Feature availability: This feature is supported for VantaGov workspaces.
This article covers connecting Vanta to Microsoft Endpoint Manager (Intune) GCC High for device management and monitoring. This integration is specifically for organizations using Intune in Azure Government cloud environments (GCC High).
What it does: Monitors Windows and MacOS devices, pulls device and app information, and runs continuous security tests to ensure compliant configuration
Who it's for: Endpoint Manager Administrators working with Azure Government cloud tenants
Estimated setup time: Less than 10 minutes
Who it applies to:
Admins using Azure Government cloud for GCC High tenants
Organizations with Microsoft Endpoint Manager GCC High
Requirements
Must be a Vanta admin installing on a VantaGov workspace
Must be an Endpoint Manager Administrator
Access to Intune admin center (GCC High)
Full Intune permissions (verify via "My permissions" in admin center)
Organization must be using Azure Government cloud for GCC High tenants
Important Note: This integration is for GCC High environments only. If you're using commercial Intune, please refer to the standard Intune integration guide.
Overview
To connect Microsoft Endpoint Manager GCC High to Vanta, you will:
Navigate to the integration in Vanta
Authenticate with Azure Government credentials
Grant required permissions
Configure device setup grace period
Connect the integration
Follow these steps to connect Vanta to Microsoft Endpoint Manager GCC High:
1. Navigate to Integrations in Vanta
From your Vanta dashboard, select Integrations from the left-hand navigation panel
Search for "Intune GCC High"
Select the integration from the search results
2. Initiate the connection
Click Connect
Select "Connect Intune GCC High"
Verify your admin status in the confirmation dialog
3. Authenticate with Azure Government
Log in with your Azure Government administrator credentials
The login will use https://login.microsoftonline.us (Azure Government cloud)
Accept the required permissions when prompted
4. Configure device setup grace period
Set the grace period for newly enrolled devices (default: 3 hours)
This prevents false alerts while devices are being initially configured
New computers will not trigger test failures until after this period
Note: If multiple MDM integrations are connected, any change made here to the computer setup time will be applied to all MDM integrations.
5. Configure compliance policies for Vanta monitoring
For Vanta to detect screenlock settings, antivirus status, and other security configurations, you must configure compliance policies in Microsoft Endpoint Manager. Without these policies, Vanta's monitoring capabilities will be limited.
Review the required compliance policy settings in our configuration guide: Microsoft Endpoint Manager - Configuration for Vanta
6. Confirm successful connection
Verify that the integration status shows "Connected"
Permissions
Vanta requires the following permissions to monitor your Intune GCC High environment:
Permission | Description | Use cases |
DeviceManagementManagedDevices.Read.All | Allows the app to read the properties of devices managed by Microsoft Intune, without a signed-in user. | With this main permission, Vanta can pull in device info, such as hardware details or installed applications. |
DeviceManagementConfiguration.Read.All | Allows the app to read properties of Microsoft Intune-managed device configuration and device compliance policies and their assignment to groups, without a signed-in user. | With this permission, Vanta can pull in screenlock and antivirus settings. |
Vanta has read-only access and cannot modify your Intune configuration, devices, or policies.
Monitored resources
Resource Type | Windows | macOS | Linux | iOS | Android |
Device Monitoring | ✅ | ✅ | ✅ | ❌ | ❌ |
Screenlock Settings | ✅ | ✅ | ❌ | ❌ | ❌ |
Antivirus Detection | ✅ | ✅ | ❌ | ❌ | ❌ |
Password Manager | ✅ | ✅ | ❌ | ❌ | ❌ |
✅ Supported
❌ Not supported
Note on Linux: For Linux device support with Microsoft Endpoint Manager (Intune), see the related article: Linux and Microsoft Endpoint Manager (Intune)
Cannot monitor
Non-Corporate devices: Intune collects the phone numbers, app inventory, and UDIDs of corporate-owned devices. Devices that aren't corporate-owned won't report UDID or installed apps, so Vanta won't be able to define a solid identity or run installed software checks on these devices.
No browser extensions. Like our other MDM integrations, we don't have easy access to see what extensions are installed in an employee's browser(s). One way this could be done in the future is w/ device policies — but that would check for enforcement rather than detecting an actual installation.
Important considerations
Weekly app scans: Because Intune only scans and reports hardware and software inventory once every 7 days, app updates will also report updates at this cadence in Vanta.
Proper licensing: Users can enroll their corporate devices only if they have an Intune license.
Compliance vs Configuration Policies: When using Microsoft Endpoint Manager, Vanta will only read in compliance policies and will not read in configuration profiles. See our set up guide for instructions on how to configure compliance policies for Vanta: Microsoft Endpoint Manager - Configuration for Vanta.
Password manager and AV detection. Unlike other MDM providers for MacOS, Microsoft does not provide us with bundle identifiers for MacOS apps. As a fallback, we determine if an app is a password manager or an AV by its app name, which can be less precise.
For antivirus, Vanta also checks to see if a device has a compliance policy enforced that requires antivirus.
Related articles
FAQ
Device not appearing in Vanta after connection
Device not appearing in Vanta after connection
Verify the device is enrolled in Intune GCC High and appears in the Microsoft Endpoint Manager admin center at https://intune.microsoft.us
Check that the device has checked in recently (within 7 days)
Ensure the device is within your configured scope in Vanta
Permission issues or authentication failures
Permission issues or authentication failures
Verify that your Azure Government account has full Intune Administrator permissions
Check "My permissions" in the Endpoint Manager admin center
Confirm that the Vanta integration app registration has the required permissions in your Azure Government tenant
Re-authenticate the connection if permissions were recently modified
Ensure you're logging in to the correct Azure Government tenant
Tests failing immediately after device enrollment
Tests failing immediately after device enrollment
Check your configured grace period setting (default: 3 hours)
Newly enrolled devices need time for initial policy application
Consider extending the grace period if your policy deployment takes longer
Verify that policies are correctly configured in Intune and assigned to the device
Application not detected on devices
Application not detected on devices
Remember that app inventory updates follow Intune's 7-day cycle, not Vanta's 4-hour sync
Verify the application is installed and appears in the Intune admin center
For MacOS, ensure the app name matches exactly (detection uses app names, not bundle identifiers)
Wait up to 7 days for new applications to appear in Vanta
Difference between GCC High and commercial Intune integration
Difference between GCC High and commercial Intune integration
GCC High uses Azure Government cloud infrastructure (endpoint.microsoft.us, graph.microsoft.us)
Commercial Intune uses standard Azure endpoints (endpoint.microsoft.com, graph.microsoft.com)
You must use the correct integration for your environment type
The app registrations and authentication flows are separate between the two clouds
How often does data refresh?
How often does data refresh?
Device metadata: Every 4 hours
Application inventory: Follows Intune's 7-day cycle
Compliance status: Every 4 hours
Can I monitor mobile devices?
Can I monitor mobile devices?
No, this integration only supports Windows and MacOS devices
iOS and Android devices cannot be monitored through this integration
