Without clear tags your Web Content Filter stays messy and your RBAC scopes stay wide. In this guide I show you how the Defender for Endpoint Scope Tag travels from Autopilot through Intune into Defender for Endpoint. I use short steps and share what works for me in real projects.

Table of Contents

Voraussetzungen

  • Microsoft Intune with admin rights
  • Defender for Endpoint Plan 1, Plan 2 or Defender for Business
  • Windows 10 or 11 with the MDE sensor
  • (Optional) Azure AD P1 for dynamic groups

Set the Autopilot Group Tag

  1. I open Intune ▸ Devices ▸ Windows ▸ Windows enrollment ▸ Devices.
  2. I pick a device and click on it.
  3. I type the tag name, for example scloud.
Autopilot Group-Tag

💡 Persistency: The tag survives a wipe as long as I keep the entry in the Autopilot list.

Create a dynamic Azure AD group

Gather every tagged device in one bucket. Create a Security Group with Dynamic membership and paste this rule:

(device.devicePhysicalIds -any (_ -eq "[OrderID]:scloud"))

Replace scloud with your own tag. New devices join the group on their own.

Add an Intune Scope Tag (optional)

Scope Tags can limit views for Help Desk roles, other predifeined roles or cusome roles.

  1. Go to Intune ▸ Tenant administration ▸ Roles ▸ Scope tags ▸ + Create.
  2. Name the tag exactly like your Group Tag.
  3. Under Assignments pick the dynamic group from Step 2.

Every device now carries the same Scope Tag.

After the assigment in can take a cloud-minut untily the Scope Tag actually shows up.

Scope-Tag on Intune Device

Push the tag to the device

Method A Classic: Intune Custom OMA URI

  1. Open Intune ▸ Devices ▸ Windows ▸ Configuration profiles ▸ + Create profile.
    Platform: Windows 10 and 11
    Template: Custom
  2. Add one setting:
    Name: Group Tag for Defender
    OMA URI: ./Device/Vendor/MSFT/WindowsAdvancedThreatProtection/DeviceTagging/Group
    Data type: String
    Value: scloud (only one tag per device, 200 characters max)
  3. Assign the profile to the dynamic group.
NameGroup-Tag
BeschreibungGroup-Tag for Defender
ORA-Uri./Device/Vendor/MSFT/WindowsAdvancedThreatProtection/DeviceTagging/Group
Data typeString
Valuescloud

The tag appears on the device card in the Microsoft Defender portal after the next sync.

MDE Tags

Method B Modern: Device Tagging rule

In the Defender portal open Settings ▸ Endpoints ▸ Device tagging and select Add tag rule. Target the Azure AD group from Step 2 and set the tag. No Intune profile is needed.

Make an MDE device group

  1. Open Settings ▸ Endpoints ▸ Device groups ▸ + Add device group.
  2. Enter a name and description.
  3. Under Tag query select scloud.
  4. Attach policies such as a Web Content Filter to this group.

Licence Note: Device groups work in Plan 1 and Defender for Business starting April 2024.

Troubleshooting

IssueFix
Tag does not show upSync the device in Intune and check mdmDiagnostics.html under C:\ProgramData\Microsoft\MDMDiagnostics.
Need more than one tagSwitch to Device Tagging rules or Intune Filters.
Dynamic group stays emptyCheck the query spelling. Tags are case sensitive.

FAQ (2025)

Can I change the tag later?
Yes. Update the Autopilot entry, the profile or the tagging rule. The old tag may stick until the next device sync.

Does this work on macOS or iOS?
No. The OMA URI setting is Windows only. Tag other platforms directly in the Defender portal.

Do I need Azure AD P1?
You need it only for dynamic groups. Static groups work without it.