I’m sure many of you are receiving this on the way back from MMS, hopefully you’ve had a great time. On the plus side, use that downtime in the airport to catch up on the latest Intune content!!
If you couldn’t make it this year, enjoy the sunshine and the content, there are still tickets for Workplace Ninjas UK to get your conference fix (and I’ll be there)
Community Content
We start this week with a useful tip (and examples) from Jóhannes Geir Kristjánsson on using win32 apps without a fixed installer, great for deploying files etc. (or Adam’s photo)
As well as presenting at MMS, Michael Niehaus has also managed to publish four posts this week! We start with one I’m often asked, why do my devices automatically encrypt even though there aren’t any BitLocker policies assigned? Find out here
Michael has also released a new version of the excellent Autopilot Branding package (which if you attended MMS, you probably know about already)
If you’re having issues editing certain registry keys, the new UCPD driver could be the cause, learn more in this post
A way to speed up first login is to hide the initial setup UI screens. Michael looks at what they do and how to hide them here
We all have those old device groups, maybe it has a useful name, or even better a description, but that still doesn’t help work out what’s inside it. Fortunately this script from Dustin Gullett will show the primary user of the devices
Need-to-Know Entra Device Group Info? This Script Has Your Back
Dustin also has a script to change the primary user of a device to the last logged in user here
Enrollment time grouping is a critical new addition to help speed up pretty much everything during enrollment of devices. This post from Peter van der Woude looks at how it works with Android devices
Whilst you can use user attributes for user-based Entra groups, wouldn’t it be great if you could drop their devices in instead? Here is a script from Damien Van Robaeys to do just that
https://www.systanddeploy.com/2025/05/create-and-populate-device-group-based.html
Intune filters have had an update. If you haven’t used them before, or want to find out what has changed, you can find it all in this post from Roman Padrun, it even has some useful examples
https://www.cloudcook.ch/intune-filters-even-more-ways-to-deploy-regret/
Automate your network profile locations with this remediation from Nick Benton
https://www.oddsandendpoints.co.uk/posts/windows-network-profile-locations/
You can now move your Windows 365 machines between regions. Find out how here from Niall Brady
Moving one or more Windows 365 Cloud PCs to another location
If you are looking to get started with Global Secure Access, check out this post from Niklas Tinner
Autocorrect is one of those things that many take for granted, but when they lose years of them, they get very upset! Learn how to deploy custom autocorrect settings, or use this information to backup and restore them here from Gannon Novak
https://smbtothecloud.com/deploy-custom-microsoft-word-autocorrect-replacement-settings-with-intune/
Shehan Perera has part one of a new series covering cloud native endpoints, worth keeping an eye on if you are looking at making the jump
For macOS admins everywhere, Somesh Pathak has created a LAPS solution for your devices
Modern macOS LAPS: Local Admin Password Management with Intune and Key Vault
Video Content
Onto the video content with a run-through and script to trigger Windows update from Chander Mani Pandey
Microsoft Content
Now for this weeks Microsoft content, starting with a look at the exciting improvements for the Windows App on the web from Saumyaa Krishnan
If you need to be DoD compliant, Chris Vetter runs through deploying DISA STIGs with Intune here
Some new features for Autopatch, hotpatch and better control of the data sharing configuration, find out more from Chris Tulip
Intune is now a perfect platform for macOS as well as the others, learn how to not only manage your macs, but also migrate from other MDMs in this post from Neil Johnson
That’s it for this week, have a great weekend and safe travels for those coming home from MMS