Menu
Modern Workplace Blog
  • Home
  • About: Kenneth van Surksum
  • Cookie Policy
Modern Workplace Blog
November 22, 2019December 4, 2020

Intune: Choosing whether to assign to User or Device Groups

One of the disadvantages of being an experienced consultant in IT is the fact that once in a while you need to re-learn. With re-learn I mean that for some concepts it’s easier to understand how it works if you come from no-experience. I’ve experienced this with quite some Microsoft products as well. If you know the old version, switching to concepts in a new version might not be that easy compared to when you get to know the new version without any prior knowledge.

I also experienced this “challenge” lately when trying to figure out when to assign applications or configuration to either User Groups or Device Groups.

Update December 2020: I’ve written another article on this subject which might be interesting as well: Designing and building your Microsoft Endpoint Manager/Intune environment for Operations

The Past

In “the past” I worked mainly in environments where Desktops were used and the concept of roaming was introduced on all of these devices. This meant that any user could log on to a machine and by using a so called Roaming Profile the user settings were applied to the machine and the user could work as normal. Even though later more and more machines were becoming laptops, the concept of roaming was almost never abandoned and desktops and laptops were treatened equally from a management point of view

Applications

I have been working with ConfigMgr since 1998, at that time and for many years to come we only used collections containing devices to target our appliciations using “Advertisements” which we now know as “Deployments”. Later we started implementing mechanisms to target our applications towards users member of a group within Active Directory, so that we could provide users with applications based on AD group membership. Even though this targeting to users is technically possible most of the deployments today at my customers are still targeted at device collections. (base applications, updates to existing applications etc..).  Microsoft later introduced the concept of “Primary Device” where applications targeted to users were only installed if the user was working on his primary device.

Source: Blog from Henk Hoogendoorn

Configuration

Configuration in the old way is being accomplished by targeting, Login scripts,  Group Policy Objects (GPO) or Group Policy Preferences (GPP) to either Devices or Users. There it was actually quite simple, if you wanted to target machine based settings, you use a Computer Login Script, GPO or GPP targeting a OU containing computer accounts. Most of the times the settings would provision a setting in the registry residing somewhere under HKEY_LOCAL_MACHINE. When applying some of these settings performing a reboot was necessary in order to make the setting effective. When you want to set a setting related to the user, where the setting would result in a registry setting under HKEY_CURRENT_USER you would either user a Login Script, GPO or GPP targeting an OU containing User accounts. Later a hybrid scenario was introduced where user settings were applied only when the user was logging in on a certain computer, this was called Loopback processing and it’s main use case was for Terminal Servers, where some users settings were supposed to be different once the user logged on to the Terminal Server.

Image result for gpo active directory
Source: Scott Rachui

Today

Image result for intune
Microsoft Intune

So with this knowlegde from the past, I brought this experience with me to the new world, which in my case is reflected in the Microsoft Intune product today. Intune provides similar functionality compared to what we used to do with SMS/ConfigMgr (or Microsoft Configuration Endpoint Manager as we should call it today), Login Scripts, GPOs en GPPs. The only difference here is that whatever you want to target within Intune can either be done to Azure Active Directory User Groups, or Azure Active Directory Device Groups. 

To make things even more “complex” or “confusing”, settings which can be set in the form of Configuration Profiles, or to be precise “Device Configuration Profiles” as they are called in the Intune portal can actually contain both Device based settings (f.e. enable Bitlocker), but also user based settings (provide a customized start page in the browser).

One other change in concept I experience nowadays that devices are more tight to the user, meaning that in most of the cases there is a direct relationship between the user and the device the user is working on. There are of course some exceptions depending on the use case.

Device Configuration Profiles

With the introduction of the Security Baseline and now the concept of Policy sets, it became even more confusing to determine whether to apply settings to either the user using a Azure AD User Group or device using a Azure AD Device Group.

Github to the rescue

See the source image
Github (now part of Microsoft)

While struggling with these questions I decided to comment on the Microsoft provided documentation. You can follow the interaction between me and Microsoft here: https://github.com/MicrosoftDocs/IntuneDocs/issues/2992#issuecomment-557300939

My initial question:

Can we have some general “best practise” guidance on when to “assign” to a Azure AD User Group versus “assigning” to a Azure AD device group? Or should assignment behave the same.

I got a reply sometime later from Mandy Ohlinger, who is a senior content developer at Microsoft and active on github updating Microsoft documentation.

The most important take-away is that it depends on what the goal is. Device profiles always go with the device, and don’t care if there many users or 0 users. User profiles always go with users and the devices they sign in to. I included some examples for both scenarios.

And as you can see the documentation for “Assign user and device profiles in Microsoft Intune” now contains a section on “User groups vs. Device groups”

Some highlights from the documentation:

For devices:

If you want to apply settings on a device, regardless of who’s signed in, then assign your profiles to a devices group. Settings applied to device groups always go with the device, not the user.

Use device groups when you don’t care who’s signed in on the device, or if anyone is signed in. You want your settings to always be on the device.

For users:

Profile settings applied to user groups always go with the user, and go with the user when signed in to their many devices. It’s normal for users to have many devices, such as a Surface Pro for work, and a personal iOS device. And, it’s normal for a person to access email and other organization resources from these devices.

To summarize, use user groups when you want your settings and rules to always go with the user, whatever device they use.

That still left some questions though, so I reacted with the following follow up question:

Thank you for this addition to the documentation. The only remark I have is related to applying device settings to a user group. In the old days, with GPO you had User GPO’s and Device GPO’s. In some scenario’s, a device GPO required a reboot before it becomes effective. How about adding device specific settings to a user group (like the security baseline for example, something which under water makes a modification into HKLM), will a reboot be needed than to make the setting effective? Or due to the behavior of CSP, this is not needed anymore and the settings will be effective directly.

Which was replied with the following answer:

Reboots happen at the setting level, regardless if the policy is assigned to a user. Some CSPs may force a reboot, and some may apply after the next reboot. But, the answer is: It depends. As an admin, use your judgment on rebooting the device. For example, if it’s security-related, such as enabling BitLocker or anti-virus, then rebooting the device may be in your best interest. If it’s hiding the sleep button, then maybe it can wait.

Targeting applications

For applications, I personally have a preference to deploy (using “assignments”) applications to users when using Intune. While I can see some use cases to target devices espacially within Hybrid configuraitons with ConfigMgr where we can now fill Device Groups with members of a collection. Example use case, deploy laptop specific device application to device group containing that specific model of the laptops.

Conclusion:

We have come a long way, from getting documentation from CD’s (the TechNet CD’s suplied containing static documentation) towards documentation maintained via Github which adopts to user comments. Isn’t that great!

Concerning choosing between targeting device or user groups, it depends… 🙂

Tweet
Follow me
Tweet #WPNinjasNL

Continue Reading

← What are Guided Scenarios in Microsoft 365 Device Management/Intune?
Implementing RBAC and Scoping in Microsoft Intune →

15 thoughts on “Intune: Choosing whether to assign to User or Device Groups”

  1. Ronald says:
    March 7, 2020 at 12:04 am

    can you please give me an example for app group names

    Reply
    1. Kenneth says:
      March 7, 2020 at 2:28 pm

      Hi Ronald,

      I always use the following naming convention for apps .. the rest of the relevant information is filled in in other fields

      So to give you an example, for “MakeMeAdmin 2.3.0 x64.MSI” I use the Application name “Make Me Admin 2.3”

      Reply
    2. IT Mgr says:
      September 7, 2020 at 9:57 pm

      I use the following for my groups:
      Intune-Windows-App-Slack (any user in this group will have Slack for Windows deployed)
      Intune-Windows-Config-PowerSettings (manages Windows power settings)
      Intune-iOS-Config-Wifi (deploys wifi connection info to our corporate wifi)

      Conditional group membership isn’t feasible for us, so naming groups this way makes it easier to add a user/device to a bunch of related groups quickly

      Reply
  2. John Vang says:
    May 6, 2020 at 8:11 pm

    This is great. Super helpful!

    Reply
  3. Kevin Holland says:
    July 27, 2020 at 3:53 am

    I’m not sure how old this article is, but there is one item or point I believe has been missed. There are quite a few policy settings that will only work when assigned to a User group and not when assigned via a device group. I used to have a complete list. Microsoft also used to have a reference document, but I am unable to find anything resembling that today. I used to be able to easily get information from my Microsoft Rep, but as a Cloud Solution Provider I feel we, meaning the smaller providers, have been pretty much abandoned by Microsoft over the past 18 months.

    Reply
  4. Kees Sprangers says:
    November 25, 2020 at 8:28 am

    Another thing to keep in mind is that when assigning policy’s and profiles, for example to a dynamic group with all IOS devices, it often takes a while to rebuild the group after new devices are added. This makes the onboarding process when employees roll out new IOS devices a bit clunky; often it takes a while before things start working. That might be a good reason to apply profiles user-based.

    Reply
  5. Pingback: Designing and building your Microsoft Endpoint Manager/Intune environment for Operations | Modern Workplace Blog
  6. Pingback: Designing and building your Microsoft Endpoint Manager/Intune environment for Operations - Tech Daily Chronicle
  7. Pingback: Creating randomly populated groups with azure AD dynamic groups - Endpoint Cave
  8. sebus says:
    May 10, 2022 at 11:27 am

    And how does one assign USER policy (ProxySettingsPerUser) to USER group but ONLY for specific DEVICE group (being it a location ie teaching classroom A)

    With GPO it would be so easy, loopback policy for machine OU (location of classroom A)

    Reply
  9. Omar says:
    July 6, 2022 at 1:36 pm

    What would be the output if you assign a restriction (like blocking Airdrop) to a device group but exclude user group and the user logs into a computer in the assigned group?

    will the computer be excluded from getting the restriction applied?

    Reply
    1. Kenneth says:
      August 4, 2022 at 3:08 pm

      Hi Omar,

      You cannot mix user and device groups during assignment. Computer will not be excluded in this scenario.

      /Kenneth

      Reply
      1. Kanta Prasad says:
        December 6, 2023 at 12:26 pm

        True…. I experienced this and learned 🙂

        Reply
  10. Mark says:
    January 20, 2023 at 6:46 pm

    When creating a Template based Configuration Profile you can select some settings that apply to Users and others that apply to Devices. If I mix both Device and User setting are in the same configuration Profile how is this affected by assignment (User or Device)

    For example:
    If I assign such profile to All Users or Group of users will the Device level settings still apply?
    If assign to All Devices or device group will the User level settings apply?
    Or should I assign to both Device and User groups?

    Reply
    1. Kenneth says:
      February 5, 2023 at 10:47 am

      Hi Mark,

      Sorry for my late reply

      To answer your questions:
      If I assign such profile to All Users or Group of users will the Device level settings still apply?

      Yes, it will still apply

      If assign to All Devices or device group will the User level settings apply?

      Yes, it will still apply

      Or should I assign to both Device and User groups?

      I wouldn’t do that.

      I normally assign to user groups as much as possible, if I need to distinct I use filters for specific scenario’s (f.e. targeting enterprise editions or only Windows 10/11). For some scenario’s I also target device groups, for example the Pre provisoning/Shared Devices/Kiosk Devices.

      But again, there are some other “ways” to do this as well, take a look at this great article for example: https://www.itpromentor.com/devices-or-users-when-to-target-which-policy-type-in-microsoft-endpoint-manager-intune/

      Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Founding member of:

Recent Posts

  • MAM vs. MDM: Choosing the Right Mobile Management Approach
  • Comparing Web Filtering and Security: Microsoft Entra Internet Access (Global Secure Access) vs. Microsoft Defender for Endpoint (MDE)
  • Navigating New Authentication Methods: SMS for Password Reset, Not for MFA
  • From SPF to DANE: Securing Microsoft 365 Email Communications
  • Protecting your Break Glass accounts in Entra now that MFA gets enforced on more and more Admin portals

Books

System Center 2012 Service Manager Unleashed
Amazon
System Center 2012 R2 Configuration Manager Unleashed: Supplement to System Center 2012 Configuration Manager
Amazon
System Center Configuration Manager Current Branch Unleashed
Amazon
Mastering Windows 7 Deployment
Amazon
System Center 2012 Configuration Manager (SCCM) Unleashed
Amazon

Archives

  • February 2025
  • January 2025
  • September 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • September 2023
  • August 2023
  • February 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • May 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • August 2019
  • July 2019
  • November 2016
  • November 2015
  • June 2015
  • May 2015
  • November 2014
  • July 2014
  • April 2014
  • March 2014
  • February 2014
  • January 2014
  • November 2013
  • August 2013
  • April 2013
  • March 2013
  • January 2013
  • December 2012
  • November 2012
  • August 2012
  • July 2012
  • June 2012

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Categories

  • ABM (4)
  • Advanced Threat Protection (4)
  • Announcement (44)
  • Azure (3)
  • AzureAD (73)
  • Certification (2)
  • Cloud App Security (5)
  • Conditional Access (58)
  • Configuration Manager (24)
  • Entra (2)
  • Entra Id (8)
  • Events (14)
  • Exchange Online (9)
  • Identity Protection (5)
  • Intune (27)
  • Licensing (2)
  • Microsoft Defender (1)
  • Microsoft Defender for Endpoint (1)
  • Microsoft Endpoint Manager (35)
  • Mobile Application Management (4)
  • Modern Workplace (74)
  • Office 365 (10)
  • Overview (11)
  • Power Platform (1)
  • PowerShell (2)
  • Presentations (9)
  • Privileged Identity Management (5)
  • Role Based Access Control (2)
  • Security (63)
  • Service Manager (4)
  • Speaking (30)
  • Troubleshooting (4)
  • Uncategorized (11)
  • Windows 10 (15)
  • Windows 11 (5)
  • Windows Update for Business (4)
  • WMUG.nl (16)
  • WPNinjasNL (32)

Tags

#ABM #AzureAD #community #conditionalaccess #ConfigMgr #IAM #Intune #m365 #MEM #MEMCM #microsoft365 #modernworkplace #office365 #security #webinar #wmug_nl ATP authentication strength AzureAD Branding Community Conditional Access ConfigMgr ConfigMgr 2012 Email EXO Identity Intune Licensing M365 MCAS MFA Modern Workplace Office 365 OSD PIM Policy Sets Presentation RBAC roles Security System Center Task Sequence troubleshooting webinar

Recent Comments

  • brc on Protecting your Break Glass accounts in Entra now that MFA gets enforced on more and more Admin portals
  • [m365weekly] #186 – M365 Weekly Newsletter on MAM vs. MDM: Choosing the Right Mobile Management Approach
  • Dean Gross on Comparing Web Filtering and Security: Microsoft Entra Internet Access (Global Secure Access) vs. Microsoft Defender for Endpoint (MDE)
  • nikhil tech on Protecting your Break Glass accounts in Entra now that MFA gets enforced on more and more Admin portals
  • Kenneth on Comparing Web Filtering and Security: Microsoft Entra Internet Access (Global Secure Access) vs. Microsoft Defender for Endpoint (MDE)

This information is provided “AS IS” with no warranties, confers no rights and is not supported by the author.

Copyright © 2021 by Kenneth van Surksum. All rights reserved. No part of the information on this web site may be reproduced or posted in any form or by any means without the prior written permission of the publisher.

Shorthand: Don’t pass off my work as yours, it’s not nice.

©2025 Modern Workplace Blog | Powered by WordPress and Superb Themes!
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT