Stop One Admin Breaking Your Entire Intune Environment

In Microsoft Intune, a single administrator can deploy apps, run scripts across thousands of devices, wipe endpoints, or modify security policies in seconds. That level of power is incredibly useful – but also incredibly dangerous. A compromised admin account or a simple configuration mistake could impact every managed device in your environment.

 

Multi Admin Approval (MAA) is designed to prevent that. It introduces a two-person approval process for sensitive changes, ensuring no single administrator can push high-impact changes without oversight.

 

Why Multi Admin Approval Matters

Administrative identities are prime targets for attackers. If an attacker gains access to an Intune admin account, they could:

  • Deploy malicious scripts across endpoints

  • Remove compliance or security policies

  • Modify RBAC permissions

  • Retire or wipe devices

  • Push unwanted applications

Multi Admin Approval introduces separation of duties, meaning:

  1. One administrator submits a change.

  2. A second authorised administrator reviews it.

  3. Only then is the change applied.

This creates an essential security control that aligns with Zero Trust and modern privileged access management practices.

 

What You Can Protect

Multi Admin Approval is configured using Access Policies, which define which resources require approval before changes are applied.

Protected resources include:

  • App deployments

  • Compliance policies

  • Configuration policies (Settings Catalog)

  • Device actions such as wipe or retire

  • RBAC role changes

  • Script deployments

  • Tenant configuration

  • Access policy management itself

Once enabled, any modification to these resources requires approval.

 

Prerequisites

Before configuring Multi Admin Approval, ensure:

  • The tenant has at least two administrator accounts

  • Each account has a Microsoft Intune license that supports administrative access (for example, Microsoft 365 Business Premium, E3, or E5)

  • An approver group exists in Microsoft Entra ID

  • Approvers have the Approval for Multi Admin Approval permission

  • The approver group is included in an Intune role assignment

Microsoft recommends using custom roles with least privilege instead of full Intune Administrator roles for routine access policy management.

 

Submitting a Change Request

When an administrator modifies a protected resource, they will see a new field before saving:

Business justification

This explanation becomes part of the approval request.

After submission, the request appears under:

Tenant administration → Multi Admin Approval → My Requests

The request status will show Needs approval until an approver reviews it.

 

Approving Requests

Approvers review requests from:

Tenant administration → Multi Admin Approval → Received Requests

For each request they can:

  • Review the justification

  • Add notes

  • Approve or reject

If approved:

  1. The request status changes to Approved

  2. The requestor selects Complete

  3. Intune applies the change

  4. Status becomes Completed

Requests remain visible for 30 days.

 

Operational Considerations

A few things to keep in mind when enabling Multi Admin Approval:

  • Intune does not send approval notifications

  • Approvers should be contacted for urgent changes

  • Only one pending request per object is allowed

  • All actions are logged in Intune audit logs

 

Final Thoughts

Multi Admin Approval is one of the simplest ways to dramatically improve governance and security in Microsoft Intune.

By requiring a second administrator to approve sensitive changes, organisations can:

  • Reduce the impact of compromised admin accounts

  • Prevent accidental large-scale configuration errors

  • Strengthen operational change control

For organisations managing hundreds or thousands of endpoints, enabling Multi Admin Approval should be considered a baseline security control for Intune administration.