<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Microsoft-Intune on Ru Campbell MVP</title>
    <link>https://campbell.scot/categories/microsoft-intune/</link>
    <description>Recent content in Microsoft-Intune on Ru Campbell MVP</description>
    <generator>Hugo</generator>
    <language>en-gb</language>
    <lastBuildDate>Fri, 28 Nov 2025 13:42:07 +0000</lastBuildDate>
    <atom:link href="https://campbell.scot/categories/microsoft-intune/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Microsoft 365: The Essential 10 Security Considerations</title>
      <link>https://campbell.scot/microsoft-365-the-essential-10-security-considerations/</link>
      <pubDate>Fri, 28 Nov 2025 13:42:07 +0000</pubDate>
      <guid>https://campbell.scot/microsoft-365-the-essential-10-security-considerations/</guid>
      <description>&lt;p&gt;When we talk about Microsoft 365 security, we are talking about two things:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Securing Microsoft 365 &lt;em&gt;the platform&lt;/em&gt;, such as Exchange Online, SharePoint Online, Microsoft 365 Copilot; ensuring they are hardened and monitored in proportion to risk appetite.&lt;/li&gt;
&lt;li&gt;Using Microsoft 365 &lt;em&gt;security tooling&lt;/em&gt;, such as Defender, Purview, Entra, and Intune; ensuring they are deployed, well configured, and you&amp;rsquo;re not paying for capabilities gathering dust.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The latter can be used to achieve the former, as well as other (non-Microsoft 365) platforms. For example, using Defender for Endpoint on a Linux server in AWS, or using Entra for single sign on to Salesforce.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Deploying Office 365 with Intune as a Win32 App (and Why You&#39;d Want To)</title>
      <link>https://campbell.scot/deploying-office-365-with-intune-as-a-win32-app/</link>
      <pubDate>Tue, 15 Jun 2021 15:26:14 +0000</pubDate>
      <guid>https://campbell.scot/deploying-office-365-with-intune-as-a-win32-app/</guid>
      <description>&lt;p&gt;Office 365, or Microsoft 365 Apps for Enterprise, or whatever it&amp;rsquo;s called this month, can be deployed by Intune to Windows 10 devices using a built-in wizard.  The advantage of this is you don&amp;rsquo;t need to package anything: you fill out some nice drop-downs and options in a GUI, assign it like any other app, and Microsoft takes care of the rest.&lt;/p&gt;
&lt;p&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://campbell.scot/wp-content/uploads/2021/06/Office-365-Intune-Deployment-Wizard.png&#34;&gt;&lt;/p&gt;
&lt;p&gt;In the background, this is using the Office CSP to deploy the client, which makes it quite unique compared to the deployment of other apps, which are best done with Win32 packaging.  I wrote a general guide about that for &lt;a href=&#34;https://petri.com/how-to-package-and-deploy-windows-applications-with-intune&#34;&gt;Petri.com, available here&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Troubleshooting Hybrid Azure AD Intune Automatic Enrollment</title>
      <link>https://campbell.scot/troubleshooting-hybrid-azure-ad-intune-automatic-enrollment/</link>
      <pubDate>Mon, 19 Apr 2021 20:02:44 +0000</pubDate>
      <guid>https://campbell.scot/troubleshooting-hybrid-azure-ad-intune-automatic-enrollment/</guid>
      <description>&lt;p&gt;As I have blogged about &lt;a href=&#34;https://campbell.scot/hybrid-azure-ad-join-intune-enrollment-prerequisites-checklist-and-process-flow/&#34;&gt;a&lt;/a&gt;&lt;a href=&#34;https://petri.com/how-to-automatically-hybrid-azure-ad-join-and-intune-enroll-pcs&#34;&gt;lot&lt;/a&gt;, there are a bunch of hoops to be jumped through and prerequisites to be met for a successful hybrid Azure AD join and automatic, GPO-invoked Intune enrollment. But sometimes, you have to go back to the basics when you&amp;rsquo;re banging your head off the table, and laugh off the embarrassment of not checking the fundamentals.&lt;/p&gt;
&lt;p&gt;I was recently setting up hybrid Azure AD join and Intune enrollment, as I&amp;rsquo;ve done hundreds of times before, but this time I was hitting a strange problem.  Hybrid Azure AD join went fine, but for the Intune MDM enrollment, I was getting nowhere.  Devices showed in the Azure AD admin centre, but never showed an MDM, and therefore never showed in Endpoint Manager.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Update BitLocker Unique Identifiers with Intune</title>
      <link>https://campbell.scot/update-bitlocker-unique-identifiers-with-intune/</link>
      <pubDate>Mon, 22 Mar 2021 18:01:18 +0000</pubDate>
      <guid>https://campbell.scot/update-bitlocker-unique-identifiers-with-intune/</guid>
      <description>&lt;p&gt;BitLocker unique identifiers are values used to identify the ownership of an encrypted volume.  The device that performs the encryption holds the unique identifier and as encryption begins, it also records this against the metadata of that encrypted volume.&lt;/p&gt;
&lt;p&gt;The identifiers are typically used in tandem with the BitLocker removable data-drive setting &lt;strong&gt;write access to devices configured in another organisation&lt;/strong&gt; which, if set to &lt;strong&gt;block&lt;/strong&gt;, will prevent write operations on devices where the unique identifier of the removable drive doesn&amp;rsquo;t match a list of unique identifiers managed on the device.  The idea here is you want to enforce BitLocker on removable drives to improve data loss (encrypted drives, if found, are unreadable without the means to decrypt them), &lt;em&gt;but&lt;/em&gt; you only want them to be encrypted within your organisation: someone can&amp;rsquo;t encrypt their device elsewhere and then copy data to it.  You may want to do this because it means you, as an administrator, would not be able to decrypt it if required.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Microsoft Defender Network Protection - Not Enabling via Intune - Troubleshooting &amp; Fix</title>
      <link>https://campbell.scot/microsoft-defender-network-protection-not-enabling-via-intune-troubleshooting-fix/</link>
      <pubDate>Sun, 07 Mar 2021 13:27:29 +0000</pubDate>
      <guid>https://campbell.scot/microsoft-defender-network-protection-not-enabling-via-intune-troubleshooting-fix/</guid>
      <description>&lt;p&gt;When configuring Defender for Endpoint (MDE) customer recently, I ran into a problem when trying to enable network protection.  Network protection is a feature of MDE and Microsoft Defender Antivirus (MDAV) that takes the filtering capabilities of SmartScreen and applies them to all network traffic.  It is a prerequisite for things such as MDE&amp;rsquo;s web content filtering and URL/domain indicators of compromise.&lt;/p&gt;
&lt;p&gt;This blog details the specific problem I had enabling it with Intune (Microsoft Endpoint Manager), and general troubleshooting steps to follow that will help for that problem and hopefully others you may experience.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Turn Existing Azure AD Devices into Windows Autopilot Devices</title>
      <link>https://campbell.scot/turn-existing-azure-ad-devices-into-autopilot-devices/</link>
      <pubDate>Sat, 06 Feb 2021 09:19:13 +0000</pubDate>
      <guid>https://campbell.scot/turn-existing-azure-ad-devices-into-autopilot-devices/</guid>
      <description>&lt;p&gt;To provision Windows 10 PCs using Autopilot and Intune, they must first be registered as &lt;strong&gt;Windows Autopilot devices&lt;/strong&gt; in the &lt;strong&gt;Device Directory Service&lt;/strong&gt;, which is really the cloud Autopilot service.  When a device is registered to the Autopilot service, its &lt;strong&gt;hardware hash&lt;/strong&gt; is used to generate a &lt;strong&gt;Zero Touch Device ID&lt;/strong&gt;(ZTDID) - a globally unique identifier for that device based on hardware information such as (but not only) MAC address, disk serial number, and system serial number.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Store BitLocker Recovery Keys in Azure AD for Devices Already Encrypted</title>
      <link>https://campbell.scot/store-bitlocker-recovery-keys-in-azure-ad-for-devices-already-encrypted/</link>
      <pubDate>Fri, 15 Jan 2021 18:18:36 +0000</pubDate>
      <guid>https://campbell.scot/store-bitlocker-recovery-keys-in-azure-ad-for-devices-already-encrypted/</guid>
      <description>&lt;p&gt;As you move from on-premises or third-party infrastructure to Microsoft 365 and Azure AD, you will want to keep those BitLocker recovery keys safe.  You can store those keys either in on-premises Active Directory or in the cloud with Azure AD.&lt;/p&gt;
&lt;p&gt;The behavior of the BitLocker / Azure AD relationship is that the recovery keys will only be stored against the device object in Azure AD if the encryption happens when the device is already Azure AD or Hybrid Azure AD Joined.  You can then retrieve the recovery keys from the Azure AD portal or Microsoft Endpoint Manager (which really just takes you back to Azure AD&amp;rsquo;s properties for the device).&lt;/p&gt;</description>
    </item>
    <item>
      <title>Microsoft Defender for Endpoint Web Content Filtering - Administration, Limitations, and User Experience</title>
      <link>https://campbell.scot/microsoft-defender-atp-web-content-filtering-administration-limitations-and-user-experience/</link>
      <pubDate>Sun, 28 Jun 2020 16:37:29 +0000</pubDate>
      <guid>https://campbell.scot/microsoft-defender-atp-web-content-filtering-administration-limitations-and-user-experience/</guid>
      <description>&lt;p&gt;Historically, one of the big features missing &amp;ldquo;out of the box&amp;rdquo; with MDATP was web content filtering.  Customers typically look at MDATP as an option when their existing endpoint security is due for license renewal, and compare their existing solution against it.  They would be moving from one of the big security vendors such as Sophos, Norton, and McAfee, which all supported web content filtering.  Higher lever stakeholders often listed the ability to block websites as essential, and as Microsoft did not maintain such a categorisation database, if you wanted it with Defender ATP, you&amp;rsquo;d be looking at other solutions too.  This took away from Defender ATP&amp;rsquo;s &amp;ldquo;single pane of glass&amp;rdquo; selling point.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Connect a Work or School Account - MDM vs. MAM in Self Enrolment</title>
      <link>https://campbell.scot/connect-a-work-or-school-account-mdm-vs-mam-in-self-enrolment/</link>
      <pubDate>Sat, 16 May 2020 06:13:47 +0000</pubDate>
      <guid>https://campbell.scot/connect-a-work-or-school-account-mdm-vs-mam-in-self-enrolment/</guid>
      <description>&lt;p&gt;A Windows 10 user can self-enrol in MDM or MAM from &lt;strong&gt;Settings&lt;/strong&gt; &amp;gt; &lt;strong&gt;Accounts&lt;/strong&gt; &amp;gt; &lt;strong&gt;Access work or school&lt;/strong&gt; &amp;gt; &lt;strong&gt;Connect&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://campbell.scot/wp-content/uploads/2020/05/01-1.png&#34;&gt;&lt;/p&gt;
&lt;p&gt;What happens next depends on how &lt;strong&gt;Mobility (MDM and MAM)&lt;/strong&gt; is configured in Azure Active Directory and &lt;strong&gt;device ownership&lt;/strong&gt;.  For a personal device, if &lt;strong&gt;user scope&lt;/strong&gt; for both MDM and MAM overlaps for the enrolling user, MAM will win.  The opposite is true of corporate devices. [wptb id=277]&lt;/p&gt;</description>
    </item>
    <item>
      <title>Windows Information Protection (WIP) App Protection Policies: Protected and Exempt; Denied and Allowed - What Do They Mean?</title>
      <link>https://campbell.scot/windows-information-protection-wip-app-protection-policies-protected-and-exempt-denied-and-allowed-what-do-they-mean/</link>
      <pubDate>Thu, 14 May 2020 21:05:30 +0000</pubDate>
      <guid>https://campbell.scot/windows-information-protection-wip-app-protection-policies-protected-and-exempt-denied-and-allowed-what-do-they-mean/</guid>
      <description>&lt;p&gt;One of things that strikes me as vague in Windows Information Protection (WIP) policies in Intune is configuring targeted apps:  what&amp;rsquo;s the &lt;em&gt;exact&lt;/em&gt; difference between a protected app and an exempt app; and what does allow or deny &lt;em&gt;exactly&lt;/em&gt; do for both of those?&lt;/p&gt;
&lt;p&gt;A recap on some terminology before explaining what-does-what.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Targeted apps&lt;/strong&gt; are ones the WIP service will implement controls over.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Unenlightened apps&lt;/strong&gt; cannot differentiate between work and personal data.  They have no idea what WIP is as the developer has not incorporated it.  They can only implement controls if the device is MDM enrolled.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Enlightened apps&lt;/strong&gt; have incorporated WIP into the design and can differentiate between work and personal data.  For example, Outlook knows if the email account is tenant one or not.  They can implement controls even if it&amp;rsquo;s just using MAM.  Such a scenario is called &lt;strong&gt;WIP Without Enrollment&lt;/strong&gt; or &lt;strong&gt;WIP-WE&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Enterprise context&lt;/strong&gt; is the ownership of data in the application.  You can review this by adding the column in Task Manager.  Data will either belong to the &lt;strong&gt;tenant&lt;/strong&gt; (work) or &lt;strong&gt;personal&lt;/strong&gt; (not work).  It can also be &lt;strong&gt;exempt&lt;/strong&gt;, which means waived from rules.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;In the example below, every app you see - protected and exempt - will be controlled if an MDM scenario, but only enlightened ones can be in a MAM scenario.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Using Intune to Deploy the Azure Information Protection (AIP) Unified Labeling Client (Win32 MSI)</title>
      <link>https://campbell.scot/using-intune-to-deploy-the-azure-information-protection-aip-unified-labeling-client-win32-msi/</link>
      <pubDate>Sat, 18 Jan 2020 22:47:50 +0000</pubDate>
      <guid>https://campbell.scot/using-intune-to-deploy-the-azure-information-protection-aip-unified-labeling-client-win32-msi/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Unified labels&lt;/strong&gt; refer to a movement whereby &lt;strong&gt;Azure Information Protection (AIP) labels&lt;/strong&gt; are now being replaced by &lt;strong&gt;sensitivity labels&lt;/strong&gt;.  Sensitivity labels offer encryption, watermarks, etc as AIP labels did before them, but are now managed in the new &lt;a href=&#34;https://security.microsoft.com/sensitivity?viewid=sensitivitylabels&#34;&gt;Microsoft 365 Security Centre&lt;/a&gt;, with several other benefits beyond the scope of this post.&lt;/p&gt;
&lt;p&gt;With this change comes a new AIP client, called the &lt;strong&gt;unified labeling client&lt;/strong&gt;, that replaces the old one, now called the &lt;strong&gt;classic client&lt;/strong&gt;.  The AIP unified labeling client will refer to the M365 Security Centre to download labels, but note that (and &amp;lsquo;unified&amp;rsquo; gives this away) labels created on either the old Azure AIP dashboard or new M365 Security Centre will sync to each other after you have enabled unified labeling.  Current guidelines from Microsoft are that, unless you have a &lt;a href=&#34;https://docs.microsoft.com/en-us/azure/information-protection/rms-client/use-client#compare-the-labeling-clients-for-windows-computers&#34;&gt;use case that isn&amp;rsquo;t a feature of the unified labeling client&lt;/a&gt;, this is what you should be installing.  This post holds your hand through a deployment of the client using Intune.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Deploy Microsoft Store Apps using Intune with Configuration Manager (SCCM) Co-Management (Fix &#39;Not Applicable&#39; Status)</title>
      <link>https://campbell.scot/deploy-microsoft-store-apps-using-intune-with-sccm-co-management-fix-not-applicable-status/</link>
      <pubDate>Fri, 10 Jan 2020 21:00:30 +0000</pubDate>
      <guid>https://campbell.scot/deploy-microsoft-store-apps-using-intune-with-sccm-co-management-fix-not-applicable-status/</guid>
      <description>&lt;p&gt;Intune provides an interface to easily deploy apps from the Microsoft Store to your registered users and devices, but even if you have SCCM (Config Manager) Co-Mangement enabled with the default workloads shifted to Intune in Co-Management properties, there is more to be done.  If you don&amp;rsquo;t follow these steps, you will receive the status of &lt;strong&gt;Not applicable&lt;/strong&gt; in the Intune client apps user and device install status pages.&lt;/p&gt;
&lt;p&gt;&lt;img alt=&#34;00.-Not-Applicable-in-Intune&#34; loading=&#34;lazy&#34; src=&#34;//wp-content/uploads/2020/05/00.-not-applicable-in-intune.png&#34;&gt;&lt;strong&gt;Prerequisite:&lt;/strong&gt; This only works with SCCM 1806+.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
