I explained about Windows AutoPilot deployment in the previous post. In this post, we will see another useful tip for enterprise implementation of AutoPilot. We have an option to create Azure AD (AAD) dynamic device groups based on Windows AutoPilot profiles. Windows AutoPilot Profile AAD Dynamic Device Groups are helpful to deploy application and security policies to each department as part of device enrollment process.
- What is AAD Dynamic Device Groups?
- Video Tutorial – Windows AutoPilot Profile AAD Dynamic Device Groups
- Create New Windows AutoPilot Deployment Profile
- How to Create Windows AutoPilot Profile AAD Dynamic Device Groups?
- How to Dynamically Deploy Security Policies & Apps to Windows AutoPilot Profile
What is AAD Dynamic Device Groups?
AAD dynamic Device groups are similar to dynamic device collections in SCCM world. Azure AD (AAD) dynamic device group is a set of devices grouped together based on a common attribute value. This can be used to target different security policies and applications to a specific group of devices. So this is very important in the world of modern management of devices using Microsoft Intune.
I have a post which talks more details about the logic of Azure AD dynamic queries. How to create Windows AutoPilot Profile AAD Dynamic Device Group is not covered in this post.
Video Tutorial – Windows AutoPilot Profile AAD Dynamic Device Groups
Create New Windows AutoPilot Deployment Profile
For this post, I will create an AutoPilot Deployment profile to customize the OOBE experience for the end user. Windows AutoPilot profile provides only three (3) options to customize. As shown in the video tutorial, I have created a new AutoPilot profile called “Sales Team Profile“.
All the Windows 10 devices from sales and marketing department will be enrolled using this Sales Team Profile. This deployment profile name will be used to create Windows AutoPilot Profile AAD Dynamic Device Group.
- Navigate via Azure Portal -> Microsoft Intune -> Device Enrollment – Windows Enrollment
- Click on Deployment profiles under Windows Autopilot Deployment Program and select Create profile.
- In the Create profile blade, set the name to “Sales Team Profile“, click on Out-of-box experience (OOBE) and configure the following:
OOBE Customization Settings
Privacy Settings >Value > Hide
End user license agreement (EULA) >Value> Hide
User account type Standard or Administrator >Value> Standard User
How to Create Windows AutoPilot Profile AAD Dynamic Device Groups?
Once the Autopilot deployment profile has created, we can “group” the devices assigned to “Sales Team Profile” dynamically based on following Azure AD attribute :-
So all the devices all assigned to Windows AutoPilot deployment profile will automatically get added to the Azure AD dynamic device group. Let’s see how to create Windows AutoPilot Profile AAD Dynamic Device Groups.
- Navigate via Azure Portal -> Azure Active Directory -> Groups – All Groups –>
- Click on “+ New Group“
- Select Security as Group Type
- Enter Group Name “Sales Team AutoPilot Group” (any name is fine)
- Enter Group Description “Windows AutoPilot Profile AAD group for Sales Dept” (any description is fine)
- Select Dynamic Device as Membership type
- Click on Add Dynamic Query under Dynamic Device Members
- On Dynamic Membership Rules blade, select enrollmentProfileName from “Add Devices Where” column
- Select the operator as Equals
- Enter the Windows AutoPilot deployment profile name “Sales Team Profile“
- Click on add query button
- Click on Create button to create AAD Dynamic device group based on AutoPilot Profile
Dynamic Query ==> (device.enrollmentProfileName -eq "Sales Team Profile")
How to Dynamically Deploy Security Policies & Apps to Windows AutoPilot Profile
Now created we have created an Azure AD dynamic device group associated with Windows AutoPilot profile. Whenever a device gets assigned to Windows AutoPilot profile, you can use the AAD dynamic device group to deploy security policies or applications.
Assign an application to Azure AD dynamic device group associated with Windows Autopilot profile. Dynamically deploy security policies & apps to Windows AutoPilot devices.
- Navigate via Azure Portal –> Microsoft Intune –> Mobile Apps – Apps
- Select the application called “MBCA“
- Select Assignments from App blade
- Click on “Add Group” from Group blame
- Select Assigned Type “Required” from Add Group blame
- Select AAD dynamic Group “Sales Team AutoPilot Group” from “Included Groups”
- Click on Select button
- Click OK – OK button
- Click Save button
Available Azure AD Device Attributes