|
| 1 | +--- |
| 2 | +# required metadata |
| 3 | + |
| 4 | +title: Create device platform restrictions |
| 5 | +titleSuffix: Microsoft Intune |
| 6 | +description: Restrict personally owned devices, and specific device platforms and OS versions from enrolling in Intune. |
| 7 | +keywords: |
| 8 | +author: Lenewsad |
| 9 | +ms.author: lanewsad |
| 10 | +manager: dougeby |
| 11 | +ms.date: 08/08/2022 |
| 12 | +ms.topic: how-to |
| 13 | +ms.service: microsoft-intune |
| 14 | +ms.subservice: enrollment |
| 15 | +ms.localizationpriority: |
| 16 | +ms.technology: |
| 17 | +ms.assetid: |
| 18 | + |
| 19 | +# optional metadata |
| 20 | + |
| 21 | +#ROBOTS: |
| 22 | +#audience: |
| 23 | + |
| 24 | +ms.reviewer: maholdaa |
| 25 | +ms.suite: ems |
| 26 | +search.appverid: MET150 |
| 27 | +#ms.tgt_pltfrm: |
| 28 | +ms.custom: intune-azure |
| 29 | +ms.collection: |
| 30 | + - M365-identity-device-management |
| 31 | + - highpri |
| 32 | +--- |
| 33 | + |
| 34 | +# Create device platform restrictions |
| 35 | + |
| 36 | +**Applies to** |
| 37 | +* Android |
| 38 | +* iOS |
| 39 | +* macOS |
| 40 | +* Windows 10 |
| 41 | +* Windows 11 |
| 42 | + |
| 43 | + |
| 44 | +[!INCLUDE [azure_portal](../includes/azure_portal.md)] |
| 45 | + |
| 46 | +Use the device platform enrollment restrictions in Microsoft Intune to block personally owned devices from enrolling, and to block devices by device platform and OS version. |
| 47 | + |
| 48 | +You can create a new Intune device platform restriction policy in the Microsoft Endpoint Manager admin center or use the default policy that's already available. You have one default policy for platform restrictions, and you can edit and customize it as needed. |
| 49 | + |
| 50 | +You can have up to 25 device platform restriction policies. Intune applies the default policy to all user and userless enrollments until you assign a higher-priority policy. |
| 51 | + |
| 52 | +This article describes the device platform restrictions supported in Microsoft Intune and how to configure them from the Microsoft Endpoint Manager admin center. |
| 53 | + |
| 54 | +## Default policy |
| 55 | +Microsoft Intune provides one default policy for device platform restrictions. You can edit and customize it as needed. Intune applies the default policy to all user and userless enrollments until you assign a higher-priority policy. |
| 56 | + |
| 57 | +## Available restrictions |
| 58 | +This section describes the restrictions you can configure in a device platform-enrollment restriction policy. |
| 59 | + |
| 60 | +### Device platform |
| 61 | +This restriction blocks devices running on specific platforms from enrolling. You can restrict devices running the following platforms: |
| 62 | + |
| 63 | + * Android device administrator |
| 64 | + * Android Enterprise work profile |
| 65 | + * iOS/iPadOS |
| 66 | + * macOS |
| 67 | + * Windows |
| 68 | + |
| 69 | +In groups where both Android platforms are allowed, devices that support work profile will enroll with a work profile. Devices that don't support work profile will enroll on the Android device administrator platform. Neither work profile nor device administrator enrollment will work until you complete all prerequisites for Android enrollment. |
| 70 | + |
| 71 | +Since Intune supports two Android platforms, it's important to understand how platform restrictions work when used with version restrictions: |
| 72 | + * If you allow both platforms for the same group, and then refine it for specific and non-overlapping versions, devices are sent through the Android enrollment flow that's picked for their version. |
| 73 | + * If you allow both platforms, but block the same versions, devices running blocked versions cannot enroll. Users on these devices are sent through the Android device administrator enrollment flow before they are blocked and prompted to sign out. |
| 74 | + |
| 75 | +### OS version |
| 76 | +This restriction enforces your maximum and minimum OS version requirements. Devices running earlier or later OS versions are not allowed to enroll. This type of restriction works with the following operating systems: |
| 77 | + |
| 78 | + * Android device administrator\* |
| 79 | + * Android Enterprise work profile\* |
| 80 | + * iOS/iPadOS\* |
| 81 | + * Windows |
| 82 | + |
| 83 | +\* Version restrictions are supported on these platforms for devices enrolled via Intune Company Portal only. |
| 84 | + |
| 85 | +### Personally-owned devices |
| 86 | +This restriction helps prevent device users from accidentally enrolling their personal devices, and applies to devices running: |
| 87 | + |
| 88 | +* Android |
| 89 | +* iOS/iPad OS |
| 90 | +* macOS |
| 91 | +* Windows |
| 92 | + |
| 93 | +#### Blocking personal Android devices |
| 94 | +By default, until you manually make changes in the admin center, your Android Enterprise work profile device settings and Android device administrator device settings are the same. |
| 95 | + |
| 96 | +If you block Android Enterprise work profile enrollment on personal devices, only corporate-owned devices can enroll with [personally-owned work profiles](../apps/android-deployment-scenarios-app-protection-work-profiles.md#android-enterprise-personally-owned-work-profiles). |
| 97 | + |
| 98 | + |
| 99 | +#### Blocking personal iOS/iPadOS devices |
| 100 | +By default, Intune classifies iOS/iPadOS devices as personally-owned. To be classified as corporate-owned, an iOS/iPadOS device must fulfill one of the following conditions: |
| 101 | +- [Registered with a serial number or IMEI](corporate-identifiers-add.md). |
| 102 | +- Enrolled by using Automated Device Enrollment (formerly Device Enrollment Program). |
| 103 | + |
| 104 | +> [!NOTE] |
| 105 | +> An iOS User Enrollment profile overrides an enrollment restriction policy. For more information, see [Set up iOS/iPadOS and iPadOS User Enrollment (preview)](ios-user-enrollment.md). |
| 106 | +
|
| 107 | +#### Blocking personal Macs |
| 108 | +By default, Intune classifies macOS devices as personally-owned. To be classified as corporate-owned, a Mac must fulfill one of the following conditions: |
| 109 | +- [Registered with a serial number](corporate-identifiers-add.md). |
| 110 | +- Enrolled by using Automated Device Enrollment (formerly Device Enrollment Program). |
| 111 | + |
| 112 | +#### Blocking personal Windows devices |
| 113 | +If you block personally owned Windows devices from enrollment, Intune checks to make sure that each new Windows enrollment request has been authorized for corporate enrollment. Unauthorized enrollments are blocked. |
| 114 | + |
| 115 | +The following enrollment methods are authorized for corporate enrollment: |
| 116 | +- The enrolling user is using a [device enrollment manager account]( device-enrollment-manager-enroll.md). |
| 117 | +- The device enrolls through [Windows Autopilot](../../autopilot/enrollment-autopilot.md). |
| 118 | +- The device is registered with Windows Autopilot but isn't an MDM enrollment only option from Windows Settings. |
| 119 | +- The device enrolls through a [bulk provisioning package](windows-bulk-enroll.md). |
| 120 | +- The device enrolls through GPO, or [automatic enrollment from Configuration Manager for co-management](/configmgr/comanage/quickstart-paths#bkmk_path1). |
| 121 | + |
| 122 | +> [!NOTE] |
| 123 | +> Since a co-managed device enrolls in the Microsoft Intune service based on its Azure AD device token, and not a user token, only the default Intune enrollment restriction will apply to it. |
| 124 | + |
| 125 | +Intune marks devices going through the following types of enrollments as corporate-owned. But Intune blocks devices enrolling since they don't offer the Intune administrator per-device control, they are blocked: |
| 126 | +- [Automatic MDM enrollment](windows-enroll.md#enable-windows-automatic-enrollment) with [Azure Active Directory join during Windows setup](/azure/active-directory/device-management-azuread-joined-devices-frx)\*. |
| 127 | +- [Automatic MDM enrollment](windows-enroll.md#enable-windows-automatic-enrollment) with [Azure Active Directory join from Windows Settings](/azure/active-directory/user-help/user-help-register-device-on-network)\*. |
| 128 | + |
| 129 | +Intune also blocks personal devices using these enrollment methods: |
| 130 | +- [Automatic MDM enrollment](windows-enroll.md#enable-windows-automatic-enrollment) with [Add Work Account from Windows Settings](/azure/active-directory/user-help/user-help-join-device-on-network)\*. |
| 131 | +- [MDM enrollment only]( /windows/client-management/mdm/mdm-enrollment-of-windows-devices#connecting-personally-owned-devices-bring-your-own-device) option from Windows Settings. |
| 132 | + |
| 133 | +\* These won't be blocked if registered with Autopilot. |
| 134 | + |
| 135 | +## Create a device platform restriction |
| 136 | + |
| 137 | +1. Sign in to the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431). |
| 138 | +2. Go to **Devices** > **Enroll devices** > **Enrollment device platform restrictions**. |
| 139 | +3. Select the tab along the top of the page that corresponds with the platform you're configuring. Your options: |
| 140 | + |
| 141 | + * **Android restrictions** |
| 142 | + * **Windows restrictions** |
| 143 | + * **MacOS restrictions** |
| 144 | + * **iOS restrictions** |
| 145 | + |
| 146 | +4. Select **Create restriction**. |
| 147 | +5. On the **Basics** page, give the restriction a name and optional description. |
| 148 | +6. Select **Next**. |
| 149 | +7. On the **Platform settings** page, configure the restrictions for your selected platform. Your options: |
| 150 | + - **Platform** (Android): Select **Allow** to permit a platform to enroll, and **Block** to restrict it. |
| 151 | + - **MDM** (Windows, macOS, and iOS/iPadOS): Select **Allow** to permit a platform to enroll, and **Block** to restrict it. |
| 152 | + - **Personally-owned**: Select **Allow** to permit devices to enroll and operate as personal devices. |
| 153 | + - **Device manufacturer** (Android): Enter a comma-separated list of the manufacturers that you want to block. |
| 154 | + - **Allow min/max range** (Android, Windows, iOS/iPadOS): Enter the minimum and maximum OS versions allowed to enroll. Supported version formats include: |
| 155 | + - Windows supports major.minor.build.rev for Windows 10 and Windows 11 only. |
| 156 | + - Android device administrator and Android Enterprise work profile support major.minor.rev.build. |
| 157 | + - iOS/iPadOS supports major.minor.rev. |
| 158 | + |
| 159 | + > [!TIP] |
| 160 | + > The min/max range isn't applicable to Apple devices that enroll with the Device Enrollment Program, Apple School Manager, or the Apple Configurator app. Although Intune doesn't block ADE enrollments that use Company Portal to authenticate, not meeting OS requirements impacts registration because devices can't create the Azure AD device record used to evaluate Conditional Access policies. You can tell that this is the case if a device user receives an error message that says "Couldn't map device record with a user" after they sign in to Company Portal. |
| 161 | + |
| 162 | +8. Select **Next**. |
| 163 | +9. Optionally, add scope tags to the restriction. For more information about scope tags, see [Use role-based access control and scope tags for distributed IT](../fundamentals/scope-tags.md). |
| 164 | + |
| 165 | + > [!NOTE] |
| 166 | + > If you apply scope tags to a restriction, only Intune users within scope can view and manage the policy. Only people in scope can view and reorder a restriction, or change its priority level. They can also see the relative priority of the restriction, even if they can't see all restrictions. |
| 167 | +
|
| 168 | +10. Select **Next**. |
| 169 | +11. On the **Assignments** page, select **Add groups** and then use the search box to find and select groups. To assign the restriction to all device users, select **Add all users**. If you don't assign a restriction to at least one group, the restriction won't take effect. |
| 170 | +12. Optionally, after you assign groups, select **Edit filter** to restrict the policy assignment further with filters. Filters are available for macOS, iOS, and Windows policies. For more information, see [Apply assignment filters](enrollment-restrictions-set.md#apply-assignment-filters) (in this article). |
| 171 | +13. Select **Next**. |
| 172 | +14. Review your policy, and then select **Create** to create it. |
| 173 | + |
| 174 | +You can view the new restriction policy and access its properties in the **Enrollment device platform restrictions** > **Device type restrictions** table. Select and drag the restriction to reposition it in the table and change its priority. |
| 175 | + |
| 176 | +## Apply assignment filters |
| 177 | + |
| 178 | +You can use assignment filters to include and exclude additional devices from certain group-targeted policies. Enrollment restrictions and ESP policies both support the use of assignment filters. |
| 179 | + |
| 180 | +For example, you can use a filter to allow personal Windows devices to enroll while blocking devices that run a specific operating system SKU. To achieve this outcome, apply a preconfigured filter to your enrollment restriction assignments. The filter needs to have the `operatingSystemSKU` property in its rules. Example steps: |
| 181 | + |
| 182 | + 1. Create a platform enrollment restriction policy for Windows. |
| 183 | + 2. In the platform settings, select the option that allows personally-owned devices to enroll. |
| 184 | + 3. In the assignments settings, select the groups you want to assign. |
| 185 | + 4. Select **Edit filter** and then apply your preconfigured filter that contains the `operatingSystemSKU` property. The applied property blocks devices running Windows 10 Home edition. |
| 186 | + |
| 187 | +For more information about creating filters, see [Create a filter](../fundamentals/filters.md). |
| 188 | + |
| 189 | +### Supported filter properties |
| 190 | + |
| 191 | +Enrollment restrictions support fewer filter properties than other group-targeted policies. This is because devices are not yet enrolled, so Intune doesn't have the device info to support all properties. You'll see the limited selection of properties when you: |
| 192 | + |
| 193 | +* Configure a device platform restriction policy for Apple and Windows devices. |
| 194 | +* Configure an enrollment status page (ESP) policy for Windows. |
| 195 | +* Edit a filter that's in-use in an enrollment restriction or ESP profile. |
| 196 | + |
| 197 | +The following filter properties are always available to use with enrollment policies: |
| 198 | + |
| 199 | +**Windows** |
| 200 | + |
| 201 | +* OS version |
| 202 | +* Operating System SKU |
| 203 | +* Enrollment profile name |
| 204 | + |
| 205 | +**iOS/iPadOS and macOS** |
| 206 | +* Manufacturer |
| 207 | +* Model |
| 208 | +* OS version |
| 209 | +* Ownership |
| 210 | +* Enrollment profile name |
| 211 | + |
| 212 | +For more information about these properties, see [device properties](../fundamentals/filters-device-properties.md#device-properties). Filters cannot be used with Android enrollment restrictions. |
| 213 | + |
| 214 | +## Edit enrollment restrictions |
| 215 | + |
| 216 | +Edits are applied to new enrollments and do not affect devices that are already enrolled. |
| 217 | + |
| 218 | +1. Go to **Enrollment device platform restrictions**. |
| 219 | +2. In the **Device type restrictions** table, select the name of the policy you want to change. |
| 220 | +3. Select **Properties**. |
| 221 | +4. Select **Edit** |
| 222 | +5. Make your changes and select **Review + save**. |
| 223 | +6. Review your chages and select **Save**. |
| 224 | + |
| 225 | + |
| 226 | + |
| 227 | + |
| 228 | + |
| 229 | + |
| 230 | + |
| 231 | + |
| 232 | + |
| 233 | + |
| 234 | + |
| 235 | + |
| 236 | + |
| 237 | + |
| 238 | + |
| 239 | + |
| 240 | + |
| 241 | + |
| 242 | + |
| 243 | + |
| 244 | + |
| 245 | + |
| 246 | + |
| 247 | + |
| 248 | + |
| 249 | + |
| 250 | + |
| 251 | + |
| 252 | + |
| 253 | + |
| 254 | + |
0 commit comments