🔐
1. Enforce Device Compliance and Conditional Access
Ensure only compliant devices access corporate resources; compliance is the device signal in Zero Trust.
Intune Portal - Enforce compliance
- Microsoft Intune > Devices > Compliance policies > + Create policy (choose platform).
- Set checks: encryption, minimum OS, jailbreak/root detection, password complexity; Assign groups; Create.
- Monitor: Devices > Monitor > Compliance.
Entra Portal - Conditional Access
- Microsoft Entra ID > Security > Conditional Access > + New policy; target pilot group.
- Cloud apps or actions: select apps; Conditions: platforms as needed.
- Grant: Require device to be marked as compliant; enable report-only for pilot; Create.
🔒
2. Require Strong Authentication (MFA + Passwordless)
Reduce identity risk by combining MFA and passwordless methods.
Intune Portal - Windows Hello for Business
- Intune > Endpoint security > Authentication method deployment (or Profiles) > Create profile (Windows Hello for Business).
- Configure PIN complexity, biometrics, trust model; assign; monitor onboarding.
Entra Portal - MFA and Passwordless
- Entra ID > Security > Authentication methods: enable Authenticator, FIDO2, Windows Hello.
- Conditional Access: require MFA for high-risk scenarios; Identity Protection: configure risk policies.
🔰
3. Enforce Device Encryption and Disk Protection
Protect data at rest across device types to limit exposure if devices are lost or compromised.
Intune Portal - Enable encryption
- Intune > Endpoint security > Disk encryption > + Create policy (BitLocker for Windows).
- Configure XTS-AES, TPM settings and recovery key escrow; Assign; Monitor.
Entra Portal - Use encryption signal
- Entra ID > Devices > Device settings: confirm Azure AD join settings.
- Conditional Access: require device compliance (encryption) before access.
🧰
4. Apply Least‑Privilege Administrative Roles and Privileged Access Management
Limit and protect administrative identities; reduce blast radius of compromised accounts.
Intune Portal - RBAC and scoped roles
- Intune > Tenant administration > Roles > All roles: assign built-in or custom roles, scope to groups and use scope tags.
Entra Portal - PIM and Just-in-Time
- Entra ID > Identity Governance > Privileged Identity Management (PIM): convert permanent to eligible, require MFA, enable time-bound activation.
🤖
5. Use Endpoint Detection and Response + Microsoft Defender Integration
Detect, investigate and respond to threats across endpoints; telemetry is central to Zero Trust.
Intune Portal - Onboard EDR and Defender
- Intune > Endpoint security > Antivirus/EDR: create policies and onboarding packages; assign to device groups; monitor status.
Entra Portal - Use EDR signals
- Integrate Defender for Endpoint so device risk signals flow to Intune/Entra; use Conditional Access policies based on device risk.
📦
6. Harden App Access with App Protection Policies and App Configuration
Protect corporate data inside apps (BYOD) and prevent leakage.
Intune Portal - App protection policies
- Intune > Apps > App protection policies > + Create policy: configure data relocation, restrict cut/copy, require PIN, managed browser rules; target apps and groups.
Entra Portal - App registration and SSO
- Entra ID > Enterprise applications > select app > Single sign-on; configure SAML/OIDC and user assignments.
🔁
7. Keep OS and Apps Up to Date; Automate Patch Management
Reduce attack surface by timely patching.
Intune Portal - Update rings and feature updates
- Intune > Devices > Windows > Update rings for Windows 10 and later > + Create profile; configure deferrals, deadlines and assign.
Entra Portal - Use update signals
- Use Conditional Access to require device compliance (which includes update status) before access.
🔎
8. Monitor and Audit Device Health and Compliance
Continuous verification and audit evidence are required by Zero Trust.
Intune Portal - Logs and reports
- Intune > Tenant administration > Audit logs; Devices > Monitor > Compliance policy; Reports > Device compliance; export for audit.
Entra Portal - Sign-in and risk logs
- Entra ID > Monitoring > Sign-ins; Identity Protection > Risk detections; route logs to Log Analytics/Sentinel.
🧭
9. Enforce Network Controls and Secure Perimeterless Access
Constrain resource access by network context, app and device posture.
Intune Portal - Network and VPN profiles
- Intune > Devices > Configuration profiles > + Create profile: create VPN (Always On/conditional tunnel), Wi‑Fi and firewall profiles and deploy.
Entra Portal - Conditional Access network conditions
- Entra ID > Conditional Access > Conditions > Locations: define named locations (trusted IPs) and apply controls.
🤖
10. Establish Secure Enrollment, Device Identity, and Lifecycle Controls
Trust device identity from enrollment through deprovisioning; ensure secure onboarding and offboarding.
Intune Portal - Enrollment and lifecycle
- Intune > Devices > Enroll devices: Enrollment restrictions; Automatic enrollment (MDM user scope); Windows Autopilot profiles; Deprovision devices (Wipe/Retire).
Entra Portal - Device identity and join type
- Entra ID > Devices > Device settings: control who can join devices; use Device categories and Conditional Access to require join types.
🛠
11. Top 10 Intune Device Troubleshooting Examples
Common device issues and triage steps with authoritative docs or reputable community posts.
- Device fails to enroll - Triage: verify Autopilot/MDM user scope, Azure AD join, Intune license, enrollment restrictions; collect enrollment logs (dsregcmd, MDM diagnostics).
- Device not showing in Intune / stale inventory - Triage: force sync (Company Portal), confirm auto-enroll, check Azure AD device object and device cleanup policies.
- Compliance policy shows noncompliant - Triage: examine failing rule (encryption, OS version, jailbreak), force sync, remediate and re-evaluate.
- Conditional Access blocks expected access - Triage: check Entra sign-in logs for CA evaluation, verify policy in report-only, validate device signals and locations.
- App deployment fails or stuck installing - Triage: check app install status in Intune, inspect Intune Management Extension logs on device, confirm package requirements and dependencies.
- Windows Update / Feature update failures - Triage: review Update rings, WindowsUpdate.log, ensure diagnostic and update telemetry reaches Intune; use update troubleshooting guides.
- BitLocker or disk encryption issues - Triage: confirm BitLocker policy applied, validate TPM and recovery key escrow on Intune, collect client BitLocker events.
- Company Portal sign-in or SSO problems - Triage: clear cached accounts, check SSO configuration, review Entra sign-in logs and CA evaluation, ensure auth methods registered.
- Defender for Endpoint not reporting / onboarding failures - Triage: confirm integration, validate onboarding package/method, check device visibility in Defender portal and onboarding logs.
- Device remote actions fail (wipe/retire/remote lock) - Triage: ensure device check-in and connectivity, review action status in Intune, inspect Intune management logs and gateway connectivity.
💻
12. Top 10 PowerShell Commands Every Intune Device Administrator Needs
Examples use Microsoft Graph PowerShell SDK (Get-/Invoke-Mg*). Replace <device-id> as needed and test in a pilot tenant.
-
Connect to Graph
Connect-MgGraph -Scopes "DeviceManagementManagedDevices.ReadWrite.All","Device.Read.All"
-
List managed devices
Get-MgDeviceManagementManagedDevice | Select-Object id,deviceName,operatingSystem,complianceState,userPrincipalName
-
Get device details by ID
$d = Get-MgDeviceManagementManagedDevice -ManagedDeviceId <device-id> ; $d | Format-List *
-
Initiate remote sync
Invoke-MgDeviceManagementManagedDeviceSyncDevice -ManagedDeviceId <device-id>
-
Trigger remote wipe
Invoke-MgDeviceManagementManagedDeviceWipe -ManagedDeviceId <device-id> -KeepEnrollmentData $false -KeepUserData $false
-
Retrieve BitLocker recovery keys
Get-MgDeviceManagementManagedDevice -ManagedDeviceId <device-id> | Select-Object -ExpandProperty BitlockerKeys
-
Export noncompliant devices
Get-MgDeviceManagementManagedDevice | Where-Object {$_.complianceState -ne "compliant"} | Export-Csv noncompliant-devices.csv -NoTypeInformation -
Upload / assign a remediation script (Intune Management Extension)
# Use Graph API deviceManagement/deviceManagementScripts endpoints to create and assign scripts via Graph
-
Get Intune role assignments (RBAC)
Get-MgRoleManagementDirectoryRoleDefinition | Where-Object {$_.displayName -like "*Intune*"} Get-MgRoleManagementDirectoryRoleAssignment -
Query Autopilot device identities
Get-MgDeviceManagementWindowsAutopilotDeviceIdentity | Select-Object id,displayName,serialNumber,registrationState
Notes: replace <device-id> with the managed device id; use least-privilege principals when scripting; test in a pilot tenant before production.
This article was originally published on 2025-NOV-01 and last reviewed on 2025-NOV-17.