Microsoft Intune과의 Chrome Enterprise Premium 통합 설정
컬렉션을 사용해 정리하기
내 환경설정을 기준으로 콘텐츠를 저장하고 분류하세요.
이 문서에서는 Microsoft Intune과의 Chrome Enterprise Premium 통합을 설정하는 방법을 보여줍니다.
이러한 통합을 설정에는 Intune 설정, 엔드포인트 확인 설정, Azure 워크로드 아이덴티티 설정, 조직 단위에서 Microsoft Intune 사용 설정이 포함됩니다.
시작하기 전에
Chrome Enterprise Premium용 Intune을 설정하려면 다음 단계를 따르세요.
DeviceManagementManagedDevices.Read.All 및 DeviceManagementApps.Read.All 권한을 검색하고 이러한 권한을 Microsoft Graph에 추가합니다.
API 권한을 요청할 때 애플리케이션 권한을 선택합니다.
DeviceManagementManagedDevices.Read.All은 모든 기기 및 Intune에서 관리되는 해당 속성에 대해 읽기 액세스 권한을 제공하고 DeviceManagementApps.Read.All은 기기 삭제 이벤트에 대해 Intune 감사 로그에 대한 읽기 액세스 권한을 제공합니다.
탐색 메뉴에서 모바일 및 엔드포인트 > 설정 > 타사 통합 > 보안 및 MDM 파트너를 클릭합니다.
조직 단위 창에서 조직 단위를 선택합니다.
Microsoft Intune에 대한 체크박스를 선택하고 저장을 클릭합니다.
Microsoft Intune이 이제 보안 및 MDM 파트너 섹션에 나열됩니다.
조직의 크기에 따라 엔드포인트 확인과 Intune을 연결을 설정하는 데 몇 초 정도 걸릴 수 있습니다. 연결이 설정된 후 기기에서 Intune 데이터를 보고하는 데 몇 분에서 1시간 정도 걸릴 수 있습니다.
[[["이해하기 쉬움","easyToUnderstand","thumb-up"],["문제가 해결됨","solvedMyProblem","thumb-up"],["기타","otherUp","thumb-up"]],[["이해하기 어려움","hardToUnderstand","thumb-down"],["잘못된 정보 또는 샘플 코드","incorrectInformationOrSampleCode","thumb-down"],["필요한 정보/샘플이 없음","missingTheInformationSamplesINeed","thumb-down"],["번역 문제","translationIssue","thumb-down"],["기타","otherDown","thumb-down"]],["최종 업데이트: 2025-09-05(UTC)"],[],[],null,["# Set up Chrome Enterprise Premium integration with Microsoft Intune\n\nThis document shows you how to set up Chrome Enterprise Premium integration with Microsoft Intune.\nSetting up this integration involves setting up Intune,\nsetting up Endpoint Verification, setting up Azure workload identity,\nand enabling Microsoft Intune on your organizational units.\n\nBefore you begin\n----------------\n\n- To set up Intune for Chrome Enterprise Premium, do the following:\n\n - [Understand the supported configurations](https://docs.microsoft.com/en-us/mem/intune/fundamentals/supported-devices-browsers) and ensure that your environment satisfies the networking requirements.\n - [Sign in to your trial subscription or create a new Intune subscription](https://docs.microsoft.com/en-us/mem/intune/fundamentals/account-sign-up).\n - [Set DNS registration to connect your company's domain name with Intune](https://docs.microsoft.com/en-us/mem/intune/fundamentals/custom-domain-name-configure).\n - [Add users and groups, or connect Active Directory to sync with Intune](https://docs.microsoft.com/en-us/mem/intune/fundamentals/users-add).\n - [Give users permission to use Intune by assigning licenses](https://docs.microsoft.com/en-us/mem/intune/fundamentals/licenses-assign).\n\n For more information, see [Set up Intune](https://docs.microsoft.com/en-us/mem/intune/fundamentals/setup-steps).\n- Ensure that the devices in your organization run one of the following\n operating systems:\n\n - macOS version 10.11 or later\n - Microsoft® Windows 10 or later\n- [Set up Endpoint Verification for your organization](/endpoint-verification/docs/deploying-with-admin-console).\n\nConnect to Intune\n-----------------\n\n1. [Find your Microsoft 365 tenant ID](https://docs.microsoft.com/en-us/onedrive/find-your-office-365-tenant-id).\n2. [Register your application to obtain an application ID](https://docs.microsoft.com/en-us/azure/active-directory/develop/quickstart-register-app).\n3. From the Admin console Home page, go to **Devices**.\n\n [Go to Devices](https://admin.google.com/ac/devices/list)\n4. In the navigation menu, click **Mobile \\& endpoints \\\u003e Settings \\\u003e Third-party integrations \\\u003e Security and MDM partners \\\u003e Manage**.\n5. Look for **Microsoft Intune** and click **Open connection**.\n6. In the **Connect to Intune** dialog, enter the tenant ID in the **Azure directory tenant id** field and application ID in the **Azure application id** field.\n\n7. Depending on whether you want to import only company-owned devices or import all devices, perform the appropriate action:\n - To import only company-owned devices, click the **Import only company-owned devices** toggle. In the **Device properties to import** section, select the properties that must be stored in Chrome Enterprise Premium.\n - To import all devices, in the **Device properties to import** section, select the properties that must be stored in Chrome Enterprise Premium.\n\n The mandatory device properties such as `device identifier`, `last sync time`,\n `serial number`, and `wifi MAC address` are collected by default.\n\n For more information about the device properties that Intune collects, see [Intune device properties](https://docs.microsoft.com/en-us/graph/api/resources/intune-devices-manageddevice?view=graph-rest-1.0#properties).\n8. Click **Continue**.\n9. Copy the **Service account ID** . \n10. Use the **Service account ID** to authorize Azure workload identity to collect data from the Intune devices:\n 1. [Configure your app to trust an external identity provider](https://docs.microsoft.com/en-us/azure/active-directory/develop/workload-identity-federation-create-trust?tabs=azure-portal#other-identity-providers-example).\n\n Specify the following values in the corresponding fields:\n - **Name**: Any name for the federated credential.\n - **Subject identifier** : The **Service account ID** that you copied.\n - **Issuer** : `https://accounts.google.com`.\n 2. [Grant your app permissions](https://docs.microsoft.com/en-us/azure/active-directory/develop/quickstart-configure-app-access-web-apis#application-permission-to-microsoft-graph):\n 1. Search for `DeviceManagementManagedDevices.Read.All` and `DeviceManagementApps.Read.All` permissions and add these permissions to Microsoft Graph. When requesting the API permissions, select **Application permissions** .\n\n `DeviceManagementManagedDevices.Read.All` provides read access to all devices and their properties managed by Intune,\n and `DeviceManagementApps.Read.All` provides read access to the Intune audit logs for device deletion events.\n 2. [Grant admin consent to the permissions configured for your application](https://docs.microsoft.com/en-us/azure/active-directory/develop/quickstart-configure-app-access-web-apis#admin-consent-button).\n11. In the **Connect to Intune** dialog, click **Connect**.\n\nThe connection to Intune is set to open.\n\nEnable Intune for your organizational unit\n------------------------------------------\n\nTo collect device information by using Intune, enable Intune for\nyour organizational unit by doing the following:\n\n\n1. From the Admin console Home page, go to **Devices**.\n\n [Go to Devices](https://admin.google.com/ac/devices/list)\n2. In the navigation menu, click **Mobile \\& endpoints \\\u003e Settings \\\u003e Third-party integrations \\\u003e Security and MDM partners**.\n3. From the **Organizational units** pane, select your organization unit.\n4. Select the checkbox for **Microsoft Intune** , and click **Save**.\n\n **Microsoft Intune** is now listed in the **Security and MDM partners** section.\n Depending on the size of your organization, it might take a few seconds to\n establish the connection between Endpoint Verification and Intune. After\n the connection is established, the devices might take a few minutes to an hour\n to report Intune data.\n\nVerify Intune data on devices\n-----------------------------\n\n1. From the Admin console Home page, go to **Devices**.\n\n [Go to Devices](https://admin.google.com/u/1/ac/dm)\n2. Click **Endpoints**.\n3. Select any device from your organizational unit for which Intune is enabled.\n\n4. Verify that the Microsoft Intune data is listed in the **Third-party services** section.\n\n5. To see the complete details, expand the **Third-party services** section.\n\n The following image shows details of the data collected by Intune:\n\nThe compliance states reported by Intune are broadly categorized into the following\ncompliance states:\n\nWhat's next\n-----------\n\n- [Create and assign custom access levels](/chrome-enterprise-premium/docs/create-access-levels-intune)"]]