How to Set Proxy Behavior for Update Detection using Intune Policy

Let’s discuss how to set Proxy Behavior For Update Detection using Intune Policy. Set Proxy Behavior for Update Detection is a configuration setting available in Intune that controls how a system connects to the internet when checking for updates, specifically in environments where a proxy server is used.

This setting helps IT admins by giving them control over how update traffic is routed. By enforcing the use of the system proxy, admins can guarantee that all update requests go through the organisation’s approved and monitored network path, making it easier to apply security policies, log activity, and block unauthorized connections.

One of our posts explains that if your organization uses a system proxy, no changes are needed. However, for environments using a user-based proxy, WSUS software update scans can fail. In such cases, SCCM provides a way to configure the settings to allow the user proxy for update scans, and our post demonstrates the SCCM method to apply these settings along with the fix or workaround to resolve the failures.

In this post, we cover everything you need to know about setting Proxy Behavior for Update Detection using Intune policy. You will learn how to configure the policy, choose between using only the system proxy or allowing a fallback to the user proxy, and understand the impact of each option.

Patch My PC

How to Set Proxy Behavior For Update Detection using Intune Policy

A proxy server is an intermediary between the device and the Internet. It is often used in corporate networks to enforce security policies, filter traffic, and monitor usage. This setting determines whether the update check should only use the system-wide proxy or if it can fall back to a user-defined proxy when the system proxy is unavailable.

At the same time, the option to allow fallback to a user proxy gives admins flexibility to keep devices updated even when users are working remotely or the system proxy is unavailable. This balance helps maintain compliance while reducing the risk of missed updates.

  • Sign in to the Microsoft Intune admin center using your credentials.
  • In the left-hand panel, select Devices.
  • Go to Manage devices.
  • Click on Configuration.
  • Set the following options:
  • Platform: Windows 10 and later
  • Profile Type: Settings Catalog
How to Set Proxy Behavior for Update Detection using Intune Policy - Fig.1
How to Set Proxy Behavior for Update Detection using Intune Policy – Fig.1

Naming and Describing the Set Proxy Behavior for Update Detection Policy

In the Basics section, you need to enter a Name for the policy and add a short Description so it is clear what the policy is for. In this case, the policy is called Set Proxy Behavior for Update Detection. It explains how to control which proxy a device should use when checking for updates, and the guide shows how to set this up using an Intune policy.

How to Set Proxy Behavior for Update Detection using Intune Policy - Fig.2
How to Set Proxy Behavior for Update Detection using Intune Policy – Fig.2

Using the Settings Catalog to Configure the Policy

The Settings catalog lets you pick the exact settings you want to configure. Just click + Add settings, then browse or search to find the setting you need and add it to your policy. The below screenshot helps you to show more details.

How to Set Proxy Behavior for Update Detection using Intune Policy - Fig.3
How to Set Proxy Behavior for Update Detection using Intune Policy – Fig.3

Selecting Set Proxy Behavior for Update Detection in the Settings Picker

In the Settings picker, type Windows Update for Business in the search box and click the search button. You will see 77 results in that category. From the list, select Set Proxy Behavior for Update Detection. The below screenshot helps you to show more details.

How to Set Proxy Behavior for Update Detection using Intune Policy - Fig.4
How to Set Proxy Behavior for Update Detection using Intune Policy – Fig.4

Default Option – Use Only the System Proxy for Update Detection

Set Proxy Behavior for Update Detection has an option to only use the system proxy for detecting updates. This is the default setting, which means the device will always use the proxy set up for the whole system when checking for updates.

How to Set Proxy Behavior for Update Detection using Intune Policy - Fig.5
How to Set Proxy Behavior for Update Detection using Intune Policy – Fig.5

How the Fallback to User Proxy Option Benefits IT Admins

This option helps IT admins by making update checks more reliable, especially for users working outside the corporate network. If the system proxy is not available, such as when someone is working remotely or on a different network, the device can still connect using the user proxy. This ensures updates are downloaded on time, reduces the chances of devices missing important patches, and helps keep systems secure without requiring constant manual fixes from admins.

Set Proxy Behavior For Update Detection 
Set Proxy Behavior For Update Detection 
Allow user proxy to be used as a fallback if detection using system proxy fails
How to Set Proxy Behavior for Update Detection using Intune Policy – Table 1
How to Set Proxy Behavior for Update Detection using Intune Policy - Fig.6
How to Set Proxy Behavior for Update Detection using Intune Policy – Fig.6

Using Scope Tags to Manage Access for the Policy

In Intune, scope tags are used to control who can see and manage specific policies, including the Set Proxy Behavior for Update Detection policy. They help assign administrative access based on roles or groups within the organization.

How to Set Proxy Behavior for Update Detection using Intune Policy - Fig.7
How to Set Proxy Behavior for Update Detection using Intune Policy – Fig.7

Assigning the Policy to Specific Device or User Groups

In Intune, assignments decide which devices or user groups a policy will apply to. When setting up the Set Proxy Behavior for Update Detection policy, you can choose the specific groups that should receive it. For example, if you select the HTMD Test group and the HTMD CPC Test group, only the devices or users in those groups will get the policy.

How to Set Proxy Behavior for Update Detection using Intune Policy - Fig.8
How to Set Proxy Behavior for Update Detection using Intune Policy – Fig.8

Reviewing and Creating the Set Proxy Behavior for Update Detection Policy

In Intune, the Review + Create step is the final stage when setting up the Set Proxy Behavior for Update Detection policy. Here, you can review all the details you have configured such as the policy name, description, chosen proxy behavior option, scope tags, and assigned groups.

How to Set Proxy Behavior for Update Detection using Intune Policy - Fig.9
How to Set Proxy Behavior for Update Detection using Intune Policy – Fig.9

Policy Creation Confirmation

The policy “Set Proxy Behavior for Update Detection” has been created successfully. This means it’s now saved in Intune and will start applying to the devices or groups you assigned. The notification message is shown in the below screenshot.

How to Set Proxy Behavior for Update Detection using Intune Policy - Fig.10
How to Set Proxy Behavior for Update Detection using Intune Policy – Fig.10

Device and User Check-in Status

The Set Proxy Behavior for Update Detection device configuration profile has been deployed. The check-in status shows that 2 devices succeeded, with no conflicts, errors, or devices marked as not applicable. There are also no devices currently in progress. This means the policy has been applied successfully to the targeted devices.

How to Set Proxy Behavior for Update Detection using Intune Policy - Fig.11
How to Set Proxy Behavior for Update Detection using Intune Policy – Fig.11

Client Side Verification

The MDM PolicyManager log shows that the SetProxyBehaviorForUpdateDetection policy in the Update area was set for the device. The request came from the enrollment ID EB427D85-802F-46D9-A3E2-D5B414587F63, with the current user listed as Device. The policy value was set to 0x1, the enrollment type is 0x6, and the scope is 0x0. This entry confirms that the policy has been applied through MDM.

  • Event Viewer > Applications and Services Logs > Microsoft > Windows > DeviceManagement-Enterprise-Diagnostics-Provider > Admin
  • Search for Event ID 813 or 814 for configuration profile status updates.

MDM PolicyManager: Set policy int, Policy: (SetProxyBehaviorForUpdateDetection), Area:
(Update), EnrollmentID requesting merqe: (EB427D85-802F-46D9-A3E2-D5B414587F63), Current
User: (Device), Int: (0x1), Enrollment Type: (0x6), Scope: (0x0).

How to Set Proxy Behavior for Update Detection using Intune Policy - Fig.12
How to Set Proxy Behavior for Update Detection using Intune Policy – Fig.12

How to Remove the Assigned Group from the SetProxyBehaviorForUpdateDetection Policy

You can easily remove an assigned group from the SetProxyBehaviorForUpdateDetection policy, and the linked post provides a detailed explanation with a screenshot to visually guide you through the steps. Read more – How to Remove Assigned Group from Energy Saver Battery Threshold Policy in Intune Settings Catalog.

How to Set Proxy Behavior for Update Detection using Intune Policy - Fig.13
How to Set Proxy Behavior for Update Detection using Intune Policy – Fig.13

How to Delete the SetProxyBehaviorForUpdateDetection Policy from Intune Portal

When you delete the SetProxyBehaviorForUpdateDetection policy from Intune, it’s completely removed from your environment. Devices that previously had the policy may revert to their default settings or follow any other policies that are still assigned.

Read More – How to Delete Allow Clipboard History Policy in Intune Step by Step Guide

How to Set Proxy Behavior for Update Detection using Intune Policy - Fig.14
How to Set Proxy Behavior for Update Detection using Intune Policy – Fig.14

Need Further Assistance or Have Technical Questions?

Join the LinkedIn Page and Telegram group to get the latest step-by-step guides and news updates. Join our Meetup Page to participate in User group meetings. Also, join the WhatsApp Community to get the latest news on Microsoft Technologies. We are there on Reddit as well.

Author

Anoop C Nair has been Microsoft MVP for 10 consecutive years from 2015 onwards. He is a Workplace Solution Architect with more than 22+ years of experience in Workplace technologies. He is a Blogger, Speaker, and Local User Group Community leader. His primary focus is on Device Management technologies like SCCM and Intune. He writes about technologies like Intune, SCCM, Windows, Cloud PC, Windows, Entra, Microsoft Security, Career, etc.

Leave a Comment