Skip to main content

βš™οΈπŸͺŸπŸ’»CP - Security - Config Refresh

Why do we have this policy? πŸš€β€‹

Config Refresh is a gamechanger for Intune policy enforcement. Normally, a Windows device checks in with Intune approximately every 8 hours. This means that if someone (or something) modifies a policy setting, it can take hours before it gets reverted.

That's a security risk. πŸ”₯

With Config Refresh, policies are re-applied every 30 minutes. Not just checked, but actually re-enforced.

Scenario without Config Refresh:​

  • Malware disables BitLocker via registry hack
  • Device won't check in with Intune for another 6 hours
  • For 6 hours the disk is unencrypted
  • Attacker has all the time to steal data
  • You get a call from the CISO 😬

Scenario with Config Refresh:​

  • Malware disables BitLocker via registry hack
  • Config Refresh restores the setting within 30 minutes
  • BitLocker is enabled again
  • Attacker frustrated
  • You sleep peacefully 😴

Config Refresh provides policy hardening that actually sticks.


πŸ› οΈ Settings​

SettingValueWhy
Config Refresh EnabledTrueEnable Config Refresh. This is the main switch.
Config Refresh Cadence30 minutesEvery 30 minutes policies are re-enforced. Balance between security and performance.

πŸ“– Cadence explanation​

30 minutes is the sweet spot:

  • βœ… Fast enough to detect and correct drift
  • βœ… Not so frequent that it impacts performance
  • βœ… Microsoft's recommended value
  • βœ… Enough time for normal operations

You can set this lower (minimum is 30 minutes), but 30 is the default and works great.


πŸ‘₯ Assignments​

βœ… Included groups:​

GroupStatusFilterFilter mode
All devicesActiveNoneNone

❌ Excluded groups:​

Why all devices except IoT?

  • All regular devices β†’ benefit from constant policy enforcement
  • IoT devices excluded β†’ these often have specific configurations that shouldn't be re-enforced every 30 minutes (kiosks, signage, etc.)

🧠 Fun facts & tips​

What exactly gets "refreshed"?​

Config Refresh restores all MDM policies pushed via Intune:

  • Device restrictions
  • Endpoint security policies
  • Configuration profiles
  • Administrative templates

It does not work for:

  • Apps (these are managed separately)
  • Scripts (these run on their own schedule)
  • Certificates (these have their own lifecycle)

Difference from normal sync​

Normal SyncConfig Refresh
Frequency~8 hours (or manual)Every 30 min
ActionCheck if there are updatesForce re-apply all policies
On driftWait for next syncRestores automatically

Config Refresh does not replace normal sync. It complements it. Normal sync fetches new policies. Config Refresh ensures existing policies keep working.

Performance impact?​

Minimal. Config Refresh is optimized by Microsoft:

  • Only policies that deviate are restored
  • No full re-enrollment
  • CPU/disk impact is negligible

You won't notice anything as a user. But attackers will. 😈

Monitoring​

In the Intune portal you can see when a device last synchronized. Config Refresh adds an extra layer to this, but isn't separately visible in the portal.

On the device itself you can check Event Viewer:

  • Applications and Services Logs β†’ Microsoft β†’ Windows β†’ DeviceManagement-Enterprise-Diagnostics-Provider

🎯 The bottom line​

Config Refresh ensures that security policies actually keep working.

Without Config Refresh:

  • Policies can be bypassed
  • Drift persists for hours
  • Security configuration is "best effort"

With Config Refresh:

  • Policies are enforced every 30 minutes
  • Drift is automatically restored
  • Security configuration is guaranteed

This is one of those policies you just need to have enabled. No discussion. No exceptions (except IoT).

Turn it on. Leave it on. Sleep better. 😴


πŸ”— Documentation​


Configure with intent. Refresh with regularity. And never trust a device that says "Policies applied" but hasn't actually checked in for 12 hours. πŸ™ƒ