![]() The expression in a filter can be created by using different Intune device properties. During the check-in of the device, the filter evaluation engine will determine the applicability of the assignment. That enables the IT administrator to create a filter – with an expression that for example filters personal devices – for usage across different assignments. ![]() Unlike applicability rules – that are created per profile – filters are created once and can be reused for different objects of apps, policies and profiles. One of the best characteristics of filters is the reusability. In that case the targeted devices of the assignment will be dynamically filtered based on the configured device properties. Besides that, filters can be used in combination with any Azure AD group assignment and even in combination with the default All users or All devices groups. ![]() The main enhancements are that filters can be used for all the different platforms, filters can be used for apps, policies and profiles, and filters can be used with many different Intune device properties. Filters could be seen as the enhanced platform independent version of those applicability rules. Applicability rules would enable the IT administrator to assign or not assign the profile based on the version or the edition of Windows 10. Introducing filtersįor device configuration profiles for Windows 10 devices it was already possible to use applicability rules. This post ends with the administrator experience with filters. This post starts with a short introduction about filters, followed with information about creating and using filters (including the steps for using and creating filters). A great method for specifically targeting apps, policies and profiles. Those specific devices are only the devices that meet the specific properties that are configured in the filters. Filters are basically a super-set of the functionalities of applicability rules – already available for a while for Windows 10 – and are a great new addition to assigning apps policies and profiles to specific devices.
0 Comments
Leave a Reply. |