Edit

Tutorial: Set up cloud-native Windows endpoints with Microsoft Intune

This step-by-step tutorial shows you how to set up a cloud-native Windows endpoint using Microsoft Intune and Windows Autopilot. A cloud-native Windows endpoint (sometimes written as cloud native Windows) is Microsoft Entra joined, enrolled in Microsoft Intune, and managed entirely from the cloud — no Active Directory domain join, no on-premises infrastructure required.

By the end of this tutorial, you have a fully configured Windows device that's:

  • Microsoft Entra joined and enrolled in Microsoft Intune
  • Secured with Microsoft Defender Antivirus, BitLocker encryption, Windows LAPS, and security baselines
  • Provisioned through Windows Autopilot with Microsoft 365 apps, OneDrive Known Folder Move, and the Company Portal
  • Ready to scale to the rest of your Windows fleet

For background, see What are cloud-native endpoints? and How to plan your Microsoft Entra join implementation.

Tip

When reading about cloud native endpoints, you see the following terms:

  • Endpoint: An endpoint is a device, like a mobile phone, tablet, laptop, or desktop computer. "Endpoints" and "devices" are used interchangeably.
  • Managed endpoints: Endpoints that receive policies from the organization using an MDM solution or Group Policy Objects. These devices are typically organization owned, but can also be BYOD or personally owned devices.
  • Cloud native endpoints: Endpoints that are joined to Microsoft Entra. They aren't joined to on-premises AD.
  • Workload: Any program, service, or process.

How to get started

Complete the five phases in order — each builds on the previous one.

Five phases for setting up cloud-native Windows endpoints using Microsoft Intune and Windows Autopilot.

Phase Goal
Phase 1 – Set up your environment Prepare your tenant, test device, and baseline Autopilot policies
Phase 2 – Build a cloud-native Windows endpoint Provision your first endpoint through Autopilot
Phase 3 – Secure your cloud-native Windows endpoint Apply endpoint security: Defender, BitLocker, LAPS, baselines, updates
Phase 4 – Apply customizations and review your on-premises configuration Add organization-specific apps, settings, and migrate from Group Policy
Phase 5 – Scale your deployment with Windows Autopilot Scale provisioning to your fleet using OEM registration, personas, and rollout rings

After your endpoints are deployed, use the Monitor your cloud-native Windows endpoints section to validate policy, app, and compliance status from the Intune admin center as part of ongoing operations.

Phase 1 – Set up your environment

Before you build your first cloud-native Windows endpoint, there are some key requirements and configuration that need to be checked. This phase walks you through checking the requirements, configuring Windows Autopilot, and creating some settings and applications.

Step 1 - Network requirements

Your cloud-native Windows endpoint needs access to several internet services. Start your testing on an open network. Or, use your corporate network after providing access to all the endpoints that are listed at Windows Autopilot networking requirements.

If your wireless network requires certificates, you can start with an Ethernet connection during testing while you determine the best approach for wireless connections for device provisioning.

Step 2 - Enrollment and Licensing

Before you can join Microsoft Entra and enroll in Intune, there are a few things you need to check. You could create a new Microsoft Entra group, such as the name Intune MDM Users. Then, add specific test user accounts and target each of the following configurations at that group to limit who can enroll devices while you set up your configuration. To create a Microsoft Entra group, go to Manage Microsoft Entra groups and group membership.

  • Enrollment restrictions Enrollment restrictions allow you to control what types of devices can enroll into management with Intune. For this guide to be successful, make sure Windows (MDM) enrollment is allowed, which is the default configuration.

    For information on configuring Enrollment Restrictions, go to Set enrollment restrictions in Microsoft Intune.

  • Microsoft Entra Device MDM settings When you join a Windows device to Microsoft Entra, Microsoft Entra can be configured to tell your devices to automatically enroll with an MDM. This configuration is required for Windows Autopilot to work.

    To check your Microsoft Entra Device MDM settings are enabled properly, go to Quickstart - Set up automatic enrollment in Intune.

  • Microsoft Entra company branding Adding your corporate logo and images to Microsoft Entra ensures that users see a familiar and consistent look-and-feel when they sign-in to Microsoft 365. This configuration is required for Windows Autopilot to work.

    For information on configuring custom branding in Microsoft Entra, go to Add branding to your organization's Microsoft Entra sign-in page.

  • Licensing Users enrolling Windows devices from the Out Of Box Experience (OOBE) into Intune require two key capabilities.

    Users require the following licenses:

    • A Microsoft Intune or Microsoft Intune for Education license
    • A license like one of the following options that allows for automatic MDM enrollment:
      • Microsoft Entra Premium P1
      • Microsoft Intune for Education

    To assign licenses, go to Assign Microsoft Intune licenses.

    Note

    Both types of licenses are typically included with licensing bundles, like Microsoft 365 E3 (or A3) and higher. View comparisons of Microsoft 365 licensing here.

Step 3 - Import your test device

To test the cloud-native Windows endpoint, we need to start by getting a virtual machine or physical device ready for testing. The following steps get the device details and upload them into the Windows Autopilot service, which are used later in this article.

Note

While the following steps provide a way to import a device for testing, Partners and OEMs can import devices into Windows Autopilot on your behalf as part of purchasing. There's more information about Windows Autopilot in Phase 5.

  1. Install Windows in a virtual machine or reset a physical device so that it's waiting at the OOBE setup screen. For a virtual machine, you can optionally create a checkpoint.

  2. Complete the necessary steps to connect to the Internet.

  3. Open a command prompt by using the Shift + F10 keyboard combination.

  4. Verify that you have internet access by pinging bing.com:

    • ping bing.com
  5. Switch into PowerShell by running the command:

    • powershell.exe
  6. Download the Get-WindowsAutopilotInfo script by running the following commands:

    • Set-ExecutionPolicy -ExecutionPolicy Bypass -Scope Process
    • Install-Script Get-WindowsAutopilotInfo
  7. When prompted, enter Y to accept.

  8. Type the following command:

    • Get-WindowsAutopilotInfo.ps1 -GroupTag CloudNative -Online

    Note

    Group Tags allow you to create dynamic Microsoft Entra groups based on a subset of devices. Group Tags can be set when importing devices or changed later in the Microsoft Intune admin center. We use the Group Tag CloudNative in Step 4. You can set the tag name to something different for your testing.

  9. When prompted for credentials, sign in with your Intune Administrator account.

  10. Leave the computer at the out of box experience until Phase 2.

Step 4 - Create Microsoft Entra dynamic group for the device

To limit the configurations from this guide to the test devices that you import to Windows Autopilot, create a dynamic Microsoft Entra group. This group should automatically include the devices that import to Windows Autopilot and have the Group Tag CloudNative. You can then target all your configurations and applications at this group.

  1. Open the Microsoft Intune admin center.

  2. Select Groups > New group. Enter the following details:

    • Group type: Select Security.
    • Group Name: Enter Autopilot Cloud-Native Windows Endpoints.
    • Membership type: Select Dynamic Device.
  3. Select Add dynamic query.

  4. In the Rule Syntax section, select Edit.

  5. Paste the following text:

    (device.devicePhysicalIds -any (_ -eq "[OrderID]:CloudNative"))

  6. Select OK > Save > Create.

Tip

Dynamic groups take a few minutes to populate after changes occur. In large organizations, it can take longer. After creating a new group, wait a few minutes before you check to confirm the device is now a member of the group.

For more information about dynamic groups for devices, go to Rules for devices.

Step 5 - Configure the Enrollment Status Page

The enrollment status page (ESP) is the mechanism an IT pro uses to control the end-user experience during endpoint provisioning. See Set up the Enrollment Status Page. To limit the scope of the enrollment status page, you can create a new profile and target the Autopilot Cloud-Native Windows Endpoints group created in the previous step, Create Microsoft Entra dynamic group for the device.

  • For the purposes of testing, we recommend the following settings, but feel free to adjust them as required:

    Setting Value
    Show app and profile configuration progress Yes
    Only show page to devices provisioned by out-of-box experience (OOBE) Yes (default)

Step 6 - Create and assign the Windows Autopilot profile

Now we can create the Windows Autopilot profile and assign it to our test device. This profile tells your device to join Microsoft Entra and what settings to apply during OOBE.

  1. Open the Microsoft Intune admin center.

  2. Select Devices > Device onboarding > Enrollment > Windows > Windows Autopilot > Deployment profiles.

  3. Select Create profile > Windows PC.

  4. Enter the name Autopilot Cloud-Native Windows Endpoints, and then select Next.

  5. In the Out-of-box experience (OOBE) settings, confirm the following key values and select Next:

    Setting Value
    Deployment mode User-driven
    Join to Microsoft Entra ID as Microsoft Entra joined
    User account type Standard
    Apply device name template Optional. A naming template like CloudPC-%SERIAL% makes devices easy to identify in the admin center.

    Important

    Setting User account type to Standard is a security best practice. It prevents users from installing unapproved software and reduces the attack surface on cloud-native endpoints.

  6. Leave the scope tags and select Next.

  7. Assign the profile to the Microsoft Entra group you created called Autopilot Cloud-Native Windows Endpoints, select Next, and then select Create.

Step 7 - Sync Windows Autopilot devices

The Windows Autopilot service synchronizes several times a day. You can also trigger a sync immediately so that your device is ready to test. To synchronize immediately:

  1. Open the Microsoft Intune admin center.

  2. Select Devices > Device onboarding > Enrollment > Windows > Windows Autopilot > Devices.

  3. Select Sync.

The sync takes several minutes and continues in the background. When the sync is complete, the profile status for the imported device displays Assigned.

Step 8 - Configure settings for an optimal Microsoft 365 experience

We've selected a few settings to configure. These settings demonstrate an optimal Microsoft 365 end-user experience on your Windows cloud-native device. These settings are configured using a device configuration settings catalog profile. For more information, go to Create a policy using the settings catalog in Microsoft Intune.

After you created the profile and added your settings, assign the profile to the Autopilot Cloud-Native Windows Endpoints group created previously.

  • Microsoft Outlook - To improve the first run experience for Microsoft Outlook, the following setting automatically configures a profile when Outlook is opened for the first time.

    Setting category Setting Value
    Microsoft Outlook 2016\Account Settings\Exchange (User setting) Automatically configure only the first profile based on Active Directory primary SMTP address Enabled
  • Microsoft Edge - To improve the first run experience for Microsoft Edge, the following settings configure Microsoft Edge to sync the user's settings and skip the first run experience.

    Setting category Setting Value
    Microsoft Edge Hide the first-run experience and splash screen Enabled
      Force synchronization of browser data and do not show the sync consent prompt Enabled
  • Microsoft OneDrive - To improve the first sign-in experience, the following settings configure Microsoft OneDrive to automatically sign in and redirect Desktop, Pictures, and Documents to OneDrive. Files On-Demand (FOD) is also recommended. It's enabled by default and isn't included in the following list. For more information on the recommended configuration for the OneDrive sync app, go to Recommended sync app configuration for Microsoft OneDrive.

    Setting category Setting Value
    OneDrive Silently sign in users to the OneDrive sync app with their Windows credentials Enabled
      Silently move Windows known folders to OneDrive Enabled

    Note

    For more information, go to Redirect Known Folders.

The following screenshot shows an example of a settings catalog profile with each of the suggested settings configured:

Screenshot that shows an example of a settings catalog profile in Microsoft Intune.

Step 9 - Create and assign some applications

Your cloud-native endpoint needs some applications. To get started, we recommend configuring the following applications and targeting them at the Autopilot Cloud-Native Windows Endpoints group created previously.

  • Microsoft 365 Apps (formerly Office 365 ProPlus) - Microsoft 365 Apps such as Word, Excel, and Outlook can easily be deployed to devices using the built-in Microsoft 365 apps for Windows app profile in Intune.

    • Select configuration designer for the settings format, as opposed to XML.
    • Select Current Channel for the update channel.

    To deploy Microsoft 365 Apps, go to Add Microsoft 365 apps to Windows devices using Microsoft Intune

  • Company Portal app - Deploying the Intune Company Portal app to all devices as a required application is recommended. Company Portal app is the self-service hub for users that they use to install applications from multiple sources, like Intune, Microsoft Store, and Configuration Manager. Users also use the Company Portal app to sync their device with Intune, check compliance status, and so on.

    To deploy Company Portal as required, see Add and assign the Windows Company Portal app for Intune managed devices.

  • Microsoft Store App (Whiteboard) - While Intune can deploy a wide variety of apps, we deploy a store app (Microsoft Whiteboard) to help keep things simple for this guide. Follow the steps in Add Microsoft Store apps to Microsoft Intune to install Microsoft Whiteboard.

Phase 2 – Build a cloud-native Windows endpoint

To build your first cloud-native Windows endpoint, use the same virtual machine or physical device that you gathered and then uploaded the hardware hash to the Windows Autopilot service in Phase 1, Step 3 - Import your test device. With this device, go through the Windows Autopilot process.

  1. Resume (or reset if necessary) your Windows PC to the Out of Box Experience (OOBE).

    Note

    If you're prompted to choose setup for personal or an organization, then the Windows Autopilot process didn't start. In that situation, restart the device and ensure it has internet access. If it still doesn't work, try resetting the PC or reinstalling Windows.

  2. Sign in with Microsoft Entra credentials (UPN or AzureAD\username).

  3. The enrollment status page shows the status of the device configuration.

Congratulations! You provisioned your first cloud-native Windows endpoint!

Validate your endpoint

Verify the following tasks on your new device before moving to Phase 3:

  • OneDrive folders (Desktop, Documents, Pictures) are redirected and syncing.
  • Outlook opens and auto-configures your Microsoft 365 profile.
  • Company Portal is installed and Microsoft Whiteboard is available.
  • You can sign in with your Microsoft Entra credentials and access cloud resources.
  • On-premises resources (file shares, intranet sites, printers) are accessible if required.

If you're prompted to enter a password when using Windows Hello to access on-premises resources, Windows Hello for Business Hybrid isn't configured yet. You can continue testing by selecting the key icon on the sign-in screen and using your username and password instead. For more information, see Windows Hello for Business Hybrid.

Phase 3 – Secure your cloud-native Windows endpoint

This phase is designed to help you build out security settings for your organization. This section draws your attention to the various Endpoint Security components in Microsoft Intune including:

Microsoft Defender Antivirus (MDAV)

The following settings are recommended as a minimum configuration for Microsoft Defender Antivirus, a built-in OS component of Windows. These settings don't require any specific licensing agreement such as E3 or E5, and can be enabled in the Microsoft Intune admin center.

In the admin center, go to Endpoint Security > Antivirus > Create Policy > Windows and later > Profile type = Microsoft Defender Antivirus.

Defender:

  • Allow Behavior Monitoring: Allowed. Turns on real-time behavior monitoring.
  • Allow Cloud Protection: Allowed. Turns on Cloud Protection.
  • Allow Email Scanning: Allowed. Turns on email scanning.
  • Allow scanning of all downloaded files and attachments: Allowed.
  • Allow Realtime Monitoring: Allowed. Turns on and runs the real-time monitoring service.
  • Allow Scanning Network Files: Allowed. Scans network files.
  • Allow Script Scanning: Allowed.
  • Cloud Extended Timeout: 50
  • Days To Retain Cleaned Malware: 30
  • Enable Network Protection: Enabled (audit mode)
  • PUA Protection: PUA Protection on. Detected items are blocked. They will show in history along with other threats.
  • Real Time Scan Direction: Monitor all files (bi-directional).
  • Submit Samples Consent: Send safe samples automatically.
  • Allow On Access Protection: Allowed.
  • Remediation action for Severe threats: Quarantine. Moves files to quarantine.
  • Remediation action for Low severity threat: Quarantine. Moves files to quarantine.
  • Remediation action for Moderate severity threats: Quarantine. Moves files to quarantine.
  • Remediation action for High severity threats: Quarantine. Moves files to quarantine.

For more information on Windows Defender configuration, including Microsoft Defender for Endpoint for customer's licensed for E3 and E5, go to:

Microsoft Defender Firewall

Use Endpoint Security in Microsoft Intune to configure the firewall and firewall rules. For more information, go to Firewall policy for endpoint security in Intune.

Microsoft Defender Firewall can detect a trusted network using the NetworkListManager CSP. And, it can switch to the domain firewall profile on endpoints running Windows.

Using the domain network profile allows you to separate firewall rules based on a trusted network, a private network, and a public network. These settings can be applied using a Windows custom profile.

Note

Microsoft Entra joined endpoints can't use LDAP to detect a domain connection in the same way that domain-joined endpoints do. Instead, use the NetworkListManager CSP to specify a TLS endpoint that when accessible, switches the endpoint to the domain firewall profile.

BitLocker Encryption

Use Endpoint Security in Microsoft Intune to configure encryption with BitLocker.

These settings can be enabled in the Microsoft Intune admin center. In the admin center, go to Endpoint Security > Manage > Disk encryption > Create Policy > Windows and later > Profile = BitLocker.

When you configure the following BitLocker settings, they silently enable 128-bit encryption for standard users, which is a common scenario. However, your organization might have different security requirements, so use the BitLocker documentation for more settings.

Setting category Setting Value
BitLocker Require Device Encryption Enabled
  Allow Warning For Other Disk Encryption Disabled
  Allow Standard User Encryption Enabled
  Configure Recovery Password Rotation Refresh on for Azure AD-joined devices
BitLocker Drive Encryption Choose drive encryption method and cipher strength Not Configured
  Provide the unique identifiers for your organization Not Configured
Operating System Drives Enforce drive encryption type on operating system drives Enabled
  Select the encryption type (Device) Used Space Only encryption
  Require additional authentication at startup Enabled
  Allow BitLocker without a compatible TPM (requires a password or a startup key on a USB flash drive) False
  Configure TPM startup key and PIN Allow startup key and PIN with TPM
  Configure TPM startup key Allow startup key with TPM
  Configure TPM startup PIN Allow startup PIN with TPM
  Configure TPM startup Require TPM
  Configure minimum PIN length for startup Not configured
  Allow enhanced PINs for startup Not configured
  Disallow standard users from changing the PIN or password Not configured
  Allow devices compliant with InstantGo or HSTI to opt out of pre-boot PIN Not configured
  Enable use of BitLocker authentication requiring preboot keyboard input on slates Not configured
  Choose how BitLocker-protected operating system drives can be recovered Enabled
  Configure user storage of BitLocker recovery information Require 48-digit recovery password
  Allow data recovery agent False
  Configure storage of BitLocker recovery information to AD DS Store recovery passwords and key packages
  Do not enable BitLocker until recovery information is stored to AD DS for operating system drives True
  Omit recovery options from the BitLocker setup wizard True
  Save BitLocker recovery information to AD DS for operating system drives True
  Configure pre-boot recovery message and URL Not configured
Fixed Data Drives Enforce drive encryption type on fixed data drives Enabled
  Select the encryption type: (Device) Allow user to choose (default)
  Choose how BitLocker-protected fixed drives can be recovered Enabled
  Configure user storage of BitLocker recovery information Require 48-digit recovery password
  Allow data recovery agent False
  Configure storage of BitLocker recovery information to AD DS Backup recovery passwords and key packages
  Do not enable BitLocker until recovery information is stored to AD DS for fixed data drives True
  Omit recovery options from the BitLocker setup wizard True
  Save BitLocker recovery information to AD DS for fixed data drives True
  Deny write access to fixed drives not protected by BitLocker Not configured
Removable Data Drives Control use of BitLocker on removable drives Enabled
  Allow users to apply BitLocker protection on removable data drives (Device) False
  Allow users to suspend and decrypt BitLocker protection on removable data drives (Device) False
  Deny write access to removable drives not protected by BitLocker Not configured

Windows Local Administrator Password Solution (LAPS)

By default, the built-in local administrator account (well known SID S-1-5-500) is disabled. There are some scenarios where a local administrator account can be beneficial, such as troubleshooting, end-user support, and device recovery. If you decide to enable the built-in administrator account, or create a new local administrator account, it's important to secure the password for that account.

Windows Local Administrator Password Solution (LAPS) is one of the features you can use to randomize and securely store the password in Microsoft Entra. If you're using Intune as your MDM service, then use the following steps to enable Windows LAPS.

Important

Windows LAPS assumes that the default local administrator account is enabled, even if it's renamed or if you create another local admin account. Windows LAPS doesn't create or enable any local accounts for you unless you configure Automatic account management mode.

You need to create or enable any local accounts separately from configuring Windows LAPS. You can script this task or use the Configuration Service Providers (CSPs), such as the Accounts CSP or Policy CSP.

  1. Make sure your Windows devices have the April 2023 (or later) security update installed.

    For more information, go to Microsoft Entra operating system updates.

  2. Enable Windows LAPS in Microsoft Entra:

    1. Sign in to Microsoft Entra.
    2. For the Enable Local Administrator Password Solution (LAPS) setting, select Yes > Save (top of the page).

    For more information, go to Enabling Windows LAPS with Microsoft Entra.

  3. In Intune, create an endpoint security policy:

    1. Sign in to the Microsoft Intune admin center.
    2. Select Endpoint Security > Account Protection > Create Policy > Windows > Local admin password solution (Windows LAPS) > Create.

    For more information, go to Create a LAPS policy in Intune.

Security Baselines

You can use security baselines to apply a set of configurations that are known to increase the security of a Windows endpoint. For more information about security baselines, go to Windows MDM security baseline settings for Intune.

Baselines can be applied using the suggested settings and customized as per your requirements. Some settings within baselines might cause unexpected results or be incompatible with apps and services running on your Windows endpoints. As a result, baselines should be tested in isolation. Only apply the baseline to a selective group of test endpoints without any other configuration profiles or settings.

Security Baselines Known Issues

The following settings in the Windows security baseline can cause issues with Windows Autopilot or attempting to install apps as a standard user:

  • Local Policies Security Options\Administrator elevation prompt behavior (default = Prompt for consent on the secure desktop)
  • Standard user elevation prompt behavior (default = Automatically deny elevation requests)

For more information, see Troubleshooting policy conflicts with Windows Autopilot.

Windows Update client policies

Windows Update client policies is the cloud technology for controlling how and when updates are installed on devices. In Intune, Windows Update client policies can be configured using:

For more information, go to:

Tip

For cloud-native environments, consider Windows Autopatch. Autopatch automates update ring management and reporting, removing the need to manually tune deferral periods and deadlines. It's included with Microsoft Intune and is the recommended approach for organizations that want fully automated, policy-driven Windows updates with minimal admin overhead.

Compliance policy

A compliance policy reports on the health of your cloud-native Windows endpoints — for example, whether BitLocker is enabled, Secure Boot is on, and Microsoft Defender Antivirus is running. The policy is also the foundation for Conditional Access, so you can block noncompliant devices from accessing organization resources.

To create a Windows compliance policy:

  1. Sign in to the Microsoft Intune admin center.

  2. Select Devices > Compliance > Create policy.

  3. For Platform, select Windows 10 and later > Create.

  4. In Basics, enter a name for the policy and select Next.

  5. In Compliance settings, configure the following recommended values and select Next:

    Setting category Setting Value
    Device Health Require BitLocker Require
      Require Secure Boot to be enabled on the device Require
      Require code integrity Require
    System Security Firewall Require
      Antivirus Require
      Antispyware Require
      Require a password to unlock mobile devices Require
      Simple passwords Block
      Password type Alphanumeric
      Minimum password length 14
      Maximum minutes of inactivity before password is required 1 Minute
      Password expiration (days) 365
      Number of previous passwords to prevent reuse 5
    Defender Microsoft Defender Antimalware Require
      Microsoft Defender Antimalware security intelligence up-to-date Require
      Real-time protection Require

    Tip

    Microsoft and current NIST guidance no longer recommend periodic password expiration. The Windows security baseline removed password expiration in 2019. For cloud-native endpoints, the strongest posture is to move users to passwordless sign-in with Windows Hello for Business and passkeys / FIDO2 security keys, and to block weak passwords with Microsoft Entra Password Protection. Adjust the values above to match your organization's policy. To learn more, see Passwordless authentication with Microsoft Intune.

  6. In Actions for noncompliance, set the Mark device noncompliant schedule to 1 day (or another grace period that suits your organization).

    Tip

    If you use Conditional Access, configure a grace period so noncompliant devices don't immediately lose access to organization resources. You can also add an action to email users with steps to get compliant.

  7. Assign the policy to the Autopilot Cloud-Native Windows Endpoints group from Step 4 - Create Microsoft Entra dynamic group for the device.

For more information on Windows compliance settings, see Windows device compliance settings in Microsoft Intune.

Conditional Access

Conditional Access in Microsoft Entra uses compliance signal from Intune to allow or block access to organization resources. The most common cloud-native pattern is require a compliant device for Microsoft 365 apps and other cloud services. This pattern ensures only Intune-managed, healthy devices can access your data.

A typical cloud-native Conditional Access baseline includes:

  • Require multifactor authentication for all users.
  • Require a compliant device (or hybrid Microsoft Entra joined device) for cloud apps.
  • Block legacy authentication protocols.

Important

Test Conditional Access policies on a pilot group first. A misconfigured policy can lock administrators out of the Microsoft Entra admin center.

For step-by-step guidance, see:

Phase 4 – Apply customizations and review your on-premises configuration

In this phase, you apply organization-specific settings, apps, and review your on-premises configuration. The phase helps you build any customizations specific to your organization. Notice the various components of Windows, how you can review existing configurations from an on-premises AD Group Policy environment, and apply them to cloud-native endpoints. There are sections for each of the following areas:

Microsoft Edge

Microsoft Edge Deployment

Microsoft Edge is included on devices that run:

  • Windows

After users sign in, Microsoft Edge updates automatically. To trigger an update for Microsoft Edge during deployment, you can run the following command:

Start-Process -FilePath "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" -argumentlist "/silent /install appguid={56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}&appname=Microsoft%20Edge&needsadmin=True"

To deploy Microsoft Edge to previous versions of Windows, go to Add Microsoft Edge for Windows to Microsoft Intune.

Microsoft Edge Configuration

Two components of the Microsoft Edge experience, which apply when users sign in with their Microsoft 365 credentials, can be configured from the Microsoft 365 Admin Center.

  • The start page logo in Microsoft Edge can be customized by configuring the Your organization section within the Microsoft 365 admin center. For more information, go to Customize the Microsoft 365 theme for your organization.

  • The default new tab page experience in Microsoft Edge includes Office 365 information and personalized news. How this page is displayed can be customized from the Microsoft 365 admin center at Settings > Org settings > News > Microsoft Edge new tab page.

You can also set other settings for Microsoft Edge using settings catalog profiles. For example, you might want to configure specific sync settings for your organization.

  • Microsoft Edge
    • Configure the list of types that are excluded from synchronization - passwords

Start and Taskbar layout

You can customize and set a standard start and taskbar layout using Intune.

Settings catalog

The settings catalog is a single location where all configurable Windows settings are listed. This feature simplifies how you create a policy, and how you see all the available settings. For more information, go to Create a policy using the settings catalog in Microsoft Intune.

Tip

Many of the settings you're familiar with from group policy are built into the settings catalog. If settings aren't available in the settings catalog, then check the device configuration profiles templates.

Following are some settings available in the settings catalog that might be relevant to your organization:

  • Azure Active Directory preferred tenant domain - This setting configures the preferred tenant domain name to be appended to a user's username. A preferred tenant domain allows users to sign in to Microsoft Entra endpoints with only their username rather than their whole UPN so long as the user's domain name matches the preferred tenant domain. For users that have different domain names, they can type their whole UPN.

    Setting category Setting Value
    Authentication Preferred AAD Tenant Domain Name Enter domain name, like contoso.onmicrosoft.com.

    Note

    The setting label uses legacy terminology. "AAD" refers to Microsoft Entra ID.

  • Windows Spotlight - By default, several consumer features of Windows are enabled which results in selected Store apps installing and third-party suggestions on the lock screen. You can control this using the Experience section of the settings catalog.

    Setting category Setting Value
    Experience > Allow Windows Spotlight Allow Windows Consumer Features Block
      Allow Third-Party Suggestions in Windows Spotlight (user) Block
  • Microsoft Store - Organizations typically want to restrict the applications that can install on endpoints. Use this setting if your organization wants to control which applications can install from the Microsoft Store. This setting prevents users from installing applications unless they're approved.

    Setting category Setting Value
    Microsoft App Store Require Private Store Only Only Private store is enabled

    Note

    This setting applies to Windows 10. On Windows 11, this setting blocks access to the public Microsoft store. For more information, go to:

  • Block Gaming - Organizations might prefer that corporate endpoints can't be used to play games. The Gaming page within the Settings app can be hidden entirely using the following setting. For additional information on the settings page visibility, go to the CSP documentation and the ms-settings URI scheme reference.

    Setting category Setting Value
    Settings Page Visibility List hide:gaming-gamebar;gaming-gamedvr;gaming-broadcasting;gaming-gamemode;gaming-trueplay;gaming-xboxnetworking;quietmomentsgame
  • Control which tenants the Teams desktop client can sign in to - When this policy is configured on a device, users can only sign in with accounts homed in a Microsoft Entra tenant that's included in the "Tenant Allow List" defined in this policy. The "Tenant Allow List" is a comma separated list of Microsoft Entra tenant IDs. By specifying this policy and defining a Microsoft Entra tenant, you also block sign in to Teams for personal use. For more information, go to How to restrict sign in on desktop devices.

    Setting category Setting Value
    Microsoft Teams Restrict sign in to Teams to accounts in specific tenants (User) Enabled

Device Restrictions

Windows Device restrictions templates contain many of the settings required to secure and manage a Windows endpoint using Windows Configuration Service Providers (CSPs). More of these settings will be made available in the settings catalog over time. For more information, go to Device Restrictions.

To create a profile that uses the Device restrictions template, in the Microsoft Intune admin center, go to Devices > Manage devices > Configuration > Create > New policy > Select Windows 10 and later for platform > Templates Device restrictions for profile type.

  • Desktop background picture URL (Desktop only) - Use this setting to set a wallpaper on Windows Enterprise or Windows Education SKUs. You host the file online or reference a file that's copied locally. To configure this setting, on the Configuration settings tab in the Device restrictions profile, expand Personalization, and configure Desktop background picture URL (Desktop only).

  • Require users to connect to a network during device setup - This setting reduces the risk that a device can skip Windows Autopilot if the computer is reset. This setting requires devices to have a network connection during the out of box experience phase. To configure this setting, on the Configuration settings tab in the Device restrictions profile, expand General, and configure Require users to connect to network during device setup.

    Note

    The setting becomes effective the next time the device is wiped or reset.

Delivery Optimization

Delivery Optimization is used to reduce bandwidth consumption by sharing the work of downloading supported packages among multiple endpoints. Delivery Optimization is a self-organizing distributed cache that enables clients to download those packages from alternate sources, like peers on the network. These peer sources supplement the traditional Internet-based servers. You can find out about all the settings available for Delivery Optimization and what types of downloads are supported at Delivery Optimization for Windows updates.

To apply Delivery Optimization settings, create an Intune Delivery Optimization profile or a settings catalog profile.

Some settings that are commonly used by organizations are:

  • Restrict peer selection – Subnet - This setting restricts peer caching to computers on the same subnet.
  • Group ID - Delivery Optimization clients can be configured to only share content with devices in the same group. Group IDs can be configured directly by sending a GUID through policy or using DHCP options in DHCP scopes.

Customers using Microsoft Configuration Manager can deploy connected cache servers that can be used to host Delivery Optimization content. For more information, go to Microsoft Connected Cache in Configuration Manager.

Local Administrators

If there's only one user group that needs local administrator access to all Microsoft Entra joined Windows devices, then you can add them to the Microsoft Entra Joined Device Local Administrator.

You might have a requirement for IT helpdesk or other support staff to have local admin rights on a select group of devices. You can meet this requirement by using the following Configuration Service Providers (CSPs).

For more information, go to How to manage the local administrators group on Microsoft Entra joined devices

Group Policy to MDM Setting Migration

There are several options for creating your device configuration when considering a migration from Group Policy to cloud-native device management:

  • Start fresh and apply custom settings as required.
  • Review existing Group Policies and apply required settings. You can use tools to help, like Group Policy analytics.
  • Use Group Policy analytics to create Device Configuration profiles directly for supported settings.

The transition to a cloud-native Windows endpoint represents an opportunity to review your end-user computing requirements and establish a new configuration for the future. Wherever possible, start fresh with a minimal set of policies. Avoid carrying forward unnecessary or legacy settings from a domain-joined environment or older operating systems, like Windows 7 or Windows XP.

To start fresh, review your current requirements and implement a minimal collection of settings to meet these requirements. Requirements might include regulatory or mandatory security settings and settings to enhance the end-user experience. The business creates a list of requirements, not IT. Every setting should be documented, understood, and should serve a purpose.

Migrating settings from existing Group Policies to MDM (Microsoft Intune) isn't the preferred approach. When you transition to cloud-native Windows, the intention shouldn't be to lift and shift existing group policy settings. Instead, consider the target audience and what settings they require. It's time consuming and likely impractical to review each group policy setting in your environment to determine its relevance and compatibility with a modern managed device. Avoid trying to assess every group policy and individual setting. Instead, focus on assessing those common policies that cover most devices and scenarios.

Instead, identify the group policy settings that are mandatory and review those settings against available MDM settings. Any gaps would represent blockers that can prevent you from moving forward with a cloud-native device if unresolved. Tools such as Group Policy analytics can be used to analyze group policy settings and determine if they can be migrated to MDM policies or not.

Scripts

You can use PowerShell scripts for any settings or customizations that you need to configure outside of the in-built configuration profiles. For more information, go to Add PowerShell scripts to Windows devices in Microsoft Intune.

Mapping Network Drives and Printers

Cloud-native scenarios have no built-in solution for mapped network drives. Instead, we recommend that users migrate to Teams, SharePoint, and OneDrive. If migration isn't possible, consider the use of scripts if necessary.

For personal storage, in Step 8 - Configure settings for an optimal Microsoft 365 experience, we configured OneDrive Known Folder move. For more information, go to Redirect Known Folders.

For document storage, users can also benefit from SharePoint integration with File Explorer and the ability to sync libraries locally, as referenced here: Sync SharePoint and Teams files with your computer.

If you use corporate Office document templates, which are typically on internal servers, consider the newer cloud-based equivalent that allows users to access the templates from anywhere.

For printing solutions, consider Universal Print. For more information, go to:

Applications

Intune supports the deployment of many different Windows application types.

If you have applications that use MSI, EXE, or script installers, you can deploy all of these applications using Win32 app management in Microsoft Intune. Wrapping these installers in the Win32 format provides more flexibility and benefits, including notifications, delivery optimization, dependencies, detection rules, and support for the Enrollment Status Page in Windows Autopilot.

Note

To prevent conflicts during installation, we recommend that you stick to using the Windows line-of-business apps or Win32 apps features exclusively. If you have applications that are packaged as .msi or .exe, then they can be converted to Win32 apps (.intunewin) using the Microsoft Win32 Content Prep Tool available on GitHub.

Phase 5 – Scale your deployment with Windows Autopilot

You proved cloud-native works on one device. This phase covers how to move from a test device to your production fleet — how devices get registered, how you group them by persona, how you stage rollout, and how you handle the existing PCs you already manage.

Register devices at scale

In Phase 1, you uploaded a hardware hash manually. That's fine for a lab, but doesn't scale. The production-ready options are:

Registration source How it works Best for
OEM or hardware partner Devices ship from the vendor already registered to your tenant (Dell, HP, Lenovo, Microsoft, Surface, and others). New hardware procurement — the recommended target state.
Reseller or CSP A Microsoft partner registers devices on your behalf. Indirect or mixed supply chains.
Manual hash upload (CSV) Same Get-WindowsAutopilotInfo flow from Phase 1, Step 3, bulk-uploaded as a CSV. Pilots, lab devices, small batches, existing devices being onboarded.
Intune Connector / direct enrollment Newer registration paths surfaced in the admin center. Specific enrollment scenarios — see the Autopilot registration overview.

For full details, see Register Autopilot devices.

Tip

Whenever you buy new Windows hardware, ask your reseller or OEM to register devices to your Microsoft Entra tenant ID at the time of purchase. This approach is the lowest-friction long-term pattern and removes the need to ever collect a hash manually.

Use Group Tags for personas

You already used the CloudNative group tag in Phase 1 to drive a dynamic group. The same pattern scales to multiple device personas. Define one group tag per persona, one dynamic Microsoft Entra group per tag, and one Autopilot deployment profile plus Enrollment Status Page per group.

Persona Suggested group tag Autopilot profile User account type
Knowledge worker KnowledgeWorker User-driven Standard user
Developer / power user Developer User-driven Administrator
Kiosk or shared device Kiosk Self-deploying N/A
Pre-provisioned (white glove) PreProvisioned Pre-provisioned Standard user

This pattern keeps configuration, apps, and security policies isolated per persona and avoids one-off exceptions sprawling across your tenant.

Roll out in rings

Don't deploy to the whole fleet at once. Use the same ring concept that you use for Windows Updates:

Ring Audience Purpose
Pilot IT team and a small group of volunteers Validate end-to-end provisioning and policy.
Early adopters ~5% of users, spread across departments Catch persona- and app-specific issues.
Broad The remaining fleet, staged by region or department Production rollout.

Use assignment filters to target rings instead of creating duplicate groups for every policy. Monitor each ring using the Monitor your cloud-native Windows endpoints section before promoting to the next.

Handle existing devices

For Windows PCs you already manage, Microsoft recommends moving to Autopilot at the next hardware refresh rather than re-provisioning your entire fleet today. Cloud-native Windows gets its full benefits from a clean OOBE start, and refresh cycles let you transition naturally with minimal user disruption.

If you can't wait for refresh, two paths are available:

  • Register and reset in place. Collect the hash for an existing device, register it to Autopilot, then reset the PC. The device comes back through OOBE as a cloud-native endpoint. See Add existing devices to Windows Autopilot.
  • Reimage on refresh. Only new or refreshed hardware enrolls as cloud-native. Existing devices stay on their current management until they reach end of life.

Caution

Don't register devices that are actively managed by Microsoft Configuration Manager without a co-management plan. Decide whether the device will be cloud-managed, co-managed, or stay on Configuration Manager before you register it to Autopilot. For more information, see Co-management for Windows devices.

Learn more

If Windows Autopilot isn't the right fit for your scenario, see Intune enrollment methods for Windows devices for alternatives.

Monitor your cloud-native Windows endpoints

After your cloud-native Windows endpoints are provisioned and configured, use the monitoring views in the Microsoft Intune admin center to confirm policies, scripts, and apps deploy successfully — and to spot issues early. Monitoring is an ongoing operational task, not a one-time setup step.

What to monitor In the admin center What to review More information
Script status Devices > By platform > Windows > Manage devices > Scripts and remediations > Platform scripts Select a script > Device status
App installation status Apps > Windows > Windows apps Select an app > Device install status or User install status Troubleshoot app installs
Security baselines Monitor security baselines in Intune
Disk encryption (BitLocker) Endpoint security > Disk encryption Select the BitLocker policy > Device install status. Recovery keys: Devices > Windows > select a device > Recovery keys
Windows Update rings Devices > Manage updates > Windows 10 and later updates > Update rings Select a ring > Device status Reports for update rings
Compliance Devices > Compliance Select the policy to see assignment results, noncompliant devices, and per-setting failures Monitor compliance policies
Endpoint analytics Reports > Endpoint analytics Startup performance, app reliability, and proactive remediations across your fleet Endpoint analytics overview · Intune reports

Follow the cloud-native endpoints guidance

  1. Overview: What are cloud-native endpoints?
  2. 🡺 Tutorial: Set up cloud-native Windows endpoints with Microsoft Intune (You're here)
  3. Concept: Microsoft Entra joined vs. Hybrid Microsoft Entra joined
  4. Concept: Cloud-native endpoints and on-premises resources
  5. High level planning guide
  6. Known issues and important information

Frequently asked questions

What is a cloud-native Windows endpoint?

A cloud-native Windows endpoint is a Windows device that's Microsoft Entra joined and enrolled in Microsoft Intune — with no dependency on on-premises Active Directory, Group Policy, or domain controllers. All configuration, security, and app deployment is managed from the cloud using Microsoft Intune and Windows Autopilot.

What's the difference between cloud-native and hybrid Microsoft Entra joined?

A hybrid Microsoft Entra joined device is joined to both on-premises Active Directory and Microsoft Entra. It still depends on domain controllers for authentication and Group Policy for configuration. A cloud-native (Microsoft Entra joined only) device has no on-premises dependency — identity, policy, and apps all come from the cloud. For a detailed comparison, see Microsoft Entra joined vs. Hybrid Microsoft Entra joined.

Do I need Windows 11 for cloud-native endpoints?

No. Cloud-native Windows works with Windows 10 22H2 or later. Microsoft recommends Windows 11 for the best experience with Windows Autopilot, Windows Hello for Business, and modern security features.

Can I move existing domain-joined devices to cloud-native?

Yes, but Microsoft recommends doing it at the next hardware refresh rather than re-provisioning your entire fleet. Cloud-native Windows gets its full benefits from a clean OOBE start. For devices you can't wait to refresh, see Handle existing devices in Phase 5.

Does cloud-native Windows work with on-premises resources like file shares and printers?

Yes, with some planning. Cloud-native devices can access on-premises resources over VPN or through Microsoft Entra application proxy. For file storage, Microsoft recommends migrating to OneDrive and SharePoint. For printing, consider Universal Print. See Cloud-native endpoints and on-premises resources for detailed guidance.

Helpful online resources