Installing | Device Management | Mobile Application Management using Intune_PowerShell_SDK Step by Step.

#Login with AzureAD

Connect-AzureAD

#Find MSGraph Module.

Find-Module -Name MS*

#Install MSGraph Modules

Install-Module MSGraph

Install-Module MSGraphAPI

#Download and Extract Intune_PowerShell_SDK

https://github.com/Microsoft/Intune-PowerShell-SDK

sl C:\Users\khali\Downloads\Compressed\Intune-PowerShell-SDK_v6.1811.0.3-preview\Release\net471

Import-Module .\Microsoft.Graph.Intune.psd1

sl C:\Users\khali\Downloads\Compressed\Intune-PowerShell-SDK_v6.1811.0.3-preview\Release\netstandard2.0

Import-Module .\Microsoft.Graph.Intune.psd1

# login using browser aka.ms/devicelogin using code

Connect-MSGraph

Accept Org Consent……………..

Get-Command -Module Microsoft.Graph.Intune

Get-command Get-DeviceAppManagement_MobileApps

Get-DeviceManagement_DeviceConfigurations

#Get a filtered list of applications and select only the “displayName” and “publisher” properties:

Get-DeviceAppManagement_MobileApps -Select displayName, publisher

#Create a web application

$bingWebApp = New-DeviceAppManagement_MobileApps -webApp -displayName ‘Bing’ -publisher ‘Microsoft Corporation’ -AppUrl ‘https://www.bing.com’

#Update the web application that we created in the ‘Creating objects’ section:

$bingWebApp | Update-DeviceAppmanagement_MobileApps -webApp -displayName ‘Bing Search’

#Delete the web application that we created in the ‘Creating objects’ section:

$bingWebApp | Remove-DeviceAppmanagement_MobileApps

#Lock a managed device:

# Get a device to lock

$allDevices = Get-DeviceManagement_ManagedDevices

$deviceToLock = $allDevices[0]

# Lock this device

$deviceToLock | Invoke-DeviceManagement_ManagedDevices_RemoteLock

# Get a device to Wipe

$allDevices = Get-DeviceManagement_ManagedDevices

$deviceWipe = $allDevices[0]

# Lock this Wipe

$deviceToWipe | Invoke-DeviceManagement_ManagedDevices_Wipe

#there are too many parameters to use in Use_cases.

XXXX = Actions | Just tab and change mode of command.

# Get a device to XXXX

$allDevices = Get-DeviceManagement_ManagedDevices

$deviceXXXX = $allDevices[0]

# Device with this XXXX

$deviceToXXXX | Invoke-DeviceManagement_ManagedDevices_XXXX

Stay tuned for more…..

Recent Articles

How to configure restriction for Users from creation of Office 365 groups, Plans & Microsoft teams.

Connect-AzureAD Create new Security Group "AllowedtoCreateGroups" Get-AzureADGroup -SearchString "AllowedtoCreateGroups" $GroupName = "<SecurityGroupName>" $AllowGroupCreation = "False" Connect-AzureAD $settingsObjectID = (Get-AzureADDirectorySetting | Where-object -Property Displayname -Value "Group.Unified" -EQ).id if(!$settingsObjectID) { $template = Get-AzureADDirectorySettingTemplate | Where-object...

Attack Simulator for Office 365

Microsoft has released Attack Simulator (currently in Preview) to allow Office 365 Global Administrators to simulate phishing campaigns and other attack simulations. Prerequisites ·       Your organization’s email...

What is Advanced Threat Analytics?

Advanced Threat Analytics (ATA) is an on-premises platform that helps protect your enterprise from multiple types of advanced targeted cyber-attacks and insider threats. How ATA...

How to remove Office 365 Groups permanently ?

  Hi Guys, Here is process how to remove office 365 groups or soft deleted groups from your office 365 tenant. Step-1 you need to connect with Azure...

How to solve the issue of guest users access in Office 365 when you applied restriction on office 365 groups creation tenant wide?

Connect-AzureAD via powerShell Run the following command: $template = Get-AzureADDirectorySettingTemplate | ? {$_.displayname -eq "group.unified"} See if you already have an AzureADDirectorySetting object,...

Related Stories

Leave A Reply

Please enter your comment!
Please enter your name here

Stay on op - Ge the daily news in your inbox