Implementing Multi-Admin Approval (MAA) in Microsoft Intune introduces a critical security control by ensuring that sensitive administrative actions require approval from multiple administrators.
Below is a practical step-by-step guide to help you deploy and operationalise MAA in your environment.
βοΈ Step 1: Create an Access Policy
- Sign in to the Microsoft Intune admin center
- Navigate to:
π Tenant Administration β Multi Admin Approval β Access policies - Select Create
π§± Configure Basics
- Provide:
- Name (e.g. βMAA β Device Deletion Controlβ)
- Optional Description
- Select Profile type
- β οΈ Each policy supports only one profile type
π₯ Configure Approvers
- Select Add groups
- Choose an Azure AD group that will act as approvers
β οΈ Important:
- Only group-based assignment is supported
- No advanced include/exclude logic
β Review and Create
- Review configuration
- Select Create
π Approval Requirement
- A separate admin account (with MAA approval permissions) must:
- Sign in
- Review
- Approve the policy
βοΈ Finalise the Policy
- Return to the policy using the original admin account
- Select Complete
π Once completed:
Any action tied to the selected profile type will now require multi-admin approval
π€ Step 2: Submit a Request
When MAA is enabled, admins must follow an approval workflow.
π Submitting Changes
- Perform your normal action (e.g. delete device, modify config)
- On the final screen:
- Enter Business Justification
- Select Submit
β οΈ Important Notes
- If a request is already pending for the same object:
- β You cannot submit another
- Intune will display a warning message
π Track Request Status
Go to:
π Tenant Administration β Multi Admin Approval β My requests
β Cancel a Request
- Select request
- Click Cancel request (if not yet approved)
βοΈ Step 3: Approve or Reject Requests
π Locate Requests
Navigate to:
π Tenant Administration β Multi Admin Approval β Received requests
π§Ύ Review Details
- Select Business justification
- Review:
- Requested action
- Target resource
- Risk context
βοΈ Take Action
- Add notes in Approver notes
- Select:
- β Approve request
- β Reject request
π Final Completion Step
After approval:
- The requestor must select βCompleteβ
- Intune then:
- Executes the action
- Updates status to Completed
π Verify Outcome
Check:
- Intune notifications panel
- Confirmation of:
- Success β
- Failure β
π‘οΈ Operational Flow Summary
Admin Action β Submit Request β Approval Required β Approved β Complete β Action Executed
π― Best Practices
- Separate:
- Requestor β Approver
- Use:
- Privileged Identity Management (PIM)
- Require:
- Strong business justification
- Monitor:
- Approval logs regularly
π Why This Matters
This process introduces:
- π Protection against compromised admin accounts
- π₯ Human validation for sensitive actions
- β±οΈ Time delay for detection and response
- π Full audit trail for compliance
Click Here To Return To Blog