MSEndpointMgr

Introducing Intune Guardian — The MSEndpointMgr Intune Audit Dashboard, Evolved

Back in October 2022, we released the MSEndpointMgr Intune Audit Dashboard — a KQL workbook designed to take the pain out of auditing events in Intune. The response from the community was incredible. Over 58,000 views, dozens of deployments across enterprise environments, and plenty of feedback on what you wanted to see next.

We listened. And now we have built something entirely new.

From Workbook to Web Portal

The original dashboard was a Log Analytics KQL workbook. It worked, and it worked well — but it came with friction. You needed an Azure subscription, a Log Analytics workspace, diagnostic settings configured, manual JSON edits during installation, and KQL knowledge to extend it. The comments on the original post told the story: many admins struggled with the setup, ran into blank dashboards, or wanted capabilities that a workbook simply couldn’t deliver.

Intune Guardian is the answer to all of that. It’s a purpose-built web portal — no Log Analytics workspace required, no KQL, no JSON editing, no Azure subscription needed. Sign in with your existing admin account, grant consent, and your audit data appears. That’s it.

Check it out today – https://intuneguardian.com

How It Works

Intune Guardian talks directly to the Microsoft Graph API on your behalf using the On-Behalf-Of (OBO) flow. When you sign in, the portal reads your tenant’s audit events in real time from the deviceManagement/auditEvents endpoint — the same data that powers the Intune admin center’s built-in audit logs, but presented in a way that’s actually useful.

Your data never leaves your control. There is no database on our side. No customer data is stored, cached long-term, or shared. The portal is a pure read-only window into your own tenant’s data, scoped to the permissions of the signed-in user. Multi-tenant by design — every organization gets its own isolated view.

What You Get

If you used the original workbook, you’ll recognise the structure, but everything has been rebuilt from the ground up:

Summary Dashboard
High-level tiles showing total events, devices wiped, devices retired, unique applications — with sparkline trends. Category and operation breakdowns give you the big picture in seconds.

Device Targeted Actions
Every wipe, retire, sync, reboot, and remote lock — filterable by OS, device name, and result. See who did what to which device, with full timeline visualisation broken down by operating system.

Target Actions
Policy changes, configuration profile updates, app assignments — tracked by the target resource. Split between changes made by admin users versus automated service principal actions.

Admin Actions
Filter by a specific administrator and see their complete activity footprint. Operation type breakdowns, success/failure rates, and trend data over time.

Application Actions
Track actions performed by enterprise applications and service principals. Essential for environments with automation, third-party integrations, or delegated management.

Autopilot Events
Autopilot device lifecycle tracking — creates, updates, deletes — enriched with serial number, model, group tag, and manufacturer. Duplicate serial number detection flags potential provisioning issues before they become problems.

Anomaly Detection
This is new. The portal analyses your audit data for patterns that don’t look right — volume spikes, unusual failure rates, off-hours activity, rare operations, and actors that appear unexpectedly. Each anomaly is scored by severity and explained in plain language. Think of it as a security analyst watching your audit logs around the clock.

Detailed Audit Log
The full filterable, sortable, paginated audit log with every field exposed. Hover over any row for a quick preview, expand for full detail including modified property values (old vs new). Column grouping lets you slice the data by category, operation type, actor, or result.

The Tech Under the Hood

For those who care about the engineering (and we know you do):

  • Frontend: React 19 + TypeScript, built with Vite, deployed to Azure Static Web Apps
  • Backend: Node.js + Express + TypeScript, deployed to Azure App Service
  • UI: Shadcn/UI components with Tailwind CSS — clean, fast, dark mode included
  • Auth: MSAL with multi-tenant support and admin consent flow
  • API: Microsoft Graph API beta via the official SDK, with server-side pagination and a 1-hour cache layer
  • Charts: Recharts for all visualisations

The backend acts as a BFF (Backend-for-Frontend), so the browser never talks to Graph directly. Tokens are acquired via OBO flow, scoped per-user, per-tenant. No cross-tenant data leakage is possible by design.

What Changed Since the KQL Workbook

KQL Workbook (2022)Intune Guardian (2026)
PrerequisitesAzure sub + Log Analytics + Diagnostic SettingsJust an admin account
SetupImport JSON, edit workspace IDs, domain strings, workbook namesSign in and grant consent
Data sourceIntuneAuditLogs table (Log Analytics)Microsoft Graph API (real-time)
Data retentionDepends on your Log Analytics retention policyGraph API default (30 days)
ExtensibilityEdit KQL queries manuallyTabs added as new features ship
Multi-tenantOne workbook per workspaceSingle portal, any tenant
Anomaly detectionNot availableBuilt-in
Autopilot trackingNot availableBuilt-in with duplicate detection
Customer data storageIn your Log Analytics workspaceZero — none stored on our side

Getting Started

  1. Navigate to the Intune Guardian portal
  2. Sign in with a work account that has Intune read permissions
  3. Grant admin consent (one-time, per tenant) — the portal requests only DeviceManagementApps.Read.All
  4. Explore — your audit data loads immediately

That’s the entire setup. No Azure subscription. No diagnostic settings. No KQL.

What’s Next

We’re actively developing new capabilities. On the roadmap:

  • Multi Admin Approval tab — Track MAA request workflows, approval timing SLAs, and policy coverage using the new Graph beta API (#88)
  • Compliance insights — Device compliance trends and drift detection
  • Configuration drift — Track policy changes over time with diff views

The portal is open source and the source code will be available on soon on GitHub: MSEndpointMgr/IntuneGuardian. Issues, ideas, and contributions are welcome.

The Origin Story

Intune Guardian started as a joint effort in an Airbnb heading into Microsoft MVP Summit week of 2026. The original audit workbook had served the community well for over three years, but we knew it was time to take the next step. What began as a late-night whiteboard session quickly turned into a working prototype — powered by too much pizza and not enough sleep.

Three principles were non-negotiable from day one:

  1. Minimal permissions — request only what’s needed, nothing more
  2. No customer data storage — your data stays in your tenant
  3. Pure read-only view — no modifications, no side effects

The team behind Intune Guardian is the same crew from MSEndpointMgr — Nickolaj Andersen, Jan Ketil Skanke, Maurice Daly, Sandy Zeng, and Simon Skotheimsvik. Combined decades of experience in Intune, Graph API, and enterprise mobility, channelled into a tool we wish we’d had years ago.

Conclusion

The KQL workbook was a good start. Intune Guardian is where we always wanted to end up — a purpose-built portal that makes Intune audit data accessible to every admin, in every tenant, without the overhead. Give it a try, and as always, let us know what you think.

Simon Skotheimsvik

Simon is a Microsoft MVP and Senior Cloud Consultant at CloudWay, specializing in enterprise mobility using Microsoft Intune. With over 20 years of experience, he actively shares his insights and passion as an international speaker and active tech blogger.

Simon resides in Norway with his wife, his partner since childhood, and their three kids, who keep life exciting. Outside of IT, he loves playing his guitars and manage his smart home.

Jan Ketil Skanke

Jan Ketil is an Enterprise Mobility MVP since 2016 and are working as a COO and Principal Cloud Architect at CloudWay in Norway. He has been in the industry for more than 20 years working for both Microsoft Partners and Microsoft. He loves to speak about anything around Enterprise Mobility and Secure Productivity. He is also the lead for the community conference Experts Live Norway. Jan Ketil has presented at large industry conferences like Microsoft Ignite, Microsoft Ignite The Tour, Microsoft Inspire, Experts Live Europe, Techmentor HQ (3rd best session 2019) and NIC Conference in Oslo.

Nickolaj Andersen

Chief Technical Architect and Enterprise Mobility MVP since 2016. Nickolaj has been in the IT industry for the past 10 years specializing in Enterprise Mobility and Security, Windows devices and deployments including automation. Awarded as PowerShell Hero in 2015 by the community for his script and tools contributions. Creator of ConfigMgr Prerequisites Tool, ConfigMgr OSD FrontEnd, ConfigMgr WebService to name a few. Frequent speaker at conferences such as Microsoft Ignite, NIC Conference and IT/Dev Connections including nordic user groups.

Maurice Daly

Maurice has been working in the IT industry for over 25 years and is currently working in the role of Senior Security Architect with Patch My PC. His main focus is both on security and automation, creating solutions that remove the mundane and allow for focus on the next "big" thing on your list.

Sandy Zeng

Sandy is an Enterprise Mobility MVP since 2018. She is an experienced Information Technology Specialist for over 15 years. Skilled in Microsoft Endpoint Manager (ConfigMgr and Intune), Windows and security. Sandy's interests are mostly related to Microsoft Technologies, she has passions learning new skill sets to improve her professional career and also as her hobbies. She uses her expertise to help customers achieve their goals and solve their issues.

Sandy founded the https://sandyzeng.com blog and is now a blogger on MSEndPointMgr.

Add comment

Sponsors

Categories

MSEndpointMgr.com use cookies to ensure that we give you the best experience on our website.