ANAVEM
Languagefr
How to Create and Deploy Wi-Fi Profiles in Microsoft Intune

How to Create and Deploy Wi-Fi Profiles in Microsoft Intune

Configure and deploy Wi-Fi profiles using Microsoft Intune to automatically distribute wireless network settings to managed devices across Windows, Android, iOS, and macOS platforms.

March 29, 2026 15 min
hardintune 8 steps 15 min

Why Deploy Wi-Fi Profiles Through Microsoft Intune?

Managing Wi-Fi connectivity across hundreds or thousands of corporate devices manually is a nightmare. Users forget passwords, type them incorrectly, or connect to wrong networks. Microsoft Intune solves this by automatically distributing Wi-Fi profiles that configure network settings without user intervention.

Wi-Fi profiles in Intune support both basic networks (WPA2-PSK with shared passwords) and enterprise networks (certificate-based authentication with EAP-TLS or PEAP). This means you can secure guest access with simple passwords while protecting corporate networks with robust certificate authentication.

What Platforms Support Intune Wi-Fi Profiles?

Intune supports Wi-Fi profile deployment across all major platforms: Windows 10/11, Android (both device administrator and Android Enterprise), iOS/iPadOS, and macOS. Each platform has specific capabilities - for example, Windows supports WPA3 from version 22H2, while Android Enterprise offers enhanced security features not available in device administrator mode.

The latest Intune service release (2402.1 as of early 2026) includes WPA3-Personal enhancements for iOS 18+ and improved certificate integration across all platforms. Enterprise networks particularly benefit from automatic certificate deployment combined with Wi-Fi profiles, eliminating the complex manual setup traditionally required for EAP-TLS authentication.

How Do Enterprise Wi-Fi Profiles Enhance Security?

Enterprise Wi-Fi profiles leverage certificate-based authentication instead of shared passwords. This means each device gets unique credentials that can be revoked individually if compromised. Combined with Intune's certificate management through SCEP or PKCS profiles, you create a zero-trust wireless environment where devices authenticate using machine or user certificates issued by your internal certificate authority.

Implementation Guide

Full Procedure

01

Access Microsoft Intune Admin Center and Navigate to Configuration Profiles

Start by signing into the Microsoft Intune admin center. This is where you'll manage all device configuration policies including Wi-Fi profiles.

Open your browser and navigate to endpoint.microsoft.com. Sign in with your admin credentials that have either Global Admin or Intune Admin permissions.

Once logged in, navigate to Devices from the left sidebar, then select Configuration. You'll see a list of existing configuration profiles if any are already created.

Click Create and then select New policy from the dropdown menu. This opens the policy creation wizard where you'll configure your Wi-Fi profile.

Pro tip: Bookmark the Intune admin center URL for quick access. The interface loads faster than navigating through the Microsoft 365 admin center.

Verification: You should see the "Create a profile" page with platform selection options including Windows 10 and later, Android, iOS/iPadOS, and macOS.

02

Select Platform and Configure Basic Wi-Fi Profile Settings

Choose your target platform first, as each platform has slightly different Wi-Fi configuration options. For this example, we'll start with Windows 10 and later, but the process is similar across platforms.

Select Platform: Windows 10 and later, then choose Profile type: Templates and select Wi-Fi from the template list.

In the Basics section, configure these essential fields:

  • Name: Enter a descriptive name like "Corporate Wi-Fi Basic" or "Guest Network Profile"
  • Description: Add details about the network purpose and target users

Click Next to proceed to configuration settings. Here you'll define the actual Wi-Fi network parameters that devices will use to connect automatically.

Warning: Choose platform-specific profiles rather than trying to create one profile for all platforms. Each OS handles Wi-Fi settings differently, and platform-specific profiles ensure better compatibility.

Verification: The configuration settings page should display Wi-Fi specific options like SSID, security type, and authentication methods.

03

Configure Basic WPA2-PSK Wi-Fi Network Settings

For a basic Wi-Fi network using WPA2 with a pre-shared key (most common for small offices or guest networks), configure these essential settings:

Connection name: This is the user-visible name that appears in their Wi-Fi list. Enter something like "CorpWiFi" or "GuestNetwork".

Network name (SSID): Enter the exact SSID of your wireless network. This must match exactly, including case sensitivity.

Security type: Select WPA2-Personal for basic networks with shared passwords.

Pre-shared key: Enter the Wi-Fi password. This will be securely distributed to devices without users needing to know it.

Additional optional settings you can configure:

  • Connect automatically: Enable this so devices connect without user intervention
  • Connect when network is not broadcasting: Enable for hidden SSIDs
  • Metered connection limits: Set data usage restrictions if needed
Pro tip: For guest networks, disable "Connect automatically" and enable "Metered connection" to prevent automatic background data usage.

Verification: Review all settings carefully. The SSID and pre-shared key are the most critical - any typos will prevent connections.

04

Create Enterprise Wi-Fi Profile with EAP Authentication

Enterprise networks require certificate-based authentication for enhanced security. Create a new profile following steps 1-2, but select different security settings for enterprise authentication.

In the configuration settings, choose these enterprise options:

Security type: Select WPA2-Enterprise or WPA3-Enterprise (if your infrastructure supports WPA3).

EAP type: Choose based on your authentication infrastructure:

  • EAP-TLS: Uses client certificates for authentication (most secure)
  • PEAP: Uses username/password with server certificate validation
  • EAP-TTLS: Similar to PEAP but with different tunneling

For EAP-TLS configuration:

  • Client authentication certificate: Select an existing SCEP or PKCS certificate profile
  • Root certificate for server validation: Choose your organization's root CA certificate profile

For PEAP configuration:

  • Authentication method: Select "Username and password"
  • Root certificate for server validation: Select your trusted root CA profile
  • Identity privacy (outer identity): Optional anonymous identity for initial connection
Warning: Enterprise profiles will fail if the required certificate profiles aren't deployed first. Always deploy root CA and client certificate profiles before the Wi-Fi profile.

Verification: Check that all referenced certificate profiles exist in Devices > Configuration and are assigned to the same device groups.

05

Configure Advanced Settings and Platform-Specific Options

Each platform offers unique advanced settings that can enhance the Wi-Fi experience. Configure these based on your network requirements and security policies.

For Windows devices:

  • Company Portal authentication: Require users to authenticate through Company Portal before connecting
  • Single sign-on: Enable if using the same credentials for network and domain authentication
  • Proxy settings: Configure automatic proxy detection or manual proxy server settings

For Android devices:

  • Wi-Fi hotspot blocking: Prevent devices from sharing the Wi-Fi connection
  • MAC address randomization: Enable for privacy (supported on Android 10+)

For iOS/iPadOS devices:

  • Disable MAC address randomization: Some enterprise networks require consistent MAC addresses
  • Captive network assistant: Disable if your network doesn't use captive portals

Example proxy configuration for automatic detection:

{
  "proxySettings": "automatic",
  "proxyAutomaticConfigurationUrl": "http://proxy.company.com/proxy.pac"
}
Pro tip: Test proxy settings on a small group first. Incorrect proxy configuration can break internet access entirely.

Verification: Review platform-specific settings in the Microsoft documentation to ensure you're using supported features for your target OS versions.

06

Configure Scope Tags and Assignment Groups

Scope tags help organize and control access to configuration profiles, especially in large organizations with multiple IT teams. Assignment groups determine which devices receive the Wi-Fi profile.

Scope tags configuration:

If your organization uses scope tags, select the appropriate tags from the dropdown. Common scope tags include:

  • Department-based tags (HR, Finance, Engineering)
  • Location-based tags (Office-NYC, Office-London)
  • Device type tags (Corporate-Laptops, BYOD-Devices)

If you don't use scope tags, leave this section with the default "Default" tag.

Assignment groups setup:

Click Next to reach the Assignments page. Here you'll specify which devices or users receive this Wi-Fi profile:

  • Include groups: Select Azure AD groups containing target devices or users
  • Exclude groups: Optionally exclude specific groups (useful for testing)

Common assignment strategies:

  • All Devices: For company-wide networks
  • All Users: For user-based assignments
  • Dynamic device groups: Based on device properties like OS version or enrollment type
  • Static groups: Manually managed groups for specific departments
Pro tip: Use dynamic groups based on device properties for automatic assignment. For example, create a group for "All Windows devices" using the rule: device.deviceOSType -eq "Windows".

Verification: Check group membership by clicking on the group name to ensure it contains the expected devices or users.

07

Review Configuration and Deploy the Wi-Fi Profile

Before deploying, carefully review all configuration settings to prevent connectivity issues. The review page shows a summary of all your Wi-Fi profile settings.

Review checklist:

  • SSID matches your network exactly (case-sensitive)
  • Security type matches your wireless infrastructure
  • Pre-shared key is correct (for basic profiles)
  • Certificate profiles are properly referenced (for enterprise profiles)
  • Assignment groups contain the intended devices

If everything looks correct, click Create to deploy the profile. Intune will begin distributing the Wi-Fi settings to assigned devices.

Deployment timeline:

  • Enrolled devices: 15-30 minutes for policy sync
  • New Autopilot devices: Up to 8 hours during initial setup
  • Manually enrolled devices: Next check-in cycle (typically 8 hours)

To force immediate deployment for testing, you can trigger a manual sync from the device:

  • Windows: Settings > Accounts > Access work or school > [Account] > Info > Sync
  • Android: Company Portal app > Settings > Sync
  • iOS: Settings > General > VPN & Device Management > [Management Profile] > More Details > Update Settings
Warning: Don't deploy to all devices immediately. Start with a test group of 5-10 devices to verify the profile works correctly before rolling out company-wide.

Verification: The profile appears in Devices > Configuration with a status of "Created" and begins showing deployment statistics within 30 minutes.

08

Monitor Deployment Status and Troubleshoot Issues

After deployment, monitor the Wi-Fi profile status to ensure successful distribution and identify any connection issues. Intune provides detailed reporting on profile deployment success and failures.

Navigate to Devices > Configuration and click on your Wi-Fi profile name. The overview page shows deployment statistics:

  • Succeeded: Devices that successfully received and applied the profile
  • Error: Devices that encountered errors during deployment
  • Conflict: Devices with conflicting policies
  • Not applicable: Devices that don't match the assignment criteria

Click Device status to see per-device details. For failed deployments, common error codes include:

  • 0x87D1FDE8: Certificate not found (enterprise profiles)
  • 0x80073CF9: Invalid SSID or security settings
  • 0x87D13B8F: User rejected the profile installation

Troubleshooting steps for common issues:

Certificate-related failures:

# Check certificate deployment on Windows device
Get-ChildItem -Path Cert:\LocalMachine\My
Get-ChildItem -Path Cert:\CurrentUser\My

SSID connectivity issues:

  • Verify the SSID is broadcasting and in range
  • Check if the device can see the network manually
  • Confirm security settings match the wireless infrastructure
Pro tip: Use the Company Portal app logs for detailed troubleshooting. On Android, enable diagnostic logs in Company Portal settings. On Windows, check Event Viewer under Applications and Services Logs > Microsoft > Windows > DeviceManagement-Enterprise-Diagnostics-Provider.

Verification: Test connectivity by checking if devices automatically connect to the Wi-Fi network and can access internet resources. Run ipconfig /all on Windows or check Wi-Fi settings on mobile devices to confirm the profile is active.

Frequently Asked Questions

Can I deploy the same Wi-Fi profile to all device platforms in Microsoft Intune?+
No, you need to create separate Wi-Fi profiles for each platform (Windows, Android, iOS, macOS) because each operating system handles Wi-Fi settings differently. While the basic configuration is similar, platform-specific options and security capabilities vary. For example, Windows supports WPA3 from version 22H2, while older Android versions may not support certain enterprise authentication methods. Creating platform-specific profiles ensures optimal compatibility and takes advantage of each OS's unique features.
How long does it take for Wi-Fi profiles to deploy to devices through Intune?+
Wi-Fi profile deployment timing varies by device type and enrollment status. Already enrolled devices typically receive profiles within 15-30 minutes during their next policy sync cycle. New Autopilot devices may take up to 8 hours to receive all policies during initial setup. Manually enrolled devices follow the standard check-in cycle, which defaults to every 8 hours. You can force immediate deployment by triggering a manual sync through device settings or the Company Portal app.
What's the difference between EAP-TLS and PEAP for enterprise Wi-Fi profiles?+
EAP-TLS uses client certificates for authentication and is considered more secure because it provides mutual authentication between the device and network. It requires deploying client certificates to each device through SCEP or PKCS profiles. PEAP uses username/password authentication protected by a server certificate, making it easier to deploy but potentially less secure. EAP-TLS is recommended for high-security environments, while PEAP works well for organizations that want enterprise security without complex certificate management for every user.
Why do my enterprise Wi-Fi profiles fail with certificate errors in Intune?+
Certificate errors in enterprise Wi-Fi profiles typically occur because the required certificate profiles aren't deployed before the Wi-Fi profile, or there's a mismatch between referenced certificates. The root CA certificate profile must be deployed first to establish trust, followed by client certificates (for EAP-TLS) or just the Wi-Fi profile (for PEAP). Check that certificate profiles exist in Devices > Configuration, are assigned to the same device groups as the Wi-Fi profile, and have successfully deployed. Common error code 0x87D1FDE8 specifically indicates a missing or invalid certificate reference.
Can I use dynamic groups for Wi-Fi profile assignments in Microsoft Intune?+
Yes, dynamic groups are highly recommended for Wi-Fi profile assignments because they automatically include devices based on properties like OS type, enrollment method, or device attributes. For example, you can create a dynamic group for "All Windows devices" using the rule device.deviceOSType -eq "Windows" to automatically assign Windows-specific Wi-Fi profiles. This eliminates manual group management and ensures new devices automatically receive appropriate Wi-Fi configurations. Dynamic groups update membership automatically, making them ideal for large organizations with frequent device changes.

Discussion

Share your thoughts and insights

Sign in to join the discussion