Permissions
Overview
This page describes the permissions and access model for this agent. The agent uses read-only access to Microsoft Intune and Microsoft Entra ID data through the Microsoft Graph API and Security Copilot Plugins. It is designed to analyze configuration settings, device assignments, and policy compliance without making any changes to your environment.
How It Works
The agent connects securely to your tenant using Microsoft Graph API endpoints to retrieve Intune and Entra ID data. It processes this information to assess configuration health, assignment coverage, and compliance alignment.
All interactions follow these principles:
Read-only access: The agent cannot modify, create, or delete configurations.
Least privilege: Only the minimum permissions required to read Intune and Entra ID data are used.
Transparency: All data access occurs through documented Graph API endpoints and can be audited in Microsoft Entra.
Required Entra ID Roles
Assign the following roles to the administrator account that installs and runs the agent:
Intune Reader
Provides read-only access to Intune configuration, compliance, and device data.
Directory Reader
Grants read-only access to Entra ID users, groups, and directory information.
Security Reader
Enables visibility into security insights and reports without modification rights.
Data Access Transparency
The following table outlines what data the agent can access and for what purpose.
Intune configuration profiles and policies
Read-only
To analyze deployment configurations, compliance settings, and policy status.
Device and user assignments
Read-only
To generate insights on targeting, compliance, and configuration coverage.
Entra ID directory data
Read-only
To correlate users, groups, and device relationships for reporting.
Security insights and alerts
Read-only
To improve visibility into potential misconfigurations or compliance risks.
Data handling:
The agent does not modify or export customer data outside the tenant boundary.
All data access is limited to the Microsoft Graph API using delegated or application permissions.
All access activity is logged in Microsoft Entra audit logs for traceability and compliance.
Agent Settings
The agent supports configurable parameters to adjust the scope and depth of analysis.
Scope
devices, policies, assignments
Determines which Intune areas are included in the analysis.
Mode
quick, standard, deep
Defines analysis depth and performance trade-offs.
• quick — Basic overview of configurations.
• standard — Balanced analysis with most metrics (recommended).
• deep — Detailed inspection with extended reporting and cross-checks.
Security and Compliance Considerations
All communication with Microsoft Graph is encrypted using HTTPS and secured by Microsoft identity services.
The agent adheres to Microsoft’s zero trust and least privilege principles.
Access can be reviewed or revoked at any time through Entra ID role assignments or application consent management.
Next Steps
Verify that the administrator account has all required roles assigned.
Review your organization’s least-privilege and role assignment policies.
Last updated
Was this helpful?