Now booking Q1 Intune migrations — talk to an engineer.

CyberSystem
← Back to Blog

Intune Filters: Complete Assignment and Configuration Guide

Learn how to create and use filters in Intune to dynamically target apps, policies, and profiles based on device properties, including rule creation and filter evaluation.

By Ali Alame
intunefiltersassignment-filtersdevice-propertiesdynamic-targetingpolicy-assignment

Filters in Microsoft Intune allow you to dynamically target apps, policies, and profiles based on device or app properties. Filters provide granular control over assignments, enabling you to include or exclude devices based on specific criteria without creating additional groups.

Understanding Filters

Filters in Intune narrow the assignment scope of policies and apps based on rules you create. Filters dynamically evaluate device or app properties at check-in time, determining whether a policy or app should apply without requiring precomputed group membership.

Key Benefits

  • Dynamic Targeting: Target based on device properties
  • Flexible Assignment: Include or exclude devices
  • Reusable: Use same filter in multiple assignments
  • High Performance: Evaluated at device check-in
  • Granular Control: Fine-tune policy assignments

For an overview, see Use filters when assigning your apps, policies, and profiles in Microsoft Intune.

How Filters Work

Filter Evaluation

  1. Filter Creation: Admin creates filter with rules
  2. Policy Assignment: Filter added to policy assignment
  3. Device Check-in: Filter evaluated when device checks in
  4. Application: Policy applies if filter matches

Filter Modes

  • Include: Devices matching filter receive policy
  • Exclude: Devices matching filter don't receive policy

Creating Filters

Step 1: Access Filters

  1. Sign in to the Microsoft Intune admin center
  2. Navigate to Tenant administration > Assignment filters > Create
    • Or: Devices > Organize devices > Assignment filters
    • Or: Apps > Organize devices > Assignment filters

Step 2: Select Filter Type

  1. Managed devices: For enrolled devices
  2. Managed apps: For app protection policies

Step 3: Configure Basics

  1. Filter name: Descriptive name
  2. Description: Optional description
  3. Platform: Select platform
    • Managed devices: Android, iOS, macOS, Windows
    • Managed apps: Android, iOS, Windows
  4. Select Next

Step 4: Create Rules

Rule Builder:

  1. Property: Select property (e.g., device.osVersion)
  2. Operator: Select operator (equals, contains, etc.)
  3. Value: Enter value
  4. Add expression: Add to rule
  5. And/Or: Add additional conditions

Rule Syntax:

  • Manually enter expressions
  • Use rule syntax editor
  • Example: (device.osVersion -eq "10.0.18362") and (device.manufacturer -eq "Microsoft")

Step 5: Preview Devices

  1. Select Preview devices
  2. Review devices matching filter
  3. Search and filter preview list
  4. Verify filter criteria

Step 6: Review and Create

  1. Review filter configuration
  2. Select Create

For step-by-step guidance, see Create a filter.

Using Filters

Assigning Filters to Policies

  1. Navigate to policy (e.g., Compliance policy)
  2. Select Properties > Assignments > Edit
  3. Assign policy to group
  4. Select Edit filter
  5. Choose option:
    • Do not apply a filter
    • Include filtered devices in assignment
    • Exclude filtered devices in assignment
  6. Select filter > Select
  7. Review + save > Save

For details, see Use a filter.

Filter Restrictions

General Restrictions

  1. Maximum Filters: Up to 200 filters per tenant
  2. Character Limit: Each filter limited to 3,072 characters
  3. Managed Devices: Devices must be enrolled
  4. Managed Apps: Apply to app protection and app configuration policies only

Supported Workloads

Filters support various workloads:

  • Apps
  • Compliance policies
  • Configuration profiles
  • Enrollment restrictions
  • And more

For complete list, see Supported workloads when creating filters.

Filter Examples

Example 1: Windows OS Version

Scenario: Deploy policy only to Windows 11 devices

Filter:

device.osVersion -startsWith "10.0.22"

Example 2: Device Manufacturer

Scenario: Exclude specific manufacturer

Filter:

device.manufacturer -ne "Samsung"

Example 3: Corporate Devices Only

Scenario: Include only corporate-owned devices

Filter:

device.enrollmentProfileName -ne ""

Example 4: Multiple Conditions

Scenario: Windows 11 corporate devices

Filter:

(device.osVersion -startsWith "10.0.22") and (device.enrollmentProfileName -ne "")

Filter Reports

Filter Evaluation Report

View filter evaluation for devices:

  1. Navigate to Devices > All Devices
  2. Select device > Filter evaluation
  3. Review:
    • Filters evaluated
    • Evaluation time
    • Match/No match results
    • Filter mode (Include/Exclude)
    • Filter rules and properties

For details, see Filter evaluation report for devices.

Best Practices

1. Use Descriptive Names

  • Name filters clearly
  • Include purpose in name
  • Document filter usage
  • Maintain naming consistency

2. Test Filters

  • Preview devices before creating
  • Test with pilot groups
  • Verify filter behavior
  • Monitor filter evaluation

3. Keep Filters Simple

  • Avoid overly complex rules
  • Use clear conditions
  • Test filter performance
  • Optimize as needed

4. Document Filters

  • Document filter purpose
  • Record filter usage
  • Maintain filter inventory
  • Update documentation

5. Review Regularly

  • Review filter assignments
  • Check filter effectiveness
  • Remove unused filters
  • Optimize filter rules

Troubleshooting

Common Issues

  1. Filter Not Applying

    • Verify filter assignment
    • Check device properties
    • Review filter rules
    • Test filter evaluation
  2. Unexpected Results

    • Preview devices
    • Review filter rules
    • Check property values
    • Verify operator usage
  3. Performance Issues

    • Simplify filter rules
    • Reduce filter complexity
    • Review filter usage
    • Optimize conditions

Additional Resources

Conclusion

Filters provide powerful capabilities for dynamically targeting apps and policies in Intune. By following these best practices:

✅ Use descriptive filter names
✅ Test filters thoroughly
✅ Keep filters simple
✅ Document filter usage
✅ Review filters regularly

You can achieve granular control over policy assignments while maintaining performance and avoiding the need for numerous additional groups.

Remember: Filters are evaluated at device check-in time, providing dynamic targeting without precomputed group membership. Always preview devices and test filters before deploying to production.