Examples/Resources/IntuneDeviceConfigurationWiredNetworkPolicyWindows10/2-Update.ps1
<#
This example is used to test new resources and showcase the usage of new resources being worked on. It is not meant to use as a production baseline. #> Configuration Example { param( [Parameter()] [System.String] $ApplicationId, [Parameter()] [System.String] $TenantId, [Parameter()] [System.String] $CertificateThumbprint ) Import-DscResource -ModuleName Microsoft365DSC node localhost { IntuneDeviceConfigurationWiredNetworkPolicyWindows10 'Example' { Assignments = @( MSFT_DeviceManagementConfigurationPolicyAssignments { deviceAndAppManagementAssignmentFilterType = 'none' dataType = '#microsoft.graph.allDevicesAssignmentTarget' } ) AuthenticationBlockPeriodInMinutes = 5 AuthenticationMethod = 'usernameAndPassword' AuthenticationPeriodInSeconds = 55 # Updated Property AuthenticationRetryDelayPeriodInSeconds = 5 AuthenticationType = 'machine' CacheCredentials = $True DisplayName = 'Wired Network' EapolStartPeriodInSeconds = 5 EapType = 'teap' Enforce8021X = $True Ensure = 'Present' MaximumAuthenticationFailures = 5 MaximumEAPOLStartMessages = 5 SecondaryAuthenticationMethod = 'certificate' TrustedServerCertificateNames = @('srv.domain.com') RootCertificatesForServerValidationIds = @('a485d322-13cd-43ef-beda-733f656f48ea', '169bf4fc-5914-40f4-ad33-48c225396183') SecondaryIdentityCertificateForClientAuthenticationId = '0b9aef2f-1671-4260-8eb9-3ab3138e176a' ApplicationId = $ApplicationId; TenantId = $TenantId; CertificateThumbprint = $CertificateThumbprint; } } } |