ANAVEM
Languagefr
How to Map Network Drives in Microsoft Intune Using Custom ADMX Files

How to Map Network Drives in Microsoft Intune Using Custom ADMX Files

Configure network drive mappings for Entra-joined devices using Intune's Imported Administrative Templates feature with custom ADMX files instead of PowerShell scripts.

March 21, 2026 15 min 0
mediumintune 9 steps 15 min

Why Use ADMX Files Instead of PowerShell Scripts for Drive Mapping?

Microsoft Intune's Imported Administrative Templates feature has become the preferred method for network drive mapping in 2026, especially for Entra-joined (Azure AD-joined) devices. This ADMX-based approach eliminates the complexity of PowerShell script deployment while providing centralized policy management through familiar Group Policy-style configurations.

Traditional PowerShell scripts for drive mapping often face challenges in cloud-managed environments: execution policy restrictions, credential management complexity, and inconsistent reconnection behavior. ADMX files solve these problems by leveraging Windows' native policy engine, ensuring reliable drive mappings that persist across reboots and user sessions.

What Makes Custom ADMX Files Essential for Modern IT?

Custom ADMX files provide granular control over network drive configurations without requiring on-premises Active Directory infrastructure. For organizations transitioning to cloud-first management, this approach bridges the gap between traditional Group Policy functionality and modern device management capabilities.

The process involves importing four specific files: windows.admx and windows.adml (base Windows templates), plus drivemapping.admx and drivemapping.adml (drive mapping-specific templates). These files work together to create policy definitions that Intune can deploy to managed devices, ensuring consistent network access across your organization.

Related: How to Manage Registry Keys with Microsoft Intune for GPO

Related: Configure OneDrive Auto Sign-in Using Microsoft Intune

Related: How to Configure UAC with Microsoft Intune Settings Catalog

Related: Sync SharePoint Libraries Using Microsoft Intune

How Does This Approach Handle Entra-Joined Device Challenges?

Entra-joined devices don't have the traditional domain trust relationships that make network drive mapping straightforward. ADMX-based policies work around this limitation by configuring drive mappings at the user level through Intune's policy engine, ensuring that network resources remain accessible even in pure cloud environments. This tutorial will walk you through the complete process, from ADMX file preparation to policy deployment and troubleshooting common issues.

Implementation Guide

Full Procedure

01

Download and Prepare Required ADMX Files

First, you need to obtain four specific files: windows.admx, windows.adml, drivemapping.admx, and drivemapping.adml. The Windows files are available on any domain controller or Windows installation.

Navigate to your domain controller and copy the files from:

C:\Windows\PolicyDefinitions\windows.admx
C:\Windows\PolicyDefinitions\en-US\windows.adml

For the drive mapping files, download them from the GitHub repository referenced in Microsoft's Learn documentation. These files contain the specific policy definitions needed for network drive mapping.

Warning: Always verify file integrity before importing. Corrupted ADMX files can cause policy deployment failures.

Create a dedicated folder on your workstation to organize these files:

mkdir C:\ADMX-Files
# Copy all four files to this location

Verification: Confirm you have exactly four files: windows.admx (base template), windows.adml (language file), drivemapping.admx (drive mapping template), and drivemapping.adml (drive mapping language file).

02

Access Intune Admin Center and Navigate to ADMX Import

Open your web browser and navigate to the Microsoft Intune Admin Center. This is where you'll manage all device configurations and policies.

https://intune.microsoft.com

Sign in with your administrator credentials. Once authenticated, you'll see the main Intune dashboard.

Navigate to the ADMX import section by following this path:

  1. Click Devices in the left navigation pane
  2. Under the Configuration section, click Import ADMX
  3. You'll see the Import ADMX templates page

This section shows any previously imported ADMX files and their status. If this is your first time, the list will be empty.

Pro tip: Bookmark the Intune Admin Center URL for quick access. The interface updates frequently, so familiarize yourself with the current navigation structure.

Verification: You should see the "Import ADMX" page with options to upload new templates and view existing ones.

03

Import Windows ADMX Files First (Critical Dependency)

The import order is crucial because drivemapping.admx depends on windows.admx. Import the Windows base files first to avoid namespace errors.

Click the + Import button and follow these steps:

  1. Select windows.admx from your prepared files
  2. Click Upload
  3. Wait for the "Success" status to appear
  4. Click + Import again
  5. Select windows.adml
  6. Click Upload
  7. Confirm "Success" status

The import process typically takes 30-60 seconds per file. Don't proceed until you see the success confirmation.

Critical: If you import drivemapping.admx before windows.admx, you'll get a namespace error because drivemapping.admx references windows.admx on line 4 of the file.

Monitor the import status in the ADMX list. Both files should show:

Status: Success
Imported: [Current date/time]
Namespace: Microsoft.Policies.Windows

Verification: Check that both windows.admx and windows.adml show "Success" status before proceeding to the next step.

04

Import Drive Mapping ADMX Files

Now that the Windows base templates are imported, you can safely import the drive mapping specific files.

Continue with the drive mapping files:

  1. Click + Import
  2. Select drivemapping.admx
  3. Click Upload
  4. Wait for "Success" status
  5. Click + Import again
  6. Select drivemapping.adml
  7. Click Upload
  8. Confirm "Success" status

After successful import, you should see all four files listed with success status. The drive mapping namespace will be different from the Windows namespace:

drivemapping.admx - Status: Success
drivemapping.adml - Status: Success
Namespace: Microsoft.Policies.DriveMapping
Pro tip: If you encounter import failures, delete all previously imported files and start over with the correct sequence. The dependency chain must be maintained.

Verification: All four ADMX files should now appear in your Import ADMX list with "Success" status. The total count should show 4 imported templates.

05

Create Network Drive Mapping Configuration Profile

With the ADMX files imported, create a configuration profile that will deploy drive mappings to your devices.

Navigate to the configuration profiles section:

  1. Go to Devices > Windows > Configuration profiles
  2. Click + Create profile
  3. Select these options:
    • Platform: Windows 10 and later
    • Profile type: Templates
    • Template name: Imported Administrative templates (Preview)
  4. Click Create

Configure the basic profile information:

Name: Network Drive Mapping - Department Shares
Description: Maps H: drive to department shared folders for all users

This creates the framework for your drive mapping policy. The "Imported Administrative templates" option specifically uses your uploaded ADMX files.

Pro tip: Use descriptive names for your profiles. Include the drive letter and purpose to make management easier when you have multiple drive mapping policies.

Click Next to proceed to the configuration settings.

Verification: You should see the profile creation wizard with "Imported Administrative templates (Preview)" selected as the template type.

06

Configure Drive Mapping Settings and UNC Paths

Now configure the actual drive mapping settings using the imported ADMX templates.

In the Configuration settings section:

  1. Switch to User Configuration in the left sidebar (not Computer Configuration)
  2. Expand the policy tree to find Network Drive Mapping
  3. Select your desired drive letter (e.g., "Map H: drive")
  4. Click Enable

Configure these specific settings:

Drive Letter: H:
UNC Path: \\fileserver01\departments\marketing
Reconnect: Enabled
Label: Department Shared Files

The UNC path format is critical. Use this syntax:

\\[servername]\[sharename]\[optional-subfolder]

Examples:
\\fs01\shared
\\fileserver.domain.com\departments\hr
\\10.1.1.100\public
Warning: Ensure your network file server is accessible from Entra-joined devices. Test connectivity manually before deploying the policy.

Additional configuration options:

  • Hide/Show drive: Controls visibility in File Explorer
  • Persistent connection: Maintains mapping across reboots
  • Use different credentials: Prompts for alternate authentication

Verification: The policy should show "Enabled" status with your UNC path correctly entered. Test the UNC path manually from a target device first.

07

Assign Policy to Target Device Groups

Configure which devices or users will receive the drive mapping policy through group assignments.

In the Assignments section:

  1. Click the Assignments tab
  2. Under "Included groups," click + Add groups
  3. Select your target groups (device groups or user groups)
  4. Configure assignment options if needed

Common assignment strategies:

Device-based: Assign to device groups
- All-Windows-Devices
- Department-Laptops
- Marketing-Workstations

User-based: Assign to user groups
- Marketing-Users
- Finance-Department
- All-Company-Users

For testing, start with a pilot group:

Group Name: Pilot-DriveMapping-Test
Members: 5-10 test devices or users
Purpose: Validate policy before full deployment
Pro tip: Always test with a small pilot group first. Drive mapping issues can affect user productivity, so validate everything works before enterprise-wide deployment.

Review your configuration:

  1. Click Review + create
  2. Verify all settings are correct
  3. Click Create to deploy the policy

Verification: The policy should appear in your Configuration profiles list with "Assigned" status and show the number of targeted devices.

08

Monitor Policy Deployment and Verify Registry Changes

After deploying the policy, monitor its application and verify it's working correctly on target devices.

Check policy status in Intune:

  1. Navigate to your created profile
  2. Click Device status tab
  3. Monitor deployment progress

Policy sync can take time. Force immediate sync on a test device:

# On target Windows device
# Go to Settings > Accounts > Access work or school
# Click your organization account > Info > Sync

Verify policy application in the Windows registry on target devices:

# Check ADMX policy installation
Get-ItemProperty -Path "HKLM:\SOFTWARE\Microsoft\PolicyManager\AdmxInstalled"

# Check applied policies
Get-ItemProperty -Path "HKLM:\SOFTWARE\Microsoft\PolicyManager\Current\*" | Where-Object {$_.PSChildName -like "*Drive*"}

Look for registry entries containing your UNC path:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\PolicyManager\Current\[SID]\User\Software\Microsoft\Windows\CurrentVersion\Explorer\Map Network Drive MRU
Common issue: If drives don't appear, check network connectivity to the file server and verify UNC path syntax. The server must be accessible from Entra-joined devices.

Verification: Run net use command on target device to see mapped drives, or check File Explorer for the new drive letter with your specified label.

09

Troubleshoot Common Issues and Test Drive Access

Address common problems that occur with ADMX-based drive mapping and verify everything works correctly.

Issue 1: "Not Applicable" Status

This often occurs with multisession environments like Azure Virtual Desktop:

# Check device enrollment status
dsregcmd /status

# Look for:
# AzureAdJoined : YES
# DomainJoined : NO (for pure cloud scenarios)

Issue 2: Namespace Errors

If you see namespace errors, reimport ADMX files in correct order:

  1. Delete all imported ADMX files
  2. Import windows.admx first
  3. Import windows.adml
  4. Import drivemapping.admx
  5. Import drivemapping.adml

Issue 3: Drive Not Reconnecting

Check persistent connection settings and test manually:

# Test UNC path accessibility
net use H: \\fileserver01\departments\marketing /persistent:yes

# Verify connection
net use

# Remove test mapping
net use H: /delete

Final Verification Steps:

  1. Log into a target device as a test user
  2. Open File Explorer
  3. Verify the mapped drive appears with correct label
  4. Navigate to the drive and test file access
  5. Reboot the device and confirm drive reconnects
Pro tip: Create a simple test file on the network share to verify both read and write permissions are working correctly.

Verification: The mapped drive should appear in File Explorer, be accessible for file operations, and reconnect automatically after system restart.

Frequently Asked Questions

What are the main advantages of using ADMX files over PowerShell scripts for network drive mapping in Intune?+
ADMX files provide native Windows policy engine integration, eliminating PowerShell execution policy issues and credential management complexity. They offer more reliable reconnection behavior, centralized management through familiar Group Policy interfaces, and better compatibility with Entra-joined devices that lack traditional domain trust relationships.
Why must windows.admx be imported before drivemapping.admx in Microsoft Intune?+
The drivemapping.admx file contains a dependency reference to windows.admx on line 4 of the file structure. If you import drivemapping.admx first, Intune cannot resolve the namespace references, resulting in import failures. Always import the base Windows templates (windows.admx and windows.adml) before any dependent templates.
How do I troubleshoot network drive mappings that show 'Not Applicable' status in Intune?+
This commonly occurs in multisession environments like Azure Virtual Desktop where ADMX policies have limited applicability. Verify device enrollment status using 'dsregcmd /status', ensure the device is properly Entra-joined, and check that the policy is assigned to the correct user or device groups. For multisession scenarios, consider PowerShell script alternatives.
What UNC path format should I use for network drives in Entra-joined environments?+
Use the standard UNC format: \\servername\sharename\optional-subfolder. Ensure the file server is accessible from Entra-joined devices, which may require configuring modern authentication protocols on the server. Test connectivity manually before deploying policies, and consider using FQDN instead of NetBIOS names for better reliability.
How can I verify that ADMX-based drive mapping policies are working correctly on target devices?+
Check multiple verification points: monitor policy deployment status in Intune admin center, force policy sync on test devices through Settings > Accounts > Access work or school, verify registry entries at HKLM\SOFTWARE\Microsoft\PolicyManager\Current, and test actual drive access in File Explorer. Use 'net use' command to confirm mapped drives and their persistence across reboots.

Discussion

Share your thoughts and insights

Sign in to join the discussion