Reporting, Remediations & Day-2 Operations

Intune for SMBs: Zero to Hero  ·  Part 6 of 6  ·  Final

Microsoft Intune  ·  Endpoint Analytics  ·  Remediations  ·  Operations  ·  SMB  ·  2026

Most Intune projects fail quietly after deployment — not because the configuration is wrong, but because nobody builds an operational rhythm to keep it healthy. Parts 1 through 5 built the environment: devices enrolled, compliant, configured, stocked with software, hardened and defended. That is the foundation. The organisations that get lasting value from it are the ones that follow through — the right reports checked at the right frequency, small fixes automated so they never become tickets, and a clear picture of the estate's health at any point in time.

This final part covers the reports that matter and when to read them, Endpoint Analytics as a signal for device experience problems before users complain, Remediations as an automation layer that silently fixes recurring issues, and the weekly/monthly/quarterly habits that keep a well-built Intune environment from slowly drifting out of control.

📊
The reports discussed here are generally available within standard Intune licensing. The compliance, configuration, and app deployment reports are included with Intune Plan 1. Always verify current licensing requirements for Endpoint Analytics and advanced integrations in Microsoft's official documentation, as these details can change with bundle updates. Advanced reporting via the Microsoft Intune Data Warehouse or Power BI integration requires additional configuration but no extra licence cost.
🤖
Remediations run as SYSTEM — they have full local admin rights on the device. This makes them powerful for automated fixes, but also means a script with a bug can cause real damage. Test every Remediation on a single device before assigning it fleet-wide. Use the built-in dry-run output of the detection script before enabling the remediation script.
📅
Day-2 operations are more about cadence than complexity. A 15-minute weekly check of three reports catches 80% of issues before they escalate. Most SMB Intune environments do not need a dedicated IT person — they need a consistent schedule and clear escalation criteria.
✏️
Naming conventions and version control pay dividends over time. An environment built with clear naming (WIN-BitLocker-SMB-Baseline-v1) and a version increment on every significant change is significantly easier to hand over, audit, or troubleshoot 18 months later than one that was built fast without documentation discipline.

The reports that matter — and when to read them

Intune surfaces dozens of reports. Most of them are useful for investigation but not for routine monitoring. The three below are the ones an SMB admin should build into a regular check — everything else is for when something is already wrong.

Report Path in Intune What to look for Frequency
Device compliance Devices → Monitor → Device compliance Non-compliant count. Any device that has been Non-compliant for more than 24 hours needs investigation — either a genuine issue or a stale check-in. Weekly
Device configuration Devices → Monitor → Device configuration Conflict and Error counts by profile. A profile with a growing conflict count often means a new policy overlapped with it — investigate before it spreads. Weekly
App install status Apps → Monitor → App install status Failed deployments. A Required app with a non-zero failure count on enrolled devices needs attention — users may be missing critical software silently. Weekly
Windows Update compliance Reports → Windows updates → Windows 10 and later update rings Devices not receiving quality updates within your deadline window. A device that is 30+ days behind on patches is a security gap, not just an operational one. Monthly
Defender for Business alerts security.microsoft.com → Incidents & alerts Any active Medium or High severity alert. Low alerts can batch to weekly review; anything above that warrants same-day attention. Daily (Medium/High), Weekly (Low)
💡
Export and email reports for stakeholders who don't have Intune access. Most Intune reports support CSV export. A monthly email to IT management with the compliance rate, failed app count, and update status is more useful than a dashboard login they will never use. The Download button is available on every report view — no additional tooling needed.

Endpoint Analytics

Endpoint Analytics is a reporting layer within Intune that measures the user experience of managed devices — not whether they are compliant, but whether they are actually performing well for the people using them. It is found at Reports → Endpoint analytics.

The overall score (0–100) aggregates five sub-scores. Each sub-score benchmarks your environment against other organisations using Intune. More useful than the scores themselves are the per-device breakdowns — which specific devices are dragging a score down and why.

Score What it measures Actionable signal
Startup performance Time from power-on to a responsive desktop, broken down by boot time, sign-in time, and Group Policy/profile load time Devices consistently in the bottom percentile for boot time often have too many startup items, slow storage, or an undersized RAM configuration. The breakdown identifies where the time is actually going.
App reliability Application crash and hang rates across managed devices An app with a high crash rate fleet-wide often has a compatibility issue with a Windows update or a specific hardware configuration. Identify the pattern before it generates helpdesk volume.
Work from anywhere Whether devices meet Microsoft's recommended configuration for remote work — cloud identity, Intune management, cloud-managed updates, cloud-delivered protection Devices with a low score are often partially managed — enrolled in Intune but missing cloud-delivered protection or not fully Entra joined. Use as an audit list.
Battery health Estimated battery remaining capacity vs original capacity (requires Windows 11 or Windows 10 21H2+) Devices below 50% battery health are candidates for battery replacement before the user complains of short runtime. A proactive replacement costs less than an emergency swap during a meeting.
Recommended software Adoption of Windows 11, Microsoft 365 Apps, and Autopatch across managed devices Use as a migration progress tracker — how many devices are still on Windows 10, how many have not yet received the M365 Apps deployment.
💡
Endpoint Analytics data takes 24–72 hours to populate after enrolment. If you open it on a freshly built tenant and see zeros everywhere, that is expected. The scores stabilise once devices have been reporting for a few days. Check back after your first week of operation for meaningful data.

Remediations — automated detect-and-fix

Remediations (found at Devices → Scripts and remediations → Remediations) are pairs of PowerShell scripts — a detection script and a remediation script — that Intune runs on a schedule on managed devices. The detection script checks whether a condition is met. If it returns exit code 1 (issue found), Intune runs the remediation script to fix it. If it returns exit code 0 (all good), Intune does nothing. The cycle repeats on every run according to the schedule you configure.

The practical use case is anything that is either too granular to configure via a Settings Catalog profile, or that needs to be re-checked and re-applied over time rather than set once. Common examples include: ensuring the Windows time service is running and syncing correctly, confirming a specific registry value is set after a third-party application modifies it, clearing application caches that accumulate and cause performance issues, and verifying that a local admin account does not exist on the device.

⚠️
Remediations run as SYSTEM with local admin rights. Test your detection script on a single device first — use the Run detection script only option in the assignment before enabling the remediation script. A detection script that always returns exit 1 will trigger the remediation on every run, on every device, indefinitely. Validate the exit code logic on a test device before fleet-wide assignment.

Detection and remediation script structure

Every Remediation follows the same contract:

  • Detection script returns exit 0 → device is compliant, no remediation runs, Intune reports "Without issues"
  • Detection script returns exit 1 → issue detected, Intune runs the remediation script and reports "With issues"
  • Remediation script runs and succeeds → Intune reports "Remediated" on the next detection cycle
  • Remediation script runs and fails → Intune reports "Remediation failed" — check the script output in the device status view
✏️
Keep script output short and meaningful. The device status view in Intune shows whatever Write-Output produces — one clear result line is far easier to scan across a fleet than verbose console output. Write statements like "Time service healthy" or "Time drift excessive: 45s" rather than dumping full diagnostic text. The goal is a status column you can read at a glance across 100 devices.

Worked example: Windows Time Service health check

Devices with a drifted system clock cause Kerberos authentication failures, certificate errors, and — relevant to this series — compliance check failures where the timestamp does not match the server. The Windows Time service (w32tm) should be running, set to sync with a reliable source, and not drifted beyond a few seconds. This is simple enough to check manually once; automated with a Remediation, it self-heals on any device where the service gets stopped or misconfigured.

🌐
If your environment uses an internal time source or restricts outbound NTP-related traffic, adjust the detection logic accordingly. The example below queries time.windows.com directly. In environments with a local NTP server or strict firewall rules, replace the target with your internal time source or remove the drift check and monitor only service status.
Detection script — Windows Time Service PowerShell
# Returns exit 0 (healthy) or exit 1 (issue detected)

try {
    $svc = Get-Service -Name 'w32time' -ErrorAction Stop

    if ($svc.Status -ne 'Running') {
        Write-Output "w32tm service not running: $($svc.Status)"
        exit 1
    }

    # Check time drift — warn if > 30 seconds off
    $drift = (w32tm /stripchart /computer:time.windows.com /samples:1 /dataonly 2>&1 |
              Select-String '\+' | Select-Object -Last 1).ToString()

    if ($drift -match '\+(\d+\.\d+)') {
        $seconds = [double]$Matches[1]
        if ($seconds -gt 30) {
            Write-Output "Time drift excessive: ${seconds}s"
            exit 1
        }
    }

    Write-Output "Time service healthy"
    exit 0
}
catch {
    Write-Output "Detection error: $_"
    exit 1
}
Remediation script — Windows Time Service PowerShell
# Runs only when detection returns exit 1

try {
    # Ensure service is set to automatic and running
    Set-Service -Name 'w32time' -StartupType Automatic
    Start-Service -Name 'w32time' -ErrorAction Stop

    # Re-register and force sync
    w32tm /unregister | Out-Null
    w32tm /register  | Out-Null
    w32tm /resync /force | Out-Null

    Write-Output "Time service restarted and synced"
    exit 0
}
catch {
    Write-Output "Remediation failed: $_"
    exit 1
}
1
Create the Remediation in Intune
Go to Devices → Scripts and remediations → Remediations → Create. Name it WIN-Remediation-TimeService-v1. Upload the detection script and remediation script separately. Set Run script in 64-bit PowerShell to Yes. Set Run this script using logged-on credentials to No (runs as SYSTEM).
2
Test detection only first
Assign to a single test device. Under Scope, enable Run detection script only. Check the device status after the next check-in — verify the detection script returns the expected exit code before enabling the remediation script.
3
Set the schedule and expand
Set Run frequency to Once a day. Enable the remediation script. Expand assignment to your full Windows device group. The remediation now runs daily — any device where the time service stops or drifts is silently corrected without a helpdesk ticket.

Operational rhythm

The goal is not to spend hours in the Intune portal every week. The goal is a consistent, lightweight check that catches drift before it becomes an incident. The tasks below are sized for a single IT admin managing an SMB estate of 20–200 devices.

Weekly — 15 minutes
Device compliance report — check Non-compliant count. Any device non-compliant for 48+ hours: investigate the specific failing settings and whether it has checked in recently.
App install status — scan for Required apps with Failed status. A growing failure count on a Required app often means a recent Windows update broke a dependency or the detection rule needs updating.
Device configuration conflicts — check for any new Conflict states across profiles. A new conflict usually means a recently deployed profile or baseline overlapped with an existing one.
Defender alerts — medium and high severity — review any open Medium or High alerts from the past 7 days. Resolve or document with a justification. Do not let Medium alerts accumulate.
Monthly — 30–45 minutes
Windows Update compliance — confirm all devices received last month's quality update within your deadline window. Investigate any device more than 15 days behind.
Endpoint Analytics trends — check whether scores are improving or degrading. A declining Startup Performance score across multiple devices often precedes a wave of "my computer is slow" tickets.
Remediation results — check the device status for each active Remediation. High "Remediation failed" counts indicate a script that needs updating. High "With issues" counts that are consistently remediated indicate a root cause worth fixing properly.
Security baseline version check — visit Endpoint security → Security baselines and check whether Microsoft has published a new version since your last review. Read the changelog before deciding whether to migrate.
ASR audit log review — if any ASR rules are still in Audit mode, review the Event Viewer or Defender portal for flagged events. Move rules with zero legitimate blocks to Block mode.
Quarterly — 1–2 hours
Group membership audit — verify that the groups used for policy assignment still reflect reality. Users who left, devices that were replaced, and roles that changed all affect group membership without Intune knowing.
Compliance policy OS version — update the minimum OS version in your compliance policy to reflect the current supported Windows version. Windows releases new versions annually — your compliance floor should keep pace.
Licence assignment review — confirm that all active users have a Business Premium licence assigned and that departed users have been deactivated in Entra ID. Orphaned licensed accounts are a security and cost issue.
Profile and baseline version review — review whether any configuration profiles need updating due to changed requirements, new Windows capabilities, or feedback from users. Increment the version number on any profile you modify.
Defender Vulnerability Management review — check the Threat & Vulnerability Management dashboard in the Defender portal for the top recommendations. Address any critical vulnerabilities across your fleet that have not been patched by Windows Update.

Long-term hygiene — keeping the environment maintainable

Intune environments do not suddenly become unmaintainable — they drift there gradually. A policy created without a description. A group named "Test2-Final" that became permanent. A Remediation that no one remembers writing. The following habits cost almost nothing to adopt at the start and pay significant dividends when you are troubleshooting an issue at 17:45 on a Friday.

Naming conventions

Adopt a consistent pattern and use it for every object in Intune: profiles, baselines, groups, remediations, apps. A pattern like [Platform]-[Type]-[Scope]-[Version] — for example WIN-Compliance-SMB-Baseline-v1 or WIN-Remediation-TimeService-v1 — is readable in list views, filterable, and self-documenting. When you update a policy significantly, increment the version rather than editing in place. This preserves the history of what changed and when.

Descriptions on everything

Every policy, profile, group, and Remediation in Intune has a Description field. Fill it in. At minimum: what the policy does, the date it was created, and the reason it exists. Future-you and your colleagues will read this description when troubleshooting a conflict six months from now. "Created 2026-03-15 — enforces BitLocker silent encryption per SMB security baseline. See IT Wiki / Intune for full rationale." takes 30 seconds to write and saves hours later.

Test before fleet

Every policy change — whether a new profile, a Remediation update, or a baseline version migration — should be assigned to a pilot group of 2–5 devices before expanding to the full fleet. The pilot group should include at least one device with a non-standard configuration (an older machine, a device with more software installed, a device used by a power user). Issues that appear in the pilot group rarely appear fleet-wide. Issues that appear fleet-wide are always harder to roll back.

Document your deviations

Whenever you override a baseline setting, exclude a device from a policy, or make an exception to a compliance rule, write it down. A short internal page or even a comments column in a spreadsheet is enough. Undocumented exceptions accumulate and eventually become the source of security gaps that nobody can explain — because the person who created the exception left two years ago.

Series completion checklist

This checklist consolidates the key deliverables across all six parts. A fully built SMB Intune environment has everything below in place.

  • Part 1 — Tenant configured, devices enrolled MDM authority set, automatic enrolment enabled, four device/user groups created, first Windows device enrolled and verified with dsregcmd /status.
  • Part 2 — Compliance enforced, Conditional Access active Windows compliance policy with four baseline settings, tenant toggle set to Not compliant, CA policy moved from Report-only to Enabled after validation.
  • Part 3 — Five configuration profiles deployed BitLocker (recovery key escrowed), Windows Hello for Business (PIN active, NgcSet: YES), OneDrive KFM (folders redirected), Edge hardening, Windows Update rings (pilot + production).
  • Part 4 — Software deployed via Intune Company Portal on all devices, M365 Apps deployed to licensed users (Monthly Enterprise Channel, 64-bit), at least one Win32 app packaged and deployed with a version-pinned detection rule.
  • Part 5 — Hardened and defended Windows Security Baseline deployed, M365 Apps and Edge baselines deployed (after conflict check), Defender connector active, devices onboarded to Defender EDR, ASR rules in Audit mode with review scheduled.
  • Part 6 — Operational rhythm established Weekly/monthly/quarterly check schedule documented. At least one Remediation deployed and validated. Endpoint Analytics reviewed. Naming conventions in use across all policies.
  • Operational documentation updated and ready for handover Policy names, group assignments, exceptions, and Remediation purpose recorded in an internal document or IT wiki. Anyone inheriting this environment can understand what each object does, why it exists, and what has been intentionally excluded — without needing to ask.
Series complete — Intune for SMBs: Zero to Hero
Your Intune environment is built. Now keep it running.
You've gone from an empty tenant to a fully enrolled, compliant, configured, secured, and operationally managed Intune environment. The six parts below cover the full journey — share them with your team or use them as a handover document.

Start from the beginning
Intune for SMBs: Zero to Hero
New to Intune? Start with licensing, tenant setup, and your first enrolled device. The full series guides you from zero to a production-ready SMB environment. Start with Part 1 →
Next
Next

Security Baselines & Defender for Business