TAMU Device Registry Tags deployment for Non-Intune and Intune-Managed Windows Devices
Purpose
This SOP outlines the procedure for deploying TAMU-specific registry tags to Windows devices. These tags support asset management and compliance tracking across both Intune-managed and non-Intune-managed endpoints.
Scope
This SOP applies to:
- Non-Intune-managed Windows devices: Devices manually maintained or managed outside of Microsoft Intune.
- Intune-managed Windows devices: Devices enrolled in Intune and eligible for Win32 app deployment.
Intent
Ensure consistent application of registry tags that include systemorg and unitcode for every managed endpoint. These values must be customized per distributed IT unit.
Essential Core Knowledge
- Access to
\\auth.tamu.edu\TAMU\ConfigMGR\SourceContent\SoftwareDistribution\TAMU\TAMU Custom\Set-TAMUDeviceRegistryTags. - Understanding of PowerShell execution policies.
- Familiarity with creating Win32 apps in Microsoft Intune.
- Ability to modify and test detection logic in PowerShell scripts.
Related Resources:
Procedure and Guidelines
Part 1: Non-Intune Devices
-
Access Shared Folder:
- Navigate to
\\auth.tamu.edu\TAMU\ConfigMGR\SourceContent\SoftwareDistribution\TAMU\TAMU Custom\Set-TAMUDeviceRegistryTags.
- Navigate to
-
Copy PowerShell Scripts:
Set-RegistryTags.ps1Detect-RegistryTags.ps1Uninstall-RegistryTags.ps1
-
Customize Detection Script:
- Open
Detect-RegistryTags.ps1. - Replace placeholder values with your unit-specific
systemorgandunitcode.$expectedSystemOrg = "YourCampusCode" # e.g., TAMU or TAMUG
$expectedUnitCode = "YourUnitFAMISCode" # FAMIS code for your IT team - Optional future enhancement: add a
deptcoderegistry key for the distributed unit's department FAMIS code.
- Open
-
Deploy Script via Scheduled Task or GPO:
- Use SCCM, Task Scheduler, GPO Startup Script, or other MDM to run
Set-RegistryTags.ps1asSYSTEM. - Confirm registry keys are created under:
HKLM:\SOFTWARE\TAMU\DeviceTags
- Use SCCM, Task Scheduler, GPO Startup Script, or other MDM to run
-
Validate:
- Run
Detect-RegistryTags.ps1manually. - Exit code
0confirms correct tagging; exit code1indicates mismatch or absence.
- Run
Part 2: Intune-Managed Devices
-
Retrieve the Pre-Packaged .intunewin File:
- From
\\auth.tamu.edu\TAMU\ConfigMGR\SourceContent\SoftwareDistribution\TAMU\TAMU Custom\Set-TAMUDeviceRegistryTags, obtain theSet-RegistryTags.intunewinpackage.
- From
-
Create the Win32 App in Intune:
- In the Intune Admin Center, go to Apps > Windows > Add.
- Select App type: Windows app (Win32).
- Upload the
Set-RegistryTags.intunewinfile.
-
Configure App Info and Requirements:
- Provide a clear name and description.
- Example:
- Name:
TAMU-CLBA - Device Group Registration - Description:
TAMU-CLBA - Device Group Registration
- Name:
- Set minimum OS (e.g., Windows 10 1607).
-
Specify Install and Uninstall Commands:
- Paste the following Install Command:
%windir%\sysnative\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass -File .\Set-RegistryTags.ps1 -SystemOrg TAMU -UnitCode CLBA - Paste the following Uninstall Command:
%windir%\sysnative\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass -File .\Uninstall-RegistryTags.ps1 -SystemOrg TAMU -UnitCode CLBA - Important: Replace
TAMUandCLBAwith your own SystemOrg (e.g., TAMUG) and UnitCode, which should match your Distributed Unit’s IT FAMIS code.
- Paste the following Install Command:
-
Customize and Upload the Detection Script:
- Edit
Detect-RegistryTags.ps1with appropriatesystemorgandunitcode.$expectedSystemOrg = "TAMU"
$expectedUnitCode = "CLBA" - Save and upload this modified script in the Detection Rules section as a custom PowerShell detection script.
- Reminder: Replace
TAMUandCLBAin the detection script to reflect your own organization and unit’s FAMIS code.
- Edit
-
Scope Group Assignment:
-
Assign the application to a Policy Scope Group (PSG) that follows the TAMU scope group naming conventions outlined here: Scope Group Naming Guide.
-
This ensures correct device or user targeting and prevents unintended deployment to shared devices.
-
Use Intune > Monitor > App install status to validate installation success.
-
Additional Notes and References
- TAMU Security Control Catalog
- [Scope Group and Naming Convention Guide](See internal document)
- College Of Veterinary Medicine updates
Detect-RegistryTags.ps1with:$expectedSystemOrg = "TAMU"
$expectedUnitCode = "CLVM" - GPO-based deployment used by IT units managing systems.
- Intune app using:
%windir%\sysnative\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass -File .\Set-RegistryTags.ps1 -SystemOrg TAMU -UnitCode CLVM