Menu
Modern Workplace Blog
  • Home
  • About: Kenneth van Surksum
  • Cookie Policy
Modern Workplace Blog
January 7, 2025January 7, 2025

Governing OS Versions in Microsoft Intune: Best Practices and Configuration

In a modern managed workplace environment, ensuring that devices meet minimum operating system (OS) requirements is a critical aspect of security and compliance. By governing the OS versions allowed within your Microsoft Intune environment, you can prevent unsupported or outdated systems from accessing corporate resources. Additionally, having well-configured Windows Update for Business (WUfB) settings can support enforcing OS versions later on by streamlining updates to meet compliance. For more information, refer to Configuring even better Windows Update for Business settings for your Microsoft Intune managed modern workplace. To understand what OS versions are supported by Microsoft Intune, refer to Microsoft Intune Supported OS Documentation. This blog outlines the steps and strategies to configure OS version governance using device enrollment restrictions and compliance policies for various platforms, including Android Enterprise, iOS/iPadOS, macOS, Windows 10 and later, and Linux. Last but not least, we also discuss how to configure OS versions in Conditional Launch as part of an App Protection Policy for MAM

This article contains the following sections:

  • Why Govern OS Versions? – Explains the importance of OS version control for security, compatibility, and compliance.
  • Overview of Options – Describes the two primary methods for OS governance: device enrollment restrictions and compliance policies.
  • Determining the versions to use – Covers how you can find what values you need to provide for each OS
  • Configuring Device Enrollment Restrictions – Covers how to define OS version requirements during device enrollment.
  • Configuring Compliance Policies – Discusses setting up compliance policies to enforce OS versions over time.
  • Configuring Conditional Launch in App Protection Policies for MAM – Discusses how to configure conditional launch within your App Protection Policy.
  • Summary – Recaps key takeaways on managing OS versions in Intune.
  • References – Provides links to official vendor documentation and resources.

Why Govern OS Versions?

There are several reasons to enforce OS version control within your organization:

  • Security: Older OS versions may lack critical security patches, exposing devices to vulnerabilities.
  • Compatibility: Ensuring devices meet minimum requirements for applications and services.
  • Compliance: Adhering to internal policies or regulatory standards.
  • User Experience: Maintaining functionality and performance with supported features.

Overview of Options

Microsoft Intune provides two primary methods to govern OS versions:

  1. Device Enrollment Restrictions: These rules prevent devices with unsupported OS versions from enrolling in Intune.
  2. Compliance Policies: These policies check enrolled devices to ensure they meet OS version requirements and mark non-compliant devices appropriately.

Both options can be configured for Android Enterprise, iOS/iPadOS, Windows 10 and later. For macOS and Linux we can only use a Compliance Policy as setting the version in Device Enrollment Restrictions is not available.

Determining the versions to use

To ensure compliance and security, it’s important to determine the correct OS versions for each platform. The following resources can be used to find the latest supported OS versions, build numbers, and security patch levels:

  • Android: Refer to the Android Security Bulletins and Android version history to determine the minimum security patch levels and OS versions.
  • iOS/iPadOS and macOS: Check Apple’s official release notes and Apple Developer News Releases for details on OS versions and build numbers.
  • Windows 10 and later: Use
    • Windows 11, version 24H2 update history – Microsoft Support
    • Windows 11, version 23H2 update history – Microsoft Support
    • Windows 10 update history – Microsoft Support
  • Linux: Refer to Linux kernel version history and distribution-specific documentation such as Ubuntu, Red Hat, or Debian to find the latest supported kernel versions.

By leveraging these sources, organizations can ensure that devices meet security and compliance requirements while maintaining functionality.

Configuring Device Enrollment Restrictions

When setting up Device Enrollment Restrictions, you can define different requirements for OS versions depending on the organization’s needs. From an enrollment perspective, devices should meet a minimum OS version to ensure compatibility with the latest deployment functionalities. However, organizations can allow updates to be applied later, ensuring security patches and compliance improvements over time. This approach balances the need for immediate functionality with long-term security. Currently, Linux does not support enrollment restrictions in Microsoft Intune.

General Steps:

  1. Navigate to Devices > Enrollment restrictions in the Microsoft Intune admin center.
  2. Select the platform (e.g., Android, iOS/iPadOS, or Windows).
  3. Choose Create restriction or edit an existing restriction.
  4. Provide name and description
  5. Define the minimum and maximum OS versions under platform settings. You should define versions as major.minor.build.
  6. Save and apply the restriction.

For example, this is a possible option for setting the Device Enrollment Restriction for Windows devices, where we only allow Windows 10 22H2 and higher versions. And with the upcoming end of support for Windows 10, you might want to adjust this to at least version 19.9.22631.0 (Windows 11 23H2). The minimum supported version should at least be equal to the minimum supported version which Microsoft supports, see Microsoft Intune Supported OS Documentation

In the following example, we set the Device enrollment restrictions for iOS/iPadOS. Here we only allow enrollment of version 17.7 and higher.

Configuring Compliance Policies

Defining compliance policies should be based on security risks. Organizations must determine the minimum and maximum OS versions that align with security and functionality requirements. The OS version requirement should mitigate security vulnerabilities while ensuring devices remain operational and compatible with corporate resources. The amount of time before a device is considered non-compliant (the grace period) is a key factor in choosing whether to use one or multiple compliance policies. A shorter grace period enforces compliance more strictly, while a longer grace period allows gradual enforcement to minimize disruption.

The compliancy status can later be used in Conditional Access in order to determine whether resources are available for the device.

To manage this effectively, organizations can create multiple compliance policies:

  • Primary Compliance Policy: This policy defines the minimum allowed OS version. Devices that do not meet this requirement will be marked as non-compliant immediately, preventing access until they are updated.
  • Secondary Compliance Policy: This policy sets the desired OS version with a longer grace period. This allows devices sufficient time to update while gradually enforcing security standards.

This approach provides flexibility while ensuring security compliance over time.

General Steps:

  1. Navigate to Devices > Compliance policies in the Microsoft Intune admin center.
  2. Select Create Policy and choose the platform.
  3. In the configuration, specify minimum and maximum OS versions, OS Build versions, and security patch levels as needed.
  4. Assign the policy to appropriate groups.
  5. Monitor compliance in the Reports section.

Below is an example of the minimum supported OS versions that we want to support on Windows. We configure this compliance policy in such a way that if the device doesn’t meet these versions, it will be non-compliant immediately.

For the versions that we prefer, we can have a more relaxed policy, for example the one below, where we set the Mark device noncompliant setting to 60 days, allowing devices to become compliant in 60 days.

Challenges with Android OS Updates

Managing OS versions for Android devices presents unique challenges due to the fragmented nature of the Android ecosystem. Unlike iOS and Windows, where updates are controlled centrally by Apple and Microsoft, Android updates depend on device manufacturers and carriers. This means that:

  • Different vendors release updates at different times, making it difficult to enforce a unified OS version requirement.
  • Some Android devices may receive updates months after Google releases a new Android version.
  • Certain models might not receive updates at all, leading to security risks if they fall behind on patching.

To mitigate these challenges, organizations should:

  • Define OS version requirements based on security patch levels rather than just major OS versions.
  • Regularly review vendor update schedules and restrict devices that no longer receive updates.
  • Encourage the use of Android Enterprise Recommended (AER) devices, which follow stricter update policies.

For Android we therefore specify the minimum security patch level, for the Android OS versions that we want to support. Be careful though with this especially with Android, there are simply too many versions and therefore an inventory of what is available within your environment is necessary to minimize the impact of this change.

Governing OS Versions in Microsoft Intune: Best Practices and Configuration

Configuring Conditional Launch in App Protection Policies for MAM

When using Mobile Application Management in Intune, you create an App Protection Policy to define the policy applicable for the MAM protected app on the iOS/iPadOS or Android device.

Here we have the option to either Warn of Block access based on OS Version, so for example in the configuration of an App Protection Policy for Android, we specify OS version 12 with a patch level of 2022-10-01 as the minimum level (or else we block access), but warn users if they have an OS version less dan 14.0 with patch level 2024-01-01.

Note: this is just an example, again be very careful when it comes to Android

Summary

Governing OS versions is a fundamental part of managing a secure and compliant device environment in Microsoft Intune. By configuring device enrollment restrictions and compliance policies, you can ensure that only supported OS versions are allowed within your organization. Regularly update these policies to reflect the latest vendor releases and security updates.

The purpose of this article is give an overview of the options, and provide some possible scenario’s on how to have better control over which OS versions are available within your Modern managed environment.

References

  • Microsoft Intune documentation
  • Android version history
  • Apple’s iOS and macOS updates
  • Windows release health information
  • Linux kernel version history

Tweet
Follow me
Tweet #WPNinjasNL

Continue Reading

← Microsoft Intune Application Deployment Best Practices

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Founding member of:

Recent Posts

  • MAM vs. MDM: Choosing the Right Mobile Management Approach
  • Comparing Web Filtering and Security: Microsoft Entra Internet Access (Global Secure Access) vs. Microsoft Defender for Endpoint (MDE)
  • Navigating New Authentication Methods: SMS for Password Reset, Not for MFA
  • From SPF to DANE: Securing Microsoft 365 Email Communications
  • Protecting your Break Glass accounts in Entra now that MFA gets enforced on more and more Admin portals

Books

System Center 2012 Service Manager Unleashed
Amazon
System Center 2012 R2 Configuration Manager Unleashed: Supplement to System Center 2012 Configuration Manager
Amazon
System Center Configuration Manager Current Branch Unleashed
Amazon
Mastering Windows 7 Deployment
Amazon
System Center 2012 Configuration Manager (SCCM) Unleashed
Amazon

Archives

  • February 2025
  • January 2025
  • September 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • September 2023
  • August 2023
  • February 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • May 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • August 2019
  • July 2019
  • November 2016
  • November 2015
  • June 2015
  • May 2015
  • November 2014
  • July 2014
  • April 2014
  • March 2014
  • February 2014
  • January 2014
  • November 2013
  • August 2013
  • April 2013
  • March 2013
  • January 2013
  • December 2012
  • November 2012
  • August 2012
  • July 2012
  • June 2012

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Categories

  • ABM (4)
  • Advanced Threat Protection (4)
  • Announcement (44)
  • Azure (3)
  • AzureAD (73)
  • Certification (2)
  • Cloud App Security (5)
  • Conditional Access (58)
  • Configuration Manager (24)
  • Entra (2)
  • Entra Id (8)
  • Events (14)
  • Exchange Online (9)
  • Identity Protection (5)
  • Intune (27)
  • Licensing (2)
  • Microsoft Defender (1)
  • Microsoft Defender for Endpoint (1)
  • Microsoft Endpoint Manager (35)
  • Mobile Application Management (4)
  • Modern Workplace (74)
  • Office 365 (10)
  • Overview (11)
  • Power Platform (1)
  • PowerShell (2)
  • Presentations (9)
  • Privileged Identity Management (5)
  • Role Based Access Control (2)
  • Security (63)
  • Service Manager (4)
  • Speaking (30)
  • Troubleshooting (4)
  • Uncategorized (11)
  • Windows 10 (15)
  • Windows 11 (5)
  • Windows Update for Business (4)
  • WMUG.nl (16)
  • WPNinjasNL (32)

Tags

#ABM #AzureAD #community #conditionalaccess #ConfigMgr #IAM #Intune #m365 #MEM #MEMCM #microsoft365 #modernworkplace #office365 #security #webinar #wmug_nl ATP authentication strength AzureAD Branding Community Conditional Access ConfigMgr ConfigMgr 2012 Email EXO Identity Intune Licensing M365 MCAS MFA Modern Workplace Office 365 OSD PIM Policy Sets Presentation RBAC roles Security System Center Task Sequence troubleshooting webinar

Recent Comments

  • brc on Protecting your Break Glass accounts in Entra now that MFA gets enforced on more and more Admin portals
  • [m365weekly] #186 – M365 Weekly Newsletter on MAM vs. MDM: Choosing the Right Mobile Management Approach
  • Dean Gross on Comparing Web Filtering and Security: Microsoft Entra Internet Access (Global Secure Access) vs. Microsoft Defender for Endpoint (MDE)
  • nikhil tech on Protecting your Break Glass accounts in Entra now that MFA gets enforced on more and more Admin portals
  • Kenneth on Comparing Web Filtering and Security: Microsoft Entra Internet Access (Global Secure Access) vs. Microsoft Defender for Endpoint (MDE)

This information is provided “AS IS” with no warranties, confers no rights and is not supported by the author.

Copyright © 2021 by Kenneth van Surksum. All rights reserved. No part of the information on this web site may be reproduced or posted in any form or by any means without the prior written permission of the publisher.

Shorthand: Don’t pass off my work as yours, it’s not nice.

©2025 Modern Workplace Blog | Powered by WordPress and Superb Themes!
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT