Skip to main content
Skip to main content

Intune Documentation

Audience: Platform Engineering, distributed unit administrators, TechHub

Purpose: Comprehensive guide for Microsoft Intune endpoint management


ResourceDescription
Intune PortalMicrosoft Endpoint Manager admin center
Autopilot OnboardingDevice enrollment procedures
Autopilot OffboardingDevice decommissioning process
Scope Groups & NamingNaming conventions and group types
RBAC RolesCustom endpoint management roles

Overview

Microsoft Intune provides centralized mobile device management (MDM) and mobile application management (MAM) capabilities. This documentation covers best practices, policy configuration, compliance management, and device enrollment across Windows and Android platforms.


Windows Autopilot

Windows Autopilot streamlines device provisioning by pre-configuring devices in the cloud before they reach end users.

Deployment Profiles

Profile TypeUse Case
User-DrivenStandard deployment for assigned devices
Self-DeployingKiosks, shared devices, and labs
Pre-ProvisionedIT-prepared devices for immediate use
Standard TAMU Profiles
  • _TAMU User Driven with Pre Provision v2 — Standard user device profile
  • Custom unit profiles (e.g., CLBA_GENERAL_SHARED) — Unit-specific kiosk/shared configurations

Key Procedures

ProcedureDescription
Autopilot OnboardingManual enrollment when vendor provisioning fails
Autopilot OffboardingDecommissioning devices from Autopilot
Bulk Upload & NamingHardware ID collection and Graph API renaming
Deployment Profiles & ESPRequesting and configuring profiles

Scope Groups

Scope groups provide structured policy targeting across the organization. Each group type serves a specific purpose:

Group TypePurposeExample
DSG (Device)Device object collectionsDSG - CLED - Faculty Laptops
USG (User)User account groupingsUSG - CLED - Faculty Users
ESG (Experience)Combined user/device bundlesESG - CLED - Standard Faculty Experience
PSG (Policy)Policy/app assignmentsPSG - Required - User - CLED - Office 365
RSG (Role)PIM-elevated access groupsRSG - CLED - Autopilot Admins
Administrative Units

All scope groups must be created within the unit's designated Administrative Unit (e.g., AU-CLED). Personnel must have the Groups Administrator role elevated via PIM for their AU.

For detailed naming conventions, see Scope Groups and Naming.


Custom RBAC Roles

TAMU uses custom RBAC roles to enforce least-privilege access. Key roles include:

RoleDescription
TAMU Autopilot AdministratorFull Autopilot profile and device management
TAMU Application AdministratorApp creation, deletion, and assignment
TAMU Application OperatorApp management and assignment (no creation)
TAMU Android AdministratorAndroid Enterprise and FOTA management
TAMU Device OperatorDevice actions (wipe, retire, sync)
TAMU Security OperatorSecurity baselines and compliance monitoring

For complete role definitions, see Endpoint Custom Roles.


Platform Integration

Security & Compliance

Reference Materials