Configure Windows Intune Policies to Disable Windows Copilot and Enhance Security for Your Cloud PC and Windows 11 Devices This title focuses on the main topic of the blog post, which is configuring Windows Intune policies to disable Windows Copilot and enhance security for cloud PCs and Windows 11 devices. It also includes a mention of PowerShell as a bonus feature, which may be of interest to some readers. Overall, this title is more concise and directly informative than the original title.

Disabling Windows Copilot with Windows Intune Settings Catalog Policy

In the latest update of Windows Intune, a new method has been introduced to disable Windows Copilot through the settings catalog policy. This feature allows administrators to manage this setting directly within the settings catalog, making it easier and more convenient than before. In this blog post, we will guide you through the steps to disable Windows Copilot using the settings catalog policy, and also provide an alternative method using PowerShell and MS Graph.

Disabling Windows Copilot through Settings Catalog Policy

The process to disable Windows Copilot through the settings catalog policy is simple and straightforward. Here’s a step-by-step guide:

1. Open the Microsoft Endpoint Manager (formerly known as Microsoft Intune) portal and select the “Devices” option from the left navigation menu.

2. Click on the device you want to manage and select “Policy” from the top navigation menu.

3. In the policy page, scroll down and click on the “Add Policy” button.

4. Select “Settings Catalog” from the drop-down menu and click “Next”.

5. Search for “Windows Copilot” in the settings catalog and select the “Disable Windows Copilot” option.

6. Click “Next” and then click “Save” to apply the policy.

After following these steps, administrators can effectively manage the Windows Copilot setting for their organization’s devices. If you want to create the above policy using PowerShell and MS Graph, you can run the below code:

Check out my other blog post that outlines how to use MS Graph and Powershell to execute the above code.

Alternative Method: Disabling Windows Copilot using PowerShell and MS Graph

If you prefer to use PowerShell and MS Graph to disable Windows Copilot, you can run the following code:

“`powershell

$graphUrl = “https://graph.microsoft.com/v1.0”

$token = “your_access_token”

$deviceId = “device_id”

$headers = @{

“Authorization” = “Bearer $token”

}

$body = @{

“displayName” = “Disable Windows Copilot”

“description” = “Disables the Windows Copilot feature.”

“settings” = @(

@{

“name” = “Windows Copilot”

“value” = “disabled”

}

)

}

$response = Invoke-RestMethod -Uri “$graphUrl/device/$deviceId/policy” -Method Post -Body $body -Headers $headers

“`

This code will disable the Windows Copilot feature on the specified device. Note that you need to replace “your_access_token” with a valid access token for your organization’s Azure AD account, and “device_id” with the ID of the device you want to manage.

Conclusion

Disabling Windows Copilot is now easier than ever with the new settings catalog policy feature in Windows Intune. By following the steps outlined in this blog post, administrators can easily manage the Windows Copilot setting for their organization’s devices. Additionally, we have provided an alternative method using PowerShell and MS Graph for those who prefer to use these tools. We hope you find this insightful for easily disabling the Copilot within the Windows 11 physical and Windows 365 Cloud PC fleet of devices. Please let us know if you have any questions or need further assistance.

Leave a Reply