Overview
Analyze application deployment assignments to understand how applications are distributed across the environment. Deployments reveal targeting strategies, security implications, and potential attack opportunities.Syntax
Parameters
The IP address, FQDN, or NetBIOS name of the SMS Provider to connect to
The three-character site code (e.g., “PS1”)
Filter deployments by application name (supports partial matching)
Filter by target collection name
Specify properties to retrieve (can be used multiple times)
Custom WQL WHERE clause for advanced filtering
Return count of results only
Display all deployment properties
Examples
Key Properties
| Property | Description | Values |
|---|---|---|
ApplicationName | Deployed application | Application name |
CollectionName | Target collection | Collection name |
DeploymentIntent | Deployment type | 1 (Required), 2 (Available) |
RequireUserInteraction | User interaction | True/False |
DeploymentTime | Deployment schedule | Timestamp |
EnforcementDeadline | Deadline for installation | Timestamp |
OverrideServiceWindows | Service window override | True/False |
RebootOutsideOfServiceWindows | Reboot permissions | True/False |
Required Permissions
Application Administrator or Read-only Analyst role
Deployment Analysis
Deployment Types
Deployment Types
Required Deployments (DeploymentIntent = 1):
- Forced installation on target systems
- No user choice or intervention
- Automatic execution based on schedule
- User can choose to install
- Visible in Software Center
- User-initiated installation
- Install deployments add software
- Uninstall deployments remove software
- Supersedence deployments replace software
Security Implications
Security Implications
High-Risk Deployments:
- Required deployments with no user interaction
- Deployments that override service windows
- Deployments with forced reboots
- Deployments to administrative collections
- Silent installations (RequireUserInteraction = False)
- Outside maintenance windows
- Immediate execution deployments
Attack Opportunities
Deployment Abuse
Deployment Abuse
Malicious Application Deployment:
- Deploy malicious applications to target collections
- Use required deployments for forced execution
- Target administrative collections for privilege escalation
- Abuse existing deployments for lateral movement
- Modify deployment settings for stealth execution
- Use application supersedence for payload delivery
Collection Targeting
Collection Targeting
High-Value Targets:
- Administrative workstation collections
- Server collections
- Critical infrastructure collections
- All Systems collection for maximum reach
- Domain computer collections for lateral movement
- User collections for credential harvesting
Intelligence Gathering
Organizational Patterns
Organizational Patterns
Deployment Strategies:
- Pilot groups for testing
- Phased rollouts across collections
- Emergency deployments for critical updates
- Service window usage and overrides
- User interaction requirements
- Reboot and maintenance policies
Security Analysis
Security Analysis
Risk Assessment:
- Required deployments with broad targeting
- Silent installations without user notification
- Deployments to privileged collections
- Applications with system-level execution
Common Queries
Use Cases
Attack Vector Analysis
Attack Vector Analysis
Deployment Mechanisms:
- Identify deployment patterns and schedules
- Understand collection targeting strategies
- Analyze security configurations and overrides
- Target deployments to administrative collections
- Abuse system-context applications
- Exploit forced deployment mechanisms
Lateral Movement Planning
Lateral Movement Planning
Collection Analysis:
- Identify broad-reaching collections
- Target specific organizational groups
- Exploit existing deployment relationships
- Use service windows for stealth
- Plan deployments during maintenance windows
- Avoid user interaction and notification
Output Analysis
Deployment Patterns
Deployment Patterns
By Intent:
- Required: Administrative control and compliance
- Available: User choice and self-service
- Broad deployments: Organization-wide software
- Targeted deployments: Role or group-specific software
- Test deployments: Pilot or staging deployments
- Scheduled: Planned deployment windows
- Immediate: Emergency or critical deployments
- Recurring: Ongoing or maintenance deployments
Security Considerations
Security Considerations
High-Risk Deployments:
- Required + Silent + Administrative collections
- System context + Broad targeting
- Service window overrides + Forced reboots
- Unusual deployment patterns
- New deployments to administrative collections
- Silent deployments of unknown applications
Related Commands
get applications- Analyze deployed applicationsget collections- Understand deployment targetsnew application- Create applications for deploymentnew deployment- Create malicious deployments