Run the online readiness assessment tool

Step 1: Run the online readiness assessment tool for management settings

The online tool checks settings in the Microsoft Intune admin center, Microsoft Entra ID, and Microsoft 365 to ensure they'll work with Microsoft Managed Desktop.

Microsoft Managed Desktop retains the data associated with these checks for 12 months after the last time you run a check in your Microsoft Entra organization (tenant). After 12 months, we retain it in de-identified form. You can choose to delete the data we collect.

Anyone with at least the Global Reader or Intune Administrator role will be able to run this tool, but two of the checks (Conditional access policies and Multi-factor authentication) require extra permissions.

Important

The online readiness assessment tool helps you check your readiness to enroll in Microsoft Managed Desktop for the first time. If your organization is already enrolled in Microsoft Managed Desktop, don't use this tool.

Step 2: Review the management setting results

For each of the following checks, the online readiness tool will report one of four possible results:

Result Meaning
Ready No action is required before you complete enrollment.
Advisory Follow the steps in the tool for the best experience with enrollment and for users.

You can complete enrollment, but you must fix these issues before you deploy your first device.
Not ready Enrollment will fail if you don't fix these issues.

Follow the steps in the tool to resolve them.
Error The Microsoft Entra role you're using doesn't have sufficient permission to run this check.

Microsoft Intune settings

The following are the Microsoft Intune settings:

Check Description
Autopilot deployment profile Verifies that assignment of the Autopilot deployment profile doesn't apply to all devices.

The profile should not be assigned to any Microsoft Managed Desktop devices.
Certificate connectors Checks the state of certificate connectors to ensure they're active.
Conditional access Verifies that conditional access policies aren't assigned to all users.

Conditional access policies should not be assigned to Microsoft Managed Desktop service accounts.
Device Compliance policies Checks that Intune compliance policies aren't assigned to all users.

The policies should not be assigned to any Microsoft Managed Desktop devices.
Device Configuration profiles Confirms that configuration profiles aren't assigned to all users or all devices.

Configuration profiles should not be assigned to any Microsoft Managed Desktop devices.
Device type restrictions Checks that Windows 10 devices in your organization are allowed to enroll in Intune.
Enrollment Status Page Confirms that Enrollment Status Page isn't enabled.
Intune enrollment Verifies that Windows 10 devices in your Microsoft Entra organization are automatically enrolled in Intune.
Multi-factor authentication Verifies that multi-factor authentication isn't applied to Microsoft Managed Desktop service accounts.
PowerShell scripts Checks that Windows PowerShell scripts are not assigned in a way that would target Microsoft Managed Desktop devices.
Region Checks that your region is supported by Microsoft Managed Desktop.
Security baselines Checks that the security baseline profile doesn't target all users or all devices.

Security baseline policies should not target any Microsoft Managed Desktop devices.
Windows apps Review which apps you want to assign to Microsoft Managed Desktop devices.
Windows Hello for Business Checks that Windows Hello for Business is enabled.
Windows 10 update ring Checks that Intune's "Windows 10 update ring" policy doesn't target all users or all devices.

The policy should not target any Microsoft Managed Desktop devices.

Microsoft Entra settings

The following are the Microsoft Entra settings:

Check Description
"Ad hoc" subscriptions for Enterprise State Roaming Advises how to check a setting that, if set to "false", might prevent Enterprise State Roaming from working correctly.
Enterprise State Roaming Advises how to check that Enterprise State Roaming is enabled.
Licenses Checks that you've obtained the necessary licenses.
Multi-factor authentication Checks that multi-factor authentication isn't applied to all users.

Multi-factor authentication must not accidentally be applied to Microsoft Managed Desktop service accounts.
Security account names Checks that no user names conflict with ones that Microsoft Managed Desktop reserves for its own use.
Security administrator roles Confirms that users with Security Reader, Security Operator, or Global Reader roles have been assigned those roles in Microsoft Defender for Endpoint.
Security defaults Checks whether your Microsoft Entra organization has security defaults enabled in Microsoft Entra ID.
Self-service password reset Confirms that self-service password reset is enabled.
Standard user role Verifies that users are standard users and don't have local administrator rights.

Microsoft 365 Apps for enterprise settings

The following are the Microsoft 365 Apps for Enterprise settings:

Check Description
OneDrive for Business Checks whether OneDrive for Business is using unsupported settings.

After enrollment

After you've completed enrollment in Microsoft Managed Desktop, remember to go back and adjust certain Intune and Microsoft Entra settings. For more information, see Adjust settings after enrollment.