![portal source unpack open console portal source unpack open console](https://land.copernicus.eu/global/sites/cgls.vito.be/files/tutorials/screenshot_legacy_portal.png)
I decode this as well and provide it as plain text to you, or we can simply pass this to the IntuneWinUtilDecoder as parameters for instant decryption. To jump to the previously open panel, press Control+Shift+I (Windows, Linux) or Command+Option+I (macOS). It requests a policy which includes the package info, content info and decryption info. The agent itself does nothing else during a normal install. If we run the script provided below on an Azure AD joined device with Intune enrollment you can successfully decrypt the encryption information which you get from the Intune GatewayService to decrypt and download the encrypted. So in the log entry we have everything we need.
#Portal source unpack open console install#
In case of missing entries you can simply enroll a device and install all software via Company Portal on it to get all log entries and then parse this info for further usage. It allows system administrators to monitor, manage, and troubleshoot Linux servers. So I decided to not do that and let the agent to its job and grab the necessary information from the log files. Cockpit is a free and open-source front-end tool that provides administrative access to Linux systems. Getting tokens for requests, dealing with discovery, decryption, etc.
![portal source unpack open console portal source unpack open console](https://docs.unrealengine.com/4.27/Images/SharingAndReleasing/Mobile/iOS/Windows/EnableRemoteLogin.jpg)
It would be possible to write a tool to request the file from Intune directly to get to this information but in fact then I would write lots of the parts of the agent my self again. The log entry does include the download location also. intunewin file is encrypted and can only be decrypted by your device with the right certificate. This is an example of that log file entry: īasically I’m searching for this particular log entry which I then decode with the certificates on the device as they include decryption information of the installed. Console Mode Run headless server VMs in a native terminal Sharing Shared directory, clipboard, and port forwarding Multiple Inputs Support external keyboards, mouse, touchpads, Apple Pencil, and controllers. intunewin files (otherwise we would not have the log file entry :-)). UTM and its dependencies are all free and open source Easy to Use Configure and customize your VM in a native UI. So I wrote a small PowerShell script to parse the logfile and extract all relevant information of the already installed. I discovered that all relevant download and decryption information to get the sources back from your tenant are in the regular log files of the Intune Management Agent here:Ĭ:\ProgramData\Microsoft\IntuneManagementExtension\Logs\IntuneManagementExtension.log.
![portal source unpack open console portal source unpack open console](https://d2908q01vomqb2.cloudfront.net/887309d048beef83ad3eabf2a79a64a389ab1c9f/2021/03/03/Screen-Shot-2021-03-03-at-11.49.29.png)
#Portal source unpack open console how to#
How to get the sources back from the Intune tenant directly?