The Intune Best Practices Checklist
The Intune Best Practices Checklist
This is intended to be used as a baseline for provisioning new Microsoft 365 tenants according to best
practices. The checklist is setup sequentially (i.e. the recommended implementation order). Note: I have
also provided a script via GitHub which will make importing the described policy set much quicker and
easier.
Table of Contents
Guide to the Intune Best Practices Checklist ................................................................................................ 1
☐ Create security groups for Intune deployment rings ........................................................................... 2
☐ Setup Windows 10 Software Update Rings ......................................................................................... 3
☐ Setup Office 365 app deployments for Windows 10 ........................................................................... 5
☐ Setup App protection policies (MAM) ................................................................................................. 8
☐ Customize the Company Portal.......................................................................................................... 12
☐ Create the Company terms and conditions ....................................................................................... 13
☐ Configure Device enrollment restrictions .......................................................................................... 15
☐ Configure Windows 10 automatic enrollment................................................................................... 17
☐ Configure Windows Hello for Business .............................................................................................. 18
☐ Configure Windows Enrollment status page ..................................................................................... 19
☐ Configure Apple MDM push certificate ............................................................................................. 20
☐ Configure Device cleanup .................................................................................................................. 22
☐ Configure the default Compliance policy settings ............................................................................. 23
☐ Configure Device compliance notifications ....................................................................................... 24
☐ Configure Device compliance policies ............................................................................................... 25
☐ Enroll devices ..................................................................................................................................... 27
☐ Verify compliance status of enrolled devices .................................................................................... 32
☐ Enable Conditional Access ................................................................................................................. 33
☐ Setup Device Configuration profiles .................................................................................................. 35
☐ Control the OneDrive for Business experience ................................. Error! Bookmark not defined.
☐ Windows 10 Device Restrictions & Endpoint Protection settings .... Error! Bookmark not defined.
Whenever you create a policy or configuration profile that you want to test, you can target the
appropriate rings starting with the pilot group. Your needs may be different than this, for instance some
small orgs only do a pilot and then straight to production (All users). But consider an additional group for
“sensitive” users who should get policy changes and software updates last, after everyone else.
You may also create different pilot groups for different platforms or purposes (e.g. Intune-MacOS-Pilot
or Intune-Android-Pilot to test settings changes first on these device types).
Go to Azure AD > Groups > New group to create security groups appropriate to your situation.
I recommend creating at least two update rings. Three if you have sensitive groups within the
organization. Here is an example of the most typical deployment rings for a small business:
Adoption ring Servicing channel Defer feature updates Defer quality updates
Pilot group Semi-Annual 0 days 0 days
Broad group Semi-Annual 30-60 days 7-14 days
Sensitive group Semi-Annual 120 days 30 days
This way, any potential issues with updates can be discovered and hopefully remediated via earlier
adoption rings, and before critical or sensitive users get them. The pilot group is always your canary in
Go to Apps > All apps. Click + Add. Under App type, choose Office 365 Suite > Windows 10.
Leave the selection on Configuration designer. On the first blade, App suite information, give it a name
and description similar to the below:
Note: You can also configure these via the Microsoft 365 Admin center from Devices > Policies.
It is much quicker and easier to setup policies using the Microsoft 365 admin center; however, you can
go into more granular detail and see additional selections from the Device Management / Intune portal.
I will describe the latter (Intune) as it allows us the most flexibility in policy design.
After selecting apps, choose Settings and then Data protection; make selections similar to the following
for a good baseline, or manipulate as needed.
You can repeat this process, choosing nearly identical settings for iOS.
Until then, find these options under Tenant administration > Branding and Customization.
If you choose to complete this step, you will want at least your company name and a privacy statement
that you can point users toward. Also, it is a good idea to include contact information for support. Down
below you can upload a logo and customize the color schemes.
The above is taken from Microsoft’s example, but you can make the terms your own.
For Device limit restrictions, I prefer setting this value to no more than 5 devices per individual. When a
user retires a device, it should be deleted from Intune so that they can enroll a different one.
For Device type restrictions, you will want to edit the default or create new restrictions. Use this to
block any platforms (and versions) that you do not intend to support. Example depicted below:
Here you can add devices via CSV in bulk or manually, by IMEI or serial number.
Navigate to Devices > Enroll devices > Windows enrollment and choose Automatic enrollment.
According to Microsoft, the best practice to set the MDM User scope to All (which should be the
default), but flip the MAM User scope to None (which is not the default). This helps auto-enrollment go
smoothly, as MAM takes precedence over MDM and can lead to issues.
I recommend disabling this feature as part of the enrollment settings, and configuring it separately using
a Device configuration profile, so that you can deploy this feature in a more targeted, monitored and
controlled way. Navigate to Devices > Enroll devices > Windows enrollment > Windows Hello. Move
these settings to Not configured.
To configure a profile to replace these settings (which allows you to target specific groups and monitor
the deployment), navigate to Devices > Configuration profiles. Create a new profile and choose
Windows 10 and later as the Platform, Identity protection as the Profile type.
If you intend to support hardware security keys for sign-in (e.g. Yubikey), Enable the Use security keys
for sign-in setting here, and complete the additional steps which are required to complete this process.
Upload the CSR to Apple, and then download the certificate that Apple provides you with. You will
return to the Microsoft 365 Device management portal and upload the certificate, and you’re done.
Well, until next year when you need to renew it. Set yourself a reminder for this!
The impact of this setting is that devices which are deleted, if they still exist, would need to be re-
enrolled if they were required to be re-initiated into the system.
Note: Also see this article for advice on how to clean up stale devices in Azure AD. This would include
devices enrolled into Intune, and others that are merely “registered” against Azure AD (unmanaged).
See this article for more details on the proper order for implementing device-based conditional access:
https://www.itpromentor.com/device-ca-framework/
When you are ready to proceed, navigate to Devices > Compliance policies > Compliance policy
settings. Review the default selections.
• Mark devices with no compliance policy assigned as - This setting means that an enrolled
device must be evaluated by a compliance policy or it will be marked as not compliant. If
you leave this option on Compliant that means any enrolled device is considered compliant
when there is no compliance policy assigned. If your goal is end-to-end coverage with device
compliance and conditional access, you will want this set to Not Compliant.
• Enhanced jailbreak detection: This setting uses location services and can drain battery life
more quickly. I normally leave this Disabled.
Fill in the notification that will be delivered to end users when devices become noncompliant.
Create a Windows 10 policy. You can choose your own compliance settings but be aware that these are
going to be requirements for access once you have Conditional Access enabled (so make sure your
devices can meet the requirements)! For example, to require a minimum OS version go to Device
Properties:
Under the Actions for noncompliance, consider increasing the grace period. If a machine falls out of
compliance, the grace period will allow the user time to get the device remediated before losing access.
And you can also Add a new action, to alert the end user when their device has fallen out of compliance.
Select the notification you created earlier.
Repeat this process to configure compliance policies for each device platform you intend to support in
your environment. You do not need to create policies for platforms you do not intend to support.
☐ Enroll devices
The most common method for enrolling personal devices (of all types) is the Company Portal app.
Simply go the app store on your device of choice and search for Company Portal app. Once you have the
app installed, sign into the app using your Microsoft/Office 365 credentials to complete enrollment
steps.
If the device is not domain-joined yet (still in a workgroup) then you can choose the option to Join Azure
Active Directory instead, as shown (Azure AD Joined is the preferred configuration for corporate owned
devices):
1. Autopilot can tell the device to skip past some of the first run experience screens (privacy)
2. You have the option to enforce Standard user, rather than letting the user be local admin
To configure Autopilot requires that you get unique device identifiers imported into Intune in advance.
You’d want to get these from the OEM, but they can also be exported via PowerShell from the device.
This is easy to do; simply go to Devices > Monitor and find reports under Compliance.
Refer to that resource for more details on how to set up a more comprehensive baseline. Here is a
summary of the relevant policies with regard to devices and client apps managed by Intune:
Nevertheless, I have published set of Windows 10 settings that I would recommend most small and mid-
sized businesses at least review when implementing Intune for the first time, and those are available in
the repository on GitHub by running the Setup-Intune.ps1 script.
Additionally, I have The Windows 10 Business Secure Configuration Framework available on Gumroad.
You can also find deployment scripts for the security profiles on GitHub under Windows 10.
Last, take a look at this article, for configuration of the OneDrive for Business client: a popular ask when
replacing legacy technologies such as redirected folders and mapped drives.