Menu
CCMEXEC.COM – Enterprise Mobility
  • Home
  • General
  • Configuration Manager
  • Windows 10
  • Windows 11
  • Intune
  • GitHub
  • About
CCMEXEC.COM – Enterprise Mobility

Managing shared devices and app deployment in Intune

Posted on February 13, 2024February 13, 2024 by Jörgen Nilsson

Shared devices in Intune is something that pop-ups in every project where we move to Intune and Entra Joined devices. When using Intune and available user apps it is enforced by the Company Portal app if you are allowed to install an available app or not based on Primary user of the device. In some scenarios when we push required apps to users they end up on all shared devices as Primary user is only enforced for available apps. This is a huge difference when migrating from Configuration Manager where we have more options. This is important when designing and planning our shared devices strategy.

Intune user targeting cheat sheet
 Company portal Available user appRequired User App
Primary userYY
Non-Primary userXY
No Primary user in IntuneYY
Self-deployingYY
Intune user targeting

This means that we maybe don’t necessarily choose to install the Company Portal on shared devices it depends on the scenario.

Shared device design checklist:

Deploying shared devices in Intune requires planning, many things differ from a personal device, for example for a personal device we can still use Microsoft NPS and user based certificate authentication but for a shared device this is a bad experience as we need to wait for the certificate to come down for the user.
– How are apps supposed to be deployed to the shared devices?
– Install the Company Portal or not?
– Filter out required apps that shouldn’t be installed
– Network access, we prefer cable as self-deploying devices requires no hands on in this scenario, in modern offices this is a big challenge
– Network access, device based certificate authentication is prefered as many users need to log on to the device = No Microsoft NPS
– Devices must be imported in Autopilot, deploying the .json file using MDT/SCCM does not work. Windows Autopilot for existing devices | Microsoft Learn
– Devices must have TPM 2.0 and support TPM attestation Windows Autopilot self-deploying mode (Public Preview) | Microsoft Learn
– Deploy security settings and compliance policies to the shared devices
– Exclude from Windows Hello for business policy as only ten users can enroll in WHfB per device, evaluate passwordless for example web-sign in instead. Windows Hello for Business Frequently Asked Questions (FAQ) – Windows Security | Microsoft Learn


To solve required applications we can go about it in two different ways either use a PowerShell script as an application requirement checking if the device is joined to Microsoft Entra using the “autopilot@tenant.onmicrosoft.com” user account. Or we can use a filter to filter out all devices deployed with a self-deploying.
The screenshot below is from a self-deploying Windows 11 device.

Option 1: PowerShell script as an app requirement

The script can be downloaded from Github: https://github.com/Ccmexec/Intune-MEM

# Script to check if the device is deployed as a self-deploying device
# Written by Jörgen Nilsson
# ccmexec.com
function Get-EnrolledUser {
    # Get the UPN of the user that enrolled the computer to AAD
    $AADInfo = Get-Item "HKLM:/SYSTEM/CurrentControlSet/Control/CloudDomainJoin/JoinInfo"

    $guids = $AADInfo.GetSubKeyNames()
    foreach ($guid in $guids) {
        $guidSubKey = $AADinfo.OpenSubKey($guid);
        $UPN = $guidSubKey.GetValue("UserEmail");
    }
    $UserName = ($UPN -split ("@"))[0]
    Write-Output $UserName
}

if (Get-EnrolledUser -eq "autopilot") {
    return $true
}
else {
    return $false
}

Adding this as a requirement as shown below will make sure it is only installed on “non” self-deploying” devices.

The deployment status shows the result as well

Option 2: Use a filter

Filters are simply great! We can create a filter that includes all our self-deploying devices and then user this to filter out our shared devices when we deploy our applications.

I hope this is useful when planning and deploying shared devices.

1 thought on “Managing shared devices and app deployment in Intune”

  1. Pingback: Intune Newsletter - 16th February 2024 - Andrew Taylor

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

My name is Jörgen Nilsson and I work as a Senior Consultant at Onevinn in Malmö, Sweden. This is my blog where I will share tips and stuff for my own and everyone elses use on Enterprise Mobility and Windows related topics.
All code is provided "AS-IS" with no warranties.

Recent Posts

  • Windows 365 Link – a week and some
  • Prevent software installations disguised as drivers
  • Tip when troubleshooting unexpected reboots during Autopilot – event ID 2800
  • New settings in Intune Security Baseline Windows 11 24H2 -2504
  • Managing extensions in Visual Studio Code
©2025 CCMEXEC.COM – Enterprise Mobility | WordPress Theme by Superb Themes
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish.Accept Reject Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT