Skip to content

fix: add required Graph scope for Intune enrollment and fix permission query parsing#1138

Open
richlilly2004 wants to merge 1 commit intomicrosoft:mainfrom
richlilly2004:fix/graph-intune-permissions-aip
Open

fix: add required Graph scope for Intune enrollment and fix permission query parsing#1138
richlilly2004 wants to merge 1 commit intomicrosoft:mainfrom
richlilly2004:fix/graph-intune-permissions-aip

Conversation

@richlilly2004
Copy link
Copy Markdown

Summary

This PR fixes issues encountered while running Invoke-ZtAssessment against a live tenant.

It corrects DuckDB queries for delegated permission parsing and adds the required Graph scope for the Windows enrollment policy endpoint so the assessment can complete successfully in scenarios where that endpoint otherwise returns 403 Forbidden.

Type

  • Bug fix
  • Reliability improvement

Testing

  • Verified Invoke-ZtAssessment completes and generates the HTML report
  • Verified Getting Windows enrollment summary -> Completed
  • Verified the prior DuckDB binder warnings no longer appear for the affected tests

Changes

  • fix delegated permission extraction in DuckDB-backed app permission queries
  • add Policy.ReadWrite.MobilityManagement to the Graph scope list used by Connect-ZtAssessment
  • improve handling for Intune enrollment Graph access issues during report generation

Notes

This was validated against a live tenant where the previous run reproduced:

  • DuckDB binder errors in app permission tests
  • 403 Forbidden for GET /beta/policies/mobileDeviceManagementPolicies

After the fixes, the assessment completed successfully and generated the report as expected.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants