<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>Intune Customer Success articles</title>
    <link>https://techcommunity.microsoft.com/t5/intune-customer-success/bg-p/IntuneCustomerSuccess</link>
    <description>Intune Customer Success articles</description>
    <pubDate>Sat, 25 Apr 2026 19:39:40 GMT</pubDate>
    <dc:creator>IntuneCustomerSuccess</dc:creator>
    <dc:date>2026-04-25T19:39:40Z</dc:date>
    <item>
      <title>Unpacking Endpoint Management is back - and we’ve got a lot to talk about</title>
      <link>https://techcommunity.microsoft.com/t5/intune-customer-success/unpacking-endpoint-management-is-back-and-we-ve-got-a-lot-to/ba-p/4514599</link>
      <description>&lt;P&gt;If you’ve been missing real, candid conversations about endpoint management, good news! &lt;EM&gt;Unpacking Endpoint Management&lt;/EM&gt; is officially back.&lt;/P&gt;
&lt;P&gt;This series is all about what actually works. No fluff, just practical tips, proven strategies, and honest discussions to help you optimize and simplify the way you manage and secure endpoints today (and prepare for what’s next).&lt;/P&gt;
&lt;P&gt;We’re bringing together people from across Microsoft Intune, Security, and Customer Experience engineering and product teams, along with guest practitioners, to share what’s worked, what hasn’t, and what we’ve learned along the way. And yes…we’re absolutely here for the tough questions.&lt;/P&gt;
&lt;H2&gt;A quick update on the hosts&lt;/H2&gt;
&lt;P&gt;Danny Guillory, a familiar face to the community and a Product Manager for Intune and Configuration Manager, will continue to host the series. He’s joined this season by Rachelle Blanchard as co‑host, bringing a strong community and discovery lens to the series. Rachelle focuses on surfacing real customer questions and guiding conversations toward practical outcomes, helping ensure each episode reflects how endpoint management works in the real world.&lt;/P&gt;
&lt;H2&gt;What’s coming up&lt;/H2&gt;
&lt;P&gt;We’ve got four new episodes lined up, including our first one kicking off next week on &lt;STRONG&gt;April 30&lt;/STRONG&gt;!&lt;/P&gt;
&lt;P&gt;Stay tuned for topics, speakers, and registration details:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-occasion" href="https://techcommunity.microsoft.com/event/microsoftintuneevents/device-security-with-microsoft-intune---unpacking-endpoint-management/4514323" target="_blank" rel="noopener" data-lia-auto-title="Device security with Microsoft Intune - Unpacking Endpoint Management" data-lia-auto-title-active="0"&gt;Device security with Microsoft Intune - Unpacking Endpoint Management&lt;/A&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;April 30 – 9:00 AM PDT&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-occasion" href="https://techcommunity.microsoft.com/event/microsoftintuneevents/unpacking-endpoint-management---may-2026/4514324" target="_blank" rel="noopener" data-lia-auto-title="May 28 – 9:00 AM PDT" data-lia-auto-title-active="0"&gt;May 28 – 9:00 AM PDT&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-occasion" href="https://techcommunity.microsoft.com/event/microsoftintuneevents/unpacking-endpoint-management---june-2026/4514325" target="_blank" rel="noopener" data-lia-auto-title="June 30 – 9:00 AM PDT" data-lia-auto-title-active="0"&gt;June 30 – 9:00 AM PDT&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-occasion" href="https://techcommunity.microsoft.com/event/microsoftintuneevents/unpacking-endpoint-management---july-2026/4514326" target="_blank" rel="noopener" data-lia-auto-title="July 29 – 9:00 AM PDT" data-lia-auto-title-active="0"&gt;July 29 – 9:00 AM PDT&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Be sure to bookmark &lt;A class="lia-external-url" href="https://aka.ms/UEM" target="_blank" rel="noopener"&gt;aka.ms/UEM&lt;/A&gt; or follow this post for the latest schedule updates.&lt;/P&gt;
&lt;H2&gt;What’s the format?&lt;/H2&gt;
&lt;P&gt;This web series is streamed live on Tech Community, LinkedIn, YouTube, and X. In addition to open discussion, we answer &lt;STRONG&gt;your&lt;/STRONG&gt; questions so sign in (or sign up for) the Tech Community and RSVP to submit questions early and throughout the live show.&lt;/P&gt;
&lt;H2&gt;How do I join?&lt;/H2&gt;
&lt;P&gt;There’s no call or meeting to join. Simply head to &lt;A class="lia-external-url" href="https://aka.ms/JoinUEM" target="_blank" rel="noopener"&gt;aka.ms/JoinUEM&lt;/A&gt;. Show up at start time, watch live, and jump into the discussion with us.&lt;/P&gt;
&lt;H2&gt;Help shape the series&lt;/H2&gt;
&lt;P&gt;This series is for you - so tell us what you want to hear. Drop a comment below with:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Topics you’d like us to cover&lt;/LI&gt;
&lt;LI&gt;Tough questions you want answered&lt;/LI&gt;
&lt;LI&gt;Speakers you’d love to hear from&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;We can’t wait to get started - and even more excited to hear from you along the way.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Join the Community to get early insight into what’s coming for Intune, connect with experts, and share real-world feedback that helps shape the product. 👉 &lt;A class="lia-external-url" href="https://aka.ms/JoinIntuneCommunity" target="_blank" rel="noopener"&gt;aka.ms/JoinIntuneCommunity&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 25 Apr 2026 00:05:17 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/intune-customer-success/unpacking-endpoint-management-is-back-and-we-ve-got-a-lot-to/ba-p/4514599</guid>
      <dc:creator>Intune_Support_Team</dc:creator>
      <dc:date>2026-04-25T00:05:17Z</dc:date>
    </item>
    <item>
      <title>As vulnerability discovery moves at AI speed, keeping current is foundational to reduce exposure</title>
      <link>https://techcommunity.microsoft.com/t5/intune-customer-success/as-vulnerability-discovery-moves-at-ai-speed-keeping-current-is/ba-p/4513766</link>
      <description>&lt;P&gt;Recent advances in automation and AI are accelerating vulnerability discovery and shortening the window between disclosure and exploitation. As Microsoft outlined in our recent&amp;nbsp;&lt;A class="lia-external-url" href="https://aka.ms/prioritizingdefense" target="_blank" rel="noopener"&gt;Security blog&lt;/A&gt;, this shift raises the bar for how quickly organizations need to reduce exposure across their environments.&lt;/P&gt;
&lt;P&gt;For IT and security teams, this makes staying current on updates more critical than before. While responding to individual Common Vulnerabilities Exposures (CVE) remains essential, keeping current across devices and applications is foundational to reducing exposure as threats evolve.&lt;/P&gt;
&lt;P&gt;This post focuses on the endpoint execution layer - how Microsoft Intune helps organizations understand their update posture, prioritize action, and reduce the time it takes for protections to land.&lt;/P&gt;
&lt;H2&gt;Introducing the security update status dashboard in Microsoft Intune&lt;/H2&gt;
&lt;P&gt;To act decisively, teams need clear visibility into where systems are current, where gaps exist, and how update deployments are progressing. Without a shared, defensible view of update status, it’s difficult to prioritize remediation or answer a basic question from leadership: &lt;EM&gt;“Are we patched?” &lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;To address this, Intune is introducing the General Availability of a new &lt;A class="lia-external-url" href="https://go.microsoft.com/fwlink/?LinkId=2361207" target="_blank" rel="noopener"&gt;security update status&lt;/A&gt; dashboard providing centralized visibility into update compliance across Windows Clients, Windows Servers, and Microsoft 365 Apps. The dashboard provides a clear, current view for leadership, backed by current data — without switching between multiple reports or tools.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;&lt;EM&gt;Figure 1: Security update dashboard showing patch status for Windows clients, servers, and Microsoft 365 apps.&lt;/EM&gt;&lt;/img&gt;
&lt;P&gt;The dashboard surfaces:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Visibility into which devices are current on quality and feature updates, which are falling behind, and where remediation gaps exist across your Intune-managed estate&lt;/LI&gt;
&lt;LI&gt;The data needed to prioritize action, track progress across deployment rings, and help demonstrate a more accurate compliance posture&lt;/LI&gt;
&lt;LI&gt;Insight to where exposure is critical and needs immediate attention&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2&gt;Four ways to shrink your vulnerability window&lt;/H2&gt;
&lt;P&gt;The dashboard delivers visibility. The capabilities below help you act on it.&lt;/P&gt;
&lt;H3 class="lia-indent-padding-left-30px"&gt;1) Windows Autopatch: deploy updates at scale with control&lt;/H3&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;Windows Autopatch manages update orchestration through predefined deployment rings, releasing updates progressively across representative device groups so that quality and security updates reach broad production populations only after passing validation in pilot environments. IT teams shift from manually coordinating deployment schedules each month to focusing on policy and exception management while Windows Autopatch handles sequencing, scheduling, and rollout logic.&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;When critical vulnerabilities emerge, expedited update deployment allows devices to advance more quickly through the rollout process, providing security teams with an additional lever for reducing time-to-secure when AI-driven discovery shortens the window between disclosure and exploitation.&lt;/P&gt;
&lt;H3 class="lia-indent-padding-left-30px"&gt;2) Hotpatch updates: Windows updates without the reboot&lt;/H3&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;Even when updates deploy rapidly, protection is not realized until a device restarts, and users routinely defer reboots for hours or days. Hotpatch updates for Windows reduces this gap by applying supported security updates to in-memory processes without requiring frequent restarts. Eligible Windows 11 Enterprise devices can reach a protected state immediately after installation, helping reduce the vulnerability window.&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;Operationally, hotpatch updates shifts the restart requirement from monthly update to a smaller number of planned baseline updates per year, enabling organizations to deploy critical fixes without the productivity impact of forced restarts. You can enable hotpatch updates through quality update policies in Intune on supported systems.&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;In addition, with &lt;A class="lia-external-url" href="https://learn.microsoft.com/windows/deployment/windows-autopatch/monitor/windows-autopatch-update-readiness-overview" target="_blank" rel="noopener"&gt;Autopatch update readiness&lt;/A&gt;, IT admins can better anticipate when planned quality or feature updates won’t reach a device, understand Autopatch and hotpatch enrollment coverage, and quickly identify blockers to bringing devices into a ready state.&lt;/P&gt;
&lt;H3 class="lia-indent-padding-left-30px"&gt;3) Microsoft 365 Apps patching: keep Office and other apps current in lockstep&lt;/H3&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;The Microsoft 365 Apps admin center includes Inventory and Cloud Update, giving administrators visibility into update status across connected devices by update channel so they can quickly spot systems missing the latest security updates and track progress. When an accelerated response is required, teams can tighten deadlines and move from staged rollout to immediate enforcement by removing waves, deferrals, or exclusion windows that may delay availability for specific groups, especially where channel divergence or scoped targeting leaves devices outside policy. Because expedited servicing reduces time for testing across diverse configurations, Cloud Update controls such as pausing a deployment or rolling back an update help mitigate risk while closing security gaps quickly.&lt;/P&gt;
&lt;H3 class="lia-indent-padding-left-30px"&gt;4) Server updates: Configuration Manager or Azure Arc to accelerate compliance and operational workloads&lt;/H3&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;For organizations managing servers, &lt;STRONG&gt;Configuration Manager&lt;/STRONG&gt; helps streamline the identification, packaging, and assignment of security updates (for example, with Automatic Deployment Rules) based on classification and severity. Cloud-based sourcing through the Microsoft Update service can prevent deployment failures in distributed environments, while maintenance windows let you pre-stage updates for highly available systems and install them during defined downtime intervals - achieving compliance without unplanned service interruptions. For server estates that are&amp;nbsp;&lt;STRONG&gt;Arc-enabled&lt;/STRONG&gt;, you can also use &lt;STRONG&gt;Azure Arc&lt;/STRONG&gt; to extend visibility and management across hybrid and multicloud infrastructure.&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;If you need even deeper coverage and insight, consider integrating &lt;STRONG&gt;Microsoft Defender Vulnerability Management (MDVM)&lt;/STRONG&gt; to enrich update posture with vulnerability intelligence and prioritize remediation based on real exposure.&lt;/P&gt;
&lt;H2&gt;Using update currency as an enforcement signal&lt;/H2&gt;
&lt;P&gt;Deploying updates is half the job. Verifying they land - and holding the line when they don't - is the other half. Intune compliance policies let you define minimum OS build numbers, required update levels, and grace periods. Devices that fall out of compliance are flagged automatically.&lt;/P&gt;
&lt;P&gt;Paired with Microsoft Entra ID Conditional Access, update currency can become a condition of access - checking that only current, healthy devices connect to corporate resources. This turns update posture into an enforceable control, not just a reporting metric.&lt;/P&gt;
&lt;H2&gt;Actions you can take today&lt;/H2&gt;
&lt;P&gt;The increasing use of AI in vulnerability discovery, combined with a rapidly evolving threat landscape, underscores the importance of taking proactive security measures. Here are actions you can take today:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Assess. &lt;/STRONG&gt;Open the new security update status dashboard and know the baseline of your fleet. See&lt;STRONG&gt; &lt;/STRONG&gt;how many Windows devices are behind on feature releases, quality updates, and Microsoft 365 Apps patches.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Automate. &lt;/STRONG&gt;Configure Windows Autopatch for ring-based deployment, enable hotpatch updates on eligible devices, and set Microsoft 365 Apps servicing profiles. Enable expedited updates so you can respond to critical vulnerabilities quickly.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Enforce. &lt;/STRONG&gt;Pair compliance policies with Conditional Access. Make being current a condition of access to corporate data.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Monitor. &lt;/STRONG&gt;Review the dashboard weekly. Investigate deployment failures promptly and deploy proactive remediations to clear blockers.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Communicate. &lt;/STRONG&gt;Share dashboard trends with security leadership and application owners. When stakeholders see the data, update compliance becomes a shared priority, not just an IT burden.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Evolve. &lt;/STRONG&gt;Revisit your deployment rings, deferral windows, and compliance thresholds quarterly. Use failure patterns from the dashboard to refine your approach and evaluate Windows Autopatch for a fully managed experience that scales with your organization.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Every day a device remains out of date is potential exposure to unnecessary vulnerabilities. Intune gives you the tools, and now the visibility, to get current, stay current, and defend your organization at the speed the threat landscape demands.&lt;/P&gt;
&lt;H2&gt;Closing&lt;/H2&gt;
&lt;P&gt;Reducing exposure starts with knowing where you stand. The &lt;STRONG&gt;security update status dashboard in Intune&lt;/STRONG&gt; provides a single place to understand update status across Windows devices and Microsoft 365 Apps, helping you identify lagging systems and prioritize action.&lt;/P&gt;
&lt;P&gt;Make the dashboard part of your regular operational rhythm: review it, act on the gaps it surfaces, and track progress over time. With the right visibility and tooling, staying current becomes repeatable - not reactive.&lt;/P&gt;
&lt;P&gt;Feature availability varies by license. Learn more about plan details and requirements &lt;A class="lia-external-url" href="https://www.microsoft.com/security/business/microsoft-intune-pricing" target="_blank" rel="noopener"&gt;here&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&lt;A class="lia-external-url" href="https://aka.ms/prioritizingdefense" target="_blank" rel="noopener"&gt;Read the latest Microsoft Security blog&lt;/A&gt; to learn how turning AI‑driven discovery into protection at scale can help secure your estate in an AI‑driven threat landscape.&lt;/P&gt;
&lt;P&gt;&lt;A class="lia-external-url" href="https://security.microsoft.com/securenow" target="_blank" rel="noopener"&gt;Get started with Microsoft Secure Now&lt;/A&gt; for guidance in assessing risk and take recommended actions.&lt;/P&gt;</description>
      <pubDate>Wed, 22 Apr 2026 22:35:25 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/intune-customer-success/as-vulnerability-discovery-moves-at-ai-speed-keeping-current-is/ba-p/4513766</guid>
      <dc:creator>Intune_Support_Team</dc:creator>
      <dc:date>2026-04-22T22:35:25Z</dc:date>
    </item>
    <item>
      <title>Migrating Frontline Mobile Devices: Understanding the reality of your estate</title>
      <link>https://techcommunity.microsoft.com/t5/intune-customer-success/migrating-frontline-mobile-devices-understanding-the-reality-of/ba-p/4511683</link>
      <description>&lt;P&gt;&lt;STRONG&gt;By: Carol Burns - Principal Product Manager | Microsoft Intune and Sucheta Gawade, Microsoft MVP (Azure &amp;amp; Security / Intune)&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Practitioner perspective from &lt;STRONG&gt;Sucheta Gawade&lt;/STRONG&gt;, Microsoft MVP (Azure &amp;amp; Security / Intune), with deep experience in secure frontline mobility, including regulated healthcare environments.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Frontline devices have evolved from a small set of task-specific tools into the way day-to-day work gets done. As new workflows, apps, locations, and teams get added over time, device estates expand quickly, making it harder to maintain consistency and visibility.&lt;/P&gt;
&lt;P&gt;For many organizations, the reality of the estate isn't easy to keep track of. Devices may have been purchased locally, inherited through acquisitions, shared across teams, or left unused in lockers. They may be repurposed for new workflows or kept running far longer than originally planned.&lt;/P&gt;
&lt;P&gt;This creates a gap between what teams think they have, how they expect devices to be used, and what happens in the field.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;“Frontline estates aren’t complex because teams don’t care, they’re complex because operations evolve faster than governance.”&lt;/EM&gt;&lt;/STRONG&gt;&lt;STRONG&gt; -&lt;/STRONG&gt;Sucheta Gawade, Microsoft MVP&lt;/P&gt;
&lt;P&gt;If teams don’t close this gap early, it tends to show up during pilots and cutover: devices fail in real conditions, frontline teams revert to workarounds, and the migration slows down through rework, exceptions, and avoidable disruption.&lt;/P&gt;
&lt;P&gt;To understand the estate, teams need to start by determining what the business needs devices to do and not just who happens to use them.&lt;/P&gt;
&lt;H2&gt;Start with what devices need to do&lt;/H2&gt;
&lt;P&gt;While some devices are assigned to individual users, many are shared across shifts, used for specific tasks, or operate without a fixed user at all.&lt;/P&gt;
&lt;P&gt;Designing a migration around users or roles can obscure what really matters:&lt;STRONG&gt; the job the device must perform, when it must be available, and the impact if it isn’t.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Anchoring on business needs helps teams:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Focus on outcomes rather than ownership models&lt;/LI&gt;
&lt;LI&gt;Simplify stakeholder conversations&lt;/LI&gt;
&lt;LI&gt;Make clearer tradeoffs, when required, around user experience, productivity and security&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;One simple way for teams to gather this information is by mapping business tasks to what devices must reliably do.&lt;/P&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table class="lia-border-style-solid" border="1" style="width: 94.9074%; height: 270px; border-width: 1px;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Business Task&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;What the device must do&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;When it must work&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Impact if unavailable&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Take payment for goods&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Run secure POS applications&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Store open hours&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Lost revenue&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Pick inventory&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Scan bar codes quickly and accurately&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;During shifts&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Orders delayed&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Document patient observations&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Capture and submit clinical data&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;During care delivery&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Delayed or incomplete care&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;colgroup&gt;&lt;col style="width: 25.00%" /&gt;&lt;col style="width: 25.00%" /&gt;&lt;col style="width: 25.00%" /&gt;&lt;col style="width: 25.00%" /&gt;&lt;/colgroup&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This framing applies equally across retail, healthcare, manufacturing, transport, logistics and utilities. It creates a shared language between IT, operations, and security - one that is grounded in business impact rather than tooling.&lt;/P&gt;
&lt;P&gt;Once business needs and intended device usage are clear, the next step is understanding how those devices support frontline work day to day.&lt;/P&gt;
&lt;H2&gt;Understand how devices are used in practice&lt;/H2&gt;
&lt;P&gt;Frontline usage patterns often diverge from what business owners and IT expect. Devices may be shared across shifts or used by alternate users. They may also be repurposed to support new workflows or kept running beyond their intended lifecycle, all without IT or executive oversight.&lt;/P&gt;
&lt;P&gt;These gaps are best identified by partnering with operational and business owners to validate real-world usage through quick workflow walk-throughs, targeted questions, and a review of how devices are accessed and supported day-to-day. Some helpful questions:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;How are devices shared?&lt;/LI&gt;
&lt;LI&gt;When are they offline or unavailable?&lt;/LI&gt;
&lt;LI&gt;What workarounds exist to keep critical tasks moving?&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;It’s also critical to confirm whether corporate-assigned devices have been used for personal activity. Personally used devices may also be treated as work devices, whether authorized or otherwise. This affects wipe and re-enroll decisions because personal use can introduce data retention, user impact, and acceptance risks.&lt;/P&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table class="lia-border-style-solid" border="1" style="width: 97.5926%; height: 169px; border-width: 1px;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Intended usage&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Actual observed use&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Notes/Workarounds&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Assigned device&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Shared across the shift&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Shared credentials used&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Always connected&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Intermittent Wi-Fi&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Offline workarounds&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Single-app device&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Multi-app usage&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Local exceptions for multiple apps&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;colgroup&gt;&lt;col style="width: 33.33%" /&gt;&lt;col style="width: 33.33%" /&gt;&lt;col style="width: 33.33%" /&gt;&lt;/colgroup&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This is also where identity assumptions surface, particularly in environments where devices are shared but access shouldn’t be.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;“Identity reality matters: shared devices should not mean shared credentials. Migration is often the right moment to address this. Otherwise, teams simply re&lt;/EM&gt;&lt;/STRONG&gt;‑&lt;STRONG&gt;&lt;EM&gt;platform the same risks.”&lt;/EM&gt;&lt;/STRONG&gt;&lt;EM&gt; -Sucheta Gawade, Microsoft MVP&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;Teams often uncover important dependencies at this stage. For example, some frontline workflows rely on constant connectivity, while others must function reliably in low‑bandwidth or offline conditions. Similarly, older operating systems or unsupported device models may still be in active use because replacing them has operational or budgetary implications.&lt;/P&gt;
&lt;P&gt;Understanding these realities early helps teams avoid designing for ideal conditions that don’t exist in the field.&lt;/P&gt;
&lt;H2&gt;Ground plans in device inventory&lt;/H2&gt;
&lt;P&gt;Inventory is most valuable when it supports planning decisions, not when it aims for completeness. For frontline migrations, teams need decision relevant information rather than a perfect asset register.&lt;/P&gt;
&lt;P&gt;Understanding how devices are procured and funded across the organization is important. For example, whether devices are purchased centrally through IT or sourced locally by business/departments. Procurement paths often explain why inventory is fragmented and help determine who owns refresh cycles, warranties, and enrollment readiness.&lt;/P&gt;
&lt;P&gt;At a minimum, this includes:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Device types and OEMs&lt;/LI&gt;
&lt;LI&gt;OS version ranges and supportability&lt;/LI&gt;
&lt;LI&gt;Whether devices are active, dormant, or missing&lt;/LI&gt;
&lt;LI&gt;How devices align to business-critical tasks&lt;/LI&gt;
&lt;LI&gt;Where specialist or certified devices are required such as intrinsically safe or ruggedized devices&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;This helps surface ecosystem considerations early:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Are required apps and services supported on the OS versions in use today?&lt;/LI&gt;
&lt;LI&gt;Do OEMs still support the hardware?&lt;/LI&gt;
&lt;LI&gt;Do environment constraints affect enrollment, updates, or day‑to‑day operation?&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;These questions are not about selecting solutions yet. They’re about understanding constraints that will shape options later.&lt;/P&gt;
&lt;P&gt;With business needs understood, usage patterns mapped, and inventory validated, teams are ready to start designing approaches that work in frontline conditions.&lt;/P&gt;
&lt;P&gt;Migration is also a good opportunity to plan for standardization and set a future procurement standard. Even if you migrate the current estate as-is, defining an approved OEM or model catalog for future purchases improves consistency. It can also accelerate troubleshooting and strengthen lifecycle governance as devices reach end of support.&lt;/P&gt;
&lt;H2&gt;What we’ve learned&lt;/H2&gt;
&lt;P&gt;The key lesson is simple: validate reality before designing anything.&lt;/P&gt;
&lt;P&gt;Teams that invest time here:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Reduce rework during pilots&lt;/LI&gt;
&lt;LI&gt;Avoid late‑stage surprises&lt;/LI&gt;
&lt;LI&gt;Have stronger conversations with operational, security, and platform stakeholders&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;“We don’t declare success at&amp;nbsp;&lt;/EM&gt;&lt;/STRONG&gt;&lt;STRONG&gt;&lt;EM&gt;enrollment&lt;/EM&gt;&lt;/STRONG&gt;&lt;STRONG&gt;&lt;EM&gt;. We declare success when a frontline workflow can run end-to-end with predictable support.” -&lt;/EM&gt;&lt;/STRONG&gt;&lt;EM&gt;Sucheta Gawade, Microsoft MVP&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;In future articles, we’ll look at how these insights shape design decisions. In the meantime, we’re interested in hearing what gaps you’ve uncovered between intended and actual device usage in your frontline environments. Leave a comment below or reach out on X &lt;A class="lia-external-url" href="https://aka.ms/IntuneSuppTeam" target="_blank" rel="noopener"&gt;@IntuneSupportTeam&lt;/A&gt;.&lt;/P&gt;</description>
      <pubDate>Wed, 15 Apr 2026 21:04:35 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/intune-customer-success/migrating-frontline-mobile-devices-understanding-the-reality-of/ba-p/4511683</guid>
      <dc:creator>Intune_Support_Team</dc:creator>
      <dc:date>2026-04-15T21:04:35Z</dc:date>
    </item>
    <item>
      <title>Create historical reports using Azure Log Analytics and Microsoft Intune diagnostic data</title>
      <link>https://techcommunity.microsoft.com/t5/intune-customer-success/create-historical-reports-using-azure-log-analytics-and/ba-p/4508971</link>
      <description>&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;By: Janusz Gal – Sr Product Manager | Microsoft Intune&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Azure Log Analytics gives Intune admins a flexible way to create custom reports from diagnostic data, especially when you need longer history or tailored calculations that go beyond what the Microsoft Intune admin center’s built-in reports provide. By using the Intune diagnostic data you’re already collecting, you can customize reporting for your organization’s unique requirements. In this post, you’ll walk through the steps to create a 30-day device compliance trend report. The resultant report can be run automatically, used in dashboards, or even further customized for a longer period or with additional data.&lt;/P&gt;
&lt;P&gt;Before we begin, if you haven’t configured a Log Analytics workspace in your tenant, review the following detailed information on the pre-requisites and costs on Microsoft Learn: &lt;A class="lia-external-url" href="https://learn.microsoft.com/intune/intune-service/fundamentals/review-logs-using-azure-monitor" target="_blank" rel="noopener"&gt;Route logs to Azure Monitor using Microsoft Intune&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;In the Microsoft Intune admin center, navigate to&amp;nbsp;&lt;STRONG&gt;Reports &amp;gt; Diagnostic settings&lt;/STRONG&gt;, and add a new Diagnostic setting policy to send data to a Log Analytics workspace.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;img&gt;
&lt;P&gt;Figure 1 Reports &amp;gt; Diagnostic settings, used to configure new or existing diagnostic settings.&lt;/P&gt;
&lt;/img&gt;
&lt;P&gt;For a device compliance trend report, ensure the &lt;STRONG&gt;Devices&lt;/STRONG&gt; log category is selected:&lt;/P&gt;
&lt;img&gt;
&lt;P&gt;Figure 2 Reports &amp;gt; Diagnostic settings &amp;gt; Selected configuration; Devices log selected.&lt;/P&gt;
&lt;/img&gt;
&lt;P&gt;After configuring the setting, navigate to &lt;STRONG&gt;Reports &amp;gt;&lt;/STRONG&gt; under Azure monitor, &lt;STRONG&gt;Log Analytics.&lt;/STRONG&gt;&lt;/P&gt;
&lt;img&gt;
&lt;P&gt;Figure 3 Reports &amp;gt; Log Analytics; used to query log Analytics workspaces.&lt;/P&gt;
&lt;/img&gt;
&lt;P&gt;In the &lt;STRONG&gt;New Query &lt;/STRONG&gt;window, enter the following query:&lt;/P&gt;
&lt;LI-CODE lang="json"&gt;IntuneDevices
| where TimeGenerated &amp;gt; ago(30d)
| summarize
    Total = count(),
    Compliant = countif(CompliantState == "Compliant"),
    NonCompliant = countif(CompliantState == "Noncompliant"),
    InGracePeriod = countif(CompliantState == "InGracePeriod"),
    NotEvaluated = countif(CompliantState == "Not Evaluated" or CompliantState == ""),
    ConfigManager = countif(CompliantState == "ConfigManager")
    by bin(TimeGenerated, 1d)
| extend ComplianceRate = round(100.0 * Compliant / Total, 2)
| order by TimeGenerated asc&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This query will return daily device compliance trends over the past 30 days, from the IntuneDevice table.&lt;/P&gt;
&lt;img&gt;
&lt;P&gt;Figure 4 Reports &amp;gt; Log Analytics; results after running query.&lt;/P&gt;
&lt;/img&gt;
&lt;P&gt;Select &lt;STRONG&gt;Chart&lt;/STRONG&gt; &lt;STRONG&gt;&amp;gt; Chart type &amp;gt; Stacked Area &lt;/STRONG&gt;to show a visual of the trending device state over time.&lt;/P&gt;
&lt;img&gt;
&lt;P&gt;Figure 5 Reports &amp;gt; Log Analytics &amp;gt; Chart &amp;gt; Stacked Area.&lt;/P&gt;
&lt;/img&gt;
&lt;P&gt;If you’d like to create other reports but aren’t sure of the schema, one trick you can use is to run the following query in the above Log Analytics workspace to get all the column names:&lt;/P&gt;
&lt;LI-CODE lang="json"&gt;IntuneDevices
| getschema
&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Then to get all the values from those columns, you can modify the query to return the distinct values from a specific column such as &lt;EM&gt;CompliantState&lt;/EM&gt;:&lt;/P&gt;
&lt;LI-CODE lang="json"&gt;IntuneDevices
| distinct CompliantState&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now that you have the query created in Log Analytics, you can save it to run anytime, pin it to a dashboard, or even create a new alert rule to let you know if compliance has gone below a certain threshold.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To pin it as a dashboard, on the Query pane select the ellipsis (&lt;STRONG&gt;…&lt;/STRONG&gt;)&lt;STRONG&gt; &amp;gt; Pin to &amp;gt; Azure dashboard.&lt;/STRONG&gt;&lt;/P&gt;
&lt;img&gt;
&lt;P&gt;Figure 6 Reports &amp;gt; Log Analytics; pin query to dashboard flow.&lt;/P&gt;
&lt;/img&gt;
&lt;P&gt;Then select the dashboard you’d like to use.&lt;/P&gt;
&lt;img&gt;
&lt;P&gt;Figure 7 Reports &amp;gt; Log Analytics; select dashboard to pin.&lt;/P&gt;
&lt;/img&gt;
&lt;P&gt;Once pinned, simply navigate to &lt;STRONG&gt;Dashboard &lt;/STRONG&gt;within the Intune admin center, and you’ll see the query pinned on the selected dashboard.&lt;/P&gt;
&lt;img&gt;
&lt;P&gt;Figure 8 Dashboard showing Log Analytics query.&lt;/P&gt;
&lt;/img&gt;
&lt;P&gt;To show more than the past 24-hours, select the &lt;STRONG&gt;Customize Tile &lt;/STRONG&gt;button and select &lt;STRONG&gt;Override the dashboard time settings at the tile level, &lt;/STRONG&gt;with &lt;STRONG&gt;Timespan &lt;/STRONG&gt;set to &lt;STRONG&gt;Past 30 days.&lt;/STRONG&gt;&lt;/P&gt;
&lt;img&gt;
&lt;P&gt;Figure 9 Dashboard &amp;gt; Selected Query &amp;gt; Customize Tile button.&lt;/P&gt;
&lt;/img&gt;
&lt;P&gt;If you’d like to always see the data in a chart form, select the &lt;STRONG&gt;edit&lt;/STRONG&gt; icon on the pinned dashboard item and append the following to the end of the query:&lt;/P&gt;
&lt;LI-CODE lang="json"&gt;| render areachart with (kind=stacked)&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;
&lt;P&gt;Figure 10 Dashboard &amp;gt; Selected query &amp;gt; Edit &amp;gt; modified query to show chart.&lt;/P&gt;
&lt;/img&gt;
&lt;P&gt;After clicking &lt;STRONG&gt;Apply&lt;/STRONG&gt;, the dashboard shows the following:&lt;/P&gt;
&lt;img&gt;
&lt;P&gt;Figure 11 Dashboard showing updated historical device compliance query as a stacked area chart.&lt;/P&gt;
&lt;/img&gt;
&lt;P&gt;You’ve now seen end-to-end how to turn Intune diagnostic data into a 30-day device compliance trend report with diagnostic data and Log Analytics. From here, the next step is to operationalize it - save the query, extend the timeframe, join in additional diagnostic tables, or set an alert so you’re notified when compliance drops below your threshold. Better yet, see if you can pick one reporting gap your team is living with today and build it using this pattern. With the right tooling, Intune data can be shaped into views and insights that reflect your organization’s unique needs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Let us know if you have any questions by leaving a comment below or reach out on X &lt;A class="lia-external-url" href="https://aka.ms/IntuneSuppTeam" target="_blank" rel="noopener"&gt;@IntuneSuppTeam&lt;/A&gt;!&lt;/P&gt;</description>
      <pubDate>Tue, 07 Apr 2026 23:27:45 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/intune-customer-success/create-historical-reports-using-azure-log-analytics-and/ba-p/4508971</guid>
      <dc:creator>Intune_Support_Team</dc:creator>
      <dc:date>2026-04-07T23:27:45Z</dc:date>
    </item>
    <item>
      <title>Migrating frontline mobile devices: A frontline-first approach to moving to Microsoft Intune</title>
      <link>https://techcommunity.microsoft.com/t5/intune-customer-success/migrating-frontline-mobile-devices-a-frontline-first-approach-to/ba-p/4501347</link>
      <description>&lt;P&gt;Frontline organizations consistently tell us that unified management is the goal but the challenge is getting there without disrupting day-to-day operations. Smartphones, Android handhelds, rugged scanners, and shared tablets now sit at the center of how retail stores run, how clinicians deliver care, how supply chains move, and how field workers’ complete work. These devices are mission critical, and any disruption is immediately felt on the ground.&lt;/P&gt;
&lt;P&gt;To strengthen security, reduce costs, and simplify operations, many IT architects and administrators are now evaluating or planning to move to Intune.&lt;/P&gt;
&lt;P&gt;This new series, “&lt;EM&gt;Migrating Frontline Mobile Devices - &lt;/EM&gt;is designed to help. We’ve worked side by side with frontline customers, observing what works, where projects stall, and how small decisions early on can dramatically improve outcomes later. The articles in this series distil those lessons into practical guidance for teams who are considering, planning, or actively migrating devices.&lt;BR /&gt;&lt;BR /&gt;Frontline devices serve different needs and follow different operational rhythms than knowledge worker devices. Frontline migrations aren’t the same as standard knowledge-worker migrations and treating them as such often leads to operational problems or rollout delays.&lt;/P&gt;
&lt;P&gt;This article explains what the difference means in practice and how it shapes planning for successful frontline migrations.&lt;/P&gt;
&lt;H3&gt;Why failures hurt more on the frontline&lt;/H3&gt;
&lt;P&gt;A failed knowledge worker enrollment is an inconvenience. A failed frontline device enrollment or non-functioning device can affect revenue, disrupt essential services, and in some industries compromise safety. When a device is unavailable, critical work halts immediately:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Pickers can’t complete scanning tasks&lt;/LI&gt;
&lt;LI&gt;Cashiers can’t take payments&lt;/LI&gt;
&lt;LI&gt;Health practitioners can’t document or prescribe care&lt;/LI&gt;
&lt;LI&gt;Drivers can’t dispatch&lt;/LI&gt;
&lt;LI&gt;Production lines stop&lt;/LI&gt;
&lt;LI&gt;Workers can’t perform required safety or compliance actions&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;What we’ve learned:&lt;/STRONG&gt; Frontline migrations must be coordinated with business and operational leaders; store managers, shift supervisors, clinical leads, and supply chain teams because they decide what is required and when devices can be taken offline.&lt;/P&gt;
&lt;H3&gt;Why mobile frontline device migrations are different&lt;/H3&gt;
&lt;P&gt;The operational impact of failure is higher on the frontline because frontline devices operate in very different environments to knowledge worker devices.&lt;/P&gt;
&lt;P&gt;Knowledge worker devices usually run in stable, well understood environments with known device catalogues, predictable lifecycles, assigned users, and steady connectivity.&lt;/P&gt;
&lt;P&gt;Frontline devices operate in conditions that introduce unique design and migration challenges. The environments they run in directly affect how and when a device can be enrolled or updated. Devices may run in low bandwidth or intermittent connectivity environments, making enrollment flows and policy delivery harder to complete reliably. Some operate in high-risk industrial or clinical settings where devices can only be taken offline during narrow operational windows. Others return to charging racks between shifts, meaning migrations must align with shift changes rather than user availability. Many run in kiosk or locked task modes tied to a single workflow, so even small configuration changes can disrupt critical tasks if not planned carefully.&lt;/P&gt;
&lt;P&gt;These environmental and operational realities show up across the entire device lifecycle from provisioning to updates to support. To make the differences clearer, here’s a concise comparison of frontline and knowledge worker devices:&lt;/P&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table class="lia-border-style-solid" border="1" style="border-width: 1px;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Category&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Frontline devices&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Knowledge worker devices &lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Devices &lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Smartphones, handhelds, rugged devices, scanners, wearables, tablets&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Laptops, desktops, smartphones&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;OS and patch posture&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Often older versions; inconsistent patch levels due to operational constraints&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Typically, current OS or N-1; regular security patching cycles&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Ownership&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Shared, shift-based or individually assigned depending on role&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Individually assigned&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Network conditions&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Variable, often constrained&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Generally stable&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Provisioning&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Zero-touch essential&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;User-led viable&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Updates&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Highly controlled&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Standard update cycles&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Apps&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Task-specific, time-sensitive updates&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Broad, less time critical updates&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Workflow impact&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Operationally critical&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Productivity-focused&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Typical usage scenarios&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Point-of-sale, healthcare, barcode scanning, delivery routing, inventory checks&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Email, productivity tools, collaboration, creative workflows&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Failure impact &lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Immediate operational issues&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Localized user disruption&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;colgroup&gt;&lt;col style="width: 33.33%" /&gt;&lt;col style="width: 33.33%" /&gt;&lt;col style="width: 33.33%" /&gt;&lt;/colgroup&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Standard knowledge worker migrations are designed for predictable conditions such as consistent users, steady connectivity, current OS levels, and a governed device lifecycle. Frontline fleets rarely match this baseline, so their migrations require planning and design that reflects actual device state and use&lt;STRONG&gt;.&lt;/STRONG&gt;&lt;/P&gt;
&lt;H3&gt;A migration is a design moment, not just a technical step&lt;/H3&gt;
&lt;P&gt;A migration offers an opportunity to reassess business needs, tighten governance, simplify and modernize app delivery, and confirm assumptions about how devices are used. It’s also a chance to raise your frontline security, aligning devices with Zero Trust principles.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;In successful frontline migrations:&lt;/STRONG&gt; Teams build in time for design, evaluation, and piloting. Early alignment across stakeholders supports smoother execution and reduces the risk of disruptive rework later.&lt;/P&gt;
&lt;H3&gt;Understand your estate before designing the migration&lt;/H3&gt;
&lt;P&gt;Frontline migration projects always reveal something unexpected. Common patterns include:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Mixed iOS/Android versions and multiple original equipment manufacturers (OEM) such as Samsung, Zebra, Honeywell, Apple and more.&lt;/LI&gt;
&lt;LI&gt;Devices running outdated OS versions or custom OEM images.&lt;/LI&gt;
&lt;LI&gt;Devices that haven’t checked in for months, often sitting unused in cabinets.&lt;/LI&gt;
&lt;LI&gt;App delivery paths reliant on sideloading or site specific packages with no update mechanism.&lt;/LI&gt;
&lt;LI&gt;Multiple active mobile device management (MDM) systems inherited through acquisitions or decentralized teams.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Most migration issues that appear later in the project can be traced back to decisions made before anyone understood what existed in the field, how devices were being used, or what the business needed them to do in the future.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;What we’ve learned: &lt;/STRONG&gt;Migration success improves dramatically when teams validate device inventory, usage patterns, and business requirements before choosing an enrollment method and designing configuration profiles. Real-world data turns assumptions into facts and avoids costly rework.&lt;/P&gt;
&lt;H3&gt;Plan for identity – even if devices don’t use it today&lt;/H3&gt;
&lt;P&gt;Many frontline devices run with shared logins or no user at all. Intune fully supports these scenarios, but identity gaps - shared credentials, app only authentication, and managed access patterns - often emerge over years of organic growth. These gaps can show up during migrations as both user experience issues and security risks.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;What we’ve learned:&lt;/STRONG&gt; Even if you’re not ready to modernize frontline identity or introduce Microsoft 365 tools for workers, consider laying out the foundation. Mapping which users or roles should have identities, simplifying and securing access, and aligning devices to Microsoft Entra foundations will future proof your estate.&lt;/P&gt;
&lt;H3&gt;What’s coming next in the series&lt;/H3&gt;
&lt;P&gt;This series will explore the areas that consistently shape successful frontline mobile migrations the steps, patterns, and design decisions that matter most in real frontline environments. Over the coming weeks we’ll cover themes such as:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Understanding your frontline estate - what exists today, how devices are used, and the realities that shape migration decisions&lt;/LI&gt;
&lt;LI&gt;Designing for frontline conditions - identity foundations, shared device patterns, kiosk considerations, and reliable enrolment flows&lt;/LI&gt;
&lt;LI&gt;Designing for frontline device scenarios - single user, shared, rugged, kiosk, and high-risk operational models&lt;/LI&gt;
&lt;LI&gt;Consolidating to a single Intune tenant - simplifying governance, policies, and operating models&lt;/LI&gt;
&lt;LI&gt;Getting the ecosystem right - apps, connectivity, certificates, and the infrastructure dependencies that influence reliability&lt;/LI&gt;
&lt;LI&gt;Executing the migration safely - pilots, phasing, cutover windows, and planning for 24/7 operations&lt;/LI&gt;
&lt;LI&gt;Life after migration - monitoring, support readiness, and ongoing operational ownership&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;We’ll share practical guidance, common friction points, and patterns we’ve seen work across industries.&lt;/P&gt;
&lt;P&gt;Future articles will include perspectives from Microsoft Product Managers and community experts with hands-on experience managing large scale frontline device estates. Look out for the next article in the series - Understanding the reality of your estate.&lt;/P&gt;
&lt;P&gt;We’d love to include your perspective. If you have questions, scenarios, or experiences you want this series to address, share them in the comments below to help shape the upcoming articles, or reach out to us on X &lt;A href="https://aka.ms/IntuneSuppTeam" target="_blank" rel="noopener"&gt;@IntuneSuppTeam.&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Our goal is simple: To help you migrate frontline mobile fleets to Intune without disrupting the business.&lt;/P&gt;</description>
      <pubDate>Mon, 30 Mar 2026 17:52:54 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/intune-customer-success/migrating-frontline-mobile-devices-a-frontline-first-approach-to/ba-p/4501347</guid>
      <dc:creator>Intune_Support_Team</dc:creator>
      <dc:date>2026-03-30T17:52:54Z</dc:date>
    </item>
    <item>
      <title>Best practices for securing Microsoft Intune</title>
      <link>https://techcommunity.microsoft.com/t5/intune-customer-success/best-practices-for-securing-microsoft-intune/ba-p/4502117</link>
      <description>&lt;P&gt;Microsoft Intune gives IT and security teams a powerful way to manage endpoints at scale - deploying apps, enforcing security baselines, and configuring the settings that keep users productive and your organization protected. That’s why strong admin protections matter, so the right people can make the right changes, in the right scope, with the right safeguards.&lt;/P&gt;
&lt;P&gt;In this post, we’ll walk through three practical approaches to strengthen Intune protections:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;Start with least-privilege&lt;/STRONG&gt;, designing roles around real admin jobs&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Embrace phishing-resistant authentication and privileged access hygiene&lt;/STRONG&gt;, leveraging Microsoft Entra capabilities to reduce account and token compromise&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Enable Multi Admin Approval&lt;/STRONG&gt; in Intune for sensitive changes&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;Below we outline how to put each approach into practice.&lt;/P&gt;
&lt;H2&gt;1) Start with least-privilege: design roles around real admin jobs&lt;/H2&gt;
&lt;P&gt;Least-privilege works best when it’s grounded in how your team operates. As a best practice, don’t grant more administrative access than a role truly needs. In Intune, &lt;A class="lia-external-url" href="https://go.microsoft.com/fwlink/?linkid=2356284" target="_blank"&gt;role-based access control&lt;/A&gt; (RBAC) lets you tailor permissions and scopes so teams can run day-to-day operations with the minimum set of permissions required, nothing more. Microsoft Entra ID roles that have access to Intune, such as Global Administrator and Intune Administrator, are considered privileged roles with broad permissions in Intune. The use and assignment of privileged roles should be limited and not used for daily administrative tasks within Intune.&lt;/P&gt;
&lt;P&gt;Least-privilege is about limiting both the actions an admin can take and the users/devices those actions can be applied to. In Intune RBAC, scope tags enable you to constrain an admin’s visibility and actions to a defined set of users and devices - for example, only the devices assigned to a specific region, business unit, or platform team. When implementing RBAC policies, limit both the actions and users/devices an admin has permissions over.&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Call to action&lt;/STRONG&gt;: Treat&amp;nbsp;Intune administration&amp;nbsp;as a set of job-specific roles,&amp;nbsp;not a blanket entitlement.&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Inventory who has Intune Administrator, Global Administrator, or other high-impact roles, then remove broad assignments that don’t map to a named job function.&lt;/LI&gt;
&lt;LI&gt;Leverage Intune built-in role definitions for common personas (Help Desk Operator, Application Manager, Endpoint Security Manager, Read Only Operator) and standardize assignments. Create &lt;A class="lia-external-url" href="https://go.microsoft.com/fwlink/?linkid=2356173" target="_blank"&gt;custom roles&lt;/A&gt; for ultimate least-privilege control.&lt;/LI&gt;
&lt;LI&gt;Implement scoped administration (scope groups and &lt;A class="lia-external-url" href="https://go.microsoft.com/fwlink/?linkid=2310700" target="_blank"&gt;scope tags&lt;/A&gt;) for business units, regions, or platform teams, and validate that admins can only affect resources within their assigned scope.&lt;/LI&gt;
&lt;LI&gt;Adopt time-bound privilege elevation such as Microsoft &lt;A class="lia-external-url" href="https://www.microsoft.com/security/business/identity-access/microsoft-entra-privileged-identity-management-pim" target="_blank"&gt;Entra Privileged Identity Management&lt;/A&gt; (PIM) for admin roles and require reauthentication on elevation and sensitive operations.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2&gt;2) Embrace phishing-resistant authentication and privileged access hygiene&lt;/H2&gt;
&lt;P&gt;The security objective is straightforward: privileged access should be &lt;STRONG&gt;hard to obtain&lt;/STRONG&gt; and &lt;STRONG&gt;hard to reuse&lt;/STRONG&gt;. Microsoft Entra ID capabilities (&lt;A class="lia-external-url" href="https://go.microsoft.com/fwlink/?linkid=2356286" target="_blank"&gt;Conditional Access&lt;/A&gt;, &lt;A class="lia-external-url" href="https://go.microsoft.com/fwlink/?linkid=2356287" target="_blank"&gt;phishing-resistant multifactor authentication&lt;/A&gt; (MFA), &lt;A class="lia-external-url" href="https://go.microsoft.com/fwlink/?linkid=2356388" target="_blank"&gt;risk signals&lt;/A&gt;, and &lt;A class="lia-external-url" href="https://go.microsoft.com/fwlink/?linkid=2356388" target="_blank"&gt;privileged access controls&lt;/A&gt;) provide the policy engine that governs who can administer Intune, from where, and under what conditions.&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Call to action:&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; Every&amp;nbsp;privileged&amp;nbsp;Intune action&amp;nbsp;(Intune RBAC Role Management,&amp;nbsp;device wipe, script deployment)&amp;nbsp;should&amp;nbsp;require strong, policy-verified sign-in,&amp;nbsp;not just a password.&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A class="lia-external-url" href="https://go.microsoft.com/fwlink/?linkid=2356285" target="_blank"&gt;Create Conditional Access policies&lt;/A&gt; dedicated to privileged roles and admin portals (Intune, Microsoft Entra, and related admin endpoints): require phishing-resistant authentication only, require a compliant device, challenge high-risk users or sign-ins, and restrict access by location or trusted network where feasible. Reduce or eliminate policy exclusions.&lt;/LI&gt;
&lt;LI&gt;Eliminate standing access by using Microsoft &lt;A class="lia-external-url" href="https://learn.microsoft.com/entra/id-governance/privileged-identity-management/pim-configure" target="_blank"&gt;Entra Privileged Identity Management&lt;/A&gt; to assign time-bound roles based on conditions and approval steps, including restricting access to who can administer and assign permissions to apps.&lt;/LI&gt;
&lt;LI&gt;Move privileged accounts to phishing-resistant authentication methods and disable weaker methods for those accounts and through policy (see &lt;A class="lia-external-url" href="https://learn.microsoft.com/entra/identity/authentication/how-to-deploy-phishing-resistant-passwordless-authentication" target="_blank"&gt;Plan a phishing-resistant passwordless authentication deployment)&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;Establish &lt;A class="lia-external-url" href="https://learn.microsoft.com/security/privileged-access-workstations/privileged-access-devices" target="_blank"&gt;privilege admin workstations&lt;/A&gt; with higher security baselines and use them for Intune high privilege admin accounts.&lt;/LI&gt;
&lt;LI&gt;Operationalize your &lt;A class="lia-external-url" href="https://learn.microsoft.com/security/operations/token-theft-playbook#investigations" target="_blank"&gt;token theft response&lt;/A&gt; plan by investigating risky sign-ins and unusual admin activity in Microsoft Defender XDR with signals from Microsoft Entra, Microsoft Defender for Cloud Apps, and Microsoft Defender for Endpoints.&lt;/LI&gt;
&lt;LI&gt;Adopt a defense‑in‑depth strategy to reduce the risk and impact of token theft (see &lt;A class="lia-external-url" href="https://learn.microsoft.com/entra/identity/devices/protecting-tokens-microsoft-entra-id" target="_blank"&gt;Protecting tokens in Microsoft Entra&lt;/A&gt;).&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2&gt;3) Multi-admin approval in Intune for sensitive changes&lt;/H2&gt;
&lt;P&gt;&lt;A class="lia-external-url" href="https://go.microsoft.com/fwlink/?linkid=2356383" target="_blank"&gt;Multi Admin Approval&lt;/A&gt; introduces a practical governance control: selected Intune changes require a second authorized admin to review and approve before deployment. This is enforced for both Intune admin center actions and actions performed through Intune APIs. Multi Admin Approval reduces the risk that a single action can result in tenant-wide impact.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Call to action&lt;/STRONG&gt;: Require a second approval for high-impact Intune workflows (such as Intune RBAC role management, device wipe, and script deployment) to add an additional safeguard and help contain potential tenant wide impact.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Decide which change types require approval - start with high-impact changes such as Intune RBAC role management and device wipe. Then, add access policies for changes that affect authentication, compliance, security baselines, or broad assignment scopes.&lt;/LI&gt;
&lt;LI&gt;Define approver roles and coverage (who can approve, SLAs, and what happens during incidents).&lt;/LI&gt;
&lt;LI&gt;Document an emergency/break-glass path with explicit post-change review, so speed doesn’t erase governance.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2&gt;How these measures add up to strong administrative protections&lt;/H2&gt;
&lt;P&gt;When combined, these practices help you shift from relying on “trusted administrators” toward building a more protected administration by design: least-privilege to contain impact, Microsoft Entra-based controls to ensure users are trusted and are who they say they are, and multi-admin approval to govern the changes that matter most. These practices help organizations advance safer speed, clearer separation of duties, stronger audit readiness, and more resilient endpoint operations.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;If you’re looking for a place to start, here are a few quick steps:&lt;/STRONG&gt; start with a quick wins pass - inventory broad, standing Intune role assignments and replace them with least-privilege RBAC roles; enforce Conditional Access and adopt phishing-resistant multifactor authentication for all admin scenarios; and place Intune RBAC role management, device wipe, script deployment behind multi-admin approval.&lt;/P&gt;</description>
      <pubDate>Sat, 14 Mar 2026 22:31:16 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/intune-customer-success/best-practices-for-securing-microsoft-intune/ba-p/4502117</guid>
      <dc:creator>Intune_Support_Team</dc:creator>
      <dc:date>2026-03-14T22:31:16Z</dc:date>
    </item>
    <item>
      <title>Rethinking “Allow my organization to manage my device” Why opt‑in enrollment works better for Intune</title>
      <link>https://techcommunity.microsoft.com/t5/intune-customer-success/rethinking-allow-my-organization-to-manage-my-device-why-opt-in/ba-p/4499766</link>
      <description>&lt;P&gt;&lt;STRONG&gt;By: Ramya B Sharma – Senior Software Engineer | Microsoft Intune&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;A new public preview feature in Microsoft Intune, we’ve introduced a toggle that allows admins to block automatic mobile device management (MDM) enrollment during the modern app sign-in flow on Windows. This enhancement directly responds to frequent customer requests for greater control over device enrollment, specifically the ability to prevent automatic MDM enrollment on Windows devices during app sign-in.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;While Microsoft Entra generally recommends automatic enrollment by default, most Intune customers - especially those supporting bring your own device (BYOD), mixed ownership, or multi-tenant access scenarios - benefit from an opt-in enrollment model instead.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;Recommended best practice&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;Keep “MDM user scope”&lt;STRONG&gt; &lt;/STRONG&gt;set to&lt;STRONG&gt; All&lt;/STRONG&gt; so enrollment is available when needed, but configure the new toggle “Disable MDM enrollment when adding a work or school account on Windows” to &lt;STRONG&gt;Yes &lt;/STRONG&gt;so MDM enrollment is not automatically selected by default during app sign in. This ensures devices are enrolled into Intune only through intentional enrollment flows, reducing accidental enrollments, support burden, and difficult recovery scenarios. Learn more:&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/windows/client-management/azure-ad-and-microsoft-intune-automatic-mdm-enrollment-in-the-new-portal" target="_blank" rel="noopener"&gt;Automatic MDM enrollment in the Intune admin center&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;Why this matters&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;For years, Windows users signing into work or school apps have been presented with:&lt;/P&gt;
&lt;P&gt;“Allow my organization to manage my device.”&lt;/P&gt;
&lt;P&gt;In most environments, this option was selected by default or clicked through without full understanding. That single action could result in:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Microsoft Entra device registration&lt;/LI&gt;
&lt;LI&gt;Automatic Intune MDM enrollment&lt;/LI&gt;
&lt;LI&gt;Immediate policy application to the device&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;For IT teams, this often led to:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Unintended device enrollments&lt;/LI&gt;
&lt;LI&gt;Personal or BYOD devices becoming fully managed&lt;/LI&gt;
&lt;LI&gt;Difficult unenrollment and recovery experiences&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;The new public preview toggle directly addresses these long‑standing issues.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;How the modern app sign in enrollment flow works&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;When a user signs into a Microsoft work or school app on Windows, Windows may start a device registration flow. Historically, if:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Automatic enrollment was enabled, and&lt;/LI&gt;
&lt;LI&gt;The user was in the MDM user scope&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Then registration could immediately turn into full MDM enrollment, even though the user only intended to sign into an app.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;What the new toggle changes&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;The new setting&lt;STRONG&gt;“&lt;/STRONG&gt;Disable MDM enrollment when adding a work or school account on Windows&lt;STRONG&gt;”:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Allows account registration&lt;/LI&gt;
&lt;LI&gt;Stops the flow before MDM enrollment&lt;/LI&gt;
&lt;LI&gt;Removes the “Allow my organization to manage my device” screen from the app sign-in flow&lt;/LI&gt;
&lt;LI&gt;Preserves intentional enrollment paths&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Important:&lt;/STRONG&gt; This setting applies to modern app sign in flows, not Windows &lt;STRONG&gt;s&lt;/STRONG&gt;ettings–based enrollment.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Allowing enrollment versus forcing enrollment&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;This distinction is critical.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Allowing enrollment:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;MDM user scope is configured to “All” or “Some”&lt;/LI&gt;
&lt;LI&gt;Enrollment is available when needed&lt;/LI&gt;
&lt;LI&gt;Devices enroll through deliberate flows&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Forcing enrollment&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Enrollment triggered implicitly&lt;/LI&gt;
&lt;LI&gt;App sign in becomes an enrollment decision&lt;/LI&gt;
&lt;LI&gt;Users may not realize the device is managed&lt;/LI&gt;
&lt;LI&gt;Recovery is harder later&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;The new toggle lets organizations separate these behaviors.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Impact across common Windows enrollment scenarios&lt;/STRONG&gt;&lt;/P&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table class="lia-border-style-solid" border="1" style="border-width: 1px;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Scenario&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Default behavior&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Opt-in recommended behavior&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;BYOD / personal devices&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;High risk of accidental enrollment&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;App access without device takeover&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Microsoft Office / Teams sign in&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;May initiate MDM enrollment&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;No MDM enrollment unless user chooses&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Microsoft Entra hybrid join (corporate)&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Microsoft Entra joined&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Microsoft Entra joined&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Windows settings enrollment&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;MDM enrollment&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;MDM enrollment&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Windows Autopilot / provisioning&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;MDM enrollment&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;MDM enrollment&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;colgroup&gt;&lt;col style="width: 33.33%" /&gt;&lt;col style="width: 33.33%" /&gt;&lt;col style="width: 33.33%" /&gt;&lt;/colgroup&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;Security and governance benefits&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;Opt-in enrollment supports:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Least surprise&lt;/LI&gt;
&lt;LI&gt;Explicit consent&lt;/LI&gt;
&lt;LI&gt;Cleaner BYOD posture&lt;/LI&gt;
&lt;LI&gt;Safer break glass scenarios&lt;/LI&gt;
&lt;LI&gt;Reduced support escalations&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;It also aligns well with Conditional Access and app level protection strategies.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;When to use the default behavior&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;Default automatic enrollment may still be appropriate for:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Fully corporate owned device fleets&lt;/LI&gt;
&lt;LI&gt;Locked down environments&lt;/LI&gt;
&lt;LI&gt;Dedicated provisioning scenarios&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;The key is that it should be a conscious decision, not an accidental one.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;Summary&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;In conclusion, for most organizations, the modern best practice is:&lt;/P&gt;
&lt;P&gt;Allow enrollment everywhere - require intent.&lt;/P&gt;
&lt;P&gt;Using the new Intune toggle to make enrollment opt-in during app sign in reduces risk, improves user trust, and simplifies the device lifecycle - without sacrificing Intune’s management capabilities.&lt;/P&gt;
&lt;P&gt;Recommended reading: For a concrete example of the end‑user experience with this model, see Step 6: Understand Microsoft Edge for Business End User Experience for Windows, which walks through how opt‑in enrollment and app‑level management are presented to users in Microsoft Edge for Business.&lt;BR /&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/intune/intune-service/apps/mamedge-6-end-user-experience" target="_blank" rel="noopener"&gt;Understand Microsoft Edge for Business End User Experience for Windows&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you have any questions, leave a comment below or reach out to us on&amp;nbsp;X &lt;A class="lia-external-url" href="https://aka.ms/IntuneSuppTeam" target="_blank" rel="noopener"&gt;@IntuneSuppTeam&lt;/A&gt;!&lt;/P&gt;</description>
      <pubDate>Wed, 11 Mar 2026 21:18:54 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/intune-customer-success/rethinking-allow-my-organization-to-manage-my-device-why-opt-in/ba-p/4499766</guid>
      <dc:creator>RamyaSharma</dc:creator>
      <dc:date>2026-03-11T21:18:54Z</dc:date>
    </item>
    <item>
      <title>How to enable HTTPS support for Microsoft Connected Cache for Enterprise and Education</title>
      <link>https://techcommunity.microsoft.com/t5/intune-customer-success/how-to-enable-https-support-for-microsoft-connected-cache-for/ba-p/4496173</link>
      <description>&lt;P&gt;&lt;STRONG&gt;By: Aditya Middha | Product Manager 2 - Microsoft Connected Cache&lt;BR /&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Starting on&amp;nbsp;&lt;STRONG&gt;June 16&lt;SUP&gt;th&lt;/SUP&gt;, 2026&lt;/STRONG&gt;, or soon after, Intune will enforce HTTPS content delivery for customers using Microsoft Connected Cache for Enterprise and Education. To continue using Microsoft Connected Cache to localize Intune Win32 app downloads and reduce the bandwidth impact on your network, you’ll need to configure HTTPS on Connected Cache nodes. Without this configuration, devices will still fetch the requested content, but they’ll fall back to the Content Delivery Network (CDN) and lose the performance and bandwidth savings that Microsoft Connected Cache provides.&lt;/P&gt;
&lt;P&gt;This guide assumes you have already deployed a standalone Microsoft Connected Cache node in your environment. If not, please see the &lt;A class="lia-external-url" href="https://learn.microsoft.com/windows/deployment/do/mcc-ent-create-resource-and-cache?tabs=portal" target="_blank" rel="noopener"&gt;Create and configure Microsoft Connected Cache nodes&lt;/A&gt; page.&lt;/P&gt;
&lt;P&gt;By the end of this walkthrough, you’ll be able to:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Prepare the TLS certificate that your Connected Cache needs&lt;/LI&gt;
&lt;LI&gt;Enable HTTPS support on both Windows and Linux‑based Microsoft Connected Cache servers&lt;/LI&gt;
&lt;LI&gt;Validate that HTTPS is working end‑to‑end&lt;/LI&gt;
&lt;LI&gt;Diagnose the most common setup issues&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;This guide mirrors the workflow described in Microsoft Connected Cache’s public documentation. &amp;nbsp;For further explanation of what HTTPS support changes for Microsoft Connected Cache review &lt;A class="lia-external-url" href="https://learn.microsoft.com/windows/deployment/do/mcc-ent-https-overview?tabs=portal" target="_blank" rel="noopener"&gt;HTTPS Support for Microsoft Connected Cache Overview&lt;/A&gt;, then proceed to &lt;A class="lia-external-url" href="https://learn.microsoft.com/windows/deployment/do/mcc-ent-https-windows-guide" target="_blank" rel="noopener"&gt;Configure HTTPS on Windows&lt;/A&gt; or &lt;A class="lia-external-url" href="https://learn.microsoft.com/windows/deployment/do/mcc-ent-https-linux-guide" target="_blank" rel="noopener"&gt;Configure HTTPS on Linux&lt;/A&gt;.&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;Step-by-step: Enabling HTTPS support&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;To keep this walkthrough easy to follow, the screenshots and command examples use a simple, reproducible environment that matches what most admins will see during their first HTTPS configuration. In this guide, the examples are based on:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;A single Connected Cache node deployment&lt;/LI&gt;
&lt;LI&gt;Windows 11, using a local user runtime account&lt;/LI&gt;
&lt;LI&gt;Public certificate authority (CA)-signed TLS certificate&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;This baseline environment is only meant to make the screenshots and file paths predictable. Your own environment may look different, and that’s completely fine. Many customers run Microsoft Connected Cache on:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Linux (Ubuntu or RHEL)&lt;/LI&gt;
&lt;LI&gt;Windows Server 2022 or Windows Server 2025&lt;/LI&gt;
&lt;LI&gt;Networks with outbound restrictions&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Most of the workflow is identical across these variations. The folder structure, log locations, and command flow will look nearly the same on any Windows host. If you’re running Microsoft Connected Cache on Linux, the workflow is the same, but simpler—bash scripts are ran directly instead of being invoked through PowerShell.&lt;/P&gt;
&lt;P&gt;If your environment includes proxies, make sure &lt;A class="lia-external-url" href="https://learn.microsoft.com/windows/deployment/do/delivery-optimization-endpoints" target="_blank" rel="noopener"&gt;all required endpoints&lt;/A&gt; are allowed.&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Before you start&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;Before generating a certificate signing request (CSR) or importing a certificate, there are a few quick checks to make sure your Connected Cache server can enable HTTPS successfully.&lt;/P&gt;
&lt;P&gt;First, visit the “Cache Node Management” tab on Azure portal. Under the “Software Version” column, verify that your cache node is running on software version 2.0.0.2112 or higher. If not, you will need to reinstall Connected Cache.&lt;/P&gt;
&lt;P&gt;Next, confirm the hostname or IP address your client devices use to reach your Connected Cache node—this value will be configured when you generate the CSR. Also, ake sure port 443 is free on the host; Microsoft Connected Cache needs to bind to it.&lt;/P&gt;
&lt;P&gt;Finally, if your network performs&amp;nbsp;&lt;STRONG&gt;TLS-inspection&lt;/STRONG&gt;, ensure the &lt;A class="lia-external-url" href="https://learn.microsoft.com/windows/deployment/do/delivery-optimization-endpoints" target="_blank" rel="noopener"&gt;required endpoints&lt;/A&gt; are allowed. Intercepted HTTPS traffic will cause devices to reject Microsoft Connected Cache’s TLS certificate, even if everything else is configured correctly.&lt;/P&gt;
&lt;P&gt;Once these checks are done, your node is ready for the HTTPS workflow: generate the CSR on your Connected Cache host machine, sign it with your CA, and import the resulting certificate.&lt;/P&gt;
&lt;P&gt;For more details, refer to the documentation: &lt;A class="lia-external-url" href="https://learn.microsoft.com/windows/deployment/do/mcc-ent-https-windows-guide" target="_blank" rel="noopener"&gt;HTTPS on Windows Prerequisites&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;1. Generate a CSR&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;The first step in enabling HTTPS support is generating a CSR directly on your Microsoft Connected Cache node. This step cannot be skipped. &lt;STRONG&gt;Microsoft Connected Cache must create the CSR itself&lt;/STRONG&gt; so it can generate and retain the private key that will later be paired with your signed certificate during TLS negotiation.&lt;/P&gt;
&lt;P&gt;When configuring the parameters for the generateCsr script, the most important values to get right are the &lt;STRONG&gt;Subject&lt;/STRONG&gt; and &lt;STRONG&gt;SAN&lt;/STRONG&gt;. These must match exactly how your managed client devices connect to your Connected Cache node. If the client devices use FQDN, include that FQDN; if they connect via IP, include that IP. A mismatch here won’t break CSR generation, but it’ll cause clients to bypass Microsoft Connected Cache later since they won’t trust the certificate during the TLS negotiation.&lt;/P&gt;
&lt;P&gt;For parameter configuration guidance on your specific environment, review these documented &lt;A class="lia-external-url" href="https://learn.microsoft.com/windows/deployment/do/mcc-ent-https-windows-reference#scenario-based-parameter-examples" target="_blank" rel="noopener"&gt;scenario-based parameter examples&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;After parameter configuration, you will need to locate the &lt;STRONG&gt;Installer scripts directory&lt;/STRONG&gt;, the same as when you installed Microsoft Connected Cache originally. You can move directly to this path by running the following command in your terminal:&lt;/P&gt;
&lt;LI-CODE lang="bash"&gt;Push-Location (deliveryoptimization-cli Microsoft Connected Cache-get-scripts-path)&lt;/LI-CODE&gt;
&lt;P&gt;Once in the correct folder path, run the generateCsr command with your configured parameters. Running the command launches the CSR generation workflow inside the Microsoft Connected Cache-managed Windows Subsystem for Linux (WSL) distribution. The terminal output shows exactly what Connected Cache is doing: where it stores certificate files, where logs are written, which WSL distribution is being used, and the final location of the generated CSR. You’ll also see that Microsoft Connected Cache runs the CSR generation as a scheduled task inside WSL—this is expected and part of the normal flow.&lt;/P&gt;
&lt;P&gt;For example:&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;This output confirms that Microsoft Connected Cache:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Validated the CSR request&lt;/LI&gt;
&lt;LI&gt;Passed the Subject (Common Name) and SAN values to the internal script&lt;/LI&gt;
&lt;LI&gt;Generated the private key and CSR, stored both inside the container&lt;/LI&gt;
&lt;LI&gt;Wrote logs to the \Certificates\logs folder&lt;/LI&gt;
&lt;LI&gt;Created the CSR file in the Certificates folder&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When the process completes, you’ll see the timestamped CSR written to the Windows-side certificates folder (…\Certificates\certs). This is the file you’ll submit to your signing CA:&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;Troubleshooting:&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;Every time you run generateCsr, Microsoft Connected Cache writes a full log to a directory that ends with …\Certificates\logs. The terminal output shows you the exact path, and you can always return to this folder if you need to understand what happened during CSR generation. If you do need to troubleshoot, start by opening the most recent log file.&lt;/P&gt;
&lt;P&gt;The generateCsr log provides a detailed trace of each step. The following lines are checkpoints (in order) that you can look for in the more extensive log output:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;“Algorithm validation passed / CSR name validation passed”&lt;/STRONG&gt; - Microsoft Connected Cache accepted your inputs and is ready to generate the CSR.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;“Subject Components: … / SAN Components: …”&lt;/STRONG&gt; - Microsoft Connected Cache will embed these values into the CSR. If these don’t match your Connected Cache server hostname or IP address, regenerate the CSR.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;“Attempting to call http://localhost:5000/csr”&lt;/STRONG&gt; - Microsoft Connected Cache internal controller is generating the keypair and CSR inside the WSL container.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;“Key verification succeeded”&lt;/STRONG&gt; - Microsoft Connected Cache successfully generated and validated the private key.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;“CSR verification successful”&lt;/STRONG&gt; - OpenSSL has validated the CSR structure.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;“Successfully copied logs to windowsCerts location” &lt;/STRONG&gt;-&amp;nbsp;The logs were written to the host machine directory.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;“CSR generation completed successfully”&lt;/STRONG&gt; - Completed end-to-end successfully.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;One thing to be aware of: during a &lt;EM&gt;successful&lt;/EM&gt; run, you may still see messages like:&lt;/P&gt;
&lt;LI-CODE lang="bash"&gt;mkdir: cannot create directory '/keys': Permission denied chmod: cannot access '/keys': No such file or directory&lt;/LI-CODE&gt;
&lt;P&gt;These are &lt;STRONG&gt;&lt;U&gt;not errors&lt;/U&gt;&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;The script checks for required folders before creating them, and if they already exist, those checks generate harmless warnings. As long as the script finishes with a success message and you see a .csr file in the certs folder, the run is successful.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;2. Sign the CSR&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;This step occurs outside of the scope of Microsoft Connected Cache. Signing your CSR will rely on the PKI that your organization has chosen to use. This may include an internal ADCS, other enterprise internal PKI, or an externally hosted PKI (DigiCert, Let’s Encrypt, etc.). Of note, Cloud PKI will not work with Connected Cache because it requires the CSR be generated via SCEP before signing.&lt;/P&gt;
&lt;P&gt;Ensure that your client devices will be able to trust the CA signature. For many customers, we recommend signing using a public CA that Windows client devices automatically trust. Please reference &lt;A class="lia-external-url" href="https://learn.microsoft.com/windows/deployment/do/mcc-ent-https-windows-guide#sign-the-csr" target="_blank" rel="noopener"&gt;documentation on signing the CSR&lt;/A&gt; for more details.&lt;/P&gt;
&lt;P&gt;The only requirement on the Connected Cache side is that the certificate is in unencrypted .crt format. Microsoft Connected Cache cannot import password-protected certificate formats yet - including .pfx bundles - even if they contain the correct certificate. For now, make sure your signing CA gives you, or allows you to export, a plain X.509 .crt file.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;After your CA signs the CSR, you’ll import the resulting certificate back to Microsoft Connected Cache. With the signed certificate in hand, place it in the same &lt;STRONG&gt;certs&lt;/STRONG&gt; folder where your CSR was generated. Microsoft Connected Cache expects both files to live together so it can pair the returned certificate with the private key created earlier. A successful setup in the folder directory looks like this:&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;If the certificate exists in the Certificates folder in .crt format, you’re ready to continue. Note: The CSR and .crt certificate do not have to have the same name.&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;3. Import the certificate back to Microsoft Connected Cache&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;Before importing your certificate, remember that the CSR &lt;STRONG&gt;must&lt;/STRONG&gt; have been generated on the same Microsoft Connected Cache node. You cannot skip directly to importing a certificate - Microsoft Connected Cache must have created the private key during CSR generation so it can pair the signed certificate with that key.&lt;/P&gt;
&lt;P&gt;After configuring the parameters referenced in the documentation to &lt;A class="lia-external-url" href="https://learn.microsoft.com/windows/deployment/do/mcc-ent-https-windows-guide#import-signed-tls-certificate" target="_blank" rel="noopener"&gt;import the signed TLS certificate&lt;/A&gt;, run the importCert command from the same &lt;STRONG&gt;scripts directory&lt;/STRONG&gt; used during CSR generation.&lt;/P&gt;
&lt;P&gt;When you start the import, Microsoft Connected Cache runs a full verification workflow inside its managed WSL distribution. The terminal output for this step is intentionally simple—it shows only that the certificate file passed basic validation, that the internal import script was invoked, and that the import is running as a scheduled task within the WSL distribution. You’ll also see that logging is active and that Microsoft Connected Cache has begun monitoring the process:&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;Although the terminal output is brief, the full workflow is visible in the import logs. A successful import means Microsoft Connected Cache:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Found your .crt file in the expected folder&lt;/LI&gt;
&lt;LI&gt;Ran cryptographic verification confirming the certificate, CSR, and private key all match&lt;/LI&gt;
&lt;LI&gt;Copied the certificate into the container and updated Microsoft Connected Cache internal configuration&lt;/LI&gt;
&lt;LI&gt;Restarted the container with the new certificate&lt;/LI&gt;
&lt;LI&gt;Enabled HTTPS for Microsoft Connected Cache’s Intune content endpoints&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Once these steps are complete, Microsoft Connected Cache is fully configured to serve HTTPS content. You usually won’t see new files added to the Windows certs folder after import as the changes occur inside the Connected Cache container. The final validation that import is successful is if the script exits successfully and the logs show that Microsoft Connected Cache restarted with the new certificate in place.&lt;/P&gt;
&lt;H4&gt;Troubleshooting&lt;/H4&gt;
&lt;P&gt;Troubleshooting certificate import is similar to troubleshooting CSR generation: every run produces a detailed log in the ...\Certificates\logs folder. If import fails, these logs will show exactly which step did not complete. At this stage, SAN or hostname mismatches do &lt;STRONG&gt;not&lt;/STRONG&gt; show up; those only appear later during client-side validation.&lt;/P&gt;
&lt;P&gt;The importCert script only ensures that your certificate, CSR, and private key match (stored inside container, not visible from Certificates folder) and that Microsoft Connected Cache can load them.&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To help interpret the log, below are the checkpoints you can reference (in order):&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;“Certificate file validation passed”&lt;/STRONG&gt; - Microsoft Connected Cache found the .crt file in the&amp;nbsp;&lt;STRONG&gt;certs &lt;/STRONG&gt;folder and its .crt format is valid.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;“Using CertName: … / CSR being used: …”&lt;/STRONG&gt; - Microsoft Connected Cache matched the certificate to the CSR that generated the private key.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;“SUCCESS: The CSR, certificate and private key cryptographic materials all match”&lt;/STRONG&gt; - Microsoft Connected Cache verified the keypair, CSR, and certificate are a correct trio.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;“Nginx restarted successfully with new certificates”&lt;/STRONG&gt; - Microsoft Connected Cache is now configured to serve HTTPS on port 443 inside the container.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;“Certificate import completed successfully”&lt;/STRONG&gt; - The end-to-end import succeeded with no errors.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Once the importCert script succeeds, your node is ready for validation.&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;Validating HTTPS support end-to-end&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;Once your certificate is imported, the final step is validating that Microsoft Connected Cache is now serving content over HTTPS. Detailed test commands are all documented in the &lt;A class="lia-external-url" href="https://learn.microsoft.com/windows/deployment/do/mcc-ent-https-windows-validation" target="_blank" rel="noopener"&gt;Validate HTTPS on Windows guide&lt;/A&gt;. Complete the tests &lt;STRONG&gt;first on the Microsoft Connected Cache server, then on a client device&lt;/STRONG&gt;. This order matters - server-side validation confirms Microsoft Connected Cache is listening on port 443 with its new TLS certificate; client-side validation confirms that client devices can trust and use that certificate.&lt;/P&gt;
&lt;H3&gt;On your Microsoft Connected Cache server&lt;/H3&gt;
&lt;P&gt;Start validation on the Microsoft Connected Cache host server. &lt;A class="lia-external-url" href="https://learn.microsoft.com/windows/deployment/do/mcc-ent-https-windows-validation#service-side-validation" target="_blank" rel="noopener"&gt;The server side tests&lt;/A&gt; include HTTPS and HTTP health endpoint checks that confirm:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Microsoft Connected Cache is successfully bound to port 443&lt;/LI&gt;
&lt;LI&gt;The TLS certificate loaded correctly&lt;/LI&gt;
&lt;LI&gt;The TLS certificate, private key, and CSR all correspond&lt;/LI&gt;
&lt;LI&gt;Microsoft Connected Cache can return its health endpoint over HTTPS&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;If any of the server-side validation steps fail, check the generateCsr and importCert logs in the …\Certificates\logs folder. The validation guide includes &lt;A class="lia-external-url" href="https://learn.microsoft.com/windows/deployment/do/mcc-ent-https-windows-validation#troubleshooting" target="_blank" rel="noopener"&gt;troubleshooting tests&lt;/A&gt; that help distinguish whether the issue is certificate-related, connectivity-related, or due to another process on the host.&lt;/P&gt;
&lt;P&gt;Only move on to client-side validation once the Microsoft Connected Cache server passes its own tests.&lt;/P&gt;
&lt;H3&gt;On your client device&lt;/H3&gt;
&lt;P&gt;After confirming the server is configured correctly, the next stage is validating HTTPS content delivery from a client device that is pointed to use Microsoft Connected Cache. The &lt;A class="lia-external-url" href="https://learn.microsoft.com/windows/deployment/do/mcc-ent-https-windows-validation#client-side-validation" target="_blank" rel="noopener"&gt;client-side tests&lt;/A&gt; contain both browser-based and command line tests that help verify:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;The client trusts the issuing CA&lt;/LI&gt;
&lt;LI&gt;DNS resolves the Microsoft Connected Cache hostname correctly&lt;/LI&gt;
&lt;LI&gt;The device can complete a full TLS handshake with Microsoft Connected Cache&lt;/LI&gt;
&lt;LI&gt;The device is retrieving HTTPS content from Microsoft Connected Cache rather than falling back to CDN&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Once both server-side and client side-validation steps succeed, you can be confident that your Microsoft Connected Cache node is fully configured and ready to serve Intune content securely over HTTPS.&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;Known issues with HTTPS Support Configuration&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;Most customers will complete the HTTPS workflow without any problems, but there are a few known issues we want to call out proactively.&lt;/P&gt;
&lt;P&gt;These issues have been fully addressed with the release of the &lt;A class="lia-external-url" href="https://learn.microsoft.com/windows/deployment/do/mcc-ent-release-notes#new-windows-hosted-deployment-application-version" target="_blank"&gt;new Windows-hosted deployment application&lt;/A&gt; (v1.0.26.0) for Windows host machines, the &lt;A class="lia-external-url" href="https://learn.microsoft.com/windows/deployment/do/mcc-ent-release-notes#new-linux-hosted-deployment-package-version" target="_blank"&gt;new Linux-hosted deployment package&lt;/A&gt; (v1.10) for Linux host machines, and &lt;A class="lia-external-url" href="https://learn.microsoft.com/windows/deployment/do/mcc-ent-release-notes#latest-release-ga-container-release-v2002124_e" target="_blank"&gt;the latest GA container release&lt;/A&gt; (v2.0.0.2124_e) for all cache nodes.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt; ImportCert issues on Windows Server 2022/2025 using a gMSA account, and on Windows 11 using a local user runtime account&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;If your Microsoft Connected Cache runtime account is a &lt;STRONG&gt;Group Managed Service Account (gMSA)&lt;/STRONG&gt; on a Windows Server 2022 or Windows Server 2025 host machine, you may see failures when running importCert. In the importCert logs, this can show up as unsuccessful permissions access or indefinite logging.&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;The same importCert issues can also appear on Windows 11 if you are using a &lt;STRONG&gt;local user&lt;/STRONG&gt; as the runtime account.&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;&lt;STRONG&gt;Status: RESOLVED&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;Please download Windows-hosted deployment application v1.0.26.0 by running the following command in an elevated PowerShell window:&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;&lt;EM&gt;Add-AppxPackage &lt;A href="https://aka.ms/do-mcc-ent-windows-x64" target="_blank"&gt;https://aka.ms/do-mcc-ent-windows-x64&lt;/A&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;Then you may proceed to re-deploy your Connected Cache node, which will implement the necessary changes.&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;You can further verify that you are deploying with the correct application version. When run in the terminal, the copied “Cache Node deployment command” given in the Azure portal will run &lt;EM&gt;deploymcconwsl.ps1&lt;/EM&gt; out of the folder path that looks like:&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;&lt;EM&gt;C:\ProgramFiles\WindowsApps\Microsoft.DeliveryOptimization_&lt;STRONG&gt;1.0.26.0&lt;/STRONG&gt;_neutral__8wekyb3d8bbwe\deliveryoptimization-cli&lt;/EM&gt;&lt;/P&gt;
&lt;OL start="2"&gt;
&lt;LI&gt;&lt;STRONG&gt; ImportCert hangs on software version 2119_e (buffer bug)&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;During the week of January 19&lt;SUP&gt;th&lt;/SUP&gt;, 2026, we deployed container version &lt;STRONG&gt;2119_e&lt;/STRONG&gt; to all customer cache nodes.&lt;BR /&gt;We discovered a bug where the container’s internal buffer is not cleared during importCert, causing the import to run indefinitely. If you see this behavior and your Azure portal shows that your cache node is on version &lt;STRONG&gt;2119_e, &lt;/STRONG&gt;this is likely the cause.&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;&lt;STRONG&gt;Status: RESOLVED&lt;/STRONG&gt;:&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;On March 3&lt;SUP&gt;rd&lt;/SUP&gt;, 2026, we pushed container version &lt;STRONG&gt;2124_e&lt;/STRONG&gt; to all cache nodes on the “Fast Ring” update schedule.&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;If your cache node is on software version 2119_e today, you can change the update schedule configuration to the “Fast Ring”. Head to the 3&lt;SUP&gt;rd&lt;/SUP&gt; tab (“Updates”) of the Cache Node Configuration on the Azure portal and configure the update ring. Container version 2124_e will be pushed to all “Slow Ring” nodes in early April 2026.&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;If your cache node is still not pulling down container version 2124_e after being configured on the Fast Ring, please reach out to us.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;The fixes for these issues have all been validated. Once ready for public release, the latest software version will be pushed to all cache nodes and the updated Windows installer will be available to download in Azure portal. Stay tuned to the&amp;nbsp;&lt;A class="lia-external-url" style="font-style: normal; font-weight: 400; background-color: rgb(255, 255, 255);" href="https://learn.microsoft.com/windows/deployment/do/mcc-ent-release-notes" target="_blank" rel="noopener"&gt;Microsoft Connected Cache Release Notes&lt;/A&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt; for up-to-date information.&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;Enabling HTTPS support on Linux hosts&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;This guide walked through the setup of HTTPS using a Windows-based Microsoft Connected Cache host, since that’s what most customers deploy today. If you're running Microsoft Connected Cache on Linux, the overall steps are the same - generate a CSR on the node, sign it with your CA, and import the resulting .crt file - but a few details differ.&lt;/P&gt;
&lt;P&gt;For a Linux-hosted Microsoft Connected Cache nodes, shell scripts handle the entire process, specifically generateCsr.sh and importCert.sh. The &lt;A class="lia-external-url" href="https://learn.microsoft.com/windows/deployment/do/mcc-ent-https-linux-guide" target="_blank" rel="noopener"&gt;Enable HTTPS Support on Linux guide&lt;/A&gt; documents these steps in detail, including the exact script parameters, file locations, and how to interpret the Linux-specific logs. The biggest differences on Linux are:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;You run the CSR and import scripts directly in bash (no WSL component).&lt;/LI&gt;
&lt;LI&gt;File paths and log locations follow the Linux directory structure (/var/mcc/...).&lt;/LI&gt;
&lt;LI&gt;Check port conflicts, firewall configuration, and TLS inspection using Linux tools (ss, iptables, proxy settings).&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/windows/deployment/do/mcc-ent-https-linux-validation" target="_blank" rel="noopener"&gt;Validation steps use Linux equivalents&lt;/A&gt; of the server side tests documented in the Windows validation guide.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2&gt;&lt;STRONG&gt;Maintaining your HTTPS configuration&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;Once your Microsoft Connected Cache node is serving content over HTTPS, the next thing to plan for is ongoing certificate maintenance. TLS certificates aren’t a onetime import - certificates expire, CA chains change, and your operational process needs to keep up. Microsoft Connected Cache will soon surface certificate details both through a command line script and directly in the Azure portal, but those capabilities are not available yet. Until then, verification and rotation rely on simple checks you perform on the Microsoft Connected Cache host.&lt;/P&gt;
&lt;H3&gt;Monitoring&lt;/H3&gt;
&lt;P&gt;The easiest way to monitor your deployment today is to periodically check the &lt;STRONG&gt;Key Metrics&lt;/STRONG&gt; chart in the Overview blade of your Microsoft Connected Cache resource in Azure. If Intune content is flowing through Microsoft Connected Cache, that’s a strong proxy signal that HTTPS is healthy.&lt;/P&gt;
&lt;P&gt;For the certificate itself, many admins perform a lightweight weekly or monthly review: ensuring the TLS certificate is still valid, not approaching expiration, and still matches the configuration you imported. Re-running the validation tests from our &lt;A class="lia-external-url" href="https://learn.microsoft.com/windows/deployment/do/mcc-ent-https-windows-validation" target="_blank" rel="noopener"&gt;public documentation&lt;/A&gt; every so often is also a good way to catch any issues early.&lt;/P&gt;
&lt;P&gt;The updated Windows installer, as mentioned in Known Issues, will also have a PowerShell script that displays the status and expiration date of existing TLS certificates.&lt;/P&gt;
&lt;H3&gt;Renewal&lt;/H3&gt;
&lt;P&gt;When planning for renewal, we recommend starting at least 60 days before the certificate expires. Renewal is typically straightforward: either reuse the existing CSR (most common) or generate a new one, then have your CA resign it, convert it into .crt format, and test the renewed certificate on a test node if you have one. If your workflow doesn’t include a test Connected Cache node, you can still safely import the renewed certificate on your production node - if import fails, Microsoft Connected Cache simply keeps using the existing certificate until a valid one is applied, so you won’t break your environment.&lt;/P&gt;
&lt;P&gt;If your certificate management system has automation capabilities, you can script Microsoft Connected Cache’s certificate renewal workflow as well - for example, by using Secure Shell (SSH) to remotely to run the generateCSR or importCert scripts on the host machine.&lt;/P&gt;
&lt;P&gt;For larger or distributed environments, testing the signing and import processes on a non-production node first can help confirm SAN correctness, trust behavior, and chain completeness before touching production.&lt;/P&gt;
&lt;P&gt;We are actively working to streamline certificate monitoring and renewal inside Microsoft Connected Cache.&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;Summary&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;HTTPS support for Microsoft Connected Cache will soon become a requirement for delivering Intune Win32 apps, and every Microsoft Connected Cache node must be configured for HTTPS by &lt;STRONG&gt;June 16, 2026&lt;/STRONG&gt;. After the deadline, Intune Win32 apps will only be delivered via HTTPS. However, all other content – Windows updates, Office apps, etc – will continue to be served via HTTP after the June 16&lt;SUP&gt;th&lt;/SUP&gt; enforcement date.&lt;/P&gt;
&lt;P&gt;This guide walked through the essentials: generating a CSR on your Microsoft Connected Cache node, submitting it to your CA, importing the signed certificate, and validating HTTPS from both the server and client devices. Along the way, you saw how to interpret the logs, verify Connected Cache is using your certificate correctly, and ensure that Teams and/or Intune content is &amp;nbsp;flowing over HTTPS instead of falling back to CDN.&lt;/P&gt;
&lt;P&gt;As you move forward, keep your workflow consistent - regenerate or reuse CSRs the same way each cycle, validate regularly, and renew certificates well before expiration. Even though improvements are coming soon, completing this setup now ensures your environment is ready long before Intune HTTPS enforcement begins. With your certificate in place, HTTPS validated, and a simple renewal process in hand, your Microsoft Connected Cache deployment is prepared for the June 16&lt;SUP&gt;th&lt;/SUP&gt;, 2026 deadline and ready to deliver Intune content securely.&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;FAQs&lt;/STRONG&gt;&lt;/H2&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt; Do I really need HTTPS Support, and by when?&lt;/STRONG&gt;&lt;BR /&gt;Yes. All Microsoft Connected Cache nodes serving Intune Win32 apps must deliver over HTTPS by &lt;STRONG&gt;June 16, 2026&lt;/STRONG&gt;. If HTTPS isn’t configured, devices will fall back to CDN when requesting Intune win32 apps —content delivery still works, but you’ll lose caching benefits.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt; Why do I have to generate the CSR on the &lt;/STRONG&gt;&lt;STRONG&gt;Connected Cache&lt;/STRONG&gt; &lt;STRONG&gt;node?&lt;/STRONG&gt;&lt;BR /&gt;Since Microsoft Connected Cache must generate and retain the private key itself. Certificates signed from any other machine, keypair, or CSR cannot be imported. The CSR you generate on the node produces the only key that Microsoft Connected Cache will accept.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt; Can I reuse an existing certificate?&lt;/STRONG&gt;&lt;BR /&gt;Only if it was originally issued from the &lt;STRONG&gt;CSR generated on the same &lt;/STRONG&gt;&lt;STRONG&gt;Microsoft Connected Cache node&lt;/STRONG&gt;. If the certificate was created elsewhere (different machine, tooling, or CSR), Microsoft Connected Cache won’t accept it.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt; Can I reuse my CSR when renewing the certificate?&lt;/STRONG&gt;&lt;BR /&gt;Yes. Many customers reuse the same CSR each cycle as long as the CA resigns it. Reusing the old certificate output is not supported.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt; Can I “bring my own certificate”?&lt;/STRONG&gt;&lt;BR /&gt;Not yet. Microsoft Connected Cache only supports certificates created from its own CSR. Support for bringing an external certificate is coming soon; stay up to date by viewing the latest &lt;A class="lia-external-url" href="https://learn.microsoft.com/windows/deployment/do/mcc-ent-release-notes" target="_blank" rel="noopener"&gt;Microsoft Connected Cache Release Notes&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt; Can I use a wildcard certificate?&lt;/STRONG&gt;&lt;BR /&gt;Microsoft Connected Cache does not officially support them and they’re not recommended. Wildcards often involve shared private keys across systems, which creates operational and security risks.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt; What certificate formats does &lt;/STRONG&gt;&lt;STRONG&gt;Microsoft Connected Cache&lt;/STRONG&gt; &lt;STRONG&gt;support?&lt;/STRONG&gt;&lt;BR /&gt;Microsoft Connected Cache only supports unencrypted .crt files today. Password protected .pfx or .p12 formats cannot be imported.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt; What happens if I redeploy &lt;/STRONG&gt;&lt;STRONG&gt;Microsoft Connected Cache&lt;/STRONG&gt; &lt;STRONG&gt;or the hostname changes?&lt;/STRONG&gt;&lt;BR /&gt;If the hostname or connection path changes, you must request a new certificate that matches the new SAN parameters. If the hostname stays the same and the certificate came from the Connected Cache-generated CSR, you can continue using it.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;If you have any questions, leave a comment below or reach out to us on&amp;nbsp;X &lt;A class="lia-external-url" href="https://aka.ms/IntuneSuppTeam" target="_blank" rel="noopener"&gt;@IntuneSuppTeam&lt;/A&gt;!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Post Updates:&lt;/STRONG&gt;&lt;BR /&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt;04/08/26: Updated the “Known issues with HTTPS Support Configuration” section to reflect that previously identified issues have been fully resolved in the latest deployment application and container releases, along with updated guidance for affected cache nodes.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Apr 2026 02:38:29 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/intune-customer-success/how-to-enable-https-support-for-microsoft-connected-cache-for/ba-p/4496173</guid>
      <dc:creator>Intune_Support_Team</dc:creator>
      <dc:date>2026-04-09T02:38:29Z</dc:date>
    </item>
    <item>
      <title>Support tip: Resolve device noncompliance with Mobile Threat Defense partner apps</title>
      <link>https://techcommunity.microsoft.com/t5/intune-customer-success/support-tip-resolve-device-noncompliance-with-mobile-threat/ba-p/4491669</link>
      <description>&lt;P&gt;Using a Mobile Threat Defense (MTD) solution, such as Microsoft Defender for Endpoint, with Microsoft Intune helps keep your organization’s resources protected and allows you to block devices that aren’t compliant with your organization’s policies.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;When an MTD detects a threat or determines that a device is noncompliant the device user will see one of two types of messages indicating:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Install and activate partner app&lt;/STRONG&gt;: The device needs the [MTD app] installed and activated to restore access to work or school resources. This message indicates that Intune hasn't received a signal from the [MTD app] the device, or the connection was lost.&lt;/LI&gt;
&lt;LI&gt;Resolve detected threats: The [MTD app] app identified one or more threats on the device. Open the [MTD app] and follow the guidance to resolve the threats before accessing work or school resources.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;In this blog, we’ll focus on troubleshooting and resolving the first scenario, where users will need to install and activate the MTD app.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Note&lt;/STRONG&gt;: For help resolving threats detected by the MTD app, open the partner app directly on the device for remediation guidance.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Prerequisites&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;Before you begin troubleshooting, confirm that:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;The user device is enrolled in Intune through the Company Portal app.&lt;/LI&gt;
&lt;LI&gt;The user has access to their work or school account credentials.&lt;/LI&gt;
&lt;LI&gt;The device has an active internet connection.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Restore device compliance&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;U&gt;Have the user&lt;/U&gt; follow these steps to resolve the noncompliance issue and restore access to work or school resources.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Step 1: Install and activate the partner app&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;If the [MTD app] isn’t installed on the device:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Open the Intune Company Portal app on the device.&lt;/LI&gt;
&lt;LI&gt;Go to&amp;nbsp;&lt;STRONG&gt;Devices&lt;/STRONG&gt;&amp;nbsp;and select the device.&lt;/LI&gt;
&lt;LI&gt;Install the required [MTD app] shown in the noncompliance message.&lt;/LI&gt;
&lt;LI&gt;Open the [MTD app] and sign in with your work or school account.&lt;/LI&gt;
&lt;LI&gt;Complete any required setup or activation steps in the app.&lt;/LI&gt;
&lt;LI&gt;Wait up to 30 minutes for the device compliance status to update.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;If your device remains noncompliant after 30 minutes, continue to the next step.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Step 2: Refresh the connection&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;If the [MTD app] is already installed and the user is signed in, the connection between the app and Intune services may need to be refreshed:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Open the [MTD app] on the device.&lt;/LI&gt;
&lt;LI&gt;Sign out of the work or school account.&lt;/LI&gt;
&lt;LI&gt;Sign back in with the same work or school account.&lt;/LI&gt;
&lt;LI&gt;Wait up to 30 minutes for the device compliance status to update.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;If the device remains noncompliant after 30 minutes, continue to the next step.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Step 3: Reinstall the MTD app&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;If refreshing the connection doesn't resolve the issue, reinstalling the app can restore the signal between services:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Uninstall the [MTD app] from the device.&lt;/LI&gt;
&lt;LI&gt;Restart the device.&lt;/LI&gt;
&lt;LI&gt;Open the Company Portal app on the device.&lt;/LI&gt;
&lt;LI&gt;Reinstall the [MTD app].&lt;/LI&gt;
&lt;LI&gt;Open the app and sign in with the work or school account.&lt;/LI&gt;
&lt;LI&gt;Complete any required setup or activation steps.&lt;/LI&gt;
&lt;LI&gt;Wait up to 30 minutes for the device compliance status to update.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;STRONG&gt;Check device compliance status&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Users can verify their device's compliance status at any time:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Open the Company Portal app.&lt;/LI&gt;
&lt;LI&gt;Go to&amp;nbsp;&lt;STRONG&gt;Devices&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;Select the device to view its current status.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;If the device shows as compliant, they can access work or school resources. If it &amp;nbsp;shows as noncompliant and they’ve taken steps to resolve, wait a few more minutes and check again, as compliance status updates can take up to 30 minutes to appear in the Company Portal app.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;&lt;SPAN data-teams="true"&gt;iOS/iPadOS: Enable simplified remediation for users&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;Admins can configure a simplified remediation experience on iOS and iPadOS to help end‑users return to a compliant state more easily. This experience streamlines how users address Mobile Threat Defense (MTD)–related noncompliance and reduces the number of steps required to restore access.&lt;/P&gt;
&lt;P&gt;To enable this experience:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Follow the guidance in&amp;nbsp;&lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/intunecustomersuccess/simplifying-compliance-remediation-with-microsoft-intune-and-defender-on-iosipad/4465293" data-lia-auto-title="Simplifying compliance remediation with Microsoft Intune and Defender on iOS/iPadOS" data-lia-auto-title-active="0" target="_blank"&gt;Simplifying compliance remediation with Microsoft Intune and Defender on iOS/iPadOS&lt;/A&gt; to configure the updated remediation workflow for your organization.&lt;/LI&gt;
&lt;LI&gt;Once enabled, end‑users will see clearer guidance within the Microsoft Defender app when their device is marked noncompliant.&lt;/LI&gt;
&lt;LI&gt;The Defender app will direct users through the necessary remediation steps automatically - such as re‑authentication, resolving threat signals, or re‑establishing the MTD connection.&lt;/LI&gt;
&lt;LI&gt;After the guided process is complete, Defender will send updated device status to Intune so the device can return to a &lt;EM&gt;compliant&lt;/EM&gt; state.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;This simplified flow reduces support overhead and increases user success resolving MTD‑related compliance issues on iOS/iPadOS.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;&lt;SPAN data-teams="true"&gt;Android: Refresh the MTD connection when sign‑out is blocked&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;If the user is on an Android device, first have them try signing out of the Mobile Threat Defense (MTD) app and signing back in. This often re‑establishes the connection and allows Intune to receive updated device status.&lt;/P&gt;
&lt;P&gt;If the option to sign out of the MTD app is blocked by IT policy, follow these steps to reset the app’s data instead:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Long‑press the &lt;STRONG&gt;Defender app&lt;/STRONG&gt; in the &lt;STRONG&gt;work profile&lt;/STRONG&gt;.&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Tap &lt;STRONG&gt;ⓘ App info&lt;/STRONG&gt;.&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Go to &lt;STRONG&gt;Storage &amp;amp; cache&lt;/STRONG&gt; → &lt;STRONG&gt;Clear data&lt;/STRONG&gt; (do&amp;nbsp;&lt;STRONG&gt;not&lt;/STRONG&gt;&amp;nbsp;select &lt;EM&gt;Clear cache&lt;/EM&gt;).&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Relaunch the Defender app - it will open to the &lt;STRONG&gt;welcome screen&lt;/STRONG&gt;.&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Sign back in with the work or school account.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;Once signed back in, Defender will update Intune with the latest device data, and the device should return to a &lt;STRONG&gt;compliant&lt;/STRONG&gt; state after Intune receives the refreshed signals.&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Related articles&lt;/STRONG&gt;&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/mem/intune/protect/mobile-threat-defense" target="_blank" rel="noopener"&gt;Mobile Threat Defense integration with Intune&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/mem/intune/user-help/using-the-intune-company-portal-website" target="_blank" rel="noopener"&gt;Using the Intune Company Portal website&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;BR /&gt;If you have any questions, leave a comment below or reach out to us on&amp;nbsp;X &lt;A class="lia-external-url" href="https://aka.ms/IntuneSuppTeam" target="_blank" rel="noopener"&gt;@IntuneSuppTeam&lt;/A&gt;!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Post updates:&lt;BR /&gt;02/05/26: &lt;EM&gt;Added two new sections covering simplified user remediation on iOS/iPadOS and refreshing the MTD connection on Android when sign-out is blocked.&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 05 Feb 2026 22:16:46 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/intune-customer-success/support-tip-resolve-device-noncompliance-with-mobile-threat/ba-p/4491669</guid>
      <dc:creator>Intune_Support_Team</dc:creator>
      <dc:date>2026-02-05T22:16:46Z</dc:date>
    </item>
    <item>
      <title>Intune my Macs: Accelerating macOS proof of concepts with Microsoft Intune</title>
      <link>https://techcommunity.microsoft.com/t5/intune-customer-success/intune-my-macs-accelerating-macos-proof-of-concepts-with/ba-p/4488571</link>
      <description>&lt;P&gt;&lt;STRONG&gt;By: Neil Johnson and Chris Kunze - Principal Product Managers | Microsoft Intune&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Intune provides a broad and mature set of capabilities for managing macOS devices across security, compliance, applications, and user onboarding. Many customers, however, aren’t always aware of just how much functionality is available or how to bring it all together. We've developed a starter kit to make it easy to explore and set up macOS configurations in Intune: Intune my Macs. Intune my Macs helps bridge that gap by making it easy to explore some recommended macOS configurations and quickly set up a successful proof of concept using Intune.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;What is Intune &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;my Macs&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;?&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&lt;A class="lia-external-url" href="https://aka.ms/intunemacpoc" target="_blank" rel="noopener"&gt;Intune my Macs&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; is an open-source project from the Microsoft Intune Customer Experience Engineering team that allows you to deploy a complete macOS proof of concept in minutes. This starter kit brings together over 31 enterprise-grade configurations - identified by Apple’s Mac Evaluation Utility - along with policies, scripts, and applications, all of which can be deployed using a single PowerShell script.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The project operates in dry-run mode by default, letting you preview exactly what will be created before committing any changes to your Intune tenant. When you're ready, simply add the --apply flag to the command-line to commit changes.&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Important&lt;/STRONG&gt;: From a support perspective, Microsoft fully supports Intune and its ability to deploy PowerShell scripts. However, Microsoft does not support the scripts themselves, even if they are on our GitHub repository. They’re provided for example only. You are responsible for anything that they may do within your environment. Always test!&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P aria-level="2"&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;See it in action&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Want a quick walkthrough before you dive in? Watch the video below to see a deep-dive on Intune my Macs - from authentication to policy creation, app deployment, and beyond.&lt;/P&gt;
&lt;div data-video-id="https://www.youtube.com/watch?v=0JzO0VyFnVM/1774911393330" data-video-remote-vid="https://www.youtube.com/watch?v=0JzO0VyFnVM/1774911393330" class="lia-video-container lia-media-is-center lia-media-size-large"&gt;&lt;iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2F0JzO0VyFnVM%3Ffeature%3Doembed&amp;amp;display_name=YouTube&amp;amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3D0JzO0VyFnVM&amp;amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2F0JzO0VyFnVM%2Fhqdefault.jpg&amp;amp;type=text%2Fhtml&amp;amp;schema=youtube" allowfullscreen="" style="max-width: 100%"&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Why would you use it&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;?&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/H2&gt;
&lt;H4&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;1. Jumpstart &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;y&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;our &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;macOS&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;m&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;anagement&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Instead of building macOS configurations from scratch, Intune&amp;nbsp;my Macs&amp;nbsp;provides a&amp;nbsp;ready-to-use&amp;nbsp;baseline of&amp;nbsp;production&amp;nbsp;quality&amp;nbsp;Intune artifacts.&amp;nbsp;These configurations are designed to help you quickly evaluate Microsoft Intune for macOS management while also serving as reference implementations you can adapt&amp;nbsp;to&amp;nbsp;your environment.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Below is an overview of what Intune my Macs deploys into your tenant, organized by category.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table border="1" style="width: 92.5926%; height: 302.791px; border-width: 1px;"&gt;&lt;tbody&gt;&lt;tr style="height: 38.8281px;"&gt;&lt;td style="height: 38.8281px;"&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;Category&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 38.8281px;"&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;Example&amp;nbsp;configurations&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 38.8281px;"&gt;&lt;td style="height: 38.8281px;"&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Security&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 38.8281px;"&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;FileVault configuration, firewall enablement, Gatekeeper policies,&amp;nbsp;Microsoft&amp;nbsp;Edge&amp;nbsp;policies&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 38.8281px;"&gt;&lt;td style="height: 38.8281px;"&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Compliance&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 38.8281px;"&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Minimum macOS version (15.0), SIP enforcement, encryption requirements&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 38.8281px;"&gt;&lt;td style="height: 38.8281px;"&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Identity&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 38.8281px;"&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Platform SSO&amp;nbsp;via Secure Enclave&amp;nbsp;with Microsoft Entra ID&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 38.8281px;"&gt;&lt;td style="height: 38.8281px;"&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Applications&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 38.8281px;"&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Intune&amp;nbsp;Company&amp;nbsp;Portal, Microsoft 365, Remote Help, Intune Log Watch,&amp;nbsp;Microsoft 365 Copilot, Windows App, and Edge&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 38.8281px;"&gt;&lt;td style="height: 38.8281px;"&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Scripts&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 38.8281px;"&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Dock customization, FileVault key escrow (Escrow Buddy), onboarding automation&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 69.8229px;"&gt;&lt;td style="height: 69.8229px;"&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Custom Attributes&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 69.8229px;"&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Hardware compatibility checks, Intune agent version reporting&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;colgroup&gt;&lt;col style="width: 50.00%" /&gt;&lt;col style="width: 50.00%" /&gt;&lt;/colgroup&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;H4 class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;2.&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;Learn by &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;e&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;xample&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Each configuration in the repository serves as a practical reference implementation. The naming conventions follow a consistent pattern (for example,&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;pol-sec-001-filevault, scr-app-100-install-company-portal&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;), and detailed documentation explains what each setting does and why&amp;nbsp;it's configured that way.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H4&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;3.&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;Reduce &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;t&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;ime &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;to&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;v&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;alue&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Tasks that typically require extensive research, configuration, and testing can now be completed in just about 5 minutes, thanks to this streamlined approach.&amp;nbsp;The script handles:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Microsoft Graph SDK authentication&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;STRONG style="color: rgb(30, 30, 30);"&gt;&lt;SPAN data-contrast="auto"&gt;Policy creation via Intune settings catalog and custom configuration profiles&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;STRONG style="color: rgb(30, 30, 30);"&gt;&lt;SPAN data-contrast="auto"&gt;Script deployment with proper execution settings&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;STRONG style="color: rgb(30, 30, 30);"&gt;&lt;SPAN data-contrast="auto"&gt;PKG application uploads&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;STRONG style="color: rgb(30, 30, 30);"&gt;&lt;SPAN data-contrast="auto"&gt;Optional group assignments&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;STRONG style="color: rgb(30, 30, 30);"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;Optional Microsoft Defender for Endpoint &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;i&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;ntegration&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;If you're evaluating Microsoft Defender for Endpoint on macOS, the project includes an optional &lt;/SPAN&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;--mde&lt;/SPAN&gt;&lt;/EM&gt;&lt;SPAN data-contrast="auto"&gt; command-line flag that deploys the full Defender for Endpoint configuration, including system extensions, privacy preferences, network filter settings, and a script that can be used to install the client.&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2&gt;How it works&lt;/H2&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;This&amp;nbsp;starter kit&amp;nbsp;is driven by XML manifest files that define each configuration artifact. The main PowerShell script reads these manifests, resolves the associated JSON/mobileconfig/script files, and creates the corresponding objects in Intune via the Microsoft Graph API.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;You can scope&amp;nbsp;this&amp;nbsp;starter kit&amp;nbsp;to specific artifact types using&amp;nbsp;command-line&amp;nbsp;flags&amp;nbsp;like &lt;/SPAN&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;--apps&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;,&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; --config&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;,&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; --compliance&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;,&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; --scripts&lt;/SPAN&gt;&lt;/EM&gt;&lt;SPAN data-contrast="auto"&gt;, or&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; &lt;EM&gt;--custom-attributes&lt;/EM&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;. A custom naming prefix&amp;nbsp;defined using the&lt;EM&gt;&amp;nbsp;&lt;/EM&gt;&lt;/SPAN&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;–prefix&lt;/SPAN&gt;&lt;/EM&gt;&lt;SPAN data-contrast="auto"&gt; command-line flag) keeps your deployed objects easily identifiable,&amp;nbsp;and the --&lt;/SPAN&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;remove-all&lt;/SPAN&gt;&lt;/EM&gt;&lt;SPAN data-contrast="auto"&gt; command-line flag provides a clean way, based on the custom naming prefix, to delete everything created by an earlier run.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;For more information on how to use this project,&amp;nbsp;be sure to&amp;nbsp;review&amp;nbsp;the prerequisites and instruction in the readme file.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3 aria-level="2"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;Bonus: Utility&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;t&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;ools&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The project also includes several analysis and documentation tools:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="10" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Export-MacOSConfigPolicies.ps1&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt; - Back up existing Intune macOS policies to JSON&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="10" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Find-DuplicatePayloadSettings.ps1&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt; - Detect conflicting settings across all your Mac configuration files&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="10" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="3" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Generate-ConfigurationDocumentation.py&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt; - &lt;/STRONG&gt;Create Markdown or Word documentation from the manifests&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="10" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="4" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Get-IntuneAgentProcessingOrder.ps1&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt; - Understand script and app processing sequence&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="10" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="5" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Get-MacOSGlobalAssignments.ps1&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt; - List Mac policies assigned to All Devices or All Users&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Summary&lt;/H2&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Intune my Macs&amp;nbsp;isn't meant to be a one-size-fits-all production&amp;nbsp;starter kit,&amp;nbsp;but it’s a great way to get started. Use it to quickly&amp;nbsp;implement&amp;nbsp;a proof&amp;nbsp;of&amp;nbsp;concept, learn from the configuration patterns, and adapt the policies to your organization's specific requirements.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Whether you're evaluating Intune for macOS management,&amp;nbsp;setting up&amp;nbsp;a new tenant, or just looking for reference implementations of common security configurations, this project can save you significant time and effort.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H3 aria-level="2"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;Resources&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H3&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="4" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;A class="lia-external-url" href="https://aka.ms/intunemacpoc" target="_blank" rel="noopener"&gt;GitHub Repository&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="4" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;A class="lia-external-url" href="https://github.com/microsoft/intune-my-macs/blob/main/INTUNE-MY-MACS-DOCUMENTATION.md" target="_blank" rel="noopener"&gt;Full Configuration Documentation&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="4" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="3" data-aria-level="1"&gt;&lt;A class="lia-external-url" href="https://github.com/microsoft/intune-my-macs/blob/main/mde/README.md" target="_blank" rel="noopener"&gt;Microsoft Defender for Endpoint Setup&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&lt;BR /&gt;If you have any questions, leave a comment below or reach out to us on&amp;nbsp;X &lt;/SPAN&gt;&lt;A class="lia-external-url" href="https://aka.ms/IntuneSuppTeam" target="_blank" rel="noopener"&gt;@IntuneSuppTeam&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Post Updates&lt;/STRONG&gt;&lt;BR /&gt;03/30/26: &lt;/SPAN&gt;A video walkthrough has been added above. Watch to see Intune my Macs deploy a complete macOS proof of concept in minutes.&lt;/P&gt;</description>
      <pubDate>Mon, 30 Mar 2026 23:01:38 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/intune-customer-success/intune-my-macs-accelerating-macos-proof-of-concepts-with/ba-p/4488571</guid>
      <dc:creator>Intune_Support_Team</dc:creator>
      <dc:date>2026-03-30T23:01:38Z</dc:date>
    </item>
    <item>
      <title>Debunking the myth: Cloud-native Windows devices and access to on-premises resources</title>
      <link>https://techcommunity.microsoft.com/t5/intune-customer-success/debunking-the-myth-cloud-native-windows-devices-and-access-to-on/ba-p/4470056</link>
      <description>&lt;P&gt;&lt;STRONG&gt;By: Roger Southgate - Sr. Product Manager | Microsoft Intune&lt;/STRONG&gt;&lt;/P&gt;
&lt;H2&gt;Myth vs reality&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Myth&lt;/STRONG&gt;: Cloud-native Windows devices can’t access on-premises resources such as file shares or legacy applications.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Reality&lt;/STRONG&gt;: With minimal or no configuration, cloud-native devices can seamlessly access on-premises resources using NTLM or Kerberos.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Introduction&lt;/H2&gt;
&lt;P&gt;Microsoft’s vision for secure, productive workplaces is clear: adopt cloud-first services, integrate Zero Trust throughout, and deploy Windows 11 devices as cloud-native endpoints to stay agile and future-ready. If you’re yet to begin this journey, review the &lt;A class="lia-external-url" href="https://aka.ms/gocloudnative" target="_blank" rel="noopener"&gt;Set up and configure a cloud-native Windows endpoint with Microsoft Intune&lt;/A&gt; tutorial.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For context, a cloud-native device is a Windows device, joined to Microsoft Entra and managed by Intune. No domain join, no group policy, and no Microsoft Configuration Manager required. Leveraging complementary services such as &lt;A class="lia-external-url" href="https://learn.microsoft.com/autopilot/overview" target="_blank" rel="noopener"&gt;Windows Autopilot&lt;/A&gt; and &lt;A class="lia-external-url" href="https://learn.microsoft.com/windows/deployment/windows-autopatch/overview/windows-autopatch-overview" target="_blank" rel="noopener"&gt;Windows Autopatch&lt;/A&gt; enables users to self-provision their devices, work remotely, and remain secure by applying the latest Windows Updates.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But what about user’s data, files, and applications that they require to be productive? Moving to the cloud is a common goal for many organizations, though practical realities can make this a gradual process. Legacy technology, operational constraints, complexity, and other challenges can hinder adoption. While the goal might be to migrate all data to cloud-friendly repositories such as SharePoint Online and OneDrive, and transition applications to SaaS solutions, these migrations don’t happen overnight. In many cases, data may remain scattered across internal servers and on-premises repositories, creating scenarios where cloud-native devices still need to connect to these resources.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Accessing on-premises resources&lt;/H2&gt;
&lt;P&gt;What happens when you take a cloud-native device and try to access an on-premises resource such as a file share? Similarly, what about access to an application that is located on-premises? While these are just two examples, they can be used interchangeably in this scenario since the process of getting access is the same, regardless of apps or files. This is a topic that is raised (and often misunderstood) when discussing the transition of Windows devices to the cloud. Cloud-native devices were designed to take this scenario into account and have seamless access to on-premises resources.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Note&lt;/STRONG&gt;: This assumes you have line-of-sight to an Active Directory Domain Controller and that your on-premises resources, such as file shares and applications, use Windows authentication. Like a domain-joined device, a cloud-native device won’t have line of sight by default unless it’s physically on-site (for example, in a corporate office). If you require this functionality, you may need to use a VPN or Zero Trust Network Access (ZTNA) solution to provide this connectivity to on-premises resources. More on this later, when we touch on &lt;A class="lia-external-url" href="https://learn.microsoft.com/entra/global-secure-access/overview-what-is-global-secure-access" target="_blank" rel="noopener"&gt;Microsoft Entra Global Secure Access&lt;/A&gt;.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;H2&gt;Legacy applications and authentication&lt;/H2&gt;
&lt;P&gt;When people talk about legacy applications in this context, they typically mean apps that can only do legacy (NTLM or Kerberos) authentication with Active Directory.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The good news is that for users synchronized using Microsoft Entra Connect Sync, cloud-native devices can seamlessly authenticate using NTLM and Kerberos just like domain-joined devices. When an on-premises domain account is synchronized to Microsoft Entra ID via Microsoft Entra Connect Sync, Windows uses details from Microsoft Entra ID, such as the source Active Directory domain name and the user’s User Principal Name (UPN), to locate a Domain Controller the same way an Active Directory domain-joined device does.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If the user has signed into Windows using a password, Windows sends the on-premises domain information and user credentials to the Domain Controller to obtain a Kerberos Ticket-Granting Ticket (TGT) or NTLM token, based on the protocol the on-premises resource or application supports. From that point onwards, the TGT is used to get session keys that grant access to resources.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Refer to &lt;A class="lia-external-url" href="https://learn.microsoft.com/entra/identity/devices/device-sso-to-on-premises-resources" target="_blank" rel="noopener"&gt;How SSO to on-premises resources works on Microsoft Entra joined devices&lt;/A&gt; for additional details on how this process works.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Note:&lt;/STRONG&gt; Windows 11, version 24H2 and later releases have removed the NTLMv1 protocol as part of Microsoft's broader initiative to phase out NTLM. Refer to the Microsoft support article on &lt;A class="lia-external-url" href="https://support.microsoft.com/topic/upcoming-changes-to-ntlmv1-in-windows-11-version-24h2-and-windows-server-2025-c0554217-cdbc-420f-b47c-e02b2db49b2e" target="_blank" rel="noopener"&gt;Upcoming changes to NTLMv1 in Windows 11, version 24H2 and Windows Server 2025&lt;/A&gt; for additional details.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Windows Hello for Business&lt;/H2&gt;
&lt;P&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/entra/identity/authentication/concept-authentication-passwordless#choose-a-passwordless-method" target="_blank" rel="noopener"&gt;Passwordless authentication&lt;/A&gt; mechanisms such as FIDO2 and Windows Hello for Business are a cornerstone of Microsoft’s security vision. Adopting these authentication methods delivers stronger security and better, simpler user experiences. Windows Hello for Business provides phishing-resistant credentials as required by some security guidelines such as the &lt;A class="lia-external-url" href="https://learn.microsoft.com/compliance/anz/e8-mfa-maturity-level-2" target="_blank" rel="noopener"&gt;Australian Cyber Security Centre ‘Essential Eight’&lt;/A&gt;. If you’re not already doing so, deploying cloud-native devices is a great opportunity to start using Windows Hello for Business, especially since it’s enabled by default on these devices. Windows Hello for Business is also a feature which results in a win-win scenario by enhancing security for IT, while also improving the user experience.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;While enabling Windows Hello for Business is a simple process, there’s some additional configuration required to enable single sign-on to on-premises Active Directory authenticated resources, and this is where we sometimes see customers running into issues. If username and password work successfully to access an on-premises resource, but Windows Hello for Business credentials don’t then ensure that you’ve setup &lt;A class="lia-external-url" href="https://learn.microsoft.com/windows/security/identity-protection/hello-for-business/deploy/hybrid-cloud-kerberos-trust?tabs=intune" target="_blank" rel="noopener"&gt;Cloud Kerberos trust&lt;/A&gt; to enable single sign-on. Cloud Kerberos Trust removes much of the complexity once associated with configuring Windows Hello for Business, greatly simplifying the deployment process.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When signing in with Windows Hello for Business, the device uses a partial Kerberos TGT issued by Microsoft Entra ID to obtain a full TGT from Active Directory, which in turn is used to get session keys to access resources. Refer to &lt;A class="lia-external-url" href="https://learn.microsoft.com/windows/security/identity-protection/hello-for-business/how-it-works-authentication#microsoft-entra-join-authentication-to-active-directory-using-cloud-kerberos-trust" target="_blank" rel="noopener"&gt;Microsoft Entra join authentication to Active Directory using cloud Kerberos trust&lt;/A&gt; for additional details.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Zero Trust and modern connectivity&lt;/H2&gt;
&lt;P&gt;On your Zero Trust journey, if you need to provide access to on-premises applications and services, consider replacing your traditional VPN with a modern solution, enabled by &lt;A class="lia-external-url" href="https://www.microsoft.com/security/business/identity-access/microsoft-entra-private-access" target="_blank" rel="noopener"&gt;Microsoft Entra Private Access&lt;/A&gt;. Doing so will help you ensure secure, fine-grained access to private applications and resources, without exposing your full network - aligned with Microsoft’s three &lt;A class="lia-external-url" href="https://learn.microsoft.com/security/zero-trust/zero-trust-overview" target="_blank" rel="noopener"&gt;Zero Trust principles&lt;/A&gt;: verify explicitly, enforce least privilege, and assume breach. Review &lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/microsoftintuneblog/zero-trust-and-cloud-native-windows/4435891" target="_blank" rel="noopener" data-lia-auto-title="Zero Trust and Cloud-Native Windows" data-lia-auto-title-active="0"&gt;Zero Trust and Cloud-Native Windows&lt;/A&gt; for a deeper dive into this topic.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;On the subject of Zero Trust, did you know that Microsoft has developed a &lt;A class="lia-external-url" href="https://aka.ms/ztworkshop" target="_blank" rel="noopener"&gt;Zero Trust Workshop&lt;/A&gt;? &lt;BR /&gt;By adopting Zero Trust, your organization can enhance its security posture and reduce risk and complexity while improving compliance and governance. Navigating the complexities of modern security is challenging and a Zero Trust strategy is the first step in providing clarity and direction. The Zero Trust Workshop is a guided framework to help you translate your Zero Trust strategy into actionable implementation steps which track your deployment progress and align with Microsoft recommendations. We’ve had many customers leverage the workshop to supercharge their Zero Trust journey and realize the full value of their existing security investments. The workshop can be run self-guided or in collaboration with your Microsoft account team or a partner and is vendor agnostic.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Key takeaways&lt;/H2&gt;
&lt;UL&gt;
&lt;LI&gt;If you aren’t already provisioning new Windows devices as cloud-native, check out&amp;nbsp;&lt;A class="lia-external-url" href="https://aka.ms/gocloudnative" target="_blank" rel="noopener"&gt;Set up and configure a cloud-native Windows endpoint with Microsoft Intune&lt;/A&gt; and &lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/intunecustomersuccess/cloud-native-windows-endpoints-begin-by-beginning/4358804" target="_blank" rel="noopener" data-lia-auto-title="Cloud-native Windows endpoints: Begin by beginning" data-lia-auto-title-active="0"&gt;Cloud-native Windows endpoints: Begin by beginning&lt;/A&gt; to get started with a cloud-native Windows proof of concept today.&lt;/LI&gt;
&lt;LI&gt;Cloud-native doesn’t mean cloud only, these devices get the benefits of being cloud-first while maintaining the backward compatibility needed to access on-premises resources when necessary.&lt;/LI&gt;
&lt;LI&gt;Modern identity solutions such as Microsoft Entra ID, Windows Hello for Business, and Zero Trust Network Access can simultaneously enhance security and user experience.&lt;/LI&gt;
&lt;LI&gt;Be sure to check out our &lt;A class="lia-external-url" href="https://aka.ms/ztworkshop" target="_blank" rel="noopener"&gt;Zero Trust Workshop&lt;/A&gt; to help you plan and implement these and other technologies as part of your Zero Trust strategy.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;If you have any questions, leave a comment below or reach out to us on X &lt;A class="lia-external-url" href="https://aka.ms/IntuneSuppTeam" target="_blank" rel="noopener"&gt;@IntuneSuppTeam&lt;/A&gt;!&lt;/P&gt;</description>
      <pubDate>Sat, 15 Nov 2025 00:05:54 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/intune-customer-success/debunking-the-myth-cloud-native-windows-devices-and-access-to-on/ba-p/4470056</guid>
      <dc:creator>Intune_Support_Team</dc:creator>
      <dc:date>2025-11-15T00:05:54Z</dc:date>
    </item>
    <item>
      <title>Support tip: Aligning network policy with Microsoft Intune and Zero Trust</title>
      <link>https://techcommunity.microsoft.com/t5/intune-customer-success/support-tip-aligning-network-policy-with-microsoft-intune-and/ba-p/4466688</link>
      <description>&lt;P&gt;&lt;STRONG&gt;By: Jon Callahan – Sr Product Manager | Microsoft Intune&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cloud services don’t just rely on the network. They redefine it. As organizations adopt Microsoft Intune and advance their Zero Trust strategies, many discover that traditional, perimeter-based architectures no longer align with modern security expectations or the connectivity needs of a distributed workforce.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Zero Trust is built on the principle of "&lt;EM&gt;never trust, always verify,&lt;/EM&gt;” where access decisions are enforced through identity, device health, and compliance signals. &amp;nbsp;Microsoft Intune strengthens this model by extending security and management through the cloud. By removing dependencies on on-premises infrastructure, it strengthens network resilience and Zero Trust enforcement with policy-driven device management and secure connectivity to Microsoft endpoints.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This is where friction occurs. Traditional enterprise networks were built around a castle-and-moat model of perimeter defense: build high walls around the perimeter and trust everything inside, rather than identity-based access. Centralized egress points, VPNs, proxy servers, and deep packet or TLS inspection worked well when apps, data, and users stayed inside the moat.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Today, work and data are everywhere. Legacy network designs often force traffic into hairpinned routes (indirect paths through central gateways) that add latency, reduce performance, and increase management overhead for Intune, Microsoft 365, and other SaaS apps.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The challenge deepens when network teams try to maintain allow lists for cloud services using static IP addresses. Microsoft’s endpoint IPs can change frequently, especially with CDN-backed services like Intune and Microsoft 365, to strengthen security, improve resilience, and scale globally. This is why Microsoft recommends domain-based egress policies, frequent updates based on the published endpoint lists, and bypassing SSL inspection for &lt;A class="lia-external-url" href="https://learn.microsoft.com/intune/intune-service/fundamentals/intune-endpoints?#access-for-managed-devices" target="_blank" rel="noopener"&gt;Microsoft-bound traffic that doesn’t support inspection&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Enabling cloud services&lt;/H2&gt;
&lt;P&gt;The shift to hybrid work environments shows the limits of perimeter-based networks. Users expect fast and reliable access to their apps and data whether at home, in the office, or on the go.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To support this shift, organizations need to modernize their network architecture and policies. Local&lt;STRONG&gt; &lt;/STRONG&gt;internet egress and optimized paths to trusted services like Intune are essential. Policies built on Zero Trust and cloud-native principles help ensure performance and security. In contrast, controls such as VPN-only access, TLS inspection, or centralized proxies often slow users down and block required endpoints.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When networks get in the way, the impact is noticed:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Device check-ins and compliance evaluations fail, leaving devices marked as non-compliant&lt;/LI&gt;
&lt;LI&gt;Enrollments stall or time out&lt;/LI&gt;
&lt;LI&gt;Apps download slowly, fail to update, or never install&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When these failures occur, users often blame Intune or their IT admins, even when the real issue is network policies.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In a Zero Trust model, network policy works alongside identity and device-based signals to enforce access decisions. &lt;STRONG&gt;Network policy should enable cloud services, not obstruct them&lt;/STRONG&gt;. Adopting cloud-native connectivity and Zero Trust enforcement protects users, devices, and data while improving reliability and user experience.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This approach aligns with Microsoft’s &lt;A class="lia-external-url" href="https://www.microsoft.com/trust-center/security/secure-future-initiative" target="_blank" rel="noopener"&gt;Secure Future Initiative (SFI)&lt;/A&gt; and the principle of “Secure by Design,” which extend Zero Trust principles into the foundation of how services are built and operated. As part of this effort, Intune service endpoints are moving to Azure Front Door to enhance security, reliability, and performance while simplifying firewall management across Microsoft services. For details on required IP addresses and endpoints, see &lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/intunecustomersuccess/support-tip-upcoming-microsoft-intune-network-changes/4452738" target="_blank" rel="noopener" data-lia-auto-title="Support tip: Upcoming Microsoft Intune network changes" data-lia-auto-title-active="0"&gt;Support tip: Upcoming Microsoft Intune network changes&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Outbound traffic management&lt;/H2&gt;
&lt;P&gt;Aligning network policies with Zero Trust and cloud-native architecture can require trade-offs. Outbound traffic management is critical for Intune’s performance, but organizations differ in their compliance needs and tolerance for complexity. Below are three common models we see with our customers.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Endpoint enforced access&lt;/H3&gt;
&lt;P&gt;This model eliminates perimeter bottlenecks by moving enforcement closer to the user, device, and apps, which is the core of Zero Trust. Enforcement happens at the endpoint through identity, compliance, and device health signals, while the network provides fast, direct internet access with minimal restrictive filtering.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Best for:&lt;/STRONG&gt; Organizations ready to adopt a Zero Trust network architecture built on Intune and identity-driven signals, or those with minimal outbound filtering requirements.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;How to implement:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Policy-based enforcement and compliance:&lt;/STRONG&gt; Intune enforces and validates device health and measures device compliance and app protection policies for Microsoft Entra Conditional Access&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Identity-driven enforcement&lt;/STRONG&gt;: Microsoft Entra Conditional Access evaluates signals such as user identity, device compliance, and risk level before granting access to cloud resources&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Threat protection:&lt;/STRONG&gt; Microsoft Defender for Endpoint monitors device risk and blocks compromised endpoints from accessing cloud resources; enforce the built-in firewall on Windows and macOS devices&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Bypass traffic inspection:&lt;/STRONG&gt; Don’t decrypt or inspect Intune and related Microsoft traffic using technologies like proxies, TLS inspection, deep packet inspection, or data loss prevention systems&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Use split-tunnel VPN and local internet egress:&lt;/STRONG&gt; Route Intune and Microsoft 365 traffic locally to avoid unnecessary hairpinning&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Benefits&lt;/STRONG&gt;:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Establishes Zero Trust controls with identity, device, and threat-based enforcement&lt;/LI&gt;
&lt;LI&gt;Local internet egress and optimized paths to Intune and Microsoft 365 avoid latency and centralized paths&lt;/LI&gt;
&lt;LI&gt;No allow list or complex firewall rules to manage&lt;/LI&gt;
&lt;LI&gt;Avoids VPN, proxies, and TLS inspections and reduces the risk of interfering with user experience and device management failures&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This model requires strong endpoint management and identity controls to ensure Zero Trust enforcement.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Domain enforced filtering&lt;/H3&gt;
&lt;P&gt;When endpoint-only enforcement doesn’t meet your organization's requirements, Fully Qualified Domain Name (FQDN) filtering offers a middle ground by adding network controls while staying adaptable to dynamic cloud services. This approach should be paired with endpoint enforcement to maintain a Zero Trust architecture.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Best for:&lt;/STRONG&gt; Organizations that need outbound restrictions for compliance, while maintaining reliability and flexibility in cloud services.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;How to implement:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Use domain-based rules:&lt;/STRONG&gt; Filter traffic by FQDN rules that rely on DNS to adapt to changing IP addresses and CDN-backed services.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Leverage automation:&lt;/STRONG&gt; &lt;SPAN data-teams="true"&gt;Leverage the &lt;A class="lia-external-url" href="https://learn.microsoft.com/intune/intune-service/fundamentals/intune-endpoints?tabs=north-america#consolidated-endpoint-list" target="_blank" rel="noopener" aria-label="Link consolidated endpoint list"&gt;consolidated endpoint list&lt;/A&gt;, &lt;A class="lia-external-url" href="https://learn.microsoft.com/azure/virtual-network/service-tags-overview" target="_blank" rel="noopener" aria-label="Link Azure Firewall service tags"&gt;Azure Firewall service tags&lt;/A&gt;, or vendor tools to keep rules up to date.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Bypass traffic inspection for trusted services:&lt;/STRONG&gt; Avoid decrypting or inspecting Intune traffic, which can break certificate pinning and cause service failures.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Resolve locally:&lt;/STRONG&gt; Use local DNS and Internet egress so devices connect to the closest Microsoft endpoint.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Benefits:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Builds on endpoint enforced Zero Trust controls&lt;/LI&gt;
&lt;LI&gt;Easier maintenance than IP-based filtering&lt;/LI&gt;
&lt;LI&gt;Automatically adapts to Microsoft's dynamic, cloud-hosted services&lt;/LI&gt;
&lt;LI&gt;Reduces service disruptions when automated&lt;/LI&gt;
&lt;LI&gt;Aligns with most regulatory and compliance frameworks&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This model requires more robust network automation and may introduce additional processing overhead compared to endpoint-enforced access.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Domain and IP enforced filtering&lt;/H3&gt;
&lt;P&gt;This model combines FQDN-based rules with IP filtering for the strictest assurance. It provides maximum control but introduces the most overhead. Like domain enforced filtering, this too should be combined with endpoint enforcement to maintain a Zero Trust posture.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Best for:&lt;/STRONG&gt; Organizations in highly regulated industries that require dual enforcement with domains and IPs to meet strict audit and assurance needs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;How to implement for Intune:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Combine domain with IP rules:&lt;/STRONG&gt; Use FQDN alongside IP address ranges to filter traffic.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Automate aggressively:&lt;/STRONG&gt; &lt;SPAN data-teams="true"&gt;Leverage the &lt;A class="lia-external-url" href="https://learn.microsoft.com/intune/intune-service/fundamentals/intune-endpoints?tabs=north-america#consolidated-endpoint-list" aria-label="Link consolidated endpoint list" target="_blank"&gt;consolidated endpoint list&lt;/A&gt;, &lt;A class="lia-external-url" href="https://learn.microsoft.com/azure/virtual-network/service-tags-overview" aria-label="Link Azure Firewall service tags" target="_blank"&gt;Azure Firewall service tags&lt;/A&gt;, or vendor tools to keep rules up to date.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG style="color: rgb(30, 30, 30);"&gt;Bypass traffic inspection for trusted services:&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt; Exclude certificate-pinned services from TLS inspection to avoid breaking Intune functionality.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG style="color: rgb(30, 30, 30);"&gt;Optimize performance:&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt; Architect your network to use local DNS and internet egress so devices connect to the closest Microsoft endpoint.&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Benefits:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Builds on Zero Trust with the strictest network controls&lt;/LI&gt;
&lt;LI&gt;Provides dual verification for outbound traffic&lt;/LI&gt;
&lt;LI&gt;Helps satisfy strict regulatory and compliance requirements&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This model introduces the highest administrative overhead and complexity to maintain. It’s also the most likely to cause performance issues and service disruptions if not properly automated. However, for organizations with strict regulatory requirements, these trade-offs may be necessary to meet compliance obligations.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Extending with cloud-first controls&lt;/H2&gt;
&lt;P&gt;While traditional network models address outbound traffic at the infrastructure layer, a Zero Trust approach uses cloud-native security tools that eliminate many of these challenges. Issues like hairpinning, brittle IP allow lists, TLS inspection conflicts, and complex firewall rules stem from applying perimeter-era tools to cloud-based services. Cloud-first network and security tools reduce friction and strengthen Zero Trust.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Cloud-delivered secure web gateway (SWG):&lt;/STRONG&gt; Provides secure access to internet and SaaS apps while protecting against internet threats, building on the capabilities of traditional proxies (Microsoft Entra Internet Access)&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Zero Trust Network Access (ZTNA):&lt;/STRONG&gt; Connects users securely from any device and any network without relying on VPNs or central tunneling (Microsoft Entra Private Access)&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Data loss prevention (DLP):&lt;/STRONG&gt; Protects sensitive information across endpoints, Microsoft 365 apps, SaaS services, browsers, and on-premises file shares, with classification and policy enforcement (Microsoft Purview DLP)&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Cloud access security broker (CASB): &lt;/STRONG&gt;Provides SaaS discovery, session control, and real-time policy enforcement (Microsoft Defender for Cloud Apps)&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Managing outbound traffic for cloud services is about more than connectivity. It’s about aligning network policies so they enable cloud services and embrace Zero Trust principles like identity, device health, and compliance signals over legacy perimeter defenses. Microsoft Intune supports through policy-driven device management and security that reinforce Zero Trust and cloud-native adoption. The result is an architecture that secures your environment and delivers the reliability and user experience needed for today’s hybrid work.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;Resources&lt;/H1&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/intune/intune-service/fundamentals/intune-endpoints" target="_blank" rel="noopener"&gt;Intune network endpoints&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-external-url" style="font-style: normal; font-weight: 400; background-color: rgb(255, 255, 255);" href="https://learn.microsoft.com/intune/intune-service/fundamentals/intune-us-government-endpoints" target="_blank" rel="noopener"&gt;US government network endpoints for Intune&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-external-url" style="font-style: normal; font-weight: 400; background-color: rgb(255, 255, 255);" href="https://learn.microsoft.com/intune/intune-service/fundamentals/china-endpoints" target="_blank" rel="noopener"&gt;China endpoints for Intune&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" style="font-style: normal; font-weight: 400; background-color: rgb(255, 255, 255);" href="https://techcommunity.microsoft.com/blog/intunecustomersuccess/support-tip-upcoming-microsoft-intune-network-changes/4452738" target="_blank" rel="noopener" data-lia-auto-title="Support tip: Upcoming Microsoft Intune network changes" data-lia-auto-title-active="0"&gt;Support tip: Upcoming Microsoft Intune network changes&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-external-url" style="font-style: normal; font-weight: 400; background-color: rgb(255, 255, 255);" href="https://support.office.com/article/client-connectivity-4232abcf-4ae5-43aa-bfa1-9a078a99c78b" target="_blank" rel="noopener"&gt;Microsoft 365 network connectivity overview&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-external-url" style="font-style: normal; font-weight: 400; background-color: rgb(255, 255, 255);" href="https://learn.microsoft.com/azure/frontdoor/origin-security?tabs=app-service-functions&amp;amp;pivots=front-door-classic" target="_blank" rel="noopener"&gt;Azure Front Door&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-external-url" style="font-style: normal; font-weight: 400; background-color: rgb(255, 255, 255);" href="https://learn.microsoft.com/azure/virtual-network/service-tags-overview" target="_blank" rel="noopener"&gt;Azure service tags&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-external-url" style="font-style: normal; font-weight: 400; background-color: rgb(255, 255, 255);" href="https://www.microsoft.com/trust-center/security/secure-future-initiative" target="_blank" rel="noopener"&gt;Microsoft Secure Future Initiative (SFI)&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-external-url" style="font-style: normal; font-weight: 400; background-color: rgb(255, 255, 255);" href="https://www.microsoft.com/security/business/zero-trust" target="_blank" rel="noopener"&gt;Microsoft Zero Trust&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As always, if you have any questions let us know in the comments or reach out to us on X&amp;nbsp;&lt;A href="https://aka.ms/IntuneSuppTeam" target="_blank" rel="noopener"&gt;@IntuneSuppTeam&lt;/A&gt;!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Post updates:&lt;/STRONG&gt;&lt;BR /&gt;&lt;EM&gt;11/06/25: Updated URLs for Automation category (see Domain-Enforced Filtering section).&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 08 Nov 2025 01:04:31 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/intune-customer-success/support-tip-aligning-network-policy-with-microsoft-intune-and/ba-p/4466688</guid>
      <dc:creator>Intune_Support_Team</dc:creator>
      <dc:date>2025-11-08T01:04:31Z</dc:date>
    </item>
    <item>
      <title>From the frontlines: Empowering call center agents with Windows 365 Frontline</title>
      <link>https://techcommunity.microsoft.com/t5/intune-customer-success/from-the-frontlines-empowering-call-center-agents-with-windows/ba-p/4465820</link>
      <description>&lt;P&gt;&lt;STRONG&gt;By: Tania Lima – Sr Product Manager | Windows 365&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Editor’s Note - Updated 11/19/25: The new&amp;nbsp;&lt;STRONG&gt;User Experience&lt;/STRONG&gt; &lt;STRONG&gt;Sync &lt;/STRONG&gt;for Windows 365 Frontline in shared mode, announced at Ignite, delivers a consistent and seamless experience for users who frequently switch between shared Cloud PCs. This feature ensures that user settings and application data persist across sessions and devices within the same provisioning policy. Included with the Frontline license at no extra cost, it provides fast, transparent sign-ins and allows IT admins to monitor storage quotas and clear user storage when needed to resolve issues. Learn more here: &lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/windows-itpro-blog/windows-365-frontline-updates-and-cloud-apps-general-availability/4470644" data-lia-auto-title="Windows 365 Frontline updates and Cloud Apps general availability" data-lia-auto-title-active="0" target="_blank"&gt;Windows 365 Frontline updates and Cloud Apps general availability&lt;/A&gt;.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Call centers are dynamic environments where agents often work in shifts, handling customer inquiries around the clock. Providing these frontline employees with secure, consistent, and accessible computing environments is critical to maintaining productivity and excellent service. However, traditional desktop deployments, whether physical PCs or complex virtual desktop infrastructure (VDI), are often challenging to manage and scale for a shift-based workforce.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Microsoft Windows 365 Frontline addresses this challenge by delivering Cloud PCs optimized for shift and part-time workers. With Windows 365 Frontline, organizations give call center agents full Windows desktop experiences from the cloud, while optimizing costs through a flexible licensing model that enables multiple employees to share Cloud PC resources during their respective shifts. This article explores the two modes of Windows 365 Frontline – dedicated and shared – and offers guidance on choosing the right approach for call centers, along with best practices for Microsoft Intune configuration and provisioning in these scenarios.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Windows 365 Frontline overview&lt;/H2&gt;
&lt;P&gt;Windows 365 is Microsoft's Cloud PC service that streams a full Windows desktop to any device. Windows 365 Frontline is a specialized offering within Windows 365 designed for organizations with frontline or shift-based workers – employees who don't need a Cloud PC 24/7, but rather only during working hours or on an intermittent basis. Instead of assigning a traditional one-to-one Cloud PC license per user, Frontline licenses are shared at the tenant level, allowing multiple users to utilize the same Cloud PC resources at different times. This model can significantly reduce costs for call centers and similar environments by ensuring you only pay for the maximum number of concurrent Cloud PC sessions needed, not for every employee in the directory.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Windows 365 Frontline offers two modes of operation to accommodate different use cases: dedicated mode and shared mode. Both modes provide the same secure, high-performance Windows experience via the cloud, integrated with Microsoft Intune for management and Microsoft Entra ID for identity and security. The difference lies in how Cloud PCs are provisioned and used by multiple users.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Dedicated mode: Personalized Cloud PCs for shift workers&lt;/H3&gt;
&lt;P&gt;With Frontline Cloud PC in dedicated mode, each licensed user is provisioned their own personal Cloud PC, the same as a standard Windows 365 Enterprise scenario – with one crucial twist: a single Frontline license entitles up to three Cloud PCs, assigned to three different users, so long as only one Cloud PC is in use at any given time. In other words, one license is equivalent to 3 users (one active session at a time). This non-concurrent licensing is ideal for shift work. For example, if you have three call center agents covering morning, afternoon, and night shifts, you can assign each their own Cloud PC while consuming only one Frontline license. Each agent gets a dedicated, persistent Windows desktop with their apps, settings, and data, which remains available every time they log in.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Because Frontline Cloud PC in dedicated mode is personal to each user, the user experience is consistent and tailored. Agents can customize their desktop, set up applications (or have them deployed via Intune), and retain files or settings from session to session. We recommend this mode or scenarios where employees require a prolonged and consistent desktop experience – for instance, full-time or regular part-time call center employees who work scheduled shifts on a daily basis. It ensures that each agent always returns to their own workspace in the cloud.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To streamline shift handovers, Windows 365 Frontline Cloud PC in dedicated mode includes a built-in concurrency buffer that allows a temporary overlap of active sessions beyond the license limit. This is designed for those situations where one agent hasn't signed off yet and the next shift agent needs to sign in a few minutes early. The concurrency buffer permits exceeding the max concurrent user limit for short periods (up to 1 hour, a few times per day) to avoid blocking users during shift handovers. This means if one agent's session slightly overlaps with another's, both can be connected briefly without needing an extra license, and without being forced to log off. Once the time limit expires, users will be unable to log in until a Cloud PC is available.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Shared mode: Ephemeral Cloud PCs for occasional use&lt;/H3&gt;
&lt;P&gt;In Frontline Cloud PC in shared mode, a Cloud PC is not tied to any single user. Instead, you set up a collection of one or more Frontline Cloud PC in shared mode that a group of users can access one at a time. When someone in the group connects to a shared Cloud PC, they can receive either a persistent or a non-persistent session. Administrators can turn on the new User Experience Sync feature if they want users to enjoy a consistent experience—this ensures that applications storing user settings or app data will keep that information across sessions, including maintaining other Windows features like accessibility options. Alternatively, if preferred, a new user profile is created at each login, and once the user signs out, all session data is erased and the next user to sign in starts with a clean environment. This mode allows a Cloud PC to be truly shared among many users serially. Each Frontline license in shared mode allows you to provision one Cloud PC for the pool (thus one license = one Cloud PC accessible by many users, but still only one active user on that Cloud PC at a time).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Shared mode is well-suited for scenarios where users need only occasional or brief access to a Windows environment rather than a daily dedicated workspace. For example, consider a training workstation in a call center or a kiosk-style PC for supervisors to quickly check reports. Another use case is for temporary staff or contractors who log in infrequently. In a call center context, shared mode could be used for a “floater” Cloud PC that any agent can use when extra capacity is needed, or for machines set aside for specific short tasks such as quality assurance checks by various team members. We don’t recommend shared mode for standard call center agents who have regular shifts, because those users benefit more from a persistent environment and dedicated mode can still provide cost savings in those cases. Instead, shared mode shines for truly ad-hoc access scenarios, where personalization isn't required.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;With Frontline Cloud PC in shared mode, since no user profile persists, it's important to ensure apps and configurations needed for the common tasks are pre-installed or available on demand. Users rely on cloud storage (OneDrive, SharePoint, web applications) for any data they need to save, because once they log off a shared Cloud PC, nothing is retained locally. The upside is that IT maintains a singular baseline configuration for all shared sessions and there's zero risk of one user’s data bleeding into the next session – the wipe on logoff provides a clean slate and extra security.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Dedicated vs. shared mode comparison&lt;/H3&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table class="lia-align-center lia-indent-margin-left-150px lia-border-style-solid" border="1" style="width: 76.9444%; border-width: 1px;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Feature&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Frontline Cloud PC in dedicated mode&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Frontline Cloud PC in shared mode&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Cloud PCs per license&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Up to 3 Cloud PCs per license (user-specific). Only 1 Cloud PC can be active at once (per license).&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;1 Cloud PC per license (pooled). Only 1 user session active at once (per Cloud PC).&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;User experience&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Personalized persistent desktop for each user; data and settings saved between sessions.&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Non-persistent, generic desktop; user profile and data are reset on sign-out.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Suitable use cases&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Shift workers who need their own space and apps (ex., daily call center agents with dedicated logins).&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Intermittent or short task usage (ex. shared training PC, occasional contractors or roaming supervisors).&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Provisioning method&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Cloud PCs are provisioned per user via Microsoft Entra ID group assignment. Each user gets their own Cloud PC instance.&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Cloud PCs are provisioned as a static pool (set number of identical Cloud PCs) and assigned to a group of users to share.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Intune management&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Managed like any other individually assigned device. Supports user-targeted configurations.&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Managed as shared devices. Use device-targeted configs for apps/scripts (via device groups or Autopilot device prep) since users do not retain installs.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Data storage&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Files and data persist on the Cloud PC (roam with user). Still recommended to use OneDrive/SharePoint for backup and mobility.&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Files and data do NOT persist locally. Must use OneDrive, SharePoint, or other cloud services for any data that needs to be retained.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Intune configuration and recommendations for call centers&lt;/H2&gt;
&lt;P&gt;Successfully deploying Windows 365 Frontline in a call center scenario requires optimal configuration of Microsoft Intune and adherence to best practices that maximize security and efficiency. Below are key recommendations.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Provisioning policies&lt;/H3&gt;
&lt;P&gt;Set up separate Windows 365 provisioning policies for your call center users depending on mode. In the Intune admin center, under &lt;STRONG&gt;Devices&lt;/STRONG&gt; &amp;gt; &lt;STRONG&gt;Windows 365&lt;/STRONG&gt; &amp;gt; &lt;STRONG&gt;Provisioning policies&lt;/STRONG&gt;, choose License type: Frontline, then specify the mode as dedicated or shared.&lt;/P&gt;
&lt;P&gt;For dedicated mode, assign the policy to a Microsoft Entra ID group containing your call center agents – Intune will automatically provision a Cloud PC for each user in the group (up to your license concurrency limits).&lt;/P&gt;
&lt;P&gt;For shared mode, assign the policy to a group of users and define the number of Cloud PC instances to create for that group. Name the shared Cloud PC pool descriptively (ex. "Call Center Training PC") so users recognize it. Use the Microsoft-hosted network unless integration with on-premises networks is needed and select a region close to your users for optimal performance.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Image and applications&lt;/H3&gt;
&lt;P&gt;Choose a base Cloud PC image that includes your core call center applications to speed up deployment. Microsoft provides gallery images (including options with Microsoft 365 Apps pre-installed). For Frontline Cloud PC in dedicated mode, each user gets this baseline image and can receive additional apps via Intune app deployment or Company Portal. For Frontline Cloud PC in shared mode, it's crucial to preload critical apps since users won't persist installs. Leverage the Windows Autopilot deployment preparation (preview) feature for shared mode provisioning policies. This feature lets you specify device-targeted apps and scripts that Intune should install on each Cloud PC during provisioning, ensuring that even the first user to sign in has all the required software ready. It helps avoid managing custom images while still delivering necessary apps on a clean shared PC each time.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Microsoft Entra ID groups for access&lt;/H3&gt;
&lt;P&gt;Manage which users can access Cloud PCs by controlling Microsoft Entra ID group membership. Since Frontline licenses are not assigned to individuals but pooled, any user in the provisioning policy’s assignment group will get access. For dedicated mode, ensure the group size aligns with available licenses (3 users per license). If the group has more users than license capacity, some users may not get a Cloud PC provisioned until additional licenses are added. Use the Connected Frontline Cloud PCs report in the Intune admin center to monitor how many Cloud PCs are active and if you’re hitting your license concurrency limit. Adjust group membership or purchase more licenses as needed to meet peak demand.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Session time limits&lt;/H3&gt;
&lt;P&gt;Configure automatic session timeouts to prevent a user from inadvertently locking a Cloud PC and blocking others. Use Intune to enforce idle session time limits and disconnected session sign-off for Windows 365 Frontline. For example, for a Frontline Cloud PC in shared mode that is idle for 15 minutes, disconnect the session, and for a session that has been disconnected for more than 5 or 10 minutes, sign the user out (ending the session).This ensures a Frontline Cloud PC in shared mode isn’t held by an inactive session, making it available to the next agent. For Frontline Cloud PC in dedicated mode, an idle timeout (e.g., 30 minutes) can free up the license concurrency slot without immediately logging the user off. You configure these settings in the Intune admin center using the settings catalog: Remote Desktop Session Host &amp;gt; Session Time Limits settings. Tuning these values helps balance user convenience with resource availability.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;OneDrive and user data&lt;/H3&gt;
&lt;P&gt;Encourage or enforce the use of OneDrive Known Folder Move for Desktop, Documents, and Pictures so that user files are redirected to cloud storage. In dedicated mode, this ensures that if a user moves to a new Cloud PC or device, their files roam with them. In shared mode, this step is even more critical: when the user logs off, anything saved only on the local profile is erased. With Known Folder Move and cloud-based productivity apps, even a non-persistent session feels seamless as users access their files from OneDrive or SharePoint. Similarly, if users use Outlook, enable cached Exchange mode with cloud mailboxes so that email data isn't lost between sessions. Alternatively, direct users to access the new Outlook or Outlook on the web to avoid local data use.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Security controls&lt;/H3&gt;
&lt;P&gt;Treat Cloud PCs as you would any corporate device: apply Microsoft Defender for Endpoint monitoring and security baselines via Intune. One big advantage of Windows 365 for call centers is enhanced security – by default, Cloud PCs keep data off the local machine that the user is connecting from. Use Intune policies or Windows 365 settings to disable clipboard and drive redirection, prevent screenshots, and add watermarking if agents handle highly sensitive information (so data on the Cloud PC can't be easily copied out). Additionally, enforce multi-factor authentication (MFA) for Cloud PC access through Microsoft Entra ID Conditional Access, and limit Cloud PC access to only trusted networks or compliant endpoint devices for an extra layer of protection.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Monitoring and scaling&lt;/H3&gt;
&lt;P&gt;Continuously monitor usage patterns. Windows 365 usage reports help identify if your call center is reaching the concurrent connection limit. If agents frequently find Cloud PCs unavailable (shared mode) or get blocked due to concurrency (dedicated mode), you likely need more Frontline licenses or an adjusted strategy. Aim to have enough Cloud PCs to cover peak usage. Thankfully, adding capacity is straightforward – purchase additional Frontline licenses and update your provisioning policies. For shared mode, increase the Cloud PC count in the pool; for dedicated, new users in the group automatically get Cloud PCs if licenses are available. Likewise, if usage is consistently below capacity, consider reducing the number of provisioned Cloud PCs to optimize costs. Windows 365 provides the flexibility to scale up or down easily as your call center staffing changes, enabling organizations to efficiently adapt to operational fluctuations and changing demands.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Endpoint devices&lt;/H3&gt;
&lt;P&gt;When call center agents operate on-site with shared physical PCs or thin clients to connect to their Cloud PCs, configure these physical endpoints appropriately for shared usage. Windows PCs can be set up in Microsoft Entra ID Shared Device Mode or as kiosk devices that only allow launching the Windows App or a web browser for Cloud PC access. This ensures the local device doesn't store data between users and is locked down to its purpose. Intune can manage these Frontline Cloud PC in shared mode with policies to clear temp files on logout, enforce idle sign-out, and automatically launch the Windows App at login. By managing both the Cloud PC and the access device in Intune, IT creates a cohesive, secure experience for rotating call center shifts.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Windows 365 Link devices in call centers&lt;/H2&gt;
&lt;P&gt;Windows 365 Link devices offer a transformative solution for call centers by simplifying endpoint management and enhancing remote operability. These devices enable seamless access to Cloud PCs with high-fidelity Microsoft Teams support and multimedia redirection, which is critical for voice and video-heavy workflows. Windows 365 Link allows secure connections even to Cloud PCs that have never been signed into before, reducing onboarding friction for third-party agents. This is especially valuable for remote call centers, where maintaining client machines is challenging. Windows 365 Link can be shipped pre-configured, minimizing setup complexity and support overhead. Using Link devices supports scalable, secure, and efficient operations without compromising user experience or enterprise security policies. Windows 365 Link devices are intended to be managed in a manner consistent with other Windows endpoints within Intune; however, they operate on a streamlined Windows Cloud PC OS. This design reduces the range of management actions available, particularly with respect to enrollment and ongoing management actions. For more information visit &lt;A class="lia-external-url" href="https://learn.microsoft.com/windows-365/link/" target="_blank" rel="noopener"&gt;Windows 365 Link documentation&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Microsoft Teams&lt;/H2&gt;
&lt;P&gt;If Microsoft Teams is part of the daily workflow for call center agents, we strongly recommend deploying the Microsoft Teams-optimized Windows App to access their Cloud PCs from Windows-based clients, in place of using the standard web-client. This approach ensures better performance, enhanced audio and video quality, and full support for Teams-specific optimizations such as offloading media traffic and reducing latency.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Simple connection requirements for partners&lt;/H2&gt;
&lt;P&gt;Many large organizations will work with third party call center partners to provide agents to support their customers, either as business as usual, or to provide out of hours and coverage for high call volume events. Ensuring these partner organizations can connect to your infrastructure, and connect to your applications, can be challenging and any changes can take time for your partners to roll out. By using Windows 365, you can deliver a defined list of software and network requirements (Windows App, with access to the Windows Cloud endpoints / Teams / Call Centre software), and minimize the number of changes required as your business evolves. Providing access to a new application, service, or resource is handled within the Cloud PCs that you control with no technical changes needed by the vendor or partner.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Remote call center and BYOD scenarios&lt;/H2&gt;
&lt;P&gt;Windows 365 empowers organizations to support remote call center agents through secure, scalable Cloud PC deployments that work seamlessly across bring your own device (BYOD) environments. Whether agents use personal laptops, tablets, or mobile phones, Windows 365 ensures secure access to corporate resources via the Windows app or browser-based clients, minimizing infrastructure overhead and simplifying endpoint management. This flexibility is especially valuable for outsourced or third-party call center partners, where device diversity and network variability are common. By centralizing application access within the Cloud PC, organizations enforce consistent security policies, reduce onboarding friction, and deliver reliable user experience, regardless of the agent’s physical location or device type. This model not only enhances operational agility but also strengthens data protection by isolating corporate workloads from unmanaged endpoints.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Conclusion&lt;/H2&gt;
&lt;P&gt;Windows 365 Frontline represents a transformative approach for call centers seeking to empower their agents with secure, flexible, and cost-effective computing environments. By offering both dedicated and shared modes, organizations can tailor Cloud PC deployments to match the unique needs of shift-based and occasional workers, optimizing resource utilization and reducing operational complexity. With robust integration into Microsoft Intune and Microsoft Entra ID, IT teams can streamline provisioning, enforce security best practices, and ensure seamless user experiences, whether agents are on-site, remote, or using their own devices. Ultimately, Windows 365 Frontline enables call centers to scale efficiently, enhance data protection, and deliver consistent service quality in today’s dynamic work landscape.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This blog is part of the &lt;A class="lia-external-url" href="https://aka.ms/Intune/FLW-home" target="_blank" rel="noopener" data-lia-auto-title="“From the Frontlines”" data-lia-auto-title-active="0"&gt;“From the Frontlines”&lt;/A&gt; series, where we explore different scenarios of how workers in field use devices and how IT admins can enable them. Check the other blog posts for more inspiration!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As always, if you have any questions let us know in the comments or reach out to us on X&amp;nbsp;&lt;A class="lia-external-url" href="https://aka.ms/IntuneSuppTeam" target="_blank" rel="noopener"&gt;@IntuneSuppTeam&lt;/A&gt;&amp;nbsp;or&amp;nbsp;&lt;A class="lia-external-url" href="https://aka.ms/MSIntune" target="_blank" rel="noopener"&gt;@MSIntune&lt;/A&gt;!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Post Updates:&lt;/STRONG&gt;&lt;BR /&gt;11/19/25: Updates to the "&lt;EM&gt;Shared mode: Ephemeral Cloud PCs for occasional use&lt;/EM&gt;" section highlighting new flexibility in shared Frontline Cloud PCs, including optional user experience persistence and simplified shared licensing.&lt;/P&gt;</description>
      <pubDate>Thu, 20 Nov 2025 00:53:25 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/intune-customer-success/from-the-frontlines-empowering-call-center-agents-with-windows/ba-p/4465820</guid>
      <dc:creator>Intune_Support_Team</dc:creator>
      <dc:date>2025-11-20T00:53:25Z</dc:date>
    </item>
    <item>
      <title>Simplifying compliance remediation with Microsoft Intune and Defender on iOS/iPadOS</title>
      <link>https://techcommunity.microsoft.com/t5/intune-customer-success/simplifying-compliance-remediation-with-microsoft-intune-and/ba-p/4465293</link>
      <description>&lt;P&gt;&lt;STRONG&gt;By: Harish S | Sr. Product Manager - Microsoft Defender &amp;amp; Rishita Sarin | Product Manager 2 - Microsoft Intune&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;One tap to compliance:&lt;/STRONG&gt; Introducing the Resolve workflow for Compliance Remediation in Microsoft Intune and Microsoft Defender on iOS.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We’re thrilled to announce a major step forward in simplifying the compliance remediation experience for users and IT admins alike. As part of a collaboration between Microsoft Intune and Microsoft Defender, we’re introducing a new compliance remediation workflow, which uses a &lt;STRONG&gt;Resolve&lt;/STRONG&gt; button to make it easier than ever for users to bring their mobile device back into compliance.&lt;/P&gt;
&lt;H2&gt;Why this matters&lt;/H2&gt;
&lt;P&gt;Traditionally, when a user’s device was marked noncompliant due to missing security apps like Microsoft Defender, they had to navigate through multiple apps, follow multi-step instructions, and often re-authenticate – often to resolve a single issue. This created friction, confusion, and delays in regaining access to corporate resources.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;With the new end-to-end remediation workflow triggered by the &lt;STRONG&gt;Resolve&lt;/STRONG&gt; button, we’re eliminating those extra steps.&lt;/P&gt;
&lt;H2&gt;What’s news&lt;/H2&gt;
&lt;P&gt;Starting with the latest releases in Intune and Defender, users on iOS and iPadOS will have a &lt;STRONG&gt;Resolve&lt;/STRONG&gt; button directly within Microsoft 365 productivity apps (such as Microsoft Outlook or Teams) when their device is non-compliant due to Defender-related requirements. This button:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Detects the non-compliance reason.&lt;/LI&gt;
&lt;LI&gt;Launches or installs Microsoft Defender if it’s missing.&lt;/LI&gt;
&lt;LI&gt;Automatically re-evaluates compliance requirements once Defender is running.&lt;/LI&gt;
&lt;LI&gt;Returns the user to their app – no switching, no guesswork.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;This is powered by just-in-time (JIT) registration and compliance remediation which embeds the compliance flow directly into the app experience.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Microsoft Defender experience: Guided, automated, and frictionless return to compliance&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;The &lt;STRONG&gt;Resolve&lt;/STRONG&gt; button is more than just a shortcut, it’s the entry point to a guided remediation workflow powered by Defender. Once launched:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Defender auto-triggers a guided workflow that remediates issues with minimal or no user interaction.&lt;/LI&gt;
&lt;LI&gt;A checklist guides the user through necessary steps to return to compliance, ensuring clarity and confidence on common scenarios such as authentication issues, missing permissions, device registration issues, remediate active threats, and more.&lt;/LI&gt;
&lt;LI&gt;Upon completion, Defender updates the compliance state of the device.&lt;/LI&gt;
&lt;LI&gt;The user is automatically redirected back to the productivity app they started from with no manual navigation required.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;This seamless handoff between Intune and Defender ensures that users stay focused on their work, not on troubleshooting.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;div contenteditable="false" class="lia-embeded-content"&gt;&lt;iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FaxQmY2P89d8%3Ffeature%3Doembed&amp;amp;display_name=YouTube&amp;amp;url=https%3A%2F%2Fwww.youtube.com%2Fshorts%2FaxQmY2P89d8&amp;amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FaxQmY2P89d8%2Fhq2.jpg&amp;amp;type=text%2Fhtml&amp;amp;schema=youtube" title="YouTube embed" scrolling="no" allowfullscreen="allowfullscreen" frameborder="0" allow="autoplay; fullscreen; encrypted-media; picture-in-picture;" class="lia-iframe-embeded" sandbox="allow-scripts allow-same-origin"&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;H2&gt;Conclusion&lt;/H2&gt;
&lt;P&gt;Effortless for users, efficient for admins.&lt;/P&gt;
&lt;P&gt;If you already use JIT registration and compliance remediation in Intune for enrolled iOS devices, the &lt;STRONG&gt;Resolve&lt;/STRONG&gt; button is automatically enabled for supported scenarios. If not, consider setting up JIT now to experience the new compliance remediation experience, it’s simple to configure and significantly improves user experience and support efficiency. Refer to the following documentation for more information:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/intune/intune-service/enrollment/set-up-just-in-time-registration" target="_blank" rel="noopener"&gt;Set up just-in-time registration&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/intunecustomersuccess/use-jit-registration-and-jit-compliance-remediation-for-all-your-iosipados-enrol/4200451" target="_blank" rel="noopener" data-lia-auto-title="Use JIT registration and JIT compliance remediation for all your iOS/iPadOS enrollments" data-lia-auto-title-active="0"&gt;Use JIT registration and JIT compliance remediation for all your iOS/iPadOS enrollments&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you have any questions, leave a comment on this post or reach out on X &lt;A class="lia-external-url" href="https://aka.ms/IntuneSuppTeam" target="_blank" rel="noopener"&gt;@IntuneSuppTeam&lt;/A&gt;.&lt;/P&gt;</description>
      <pubDate>Thu, 30 Oct 2025 17:49:50 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/intune-customer-success/simplifying-compliance-remediation-with-microsoft-intune-and/ba-p/4465293</guid>
      <dc:creator>Intune_Support_Team</dc:creator>
      <dc:date>2025-10-30T17:49:50Z</dc:date>
    </item>
    <item>
      <title>Microsoft Intune Settings Catalog Updated to Support New Windows 11, version 25H2 Settings</title>
      <link>https://techcommunity.microsoft.com/t5/intune-customer-success/microsoft-intune-settings-catalog-updated-to-support-new-windows/ba-p/4462927</link>
      <description>&lt;P&gt;&lt;STRONG&gt;By Mayur Jahdav, Product Manager | Microsoft Intune&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;With the recent release of&amp;nbsp;&lt;A class="lia-external-url" href="https://aka.ms/Windows11/25H2/UpdateHistory" target="_blank" rel="noopener"&gt;Windows 11, version 25H2&lt;/A&gt;, Microsoft Intune delivered&lt;STRONG&gt; &lt;/STRONG&gt;support for 36 new 25H2 settings. IT admins can confidently manage devices running the latest Windows OS version from the moment they deploy it in their environment for testing or production use.&lt;/P&gt;
&lt;P&gt;We continue to invest in the settings catalog infrastructure to ensure timely support for new Windows policy settings. This enables organizations to adopt new OS versions and features without delay and maintain secure, compliant, and well-managed environments.&lt;/P&gt;
&lt;H3&gt;New settings in the settings catalog&lt;/H3&gt;
&lt;P&gt;As part of our day zero support for Windows 11, version 25H2, the&amp;nbsp;&lt;A class="lia-external-url" href="https://learn.microsoft.com/intune/intune-service/configuration/settings-catalog" target="_blank" rel="noopener"&gt;settings catalog&lt;/A&gt; includes the newly released Windows 11, version 25H2 settings. The following table lists newly added settings that are now available for configuration using the settings catalog and are ready for use in device configuration profiles to manage Windows endpoints.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table class="lia-border-style-solid" border="1" style="width: 100%; height: 1639px; border-width: 1px;"&gt;&lt;tbody&gt;&lt;tr style="height: 39px;"&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;&lt;STRONG&gt;Category Name&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;&lt;STRONG&gt;Name&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;&lt;STRONG&gt;Friendly Name&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 67px;"&gt;&lt;td style="height: 67px;"&gt;
&lt;P&gt;Administrative Templates\Windows Components\App Package Deployment&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 67px;"&gt;
&lt;P&gt;RemoveDefaultMicrosoftStorePackages&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 67px;"&gt;
&lt;P&gt;Remove Default Microsoft Store packages from the system.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 67px;"&gt;&lt;td style="height: 67px;"&gt;
&lt;P&gt;Administrative Templates\Windows Components\Sync your settings&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 67px;"&gt;
&lt;P&gt;EnableWindowsBackup&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 67px;"&gt;
&lt;P&gt;Enable Windows Backup&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 67px;"&gt;&lt;td style="height: 67px;"&gt;
&lt;P&gt;Auditing&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 67px;"&gt;
&lt;P&gt;AccountLogonLogoff_AuditGroupMembership&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 67px;"&gt;
&lt;P&gt;Account Logon Logoff Audit Group Membership&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 39px;"&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;Human Presence&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;ForceOnlookerDetectionAction&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;Force Onlooker Detection Action&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 39px;"&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;Human Presence&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;ForceOnlookerDetection&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;Force Onlooker Detection&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 67px;"&gt;&lt;td style="height: 67px;"&gt;
&lt;P&gt;Microsoft App Store&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 67px;"&gt;
&lt;P&gt;ConfigureMSIXAuthenticationAuthorizedDomains&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 67px;"&gt;
&lt;P&gt;Configure MSIX Authentication Authorized Domains&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 39px;"&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;News And Interests&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;DisableWidgetsBoard&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;Disable Widgets Board&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 39px;"&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;News And Interests&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;DisableWidgetsOnLockScreen&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;Disable Widgets On Lock Screen&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 39px;"&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;Power&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;EnableEnergySaver&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;Enable Energy Saver&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 39px;"&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;Printers&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;RequireIppsPolicy&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;Require Ipps Policy&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 39px;"&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;Privacy&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;LetAppsAccessSystemAIModels&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;Let Apps Access System AI Models&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 67px;"&gt;&lt;td style="height: 67px;"&gt;
&lt;P&gt;Start&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 67px;"&gt;
&lt;P&gt;TurnOffAbbreviatedDateTimeFormat&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 67px;"&gt;
&lt;P&gt;Turn Off Abbreviated Date Time Format (User)&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 39px;"&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;Start&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;HideCategoryView&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;Hide Category View (User)&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 39px;"&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;Start&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;ConfigureStartPins&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;Configure Start Pins (User)&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 39px;"&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;Start&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;AlwaysShowNotificationIcon&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;Always Show Notification Icon (User)&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 39px;"&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;Start&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;ConfigureStartPins&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;Configure Start Pins&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 39px;"&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;Start&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;HideCategoryView&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;Hide Category View&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 39px;"&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;System&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;AllowOOBEUpdates&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;Allow OOBE Updates&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 67px;"&gt;&lt;td style="height: 67px;"&gt;
&lt;P&gt;Windows AI&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 67px;"&gt;
&lt;P&gt;SetMaximumStorageSpaceForRecallSnapshots&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 67px;"&gt;
&lt;P&gt;Set Maximum Storage Space For Recall Snapshots&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 39px;"&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;Windows AI&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;DisableSettingsAgent&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;Disable Settings Agent&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 39px;"&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;Windows AI&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;AllowRecallEnablement&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;Allow Recall Enablement&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 39px;"&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;Windows AI&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;SetDenyAppListForRecall&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;Set Deny App List For Recall (User)&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 39px;"&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;Windows AI&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;DisableClickToDo&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;Disable Click To Do (User)&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 39px;"&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;Windows AI&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;SetCopilotHardwareKey&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;Set Copilot Hardware Key (User)&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 39px;"&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;Windows AI&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;SetDenyAppListForRecall&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;Set Deny App List For Recall&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 39px;"&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;Windows AI&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;DisableImageCreator&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;Disable Image Creator&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 39px;"&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;Windows AI&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;DisableCocreator&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;Disable Cocreator&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 67px;"&gt;&lt;td style="height: 67px;"&gt;
&lt;P&gt;Windows AI&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 67px;"&gt;
&lt;P&gt;SetMaximumStorageSpaceForRecallSnapshots&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 67px;"&gt;
&lt;P&gt;Set Maximum Storage Space For Recall Snapshots (User)&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 39px;"&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;Windows AI&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;DisableClickToDo&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;Disable Click To Do&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 39px;"&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;Windows AI&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;SetDenyUriListForRecall&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;Set Deny Uri List For Recall (User)&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 39px;"&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;Windows AI&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;DisableGenerativeFill&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;Disable Generative Fill&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 39px;"&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;Windows AI&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;SetDenyUriListForRecall&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;Set Deny Uri List For Recall&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 39px;"&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;Display&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;ConfigureMultipleDisplayMode&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;Configure Multiple Display Mode (User)&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 39px;"&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;Windows Backup And Restore&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;EnableWindowsRestore&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;Enable Windows Restore&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As Windows evolves and releases features through future feature updates as well as &lt;A class="lia-external-url" href="https://support.microsoft.com/windows/delivering-continuous-innovation-in-windows-11-b0aa0a27-ea9a-4365-9224-cb155e517f12" target="_blank" rel="noopener"&gt;continuous innovation&lt;/A&gt;, we’ll continue to review newly added or updated settings to includ in the Intune settings catalog. These may include new controls for security, privacy, user experience, and device management. Be sure to check &lt;A class="lia-external-url" href="https://aka.ms/IntuneWN" target="_blank" rel="noopener"&gt;What's new in Microsoft Intune&lt;/A&gt; regularly for additional settings as we add them and check out &lt;A class="lia-external-url" href="https://learn.microsoft.com/intune/intune-service/configuration/settings-catalog" target="_blank" rel="noopener"&gt;Create a policy using settings catalog in Microsoft Intune&lt;/A&gt; for guidance on how to configure and assign settings to your managed devices.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you have questions or feedback, please leave a comment on this post or reach out to the Intune support team on X&amp;nbsp;&lt;A class="lia-external-url" href="https://aka.ms/IntuneSuppTeam" target="_blank" rel="noopener"&gt;@IntuneSuppTeam&lt;/A&gt;.&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;Post updates:&lt;/STRONG&gt;&lt;BR /&gt;10/23/25: The Settings Catalog table has been updated. Settings that were previously limited to '&lt;EM&gt;Windows Insider users'&lt;/EM&gt; are now generally available.&lt;/P&gt;</description>
      <pubDate>Fri, 24 Oct 2025 17:12:19 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/intune-customer-success/microsoft-intune-settings-catalog-updated-to-support-new-windows/ba-p/4462927</guid>
      <dc:creator>Intune_Support_Team</dc:creator>
      <dc:date>2025-10-24T17:12:19Z</dc:date>
    </item>
    <item>
      <title>Microsoft Intune Advanced Analytics in action: Real-world scenarios for IT teams</title>
      <link>https://techcommunity.microsoft.com/t5/intune-customer-success/microsoft-intune-advanced-analytics-in-action-real-world/ba-p/4459812</link>
      <description>&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;By: Janusz Gal – Sr Product Manager | Microsoft Intune&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Microsoft Intune Advanced Analytics empowers IT admins and enterprise users to gain deep insights into device health, user experience, and organizational trends. Building on the foundation of Microsoft Endpoint analytics, Advanced Analytics offers enhanced device timeline reporting, flexible query options, anomaly detection, battery health monitoring, and resource performance tracking.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;IT admins can use Advanced Analytics to proactively manage their user devices, by turning raw telemetry into actionable insights, and optimizing IT support processes with near real time device information.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In this blog post, we’ll review the capabilities provided by Advanced Analytics with example scenarios for how they can be used.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Getting started&lt;/H2&gt;
&lt;P&gt;Getting started with Advanced Analytics is easy! Once your license is in place and Endpoint analytics is enabled, Advanced Analytics features will become available in your tenant. For more details on the licensing requirements, review the following: &lt;A class="lia-external-url" href="https://learn.microsoft.com/intune/analytics/advanced-endpoint-analytics#license-requirements" target="_blank" rel="noopener"&gt;What is Microsoft Intune Advanced Analytics&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For those who haven’t enabled Endpoint analytics, now is the time. In the Intune admin center, navigate to &lt;STRONG&gt;Reports &amp;gt; Endpoint analytics&lt;/STRONG&gt;. Select &lt;STRONG&gt;All cloud-managed devices &lt;/STRONG&gt;in the dropdown (or a subset) and select &lt;STRONG&gt;Start &lt;/STRONG&gt;to enable Endpoint analytics for your tenant.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;
&lt;P&gt;&lt;EM&gt;Figure 1 Endpoint analytics introduction pane in the Microsoft Intune admin center (Reports &amp;gt; Endpoint analytics).&lt;/EM&gt;&lt;/P&gt;
&lt;/img&gt;
&lt;P&gt;Some capabilities may take up to 48 hours for data to populate for Advanced Analytics analysis, such as anomaly detection, battery health monitoring, and inventory data shown in Device Query for multiple devices. Review &lt;A class="lia-external-url" href="https://learn.microsoft.com/intune/analytics/advanced-analytics-plan" target="_blank" rel="noopener"&gt;Planning Advanced Analytics&lt;/A&gt; for a full list of prerequisites, a planning checklist, FAQ and more.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Let’s take a look at the new capabilities available when you enable Advanced Analytics in Microsoft Intune.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Custom device scopes&lt;/H2&gt;
&lt;P&gt;Think of a subset of the organization you’d like to better understand and compare to the rest of the tenant. Possible examples include executive devices, maybe a specific country or region with a different budget, or even Microsoft Entra hybrid joined and cloud-native devices. With custom device scopes you can recalculate the whole set of Endpoint analytics reports based on scope tags and get the comparisons you need to make informed decisions.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Let’s consider a scenario where a subset of the organization has Microsoft Entra hybrid joined Windows devices with decades of group policy being applied and you want to make the business case to invest the time in reviewing and building new policy in Intune. You can create a scope tag, for this example we’ll name it “Hybrid joined devices”, that you apply to hybrid joined devices, and then add that to the device scopes capability within Endpoint analytics. The manage device scopes setting can be accessed by selecting on the device scope selector on any filterable Endpoint analytics pane:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;
&lt;P&gt;&lt;EM&gt;Figure 2. Endpoint analytics device scope selection (Reports &amp;gt; Endpoint analytics &amp;gt; Overview).&lt;/EM&gt;&lt;/P&gt;
&lt;/img&gt;&lt;img&gt;
&lt;P&gt;&lt;EM&gt;Figure 3. Manage device scopes pane for selecting and creating new device scopes (Reports &amp;gt; Endpoint analytics &amp;gt; Overview &amp;gt; Device scope &amp;gt; Manage device scopes).&lt;/EM&gt;&lt;/P&gt;
&lt;/img&gt;
&lt;P&gt;Under Endpoint analytics reports, navigate to the &lt;STRONG&gt;Startup performance&lt;/STRONG&gt; report which showcases &lt;STRONG&gt;Core boot &lt;/STRONG&gt;time and &lt;STRONG&gt;Core sign-in &lt;/STRONG&gt;time. By default, this report is scoped to &lt;STRONG&gt;All Devices&lt;/STRONG&gt; but is filterable using any tag including the one you just created: “Hybrid joined devices”.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;
&lt;P&gt;&lt;EM&gt;Figure 4. Startup performance report (Reports &amp;gt; Endpoint analytics &amp;gt; Startup performance).&lt;/EM&gt;&lt;/P&gt;
&lt;/img&gt;
&lt;P&gt;While results will differ for each organization, in the tenant shown here when you set the scope to “Hybrid joined devices”, you’ll see that &lt;STRONG&gt;Group Policy&lt;/STRONG&gt; contributes 8 seconds&lt;STRONG&gt; &lt;/STRONG&gt;to your &lt;STRONG&gt;Core-sign in &lt;/STRONG&gt;time&lt;STRONG&gt;, &lt;/STRONG&gt;and overall devices report 9 seconds slower boot times and 30 second slower sign-ins:&lt;/P&gt;
&lt;img&gt;
&lt;P&gt;&lt;EM&gt;Figure 5. Startup performance report, recalculated with Device scope.&lt;/EM&gt;&lt;/P&gt;
&lt;/img&gt;
&lt;P&gt;Just like that, you know that users are losing time on each reboot. Depending on how large the fleet is for your organization, that could be a significant amount and&amp;nbsp; worth what it would take to modernize and plan to implement new policies.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Of course, you can also use a custom device scope across the rest of the Endpoint analytics reports such as application reliability and work from anywhere. And with Advanced Analytics you also get two additional reports that can be sliced with device scopes – &lt;STRONG&gt;Resource performance &lt;/STRONG&gt;and&lt;STRONG&gt; Battery health.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Resource performance&lt;/H2&gt;
&lt;P&gt;The resource performance report provides an analysis and score of CPU, memory, and storage metrics over time to identify underperforming devices. Let’s take the same scenario from before – reviewing the hybrid joined devices in your organization.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you have existing hybrid joined devices that are expecting a future device refresh, would it make sense to schedule that sooner because of their performance?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When you review the resource performance score, you see how &lt;STRONG&gt;All devices &lt;/STRONG&gt;are performing based on their &lt;STRONG&gt;CPU &lt;/STRONG&gt;and&lt;STRONG&gt; RAM spike time scores&lt;/STRONG&gt; – effectively, how often they are hitting their resource limits.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;
&lt;P&gt;&lt;EM&gt;Figure 6. Endpoint analytics resource performance report (Reports &amp;gt; Endpoint analytics &amp;gt; Resource performance).&lt;/EM&gt;&lt;/P&gt;
&lt;/img&gt;
&lt;P&gt;In Endpoint analytics, higher scores indicate that devices are providing better user experiences. For example, in the &lt;STRONG&gt;Resource performance&lt;/STRONG&gt; report, a higher score indicates that devices are seeing less CPU spikes.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;
&lt;P&gt;&lt;EM&gt;Figure 7. CPU spike time score details pane (Reports &amp;gt; Endpoint analytics &amp;gt; Resource performance &amp;gt; CPU spike time score).&lt;/EM&gt;&lt;/P&gt;
&lt;/img&gt;
&lt;P&gt;You can view performance by specific models or devices using the navigation tabs at the top of the report. Periodically reviewing these results is helpful to ensure your devices are performing well within their ownership or refresh cycles. Better yet, you can use &lt;A class="lia-external-url" href="https://learn.microsoft.com/intune/analytics/scores#baselines" target="_blank" rel="noopener"&gt;Baselines&lt;/A&gt;, which capture a snapshot of the scores for your tenant and allow you to track progress over time:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;
&lt;P&gt;&lt;EM&gt;Figure 8. Baselines selection (Reports &amp;gt; Endpoint Analytics &amp;gt; Overview &amp;gt; Baseline).&lt;/EM&gt;&lt;/P&gt;
&lt;/img&gt;
&lt;P&gt;You could, for example, directly see how the overall baseline scores improve a few months after a hardware refresh by checking a previous baseline against the current scores. This can help further justify hardware spending by showing quantifiable improvements to the user experience.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For this example, since you know the hybrid joined devices are older than your cloud-native ones, you can reuse your custom device scope here to filter the resource performance report and compare the scores:&lt;/P&gt;
&lt;img&gt;
&lt;P&gt;&lt;EM&gt;Figure 9. Resource performance report recalculated via Device scope (Reports &amp;gt; Endpoint Analytics &amp;gt; Resource performance &amp;gt; Device scope set).&lt;/EM&gt;&lt;/P&gt;
&lt;/img&gt;
&lt;P&gt;Now you can also easily identify that your hybrid joined devices are performing worse than average, as they have a significantly lower resource performance score than &lt;STRONG&gt;All devices&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Battery health monitoring&lt;/H2&gt;
&lt;P&gt;Advanced Analytics also gives us access to the&lt;STRONG&gt; Battery health &lt;/STRONG&gt;report which details capacity and runtime scores across the organization.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;
&lt;P&gt;&lt;EM&gt;Figure 10. Battery health report (Reports &amp;gt; Endpoint Analytics &amp;gt; Battery health).&lt;/EM&gt;&lt;/P&gt;
&lt;/img&gt;
&lt;P&gt;The top level report shows a battery capacity score and a battery runtime score&lt;STRONG&gt;, &lt;/STRONG&gt;both of which provide a flyout with granular details on how devices are performing:&lt;/P&gt;
&lt;img&gt;
&lt;P&gt;&lt;EM&gt;Figure 11. Battery capacity score detail (Reports &amp;gt; Endpoint Analytics &amp;gt; Battery health &amp;gt; Battery capacity score).&lt;/EM&gt;&lt;/P&gt;
&lt;/img&gt;&lt;img&gt;
&lt;P&gt;&lt;EM&gt;Figure 12. Battery runtime score detail (Reports &amp;gt; Endpoint Analytics &amp;gt; Battery health &amp;gt; Battery runtime score).&lt;/EM&gt;&lt;/P&gt;
&lt;/img&gt;
&lt;P&gt;Using these reports, you can easily identify devices that need a battery replacement, such as older devices or laptops that have been plugged in for years. These are great candidates to replace sooner – as ever-changing home or office work locations shift, you can improve user confidence in their devices by ensuring a fully charged battery lasts for hours.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;On the flipside –&lt;STRONG&gt; &lt;/STRONG&gt;you can use the &lt;STRONG&gt;Battery health report&lt;/STRONG&gt; to assess whether existing devices can have their lifespan extended. Maybe they are five years old but the batteries are still reporting more than 5 hours of runtime on a charge and greater than 80% health. For example, in the hybrid joined device scenario, you were looking for budget to refresh those devices sooner – if you can find existing devices with healthy batteries, you could also check their resource performance results and decide to keep them an extra few years if they are performing well.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Device query for multiple devices&lt;/H2&gt;
&lt;P&gt;Suppose you have used the previous capabilities – custom device scopes, resource performance reporting, and battery health reporting – to determine a group of devices within your organization that you want to perform some action on. As mentioned before, this could be extending their lifespan, planning a refresh, or investing in a tooling migration.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you need additional details from devices before making that decision you can use Device query for multiple devices. &lt;A class="lia-external-url" href="https://learn.microsoft.com/intune/analytics/device-query-multiple-devices" target="_blank" rel="noopener"&gt;Device query for multiple devices&lt;/A&gt; provides insights about the entire fleet of devices using previously collected inventory data. And since it leverages the flexible and powerful &lt;A class="lia-external-url" href="https://learn.microsoft.com/kusto/query/?view=microsoft-fabric" target="_blank" rel="noopener"&gt;Kusto Query Language&lt;/A&gt; (KQL), you can mix and match inventory attributes to get the list of devices that meet your requirements.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For Windows devices, before you can use Device query for multiple devices you’ll need to &lt;A class="lia-external-url" href="https://learn.microsoft.com/intune/intune-service/configuration/properties-catalog" target="_blank" rel="noopener"&gt;create a Properties Catalog policy&lt;/A&gt;. Add the properties you would like to collect and assign the profile to the intended devices. All available properties are automatically collected for Android Enterprise, iOS, iPadOS, and macOS devices, so no extra configuration is needed.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;
&lt;P&gt;&lt;EM&gt;Figure 13. Configure and deploy a Properties Catalog profile.&lt;/EM&gt;&lt;/P&gt;
&lt;/img&gt;
&lt;P&gt;You can view collected inventory information for a single device under the &lt;STRONG&gt;Device inventory &lt;/STRONG&gt;pane. After a device syncs with Intune, it can take up to 24 hours for initial harvesting of inventory data.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Once you have the inventory information collected across the fleet, navigate to &lt;STRONG&gt;Devices &amp;gt; Device query &lt;/STRONG&gt;to start querying.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;
&lt;P&gt;&lt;EM&gt;Figure 14. Device query for multiple devices (Devices &amp;gt; Device query).&lt;/EM&gt;&lt;/P&gt;
&lt;/img&gt;
&lt;P&gt;Expanding on the scenarios from before, consider a requirement to replace devices with high battery cycle counts. With Device query for multiple devices, you could join battery and CPU data, and better target planned replacements:&lt;/P&gt;
&lt;img&gt;
&lt;P&gt;&lt;EM&gt;Figure 15. Running a query (Devices &amp;gt; Device Query).&lt;/EM&gt;&lt;/P&gt;
&lt;/img&gt;
&lt;P&gt;Of course, you can use any of the inventory categories to find applicable devices including storage space, TPM details, enrollment information, and so on. For organizations with&amp;nbsp;&lt;A class="lia-external-url" href="https://learn.microsoft.com/copilot/security/microsoft-security-copilot" target="_blank" rel="noopener"&gt;Security Copilot licensed and enabled&lt;/A&gt;, you can leverage &lt;STRONG&gt;Query with Copilot&lt;/STRONG&gt; to generate the KQL queries for you using natural language:&lt;/P&gt;
&lt;img&gt;
&lt;P&gt;&lt;EM&gt;Figure 16. Copilot query generation (Devices &amp;gt; Device query &amp;gt; Query with Copilot).&lt;/EM&gt;&lt;/P&gt;
&lt;/img&gt;
&lt;P&gt;Once you have the results, you can export to a .csv&lt;STRONG&gt; &lt;/STRONG&gt;to use elsewhere like sharing to the team handling procurement and hardware lifecycle management.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;
&lt;P&gt;&lt;EM&gt;Figure 17. Export device query results (Devices &amp;gt; Device Query &amp;gt; Run query &amp;gt; Export).&lt;/EM&gt;&lt;/P&gt;
&lt;/img&gt;
&lt;P&gt;Now that you have your list of devices, what if you need even more detailed information?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Granular details from enhanced device timeline and Device query&lt;/H2&gt;
&lt;P&gt;With the results from Figure 15, you were able to find a device with high battery cycles and a relatively old processor. At first glance this is a great candidate for replacement.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;With Advanced Analytics, you can explore further by navigating to &lt;STRONG&gt;Devices &amp;gt; Windows&amp;nbsp; &lt;/STRONG&gt;select a device&lt;STRONG&gt; &lt;/STRONG&gt;and leverage the enhanced device timeline and Device query&lt;STRONG&gt; &lt;/STRONG&gt;capabilities.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The &lt;A class="lia-external-url" href="https://learn.microsoft.com/intune/analytics/enhanced-device-timeline" target="_blank" rel="noopener"&gt;enhanced device timeline&lt;/A&gt; shows a 30-day history of events that occurred on a specific device including details on app crashes, unresponsive apps, device boots, device logons, and anomaly detected events:&lt;/P&gt;
&lt;img&gt;
&lt;P&gt;&lt;EM&gt;Figure 18. Device timeline pane showing multiple app crashes over the past two days (Devices &amp;gt; Windows &amp;gt; select device &amp;gt; User experience &amp;gt; Device timeline).&lt;/EM&gt;&lt;/P&gt;
&lt;/img&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;From here, you have a much better and direct understanding of how a user’s device is performing. If a user frequently sees unresponsive apps, you are now reasonably confident that you’ve found a device worthy of further troubleshooting or replacement.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/intune/analytics/device-query" target="_blank" rel="noopener"&gt;Device query&lt;/A&gt; for a single device, on the other hand, let’s you investigate even further and query the device for real-time data such as Windows Event Log Events, Registry configuration, or Bios details. For the full list of properties refer to &lt;A class="lia-external-url" href="https://learn.microsoft.com/intune/analytics/data-platform-schema" target="_blank" rel="noopener"&gt;Intune data platform schema&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;
&lt;P&gt;&lt;EM&gt;Figure 19. Device query for a single device, returning process details (Devices &amp;gt; Windows &amp;gt; select device &amp;gt; Device query).&lt;/EM&gt;&lt;/P&gt;
&lt;/img&gt;
&lt;P&gt;With Device query and the enhanced device timeline, you can get all of the granular information needed to make informed decisions about a device.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Find additional scenarios with anomaly detection&lt;/H2&gt;
&lt;P&gt;Don’t have a specific goal or unsure of what needs to be resolved? Want to proactively address issues before users start reporting them? Use the &lt;STRONG&gt;Anomalies&lt;/STRONG&gt; tab to identify deviations from normal behavior across your environment, such as a spike in application crashes.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;
&lt;P&gt;&lt;EM&gt;Figure 20. Anomalies tab showing multiple high severity detections (Reports &amp;gt; Endpoint Analytics &amp;gt; Overview &amp;gt; Anomalies).&lt;/EM&gt;&lt;/P&gt;
&lt;/img&gt;
&lt;P&gt;With the other capabilities provided by Advanced Analytics, you can investigate anomalies in several ways. To start, each anomaly provides a list of affected devices. By clicking through each of these devices, you can use Device query or the enhanced device timeline&lt;STRONG&gt; &lt;/STRONG&gt;to get detailed information needed to troubleshoot properly.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;
&lt;P&gt;&lt;EM&gt;Figure 21. Anomaly detection report detailing affected devices (Reports &amp;gt; Endpoint Analytics &amp;gt; Overview &amp;gt; Anomalies &amp;gt; select affected devices).&lt;/EM&gt;&lt;/P&gt;
&lt;/img&gt;
&lt;P&gt;Medium and high severity anomalies include device correlation groups based on one or more shared attributes such as app version, driver update, OS version, and device model.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;
&lt;P&gt;&lt;EM&gt;Figure 22. Anomaly detection report detailing behavior and impact (Reports &amp;gt; Endpoint Analytics &amp;gt; Overview &amp;gt; Anomalies &amp;gt; select anomaly title).&lt;/EM&gt;&lt;/P&gt;
&lt;/img&gt;
&lt;P&gt;To investigate further, you could create a new custom device scope to recalculate the Endpoint analytics reports for affected devices, use the Resource performance report, or even the Battery health report if that is seemingly causing issues.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;While a common approach for organizations is an internal initiative that drives an investigation into analytics reports, anomaly detection is certainly a great starting point as well for improving user experience.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;What’s next&lt;/H1&gt;
&lt;P&gt;Advanced Analytics is continuing to evolve with new capabilities to give you the insights you need on the user device experience. Stay tuned for further blog posts around additional Advanced Analytics and Intune reporting capabilities.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you have any questions or want to share how you’re using Advanced Analytics in Intune, leave a comment below or reach out to us on X &lt;A class="lia-external-url" href="https://aka.ms/IntuneSuppTeam" target="_blank" rel="noopener"&gt;@IntuneSuppTeam&lt;/A&gt; or &lt;A class="lia-external-url" href="https://aka.ms/MSIntune" target="_blank" rel="noopener"&gt;@MSIntune!&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Oct 2025 18:00:31 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/intune-customer-success/microsoft-intune-advanced-analytics-in-action-real-world/ba-p/4459812</guid>
      <dc:creator>Intune_Support_Team</dc:creator>
      <dc:date>2025-10-08T18:00:31Z</dc:date>
    </item>
    <item>
      <title>From the frontlines: Delivering critical early responder device management</title>
      <link>https://techcommunity.microsoft.com/t5/intune-customer-success/from-the-frontlines-delivering-critical-early-responder-device/ba-p/4458179</link>
      <description>&lt;P&gt;&lt;STRONG&gt;By: Catarina Rodrigues – Product Manager 2 | Microsoft Intune&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In high-stakes environments like emergency response, speed, accuracy, and security are essential. Whether it’s paramedics delivering life-saving care or police officers responding to critical incidents, frontline teams need real-time access to information—right where the action is. To meet these demands, emergency services are increasingly deploying mobile devices, paired with advanced device management solutions, to empower their teams in the field.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I’m Catarina Rodrigues, a Product Manager in the Microsoft Intune team, and in this blog of the &lt;A href="https://techcommunity.microsoft.com/blog/intunecustomersuccess/from-the-frontlines-frontline-worker-management-with-microsoft-intune/4387449" target="_blank"&gt;“From the Frontlines”&lt;/A&gt; series, I’ll share my experience working with emergency services, exploring how to deploy and manage iPads and Android tablets using Intune. For more information refer to: &lt;A href="https://learn.microsoft.com/intune/solutions/frontline-worker/frontline-worker-overview" target="_blank"&gt;Frontline worker device management overview in Microsoft Intune&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;Shared iPads in ambulances&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;Ambulances operate around the clock, often with rotating crews. To ensure seamless and secure access to clinical apps, maps, and emergency protocols, organizations are increasingly often equipping vehicles with iPads that are prepared to be shared by personnel working shift.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There are different ways to &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/intune/solutions/frontline-worker/frontline-worker-overview-ios-ipados?tabs=sharedipad" target="_blank"&gt;support Apple devices for frontline scenarios&lt;/A&gt; depending on the requirements. Shared iPad mode is recommended for shared use of iPads; it creates multiple user partitions, making it easy for several users to log in and access their applications and data according to their preferences. Intune together with Apple's Automated Device Enrollment (ADE) makes it simple to address this scenario seamlessly, enabling zero-touch provisioning and device supervision for additional security configurations.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Below is an ADE enrollment profile configured to setup devices as Shared iPads:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;User affinity&lt;/STRONG&gt;: Enroll without User Affinity&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Supervised&lt;/STRONG&gt;: Yes&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Locked enrollment&lt;/STRONG&gt;: Yes&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Shared iPad&lt;/STRONG&gt;: Yes&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;You can then configure the number of maximum cached users and inactivity settings for these profiles, as needed.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Once iPads are enrolled and functional, users will be able to setup their profiles, where they’ll have access to the applications and data according to their permissions. Once their profiles are setup, users can see them in the login screen, as they will be available for them to login again in the future.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;&lt;img /&gt;
&lt;H2&gt;&lt;STRONG&gt;Benefits of Shared iPad with ADE for IT admins and frontline workers&lt;/STRONG&gt;&lt;/H2&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Zero-touch deployment: &lt;/STRONG&gt;Devices are automatically enrolled and configured via Apple’s Automated Device Enrollment (ADE), reducing manual setup and ensuring consistency across the fleet.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Targeted assignment: &lt;/STRONG&gt;Enables IT admins to permanently assign an iPad to a specific ambulance, streamlining shift handovers and ensuring paramedics always have access to the right tools.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Persistent configuration: &lt;/STRONG&gt;Shared iPad can cache up to 100 user profiles (24 recommended on a 32 or 64 GB iPad),&lt;STRONG&gt; &lt;/STRONG&gt;ensuring device settings and apps remain consistent and reducing login friction.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Enhanced security and compliance: &lt;/STRONG&gt;While these devices are shared, device-level management and &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/intune/intune-service/apps/app-protection-policy-settings-ios" target="_blank"&gt;app protection policies&lt;/A&gt; keep sensitive data secure and encrypted.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Remote actions and support: &lt;/STRONG&gt;IT teams can monitor, lock, or wipe devices remotely through Intune, with supervision mode enabling deeper administrative controls, such as &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/intune/intune-service/remote-actions/device-lost-mode" target="_blank"&gt;Lost Mode&lt;/A&gt; and Locate Device.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This setup gives paramedics immediate access to clinical apps, maps, and protocols and all information they might need to access or share without compromising security or adding friction to their workflow.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;Fully managed Android tablets for police&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;For police departments, data sensitivity is paramount. Officers need access to real-time intelligence, case files, and communication tools without risking exposure of confidential information. While there are other options to enroll Android devices in Intune (you can see an overview &lt;A href="https://learn.microsoft.com/en-us/intune/solutions/frontline-worker/frontline-worker-overview-android?tabs=ae" target="_blank"&gt;here&lt;/A&gt;), setting up &lt;A href="https://learn.microsoft.com/en-us/intune/intune-service/enrollment/android-fully-managed-enroll" target="_blank"&gt;corporate-owned, fully-managed Android&lt;/A&gt; tablets with Intune can deliver the data protection and device lock-down that police departments need, while ensuring police officers remain productive. Users won’t be able to change pre-defined configurations and install applications from the public store. These devices are associated with a single user, in this case a police officer, as they aren’t intended for shared use. To ensure minimal disruption in the working day of these users, IT admins can use device staging to decrease the number of steps needed to enroll a brand-new device and get it to a functional state.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;Device staging&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/intune/intune-service/enrollment/device-staging-overview" target="_blank"&gt;Device staging&lt;/A&gt; is designed to simplify and accelerate the deployment of corporate-owned, fully managed Android devices—especially in high-stakes environments. Instead of requiring police officers to navigate a lengthy setup process, IT teams or authorized third-party vendors pre-configure the devices using a secure enrollment token generated in the Intune admin center. This token allows the device enrollment and provisioning without needing the officer’s credentials, ensuring that critical apps, such as Intune and Microsoft Authenticator, are installed and ready before the device is even handed over.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When the officer powers on the device for the first time, they simply sign in to the Intune app, and the device completes its configuration, applying all necessary policies and security settings (see image below). This approach not only saves valuable time during rollouts but also ensures that every police officer receives a consistent, secure, and fully operational device from the moment they turn it on—an essential advantage when reliability and speed are crucial.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In the picture below, you see the steps users go through to complete enrollment which requires authentication using the Intune application, so that apps and policies assigned to that user identity are applied.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;Microsoft Intune and Android Enterprise corporate-owned, fully managed enrollment&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;To enable device staging, IT sets up an Android Enterprise enrollment profile, with a token associated that has a configurable expiry date, up to 65 years in the future. This token can be revoked any time as needed. In addition, IT can also apply a device naming template to all the devices that are enrolled under the same profile, making it easier to identify and group devices by police station, department, or region. You can check the supported strings for this device naming template &lt;A href="https://learn.microsoft.com/en-us/intune/intune-service/enrollment/android-fully-managed-enroll#step-2-create-new-enrollment-profile" target="_blank"&gt;here&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;Below you can see an example of an enrollment profile configured with the following parameters:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Token type:&lt;/STRONG&gt; Corporate-owned, fully managed, via staging&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Apply device name template&lt;/STRONG&gt;: Yes&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Device name template&lt;/STRONG&gt;: {{SERIAL}}&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Benefits of corporate-owned, fully managed, via staging for IT admins and frontline workers&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;End-to-end control and security&lt;/STRONG&gt;: IT admins retains full control over the device lifecycle—from provisioning to retirement—ensuring that only approved apps, settings, and security policies are applied and maintained throughout use.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Simplified, secure user experience with Managed Home Screen&lt;/STRONG&gt;: Managed Home Screen provides a locked-down, customizable launcher that ensures users access only approved apps and settings. This minimizes distractions, enhances security, and delivers a consistent, role-based experience across all devices—ideal for high-stakes field environments.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Faster, frictionless rollouts: &lt;/STRONG&gt;Device staging eliminates the need for users to complete complex setup steps. Devices arrive pre-enrolled and pre-configured, so users can simply sign in and start working immediately.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Consistent, compliant configuration: &lt;/STRONG&gt;Every device is enrolled with the same baseline—apps, policies, and restrictions—ensuring compliance with organizational standards and reducing variability in the field.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Reduced IT overhead: &lt;/STRONG&gt;By shifting setup responsibilities to staging teams or vendors, IT departments can scale deployments without increasing support load or requiring one-on-one onboarding.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Operational readiness from day one: &lt;/STRONG&gt;Users receive devices that are mission-ready, with secure access to critical apps like dispatch systems, communication tools, and field data—right out of the box.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;This setup gives officers the tools they need while maintaining operational integrity and data confidentiality.&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;Summary&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;This blog post explored how to securely manage devices used by emergency services teams. These examples are applicable to other scenarios where workers need to access confidential, sensitive information while in the field. I hope this blog inspires you to try these methods and look forward to answering questions in the comments.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This blog is part of the &lt;A href="https://techcommunity.microsoft.com/blog/intunecustomersuccess/from-the-frontlines-frontline-worker-management-with-microsoft-intune/4387449" target="_blank"&gt;“From the Frontlines”&lt;/A&gt; series, where we explore different scenarios of how workers in field use devices and how IT admins can enable them. Check the other blog posts for more inspiration!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please refer to the documentation here for more guidance:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;For information on how to support Apple devices in the frontline refer to: &lt;A href="https://learn.microsoft.com/en-us/intune/solutions/frontline-worker/frontline-worker-overview-ios-ipados?tabs=sharedipad" target="_blank"&gt;Get started with iOS/iPadOS frontline worker devices&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;For information on how to set up Shared iPad refer to: &lt;A href="https://learn.microsoft.com/en-gb/intune/intune-service/enrollment/device-enrollment-shared-ipad" target="_blank"&gt;Shared iPad devices&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;For information on how to support Android devices in the frontline refer to: &lt;A href="https://learn.microsoft.com/en-us/intune/solutions/frontline-worker/frontline-worker-overview-android?tabs=ae" target="_blank"&gt;Get started with Android frontline worker devices&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;For information on how to set up corporate-owned, fully managed Android devices refer to:&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/intune/intune-service/enrollment/android-fully-managed-enroll" target="_blank"&gt;Set up enrollment for Android Enterprise fully managed devices&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;If you'd like to learn more about incorporating device staging to reduce user steps during enrollment see:&amp;nbsp;&lt;A href="https://learn.microsoft.com/intune/intune-service/enrollment/device-staging-overview" target="_blank"&gt;Device staging overview&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;To ensure your organization can navigate modern security challenges following Microsoft's Zero Trust approach see:&amp;nbsp;&lt;A href="https://aka.ms/zerotrust" target="_blank"&gt;Zero Trust security strategy&lt;/A&gt;.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As always, if you have any questions let us know in the comments or reach out to us on X&amp;nbsp;&lt;A href="https://aka.ms/IntuneSuppTeam" target="_blank"&gt;@IntuneSuppTeam&lt;/A&gt;&amp;nbsp;or&amp;nbsp;&lt;A href="https://aka.ms/MSIntune" target="_blank"&gt;@MSIntune&lt;/A&gt;!&lt;/P&gt;</description>
      <pubDate>Tue, 30 Sep 2025 16:12:21 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/intune-customer-success/from-the-frontlines-delivering-critical-early-responder-device/ba-p/4458179</guid>
      <dc:creator>Intune_Support_Team</dc:creator>
      <dc:date>2025-09-30T16:12:21Z</dc:date>
    </item>
    <item>
      <title>Deep dive into Windows Autopilot device preparation: How to deploy and when to use it</title>
      <link>https://techcommunity.microsoft.com/t5/intune-customer-success/deep-dive-into-windows-autopilot-device-preparation-how-to/ba-p/4455341</link>
      <description>&lt;P&gt;&lt;STRONG&gt;By: Maggie Dakeva - Sr. Product Manager | Microsoft Intune&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Provisioning devices at scale used to be complex and time-consuming, especially with today’s remote and hybrid work models. Windows Autopilot and Windows Autopilot device preparation&lt;STRONG&gt; &lt;/STRONG&gt;simplify and secure the process, helping IT teams deliver ready-to-go devices with minimal touch. Understanding the differences between the two helps organizations choose the right approach for device lifecycle and deployment strategy.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;Understanding Windows Autopilot device preparation&lt;/H1&gt;
&lt;P&gt;Windows Autopilot device preparation is a next-generation provisioning solution designed to simplify IT setup, improve reliability during device provisioning and provide better reporting and troubleshooting capabilities. While Windows Autopilot has long empowered organizations to automate device setup, Windows Autopilot device preparation introduces significant improvements in consistency, real-time visibility, and flexibility for device management.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Key benefits of Windows Autopilot device preparation&lt;/H2&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Simpler setup:&lt;/STRONG&gt; Configure a single device provisioning policy that includes both Windows deployment configuration and out-of-box experience (OOBE) settings.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Consistent and reliable provisioning experience:&lt;/STRONG&gt; Windows Autopilot device preparation removes most of the complexity and unpredictability from device deployments, ensuring better workload coordination.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Enrollment time grouping:&lt;/STRONG&gt; Allows granular targeting of unregistered devices, reduces the complexity of dynamic group management and latency, and avoids conflicts due to group membership calculations during provisioning.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Near real-time reporting:&lt;/STRONG&gt; IT admins can review detailed status of each configured app and script in addition to overall status, speeding up issue resolution and unblocking user productivity.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;Windows Autopilot vs Windows Autopilot device preparation&lt;/H1&gt;
&lt;P&gt;Many customers wonder when they should use Windows Autopilot and when to use Windows Autopilot device preparation. The key difference is in their supported provisioning modes and requirements:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Windows Autopilot:&lt;/STRONG&gt; Best suited for organizations needing advanced customization, multiple device type support, and hybrid join scenarios. Requires device registration and delivers configurations both during device and user phases.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Windows Autopilot device preparation:&lt;/STRONG&gt; Designed for rapid, Microsoft Entra joined deployments without the need for Windows Autopilot registration. Focuses on device-based targeting during OOBE and can deliver both apps and scripts, with enhanced troubleshooting and reporting capabilities.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;For a detailed comparison, review &lt;A class="lia-external-url" href="https://learn.microsoft.com/autopilot/device-preparation/compare" target="_blank" rel="noopener"&gt;Compare Windows Autopilot solutions&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Use Windows Autopilot device preparation if:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;You haven’t deployed Windows Autopilot before or are looking to simplify your deployment process.&lt;/LI&gt;
&lt;LI&gt;Your organization will use a user-driven flow where each user will set up their device.&lt;/LI&gt;
&lt;LI&gt;Your organization is transitioning to &lt;A class="lia-external-url" href="https://aka.ms/cloudnativeendpoints" target="_blank" rel="noopener"&gt;cloud-native&lt;/A&gt; (Microsoft Entra joined) devices or Windows 11.&lt;/LI&gt;
&lt;LI&gt;Your organization is deploying &lt;A class="lia-external-url" href="https://www.microsoft.com/windows-365/frontline" target="_blank" rel="noopener"&gt;Windows 365 Frontline&lt;/A&gt; devices.&lt;/LI&gt;
&lt;LI&gt;You want to avoid managing Windows Autopilot registration and the complexities it brings during the device lifecycle and repairs.&lt;/LI&gt;
&lt;LI&gt;Your organization needs to deploy devices in sovereign clouds (GCCH, 21Vianet in China).&lt;/LI&gt;
&lt;LI&gt;You’d like better visibility into the provisioning experience with a more detailed report.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Use Windows Autopilot if:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Your organization requires &lt;A class="lia-external-url" href="https://learn.microsoft.com/autopilot/pre-provision" target="_blank" rel="noopener"&gt;pre-provisioning&lt;/A&gt; (device is prepared by technician) or &lt;A class="lia-external-url" href="https://learn.microsoft.com/autopilot/self-deploying" target="_blank" rel="noopener"&gt;self-deploying&lt;/A&gt; (shared device) flow.&lt;/LI&gt;
&lt;LI&gt;Your organization requires Windows Autopilot registration or the features it provides, such as hiding OOBE pages and renaming devices before enrollment, and &lt;A class="lia-external-url" href="https://learn.microsoft.com/autopilot/dfci-management" target="_blank" rel="noopener"&gt;device firmware configuration interface&lt;/A&gt; (DFCI).&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;Device setup flow step-by-step&lt;/H1&gt;
&lt;P&gt;Understanding the device preparation flow is key to leveraging this method effectively. Here’s an overview of the typical device journey:&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&lt;STRONG&gt;Overview of all steps of device preparation, described in detail below.&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;STRONG&gt;Intune setup: &lt;/STRONG&gt;You’d need to create a new device security group (&lt;A class="lia-external-url" href="https://learn.microsoft.com/autopilot/device-preparation/tutorial/user-driven/entra-join-device-group" target="_blank" rel="noopener"&gt;steps&lt;/A&gt;) and a Device preparation policy in Intune where you include the group. Devices will receive configuration from that security group and will automatically be added to it during provisioning.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Physical device setup:&lt;/STRONG&gt; Windows Autopilot device preparation requires Windows 11 devices which are not registered for Windows Autopilot and supports only Microsoft Entra joined (cloud-native) deployments. You should always start with a clean image, pre-loaded with drivers.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;OOBE flow: &lt;/STRONG&gt;User authenticates with their Microsoft Entra credentials.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Enrollment: &lt;/STRONG&gt;Device automatically Microsoft Entra-joins and enrolls in Intune.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Windows backup (optional):&lt;/STRONG&gt; If &lt;A class="lia-external-url" href="https://learn.microsoft.com/windows/configuration/windows-backup/?tabs=intune" target="_blank" rel="noopener"&gt;Windows Backup for organizations&lt;/A&gt; is configured for this user, they will see a page with options to restore user settings from previous device.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Device preparation setup: &lt;/STRONG&gt;Next, the Intune Management Extension is installed, then the bootstrapper agent which controls the provisioning process, and the device syncs with the mobile device management service (Intune).).&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Enrollment time grouping: &lt;/STRONG&gt;After the device joins Microsoft Entra and enrolls in Intune, Windows Autopilot looks up the configuration assigned to the security group set for enrollment time grouping.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Policy installation: &lt;/STRONG&gt;Intune policies, line-of-business (LOB) apps, and Microsoft 365 apps are delivered to the device. If any LOB or Microsoft 365 apps are selected in the device preparation policy Windows Autopilot will ensure they deliver successfully before continuing to the next step.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Script installation: &lt;/STRONG&gt;PowerShell scripts selected in the device preparation policy are delivered. If successful, provisioning continues to the next step. Remediation and custom compliance scripts are not yet available.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;App installation: &lt;/STRONG&gt;Win32, Microsoft Store, and Enterprise App Catalog apps selected in the device preparation policy are installed. If successful, provisioning continues. Apps must also be targeted to the device security group configured during step 1.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Reboot: &lt;/STRONG&gt;If needed, a coalesced reboot will be triggered prior to moving to the desktop.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Device preparation completes: &lt;/STRONG&gt;The device completes the Windows Autopilot device preparation setup, user is informed that Required setup is complete. After the device preparation setup is completed, the user may receive a cumulative Windows update at the end of OOBE (&lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/windows-itpro-blog/get-ready-for-windows-quality-updates-out-of-the-box/4434498" target="_blank" rel="noopener" data-lia-auto-title="learn more" data-lia-auto-title-active="0"&gt;learn more&lt;/A&gt;) and then set up Windows Hello for Business.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Desktop: &lt;/STRONG&gt;The user proceeds to the desktop where additional Intune configuration which was not selected in the device preparation policy may be applied.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;Best practices for Windows Autopilot device preparation&lt;/H1&gt;
&lt;P&gt;To maximize the benefits of Windows Autopilot device preparation, organizations should follow these best practices:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Define clear security groups:&lt;/STRONG&gt; &lt;A class="lia-external-url" href="https://learn.microsoft.com/autopilot/device-preparation/tutorial/user-driven/entra-join-device-group" target="_blank" rel="noopener"&gt;Create a dedicated device security group in Microsoft Entra&lt;/A&gt; and assign the Intune Provisioning Client service principal as the group owner. This step is critical for profile assignment and app delivery.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Use policies strategically:&lt;/STRONG&gt; Windows Autopilot device preparation policies control the configuration of devices during OOBE. Carefully curate the list of critical apps and scripts, leaving additional configuration to deploy at the desktop. This will ensure an optimal user experience during OOBE.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Use device-based apps:&lt;/STRONG&gt; Assign apps to the device security group and configure them to install in the system context for successful deployment during OOBE.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Manage timeout values:&lt;/STRONG&gt; Review and adjust timeout settings in the device prep policy to ensure deployments don’t fail due to time constraints.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Start troubleshooting by reviewing the report:&lt;/STRONG&gt; Use the Windows Autopilot device preparation deployment report in Intune’s “Monitor” section for near real-time insights into deployment progress and to quickly spot any issues.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;Common issues and troubleshooting tips&lt;/H1&gt;
&lt;P&gt;Even with the best planning, device preparation may encounter roadblocks. Here are some of the most frequently reported issues and strategies for addressing them:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Device enrollment failures&lt;/H2&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Blocked by enrollment restrictions:&lt;/STRONG&gt; If &lt;A href="https://learn.microsoft.com/intune/intune-service/enrollment/corporate-identifiers-add#add-windows-corporate-identifiers" target="_blank" rel="noopener"&gt;corporate identifiers&lt;/A&gt; aren’t uploaded, devices may fail to enroll. Ensure these identifiers are added as required.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Unsupported OS Version:&lt;/STRONG&gt; Devices with incompatible OS versions will not appear in the device preparation deployment report and won’t display the device preparation page in OOBE. They may get the Enrollment status page, if configured for &lt;STRONG&gt;All users and all devices&lt;/STRONG&gt;, or proceed straight to the Privacy settings page.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Previously registered devices:&lt;/STRONG&gt; If a device is already registered for Windows Autopilot, it can’t go through device preparation. Confirm that the registration is removed before deploying with Windows Autopilot device preparation.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Application and script deployment issues&lt;/H2&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;App detection rules:&lt;/STRONG&gt; Always review Win32 app detection rules and the &lt;STRONG&gt;Apps report&lt;/STRONG&gt; in Intune. Inaccurate detection logic can cause apps to fail deployment. This is one of the most common issues causing deployment failures.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Network constraints: &lt;/STRONG&gt;Proxy settings, VPN clients, and Wi-Fi profile configurations may cause network instability if applied during the provisioning process. In addition, Delivery Optimization failures (often caused by network issues) can impede downloading app content. Review network setup and ensure reliable connectivity during the provisioning process.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Script execution testing:&lt;/STRONG&gt; Execute PowerShell scripts outside of Autopilot to ensure they work independently before inclusion in device preparation policies.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Managed installer issues:&lt;/STRONG&gt; If Managed Installer policy is enabled for your tenant, Win32 and Microsoft Store apps are skipped. This will be addressed in a future release. Monitor announcements on &lt;A href="https://learn.microsoft.com/en-us/autopilot/device-preparation/whats-new" target="_blank" rel="noopener"&gt;What's new in Windows Autopilot device preparation | Microsoft Learn&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Targeting and context: &lt;/STRONG&gt;Make sure apps are set to install in the system context and targeted to the device security group specified in the device preparation policy.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Deployment timeout:&lt;/STRONG&gt; If a device preparation deployment fails due to timeout, compare the timeout value in the device preparation policy with the actual deployment time reported and adjust as needed.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;H1&gt;Conclusion&lt;/H1&gt;
&lt;P&gt;Windows Autopilot device preparation marks a significant evolution in Windows device provisioning, offering IT admins a predictable, flexible, and transparent deployment framework. By following the best practices outlined above and leveraging the robust troubleshooting features built in, organizations can minimize deployment headaches and ensure users can provision their devices and become productive as quickly as possible.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;FAQ&lt;/H1&gt;
&lt;H2&gt;Are corporate identifiers the new registration?&lt;/H2&gt;
&lt;P&gt;Corporate identifiers aren’t a replacement for Windows Autopilot registration. They’re needed for organizations that block personal devices and to ensure only trusted devices can be enrolled in your tenant.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;How do I move from Windows Autopilot to Autopilot device preparation?&lt;/H2&gt;
&lt;P&gt;You’d need to follow these steps:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Create an assigned device security group and make sure all configurations are assigned to it.&lt;/LI&gt;
&lt;LI&gt;Create a new device preparation profile and assign it to your users.&lt;/LI&gt;
&lt;LI&gt;Deregister all devices from Windows Autopilot.&lt;/LI&gt;
&lt;LI&gt;Reset all devices.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;Note that some advanced scenarios aren’t yet available for Windows Autopilot device preparation but may be available in the future.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;Resources&lt;/H1&gt;
&lt;P&gt;For more details, including updates and a full list of known policies or issues, review the Microsoft documentation below:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/autopilot/device-preparation/overview" target="_blank" rel="noopener"&gt;Overview of Windows Autopilot device preparation&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/autopilot/device-preparation/tutorial/user-driven/entra-join-workflow" target="_blank" rel="noopener"&gt;Overview for Windows Autopilot device preparation user-driven Microsoft Entra join in Intune&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/autopilot/device-preparation/compare" target="_blank" rel="noopener"&gt;Compare Windows Autopilot device preparation and Windows Autopilot&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As always, if you have any questions let us know in the comments or reach out to us on X &lt;A class="lia-external-url" href="https://aka.ms/IntuneSuppTeam" target="_blank" rel="noopener"&gt;@IntuneSuppTeam&lt;/A&gt; or &lt;A class="lia-external-url" href="https://aka.ms/MSIntune" target="_blank" rel="noopener"&gt;@MSIntune&lt;/A&gt;!&lt;/P&gt;</description>
      <pubDate>Wed, 15 Oct 2025 20:58:29 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/intune-customer-success/deep-dive-into-windows-autopilot-device-preparation-how-to/ba-p/4455341</guid>
      <dc:creator>Intune_Support_Team</dc:creator>
      <dc:date>2025-10-15T20:58:29Z</dc:date>
    </item>
    <item>
      <title>Day zero support for iOS/iPadOS and macOS 26</title>
      <link>https://techcommunity.microsoft.com/t5/intune-customer-success/day-zero-support-for-ios-ipados-and-macos-26/ba-p/4454161</link>
      <description>&lt;P&gt;With Apple's release of iOS/iPadOS and macOS 26 Tahoe, we’ve been working hard to ensure that Microsoft Intune provides day zero support for Apple’s latest operating systems (OS) so that existing features work as expected.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We’ll continue to upgrade our service and release new capabilities that integrate elements of the new OS versions.&lt;/P&gt;
&lt;H2&gt;New settings&lt;/H2&gt;
&lt;P&gt;With continued investments in the Intune data-driven infrastructure that powers the settings catalog, we’re able to provide day zero support for new OS settings as they’re released by Apple. The settings catalog has been updated to support newly released iOS/iPadOS and macOS settings for both declarative device management (DDM) and mobile device management (MDM) to empower your IT teams to have devices ready on day zero. New settings include:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Audio Accessory Settings&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Configure temporary pairing behavior for AirPods and Beats audio accessories. Located under the Declarative Device Management (DDM) category.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Temporary Pairing Disabled&lt;/LI&gt;
&lt;LI&gt;Temporary Pairing Unpairing Time&lt;/LI&gt;
&lt;LI&gt;Unpairing Policy&lt;/LI&gt;
&lt;LI&gt;Unpairing Hour&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Safari Settings&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Customize the Safari browsing experience. Located under the Declarative Device Management (DDM) category.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Accept Cookies&lt;/LI&gt;
&lt;LI&gt;Allow Disabling Fraud Warning&lt;/LI&gt;
&lt;LI&gt;Allow History Clearing&lt;/LI&gt;
&lt;LI&gt;Allow JavaScript&lt;/LI&gt;
&lt;LI&gt;Allow Private Browsing&lt;/LI&gt;
&lt;LI&gt;Allow Popups&lt;/LI&gt;
&lt;LI&gt;Allow Summary&lt;/LI&gt;
&lt;LI&gt;Page Type&lt;/LI&gt;
&lt;LI&gt;Homepage URL&lt;/LI&gt;
&lt;LI&gt;Extension Identifier&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Restrictions&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Restrict specific features on devices. Located under the Restrictions category.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Allow Safari History Clearing&lt;/LI&gt;
&lt;LI&gt;Allow Safari Private Browsing&lt;/LI&gt;
&lt;LI&gt;Allowed Camera Restriction Bundle IDs&lt;/LI&gt;
&lt;LI&gt;Denied ICCIDs For iMessage And FaceTime&lt;/LI&gt;
&lt;LI&gt;Denied ICCIDs For RCS&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Default Applications&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Restrict modifications to the default calling and messaging apps. Located under the Managed Settings category.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Calling&lt;/LI&gt;
&lt;LI&gt;Messaging&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Web Content Filter&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Configure Safari History behavior when using content filtering. Located under the Web Content Filter category.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Safari History Retention Enabled&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;More information on configuring these new settings using the settings catalog can be found at &lt;A class="lia-external-url" href="https://learn.microsoft.com/intune/intune-service/configuration/settings-catalog?tabs=sc-search-filter%2Csc-reporting#find-some-settings-and-learn-more-about-each-setting" target="_blank" rel="noopener"&gt;Create a policy using settings catalog in Microsoft Intune&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Intune Company Portal support for improved Purebred derived credentials flow&lt;/H2&gt;
&lt;P&gt;With iOS 26, Purebred (version 3) is supporting a new and improved derived credentials user experience. As part of Intune’s day zero support, the Intune Company Portal for iOS/iPadOS will support Purebred's new experience.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If your organization continues to use an older version of Purebred, there will be no changes to your Purebred and Company Portal derived credentials experience. If your organization is planning on upgrading to the new version of Purebred, be sure you have the latest Company Portal version (v5.2509.0).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Support statement for “supported” versus “allowed” versions for user-less Apple devices&lt;/H2&gt;
&lt;P&gt;As new operating system updates are released throughout the year by Apple, Intune plans to support critical functionality that comes with each new OS version. With the release of iOS/iPadOS and macOS 26, we’ll continue with our existing model for enrolling user-less devices for supported and allowed OS versions to keep enrolled devices secure and efficient.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This includes devices enrolling without user affinity (user-less devices), such as shared iPads and devices enrolling through Automated Device Enrollment (ADE) without user affinity. We highly recommend updating your organization’s devices to the most recent Apple OS version publicly available to keep your devices secure and up to date.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Supported&lt;/STRONG&gt; OS versions means that user-less devices running the three most recent iOS/iPadOS versions will be fully supported by Intune. Devices running iOS/iPadOS 26.x, 18.x, and 17.x can enroll and take advantage of all Intune MDM functionality that is applicable to user-less devices, and all new eligible features will work on these devices.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;Allowed&lt;/STRONG&gt; OS versions means that user-less devices running a non-supported iOS/iPadOS version (within three versions of the supported versions) will be able to enroll and take advantage of Intune’s eligible features supported by the MDM protocol but doesn’t guarantee that there won’t be breaking OS features, bugs, or issues. Devices enrolled with user affinity or apps that rely on user sign-in will continue to not be supported.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;User-less enrollment and feature support&lt;/STRONG&gt;&lt;/P&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table class="lia-border-style-solid" border="1" style="width: 76.4815%; height: 467px; border-width: 1px;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td class="lia-align-center"&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-align-center"&gt;
&lt;P&gt;Supported&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-align-center"&gt;
&lt;P&gt;Allowed&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P class="lia-align-center"&gt;Applicable Versions&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Three most recent versions (N-2):&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;iOS/iPadOS 17.x and later&lt;/LI&gt;
&lt;LI&gt;macOS 14.x and later&lt;/LI&gt;
&lt;/UL&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Up to three versions below the supported version (N-5):&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;iOS/iPadOS 15.x and later&lt;/LI&gt;
&lt;LI&gt;macOS 12.x and later&lt;/LI&gt;
&lt;/UL&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class="lia-align-center"&gt;
&lt;P&gt;Can enroll&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-align-center"&gt;
&lt;P&gt;Yes&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-align-center"&gt;
&lt;P&gt;Yes&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class="lia-align-center"&gt;
&lt;P&gt;User-less eligible Intune MDM Features&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-align-center"&gt;
&lt;P&gt;Yes&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-align-center"&gt;
&lt;P&gt;Yes. May be impacted by breaking OS features, bugs, or issues.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class="lia-align-center"&gt;
&lt;P&gt;User affinity enrollment&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-align-center"&gt;
&lt;P&gt;Yes&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-align-center"&gt;
&lt;P&gt;No&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class="lia-align-center"&gt;
&lt;P&gt;Apps that require user sign-in&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-align-center"&gt;
&lt;P&gt;Yes&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-align-center"&gt;
&lt;P&gt;No&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For more details review the blog: Support statement for supported versus allowed versions for user-less Apple devices: &lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/intunecustomersuccess/support-statement-for-supported-versus-allowed-versions-for-user-less-apple-devi/3484657" target="_blank" rel="noopener" data-lia-auto-title="Support statement for supported versus allowed versions for user-less Apple devices" data-lia-auto-title-active="0"&gt;Support statement for supported versus allowed versions for user-less Apple devices&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you have any questions or feedback, leave a comment on this post or reach out on X &lt;A class="lia-external-url" href="https://aka.ms/IntuneSuppTeam" target="_blank" rel="noopener"&gt;@IntuneSuppTeam&lt;/A&gt;. Stay tuned to What’s new in Intune for additional settings and capabilities that will soon be available.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Known Issues&lt;/H2&gt;
&lt;P&gt;We’ve received reports that devices configured using the &lt;A class="lia-external-url" href="https://support.apple.com/guide/deployment/app-lock-payload-settings-dep80a981/web" target="_blank"&gt;App Lock&lt;/A&gt; (also known as &lt;A class="lia-external-url" href="https://learn.microsoft.com/intune/intune-service/configuration/device-restrictions-ios#kiosk" target="_blank"&gt;Kiosk mode in Intune&lt;/A&gt; located under &lt;STRONG&gt;Device configuration&lt;/STRONG&gt; &amp;gt; &lt;STRONG&gt;Templates&lt;/STRONG&gt; &amp;gt; &lt;STRONG&gt;Device restrictions&lt;/STRONG&gt;) may be unable to unlock from the lock screen after upgrading to iOS/iPadOS 26.&lt;/P&gt;
&lt;P&gt;To work around this issue, you can turn the screen off and back on, then enter the passcode to get access to the home screen. We’re working with Apple on a resolution and will update this blog as soon as more information becomes available.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Post updates:&lt;BR /&gt;&lt;/STRONG&gt;10/15/25: &lt;EM&gt;Added a 'Known Issues' section, and a details on a current known issue about the App Lock scenario.&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Oct 2025 21:15:08 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/intune-customer-success/day-zero-support-for-ios-ipados-and-macos-26/ba-p/4454161</guid>
      <dc:creator>Intune_Support_Team</dc:creator>
      <dc:date>2025-10-15T21:15:08Z</dc:date>
    </item>
    <item>
      <title>Support tip: Upcoming Microsoft Intune network changes</title>
      <link>https://techcommunity.microsoft.com/t5/intune-customer-success/support-tip-upcoming-microsoft-intune-network-changes/ba-p/4452738</link>
      <description>&lt;P&gt;&lt;STRONG&gt;3/18/2026 Update: &lt;/STRONG&gt;&lt;EM&gt;The rollout of the Intune network changes described in this blog are in progress across each workload. Additionally, we are beginning to slowly rollout to each scale unit starting with North America 0702. You can find your scale unit location under &lt;STRONG&gt;Tenant administration&lt;/STRONG&gt; &amp;gt; &lt;STRONG&gt;Tenant status&lt;/STRONG&gt; &amp;gt; &lt;STRONG&gt;Tenant details&lt;/STRONG&gt;. To avoid issues or failures with your device management, ensure your network infrastructure allows traffic for &lt;/EM&gt;&lt;EM&gt;Azure Front Door IP addresses. See the details below to verify if your configuration requires an update and use the &lt;A class="lia-external-url" href="https://learn.microsoft.com/intune/intune-service/fundamentals/intune-endpoints#azure-front-door-connectivity-diagnostics-tool" target="_blank"&gt;Azure Front Door Connectivity Diagnostics Tool&lt;/A&gt; to validate or troubleshoot.&amp;nbsp;&lt;/EM&gt;&lt;EM&gt;&lt;BR /&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;We know many customers don’t always check their service change messages in the Microsoft 365 admin center or the corresponding Message Center content in the Microsoft Intune admin center, so in this blog post we’re highlighting an important upcoming change to Intune network service endpoints. Starting on or shortly after&lt;STRONG&gt; December 2, 2025&lt;/STRONG&gt;, Intune will also use &lt;STRONG&gt;Azure Front Door IP addresses&lt;/STRONG&gt; to improve security and simplify firewall management.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If your organization uses outbound traffic policies based on IP addresses or service tags, you’ll want to review and update your firewall rules to avoid service disruptions.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P class=""&gt;We’ll keep you updated if the timeline shifts. In the meantime, here’s the service change communication that posted to all Intune customers:&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;&lt;STRONG&gt;MC1147982 - Action Required: Update firewall configurations to include new Intune network endpoints&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;As part of Microsoft’s ongoing &lt;A class="lia-external-url" href="https://www.microsoft.com/trust-center/security/secure-future-initiative" target="_blank" rel="noopener"&gt;Secure Future Initiative (SFI)&lt;/A&gt;, starting on or shortly after &lt;STRONG&gt;December 2, 2025&lt;/STRONG&gt;,&amp;nbsp;the network service endpoints for Microsoft Intune will also use Azure Front Door IP addresses. This improvement supports better alignment with modern security practices and over time will make it easier for organizations using multiple Microsoft products to manage and maintain their firewall configurations. As a result, customers may be required to add these network (firewall) configurations in third-party applications to enable proper function of Intune device and app management. This change will affect customers using a firewall allowlist that allows outbound traffic based on IP addresses or Azure service tags.&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;Do not remove any existing network endpoints required for Microsoft Intune. Additional network endpoints are documented as part of the Azure Front Door and service tags information referenced in the files linked below:&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="list-style-type: none;"&gt;
&lt;UL&gt;
&lt;LI style="list-style-type: none;"&gt;
&lt;UL&gt;
&lt;LI&gt;Public clouds: &lt;A class="lia-external-url" href="https://www.microsoft.com/download/details.aspx?id=56519" target="_blank" rel="noopener"&gt;Download Azure IP Ranges and Service Tags – Public Cloud from Official Microsoft Download Center&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Government clouds: &lt;A class="lia-external-url" href="https://www.microsoft.com/download/details.aspx?id=57063" target="_blank" rel="noopener"&gt;Download Azure IP Ranges and Service Tags – US Government Cloud from Official Microsoft Download Center&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;The additional ranges are those listed in the JSON files linked above and can be found by searching for “AzureFrontDoor.MicrosoftSecurity”.&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;&lt;STRONG&gt;How this will affect your organization&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;If you have configured an outbound traffic policy for Intune IP address ranges or Azure service tags for your firewalls, routers, proxy servers, client-based firewalls, VPN or network security groups, you will need to update them to include the new Azure Front Door ranges with the “AzureFrontDoor.MicrosoftSecurity” tag.&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;Intune requires internet access for devices under Intune management, whether for mobile device management or mobile application management. If your outbound traffic policy doesn’t include the new Azure Front Door IP address ranges, users may face login issues, devices might lose connectivity with Intune, and access to apps like the Intune Company Portal or those protected by app protection policies could be disrupted.&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;&lt;STRONG&gt;What you need to do to prepare&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;Ensure that your firewall rules are updated and added to your firewall’s allowlist with the additional IP addresses documented under Azure Front Door by &lt;STRONG&gt;December 2, 2025&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;Alternatively, you may add the service tag “AzureFrontDoor.MicrosoftSecurity” to your firewall rules to allow outbound traffic on port 443 for the addresses in the tag.&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;If you are not the IT admin who can make this change, notify your networking team. If you are responsible for configuring internet traffic, refer to the following documentation for more details:&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="list-style-type: none;"&gt;
&lt;UL&gt;
&lt;LI style="list-style-type: none;"&gt;
&lt;UL class="lia-indent-padding-left-60px"&gt;
&lt;LI class="lia-indent-padding-left-60px"&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/azure/frontdoor/origin-security?tabs=app-service-functions&amp;amp;pivots=front-door-classic" target="_blank" rel="noopener"&gt;Azure Front Door&lt;/A&gt;&lt;/LI&gt;
&lt;LI class="lia-indent-padding-left-60px"&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/azure/virtual-network/service-tags-overview" target="_blank" rel="noopener"&gt;Azure service tags&lt;/A&gt;&lt;/LI&gt;
&lt;LI class="lia-indent-padding-left-60px"&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/intune/intune-service/fundamentals/intune-endpoints?tabs=north-america#intune-core-service" target="_blank" rel="noopener"&gt;Intune network endpoints&lt;/A&gt;&lt;/LI&gt;
&lt;LI class="lia-indent-padding-left-60px"&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/intune/intune-service/fundamentals/intune-us-government-endpoints" target="_blank" rel="noopener"&gt;US government network endpoints for Intune&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;If you have a helpdesk, inform them about this upcoming change. If you need additional assistance, contact &lt;A class="lia-external-url" href="https://aka.ms/IntuneSupport" target="_blank" rel="noopener"&gt;Microsoft Intune Support&lt;/A&gt; and refer to this Message Center post.&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Note: &lt;/STRONG&gt;The above post went to all customers in our public cloud. Customers in Microsoft Intune for US Government GCC High and DoD received the following post (the only difference is the focus on US government network endpoints):&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;MC1147978&lt;/STRONG&gt; - Action Required: Update firewall configurations to include additional Intune network endpoints&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Note:&lt;/STRONG&gt; The previously available PowerShell scripts for retrieving Microsoft Intune endpoint IP addresses and FQDNs no longer returns accurate data from the Office 365 Endpoint service. Instead, use the &lt;A class="lia-external-url" href="https://learn.microsoft.com/intune/intune-service/fundamentals/intune-endpoints#consolidated-endpoint-list" target="_blank" rel="noopener"&gt;consolidated list&lt;/A&gt; provided in the Intune endpoints documentation. Using the original scripts or endpoint lists from the Office 365 Endpoint service is insufficient and may lead to incorrect configurations.&lt;/P&gt;
&lt;P&gt;For network best practices, make sure to check out the blog: &lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/intunecustomersuccess/support-tip-aligning-network-policy-with-microsoft-intune-and-zero-trust/4466688" target="_blank" rel="noopener" data-lia-auto-title="Support tip: Aligning network policy with Intune and Zero Trust" data-lia-auto-title-active="0"&gt;Support tip: Aligning network policy with Intune and Zero Trust&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;New: Azure Front Door Connectivity Diagnostics Tool for Intune&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;To help you validate or troubleshoot the recent Intune network changes, we’ve published a lightweight &lt;STRONG&gt;&lt;U&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/intune/intune-service/fundamentals/intune-endpoints?tabs=north-america#azure-front-door-connectivity-diagnostics-tool" target="_blank" rel="noopener" data-auth="NotApplicable" data-outlook-id="0caffb96-4166-44ab-b432-cc19b33ee3bd"&gt;Azure Front Door (AFD) Connectivity Diagnostics Tool&lt;/A&gt;&lt;/U&gt;&lt;/STRONG&gt;. The script tests DNS resolution, outbound TCP connectivity on ports 80 and 443, and HTTPS reachability to the AFD IP ranges used by Intune, directly from an Intune-managed device. This is useful for environments that rely on IP-based firewall, proxy, or VPN rules.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Important&lt;/STRONG&gt;&lt;EM&gt;:&lt;/EM&gt;&lt;EM&gt;&amp;nbsp;This script &lt;/EM&gt;&lt;STRONG&gt;&lt;EM&gt;only tests Azure Front Door endpoints&lt;/EM&gt;&lt;/STRONG&gt;&lt;EM&gt;. It does &lt;/EM&gt;&lt;STRONG&gt;&lt;EM&gt;not&lt;/EM&gt;&lt;/STRONG&gt;&lt;EM&gt;&amp;nbsp;validate connectivity to non-AFD Intune endpoints, including existing Intune IPs, service FQDNs, or related services such as &lt;/EM&gt;&lt;STRONG&gt;&lt;EM&gt;Windows Notification Service (WNS)&lt;/EM&gt;&lt;/STRONG&gt;&lt;EM&gt;&amp;nbsp;or &lt;/EM&gt;&lt;STRONG&gt;&lt;EM&gt;Windows Autopilot&lt;/EM&gt;&lt;/STRONG&gt;&lt;EM&gt;.&lt;BR /&gt;&lt;BR /&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;If you have any questions, leave a comment below or reach out to us on X&amp;nbsp;&lt;A class="lia-external-url" href="https://aka.ms/IntuneSuppTeam" target="_blank" rel="noopener"&gt;@IntuneSuppTeam&lt;/A&gt;&amp;nbsp;or&amp;nbsp;&lt;A class="lia-external-url" href="https://aka.ms/MSIntune" target="_blank" rel="noopener"&gt;@MSIntune&lt;/A&gt;. You can also connect with us on&amp;nbsp;&lt;A class="lia-external-url" href="https://aka.ms/IntuneLinked" target="_blank" rel="noopener"&gt;LinkedIn&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;Post updates:&lt;/STRONG&gt;&lt;BR /&gt;11/13/25: Added a note to use the&amp;nbsp;&lt;A class="lia-external-url" href="https://learn.microsoft.com/intune/intune-service/fundamentals/intune-endpoints#consolidated-endpoint-list" target="_blank" rel="noopener"&gt;consolidated list&lt;/A&gt; of Intune endpoints.&lt;BR /&gt;12/18/25: We’ve published a new Azure Front Door (AFD) Connectivity Diagnostics Tool to help validate and troubleshoot Intune connectivity after updating firewall rules.&lt;/P&gt;</description>
      <pubDate>Wed, 18 Mar 2026 21:50:47 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/intune-customer-success/support-tip-upcoming-microsoft-intune-network-changes/ba-p/4452738</guid>
      <dc:creator>Intune_Support_Team</dc:creator>
      <dc:date>2026-03-18T21:50:47Z</dc:date>
    </item>
  </channel>
</rss>

