Understanding How MDM Policies are Applied in Windows 10
Group Policy has been around for 20 years but as more organizations look to manage an ever-mobile workforce, Mobile Device Management is often better suited to configuring and securing Windows endpoints. In this article, we’ll discover how Mobile Device Management policies are processed in Windows.
Group Policy settings are not tattooed onto the registry
Windows has several different management technologies built in that organizations use to secure and configure servers and end-user devices. Group Policy was introduced in Windows 2000 as part of Active Directory (AD), replacing Windows NT System Policies. Group Policy is a powerful tool that can reduce total cost of ownership by helping IT to maintain standard configuration settings on Windows servers and PCs.
Unlike NT System Policies, true Group Policy settings are not tattooed onto the registry. When a Group Policy Object (GPO) in AD is no longer applied to a device or user, settings are reverted to their previous values. Group Policy settings are locked and cannot be changed by users. But Group Policy Preferences differ in that users can change Preference settings. Although administrator-configured Preference values are reapplied every time Group Policy is refreshed.
For more information on working with Group Policy, read How to Create and Link a Group Policy Object in Active Directory and How to Create a Group Policy Central Store on Petri.
MDM is designed to work without Active Directory
Group Policy is still the tool of choice for managing AD domain-joined devices that spend most of their time connected to a corporate intranet and/or for granular control of Windows settings. But as more employees work remotely and companies move management technologies to the cloud, Microsoft has added support for Mobile Device Management (MDM) to Windows.
MDM is a technology, like Group Policy, for managing configuration settings. But MDM is designed to work without Active Directory.
MDM Configuration Service Providers
MDM Configuration Service Providers (CSP) are similar to Group Policy Client-Side Extensions (CSE). Each CSP is responsible for managing a defined group of configuration settings in Windows. For example, there are Network and Defender CSPs that are responsible for managing network and Windows Defender settings, respectively.
Until recently, most CSPs tattooed settings. Meaning that if an MDM policy was removed from a device or user, the settings were not reverted to their original values. Although there were some exceptions to this rule, like settings configured in Wi-Fi, VPN, Certificate, and Email profiles.
But this behavior has now changed and been rolled back into currently supported versions of Windows 10. According to an article on Microsoft’s website:
When a profile is removed or no longer assigned to a device, different things can happen, depending on the settings in the profile. The settings are based on CSPs, and each CSP can handle the profile removal differently. For example, a setting might keep the existing value, and not revert back to a default value. The behavior is controlled by each CSP in the operating system. For a list of Windows CSPs, see configuration service provider (CSP) reference.
To change a setting to a different value, create a new profile, configure the setting to Not configured, and assign the profile. Once applied to the device, users should have control to change the setting to their preferred value.
When configuring these settings, we suggest deploying to a pilot group. For more Intune rollout advice, see create a rollout plan.
Most CSPs in Windows 10 no longer tattoo settings, making the behavior of MDM profiles similar to Group Policy settings. But you should bear in mind that while Windows 10 now supports non-tattooed MDM settings, this behavior is dependent on each individual CSP.
Now you understand more about how MDM settings are applied in Windows 10, let’s look at how MDM policies are processed.
- The Windows MDM client receives the configuration settings from the MDM service.
- The Open Mobile Alliance – Uniform Resource Identifiers (OMA-URI) in the configuration file define the settings to be configured on the client.
- The OMA-URIs are mapped to the relevant CSPs on the client, which then handle modifying settings if necessary. OMA-URIs are not directly visible in Intune, Microsoft’s MDM solution.
- If a policy changes on the MDM service, the new policy is sent to the client and the CSP updates the setting(s) as required.
MDM policy refresh
Policies can be enforced in Windows 10 version 1903 and later with policy refresh. Before Windows 10 1903, users could change settings configured by MDM. Settings would only be set again by the MDM service if a policy was changed and pushed to the client to be reapplied.
Although there is one caveat. The Policy CSP is currently the only CSP that refreshes. So, like non-tattooed settings, policy refresh is controlled individually by each CSP.
For more details on working with MDM, see Introduction to Microsoft Intune, Microsoft Intune: Windows 10 Device Enrollment, and How to Improve Remote Worker Security Using Microsoft Intune on Petri.
More in Windows 10
Microsoft Changes its Release Schedule for Optional Windows Updates
Mar 22, 2023 | Laurent Giret
Microsoft Releases PowerShell Scripts to Fix WinRE BitLocker Flaw on Windows 11 and 10
Mar 17, 2023 | Rabia Noureen
March Patch Tuesday Updates Bring New Windows 11 Features and Fixes for 74 Vulnerabilities
Mar 14, 2023 | Laurent Giret
Microsoft Removes Edition Checks for AppLocker Deployment on Windows 10 and 11
Mar 13, 2023 | Rabia Noureen
How to Enable Hyper-V in Windows 10
Mar 13, 2023 | Michael Reinders
Windows Update for Business Reports Now Help IT Admins Monitor Bandwidth Usage
Mar 9, 2023 | Rabia Noureen
Most popular on petri