Automating App Deployment by Region for ABM-Associated Devices


Hi All,

I have a dilemma and I hope I’m not overthinking it. I need to deploy an app and the configuration to the devices that are associated to ABM only. I know I can put those users into an AD Security group and that’s it. However, I’m trying to automate it so I won’t have to manage the group. I know I can use a device filter to accomplish this task or a group membership rule. Here is my problem. I was just ask to do it in phases by region. Microsoft does not allow you to mix filters or membership rules by devices and users. Does anyone know of a workaround on how I can accomplish this task?

Posted by  Jeffrey Brinston in HTMD FB Group

abm - HTMD Forum - Welcome to the world of Device Management! This is community build by Device Management Admins for Device Management Admins❤️ Ask your questions!! We are here to help you! - Automating App Deployment by Region for ABM-Associated Devices

Answer ( 1 )


    Fore More Details Best way to Add Mac Devices to Apple Business Manager ABM or ASM and to Intune

    Replied by Greg Gilbert

    If you just have to put random devices into the phased groups then create filters where the device ID starts with a-f, g-m, n-t, etc. I did something similar for breaking up my WUfB rings.

    Replied by Jeffrey Brinston

    Greg Gilbert my Director wants it done by region. Currently, there are no AD security groups created for that. I did a test with the “Department” attribute and I validated that works so I know I can build the group that way. However, we have 50% of our iOS devices and the other are not. We are only going to deploy the app and configuration to ABM devices.
    My dilemma is that I can’t mix device and user rules or even filters.

    Replied by Thor Velling

    Update your ad to be correct With users by location and use that.. very simple.. and then dybamic Group…..

    Replied by Joe Bowers

    there’s a bit we don’t know here about how devices move in and out of scope and what the process already exists there. Once we know that, we know at what point and how we would automatically identify said device.

Leave an answer

Sorry, you do not have permission to answer to this question .