Intune

Microsoft Intune Admin Tasks GA for EPM and MAA

3 min read

Summary

Microsoft has made Intune Admin Tasks generally available, giving IT teams a centralized, prioritized queue in the Intune admin center to handle Endpoint Privilege Management elevation requests, Microsoft Defender for Endpoint security tasks, and other sensitive admin workflows. This matters because it streamlines approvals and remediation, improves auditability and response times, and lays the groundwork for safer oversight of AI-assisted security and device management operations.

Need help with Intune?Talk to an Expert

Introduction: why this matters

Intune administrators make constant, high-stakes decisions—approving privilege elevations, responding to security remediation requests, and validating sensitive configuration changes. When these decision points are scattered across multiple consoles, response time slows, audit trails become harder to maintain, and risk increases. With admin tasks now generally available (GA), Microsoft is consolidating these approvals and remediation workflows into a single, prioritized queue—designed to reduce noise today and provide an oversight layer for emerging AI-assisted operations.

Admin tasks is available in the Intune admin center under Tenant administration.

What’s new in Intune Admin Tasks (GA)

Admin tasks brings together three key workflow types into one experience:

1) Endpoint Privilege Management (EPM) elevation requests

EPM helps standard users run approved apps with elevated rights without granting permanent local admin access.

  • Review and approve/deny elevation requests from the centralized queue
  • Create reusable rules from file details (publisher, hash, command-line)
  • Add files to reusable settings for consistent governance
  • Audit-friendly logging for compliance and investigations

If you use Security Copilot, Intune can surface contextual risk signals to inform EPM approval decisions.

2) Microsoft Defender for Endpoint (MDE) security tasks

When Defender detects threats or configuration gaps, it can generate remediation tasks surfaced directly in Intune.

  • Track and complete remediation work from the same admin tasks queue
  • Mark tasks complete or reject them, and review impacted device lists
  • Leverage recommended endpoint security profiles, including newer configuration support for EDR and AV exclusions on Linux
  • Maintain activity logging for audit and compliance

3) Multi Admin Approval (MAA) requests

MAA enforces a second set of eyes for high-impact actions (for example, scripts, role changes, remote actions, and device wipes).

  • Approve/reject requests and complete changes from a centralized view
  • Capture requester/approver notes to strengthen audit readiness
  • Reduce blast radius from compromised admin accounts by preventing single-actor execution

With Security Copilot, the Change Review Agent can analyze MAA script requests for impact and provide recommendations.

Also included: Device Offboarding Agent tasks (public preview)

Admin tasks now incorporates actions from the Device Offboarding Agent (part of Microsoft Security Copilot, currently in public preview). It helps identify unused/outdated devices using signals across Intune and Microsoft Entra, and supports guided remediation such as disabling Entra ID device objects.

  • Download a CSV list of affected devices
  • Apply repeatable cleanup processes to reduce attack surface

Impact for IT admins and end users

  • Faster response to critical requests via a single, prioritized queue
  • Improved governance and audit readiness through consistent workflows and logging
  • Stronger Zero Trust posture (least privilege + controlled approvals)
  • Better user productivity when EPM reduces the need for permanent admin rights and lowers help desk escalations

Action items / next steps

  1. In the Intune admin center, navigate to Tenant administration > Admin tasks and validate visibility and role assignments.
  2. Review your EPM elevation policy model (automatic, user-confirmed, support-approved) and standardize rule creation criteria.
  3. Align Defender security tasks handling with your incident/remediation SLAs and confirm Linux security profile coverage where applicable.
  4. Enable/expand Multi Admin Approval for your highest-risk actions and document approver workflows for audits.
  5. If piloting Security Copilot, evaluate the Device Offboarding Agent preview and Copilot-driven contextual analysis for EPM/MAA to improve decision quality without losing human oversight.

Need help with Intune?

Our experts can help you implement and optimize your Microsoft solutions.

Talk to an Expert

Stay updated on Microsoft technologies

IntuneEndpoint Privilege ManagementMicrosoft Defender for EndpointMulti Admin ApprovalSecurity Copilot

Related Posts

Intune

Microsoft Intune App Security for AI Workflows

Microsoft is expanding Intune’s app security capabilities with enhanced app inventory in May and Enterprise Application Management auto-updates in July, giving IT teams better visibility into managed and user-installed Windows apps and faster deployment of software updates. These changes matter because they help organizations spot risky or unauthorized apps sooner, reduce version drift, and lower exposure to vulnerabilities as AI-driven workflows increasingly depend on secure endpoint applications.

Intune

Microsoft Intune for MSPs Adds 3 Multi-Tenant Partners

Microsoft has added three new validated multi-tenant partners to its Intune for MSPs ecosystem—AvePoint Confidence Platform: Elements Edition, CyberDrain CIPP, and SoftwareCentral Tenant Manager—expanding tools for centralized automation, governance, security visibility, and policy standardization across customer tenants. This matters because it gives managed service providers more Microsoft-aligned options to reduce manual work, replace custom scripts, and manage multi-tenant environments more securely and efficiently.

Intune

Microsoft Intune February Update: Multi-Admin Approval & Apple DDM

Microsoft’s February Intune update adds multi-admin approval for device configuration and compliance policies, requiring a second admin to approve critical changes before they take effect. The release also improves Advanced Analytics device query results and expands Apple Declarative Device Management support, helping organizations strengthen change control, reduce configuration risk, and manage Apple devices more precisely at scale.

Intune

Intune App Protection in Edge for Business on Windows

Microsoft announced public preview support for Intune App Protection Policies in Edge for Business work profiles on Windows, allowing organizations to protect corporate data in the browser even on PCs already managed by another tenant. This matters because it gives contractors and partner users secure access to business apps without requiring full device enrollment, while enforcing controls like download redirection, copy/paste restrictions, and clearer Entra-based onboarding.

Intune

Intune January 2026 Updates: Win32, EPM, Apple

Microsoft’s January 2026 Intune updates focus on reducing admin friction with new PowerShell-script installers for Win32 apps, making it easier to update deployment logic without repackaging full apps, while preserving clearer success and failure reporting. The release also improves Endpoint Privilege Management and broader approval and remediation workflows, which matters because it helps IT teams roll out changes faster, maintain user-context compatibility, and strengthen auditability across endpoint and security operations.

Intune

Microsoft Intune Technical Takeoff 2026 in March

Microsoft is bringing its engineering-led Technical Takeoff back in March 2026, with new Intune-focused sessions streaming every Monday on Microsoft Tech Community and recordings posted shortly after. The event matters for IT admins because it offers direct access to Microsoft engineers through live Q&A, deep technical sessions, and feedback opportunities on areas like Zero Trust, endpoint security, and privilege management—helping teams sharpen deployment plans and stay aligned with the Intune roadmap.