Exploring Device Management.
06 February 2025
In an enterprise environment, managing local Windows groups such as Administrators
and Remote Desktop Users
is critical for ensuring secure access to systems. Intune,
Microsoft’s mobile device management (MDM) platform, offers powerful Account Protection
policies that can help administrators enforce security settings for these groups.
By leveraging Intune’s capabilities, organizations can standardize access control,
minimize security risks, and ensure compliance across devices.
Account Protection policies in Microsoft Intune allow administrators to configure security
settings for user accounts, including those tied to local Windows groups. These policies are
particularly useful in managing who has elevated privileges and remote access permissions,
such as users in the Administrators
or Remote Desktop Users
groups.
Here’s how Intune can help manage local Windows groups effectively. For this example we
will configure the local Administrators
group to prevent privileged users to manipulate this group.
First we need to open the Intune portal
and navigate to the Endpoint protection blade, right into the Account protection
view.
Here create a new policy:
The policy needs to be from the Local user group membership
type:
Define a Name
and Description
as you like:
Now click on + Add
and choose one of the well-known local groups from Windows.
Here we will configure the Administrators
group. If you want you can check multiple groups but for a simpler
management I would recommend to split them up.
You can choose between
Add (Update)
Remove (Update)
Add (Replace)
Now of course we need to define users. Here we habe the option to pick Users/Groups
with a simple picker from Entra ID.
Or a Manual
mode. I would preferr the Manual mode as this is the only option to also add the local Administrator account build-in to Windows.
If you want to use Windows Laps then you defenitely want to add this account and ensure that it is in the local Administrators group.
For this example we will choose Manual
for the above described usecase.
In Manual
mode you can add [local] Usernames
, [entraId or AD] Domain/Username
and SID
to a group policy.
There is a nice tool available HERE to convert Entra ID Object IDs
from groups to SIDs. Which you need to add Entra ID groups.
This example policy has the SID from an Entra ID group, followed by an Entra ID user and the local Administrator account.
Using Intune to manage local Windows groups like “Administrators” and “Remote Desktop Users” simplifies administrative overhead and strengthens security in an enterprise environment. By setting clear Account Protection policies, organizations can ensure that only authorized users have elevated privileges or remote access, reducing the risk of security breaches.