Close Menu
Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    Facebook X (Twitter) Instagram
    Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    • Home
    • Intune
    • Windows
      • Modern Workplace
    • macOS
    • Android
    • iOS
    • Automation
      • Logic Apps
      • Intune Monitoring
      • GitHub
    • Security
      • Passwordless
      • Security
    • Speaking
    • About me
    Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    Home»Intune»Managing Windows 365 Link devices with Intune
    Intune

    Managing Windows 365 Link devices with Intune

    Peter KlapwijkBy Peter KlapwijkOctober 24, 2025Updated:October 24, 20259 Mins Read

    Todays blog post is about managing Windows 365 Link devices with Microsoft Intune. I recently got my hands on a Link device as preparation for my employers Wortell Ready event. It was meant for a demo during my session about Windows 365, but if you get your hands on such a popular, but poorly available, device you need to play around with it.

    In this post I share my thoughts on managing the device with Microsoft Intune, because although Windows is running on the device, we can not target just all existing policies we have in Intune to these Link devices.

    I assume you know what a Link device is, otherwise you wouldn’t be reading the post, but for who don’t know:

    A Windows 365 Link device is a physical Windows PC that connects directly to a user’s Cloud PC in Windows 365.
    It lets users move seamlessly between the local device and their Cloud PC while keeping the Cloud PC as the main work environment.

    The device runs a version of Windows 11, but with the Windows CPC SKU. We don’t have access to anything on the local device but the sign-in screen when the device starts.
    The device is secure by design, with a Trusted Platform Module (TPM), BitLocker drive encryption, Hypervisor Code Integrity and Microsoft Defender EDR Sensor.

    Requirements for managing the Link

    To enroll and manage the device with Microsoft Intune, we have some requirements. The device itself needs to be Entra joined and enrolled in Intune. As Autopilot is not supported for Link devices, we need to have the device enrolled by the end-user or an IT admin with a Device Enrollment Manager (DEM) account. I would prefer to enroll the device with a DEM account, so IT is able to enroll the device before handing out the device to the end-user. This would also prevent the Link device from showing up in the list of devices of the end-user. After joining to Entra we want to automatically enroll the device in Intune, which requires some configuration and the right licenses.
    The Link device can only be used in combination with Windows 365 Cloud PCs for which Entra ID single sign-on (SSO) is enabled.

    Optionally we can register the corporate device identifier in Intune, to make sure the device is enrolled as corporate device (when an end-user enrolls the device).

    The requirements on a row:

    • Allow users to automatically enroll their devices in Intune (configured in Entra)
    • Microsoft Intune and Entra ID Premium license
    • Entra ID single sign-on (SSO) enabled on Windows 365 Cloud PC
    • Optional: Register corporate device identifier

    Enrollment decisions

    As said Windows Autopilot is not supported for Link devices, so we need to come up with a different approach. Although the enrollment of a Link device is no rocket science and with the right permissions and license is possible, I would opt for using a DEM account. Here are some considerations for making a decision for your enrollment:

    ConsiderationsAdmin driven onboardingUser driven onboarding
    The device is for multiple different users.Yes
    The device is for one user.Yes
    Users aren’t allowed to join or register devices.Yes
    Devices are shipped directly to users.Yes

    Entra device group

    As we can’t just target all our existing Intune configuration and compliance policies, and support for installing apps is not supported at all, we need to make sure we have an Entra device group ready for usage in Intune.

    We can create a dynamic Entra group based on device model. We could also use device name, as all Link devices will have a name starting with WCPCD, but what if somebody names his device WCPCDxxx?

    So I opt for using the rule syntax: (device.deviceModel -eq “Windows 365 Link”)

    Intune assignment filter

    Everybody working with Intune knows that processing Entra dynamic groups can sometimes be very slow. Therefor it might be preferred to use assignment filters in Intune, instead of a device group.
    We can create an assignment filter in Intune using the device model, like we did for the device group. We could also use the Operating System SKU, as that’s something special for the Windows Link device: Windows CPC (WCPC).
    The syntax for both options:
    (device.model -eq “Windows 365 Link”)
    (device.operatingSystemSKU -eq “WCPC”)

    When using the SKU, we can simply select the correct SKU from the dropdown list under value.

    Compliance policies

    Only the Device Health compliance settings apply to the Link device. At least that’s written in the docs. But as the device is also equipped with a Trusted Platform Module we can also check on the TPM, although that is located under System Security.

    Configuration policies

    Windows 365 Link runs a small purpose-built Windows based operating system called Windows CPC. Therefore, device configuration for Windows 365 Link follows the same process as Windows in general with two main differences.

    • Windows 365 Link can only be Entra joined, so Active Directory Group Policy isn’t supported for the device.
    • Windows 365 Link supports a subset of Windows configuration service provider (CSP) policies.

    The above comes directly from the Microsoft learn website, where you could also find the list of supported CSPs.

    Let’s discuss a few settings which are interesting to configure on our Link device.

    Privacy settings is the first one. On the Link device the end-user has the ability to control the privacy settings for Location, Camera and Microphone.

    The end-user is able to switch these off, although in most circumstances we should leave these on for the best user experience. The location service for example is used to determine the location of the device and with that information sets the correct time zone on the device.

    We have the option to control these privacy settings with a Settings Catalog profile. We can configure the settings to Force allow, so the user can’t (accidentally) switch this off.

    Time zone.
    Configuring the time zone is also something which is supported on Link devices. If for some reason the time zone is not automatically set right when the location is allowed to be used by an app, we can also force the time zone on Link devices.

    Network connection.
    A network connection is of course important when working with a Cloud PC.Link devices support several configurations for wired and wireless connections. As I only have a simple Wi-Fi network at home, I was only able to (successfully) test a basic Wi-Fi profile using Intune.

    Screen time-out.
    By default the screen connected to a Link device turns off after about 5 minutes. I guess it’s a good idea to expand this a little by using another Settings Catalog settings, which is found under System, Power Management.

    Delivery Optimization.
    Delivery optimization is also in the list of supported configurations. And although there is not much to test around DO on my small network, the policy settings where all applied successfully.

    Use security key for signin.
    Passwordless is the future. On shared devices, which the Link still is, working with a FIDO2 security key is great. Just connect the key when it’s an USB version, or tap the key on a NFC reader (no not included in the Link unfortunately) enter a PIN or even better use the fingerprint and sign-in is initiated!

    Definitely something to consider when working with a lot of Link or other type shared devices in your environment.

    Endpoint Security Policies.
    Most of the Endpoint Security policies are not applicable for Link devices. But we can onboard Link devices to Defender for Endpoint.

    Updates.
    Windows 365 Link devices update automatically using the same Windows Update Services used by Windows 11. The Windows 365 Link device checks for updates periodically.

    When an update is available and detected by a device that is powered on, the device:

    1. Silently downloads the update.
    2. Installs the update during the next reboot or at 3 AM when the device isn’t in use.

    Driver and firmware updates occur separately from OS updates, and are also applied during a reboot.

    If the device receives driver/firmware updates and OS updates at the same time, both updates occur over one reboot.

    More info on the update behavior is found on the Microsoft docs.

    What does it look like from the IT admin perspective

    When the device is enrolled in Intune, either by the end-user or with a DEM account, the device shows up like any other Windows device.
    I used a DEM account and as you can see the device is corporate owned.
    It shows compliant and as we can see it’s running the latest Windows 11 24H2 version.
    The model is shown as Windows 365 Link and SKU family is WCPC.

    Not all device actions are available for Link devices. We can’t trigger an update for Windows Defender security intelligence or perform a BitLocker key rotation. But we are able to send a wipe request and are even able to collect diagnostics when needed.

    An overview of the hardware as shown in the Intune portal.

    We can see the compliance policy I created shows Compliant.

    The three Device health settings and the TPM show Compliant.

    The configuration polices I created specifically for the Link devices are all Succeeded.

    A policy which was still targeted to my Link device was a Windows Update ring policy. It shows about all settings are not applicable on the device.

    And as last, the device is also onboarded to Defender for Endpoint.

    What does it look like from the user perspective

    When the device is started the sign in screen is shown.

    In the low right corner we have access to some controls, like Wi-Fi, Bluetooth and the privacy controls.

    As written before, the available privacy controls can be switched off.

    But when we force the controls to allow, the controls are greyed out.

    By default we are able to sign-in with a username and password (if needed including the possibility to perform MFA).

    But when we allow security keys, we get an additional sign-in option on the sign-in screen.

    Sign in to your Cloud PC when using a FIDO2 security key works flawless as you can see in the below video.

    That’s it for this post.
    Thanks for ready!

    Intune Microsoft Endpoint Manager Modern Workplace Windows Windows 365
    Share. Facebook Twitter LinkedIn Email WhatsApp
    Peter Klapwijk
    • Website
    • X (Twitter)
    • LinkedIn

    Peter is a Security (Intune) MVP since 2020 and is working as Modern Workplace Engineer at Wortell in The Netherlands. He has more than 15 years of experience in IT, with a strong focus on Microsoft technologies like Microsoft Intune, Windows, and (low-code) automation.

    Related Posts

    Application installation issues; Download pending

    October 1, 2024

    Configure Windows Update for Business reporting

    June 8, 2023

    Give your users a better sign-in experience with the macOS Microsoft Enterprise SSO plug-in

    December 18, 2020
    Add A Comment
    Leave A Reply Cancel Reply

    Peter Klapwijk

    Hi! Welcome to my blog post.
    I hope you enjoy reading my articles.

    Hit the About Me button to get in contact with me or leave a comment.

    Awards
    Sponsor
    Latest Posts

    Hard drive and partitions are not shown while installing Windows

    October 14, 2025

    Intune compliance for Windows 365 Cloud PCs

    September 12, 2025

    Intune connector for Active Directory configuration error

    August 29, 2025

    Deploy Microsoft Defender updates in deployment rings

    July 4, 2025
    follow me
    • Twitter 4.8K
    • LinkedIn 6.1K
    • YouTube
    • Bluesky 1.5K
    Tags
    Administrative Templates Android Automation Autopilot Azure Azure AD Browser Conditional Access Edge EMS Exchange Online Feitian FIDO2 Flow Graph Graph API Identity Management Intune Intune Monitoring iOS KIOSK Logic Apps macOS MEM MEMMonitoring Microsoft 365 Microsoft Defender Microsoft Edge Microsoft Endpoint Manager Modern Workplace Office 365 OneDrive for Business Outlook Passwordless PowerApps Power Automate Security SharePoint Online Windows Windows 10 Windows10 Windows 11 Windows 365 Windows Autopilot Windows Update
    Awards
    Sponsor
    Follow me on Twitter
    Tweets by inthecloud_247
    Tags
    Administrative Templates Android Automation Autopilot Azure Azure AD Browser Conditional Access Edge EMS Exchange Online Feitian FIDO2 Flow Graph Graph API Identity Management Intune Intune Monitoring iOS KIOSK Logic Apps macOS MEM MEMMonitoring Microsoft 365 Microsoft Defender Microsoft Edge Microsoft Endpoint Manager Modern Workplace Office 365 OneDrive for Business Outlook Passwordless PowerApps Power Automate Security SharePoint Online Windows Windows 10 Windows10 Windows 11 Windows 365 Windows Autopilot Windows Update
    Archives
    Peter Klapwijk

    Hi! Welcome to my blog post.
    I hope you enjoy reading my articles.

    Hit the About Me button to get in contact with me or leave a comment.

    Copy right

    This information is provided “AS IS” with no warranties, confers no rights and is not supported by the authors, or In The Cloud 24-7.

     

    Copyright © 2025 by In The Cloud 24-7/ Peter Klapwijk. All rights reserved, No part of the information on this web site may be reproduced or posted in any form or by any means without the prior written permission of the publisher.

    Shorthand; Don’t pass off my work as yours, it’s not nice.

    Recent Comments
    • Luis on Application installation issues; Download pending
    • AndrewWak on Issues syncing SharePoint Online libraries with OneDrive for Mac
    • Peter Klapwijk on Deploy Microsoft Defender updates in deployment rings
    • Magnus on Deploy Microsoft Defender updates in deployment rings
    • Gertjan Jongeneel on Add an Azure AD group to the local administrators group with Microsoft Intune
    most popular

    Application installation issues; Download pending

    October 1, 2024

    How to change the Windows 11 language with Intune

    November 11, 2022

    Restrict which users can logon into a Windows 10 device with Microsoft Intune

    April 11, 2020

    How I solved a strange Kerberos issue

    December 12, 2024
    Recent Comments
    • Luis on Application installation issues; Download pending
    • AndrewWak on Issues syncing SharePoint Online libraries with OneDrive for Mac
    • Peter Klapwijk on Deploy Microsoft Defender updates in deployment rings
    • Magnus on Deploy Microsoft Defender updates in deployment rings
    • Gertjan Jongeneel on Add an Azure AD group to the local administrators group with Microsoft Intune
    Copy right

    This information is provided “AS IS” with no warranties, confers no rights and is not supported by the authors, or In The Cloud 24-7.

    Copyright © 2023 by In The Cloud 24-7/ Peter Klapwijk. All rights reserved. No part of the information on this web site may be reproduced or posted in any form or by any means without the prior written permission of the publisher.

    Shorthand: Don’t pass off my work as yours, it’s not nice.

    Peter Klapwijk – In The Cloud 24-7
    X (Twitter) LinkedIn YouTube RSS Bluesky
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.

    Manage Cookie Consent
    To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
    View preferences
    {title} {title} {title}