Veri-Tune
Enterprise
Veri-Tune assesses your Microsoft Intune endpoint management configuration against 375 security controls covering Windows, macOS, iOS, and Android. It provides assignment-aware dual scoring, bulk policy assignment, and automated remediation with scoped JIT write permissions.
How Veri-Tune Works
Step-by-step walkthrough from start to finish
Run Baseline Assessment
Navigate to the Tune section and click "Run Assessment." Veri-Tune reads your Intune configuration — device compliance policies, configuration profiles, security baselines, and app protection policies — via the Graph API. The assessment evaluates 375 controls across Windows, macOS, iOS, and Android.
Review Dual Scores
Veri-Tune provides assignment-aware dual scoring. The "deployed" score only counts controls assigned to device groups (reflecting what's actually protecting devices). The "configured" score counts all policies regardless of assignment. A gap between the two means policies exist but aren't assigned.
Assign Policies to Groups
Use bulk policy assignment to select recommended policies and assign them to device groups with one click. Provide a group ID or select from existing groups, choose policies, and assign. JIT write permissions are granted for the assignment and auto-revoked after.
Remediate Configuration Gaps
For failing controls, Veri-Tune can create or update Intune policies to meet compliance requirements. Scoped JIT write permissions use only 3 Graph API scopes (vs 14 for M365 remediation). All actions are logged in the remediation audit trail.
Track Audit Trail
Every JIT consent grant, policy assignment, and write revocation is logged in the audit trail. View the full history from the Veri-Tune results page, including timestamps, actions taken, and before/after values.
Data Handling
What data is collected, processed, stored, and what is never accessed
Data collected during Intune assessment
- →Intune device compliance policies and their assignments
- →Device configuration profiles (Settings Catalog, templates, custom OMA-URI)
- →Security baselines and their current configuration values
- →App protection policies for iOS, Android, and Windows
- →Enrollment restrictions and Autopilot deployment profiles
- →Device group memberships for assignment-aware scoring
How data is processed
- →Configuration values are evaluated against 375 control definitions in the Veri-Tune registry
- →Assignment-aware scoring calculates both "deployed" (assigned to groups) and "configured" (all policies) scores
- →Cross-source detection aggregates settings from Settings Catalog, Security Baselines, and Compliance Policies
- →Framework mappings are applied (CIS, NIST, SOC 2, ISO 27001, HIPAA, CISA)
- →Remediation actions use the Graph API with scoped JIT write permissions
What is stored after assessment
- →Compliance scores (deployed and configured) in Azure Table Storage
- →Per-control pass/fail results with setting values and expected values
- →Remediation audit trail (JIT grants, assignments, revocations) in Azure Table Storage
- →Generated reports in Azure Blob Storage (encrypted at rest)
Data Veri-Tune never accesses
- ✗Device hardware details, serial numbers, or IMEI numbers
- ✗Installed applications or app usage data on managed devices
- ✗User personal data, email, files, or browsing history
- ✗BitLocker recovery keys or FileVault keys
- ✗Device location data or GPS coordinates
- ✗Managed app content or app configuration data
Permissions
Every Graph API permission used, when it's requested, and why
Permission Model
Veri-Tune uses a scoped JIT permission model with only 3 write permissions (vs 14 for M365 remediation). Read permissions are granted during initial consent. Write permissions are requested via a separate delegated consent flow immediately before remediation or policy assignment and auto-revoked after the operation. A Global Administrator must complete the delegated consent prompt — this is separate from the initial read-only consent.
DeviceManagementConfiguration.Read.AllRead device configuration profiles, security baselines, and settings
DeviceManagementManagedDevices.Read.AllRead managed device inventory and compliance status
DeviceManagementServiceConfig.Read.AllRead Intune service configuration and enrollment settings
DeviceManagementConfiguration.ReadWrite.AllCreate or update device configuration profiles and security baselines
DeviceManagementManagedDevices.ReadWrite.AllAssign policies to device groups
DeviceManagementServiceConfig.ReadWrite.AllUpdate enrollment and service configuration settings
Safety Controls
- ✓Scoped JIT write permissions — only 3 Graph scopes vs 14 for M365
- ✓Delegated auth for write operations — a real admin must consent, not just app permissions
- ✓Auto-revocation of write permissions after every operation
- ✓JIT status badges show Active/Revoked/Assigned state at all times
- ✓Full audit trail of every consent grant, assignment, and revocation
- ✓Assignment-aware scoring prevents false positives from unassigned policies
