Best Practices: Configuring Microsoft Intune Tenant Administration to Safeguard Devices from Unwanted Wipes

TLP: WHITE | Alert ID: 371c31ef | March 17, 2026, 04:23 PM
On March 17, 2026, Health-ISAC aggregated resources for configuring Microsoft Intune to prevent accidental device wipes. These resources were shared by health sector members to help other community members prevent unwanted device wipes and operational disruptions.
Microsoft Intune is prevalent in many health sector organizations and environments.
Organizations and their Managed Service Providers (MSPs) should consider the following best practices:
Implement Multi-Admin Approval (MAA) by default. Administrators must enable a second approver requirement for all destructive Intune commands, including remote wipe, retire, and bulk policy deployments.
Role-Based Access Control (RBAC). Remove the bulk Wipe permission from day-to-day adminstractor RBAC roles to ensure the ability to issue destructive commands is restricted to the most privileged accounts.
Scope Tags. Assign scope tags to devices and assign those tags to specific administrator roles, ensuring administrators can only wipe devices within their assigned scope.
- Related Resources & News
- Massachusetts hospital turning ambulances away after cyberattack
- Podcast: Phil Englert on Medical Device Cybersecurity
- The insider threat rises again
- ‘Missed opportunity’: US government’s absence from RSAC Conference leaves stark void
- Health-ISAC Hacking Healthcare 3-26-2026
- Health-ISAC Hacking Healthcare 3-19-2026
- Health-ISAC Monthly Newsletter – April, 2026
- After-Action Report: Health-ISAC Resilience Exercise Series 2025
- Why Microsoft Intune’s role in Stryker cyberattack is a scary prospect
- Texas Gov. Orders State Review of Chinese-Made Medtech