UserRights Policy Deployment Using Intune | Group Policy Replacement

You can use Intune to deploy security policies using out-of-box templates or Windows 10 custom policy CSP (UserRights Policy).

In this post, you shall learn how to deploy UserRights policies successfully. Thanks to my colleague Mark Thomas for helping me in fixing the issue.

I checked Intune Administrative templates, Security baselines, and box Device restriction policies to find options to deploy Windows 10 UserRights settings. I couldn’t see any out-of-box policies related to UserRights settings.

Administrative templates - Intune UserRights - UserRights Policy
Administrative templatesIntune UserRightsUserRights Policy 1

I have two options to deploy UserRights settings:

Patch My PC
  • Group Policy if the device is domain joined or Hybrid Azure AD Joined
    • Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment.
  • Custom Windows 10 policy CSP using Intune for Azure AD joined devices.

Custom Windows 10 Policy CSP

In this post, you shall take example of the specific policy CSP called:

  • “./Device/Vendor/MSFT/Policy/Config/UserRights/AccessFromNetwork

I’m trying to provide “access from network” access to two user groups called “Administrators” and “Remote Desktop Users.”

XML Format – First Try

I tried custom policy CSP using the Microsoft document recommendation here.

  • Created custom Intune policy CSP using – Data Type -> String (XML File)
UserRights -  String (XML File) - UserRights Policy
UserRights – String (XML File) – UserRights Policy 2

Sample XML for UserRights/AccessFromNetwork settings to add Remote Desktop UsersAdministrators ( note this symbol) groups

Adaptiva
  <SyncML xmlns="SYNCML:SYNCML1.2">
<SyncBody>

    <Replace>
      <CmdID>2</CmdID>
      <Item>
        <Meta>
          <Format>chr</Format>
          <Type>text/plain</Type>
        </Meta>
        <Target>
          <LocURI>./Device/Vendor/MSFT/
Policy/Config/UserRights/AccessFromNetwork</LocURI>
        </Target>
        <![CDATA[Remote Desktop UsersAdministrators]]>
      </Item>
    </Replace>
  <Final/>
  </SyncBody>
</SyncML> 

The Data Type string (xml file) policy CSP settings failed with following error:

Error Code - 0x87d101f4
Syncml(500). The recipient encountered an unexpected condition which prevented it from fulfilling the request 
UserRights Policy - Error 0x87d101f4
UserRights Policy – Error 0x87d101f4 3

String Option – UserRight/AccessFromNetwork

String XML file option to deploy policy CSP failed, as you saw above. The next option is to try Data Type -> String with Windows 10 policy CSP.

I tried to look at the GitHub thread and use the following settings to deploy the UserRight/ AccessFromNetwork policy CSP.

String Option - UserRight/AccessFromNetwork - UserRights Policy
String Option – UserRight/AccessFromNetwork – UserRights Policy 4

The above setting got successfully applied on the Windows 10 device, but Intune shows an error -2016281112 (Remediation failed). These error details are also explained in the above GitHub thread.

ASCII Value (  ) Issues with UserRights CSP

This is the option where my colleague Mark Thomas came to the rescue. Mark helped me FIX the Windows 10 custom policy CSP ASCII character-related issue.

NOTE – This ASCII value ( ) mismatch is also discussed in the GitHub thread.

String Value to provide “UserRight/AccessFromNetwork” access to the following groups:

  • Administrators
  • Remote Desktop Users

The following are the third and final options that were successful.

UserRights Policy OMA-URI Settings
UserRights Policy OMA-URI Settings 5

Policy CSP Settings Intune:

Name - UserRights/AccessFromNetwork
Description - User Rights
OMA-URI - ./Device/Vendor/MSFT/Policy/Config/UserRights/AccessFromNetwork
Data Type - String
Value - Remote Desktop UsersAdministrators

Results – UserRights Policy Deployment Using Intune | Group Policy Replacement

The Windows 10 custom policy CSP was successfully deployed without group policy settings. Happy modern management!

UserRights Policy OMA-URI Settings - Results
UserRights Policy OMA-URI Settings – Results 6

Author

Anoop C Nair is Microsoft MVP! He is a Device Management Admin with more than 20 years of experience (calculation done in 2021) in IT. He is Blogger, Speaker, and Local User Group HTMD Community leader. His main focus is on Device Management technologies like SCCM 2012, Current Branch, and Intune. He writes about ConfigMgr, Windows 11, Windows 10, Azure AD, Microsoft Intune, Windows 365, AVD, etc.

10 thoughts on “UserRights Policy Deployment Using Intune | Group Policy Replacement”

  1. Hi,
    where and how do I find the endpoint settings defined from Intune?
    For GPO, were the tools gpresults and rsop? Is there something similar for Intune?
    Thanks
    David

    Reply
  2. Hi Anoop,
    I am trying to restrict few user groups from interactive login to AzureAd joined devices and was exploring UserRights/DenyLocalLogOn. I did give the objectID of the azure ad group in the string but it didn’t work. Have you tried this? Also, is there any other better way to handle this?

    Reply
    • Did you ever find a way to deny a local login using a CSP? I was trying to limit anyone in the local Guests group on the machine from logging in. This was my final setting that applied successfully after reading this article.

      Name: DenyInteractiveLogonRight
      OMA-URI: ./Device/Vendor/MSFT/Policy/Config/UserRights/DenyLocalLogOn
      Data type: String
      Value: Guests

      Reply
  3. Hi Guys,

    Do you know if there is a way to include multiple domain users in this userrights CSP?

    I tried with the separators included in this article but it is not working.

    Thanks a lot

    Reply

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.