Skip to content

Commit d2e7168

Browse files
committed
TOC updates for enrollment restrictions
1 parent 912393b commit d2e7168

5 files changed

Lines changed: 530 additions & 190 deletions

File tree

Lines changed: 111 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,111 @@
1+
---
2+
# required metadata
3+
4+
title: Create device limit restrictions
5+
titleSuffix: Microsoft Intune
6+
description: Restrict the number of devices allowed to enroll in Microsoft Intune.
7+
keywords:
8+
author: Lenewsad
9+
ms.author: lanewsad
10+
manager: dougeby
11+
ms.date: 08/08/2022
12+
ms.topic: how-to
13+
ms.service: microsoft-intune
14+
ms.subservice: enrollment
15+
ms.localizationpriority:
16+
ms.technology:
17+
ms.assetid:
18+
19+
# optional metadata
20+
21+
#ROBOTS:
22+
#audience:
23+
24+
ms.reviewer: maholdaa
25+
ms.suite: ems
26+
search.appverid: MET150
27+
#ms.tgt_pltfrm:
28+
ms.custom: intune-azure
29+
ms.collection:
30+
- M365-identity-device-management
31+
- highpri
32+
---
33+
34+
# Create device limit restrictions in Intune
35+
36+
**Applies to**
37+
* Android
38+
* iOS
39+
* macOS
40+
* Windows 10
41+
* Windows 11
42+
43+
44+
[!INCLUDE [azure_portal](../includes/azure_portal.md)]
45+
46+
Use device limit enrollment restrictions to restrict the number of devices allowed to enroll in Microsoft Intune. Device limit restrictions work on devices that meet the following criteria:
47+
48+
* Microsoft Intune-managed
49+
* Established contact with Intune within last 90 days
50+
* Not in a registration-pending state for more than 24 hours
51+
* Hasn't failed Apple enrollment
52+
* Hasn't been deleted from Microsoft Intune
53+
* Enrollment type is not in shared mode (check DeviceCountsForDeviceCap for detail)
54+
55+
You can create a new device limit-enrollment restriction policy in the Microsoft Endpoint Manager admin center or use the default policy that's already available. You can have up to 25 device limit restriction policies.
56+
57+
This article describes how to create and configure a device limit-enrollment restriction policy in the admin center.
58+
59+
## Default policy
60+
Microsoft Intune provides one default policy for device limit restrictions. You can edit and customize it as needed. Intune applies the default policy to all user and userless enrollments until you assign a higher-priority policy.
61+
62+
## Create a device limit restriction
63+
64+
1. Sign in to the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431) > **Devices** > **Enrollment restrictions** > **Create restriction** > **Device limit restriction**.
65+
2. On the **Basics** page, give the restriction a **Name** and optional **Description**.
66+
3. Choose **Next** to go to the **Device limit** page.
67+
4. For **Device limit**, select the maximum number of devices that a user can enroll.
68+
![Screen cap for choosing device limit](./media/enrollment-restrictions-set/choose-device-limit.png)
69+
5. Choose **Next** to go to the **Scope tags** page.
70+
6. On the **Scope tags** page, optionally add the scope tags you want to apply to this restriction. For more information about scope tags, see [Use role-based access control and scope tags for distributed IT](../fundamentals/scope-tags.md).
71+
7. Choose **Next** to go to the **Assignments** page.
72+
8. Choose **Select groups to include** and then use the search box to find groups that you want to include in this restriction. The restriction applies only to groups to which it's assigned. If you don't assign a restriction to at least one group, it won't have any effect. Then choose **Select**.
73+
![Screen cap for selecting groups](./media/enrollment-restrictions-set/select-groups-device-limit.png)
74+
9. Select **Next** to go to the **Review + create** page.
75+
10. Select **Create** to create the restriction. The new restriction appears in your list of restrictions and is given a higher priority than the default policy. For information about changing the priority level, see [Change restriction priority](enrollment-restrictions-set.md#change-restriction-priority)(in this article).
76+
77+
## Edit enrollment restrictions
78+
79+
Edits are applied to new enrollments and do not affect devices that are already enrolled.
80+
81+
1. Go to **Enrollment device limit restrictions** to bring up the list of your policies.
82+
2. Select the name of the policy you want to change.
83+
3. Select **Properties**.
84+
4. Select **Edit**.
85+
5. Make your changes and select **Review + save**.
86+
6. Review your chages and select **Save**.
87+
88+
## Change restriction priority
89+
90+
When a group is assigned multiple restrictions, the priority level determines which policy gets applied. The restriction with highest priority (*1* being the highest priority position) is applied and the other restrictions are disregarded. For example:
91+
92+
1. Joe belongs to two user groups in Intune: Group A and Group B.
93+
2. Group A is assigned a restriction policy. Its priority level is 5.
94+
3. Group B is assigned a restriction policy. The priority level is 2.
95+
4. Joe is subject only to the priority 2 restrictions.
96+
97+
When you create a restriction, it's added to the list just above the default. You can change the priority of non-default restrictions.
98+
99+
1. Go to**Enrollment device limit restrictions**.
100+
2. Select **Device limit restrictions** to bring up the list of your policies.
101+
3. Hover over the policy in the **Priority** column,and then select and drag the priority to the desired position in the list.
102+
103+
## Device user experience
104+
BYOD users who reach their device limit receive a message during enrollment explaining the restriction. To continue enrolling, the device user must unenroll an existing device. Alternatively, as the admin you can increase the device limit in the admin center. For more information about troubleshooting enrollment errors such as this one, see [Troubleshoot device enrollment](/troubleshoot/mem/intune/troubleshoot-device-enrollment-in-intune#device-cap-reached).
105+
106+
![Example image of device limit notification which reads, "Couldn't add your device. You have added the maximum number of devices allowed by your IT support. You must remove a device before you can add a new one.](./media/enrollment-restrictions-set/enrollment-restrictions-ios-set-limit-notification.png)
107+
108+
109+
110+
111+
Lines changed: 254 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,254 @@
1+
---
2+
# required metadata
3+
4+
title: Create device platform restrictions
5+
titleSuffix: Microsoft Intune
6+
description: Restrict personally owned devices, and specific device platforms and OS versions from enrolling in Intune.
7+
keywords:
8+
author: Lenewsad
9+
ms.author: lanewsad
10+
manager: dougeby
11+
ms.date: 08/08/2022
12+
ms.topic: how-to
13+
ms.service: microsoft-intune
14+
ms.subservice: enrollment
15+
ms.localizationpriority:
16+
ms.technology:
17+
ms.assetid:
18+
19+
# optional metadata
20+
21+
#ROBOTS:
22+
#audience:
23+
24+
ms.reviewer: maholdaa
25+
ms.suite: ems
26+
search.appverid: MET150
27+
#ms.tgt_pltfrm:
28+
ms.custom: intune-azure
29+
ms.collection:
30+
- M365-identity-device-management
31+
- highpri
32+
---
33+
34+
# Create device platform restrictions
35+
36+
**Applies to**
37+
* Android
38+
* iOS
39+
* macOS
40+
* Windows 10
41+
* Windows 11
42+
43+
44+
[!INCLUDE [azure_portal](../includes/azure_portal.md)]
45+
46+
Use the device platform enrollment restrictions in Microsoft Intune to block personally owned devices from enrolling, and to block devices by device platform and OS version.
47+
48+
You can create a new Intune device platform restriction policy in the Microsoft Endpoint Manager admin center or use the default policy that's already available. You have one default policy for platform restrictions, and you can edit and customize it as needed.
49+
50+
You can have up to 25 device platform restriction policies. Intune applies the default policy to all user and userless enrollments until you assign a higher-priority policy.
51+
52+
This article describes the device platform restrictions supported in Microsoft Intune and how to configure them from the Microsoft Endpoint Manager admin center.
53+
54+
## Default policy
55+
Microsoft Intune provides one default policy for device platform restrictions. You can edit and customize it as needed. Intune applies the default policy to all user and userless enrollments until you assign a higher-priority policy.
56+
57+
## Available restrictions
58+
This section describes the restrictions you can configure in a device platform-enrollment restriction policy.
59+
60+
### Device platform
61+
This restriction blocks devices running on specific platforms from enrolling. You can restrict devices running the following platforms:
62+
63+
* Android device administrator
64+
* Android Enterprise work profile
65+
* iOS/iPadOS
66+
* macOS
67+
* Windows
68+
69+
In groups where both Android platforms are allowed, devices that support work profile will enroll with a work profile. Devices that don't support work profile will enroll on the Android device administrator platform. Neither work profile nor device administrator enrollment will work until you complete all prerequisites for Android enrollment.
70+
71+
Since Intune supports two Android platforms, it's important to understand how platform restrictions work when used with version restrictions:
72+
* If you allow both platforms for the same group, and then refine it for specific and non-overlapping versions, devices are sent through the Android enrollment flow that's picked for their version.
73+
* If you allow both platforms, but block the same versions, devices running blocked versions cannot enroll. Users on these devices are sent through the Android device administrator enrollment flow before they are blocked and prompted to sign out.
74+
75+
### OS version
76+
This restriction enforces your maximum and minimum OS version requirements. Devices running earlier or later OS versions are not allowed to enroll. This type of restriction works with the following operating systems:
77+
78+
* Android device administrator\*
79+
* Android Enterprise work profile\*
80+
* iOS/iPadOS\*
81+
* Windows
82+
83+
\* Version restrictions are supported on these platforms for devices enrolled via Intune Company Portal only.
84+
85+
### Personally-owned devices
86+
This restriction helps prevent device users from accidentally enrolling their personal devices, and applies to devices running:
87+
88+
* Android
89+
* iOS/iPad OS
90+
* macOS
91+
* Windows
92+
93+
#### Blocking personal Android devices
94+
By default, until you manually make changes in the admin center, your Android Enterprise work profile device settings and Android device administrator device settings are the same.
95+
96+
If you block Android Enterprise work profile enrollment on personal devices, only corporate-owned devices can enroll with [personally-owned work profiles](../apps/android-deployment-scenarios-app-protection-work-profiles.md#android-enterprise-personally-owned-work-profiles).
97+
98+
99+
#### Blocking personal iOS/iPadOS devices
100+
By default, Intune classifies iOS/iPadOS devices as personally-owned. To be classified as corporate-owned, an iOS/iPadOS device must fulfill one of the following conditions:
101+
- [Registered with a serial number or IMEI](corporate-identifiers-add.md).
102+
- Enrolled by using Automated Device Enrollment (formerly Device Enrollment Program).
103+
104+
> [!NOTE]
105+
> An iOS User Enrollment profile overrides an enrollment restriction policy. For more information, see [Set up iOS/iPadOS and iPadOS User Enrollment (preview)](ios-user-enrollment.md).
106+
107+
#### Blocking personal Macs
108+
By default, Intune classifies macOS devices as personally-owned. To be classified as corporate-owned, a Mac must fulfill one of the following conditions:
109+
- [Registered with a serial number](corporate-identifiers-add.md).
110+
- Enrolled by using Automated Device Enrollment (formerly Device Enrollment Program).
111+
112+
#### Blocking personal Windows devices
113+
If you block personally owned Windows devices from enrollment, Intune checks to make sure that each new Windows enrollment request has been authorized for corporate enrollment. Unauthorized enrollments are blocked.
114+
115+
The following enrollment methods are authorized for corporate enrollment:
116+
- The enrolling user is using a [device enrollment manager account]( device-enrollment-manager-enroll.md).
117+
- The device enrolls through [Windows Autopilot](../../autopilot/enrollment-autopilot.md).
118+
- The device is registered with Windows Autopilot but isn't an MDM enrollment only option from Windows Settings.
119+
- The device enrolls through a [bulk provisioning package](windows-bulk-enroll.md).
120+
- The device enrolls through GPO, or [automatic enrollment from Configuration Manager for co-management](/configmgr/comanage/quickstart-paths#bkmk_path1).
121+
122+
> [!NOTE]
123+
> Since a co-managed device enrolls in the Microsoft Intune service based on its Azure AD device token, and not a user token, only the default Intune enrollment restriction will apply to it.
124+
125+
Intune marks devices going through the following types of enrollments as corporate-owned. But Intune blocks devices enrolling since they don't offer the Intune administrator per-device control, they are blocked:
126+
- [Automatic MDM enrollment](windows-enroll.md#enable-windows-automatic-enrollment) with [Azure Active Directory join during Windows setup](/azure/active-directory/device-management-azuread-joined-devices-frx)\*.
127+
- [Automatic MDM enrollment](windows-enroll.md#enable-windows-automatic-enrollment) with [Azure Active Directory join from Windows Settings](/azure/active-directory/user-help/user-help-register-device-on-network)\*.
128+
129+
Intune also blocks personal devices using these enrollment methods:
130+
- [Automatic MDM enrollment](windows-enroll.md#enable-windows-automatic-enrollment) with [Add Work Account from Windows Settings](/azure/active-directory/user-help/user-help-join-device-on-network)\*.
131+
- [MDM enrollment only]( /windows/client-management/mdm/mdm-enrollment-of-windows-devices#connecting-personally-owned-devices-bring-your-own-device) option from Windows Settings.
132+
133+
\* These won't be blocked if registered with Autopilot.
134+
135+
## Create a device platform restriction
136+
137+
1. Sign in to the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431).
138+
2. Go to **Devices** > **Enroll devices** > **Enrollment device platform restrictions**.
139+
3. Select the tab along the top of the page that corresponds with the platform you're configuring. Your options:
140+
141+
* **Android restrictions**
142+
* **Windows restrictions**
143+
* **MacOS restrictions**
144+
* **iOS restrictions**
145+
146+
4. Select **Create restriction**.
147+
5. On the **Basics** page, give the restriction a name and optional description.
148+
6. Select **Next**.
149+
7. On the **Platform settings** page, configure the restrictions for your selected platform. Your options:
150+
- **Platform** (Android): Select **Allow** to permit a platform to enroll, and **Block** to restrict it.
151+
- **MDM** (Windows, macOS, and iOS/iPadOS): Select **Allow** to permit a platform to enroll, and **Block** to restrict it.
152+
- **Personally-owned**: Select **Allow** to permit devices to enroll and operate as personal devices.
153+
- **Device manufacturer** (Android): Enter a comma-separated list of the manufacturers that you want to block.
154+
- **Allow min/max range** (Android, Windows, iOS/iPadOS): Enter the minimum and maximum OS versions allowed to enroll. Supported version formats include:
155+
- Windows supports major.minor.build.rev for Windows 10 and Windows 11 only.
156+
- Android device administrator and Android Enterprise work profile support major.minor.rev.build.
157+
- iOS/iPadOS supports major.minor.rev.
158+
159+
> [!TIP]
160+
> The min/max range isn't applicable to Apple devices that enroll with the Device Enrollment Program, Apple School Manager, or the Apple Configurator app. Although Intune doesn't block ADE enrollments that use Company Portal to authenticate, not meeting OS requirements impacts registration because devices can't create the Azure AD device record used to evaluate Conditional Access policies. You can tell that this is the case if a device user receives an error message that says "Couldn't map device record with a user" after they sign in to Company Portal.
161+
162+
8. Select **Next**.
163+
9. Optionally, add scope tags to the restriction. For more information about scope tags, see [Use role-based access control and scope tags for distributed IT](../fundamentals/scope-tags.md).
164+
165+
> [!NOTE]
166+
> If you apply scope tags to a restriction, only Intune users within scope can view and manage the policy. Only people in scope can view and reorder a restriction, or change its priority level. They can also see the relative priority of the restriction, even if they can't see all restrictions.
167+
168+
10. Select **Next**.
169+
11. On the **Assignments** page, select **Add groups** and then use the search box to find and select groups. To assign the restriction to all device users, select **Add all users**. If you don't assign a restriction to at least one group, the restriction won't take effect.
170+
12. Optionally, after you assign groups, select **Edit filter** to restrict the policy assignment further with filters. Filters are available for macOS, iOS, and Windows policies. For more information, see [Apply assignment filters](enrollment-restrictions-set.md#apply-assignment-filters) (in this article).
171+
13. Select **Next**.
172+
14. Review your policy, and then select **Create** to create it.
173+
174+
You can view the new restriction policy and access its properties in the **Enrollment device platform restrictions** > **Device type restrictions** table. Select and drag the restriction to reposition it in the table and change its priority.
175+
176+
## Apply assignment filters
177+
178+
You can use assignment filters to include and exclude additional devices from certain group-targeted policies. Enrollment restrictions and ESP policies both support the use of assignment filters.
179+
180+
For example, you can use a filter to allow personal Windows devices to enroll while blocking devices that run a specific operating system SKU. To achieve this outcome, apply a preconfigured filter to your enrollment restriction assignments. The filter needs to have the `operatingSystemSKU` property in its rules. Example steps:
181+
182+
1. Create a platform enrollment restriction policy for Windows.
183+
2. In the platform settings, select the option that allows personally-owned devices to enroll.
184+
3. In the assignments settings, select the groups you want to assign.
185+
4. Select **Edit filter** and then apply your preconfigured filter that contains the `operatingSystemSKU` property. The applied property blocks devices running Windows 10 Home edition.
186+
187+
For more information about creating filters, see [Create a filter](../fundamentals/filters.md).
188+
189+
### Supported filter properties
190+
191+
Enrollment restrictions support fewer filter properties than other group-targeted policies. This is because devices are not yet enrolled, so Intune doesn't have the device info to support all properties. You'll see the limited selection of properties when you:
192+
193+
* Configure a device platform restriction policy for Apple and Windows devices.
194+
* Configure an enrollment status page (ESP) policy for Windows.
195+
* Edit a filter that's in-use in an enrollment restriction or ESP profile.
196+
197+
The following filter properties are always available to use with enrollment policies:
198+
199+
**Windows**
200+
201+
* OS version
202+
* Operating System SKU
203+
* Enrollment profile name
204+
205+
**iOS/iPadOS and macOS**
206+
* Manufacturer
207+
* Model
208+
* OS version
209+
* Ownership
210+
* Enrollment profile name
211+
212+
For more information about these properties, see [device properties](../fundamentals/filters-device-properties.md#device-properties). Filters cannot be used with Android enrollment restrictions.
213+
214+
## Edit enrollment restrictions
215+
216+
Edits are applied to new enrollments and do not affect devices that are already enrolled.
217+
218+
1. Go to **Enrollment device platform restrictions**.
219+
2. In the **Device type restrictions** table, select the name of the policy you want to change.
220+
3. Select **Properties**.
221+
4. Select **Edit**
222+
5. Make your changes and select **Review + save**.
223+
6. Review your chages and select **Save**.
224+
225+
226+
227+
228+
229+
230+
231+
232+
233+
234+
235+
236+
237+
238+
239+
240+
241+
242+
243+
244+
245+
246+
247+
248+
249+
250+
251+
252+
253+
254+

0 commit comments

Comments
 (0)