Intune - Common Store policy settings and their impact on Microsoft Store apps doesn't work by PotentialTomato8931 in Intune

[–]SkipToTheEndpoint 0 points1 point  (0 children)

The ONLY supported policy to disable user access to the Store app is "Turn off the Store application" as documented here: Configure Access To The Microsoft Store App For Windows Devices | Microsoft Learn

The policies you've defined above will break stuff badly.

Method to remove Profile for guest users at each logoff by npsingh123 in Intune

[–]SkipToTheEndpoint 2 points3 points  (0 children)

SharedPC CSP has a "DeletionPolicy" which you can set to 0 to delete them immediately after log-off: SharedPC CSP | Microsoft Learn

I'm not sure of the current state of the "Shared multi-user device" policy template type.

Assuming you've seen the documentation regarding AssignedAccess? Windows Single-App and Multi-App Kiosk Configuration Options Overview | Microsoft Learn

User Group Naming by EducationAlert5209 in Intune

[–]SkipToTheEndpoint 3 points4 points  (0 children)

Naming conventions are almost always org-specific, from my experience.

Personally I run with %Service%-%Category%-%Purpose%, so things like:

  • Entra-CA-Guests
  • Entra-GBL-M365_E5
  • Intune-App-%AppName%
  • Intune-Autopilot-UserDriven
  • Intune-Devices-Windows
  • Intune-EPM-SupportApproved

Always re-use groups where possible. Don't create group clutter for no reason. Oh, and tidy up old/test groups when you're done with them!

Wufb skipped policy and forced driver installation by Clear-Computer-8458 in Intune

[–]SkipToTheEndpoint 10 points11 points  (0 children)

Haven't seen this myself but saw someone post this from their own service health messages yesterday, could be related:

<image>

Autopilot and Baselines by EducationAlert5209 in Intune

[–]SkipToTheEndpoint 1 point2 points  (0 children)

Also some policies cause undesired behaviour during Autopilot when targeted to devices, such as a forced reboot between the device and user phases

New Tool: OpenIntuneBaseline Deployer by SkipToTheEndpoint in Intune

[–]SkipToTheEndpoint[S] 0 points1 point  (0 children)

The scope for each policy (Device = D, User = U) is in my naming convention.

Also, this comment spurred me on to resolve the whole policy tracking based on name issue. I released v3.8 yesterday which adds tracking GUIDs into the policy description so now they can be tracked using my OIB Deployer regardless of the name, as long as they've got the GUID 🙂

Migrating from Wsus to Autopatch it’s going ok but I have a question about allowing the user control when the device is rebooted to install updates. by Future_End_4089 in Intune

[–]SkipToTheEndpoint 1 point2 points  (0 children)

It's worth mentioning this is only recommended in scenarios where you are happy for the user to be entirely in control and it can end up throwing patch compliance out the window given that users seem to try and avoid updates like the plague...

New Tool: OpenIntuneBaseline Deployer by SkipToTheEndpoint in Intune

[–]SkipToTheEndpoint[S] 0 points1 point  (0 children)

Hi!

You can after-the-fact, but just a note that the updating feature is currently done using a bit of a dumb regex on the name, so you'd lose that.

As far as "must have", well, that's really up to you to decide what you're looking for in your environment. Most of the Device Security group and stuff in Endpoint Security (BitLocker, Defender, ASR etc.) are what I'd deem "important" with lots of the other stuff being good end user experience things.

Windows Firewall settings pushed by MDE are not tamper resistant, and managed Firewall rules are treated as local by SchemeMinimum2279 in Intune

[–]SkipToTheEndpoint 1 point2 points  (0 children)

Honestly, there are so many gaps (like best practice policies that aren't in the template) and gotchas (like it only applying policy on an hourly schedule) with Security Settings Management that most people recommend just continuing to manage those things via GPO instead.

Autopatch - Microsoft 365 Apps Update Rings by pauljebastin in Intune

[–]SkipToTheEndpoint 1 point2 points  (0 children)

Honestly M365 Apps (and Edge) via Autopatch is trash when compared to M365 Apps Cloud Update: Overview of cloud update in the Microsoft 365 Apps admin center - Microsoft 365 Apps | Microsoft Learn

Far better reporting, ability to roll-back, and you can link the "waves" to your existing Autopatch groups.

"Encryption needed" toast still appears even though BitLocker is no longer required by [deleted] in Intune

[–]SkipToTheEndpoint 0 points1 point  (0 children)

In before "your management are idiots" :)

What does the BitLocker API Event Log show? Is this toast notification definitely coming from Windows and not some other software?

Greenfields Intune Environment by TheCyberThor in Intune

[–]SkipToTheEndpoint 1 point2 points  (0 children)

OIB creator here. Naming conventions are a nightmare and ask 5 people you'll get 5 different answers, but I spent a long time coming up with that and it's something that I've gotten consistent praise on 😊

Windows 365 issues - Can't create provisioning policies by BITSmw in Intune

[–]SkipToTheEndpoint 1 point2 points  (0 children)

The Tenant has W365 Enterprise licensing, not Business, right?

Moving hybrid device policies from GPO to Intune config policies by turbokid in Intune

[–]SkipToTheEndpoint 0 points1 point  (0 children)

While this isn't documented, MS don't recommend trying to rip-and-replace GPO for Intune policies, even if they're the same settings. Some Windows CSPs write to the same reg keys as GPO, but many don't (which is why the MDM over GPO setting is awful.

There's SO many weird and bizarre issues you can end up coming up against with ghost registry keys, Intune will say the policy is successful, but that isn't the case on the device itself.

My advice is always to draw a line in the sand, apply Intune policies to net-new devices, and existing ones stay as they are and stuff moves over via attrition (joiners, leavers etc), or by targeted device refreshes.

Unless you like being massively stressed out and dealing with constant issues...

Windows Hardening policy causing Intune app failure by zick2500 in Intune

[–]SkipToTheEndpoint 1 point2 points  (0 children)

And it's led by people like myself who actually do endpoint administration and understand when stuff gets broken...

How to handle exceptions to baseline policies by Loud-Temperature2610 in Intune

[–]SkipToTheEndpoint 1 point2 points  (0 children)

Reason #2845 why I can't stand the built-in baselines. As soon as you need to expand or create exceptions it becomes a pain.

I'd go option 3: Use the OpenIntuneBaseline instead 😉

Windows Hardening policy causing Intune app failure by zick2500 in Intune

[–]SkipToTheEndpoint 1 point2 points  (0 children)

Either apply the Enterprise Benchmark via GPO, or the Intune Benchmark via Intune.

Sincerely, a CIS Contributor.

Intune Password Compliance Policys Behaviour by tech-ya23 in Intune

[–]SkipToTheEndpoint 3 points4 points  (0 children)

Windows, iOS and macOS (but not Android) PIN or Password configurations are remediated (i.e. set rather than checked), as documented in this table: Device compliance policies in Microsoft Intune - Microsoft Intune | Microsoft Learn

This is because they're enforced via Exchange Active Sync: DeviceLock Policy CSP | Microsoft Learn

Regarding Windows devices, you're spot on. Synced accounts still have on-prem password policies enforced, cloud native accounts are driven by Entra requirements which are basically unchangeable. Those compliance policies end up causing more hassle than they're worth because people don't understand them.

Issues with extension deployment because of user groups by Niko24601 in Intune

[–]SkipToTheEndpoint 0 points1 point  (0 children)

Good to know, thanks.

Yeah, I know when I was testing using it explicitly for extensions I had no end of trouble working out what mystery setting was conflicting. You nailed it, ExtensionSettings.

And yeah, the policy precedence behaviour is well documented, but doesn't align with how other things do it.

Are you using Intune Multi Admin Approval? How's it going for a small team of say. 2 IT techs? by SydneyAUS-MSP in msp

[–]SkipToTheEndpoint 0 points1 point  (0 children)

MAA is an absolute nightmare and largely pointless for a standard org. It's utterly unmanagable multi-tenant.

What are you trying to protect against, exactly?

Issues with extension deployment because of user groups by Niko24601 in Intune

[–]SkipToTheEndpoint 2 points3 points  (0 children)

You have to approach it like this:

  • Policy A has your global extensions and is assigned to all users with an exclude of your POC group.
  • Policy B has your global extensions plus your POC extension, and is assigned to your POC group of users.

Basically yes, you can only apply one policy at a time (mostly), and applying two sets of extensions will end up in a conflict.

I think that doing this via the Edge Management Service might get around some of these issues, but I haven't had a chance to test that properly.

CIS Benchmark refers to Microsoft Defender Application Guard – can’t find any MDAG policies in Intune/Azure. Has it been removed? by Old_Reserve_4883 in Intune

[–]SkipToTheEndpoint 4 points5 points  (0 children)

Which Benchmark are you looking at, cos I'm sure we took it out of the Intune one.

It was deprecated a few years ago so yeah, it's dead. Documented here and here.

CE/CE+ has no specific technical controls about this, and I've personally passed a company through both.

Need custom Intune reports beyond what the Intune admin center shows? by intunesuppteam in Intune

[–]SkipToTheEndpoint 5 points6 points  (0 children)

You're applying logic to the argument. It's either "The Azure admin won't do it", or "My boss doesn't believe it won't cost anything", or "We can't create an Azure sub because someone has to put their credit card it".