• Thread Author
Microsoft’s enterprise backup story just took a meaningful step: Windows Backup for Organizations — the tenant-scoped backup and restore experience Microsoft built to ease device refreshes and large-scale Windows migrations — is being exposed to Intune administrators and moving into wider availability, with tenant controls that let IT show a restore page during Out‑Of‑Box Experience (OOBE) enrollment.

Row of laptops on a curved desk beneath a holographic display with an E shield and Intune logo.Background​

Windows Backup for Organizations began life as an evolution of the consumer settings-sync feature, redesigned and hardened for enterprise device lifecycle scenarios. The feature captures curated user device settings and a manifest of Microsoft Store apps and stores those artifacts in the organization’s Microsoft Entra (Azure AD) tenant so a user’s environment can be replayed during device enrollment. That restore experience is surfaced during OOBE for Entra‑joined devices and is managed at the tenant level through Microsoft Intune.
Microsoft signaled the product’s move beyond limited testing as part of August 2025 servicing notes and Release Preview entries; documentation and Intune controls have been published in parallel, and administrators can now enable backups via the Intune Settings Catalog and toggle the tenant-wide restore UX under Devices → Enrollment → Windows.

What Microsoft is delivering (what the feature actually does)​

Core capabilities​

  • Settings capture: System and personalization settings, network (known Wi‑Fi networks where supported), accessibility options, File Explorer preferences, Bluetooth pairings, and other device configuration items are included in the backup manifest.
  • Microsoft Store app manifest: The service records a list and placement intent for Microsoft Store apps so a similar Start layout and app presence can be restored during OOBE; it does not repackage or restore Win32 (MSI/EXE) desktop applications.
  • Tenant‑scoped storage: Backup artifacts are persisted within the organization’s tenant and tied to the user’s Microsoft Entra identity, meaning restores require signing into the same Entra account and tenant.

What it’s explicitly not​

  • Not a file‑level backup solution — user documents, media, and large data repositories are not included; OneDrive or enterprise file backup solutions remain necessary for data protection.
  • Not an image or bare‑metal disaster‑recovery tool — drivers, binaries, and a bootable system image are outside the product scope.
  • Does not reinstall Win32 apps — application deployment must remain the domain of Intune app deployment, Configuration Manager, MSIX, or third‑party tooling.

Why this matters now: timing and strategic context​

The product’s latest rollout aligns with a broader corporate deadline: organizations facing Windows 10 end‑of‑support need pragmatic ways to reduce helpdesk overhead and speed user productivity on freshly imaged Windows 11 devices. Microsoft positioned Windows Backup for Organizations as a practical, low‑friction way to restore personalization and app manifests during device enrollment — a targeted capability designed to cut configuration time after refreshes or reimages.That alignment makes the feature especially relevant to IT teams planning mass migrations from Windows 10 to Windows 11. However, the presence of a “GA” label in release notes does not automatically guarantee instantaneous availability in every tenant; Microsoft’s cloud services often use staged, tenant‑gated rollouts and server‑side feature flags, so administrators must verify the restore toggle in their Intune tenant before basing migration schedules on it.

Requirements and limitations — the checklist every admin must validate​

To ensure predictable backup and restore behavior, Microsoft lists several prerequisites administrators must confirm. These are operational controls, identity constraints, and baseline OS versions that affect whether backup and/or restore will work in a given environment. The high‑level checklist:
  • Devices must be Microsoft Entra joined or Microsoft Entra hybrid joined. Backups require Entra membership; restores require Entra‑joined devices.
  • Supported OS baselines: backup functionality is available for Windows 10 (version 22H2) and Windows 11 (version 22H2 and later), with specific minimum builds documented by Microsoft for reliable OOBE restores. Administrators should check their environment against Microsoft’s published minimum build lists.
  • Devices must have the August 2025 Windows security update (or newer) that includes the Windows Backup app; otherwise the backup/restore flow may not be present during OOBE.
  • The backup policy must be enabled via MDM (Intune) or via Group Policy where applicable; the tenant‑wide “Show restore page” toggle in Intune must be enabled to show the OOBE restore UX.
  • Conditional Access / Activity Feed Service: The restore flow relies on the user’s Entra access token and the Microsoft Activity Feed Service. Conditional Access policies that block the required tokens or service endpoints can break restores; admins should allow the Activity Feed Service where needed.
  • Regional/cloud availability caveats: the service is initially unavailable in sovereign clouds (GCC‑High, other sovereign clouds) and China/21Vianet at launch; regulated environments must validate residency and compliance considerations before adoption.
If any of the above preconditions are unmet, backup may still run in some limited modes, but restore during OOBE is tightly gated to Entra‑joined Windows 11 devices on documented minimum builds.

Enabling the feature in Intune — a concise admin walkthrough​

The configuration path administrators will use is straightforward but tenant‑scoped:
  • Sign in to the Microsoft Intune admin center with appropriate Intune administrative privileges (Intune Service Administrator or Global Admin).
  • Create or edit a Settings Catalog profile (Platform: Windows 10 and later → Profile type: Settings Catalog). Search for “Sync your settings” and enable Enable Windows backup. Save the policy and assign to target users or devices.
  • Under Devices → Enrollment → Windows → Enrollment options, locate Windows Backup and Restore (preview/GA) and set Show restore page to On. This is a tenant‑wide toggle that surfaces the restore option during OOBE for eligible devices.
  • Validate prerequisites: confirm device join state, baseline builds, and Conditional Access allow lists for Microsoft Activity Feed Service. Pilot the flow on representative hardware.

Operational guidance: pilot design, common pitfalls, and recommendations​

This section offers practical, field‑tested advice for IT teams preparing to adopt the feature.

Pilot design (recommended sequence)​

  • Select representative hardware across form factors and OEM images.
  • Confirm that selected devices are Entra‑joined and meet baseline build requirements.
  • Enable the Settings Catalog backup policy targeted to pilot users.
  • Turn on the tenant Show restore page toggle and trigger a backup (backups run automatically on a cadence, but can be validated manually).
  • Perform a device reset or reimage, enroll the device via Autopilot (user‑driven mode), and confirm the restore experience during OOBE. Document outcomes and any Conditional Access conflicts.

Common operational pitfalls​

  • Conditional Access misconfiguration can prevent Intune from acquiring tokens needed for the restore flow; this often appears as a failed or absent restore option during OOBE. Allow the Microsoft Activity Feed Service as recommended.
  • Relying on the feature as a sole migration tool is a mistake — organizations must continue to plan for application redeployment, user data migration (OneDrive or third‑party), and imaging/driver strategies. The feature restores settings and app manifests, not full application binaries or user files.
  • Tenant‑gated availability: because Microsoft sometimes enables features server‑side in stages, one tenant could see GA behavior while another still shows preview language. Verify presence of the restore toggle before scheduling production cutovers.

Practical recommendations​

  • Pilot aggressively but intentionally: pick heavy‑app users and those with complex personalization to validate value.
  • Keep robust file‑backup and imaging workflows in place during adoption — this feature is complementary, not a replacement.
  • Document expected user experience so helpdesk staff can triage “missing apps” vs. “missing files” scenarios. Restores can recreate Start layout/app placement, but reinstalling Win32 apps remains a separate process.

Security, privacy, and compliance considerations​

This is a tenant‑scoped service bound to Microsoft Entra identities, and that model delivers both advantages and new responsibilities.
  • Identity boundary: backups are accessible only after authenticating with the same Entra credentials in the same tenant. This design reduces the risk of cross‑tenant data leakage but also creates failure modes if accounts or tenant relationships change.
  • Conditional Access interactions: Conditional Access policies that block device or session tokens can break restores. Administrators should explicitly allow the Microsoft Activity Feed Service where appropriate and ensure Conditional Access policies don’t unintentionally block the restore flow.
  • Data residency: organizations in regulated sectors or running sovereign clouds should treat the feature with caution — initial availability excluded certain sovereign clouds and China/21Vianet deployments. Confirm compliance and residency before enabling the tenant‑wide restore option.
From a security posture perspective, the tenant‑scoped model is sensible. The main risks are operational (misconfiguration, unmet prerequisites) and compliance‑related (regional availability and data residency), not fundamental design flaws.

Strengths and limitations — balanced analysis​

Strengths​

  • Targeted productivity gains: restores personalization and Microsoft Store app placement, cutting helpdesk time and accelerating user productivity after reimage or refresh.
  • Integration with Intune and Entra: central admin controls, RBAC, and logging are available inside the existing management stack. This reduces the operational lift for organizations already using Intune.
  • Narrow, predictable scope: by intentionally excluding user files and Win32 apps, Microsoft has delivered a focused product that solves a specific pain point without promising full‑scale migration. That clarity reduces the risk of misapplied expectations.

Limitations / risks​

  • Not a replacement for data protection: Without OneDrive or enterprise backup, users’ files remain at risk. Organizations must continue to use proper file backup solutions.
  • Tenant‑gated rollouts create planning complexity: GA in release notes does not guarantee immediate tenant availability; staging and feature flags require verification per tenant.
  • Conditional Access surprises: rescue flows can be blocked by Conditional Access policies, and failing to allow required service principals will break restores.
  • Sovereign cloud exclusions: regulated or government deployments must account for lack of availability in some Microsoft clouds at launch.

What to watch next (operational roadmap and questions IT leaders should ask)​

  • Confirm tenant availability now — check the Intune admin center for the Show restore page toggle. If it’s not present, expect staged enablement.
  • Validate OS build baselines across the estate. If devices are on older servicing baselines, plan for an update window or for enabling the Enrollment Status Page to apply quality updates prior to OOBE.
  • Review Conditional Access rules and add the Microsoft Activity Feed Service to allow lists where necessary. Test the restore flow under the tenant’s typical Conditional Access conditions.
  • Revisit application deployment strategy — because Win32 apps are not restored, confirm Intune/SCCM/MSIX workflows are in place to redeploy desktop apps after restore.

Final assessment: pragmatic tool, not a panacea​

Windows Backup for Organizations is a meaningful addition to Microsoft’s enterprise provisioning toolset. It addresses one of the most repetitive — and costly — post‑reimage tasks: returning a user to a familiar, productive state quickly. For enterprises already invested in Microsoft Entra and Intune, the tenant‑scoped backup/restore model provides useful automation and reduces helpdesk churn when used alongside established data‑protection and app‑deployment strategies.However, the product’s limitations are real and important. It is not a file backup solution, nor does it replace application deployment or imaging. Tenant‑gated rollouts, Conditional Access interactions, and regional availability boundaries mean administrators must pilot carefully and validate behavior in their own tenants before relying on the feature for migration cutovers. Treat it as a complementary operational accelerator — powerful for what it does, risky if misapplied.

Quick admin checklist (one page summary)​

  • Confirm devices are Microsoft Entra joined or hybrid joined.
  • Confirm OS baseline: Windows 10/22H2 or Windows 11/22H2+ (validate exact minimum builds via Microsoft docs).
  • Apply the Enable Windows backup setting in the Intune Settings Catalog.
  • Turn on Show restore page under Devices → Enrollment → Windows in Intune (tenant‑wide).
  • Allow Microsoft Activity Feed Service in Conditional Access where necessary.
  • Pilot: backup → reset/reimage → OOBE → restore on representative hardware. Document gaps.

Windows Backup for Organizations is no silver bullet, but it is a useful new tool for IT teams wrestling with mass migrations and refresh cycles. When combined with robust file backup, tested application redeployment, and careful Conditional Access configuration, it can reduce friction and restore a sense of continuity for end users — and that is a practical win for any large‑scale Windows rollout.
Source: Neowin Official Microsoft Windows 10 to 11 Backup app is getting Intune support for everyone soon
 

Back
Top