapped controls only, and export.

8.10 · Control Results

The full control table sits below the framework grid. Each grouped row is one of the five status buckets (Misconfigured, Not Enforced, Passing, Report-Only, etc.), and expanding a group shows every individual control with its severity, framework mappings, current value vs expected value, and a per-control remediation drawer.

Control Results card showing platform chips Windows 265 / macOS 35 / iOS 43 / Android 50, search bar with All Categories / All Severities / All Statuses / All Sources filters, and the four status group rows (Misconfigured 39, Not Enforced 1, Passing 338, report-only 1)
Control Results — 379 of 379 controls grouped by status. Platform chips at the top show per-platform counts; the four filter dropdowns scope by category, severity, status, and source baseline. Click any status group row (Misconfigured, Not Enforced, Passing, report-only) to expand and see the individual controls.

The platform chips at the top show the per-platform control counts (Windows 265 / macOS 35 / iOS 43 / Android 50 in the devlab example). The four filter dropdowns scope the table — All Categories (Identity / Endpoint Security / Apps / Compliance / etc.), All Severities (Critical / High / Medium / Low / Informational), All Statuses (the same five buckets), and All Sources (OIB / Veri-Tune L1 / L2 / CIS / etc.). Click any status group row to expand it and see every control in that bucket.

8.11 · Remediation History

Remediation History collapsed entry card
Remediation History — collapsed entry. Click to see every prior remediation run against this assessment's controls, with deploy timestamps, JIT-revoke confirmation, and links into the per-deployment audit detail.

The Remediation History card is the audit trail per assessment — every prior remediation run, what it deployed, when, and the JIT-revoke confirmation. Useful at audit time to demonstrate that the score lift between two scans is attributable to specific deployments rather than tenant drift.


9 · Remediation

Two paths through Veri-Tune remediation, and the right one depends on whether the failing control has a deployable Intune policy fix.

Path A — Plan-Guided Remediation (Auto-Deploy + Override). For controls Veri-Tune knows how to write directly via Graph (Configuration Profiles, App Protection Policies, Settings Catalog policies), the planner classifies each as either Auto-Deploy (create a new policy) or Override (update an existing policy that has the wrong value). You click Deploy, Veri-Tune requests JIT write permissions, applies the changes, and the elevated grant lapses.

Path B — Runbook Only. For controls whose remediation requires admin-portal UI work that Graph can't replicate, or controls that need human judgment (license changes, role assignments outside Intune), Veri-Tune generates a runbook your team executes by hand. The runbook lands inside your existing change-management process.

9.1 · The Remediation Planning page

Clicking "Plan Remediation for N Controls" on the results page (and waiting twenty to thirty seconds for the AI plan to generate) lands you on the full Remediation Planning page at /tune/[jobId]/remediate?planJobId=.... The page is the staging area where you decide which controls to remediate and how.

Remediation Planning page header showing the H1 with Enterprise badge, breadcrumb back to Assessment Results, and a one-line description
Page header — H1 "Remediation Planning" with the Enterprise badge, the breadcrumb back to Assessment Results, and the one-line description of the page intent ("Deploy fixes, generate runbooks for manual steps, or accept risk with documented justifications").

Layout top-down: page header → Assign Existing Policies (the same one-click assignment cleanup from §8.6, surfaced here too) → Plan-Guided Remediation summary → Selection Summary + Projected Impact + Severity Breakdown + Disruption Risk Heatmap → action table → sticky bottom CTA. §9.2–§9.7 walk each in order.

9.2 · Assign Existing Policies (on the planner page)

Assign Existing Policies card on the Remediation Planning page
Assign Existing Policies — surfaced here too because assigning an unassigned-but-correct policy is the highest-leverage zero-risk remediation available. Same one-click flow as §8.6.

Same card as on the results page (§8.6) — surfaced again here because assigning unassigned policies is typically the first thing to do before the broader remediation. Click "Grant Write Access," consent to the assignment-only scope, and your Protection score lifts the moment the writes complete.

9.3 · Plan-Guided Remediation summary

Below Assign Existing sits the Plan-Guided Remediation summary panel — the AI's classification of every failing control.

Plan-Guided Remediation summary panel showing the plan generation timestamp and three classification chips: 1 Auto-Deploy, 1 Override, 2 Excluded
Plan-Guided Remediation — the AI plan with three classification chips. Auto-Deploy is for controls where no matching policy exists and a new one will be created; Override is for controls where a policy exists with wrong values; Excluded is for controls that can't be remediated automatically (missing license, end-of-life, requires your input, or not applicable).

The three chips:

  • Auto-Deploy — failing controls where no matching Intune policy exists in your tenant. Veri-Tune will create a new policy with the correct values.
  • Override — failing controls where a policy does exist but has wrong values. Veri-Tune will create a new policy with the correct values (rather than mutating the existing one — this preserves your audit trail and lets you remove the broken original on your own schedule).
  • Excluded — controls Veri-Tune deliberately doesn't try to auto-remediate. Reasons surface inline: missing license, end-of-life, requires your input, or not applicable.

Click "Generate new plan" if you've changed scope and want the AI to re-classify. The plan output is advisory — you can override any control's classification before deploying.

9.4 · Selection Summary, Projected Impact, Severity Breakdown, Disruption Risk Heatmap

This block is the most information-dense panel on the page — four side-by-side visualizations of what your current selection will do.

Selection Summary block showing 40 controls, action breakdown (Deploy New 0, Update Settings 1, Runbook Only 37 (93%), Accept Risk 2 (5%)), Your Selections panel, What Needs to Happen panel, and the Projected Impact + Security Severity Breakdown + Disruption Risk Heatmap visualizations below
Selection Summary panel — 40 controls in scope; Action Breakdown by classification (Deploy New, Update Settings, Runbook Only, Accept Risk); Your Selections (your overrides if you've changed any); What Needs to Happen (per-action click-to-filter chips); Projected Impact (score-lift estimate); Security Severity Breakdown (per-severity counts); Disruption Risk Heatmap (color-coded grid plotting impact vs disruption).

Read top-down:

  • Selection Summary — the headline count of controls in scope (40 in the devlab example).
  • Action Breakdown — per-classification counts and percentages so you can see the shape of the remediation at a glance: 0 Deploy New, 1 Update Settings, 37 Runbook Only (93%), 2 Accept Risk (5%).
  • Your Selections — if you've manually overridden any classifications (e.g., moved a control from Runbook Only to Accept Risk), this row shows your final selection.
  • What Needs to Happen — the click-to-filter chips for the action table further down: 37 Update Settings, 1 Assign Existing, 2 No Match.
  • Projected Impact / Security Severity Breakdown / Disruption Risk Heatmap — the score-lift, per-severity-count, and disruption-vs-impact visualizations that help you justify the remediation to leadership before you commit.

9.5 · The action table

Remediation action table with columns Control, Policy / Source, Action (dropdown), Risk, Severity, and rows for the controls in scope
Per-control action table — each row is one of the 40 controls. Per-row classification dropdown lets you change the AI's plan: Auto-Deploy, Override, Runbook Only, or Accept Risk. Risk and Severity columns surface the per-control disruption ratings up front so you don't consent to anything you didn't intend.

Each row is a single failing control. The Action dropdown lets you override the AI-generated plan per row — useful when a control the AI classified Auto-Deploy needs to be runbook-only because your change-management policy requires manual deployment, or when a control classified Runbook Only is one you've already decided to accept risk on.

9.6 · The sticky bottom CTA

Sticky bottom CTA bar with Continue to Deploy button
Sticky bottom CTA — visible no matter how far you've scrolled. Aggregates the current selection (Deploy / Override count + Runbook count + Accept Risk count) and opens the deployment confirmation step where the JIT consent flow begins.

The sticky bar at the bottom of the page surfaces the deploy CTA no matter how far down the action table you've scrolled. Click Continue and you're at the deployment confirmation step — Veri-Tune surfaces the final action breakdown one more time, you click Grant Write Access, and the OAuth consent flow opens.

9.7 · The JIT model: delegated, time-bounded, revocable

This is the same Just-in-Time consent model that runs Veri-Guard remediation, with one Veri-Tune-specific note: the requested write scope is scoped to device-management writes only (DeviceManagementConfiguration.ReadWrite.All, DeviceManagementApps.ReadWrite.All, DeviceManagementServiceConfig.ReadWrite.All). Veri-Tune does not request — and the consent screen does not enumerate — Conditional Access, RBAC, or any non-Intune write scopes. If a remediation needs those scopes, that remediation lives in Veri-Guard's flow (see §8.7 Cross-Product Controls), not here.

The four-part JIT guarantee is the same as Veri-Guard's:

  • Just-in-Time grant. The OAuth flow only fires when you click "Grant Write Access" in the planner. There is no standing write consent on your tenant before this moment, and no path through the product that grants standing write access at any other time.
  • Just-this-batch scope. The elevated permission is used only by the worker that processes this one dispatch. A second click on Remediate triggers a fresh consent prompt and a fresh grant, even for the same controls.
  • Just-this-admin context. Every Graph write is performed under the identity of the admin who granted consent. Your tenant's Microsoft audit logs attribute the change to your admin's UPN.
  • Auto-revoke after success; one-hour TTL on failure. When the worker successfully finishes, Veri-Tune discards the tokens it received from the consent flow. On a failed or abandoned dispatch, Veri-Tune does not currently force-revoke at the moment of failure; the access token Microsoft issued then expires on its standard one-hour TTL, and the delegated grant becomes unusable when it does.

Revoke at any time using the standard Microsoft paths — myapps.microsoft.com for per-user revoke, the Entra admin center → Enterprise applications → Veri-Tech for org-wide revoke, or delete the enterprise app entirely to pull every grant. The trust boundary is at the Entra layer; Veri-Tech can't hide, suppress, or work around those revoke paths.


10 · Drift, history, and recurring scans

After your first scan, three pages close the monitoring loop: Score Trends (for drift between two specific scans), History (for the full assessment timeline), and Scheduling (for recurring scans).

Intune Score Trends page with the Select Assessments to Compare panel showing four prior scans (5/13, 5/7, 5/5, 4/29) and an Analyze Drift CTA
Intune Score Trends at /tune/drift — the assessment selector. Pick a baseline and a current scan, click Analyze Drift, and the per-control delta surfaces below.

The Score Trends page is the surface for analyzing drift between any two prior scans. Pick a baseline and a current scan from the per-tenant list and click Analyze Drift.

Drift analysis output showing BASELINE 90.3% on May 7 (339 passed / 39 failed), -0.4% delta arrow, CURRENT 89.9% on May 13 (338 passed / 39 failed), REGRESSIONS 0, IMPROVEMENTS 0, NET CHANGE 0, and per-control table tabs (All Changes, Regressions, Improvements)
Drift analysis output — Baseline vs Current with the headline delta, regressions / improvements / net-change counts, and a per-control table filtered to All Changes / Regressions / Improvements. Filters by domain and severity scope the table further.

The output panel breaks the comparison into Regressions (controls that flipped from passing to failing), Improvements (failing → passing), and No-Op (no change). Each row in the table shows the control, the domain, the severity, the change direction, and the post-change status. This is the artifact most useful when investigating whether a recent Intune change had unintended downstream effects.

10.2 · Assessment History (/tune/history)

Assessment History page in empty state with the Run First Assessment CTA
Assessment History at /tune/history — the timeline of completed assessments with per-scan score, control counts, and platforms. Empty state shown for a fresh tenant; on a tenant with prior runs, this page is the per-tenant audit log.

History is the per-tenant assessment log. Each prior scan is a row with timestamp, registry version, platforms, ownership scope, and score; clicking a row jumps to the full results page for that scan. On a brand-new tenant the empty-state CTA points you back to running a first assessment.

10.3 · Compare Assessments (/tune/compare)

The Compare page is the side-by-side variant of Drift — two scans rendered next to each other rather than as a delta. Useful when you want the full results of both, not just what changed.

Compare Assessments empty-state page with View History and Run Assessment CTAs
Compare Assessments at /tune/compare — side-by-side comparison of two assessments. Empty state shown on a tenant without enough prior scans yet.

10.4 · Scheduling (/tune/scheduling)

Assessment Scheduling page showing the requirements (Pro plan), bullet list of what scheduled scans do, Active Schedules empty state, and a + New Schedule CTA
Assessment Scheduling at /tune/scheduling — recurring scans for automated compliance monitoring. Schedules trigger an assessment at the configured time; results land in History within minutes; email and webhook notifications fire on completion.

The Scheduling page is where you set up the Step 03 (Automate) recurring cadence. Click "+ New Schedule" to pick a frequency (daily / weekly / monthly / custom), the same five wizard parameters from §7, and the notification destinations (email and / or webhook). Each schedule's runs land in History as if you'd manually triggered them; webhook payloads are HMAC-signed so your downstream tooling can verify authenticity.


11 · Where to go next

You've now seen every page Veri-Tune puts in front of you. The fastest way to internalize the rest is to run an assessment against your own tenant:

  1. Sign in and open Veri-Tune at /tune.
  2. Work through the prerequisite checklist on /tune/setup (or skip it for now if your tenant is already configured).
  3. Click "Configure scan" on the Step 02 card; pre-filled wizard, click Next through to Start Assessment.
  4. Wait roughly thirty seconds; read the results.
  5. Pick the top of the Quick Wins list; either copy the runbook into a change ticket, or click Plan Remediation and walk through the JIT consent flow.

If anything in this guide is unclear or you'd rather walk through it with a person, the support tutorials at /support/tutorials cover the most common Veri-Tune tasks in narrower five-to-eight-step recipes, and the Book a Call link in the page footer reaches an intro session.