Assign device profiles in Microsoft Intune (original) (raw)

Skip to main content

This browser is no longer supported.

Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.

Assign policies in Microsoft Intune

In this article

When you create an Intune policy, it includes all the settings you added and configured within the policy. When the policy is ready to be deployed, the next step is to "assign" the policy to your user or device groups. When you assign the policy, the users and devices receive your policy, and the settings you entered are applied.

In Intune, you can create and assign the following policies:

This article shows you how to assign a policy, includes some information on using scope tags, describes when to assign policies to user groups or device groups, and more.

This feature applies to:

Before you begin

Assign a policy to users or groups

  1. Sign in to the Microsoft Intune admin center.
  2. Select Devices > Manage devices > Configuration. All the profiles are listed.
  3. Select the profile you want to assign > Properties > Assignments > Edit:
    For example, to assign a device configuration profile:
    1. Go to Devices > Manage devices > Configuration. All the profiles are listed.
    2. Select the policy you want to assign > Properties > Assignments > Edit:
      Screenshot that shows how to select assignments to deploy the profile to users and groups in Microsoft Intune.
  4. Under Included groups or Excluded groups, choose Add groups to select one or more Microsoft Entra groups. If you intend to deploy the policy broadly to all applicable devices, select Add all users or Add all devices.
    Note
    If you select "All Devices" and "All Users", the option to add additional Microsoft Entra groups disables.
  5. Select Review + Save. This step doesn't assign your policy.
  6. Select Save. When you save, your policy is assigned. Your groups will receive your policy settings when the devices check in with the Intune service.

Assignment features you should know and use

User groups vs. device groups

Many users ask when to use user groups and when to use device groups. The answer depends on your goal. Here's some guidance to get you started.

Device groups

If you want to apply settings on a device, regardless of who's signed in, then assign your policies to a devices group. Settings applied to device groups always go with the device, not the user.

For example:

To summarize, use device groups when you don't care who's signed in on the device, or if anyone signs in. You want your settings to always be on the device.

User groups

Policy settings applied to user groups always go with the user, and go with the user when signed in to their many devices. It's normal for users to have many devices, such as a Surface Pro for work, and a personal iOS/iPadOS device. And, it's normal for a person to access email and other organization resources from these devices.

If a user has multiple devices on the same platform, then you can use filters on the group assignment. For example, a user has a personal iOS/iPadOS device, and an organization-owned iOS/iPadOS. When you assign a policy for that user, you can use filters to target only the organization-owned device.

Follow this general rule: If a feature belongs to a user, such as email or user certificates, then assign to user groups.

For example:

To summarize, use user groups when you want your settings and rules to always go with the user, whatever device they use.

Azure Virtual Desktop multi-session

You can use Intune to manage Windows multi-session remote desktops created with Azure Virtual Desktop, just like you manage any other shared Windows client device. When you assign policies to user groups or devices, Azure Virtual Desktop multi-session is a special scenario. With virtual machines, device CSPs must target device groups. User CSPs must target user groups.

For more information, go to Use Azure Virtual Desktop multi-session with Microsoft Intune.

Windows CSPs and their behavior

The policy settings for Windows devices are based on the configuration service providers (CSPs). These settings map to registry keys or files on the devices.

Here's what you need to know about Windows CSPs:

Exclude groups from a policy assignment

Intune device configuration policies let you include and exclude groups from policy assignment.

As a best practice:

For more information on groups, see Add groups to organize users and devices.

Principles of including and excluding groups

When you assign your policies and policies, apply the following general principles:

Support matrix

Use the following matrix to understand support for excluding groups:

Screenshot that shows the supported options to include or exclude groups from a policy assignment.

Scenario Support
1 ❕ Partially supported Assigning policies to a dynamic device group while excluding another dynamic device group is supported. But, it's not recommended in scenarios that are sensitive to latency. Any delay in exclude group membership calculation can cause policies to be offered to devices. In this scenario, we recommend using filters instead of dynamic device groups for excluding devices. For example, you have a device policy that's assigned to All devices. Later, you have a requirement that new marketing devices don't receive this policy. So, you create a dynamic device group called Marketing devices based on the enrollmentProfilename property (device.enrollmentProfileName -eq "Marketing_devices"). In the policy, you add the Marketing devices dynamic group as an excluded group. A new marketing device enrolls in Intune for the first time, and a new Microsoft Entra device object is created. The dynamic grouping process puts the device into the Marketing devices group with a possible delayed calculation. At the same time, the device enrolls into Intune, and starts receiving all applicable policies. The Intune policy can be deployed before the device is put in the exclusion group. This behavior results in an unwanted policy (or app) being deployed to the Marketing devices group. As a result, it's not recommended to use dynamic device groups for exclusions in latency sensitive scenarios. Instead, use filters.
2 ✅ Supported Assigning a policy to a dynamic device group while excluding a static device group is supported.
3 ❌ Not supported Assigning a policy to a dynamic device group while excluding user groups (both dynamic and static) isn't supported. Intune doesn't evaluate user-to-device group relationships, and devices of the included users aren't excluded.
4 ❌ Not supported Assigning a policy to a dynamic device group and excluding user groups (both dynamic and static) isn't supported. Intune doesn't evaluate user-to-device group relationships, and devices of the included users aren't excluded.
5 ❕ Partially supported Assigning a policy to a static device group while excluding a dynamic device group is supported. But, it's not recommended in scenarios that are sensitive to latency. Any delay in exclude group membership calculation can cause policies to be offered to devices. In this scenario, we recommend using filters instead of dynamic device groups for excluding devices.
6 ✅ Supported Assigning a policy to a static device group and excluding a different static device group is supported.
7 ❌ Not supported Assigning a policy to a static device group and excluding user groups (both dynamic and static) isn't supported. Intune doesn't evaluate user-to-device group relationships, and devices of the included users aren't excluded.
8 ❌ Not supported Assigning a policy to a static device group and excluding user groups (both dynamic and static) isn't supported. Intune doesn't evaluate user-to-device group relationships, and devices of the included users aren't excluded.
9 ❌ Not supported Assigning a policy to a dynamic user group and excluding device groups (both dynamic and static) isn't supported.
10 ❌ Not supported Assigning a policy to a dynamic user group and excluding device groups (both dynamic and static) isn't supported.
11 ✅ Supported Assigning a policy to a dynamic user group while excluding other user groups (both dynamic and static) is supported.
12 ✅ Supported Assigning a policy to a dynamic user group while excluding other user groups (both dynamic and static) is supported.
13 ❌ Not supported Assigning a policy to a static user group while excluding device groups (both dynamic and static) isn't supported.
14 ❌ Not supported Assigning a policy to a static user group while excluding device groups (both dynamic and static) isn't supported.
15 ✅ Supported Assigning a policy to a static user group while excluding other user groups (both dynamic and static) is supported.
16 ✅ Supported Assigning a policy to a static user group while excluding other user groups (both dynamic and static) is supported.

See monitor device profiles for guidance on monitoring your policies, and the devices running your policies.


Feedback

Additional resources

In this article