Close Menu
Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    Facebook X (Twitter) Instagram
    Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    • Home
    • Intune
    • Windows
      • Modern Workplace
    • macOS
    • Android
    • iOS
    • Automation
      • Logic Apps
      • Intune Monitoring
      • GitHub
    • Security
      • Passwordless
      • Security
    • Speaking
    • About me
    Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    Home»Intune»Using a SID for User Rights in the Intune Settings Catalog
    Intune

    Using a SID for User Rights in the Intune Settings Catalog

    Peter KlapwijkBy Peter KlapwijkJanuary 28, 2022Updated:January 28, 202282 Mins Read

    Today a short blog post regarding configuring User Rights, like Allow Local Log on, in an Intune Settings Catalog profile. Using the Settings Catalog and the several settings under User Rights is pretty straightforward as long as you use Administrators or Users. And maybe it is also straightforward for you when using a SID, but I assume it’s not otherwise you wouldn’t be reading this post 🙂

    During implementing User Rights settings like Allow Local Log on, we first configured this setting with Administrators and Users as just adding a SID to the policy didn’t allow the users to log on to Windows. This did work fine as long as our device was installed with an English OS. As soon as we applied the profile to, for example, a Dutch device, it wouldn’t allow users to sign in to the Windows machines anymore. It seems Users isn’t translated to Gebruikers (the Dutch word for Users).

    So we still wanted to use the well-known SIDs instead of Administrators and Users. After adding the SIDs in all sorts of ways to the profile which didn’t work at all, I decided to open a support case at Microsoft.

    After switching between several support engineers and almost filing a DCR on the recommendation of a support engineer (as they told us a SID wasn’t supported), we finally came in touch with another engineer who asked us the use this in the profile, as this is also what you would use when using the custom OMA-URI/ CSP:

    <![CDATA[*S-1-5-32-544]]>

    And when using two SIDs:

    <![CDATA[*S-1-5-32-544&#xF000;*S-1-5-32-545]]>

    At least it did work fine, but reporting in the Intune portal showed an error.

    In the end, we found out, we should just add an asterisk * sign prior to the SID.

    That’s actually exactly what we need to add when using CDATA with the OMA-URI. Unbelievable I didn’t come up with trying this earlier myself!

    By using an asterisk prior to the SID it is applied fine, as we can see in the registry.

    And the setting is reported as Succeeded in the Intune portal.

    so it is actually also pretty easy to configure a SID for the User Rights settings in a Settings Catalog profile, as long as you know you need to add an asterisk prior to the SID.

    I hope this prevents you from spending a lot of time to get this configured 🙂

    Intune MEM Microsoft Endpoint Manager Windows Windows 10
    Share. Facebook Twitter LinkedIn Email WhatsApp
    Peter Klapwijk
    • Website
    • X (Twitter)
    • LinkedIn

    Peter is a Security (Intune) MVP since 2020 and is working as Modern Workplace Engineer at Wortell in The Netherlands. He has more than 15 years of experience in IT, with a strong focus on Microsoft technologies like Microsoft Intune, Windows, and (low-code) automation.

    Related Posts

    Give your users a better sign-in experience with the macOS Microsoft Enterprise SSO plug-in

    December 18, 2020

    Automatically enable Bitlocker encryption with Microsoft Intune

    November 11, 2020

    Manage the local administrators group with Microsoft Intune – Azure AD joined Windows 10 devices

    April 14, 2020
    View 8 Comments

    8 Comments

    1. Arovbukay on July 7, 2022 10:41

      Hi, we want to add the guest account GUEST S-1-5-21–501 for one of the options, how do we add this SID considering it has between it or will it translate it automatically?

      Reply
      • Arovbukay on July 7, 2022 10:44

        it has machine between the SID GUEST S-1-5-21-machine-501

        Reply
    2. Alex on September 2, 2022 14:08

      Saved me a headache. Thanks 🙂

      Reply
    3. Chris on September 30, 2022 15:15

      What if you want to clear the assignment completely? Any confirmation that providing a blank value doesn’t error out or even works?

      Reply
    4. Ueli on January 9, 2023 11:15

      Does this now also works for AzureAD Group SIDs ? i remember it was only working for dedicated AzureAD User Objects in Custom OMA URIs

      Reply
      • Vic on February 2, 2023 23:41

        I’ve tested with AAD Group SIDs but no luck 🙁 Microsoft really needs better documentation for this setting, everything always seems to point to their CSP settings which obviously won’t work

        Reply
    5. Jimmy on June 10, 2023 15:22

      How do we enforce Blank values?
      I have tried everything for UserRights in Blank values.
      Currently the only way to enforce blank values is using full XML config.

      https://techcommunity.microsoft.com/t5/microsoft-intune/enforcing-blank-value-in-settings-catalog-local-security/m-p/3844268

      Reply
    6. Kay Tomas Arnesen on October 23, 2024 09:41

      Thank You so much!

      Reply
    Leave A Reply Cancel Reply

    Peter Klapwijk

    Hi! Welcome to my blog post.
    I hope you enjoy reading my articles.

    Hit the About Me button to get in contact with me or leave a comment.

    Awards
    Sponsor
    Latest Posts

    Create deployment ring groups for Microsoft Intune

    June 27, 2025

    Update Windows Defender during Windows Autopilot enrollments

    May 16, 2025

    Hide the “Turn on an ad privacy feature” pop-up in Chrome with Microsoft Intune

    April 19, 2025

    How to set Google as default search provider with Microsoft Intune

    April 18, 2025
    follow me
    • Twitter 4.8K
    • LinkedIn 6.1K
    • YouTube
    • Bluesky 1.5K
    Tags
    Administrative Templates Android Automation Autopilot Azure Azure AD Browser Conditional Access Edge EMS Exchange Online Feitian FIDO2 Flow Google Chrome Graph Graph API Identity Management Intune Intune Monitoring iOS KIOSK Logic Apps macOS MEM MEMMonitoring Microsoft 365 Microsoft Edge Microsoft Endpoint Manager Modern Workplace Office 365 OneDrive for Business Outlook Passwordless PowerApps Power Automate Security SharePoint Online Teams Windows Windows 10 Windows10 Windows 11 Windows Autopilot Windows Update
    Copy right

    This information is provided “AS IS” with no warranties, confers no rights and is not supported by the authors, or In The Cloud 24-7.

     

    Copyright © 2025 by In The Cloud 24-7/ Peter Klapwijk. All rights reserved, No part of the information on this web site may be reproduced or posted in any form or by any means without the prior written permission of the publisher.

    Shorthand; Don’t pass off my work as yours, it’s not nice.

    Recent Comments
    • Parth Savjadiya on Using Visual Studio with Microsoft Endpoint Privilege Management, some notes
    • Chris Johnson on Assign Deny Local Log On user right to an (Azure) AD group by using Microsoft Intune
    • Northernsky on Automatically wipe a Windows 10 device after a number of authentication failures
    • Henrik on Intune Driver update for Windows – Get applicable devices
    • Adam on Get notified on expiring Azure App Registration client secrets
    most popular

    Application installation issues; Download pending

    October 1, 2024

    Restrict which users can logon into a Windows 10 device with Microsoft Intune

    April 11, 2020

    How to change the Windows 11 language with Intune

    November 11, 2022

    Update Microsoft Edge during Windows Autopilot enrollments

    July 9, 2024
    Peter Klapwijk – In The Cloud 24-7
    X (Twitter) LinkedIn YouTube RSS Bluesky
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.

    Manage Cookie Consent
    To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
    View preferences
    {title} {title} {title}