Intune Assignments User Groups vs Device Groups

Intune Assignments User Groups vs Device Groups: When you set up an Intune deployment, you need to choose a group to assign it to, either a user group or a device group. There isn’t one right or wrong option because both can work. What matters is knowing how each choice affects who gets the deployment and when it applies. Some deployment can only be applied to device group only while some deployments are more suited to target users rather than devices.

By the end of this post, you’ll understand when to use a user group and when to use a device group for any Intune deployment. I’ve also included a simple decision matrix to make this decision easier and quicker.

If you assign an Intune deployment to a device group, the settings/apps/policies etc. are applied at the device level and affect all users who sign in to that device. (Example: OS settings, Security settings, Autopilot, Shared/kiosk devices). Device based deployment writes to HKEY_LOCAL_MACHINE (HKLM) registry node.

If you assign an Intune deployment to a user group, the settings/apps/policies etc. are applied at the user level, and the experience follows the user across all their managed devices. (Example: Creating a desktop icon, deployment of LOB app for specific users etc.). User based deployment writes to HKEY_CURRENT_USER (HKCU) registry node.

Choosing the Right Group Type for Intune Deployments

  • Microsoft 365 groups: Don’t use these types of groups for Intune assignments as they are more designed towards collaboration.
  • Entra Security Groups (Static and Dynamic): Use Microsoft Entra security groups for Intune assignments; they’re designed for access control and support both users and devices. Use static groups for small pilot deployments or exclusions where you want manual control. Use dynamic groups when you need to apply a policy, app, or setting across larger user base, for grouping Autopilot devices, creating device category groups or for scope tags auto assignment to name a few scenarios.

Microsoft’s current recommendation is to use the All users and All devices virtual groups for policies and apps, instead of creating your own version of all users/all devices using Microsoft Entra dynamic groups and use filters to narrow down the targeting. For more details: filters-device-properties. For each tenant, there can be up to 200 filters. If you prefer to still use dynamic groups for your deployments, you can do so as dynamics groups are also fully supported. Microsoft Performance recommendation for grouping, targeting and filtering.

User Groups vs Device Groups

Below is a general matrix on what happens when you use a User group or a device group for Intune deployments.

CriteriaUser groupsDevice groups
When it evaluatesAfter user signs in on a deviceDuring device check-in, no user needed
ExperienceFollows the person across devicesConsistent setup per device
Best forProductivity apps, self-service catalog, per-user settingsSecurity policies, OS settings, Autopilot, shared or kiosk
Company PortalAvailable apps are user-centricDevice targeting is not ideal for “Available” apps
Autopilot and ESPNot evaluated before first sign-inEvaluated during ESP. Critical for pre-provisioning
Shared devices and labsCan spread to every device a user signs into Strong fit since it applies to any user on the device
Licensing alignmentPer-user licensesPer-device scenarios
Risk profileApp can install across many devicesLess personalization for multi-user devices

When to use a Device Group?

When you want an Intune deployment to apply at the device level, the policy is enforced on the device itself, so it applies to every user who signs in on that device. For example, if you want to disable spell checking in Microsoft Edge for all users on a particular device, create a policy and assign it to a Microsoft Entra security group that contains the device. The policy sticks to the device and if a user moves to another machine, the policy will not be applied.

Assigning a policy to a device group is ideal for Shared, Kiosk, or lab devices when you need consistent settings regardless of who signs in.

Settings Catalog items that are device-scoped (and most Endpoint Security policies) apply via the device channel and write under machine hive: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\PolicyManager\current.

Use Cases

  • OS configuration: Settings Catalog items that are device scope, hardening baselines, certificate profiles that are per device.
  • Autopilot and ESP: Apps and policies that must install during device ESP or pre-provisioning, before any user signs in.
  • Shared, kiosk, lab, VDI/AVD: Use device groups for Shared, Kiosk, VDI or Azure virtual desktop session host devices.
  • Per-machine apps: Win32 apps installed in system context, drivers, OEM utilities, agents that must be present for every user.
  • Updates: Windows Update for Business (WUfB) rings, feature updates, quality update policies.
  • Mobile and macOS device scope: Android dedicated devices, iOS supervised device features, macOS system or kernel extension payloads.

Different Scenario for Using Device Groups

Below are some of the scenario’s for using a Device based Entra security group for Intune deployments.

ScenarioWhy device group
BitLocker, Firewall, Defender, ASRSecurity must be applied at the device level, irrespective of who is signing on to the device.
Autopilot required appsMust install during ESP before first sign in
Shared room PCs or kiosksAny user should get the same apps and settings
AVD multi-sessionAzure Virtual Desktop multi-session is a special scenario. With virtual machines, device CSPs must target device groups. User CSPs must target user groups.
Windows Update for BusinessOS servicing is per device

Few Examples of Device group Usage

  • In a meeting room scenario, you want a locked down version of Edge for a device, regardless of who signs in. Create a policy and assign it to an Entra group with devices.
  • When you want to standardize local admin password rotation with Windows LAPS. Create the LAPS policy, add eligible endpoints to a devices group, and assign the policy to that group, so password management applies uniformly to all users on those devices.
  • When creating a profile to make changes in BIOS settings, use a device group.

When not to use a Device group

  • Per user licensing apps and preferences: For apps with user-based licensing and a limited number of seats, deploy at the user level (not the device level) so only users in the target group receive the app and consume a license.
  • BYOD/Personal devices: As you do not mange BYOD devices, its best to use a user group for intune app or policy deployments for personal devices.
  • MAM/App Protection & Managed App Config: these are strictly user targeted (do not use device groups).
  • Enrollment restrictions & access controls: user-driven controls (platform/device limits, Conditional Access) belong to user groups, not device groups.

When to use a User Group?

When you target an Intune deployment to a user group, it applies at the user level and follows the person across devices. For example, if you want to disable spell checking in Microsoft Edge for specific users wherever they sign in, create a user-scoped policy and assign it to a Microsoft Entra security group containing users. The setting travels with the user and does not affect other users on the same device.

Another example could be that when you want to configure any setting in OneDrive or Office app, this type of policy is generally applied to a user group. Example policy: OneDrive Auto sign-in, OneDrive KFM policy etc.

Settings Catalog items that are user-scoped apply via the user channel and write under user hive: HKEY_CURRENT_USER\SOFTWARE\Microsoft\PolicyManager\current.

When not to use a User group

  • When you want to apply the setting at the device level. That means, it will be applicable to all users using the device.
  • Before sign-in policies: Any policies that must be applied before the user signs in.
  • Endpoint Security: BitLocker, Defender AV, Firewall, ASR, LAPS etc.
  • Device-scoped Settings Catalog or ADMX (HKLM) items. It can be applied to the user group but recommendation is to assign it to device group.
  • Windows Update for Business (rings, feature, expedite)
  • Per-machine apps/agents: EDR, VPN (device tunnel), drivers, OEM utilities
  • Device certificates and Wi-Fi/VPN profiles using device auth.
  • DFCI/UEFI/BIOS or other firmware controls.
  • Shared/kiosk/AVD multi-session devices where every user needs the same setup.
  • Scripts/remediations that run as SYSTEM or write to HKLM.
  • An app targeted to user would span all across their managed devices. if the intention is to install the app only on a particular device, then do not use a user group.
  • When compliance must be enforced per device, independent of the user.

Best Practices

  • Avoid Mixing of User & Device groups.
  • Always test on Pilot users first before increasing the scope of the policy to other devices.

Decision Matrix for Selecting a Device Group vs User Group

Below is a decision matrix which can help you decide when to use a device group and a user group for Intune deployments.

Scenario/FeaturePreferred targetAlternate targetIntent (if any)Notes
Conditional Access (Entra ID)User groupCA targets users. Include or exclude specific devices using filters
Windows Update for Business (rings, feature, expedite)Device groupRequiredOS servicing is per device; use filters by build/model/ring.
Compliance policiesDevice group for corporate devicesUser group for BYOD/contractorsCompliance state is per device; pair with Conditional Access to enforce.
Endpoint Security (BitLocker, Defender AV/Firewall, ASR, LAPS)Device groupRequiredDevice-scoped security; ESP-friendly.
Device configuration – device scope (Settings catalog / ADMX / OMA-URI)Device groupUser group (applies after sign-in but still writes HKLM)RequiredMirrors GPO device scope; predictable during ESP.
Device configuration – user scope (Settings catalog / ADMX)User groupUser preferences follow the person; writes HKCU.
Certificates + Wi-Fi/VPNDevice group for device auth & device tunnelUser group for user auth & user tunnelRequiredMatch certificate scope to the Wi-Fi/VPN profile scope.
Applications – Win32, Required, system context (agents, drivers, shared/kiosk)Device groupRequiredReliable during ESP. Keep intents consistent.
Applications – Company Portal AvailableUser groupWin32 can be device or userAvailablePortal is user-centric; Win32 is the exception.
Shared / Kiosk / VDI labsDevice groupRequiredConsistent setup for any user who signs in.
Remove / Uninstall deprecated appMatch the original targetUninstallUse the same scope that installed it to avoid reinstall loops.
PowerShell / Shell scriptsDevice group when run as SYSTEMUser group when run as UserRun context decides HKLM vs HKCU impact.
Proactive remediationsDevice group when run as SYSTEMUser group when run as UserScope broadly (All devices/users) + Filters. Use a small exclusion group if required.
DFCI / UEFI / BIOS (e.g., Surface)Device groupRequiredFirmware control is device-centric.
Windows LAPSDevice groupRequiredLocal admin password rotation is per device.
Defender for Endpoint onboarding / EDR sensorDevice groupRequiredTreat onboarding and sensor settings as device posture.
Policy setsPick one model per set (device-centric or user-centric)The other modelAvoid mixing user & device targeting in the same set.
App Protection (MAM) & Managed App ConfigUser groupMAM is user-targeted; often combined with Conditional Access.
Enrollment restrictionsUser groupPlatform/device limit restrictions are user-scoped.
Windows driver/firmware updates (WUfB driver mgmt)Device groupRequiredUpdate servicing is per device; align with WUfB rings.
macOS / iOS / iPadOS software updatesDevice groupRequiredPlatform updates are device-centric.
Endpoint Privilege Management (EPM)Device groupRequiredElevation policies apply per device; consistent for all users.
App configuration for managed devices (not MAM)User group for roaming app prefsDevice group for shared/kiosk devicesUser targeting for personal settings; device for shared devices.
Android Enterprise modesDevice group for Dedicated/COBO (company owned, business only)User group for COPE (company owned, personally enabled) user appsSecurity/policy to devices; user apps to users.
Windows 365 Cloud PCs (provisioning)User groupWindows 365 provisioning uses user groups; post-provision Intune assignments follow normal rules.
M365 Apps / OneDrive / TeamsUser groupRequiredPer-user licensing and roaming UX.
Windows Autopilot Device Preparation (Autopilot v2)Device group (selected in the DP profile for Enrollment Time Grouping)User group (required in user-driven flow to identify eligible users)Required (apps/scripts selected in the DP policy)No device registration required; Microsoft Entra join only.

Devices are added to the specified device group at enrollment and receive only the apps/scripts selected for OOBE; other device-group items come after.

Autopilot profiles take precedence, so remove any Autopilot registration before using DP.
Windows Autopilot (classic v1)Device groupRequiredSupports user-driven, pre-provisioned, and self-deploying modes.

device registration required; broader customization and ESP phases (device and user). If both v1 and DP exist, v1 profile wins.

Settings Catalog Policy (Device Scope vs User Scope)

When a device check-in with Intune, it always presents a deviceID. A userID is sent only if a user is signed in at that time (or once they sign in and the next sync runs). Below screenshot shows an example of a settings catalog policy available for device scope and user scope both. Device scope policy will have (Device) at the end and user scope policy will have (User) at the end of its name.

Settings Catalog Policy (Device Scope vs User Scope)
  • Device-scoped policy | Assigned to a device: When a device scoped policy is assigned to the device, all users get the policy setting.
  • Device-scoped policy | Assigned to a user: After that user signs in and the device syncs, the device-level setting is applied to the machine and therefore affects all users on it.
  • User-scoped policy | Assigned to a device: The user setting is enforced for anyone who signs in to that device (similar to a “loopback merge” effect).
  • User-scoped policy | Assigned to a user: Only that specific user receives the setting, on any managed device they use.
  • Settings that exist in both scopes (user and device): If both are assigned, the user-scope version takes precedence.
  • Early check-ins without a signed-in user: Until a user profile exists, user-scoped settings can show as Not applicable; they evaluate once a user signs in and a sync occurs.

Leave a Comment