www.petervanderwoude.nl Open in urlscan Pro
2001:678:76c:3760::31  Public Scan

URL: https://www.petervanderwoude.nl/post/even-easier-managing-local-administrators/
Submission: On February 23 via api from DE — Scanned from NL

Form analysis 5 forms found in the DOM

GET https://www.petervanderwoude.nl/

<form method="get" class="search-form navigation-search" action="https://www.petervanderwoude.nl/">
  <input type="search" class="search-field" value="" name="s" title="Search">
</form>

POST https://www.petervanderwoude.nl/wordpress/wp-comments-post.php

<form action="https://www.petervanderwoude.nl/wordpress/wp-comments-post.php" method="post" id="commentform" class="comment-form" novalidate="">
  <p class="comment-form-comment"><label for="comment" class="screen-reader-text">Comment</label><textarea id="comment" name="comment" cols="45" rows="8" required=""></textarea></p><label for="author" class="screen-reader-text">Name</label><input
    placeholder="Name *" id="author" name="author" type="text" value="" size="30" required="">
  <label for="email" class="screen-reader-text">Email</label><input placeholder="Email *" id="email" name="email" type="email" value="" size="30" required="">
  <label for="url" class="screen-reader-text">Website</label><input placeholder="Website" id="url" name="url" type="url" value="" size="30">
  <p class="comment-subscription-form"><input type="checkbox" name="subscribe_comments" id="subscribe_comments" value="subscribe" style="width: auto; -moz-appearance: checkbox; -webkit-appearance: checkbox;"> <label class="subscribe-label"
      id="subscribe-label" for="subscribe_comments">Notify me of follow-up comments by email.</label></p>
  <p class="comment-subscription-form"><input type="checkbox" name="subscribe_blog" id="subscribe_blog" value="subscribe" style="width: auto; -moz-appearance: checkbox; -webkit-appearance: checkbox;"> <label class="subscribe-label"
      id="subscribe-blog-label" for="subscribe_blog">Notify me of new posts by email.</label></p>
  <p class="form-submit"><input name="submit" type="submit" id="submit" class="submit" value="Post Comment"> <input type="hidden" name="comment_post_ID" value="16063" id="comment_post_ID">
    <input type="hidden" name="comment_parent" id="comment_parent" value="0">
  </p>
  <p style="display: none;"><input type="hidden" id="akismet_comment_nonce" name="akismet_comment_nonce" value="8019cd5c48"></p>
  <p style="display: none !important;"><label>Δ<textarea name="ak_hp_textarea" cols="45" rows="8" maxlength="100"></textarea></label><input type="hidden" id="ak_js_1" name="ak_js" value="1677182050553">
    <script>
      document.getElementById("ak_js_1").setAttribute("value", (new Date()).getTime());
    </script>
  </p>
</form>

POST #

<form action="#" method="post" accept-charset="utf-8" id="subscribe-blog-blog_subscription-3" data-blog="104754288" data-post_access_level="everybody">
  <div id="subscribe-text">
    <p>Provide your email address to subscribe to updates on this blog.</p>
  </div>
  <p id="subscribe-email">
    <label id="jetpack-subscribe-label" class="screen-reader-text" for="subscribe-field-blog_subscription-3"> Email address </label>
    <input type="email" name="email" required="required" value="" id="subscribe-field-blog_subscription-3" placeholder="Email address">
  </p>
  <p id="subscribe-submit">
    <input type="hidden" name="action" value="subscribe">
    <input type="hidden" name="source" value="https://www.petervanderwoude.nl/post/even-easier-managing-local-administrators/">
    <input type="hidden" name="sub-type" value="widget">
    <input type="hidden" name="redirect_fragment" value="subscribe-blog-blog_subscription-3">
    <button type="submit" class="wp-block-button__link" name="jetpack_subscriptions_widget"> Subscribe </button>
  </p>
</form>

<form id="jp-carousel-comment-form">
  <label for="jp-carousel-comment-form-comment-field" class="screen-reader-text">Write a Comment...</label>
  <textarea name="comment" class="jp-carousel-comment-form-field jp-carousel-comment-form-textarea" id="jp-carousel-comment-form-comment-field" placeholder="Write a Comment..."></textarea>
  <div id="jp-carousel-comment-form-submit-and-info-wrapper">
    <div id="jp-carousel-comment-form-commenting-as">
      <fieldset>
        <label for="jp-carousel-comment-form-email-field">Email (Required)</label>
        <input type="text" name="email" class="jp-carousel-comment-form-field jp-carousel-comment-form-text-field" id="jp-carousel-comment-form-email-field">
      </fieldset>
      <fieldset>
        <label for="jp-carousel-comment-form-author-field">Name (Required)</label>
        <input type="text" name="author" class="jp-carousel-comment-form-field jp-carousel-comment-form-text-field" id="jp-carousel-comment-form-author-field">
      </fieldset>
      <fieldset>
        <label for="jp-carousel-comment-form-url-field">Website</label>
        <input type="text" name="url" class="jp-carousel-comment-form-field jp-carousel-comment-form-text-field" id="jp-carousel-comment-form-url-field">
      </fieldset>
    </div>
    <input type="submit" name="submit" class="jp-carousel-comment-form-button" id="jp-carousel-comment-form-button-submit" value="Post Comment">
  </div>
</form>

POST

<form method="post">
  <input type="submit" value="Close and accept" class="accept">
</form>

Text Content

Skip to content

All about Microsoft Endpoint Manager

Peter blogs about Configuration Manager, Microsoft Intune and more


Menu
 * Home
 * Scripts
 * Archive
 * Contact
 * About
 * 
 * 
 * 
 * 
 * 


EVEN EASIER MANAGING LOCAL ADMINISTRATORS

February 7, 2022February 7, 2022 by Peter van der Woude

This week is back in the Windows platform. This week is another time about
managing local administrators on Windows 10 devices and later. That subject has
been discussed multiple times before – either by using custom device
configuration profiles or by using proactive remediations – and this time it’s
about a new configuration option within Microsoft Intune that provides a
friendly configuration experience for the IT administrator around the custom
device configuration profile option. That configuration relies on the
LocalUsersAndGroups policy that is available with Windows 10 20H2 or later, or
Windows 11. This blog post will provide an introduction to a new profile type
and will show how to use that new profile type to easily manage local
administrators. This blog post will end by showing the configuration results.

Important: This post relies on preview functionality and requires Windows 10
20H2 or later, or Windows 11.


INTRODUCING LOCAL USER GROUP MEMBERSHIP PROFILE

With the latest service release of Microsoft Intune (2201), a new profile for
account protection policies is introduced. That profile is the Local user group
membership profile and can be used to manage the memberships of built-in local
groups on Windows 10 and later devices. Basically, that profile is a friendly
user interface (UI) around the LocalUsersAndGroups policy. That policy was
introduced with Windows 10 20H2 and later and enables the IT administrator to
configure the membership of built-in local groups, as shown in this post about
managing local administrators. The UI does limit the configuration options a
little bit, but does provide the most common configuration options. The
following options are available (as shown below in Figure 1):

Figure 1: Available configuration options
 * Local group: This drop-down enables the IT administrator to select one or
   more groups that will be configured with the same configuration line. At this
   moment the following groups are available for configuration: Administrators,
   Users, Guests, Power Users, Remote Desktop Users and Remote Management Users.
 * Group and user action: This drop-down enables the IT administrator to select
   the action that will be applied to the selected groups. At this moment the
   following actions are available for configuration: Add (Update) to add
   members to the selected group, Remove (Update) to remove members from the
   selected group and Add (Replace) to replace the members of the selected
   group.
 * User selection type: This drop-down enables the IT administrator to select
   how to add users and groups to the selected groups. At this moment the
   following options are available: Users/Groups to select the users and groups
   that are available from Azure AD and Manual to manually specify users and
   groups that are available from Azure AD by specifying username,
   domain\username, or the groups security identifier (SID).
 * Selected users/groups: This selection enables the IT administrator to select,
   or specify, the users and groups that should be added to the selected groups.
   Depending on the previous choice, one of the following options is available:
   Select users/groups to select the users and groups that are available from
   Azure AD, or Add user(s) to manually specify users and groups that are
   available from Azure AD.

Important: As the local group membership profile relies on the
LocalUsersAndGroups policy, only a single policy (XML) can be applied to a
device. Multiple policies with result in a conflict.

Note: The Users user selection type is only supported for Azure AD joined
devices and the Manual user selection type is supported for Azure AD joined
devices and hybrid Azure AD joined devices.


CONFIGURING LOCAL USER GROUP MEMBERSHIP PROFILE

The local user group membership profile can be used to configure the membership
of the built-in local administrators group. And the configuration steps are
actually pretty straight forward. The following eight steps walk through the
process of adding an additional user and group to the built-in local
administrators group by simply selecting the required options.

 1. Open the Microsoft Endpoint Manager admin center portal navigate to Endpoint
    security > Account protection
 2. On the Endpoint security | Account protection blade, click Create Policy
 3. On the Create a profile page, provide the following information and
    click Create

 * Platform: Select Windows 10 and later as value
 * Profile: Select Local user group membership as value

 4. On the Basics page, provide a valid name for the local user group membership
    profile and click Next
 5. On the Configuration settings page, as shown below in Figure 2, provide the
    following information and click Next

Figure 2: Configuration overview for local administrators
 * Local group: Select Administrators to configure the membership of the
   administrators group
 * Group and user action: Select Add (Update) to update the membership of the
   administrators group
 * User selection type: Select Users/Groups to enable the easy selection of the
   new members
 * Selected users/groups: Click Select users/groups to open an additional blade
   to easily select the required new users and/or groups that should be member
   of the administrators group

 6. On the Scope tags page, configure the required scope tags and click Next
 7. On the Assignments page, add the required user/device group and click Next
 8. On the Review + create page, review the configuration and click Create

Note: Optionally use a filter to make sure to only target this new profile to
the minimal required Windows versions.


EXPERIENCING THE CONFIGURATION RESULT

Once the local user group membership profile has been applied, it’s time to have
a look at the configuration results. The easiest method to experience the
results of that configuration, is by having a look in the Event Viewer and
comparing that information with the members of the local administrators group.
The Event Viewer will show the applied configuration and its results (as shown
below on the left in Figure 3). That contains the XML configuration that’s
automatically created by using the new profile. The members of the local
administrators group will show the newly added members (as shown below on the
right in Figure 3).

Figure 3: Experiencing the configuration result

Important: At the moment of writing, there are still issues with using this new
profile on non-English Windows devices. For the latest status of that, keep an
eye on this Microsoft blog post.

Note: The other members of the local administrators group are the built-in
administrator, the primary user and the SIDs that are representing the Global
administrator role and the Device administrator role.


MORE INFORMATION

For more information about managing local administrators on Windows devices,
refer to the following docs.

 * Policy CSP – LocalUsersAndGroups – Windows Client Management | Microsoft Docs
 * Manage account protection settings with endpoint security policies in
   Microsoft Intune | Microsoft Docs
 * How to manage local administrators on Azure AD joined devices | Microsoft
   Docs


SHARE THIS:

 * Click to share on Twitter (Opens in new window)
 * Click to share on Facebook (Opens in new window)
 * Click to share on LinkedIn (Opens in new window)
 * Click to share on Reddit (Opens in new window)
 * 


RELATED

MANAGING LOCAL ADMINISTRATORS VIA WINDOWS 10 MDM

This week is all about managing local administrators via Windows 10 MDM by using
restricted groups. There has been many requests for a post like this after I
wrote this post about creating local user accounts. And I have to admit that
this post has been on my backlog for…

March 30, 2020

In "MDM"

EASIER MANAGING LOCAL ADMINISTRATORS VIA WINDOWS 10 MDM ON WINDOWS 10 20H2 AND
LATER

This week back to the Windows platform. This week is again about managing local
administrators on Windows 10 devices. Even in a modern world, there can still be
a need for managing the local administrators on a Windows 10 devices and often
that still requires more flexibility than provided with…

December 14, 2020

In "MDM"

MANAGING LOCAL POLICIES SECURITY OPTIONS FOR ACCOUNTS VIA WINDOWS 10 MDM

This blog post uses the LocalPoliciesSecurityOptions area of the Policy
configuration service provider (CSP) to manage local policies security options
on Windows 10 devices. This area was added in Windows 10, version 1709, which is
currently available as Insider Preview build. This week a blog post about
managing local policies…

September 11, 2017

In "ConfigMgr"

Categories Local user group membership policy, MDM, Microsoft Endpoint Manager,
Microsoft Intune, Windows 10, Windows 11 Tags Local user group membership
profile, MDM, Microsoft Endpoint Manager, Microsoft Intune, Windows 10, Windows
11
Retiring non-compliant devices with Azure Logic Apps and Adaptive Cards for
Teams
Getting started with the Windows Update for Business deployment service


24 THOUGHTS ON “EVEN EASIER MANAGING LOCAL ADMINISTRATORS”

 1.  Marcin
     February 8, 2022 at 00:10
     
     Hi Peter,
     as always great article. Have you got during the test an issue with
     assigning the group to any role?
     
     On one of my test tenants, I try to assign the group to local
     administrators and get error: “Please review policy.” and under the group
     information “The field for Selected user(s) is required. “. I test the
     scenario where I have only Intune role without any additional roles like
     GA, Security Admin etc. It’s like the wizard doesn’t select the group what
     I want to add
     
     Reply
     * Peter van der Woude
       February 14, 2022 at 21:19
       
       Hi Marcin,
       I personally didn’t have that issue, but I’ve read on the article
       mentioned earlier that others are seeing that issue.
       Regards, Peter
       
       Reply
       
     
 2.  Gerry Murphy
     February 8, 2022 at 13:34
     
     Peter,
     
     Great article with super detail, does this have the same effect as using
     Device Settings ‘manage additional local administrators’ but with more
     granular control and should I disable the Device Settings config after
     applying this policy.
     
     Thanks – Gerry
     
     Reply
     * Peter van der Woude
       February 14, 2022 at 21:23
       
       Hi Gerry,
       That setting basically configures device administrators role that applies
       to all devices. This configuration can be a bit more granular, and can
       also configure more than just administrators.
       Regards, Peter
       
       Reply
       
     
 3.  Ricoooo
     February 14, 2022 at 13:19
     
     Dear Peter,
     
     Thanks for this create article. But its not working when you select a group
     in step 5 Selected users/groups.
     When i select a group i get the following message:
     Please review policy. The field for Selected user(s) is required.
     
     If i only add some users than its works.
     
     Could you let me know if this i not working yet?
     
     Thank you.
     
     Greetings,
     Rico
     
     Reply
     * Peter van der Woude
       February 14, 2022 at 21:37
       
       Hi Ricoooo,
       See my earlier comment. Haven’t seen it myself, but I’ve read it on the
       earlier mentioned article.
       Regards, Peter
       
       Reply
       
     
 4.  Marcel Moerings
     February 25, 2022 at 13:02
     
     If you want the user to only be member of the local administrators group on
     their own device (so not on any other device that gets the policy) how
     would you do that? With a classic GPO we added the account INTERACTIVE to
     the Administrators group. Is that still an option for Intune Manage devices
     (no Hybrid Join, just a Azure AD join)?
     
     Reply
     * Peter van der Woude
       February 28, 2022 at 21:36
       
       Hi Marcel,
       That would require some custom scripting. Using the INTERACTIVE user is
       not really a solution, as it would apply to every user that is logged
       on..
       Regards, Peter
       
       Reply
       
     
 5.  Userman999
     March 16, 2022 at 00:59
     
     Hi Peter, thanks for the great post, very informative! One question, how do
     I use this functionality remove the current user from the Administrators
     group so they get converted to standard users? I have some systems
     configured before we rolled out autopilot that we need to modify. Thanks!
     
     Reply
     * Peter van der Woude
       March 21, 2022 at 21:02
       
       Hi Userman999,
       You could just replace the current members with a new set of members.
       Regards, Peter
       
       Reply
       * ikki
         May 31, 2022 at 14:22
         
         Hi Peter,
         
         I would like to change primary users to standard user and make our IT’s
         as local admins/admin to prevent our user to install softwares.
         
         So which option do you have to select, remove (update) or select add
         (replace)?
         
         Thanks,
         
         Reply
         * Peter van der Woude
           June 6, 2022 at 20:27
           
           Hi ikki,
           In that case I would probably use Add (Replace), to simply replace
           anything that was configured.
           Regards, Peter
           
           Reply
           
         
       
     
 6.  Ido Yavin
     March 24, 2022 at 14:23
     
     Hej Peter, thank you for this article. I tried it but I kept on getting an
     error “No mapping between account names and security IDs was done” actually
     i got 3 different errors i the log that looks very much like described in
     this blog:
     https://www.anoopcnair.com/manage-local-admins-using-intune-group-mgmt/
     
     All my devices are registered i only in AAD (no hybrid) and I was trying to
     add an AAD group to the local administrators group.
     I think that the reason for the error was because I am using a ‘Danish
     talking’ system… ‘Administrators’ are called ‘administratorer’ in danish… I
     tried therefor to use the OMA-URI version (thank you for that article as
     well! ) where I used the SID of the administrators group instead, and it
     worked. I think though that there has been a little error in your article:
     https://www.petervanderwoude.nl/post/easier-managing-local-administrators-via-windows-10-mdm-on-windows-10-20h2-and-later/
     You mentioned the string:
     ./Vendor/MSFT/Policy/Config/LocalUsersAndGroups/Configure and it didn’t
     work for me. Kept getting errors. I changed it to:
     ./Device/Vendor/MSFT/Policy/Config/LocalUsersAndGroups/Configure – and i
     worked.
     
     Besides, when i tried to use the policy described here (under account
     protection). I got other problems when i tried to add the groups. kept on
     getting errors in the graphic interface… I think this policy is not working
     as i should… Something is wrong with it I am afraid..
     
     best regards, Ido Yavin
     
     Reply
     * Peter van der Woude
       March 28, 2022 at 20:34
       
       Thank you for the information Ido. It’s indeed correct that some methods
       don’t handle different languages that well yet..
       Regards, Peter
       
       Reply
       
     
 7.  Kevin Bishop
     April 8, 2022 at 22:46
     
     Any reason the groups populate as the SID and not the resolved name. Mine
     is applying the policy, the SID shows up, but it still seems like it didn’t
     give that group admin rights. I’m still troubleshooting but was wondering
     if you had thoughts.
     
     Reply
     * Peter van der Woude
       April 11, 2022 at 20:18
       
       Hi Kevin,
       The permissions are not immediately applicable in all scenarios. For
       example a user that is already logged on, and is added to the group,
       won’t immediately recieve local admin permissions.
       Regards, Peter
       
       Reply
       
     
 8.  Teun
     April 13, 2022 at 15:53
     
     Is the issue with non-english devices already resolved?
     
     Reply
     * Peter van der Woude
       April 18, 2022 at 20:31
       
       Hi Teun,
       I haven’t recently tried that. What are your latest results?
       Regards, Peter
       
       Reply
       
     
 9.  Thomas
     June 10, 2022 at 03:46
     
     Hey Peter,
     
     Does the policy update after it’s applied? For instance, we would like to
     use a Azure group to allow LocalAdmin access temporarily, then removing the
     users when they no longer need access. (Not elegant, certainly, but for
     lack of a better solution, that’s what we have.) Would the endpoint policy
     update on the next check-in and remove their permissions?
     
     Reply
     * Peter van der Woude
       June 13, 2022 at 20:16
       
       Hi Thomas,
       My experience with using an Azure AD group is very wonky. This policy
       will only configure the Azure AD group as a member of the local
       administrators. An update of that policy will not help with the
       permissions of the users of that group.
       Regards, Peter
       
       Reply
       
     
 10. Antonio
     September 10, 2022 at 04:48
     
     Hello everyone,
     
     I’ve set my policy to Remove the user who joined the device in Azure AD
     from the admin group so that they don’t have local admin permissions and in
     Intune I see the policy status as OK, even when I go to view the admin
     group in my devices, I no longer see the user I deleted with my policy,
     i.e. the user who enrolled the device should no longer have local admin
     permissions, is that correct? However, it still has the permissions and
     they are only changed when I log out or restart the device. Is this normal
     behavior? Will it only work after reboot or logout?
     
     Reply
     * Peter van der Woude
       September 12, 2022 at 22:04
       
       Hi Antonio,
       There indeed might be a delay in the permissions getting effective.
       Regards, Peter
       
       Reply
       
     
 11. Richmond
     November 21, 2022 at 11:42
     
     Does this settings take precedence if I am on Azure Hybrid Join and my MDM
     is WorkSpace ONE? We are having issue removing administrator with WS1 and
     want to remove users who are local admin on their machines at the moment?
     
     Will this sold our problem?
     
     Reply
     * Peter van der Woude
       November 21, 2022 at 21:27
       
       Hi Richmond,
       That’s hard for me to judge, as I don’t know much about WS1. I do know
       that this setting is based on a CSP, which means that you can also
       address that by using another MDM (like WS1). Besides that, I can also
       imagine that an on-premise GPO would overwrite that information.
       Regards, Peter
       
       Reply
       
     


LEAVE A COMMENT CANCEL REPLY

Comment

Name Email Website

Notify me of follow-up comments by email.

Notify me of new posts by email.





Δ

This site uses Akismet to reduce spam. Learn how your comment data is processed.


AWARD




SUBSCRIBE TO UPDATES

Provide your email address to subscribe to updates on this blog.

Email address

Subscribe

Join 958 other subscribers


ABOUT

I’m Peter van der Woude, born in 1983 and I’m living together with my wife and
two sons in the Netherlands.

I work as a Principal Consultant at InSpark and my main focus is helping
customers in their road to a modern workplace (using Microsoft Endpoint
Manager).


ADVERTISEMENTS



Peter van der Woude Follow

Enterprise Mobility #MVP | #WIMVP | Modern management @we_are_inspark |
#MSIntune #MEM #MEMpowered | Proud father of TJ and LJ | Happily married with
Marjolein


Peter van der Woude @pvanderwoude ·
9 Feb


Are you looking at informing users of newly enrolled devices, by using
#MSIntune? If so, have a look at my latest blog post!

Peter van der Woude @pvanderwoude

New blog post: Informing users of newly enrolled devices
https://www.petervanderwoude.nl/post/informing-users-of-newly-enrolled-devices/
#MSIntune #Intune #EMS #MDM #MEM #MEMpowered #Windows10 #Windows11 #Android #iOS
#MacOS #EnrollmentNotifications

Reply on Twitter 1623582566845390848 Retweet on Twitter 1623582566845390848 2
Like on Twitter 1623582566845390848 5 Twitter 1623582566845390848
Retweet on Twitter Peter van der Woude Retweeted
Windows @windows ·
7 Feb


Bada Bing Bada BOOM https://twitter.com/bing/status/1623033856419893286

Bing @bing

Today we’re reinventing how the world interacts with the web, starting with the
tools billions of people use every day — the search engine and the browser.
Introducing the new Bing: https://msft.it/60155zRNt

Reply on Twitter 1623036477251719227 Retweet on Twitter 1623036477251719227 24
Like on Twitter 1623036477251719227 199 Twitter 1623036477251719227
Peter van der Woude @pvanderwoude ·
7 Feb


There's not much that makes me uncomfortable, but this does... Please tell me
that nobody want this...

Marjolein van der Woude-Dijk @MarjoleinDijk

So, for all the fans of @pvanderwoude : we made a sticker He says no one will
want it, I beg to differ So for all the F.O.P. out there, prove him wrong

#FOP #FanOfPeter #MicrosoftMVP

Reply on Twitter 1622984493274484742 Retweet on Twitter 1622984493274484742 1
Like on Twitter 1622984493274484742 26 Twitter 1622984493274484742
Retweet on Twitter Peter van der Woude Retweeted
Jamie Knowles @stuffygibbon ·
7 Feb


Informing users of newly enrolled devices
https://www.petervanderwoude.nl/post/informing-users-of-newl... via
@pvanderwoude

Reply on Twitter 1622887871437840384 Retweet on Twitter 1622887871437840384 3
Like on Twitter 1622887871437840384 5 Twitter 1622887871437840384
Retweet on Twitter Peter van der Woude Retweeted
Dieter Rauscher @dieter_rauscher ·
6 Feb


Very useful #Microsoft #Intune feature: „Set up enrollment notifications“

https://learn.microsoft.com/en-us/mem/intune/enrollment/enro...

See also the great article from @pvanderwoude on that topic:
https://www.petervanderwoude.nl/post/informing-users-of-newl...

Reply on Twitter 1622677335660015618 Retweet on Twitter 1622677335660015618 5
Like on Twitter 1622677335660015618 6 Twitter 1622677335660015618
Load More


RECENT POSTS

 * Configuring search on Windows 11 taskbar
 * Using Smart App Control as starting point for Windows Defender Application
   Control
 * Informing users of newly enrolled devices
 * Managing privacy controls for Office products
 * Getting started with multiple administrative approvals


TAGS

ADFS Android Android Enterprise App Configuration Policies Applications Azure AD
Co-management Collections Company Portal Compliance Policy Compliance Settings
Conditional Access ConfigMgr ConfigMgr 1511 ConfigMgr 2007 ConfigMgr 2012
Configuration Baseline Configuration Policy Device Compliance Device
configuration Intune Management Extension iOS ipadOS MAM-WE MDM MEM Microsoft
Defender for Endpoint Microsoft Endpoint Manager Microsoft Graph REST API
Microsoft Intune Microsoft Tunnel Microsoft Tunnel Gateway MVP OMA-DM OMA-URI
Powershell SCCM Software Updates Task Sequence USMT 4.0 Win32 app Windows 10
Windows 11 Windows AutoPilot Windows Phone 8.1


CALENDAR

February 2023 S M T W T F S  1234 567891011 12131415161718 19202122232425 262728
 

« Jan    
© 2009 - 2023 PETER VAN DER WOUDE

 

Loading Comments...

 

Write a Comment...
Email (Required) Name (Required) Website


petervanderwoude.nl uses cookies to ensure that it provides you the best
experience on this blog. By continuing to use this blog, you agree to their use.
To find out more, including how to control cookies, see here: Cookie policy