Back to all tools
PS ScriptTroubleshooting

Intune Log Collector

Intune Log Collector is an Azure-based solution that collects logs from Intune-managed devices, including files, directories, and event logs. It deploys a Function App, Storage Account, and Key Vault, with the Remediation script driving log collection per LogsGatherRules.json and uploading a compressed archive to the logs container. Deployments support Azure Template Spec (Bicep/ARM) or direct ARM templates, with optional UI and post-deployment steps.

Works with
WindowsmacOSGraph APIAzure Automation

Security Analysis

5of 6
1 Issue Found

12 files scanned on Jan 8, 2026

Issues Detected
No Obfuscated Code
No base64 encoded commands or hidden scripts
Base64 decode and execute in Function App/modules/AADDeviceTrust.FunctionApp/Public/Get-AzureADDeviceAlternativeSecurityIds.ps1
Passed Checks
No Remote Execution
No Credential Theft
No Data Exfiltration
No Malicious Patterns
No Hardcoded Secrets
AI Analysis

The codebase implements an Intune Log Collector with legitimate management functionality, but exhibits several security concerns: potential credential leakage via verbose logging of cryptographic material; exposure of a write-enabled SAS token to clients; risk of tampering via automatic loading of Public/Private function files; possible input handling weaknesses when building Graph API queries. No hardcoded secrets detected; secrets appear to be sourced from environment/config and MSI endpoints, requiring strict access controls.

Screenshots