Advanced Methods for Enforcing Security Baselines in Modern Endpoint Management
Updated Oct 17, 2025
Version 2.0Hello Chris! Thank you for this helpful information! Once the STIG settings are configured in InTune per the methods you describe, how can these settings be regularly verified to meet RMF Continuous Monitoring requirements? Our usual go-to tools to evaluate STIG compliance would be SCC and Evaluate-STIG (and manual STIG verification as needed). Do any DoD approved tools exist to verify InTune managed settings? Also, I assume the best case would be for DISA to produce InTune specific STIG's. Any idea if MS and DISA are working on this? Thank you!