Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletter Hub
Free Learning
Arrow right icon
timer SALE ENDS IN
0 Days
:
00 Hours
:
00 Minutes
:
00 Seconds
Mastering Endpoint Management using Microsoft Intune Suite
Mastering Endpoint Management using Microsoft Intune Suite

Mastering Endpoint Management using Microsoft Intune Suite: Learn Everything About Intune Suite

Arrow left icon
Profile Icon Saurabh Sarkar Profile Icon Rahul Singh
Arrow right icon
NZ$53.09 NZ$58.99
eBook Nov 2025 392 pages 1st Edition
eBook
NZ$53.09 NZ$58.99
Paperback
NZ$73.99
Subscription
Free Trial
Arrow left icon
Profile Icon Saurabh Sarkar Profile Icon Rahul Singh
Arrow right icon
NZ$53.09 NZ$58.99
eBook Nov 2025 392 pages 1st Edition
eBook
NZ$53.09 NZ$58.99
Paperback
NZ$73.99
Subscription
Free Trial
eBook
NZ$53.09 NZ$58.99
Paperback
NZ$73.99
Subscription
Free Trial

What do you get with eBook?

Product feature icon Instant access to your Digital eBook purchase
Product feature icon Download this book in EPUB and PDF formats
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want
OR
Modal Close icon
Payment Processing...
tick Completed

Billing Address

Table of content icon View table of contents Preview book icon Preview Book

Mastering Endpoint Management using Microsoft Intune Suite

Elevating Endpoint Privilege Management with Control and Security

In this chapter, we will discuss the necessity of Endpoint Privilege Management (EPM) and its alignment with Microsoft’s Zero Trust principle. After covering the basics, we will conduct a brief comparison of EPM with competing third-party products. Subsequently, we will provide a detailed overview of the delivery and installation process of the EPM agent on devices, including the background processing during EPM policy delivery, accompanied by logs and registry entries at each step to aid in troubleshooting EPM-related issues. Finally, we will discuss the deployment strategy to follow when rolling out this feature, concluding with our two cents on the practical usability of this feature.

The following main topics will be covered:

  • Understanding the background and significance of EPM
  • Flow during EPM agent installation and communication
  • Understanding the directory, service logs, and registry...

Understanding the background and significance of EPM

In the opening section of this chapter, we will explore the importance of implementing EPM and examine the potential risks and vulnerabilities that can arise in its absence within an organization.

The need for EPM

In IT administration, security professionals often advocate against granting users administrative access to their devices. This stance is rooted in the belief that admin access can expose both the devices and the enterprise to significant vulnerabilities. With admin privileges, users can inadvertently install malicious files, leading to system-level changes that compromise security.

To mitigate these risks, security administrators prefer to limit users to standard user accounts. This restriction minimizes their privileges, preventing them from installing unauthorized applications and making critical system changes.

Here are the major risks associated with granting admins privileges to users:

    ...

Flow during EPM agent installation and communication

We’ll begin by examining the behind-the-scenes flow that takes place during the installation of the EPM agent on a device and its communication with the service post installation.

Agent installation flow

By default, the EPM agent is not present in the Windows OS. It is installed when the EPM elevation setting policy is deployed to the device. Let’s examine the background process during the EPM agent installation using the following diagram:

A diagram of a computer  AI-generated content may be incorrect.

Figure 2.2: Block diagram showing the flow of EPM agent installation

With the preceding block diagram as a reference, let’s walk through the background steps that lead to the installation of the EPM agent on the device:

  1. When the EPM elevation setting policy is deployed to the device, it automatically sends a Device Health Monitoring (DHM) policy to the device from Intune. This can be tracked in real time by examining the SyncML trace on the...

Understanding the directory, service logs, and registry

In this section, we’ll delve into the key files and .dlls involved in EPM’s operation and take a closer look at the relevant logs and registry entries. This is going to be very important while troubleshooting related issues.

Working directory

The working directory for EPM is located at C:\Program Files\Microsoft EPM Agent. Within this directory, we will find many folders that are essential for the processing of EPM. These folders contain various files, including .dll, .exe, .inf, .sys, .dat, and .config files. Additionally, this directory houses the log files for EPM, which we will examine in detail in the next section.

A screenshot of a computer  AI-generated content may be incorrect.

Figure 2.10: File/folder structure for EPM

Later in this chapter, we will explore how all these files within the EPM directory structure are utilized.

EPM logs

Understanding EPM log files is crucial, as they play a key role in diagnosing issues, identifying root causes...

Troubleshooting the flow

The following diagram illustrates the troubleshooting approach we should follow when addressing any EPM-related issues. It is essential to adhere to a systematic, phased approach. This troubleshooting method aligns with the flow we have established previously.

Figure 2.28: Block diagram illustrating the recommended troubleshooting approach for EPM issues

Let’s now examine each component in the diagram and outline a structured approach to troubleshooting EPM-related issues.

Step 1: Verifying EPM policy creation

Ensure that the EPM policy has been created correctly. This involves several checks within the console. For instance, if a user is unable to elevate a specific application using EPM, begin by verifying the elevation rule policy and the elevation setting policy in the portal. Confirm that the logic for detecting the application in the EPM rule policy is accurate (e.g., validating the file hash or certificate used for the application...

Gathering reports and insights

The EPM reports are accessible from the Reports tab within the Endpoint Privilege Management node in the Microsoft Intune admin center. Navigate to Endpoint security | Endpoint Privilege Management and select the Reports tab. The report data is retained for 30 days.

We have the following categories of elevation reports:

  • Managed elevation report: This report displays similar details to the elevation report but focuses only on elevations managed by a Windows elevation rule policy
  • Elevation report by applications: This report provides details for all managed and unmanaged elevations, aggregated by the application that was elevated
  • Elevation report by Publisher: This report displays details for all managed and unmanaged elevations, aggregated by the publisher of the application that was elevated
  • Elevation report by User: This report provides details for all managed and unmanaged elevations, aggregated by the user that was...

Deployment strategy

Rolling out EPM to devices is not a single-step process. It is essential to conduct thorough due diligence before deploying EPM and removing admin rights from users. Here, I have outlined the steps that can serve as our deployment strategy for rolling out EPM to our production users:

Figure 2.34: Block diagram illustrating the EPM deployment approach

Now, let’s discuss each of the blocks in detail.

Step 1: Onboarding devices to EPM in audit mode

In this step, we need to create an EPM elevation setting policy in Intune and assign it to the users/devices. This will install the EPM agent on the devices, collect relevant data, and send it to Intune for the administrator to review and act. This process is hidden from the end user, who will not notice any changes.

In order to create the EPM settings policy, we must go to the Intune admin center | Endpoint Security | EPM | Policies | Create Policy | Elevation Setting Policy and enable the...

Rolling out EPM

Rolling out EPM in a production environment involves multiple steps, as illustrated in the following diagram. On the device side, it’s essential to ensure that all EPM prerequisites are fulfilled and that the device is enrolled in Intune. On the administrative side, the Intune administrator must deploy EPM by configuring the appropriate policies. Finally, the rollout progress can be monitored by reviewing the logs discussed earlier in this chapter.

A white square with green text  Description automatically generated with low confidence

Figure 2.36: Block diagram illustrating the steps for EPM rollout

In this section, we are going to focus on the task at the admin end for onboarding devices to EPM.

There are two steps involved in the process.

Step 1: Creating the EPM elevation setting policy

This policy is going to enable the EPM functionality on the device. It is going to install the EPM agent and send diagnostic information from the device to the Intune service. Creating this is pretty straightforward; we just have to change...

When to use EPM and when not to

The preferred method for deploying applications should always be through Microsoft Intune using the Required intent, ensuring that essential applications are automatically installed on user devices. If there is uncertainty about whether a user needs a particular application, it should be deployed using the Available intent, allowing users to install it on demand via the Company Portal app.

When to use EPM

EPM should be used in specific cases such as the following:

  • A user needs to install an application that has not been pre-provisioned and is not commonly used across the organization
  • A user requires temporary elevation to run tools in an administrative context for legitimate troubleshooting or diagnostic purposes (e.g., using tools such as ProcMon, Command Prompt, or PowerShell with elevated privileges)

When not to use EPM

EPM is not intended to restrict or block the execution of applications. If the goal is to...

Our two cents

Making users administrators on their machines is never advisable. Therefore, we must first ensure that all users in our workforce are standard users.

Does this mean we need to assign EPM licenses to all users so they can elevate themselves to admin status for an application session? The answer is no. Our primary method for installing applications on devices should be to push them as required via Intune. If we are unsure whether an end user truly needs an application, we have the option to push those apps as Available. This makes the applications accessible in the Company Portal app, allowing users to download and install them as needed without requiring elevation to admin status.

EPM is designed for scenarios where users may need to perform extensive testing and install applications that are not commonly deployed by the admin through the Intune portal. Instead of relying on the admin to deploy the application, the user can request elevation for an application...

Summary

In this chapter, we explored the importance of EPM and its alignment with Microsoft’s Zero Trust principles. We examined the underlying processes involved in EPM agent installation and policy deployment. Additionally, we conducted a detailed review of relevant logs and registry entries to establish a structured approach to troubleshooting EPM-related issues. We also introduced the EPM tools at the device level that support diagnostics and validation. The chapter concluded with a discussion on EPM deployment strategies and an overview of supplementary reference resources to support further learning.

In the next chapter, we will delve into Enterprise App Management (EAM), a key component of the Intune Suite. This chapter will highlight how EAM enhances the efficiency of deploying and updating third-party applications across the organization.

Resources

Apart from official Microsoft docs, I highly recommend exploring the blogs by Rudy Oms (at https://call4cloud.nl). He is an exceptionally talented blogger who has authored insightful and technically rich articles on EPM, infused with a touch of humor. His blogs are invaluable resources and should be bookmarked by anyone planning to understand EPM in greater detail.

Join us on Discord

For discussions around the book and to connect with your peers, join us on Discord at https://discord.gg/dygzddgYCR

Left arrow icon Right arrow icon

Key benefits

  • Explore the most comprehensive resource on Microsoft Intune Suite’s premium tools
  • Overcome real-world Intune Suite challenges with EPM, Cloud PKI, and app management
  • Use AI-powered analytics to gain insights and streamline app deployment and support
  • Purchase of the print or Kindle book includes a free PDF eBook

Description

Mastering Endpoint Management using Microsoft Intune Suite is one of the first books focused solely on Microsoft’s premium Intune features, offering hands-on, in-depth coverage for IT admins, security professionals, and endpoint engineers. Co-authored by a Microsoft Intune Product Manager and a Principal Consultant who is also a Microsoft Certified Trainer (MCT), this book walks you through real-world implementation using backend architecture diagrams, registry insights, and troubleshooting techniques. You’ll start with cloud public key infrastructure (PKI), learning how to simplify certificate-based authentication. Then you’ll move on to endpoint privilege management (EPM) to enforce least-privilege access at scale. You will learn about Enterprise App Management, which helps you how to modernize app delivery, as well as Advanced Analytics, which reveals how to use Kusto Query Language (KQL) and Security Copilot for actionable insights. The book also covers Remote Help for secure support and Microsoft Tunnel for enabling BYOD access, and concludes with a curated list of essential Intune learning resources. By the end of this Intune book, you will have the practical expertise to implement, manage, and troubleshoot Intune Suite confidently in real-world enterprise environments.

Who is this book for?

If you’re an IT admin, UEM admin, security professional, consultant, or solutions architect focused on device management and security, this book is for you. It’s ideal for those deploying Intune Suite features, troubleshooting issues, or seeking a deeper understanding of its architecture and how it compares with third-party tools. Basic knowledge of device enrollment in Microsoft Intune is recommended.

What you will learn

  • Master endpoint management by effectively managing and securing endpoints with Intune Suite
  • Align with Microsoft's Zero Trust principle and least-privilege model by using EPM
  • Discover how to troubleshoot effectively by understanding underlying processes and the logs/registry
  • Understand real-world setups with detailed screenshots at each deployment step
  • Find out how to gain insights and make data-driven decisions by leveraging Advanced Analytics
  • Understand how to streamline/automate third-party app deployment with EAM, saving time and effort

Product Details

Country selected
Publication date, Length, Edition, Language, ISBN-13
Publication date : Nov 28, 2025
Length: 392 pages
Edition : 1st
Language : English
ISBN-13 : 9781806021949
Vendor :
Microsoft

What do you get with eBook?

Product feature icon Instant access to your Digital eBook purchase
Product feature icon Download this book in EPUB and PDF formats
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want
OR
Modal Close icon
Payment Processing...
tick Completed

Billing Address

Product Details

Publication date : Nov 28, 2025
Length: 392 pages
Edition : 1st
Language : English
ISBN-13 : 9781806021949
Vendor :
Microsoft

Packt Subscriptions

See our plans and pricing
Modal Close icon
$19.99 billed monthly
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Simple pricing, no contract
$199.99 billed annually
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just NZ$7 each
Feature tick icon Exclusive print discounts
$279.99 billed in 18 months
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just NZ$7 each
Feature tick icon Exclusive print discounts

Table of Contents

10 Chapters
Securing Digital Identities with Cloud PKI Chevron down icon Chevron up icon
Elevating Endpoint Privilege Management with Control and Security Chevron down icon Chevron up icon
Streamlining Application Deployment with EAM Chevron down icon Chevron up icon
AI-Driven Insights with Endpoint Analytics and Intune Advanced Analytics Chevron down icon Chevron up icon
Enabling Secure Connectivity with Microsoft Tunnel for MAM Chevron down icon Chevron up icon
Empowering Support from Anywhere with Remote Help Chevron down icon Chevron up icon
Go-To Resources for Intune Mastery Chevron down icon Chevron up icon
Unlock Your Exclusive Benefits Chevron down icon Chevron up icon
Other Books You May Enjoy Chevron down icon Chevron up icon
Index Chevron down icon Chevron up icon
Get free access to Packt library with over 7500+ books and video courses for 7 days!
Start Free Trial

FAQs

How do I buy and download an eBook? Chevron down icon Chevron up icon

Where there is an eBook version of a title available, you can buy it from the book details for that title. Add either the standalone eBook or the eBook and print book bundle to your shopping cart. Your eBook will show in your cart as a product on its own. After completing checkout and payment in the normal way, you will receive your receipt on the screen containing a link to a personalised PDF download file. This link will remain active for 30 days. You can download backup copies of the file by logging in to your account at any time.

If you already have Adobe reader installed, then clicking on the link will download and open the PDF file directly. If you don't, then save the PDF file on your machine and download the Reader to view it.

Please Note: Packt eBooks are non-returnable and non-refundable.

Packt eBook and Licensing When you buy an eBook from Packt Publishing, completing your purchase means you accept the terms of our licence agreement. Please read the full text of the agreement. In it we have tried to balance the need for the ebook to be usable for you the reader with our needs to protect the rights of us as Publishers and of our authors. In summary, the agreement says:

  • You may make copies of your eBook for your own use onto any machine
  • You may not pass copies of the eBook on to anyone else
How can I make a purchase on your website? Chevron down icon Chevron up icon

If you want to purchase a video course, eBook or Bundle (Print+eBook) please follow below steps:

  1. Register on our website using your email address and the password.
  2. Search for the title by name or ISBN using the search option.
  3. Select the title you want to purchase.
  4. Choose the format you wish to purchase the title in; if you order the Print Book, you get a free eBook copy of the same title. 
  5. Proceed with the checkout process (payment to be made using Credit Card, Debit Cart, or PayPal)
Where can I access support around an eBook? Chevron down icon Chevron up icon
  • If you experience a problem with using or installing Adobe Reader, the contact Adobe directly.
  • To view the errata for the book, see www.packtpub.com/support and view the pages for the title you have.
  • To view your account details or to download a new copy of the book go to www.packtpub.com/account
  • To contact us directly if a problem is not resolved, use www.packtpub.com/contact-us
What eBook formats do Packt support? Chevron down icon Chevron up icon

Our eBooks are currently available in a variety of formats such as PDF and ePubs. In the future, this may well change with trends and development in technology, but please note that our PDFs are not Adobe eBook Reader format, which has greater restrictions on security.

You will need to use Adobe Reader v9 or later in order to read Packt's PDF eBooks.

What are the benefits of eBooks? Chevron down icon Chevron up icon
  • You can get the information you need immediately
  • You can easily take them with you on a laptop
  • You can download them an unlimited number of times
  • You can print them out
  • They are copy-paste enabled
  • They are searchable
  • There is no password protection
  • They are lower price than print
  • They save resources and space
What is an eBook? Chevron down icon Chevron up icon

Packt eBooks are a complete electronic version of the print edition, available in PDF and ePub formats. Every piece of content down to the page numbering is the same. Because we save the costs of printing and shipping the book to you, we are able to offer eBooks at a lower cost than print editions.

When you have purchased an eBook, simply login to your account and click on the link in Your Download Area. We recommend you saving the file to your hard drive before opening it.

For optimal viewing of our eBooks, we recommend you download and install the free Adobe Reader version 9.

Modal Close icon
Modal Close icon