<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>All about Microsoft Intune</title>
	<atom:link href="https://petervanderwoude.nl/feed/" rel="self" type="application/rss+xml" />
	<link>https://petervanderwoude.nl</link>
	<description>Peter blogs about Microsoft Intune, Microsoft Intune Suite, Windows Autopilot, Configuration Manager and more</description>
	<lastBuildDate>Mon, 13 Apr 2026 17:50:06 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://petervanderwoude.nl/wordpress/wp-content/uploads/cropped-Peter-logo-2-32x32.png</url>
	<title>All about Microsoft Intune</title>
	<link>https://petervanderwoude.nl</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">104754288</site>	<item>
		<title>Working with the automatic enablement of Windows hotpatch security updates</title>
		<link>https://petervanderwoude.nl/post/working-with-the-automatic-enablement-of-windows-hotpatch-security-updates/</link>
					<comments>https://petervanderwoude.nl/post/working-with-the-automatic-enablement-of-windows-hotpatch-security-updates/#respond</comments>
		
		<dc:creator><![CDATA[Peter van der Woude]]></dc:creator>
		<pubDate>Mon, 13 Apr 2026 17:45:00 +0000</pubDate>
				<category><![CDATA[Microsoft Intune]]></category>
		<category><![CDATA[Windows 11]]></category>
		<category><![CDATA[Windows Autopatch]]></category>
		<category><![CDATA[Windows hotpatch]]></category>
		<category><![CDATA[Window Autopatch]]></category>
		<guid isPermaLink="false">https://petervanderwoude.nl/?p=23154</guid>

					<description><![CDATA[This week is all about the recently introduced configuration that will enable Windows hotpatch security updates by default. The configuration to enable the usage of hotpatch security updates has been available since the introduction of Windows 11 version 24H2, and can be configured relatively as shown in this post. Starting with the Windows security update of May 2026, Windows Autopatch will enable hotpatch security updates by default. That should help organizations with easier getting more secure. The configuration is achieved via a tenant-wide configuration via Windows Autopatch that is only applied when no quality update policies are applied to the device. That configuration is available in Microsoft Intune and will be enabled by default. This post will provide a closer look at that new tenant-wide ... <p class="read-more-container"><a title="Working with the automatic enablement of Windows hotpatch security updates" class="read-more button" href="https://petervanderwoude.nl/post/working-with-the-automatic-enablement-of-windows-hotpatch-security-updates/#more-23154" aria-label="Read more about Working with the automatic enablement of Windows hotpatch security updates">Read more</a></p>]]></description>
		
					<wfw:commentRss>https://petervanderwoude.nl/post/working-with-the-automatic-enablement-of-windows-hotpatch-security-updates/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">23154</post-id>	</item>
		<item>
		<title>Managing geolocation access for websites in Microsoft Edge</title>
		<link>https://petervanderwoude.nl/post/managing-geolocation-access-for-websites-in-microsoft-edge/</link>
					<comments>https://petervanderwoude.nl/post/managing-geolocation-access-for-websites-in-microsoft-edge/#comments</comments>
		
		<dc:creator><![CDATA[Peter van der Woude]]></dc:creator>
		<pubDate>Mon, 06 Apr 2026 17:45:00 +0000</pubDate>
				<category><![CDATA[Microsoft Edge]]></category>
		<category><![CDATA[Microsoft Intune]]></category>
		<category><![CDATA[Windows 11]]></category>
		<guid isPermaLink="false">https://petervanderwoude.nl/?p=23141</guid>

					<description><![CDATA[This week is all about managing (geo)location access for websites in Microsoft Edge. When apps are allowed access to the location of the user, that also includes the Microsoft Edge browser. That means that &#8211; depending on the configuration in Microsoft Edge &#8211; every website could potentially access the location of the user, or at least ask the user for access. Within Microsoft Edge there are, however, controls available that can be used for controlling the access of websites to the location of the user. Those controls enable the organization to define the default behavior, and also the behavior for specific websites. That enables a layered level of control over the location access in Microsoft Edge. The first layer is the access of apps in ... <p class="read-more-container"><a title="Managing geolocation access for websites in Microsoft Edge" class="read-more button" href="https://petervanderwoude.nl/post/managing-geolocation-access-for-websites-in-microsoft-edge/#more-23141" aria-label="Read more about Managing geolocation access for websites in Microsoft Edge">Read more</a></p>]]></description>
		
					<wfw:commentRss>https://petervanderwoude.nl/post/managing-geolocation-access-for-websites-in-microsoft-edge/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">23141</post-id>	</item>
		<item>
		<title>Restoring Windows during first sign-in</title>
		<link>https://petervanderwoude.nl/post/restoring-windows-during-first-sign-in/</link>
					<comments>https://petervanderwoude.nl/post/restoring-windows-during-first-sign-in/#comments</comments>
		
		<dc:creator><![CDATA[Peter van der Woude]]></dc:creator>
		<pubDate>Mon, 23 Mar 2026 18:45:00 +0000</pubDate>
				<category><![CDATA[Microsoft Intune]]></category>
		<category><![CDATA[Windows 11]]></category>
		<category><![CDATA[Windows Backup for Organizations]]></category>
		<guid isPermaLink="false">https://petervanderwoude.nl/?p=23134</guid>

					<description><![CDATA[This week is all about the recently introduced Windows Restore functionality during first sign-in. That functionality is part of the Windows Backup for Organizations feature. That feature on itself not new, but the ability to restore during first sign-in is. Before, the ability to restore the configuration was only available as a tenant-wide configuration that would be available during out-of-box-experience (OOBE). For the basics to get started with Windows Backup for Organizations have a look at this previous post. This post will look at the new functionality to restore during the first sign-in. That functionality does not rely on a tenant-wide configuration, and can be assigned to specific groups of users or devices. The scope of the restore, however, remains the same. This post will ... <p class="read-more-container"><a title="Restoring Windows during first sign-in" class="read-more button" href="https://petervanderwoude.nl/post/restoring-windows-during-first-sign-in/#more-23134" aria-label="Read more about Restoring Windows during first sign-in">Read more</a></p>]]></description>
		
					<wfw:commentRss>https://petervanderwoude.nl/post/restoring-windows-during-first-sign-in/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">23134</post-id>	</item>
		<item>
		<title>Understanding the profile assignment of multi-app kiosk mode on Windows 11</title>
		<link>https://petervanderwoude.nl/post/understanding-the-profile-assignment-of-multi-app-kiosk-mode-on-windows-11/</link>
					<comments>https://petervanderwoude.nl/post/understanding-the-profile-assignment-of-multi-app-kiosk-mode-on-windows-11/#comments</comments>
		
		<dc:creator><![CDATA[Peter van der Woude]]></dc:creator>
		<pubDate>Mon, 16 Mar 2026 18:45:00 +0000</pubDate>
				<category><![CDATA[Microsoft Intune]]></category>
		<category><![CDATA[Multi-app kiosk]]></category>
		<category><![CDATA[Windows 11]]></category>
		<guid isPermaLink="false">https://petervanderwoude.nl/?p=23120</guid>

					<description><![CDATA[This week is all about multi-app kiosk mode on Windows 11. That on itself is not something really new and to get started with that, have a look at this post around configuring multi-app kiosk mode on Windows 11. The documentation, however, is getting better and better, by describing more and more capabilities for multi-app kiosk mode on Windows 11. One of the challenges used to be the profile assignment of the multi-app kiosk mode configuration. Especially when looking at an autologon scenario. There are now configurations available to address basically all of the different scenarios that could be required. From autologon, to global assignment, to individual assignments, to group assignments. And from local accounts to Entra accounts. This post will provide a closer look ... <p class="read-more-container"><a title="Understanding the profile assignment of multi-app kiosk mode on Windows 11" class="read-more button" href="https://petervanderwoude.nl/post/understanding-the-profile-assignment-of-multi-app-kiosk-mode-on-windows-11/#more-23120" aria-label="Read more about Understanding the profile assignment of multi-app kiosk mode on Windows 11">Read more</a></p>]]></description>
		
					<wfw:commentRss>https://petervanderwoude.nl/post/understanding-the-profile-assignment-of-multi-app-kiosk-mode-on-windows-11/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">23120</post-id>	</item>
		<item>
		<title>Blocking the Microsoft Store Web Installer using Entra Internet Access</title>
		<link>https://petervanderwoude.nl/post/blocking-the-microsoft-store-web-installer-using-entra-internet-access/</link>
					<comments>https://petervanderwoude.nl/post/blocking-the-microsoft-store-web-installer-using-entra-internet-access/#comments</comments>
		
		<dc:creator><![CDATA[Peter van der Woude]]></dc:creator>
		<pubDate>Mon, 09 Mar 2026 18:45:00 +0000</pubDate>
				<category><![CDATA[Global Secure Access]]></category>
		<category><![CDATA[Microsoft Entra]]></category>
		<category><![CDATA[Microsoft Entra Internet Access]]></category>
		<category><![CDATA[Microsoft Intune]]></category>
		<category><![CDATA[Microsoft Store]]></category>
		<category><![CDATA[Windows 11]]></category>
		<guid isPermaLink="false">https://petervanderwoude.nl/?p=23110</guid>

					<description><![CDATA[This week is all about addressing a really specific scenario and that scenario is related to the Microsoft Store. Many organizations are preventing access to the Microsoft Store app by using the policy setting Turn off the Store application. That policy setting, however, does literally what the name implies, it turns off the Store application. That does not prevent users from navigating to apps.microsoft.com, downloading an app and installing it directly. In the early days that download option did not exist, meaning that this scenario did not exist. That all changed with the Microsoft Store Web Installer. The Microsoft Store Web Installer is a standalone installer for Store apps that helps with downloading and installing apps from apps.microsoft.com. It basically creates a stub .exe-based installer ... <p class="read-more-container"><a title="Blocking the Microsoft Store Web Installer using Entra Internet Access" class="read-more button" href="https://petervanderwoude.nl/post/blocking-the-microsoft-store-web-installer-using-entra-internet-access/#more-23110" aria-label="Read more about Blocking the Microsoft Store Web Installer using Entra Internet Access">Read more</a></p>]]></description>
		
					<wfw:commentRss>https://petervanderwoude.nl/post/blocking-the-microsoft-store-web-installer-using-entra-internet-access/feed/</wfw:commentRss>
			<slash:comments>7</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">23110</post-id>	</item>
		<item>
		<title>Disabling MDM enrollment when adding work or school account</title>
		<link>https://petervanderwoude.nl/post/disabling-mdm-enrollment-when-adding-work-or-school-account/</link>
					<comments>https://petervanderwoude.nl/post/disabling-mdm-enrollment-when-adding-work-or-school-account/#comments</comments>
		
		<dc:creator><![CDATA[Peter van der Woude]]></dc:creator>
		<pubDate>Mon, 02 Mar 2026 18:45:00 +0000</pubDate>
				<category><![CDATA[MDM]]></category>
		<category><![CDATA[Microsoft Entra]]></category>
		<category><![CDATA[Microsoft Intune]]></category>
		<category><![CDATA[Windows 11]]></category>
		<guid isPermaLink="false">https://petervanderwoude.nl/?p=23097</guid>

					<description><![CDATA[This week is all about a recently introduced setting in the automatic enrollment configuration of Windows devices, and that setting is Disable MDM enrollment when adding work or school account. That is a setting that many IT administrators have been waiting for, as it addresses that terrible experience when adding a work or school account to an app. That was the fantastic checkbox experience in which the user had to uncheck Allow my organization to manage my device to prevent a (personal) device from being enrolled into Microsoft Intune. Luckily, that has changed for the better. That whole experience got a whole lot better, as the new recently introduced experience differentiates with two screens between app sign-in and device management. Best part of it, with ... <p class="read-more-container"><a title="Disabling MDM enrollment when adding work or school account" class="read-more button" href="https://petervanderwoude.nl/post/disabling-mdm-enrollment-when-adding-work-or-school-account/#more-23097" aria-label="Read more about Disabling MDM enrollment when adding work or school account">Read more</a></p>]]></description>
		
					<wfw:commentRss>https://petervanderwoude.nl/post/disabling-mdm-enrollment-when-adding-work-or-school-account/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">23097</post-id>	</item>
		<item>
		<title>Managing Copilot in Microsoft Edge</title>
		<link>https://petervanderwoude.nl/post/managing-copilot-in-microsoft-edge/</link>
					<comments>https://petervanderwoude.nl/post/managing-copilot-in-microsoft-edge/#comments</comments>
		
		<dc:creator><![CDATA[Peter van der Woude]]></dc:creator>
		<pubDate>Mon, 23 Feb 2026 18:45:00 +0000</pubDate>
				<category><![CDATA[Copilot Search]]></category>
		<category><![CDATA[Microsoft Edge]]></category>
		<category><![CDATA[Microsoft Edge for Business]]></category>
		<category><![CDATA[Microsoft Intune]]></category>
		<category><![CDATA[Windows 11]]></category>
		<guid isPermaLink="false">https://petervanderwoude.nl/?p=23085</guid>

					<description><![CDATA[This week is all about managing Copilot within Microsoft Edge. There were already some nice configurations available for a while and recently an additional configuration was added around sharing tenant-approved browser history with Copilot search. That was a nice trigger for this post, focused on managing those available configurations. Working with Copilot in Microsoft Edge, does often require the organization to make that functionality available to the users. The good part is that it is often already disabled by default when using an organizational account. Especially in the EU, Copilot in Microsoft Edge has some default constraints that can be adjusted when needed. That is for example applicable to configuration around accessing Microsoft Edge page content for Entra accounts. This post will provide a closer ... <p class="read-more-container"><a title="Managing Copilot in Microsoft Edge" class="read-more button" href="https://petervanderwoude.nl/post/managing-copilot-in-microsoft-edge/#more-23085" aria-label="Read more about Managing Copilot in Microsoft Edge">Read more</a></p>]]></description>
		
					<wfw:commentRss>https://petervanderwoude.nl/post/managing-copilot-in-microsoft-edge/feed/</wfw:commentRss>
			<slash:comments>5</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">23085</post-id>	</item>
		<item>
		<title>Getting started with point-in-time restore in Windows</title>
		<link>https://petervanderwoude.nl/post/getting-started-with-point-in-time-restore-in-windows/</link>
					<comments>https://petervanderwoude.nl/post/getting-started-with-point-in-time-restore-in-windows/#respond</comments>
		
		<dc:creator><![CDATA[Peter van der Woude]]></dc:creator>
		<pubDate>Mon, 16 Feb 2026 18:45:00 +0000</pubDate>
				<category><![CDATA[Microsoft Intune]]></category>
		<category><![CDATA[Point-in-time restore]]></category>
		<category><![CDATA[Windows 11]]></category>
		<guid isPermaLink="false">https://petervanderwoude.nl/?p=23070</guid>

					<description><![CDATA[This week is all about another restore capability in Windows, and that capability is point-in-time restore. Recently, Microsoft has introduced many new features related to the backup, restore and recovery of Windows. That started with Quick Machine Recovery, which is focused on recovering Windows devices when encountering critical errors that prevent the device from booting, and that was quickly followed by Windows Backup for Organizations, which is focused on making it easier to switch towards new Windows devices. Now, the next addition is point-in-time restore, which is focused on restoring a Windows device to the exact state of that earlier point in time. Point-in-time restore relies on restore points that are stored locally on the device and that are captured by using Volume Shadow Copy ... <p class="read-more-container"><a title="Getting started with point-in-time restore in Windows" class="read-more button" href="https://petervanderwoude.nl/post/getting-started-with-point-in-time-restore-in-windows/#more-23070" aria-label="Read more about Getting started with point-in-time restore in Windows">Read more</a></p>]]></description>
		
					<wfw:commentRss>https://petervanderwoude.nl/post/getting-started-with-point-in-time-restore-in-windows/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">23070</post-id>	</item>
		<item>
		<title>Being careful with the ability to configure the preferred Entra tenant domain name</title>
		<link>https://petervanderwoude.nl/post/being-careful-with-the-ability-to-configure-the-preferred-entra-tenant-domain-name/</link>
					<comments>https://petervanderwoude.nl/post/being-careful-with-the-ability-to-configure-the-preferred-entra-tenant-domain-name/#comments</comments>
		
		<dc:creator><![CDATA[Peter van der Woude]]></dc:creator>
		<pubDate>Mon, 09 Feb 2026 18:45:00 +0000</pubDate>
				<category><![CDATA[Microsoft Intune]]></category>
		<category><![CDATA[Windows 11]]></category>
		<guid isPermaLink="false">https://petervanderwoude.nl/?p=23057</guid>

					<description><![CDATA[This week will be a relatively short blog post about a relatively often seen challenge with the configuration to set the preferred Entra tenant domain name. More specifically, this post will be about the PreferredAadTenantDomainName policy setting. That setting can be used by an IT administrator to basically preconfigure the tenant domain name for the user. Practically that would mean that when the organization uses the @petervanderwoude.nl tenant domain name, this policy setting would be configured with petervanderwoude.nl and would make sure that the user only has to specify their username without the tenant domain name to actually sign in to the device. That can provide a much easier experience. It does, however, come with some drawbacks that should be taken into consideration. The main ... <p class="read-more-container"><a title="Being careful with the ability to configure the preferred Entra tenant domain name" class="read-more button" href="https://petervanderwoude.nl/post/being-careful-with-the-ability-to-configure-the-preferred-entra-tenant-domain-name/#more-23057" aria-label="Read more about Being careful with the ability to configure the preferred Entra tenant domain name">Read more</a></p>]]></description>
		
					<wfw:commentRss>https://petervanderwoude.nl/post/being-careful-with-the-ability-to-configure-the-preferred-entra-tenant-domain-name/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">23057</post-id>	</item>
		<item>
		<title>Getting started with the PowerShell script installer for Win32 apps</title>
		<link>https://petervanderwoude.nl/post/getting-started-with-the-powershell-script-installer-for-win32-apps/</link>
					<comments>https://petervanderwoude.nl/post/getting-started-with-the-powershell-script-installer-for-win32-apps/#comments</comments>
		
		<dc:creator><![CDATA[Peter van der Woude]]></dc:creator>
		<pubDate>Mon, 02 Feb 2026 18:45:00 +0000</pubDate>
				<category><![CDATA[Microsoft Intune]]></category>
		<category><![CDATA[PowerShell]]></category>
		<category><![CDATA[Win32 app]]></category>
		<category><![CDATA[Win32 app installer type]]></category>
		<category><![CDATA[Windows 11]]></category>
		<category><![CDATA[Powershell]]></category>
		<guid isPermaLink="false">https://petervanderwoude.nl/?p=23046</guid>

					<description><![CDATA[This week is all about the recently introduced functionality to use PowerShell scripts for installing and uninstalling Win32 apps. That functionality enables IT administrators to use a PowerShell script as the installer type for Win32 apps. To make that a little bit more concrete; it enables the IT administrator to select a PowerShell script that should be used for installing a Win32 app. Before it was already possible to use a PowerShell script within the command line for the installation of a Win32 app, but that always had to be a script that existed within the Win32 app content. The major challenge with that approach was that every adjustment to that PowerShell script would require building a new Win32 app. That was far from ideal, ... <p class="read-more-container"><a title="Getting started with the PowerShell script installer for Win32 apps" class="read-more button" href="https://petervanderwoude.nl/post/getting-started-with-the-powershell-script-installer-for-win32-apps/#more-23046" aria-label="Read more about Getting started with the PowerShell script installer for Win32 apps">Read more</a></p>]]></description>
		
					<wfw:commentRss>https://petervanderwoude.nl/post/getting-started-with-the-powershell-script-installer-for-win32-apps/feed/</wfw:commentRss>
			<slash:comments>5</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">23046</post-id>	</item>
	</channel>
</rss>
