Enterprise Deployment via Microsoft Intune
This guide covers deploying the Noxys browser extension at scale across your organization using Microsoft Intune.
Prerequisites
- Microsoft Intune admin access
- Microsoft Edge or Chrome on Windows/macOS managed by Intune
- Noxys tenant with admin access to generate API tokens
- Azure Entra ID (formerly Azure AD) configured with your organization
Overview
Intune deployment allows you to:
- Automatically install the Noxys extension on all managed devices
- Pre-configure API tokens so users don't need manual setup
- Enforce settings like Tier 2 classification and webhook alerts
- Track deployment status across your fleet
- Manage updates automatically
Step 1: Prepare API Tokens for Bulk Deployment
Before deploying, create API tokens that will be distributed to devices.
Option A: Single Token (All Users Share)
Use one API token for all devices. Simple but less granular:
- Go to Noxys Dashboard → Settings → API Keys
- Click + Generate New Token
- Label it:
intune-deployment-prod - Click Generate
- Copy the token (you'll use it in Intune configuration)
- Store it securely in your password manager or secrets vault
Option B: Per-Team Tokens (Better Auditing)
Create separate tokens for each department or location:
- Go to Noxys Dashboard → Settings → API Keys
- Click + Generate New Token for each team:
intune-deployment-salesintune-deployment-engineeringintune-deployment-finance
- Copy each token and store securely
- You'll reference the appropriate token per group in Intune
Step 2: Create Intune Configuration Profile
Deploy to Microsoft Edge
Microsoft Intune has native support for Edge extensions via policies.
Steps
- Go to Microsoft Intune → Devices → Configuration profiles
- Click Create profile
- Select Platform: Windows 10 and later (or macOS for Apple devices)
- Select Profile type: Settings catalog
- Click Create
- Name your profile:
Noxys Extension Deployment - Click Next
Configure Settings
-
In the Settings catalog, search for "extension"
-
Add these policies:
Policy: Control which extensions are installed silently
- Set to Enabled
- Add extension:
[{"extension_id": "noxys-extension-id", "installation_mode": "force_installed"}] - (Contact Noxys support for the exact extension ID for your region)
Policy: Extension managed settings
- Set to Enabled
- Configure the API token:
{
"noxys-extension-id": {
"api_token": "YOUR_API_TOKEN_HERE",
"backend_url": "https://api.noxys.cloud",
"auto_enable_tier2": true
}
} -
Click Next
Assign Profile
- On the Assignments tab, click Add groups
- Select your security groups:
- For all users: Select "All Users"
- For specific departments: Select appropriate groups
- Set Assignment type: Required
- Click Assign
Deploy to Google Chrome
For Chrome on Windows/macOS managed devices:
- Go to Intune → Devices → Configuration profiles
- Create a new profile with Platform: Windows 10 and later
- Select Profile type: Administrative Templates → Google Chrome
- Search for: "Control which extensions are installed silently"
- Set to Enabled and add the Noxys extension ID
- Assign to security groups
Note: Chrome extension deployment is less tightly integrated than Edge. Consider using Microsoft Edge for better management.
Step 3: Monitor Deployment Status
Track Installation Progress
- Go to Intune → Devices → Configuration profiles
- Click your Noxys profile
- Go to Device status to see:
- Number of devices: Succeeded / Failed / In progress / Not applicable
- Per-device status (Success, Pending, Failed)
- Review failed deployments and troubleshoot as needed
Common Deployment Issues
| Status | Cause | Solution |
|---|---|---|
| Not Applicable | Device doesn't run Windows 10/Edge | Assign to compatible device groups |
| Failed | Extension not in Microsoft Store | Contact Noxys support for marketplace availability |
| Succeeded | Extension installed | Verify via device, check extension status |
| Pending | Device hasn't checked in yet | Wait 24 hours or force sync on device |
Force Device Sync
If a device is stuck in "Pending":
- Go to Intune → Devices → All devices
- Click the device name
- Click Sync (top menu)
- Device checks in within 5 minutes
Step 4: Verify Extension Installation
After 1-24 hours, verify the extension is installed on managed devices.
On Windows/Edge
- Open Microsoft Edge
- Press
Ctrl + Shift + Oto open Extensions - Look for "Noxys" in the list
- Verify the status is "On"
- Click the extension to verify API token was pre-configured
On macOS/Edge
- Open Microsoft Edge
- Click the three-dot menu (top right) → Extensions
- Look for "Noxys"
- Verify it's enabled
Step 5: Configure Advanced Settings (Optional)
Enable Tier 2 PII Detection
For deeper classification across your organization:
- Go to Intune → Devices → Configuration profiles
- Create a new profile or edit your existing one
- Add setting:
"enable_tier2_classification": true - Assign and deploy
This enables Presidio and custom recognizers on the backend.
Enforce Webhook Alerts
Route all policy violations to your SIEM:
- Add setting to your Intune profile:
{
"webhook_url": "https://your-siem.com/webhook/noxys",
"webhook_events": ["policy_violation", "pii_detection"]
} - Deploy to devices
Disable Offline Mode
If your organization requires always-connected security:
- Add setting:
{
"allow_offline_mode": false
} - Extension will not function without backend connectivity
Step 6: Manage Updates
Noxys extension updates are delivered automatically via the browser's extension marketplace (Chrome Web Store, Microsoft Edge Add-ons, etc.). Intune doesn't need separate update management.
Check for Updates Manually
To verify all devices are on the latest version:
- Go to Intune → Devices → Configuration profiles
- Click your Noxys profile
- Check the "Last modified" date
- Devices will check for extension updates within 24 hours
Troubleshooting
Extension Still Shows "Red Icon" After Deployment
Problem: Even though the API token was pre-configured, extension shows connection error.
Solution:
- Verify the API token in your Intune profile is correct (no extra spaces)
- Check that the token hasn't been rotated in the Noxys Dashboard
- Verify network connectivity to
api.noxys.cloud(or your backend) - Check device's corporate proxy settings
- Force device sync in Intune to push the latest configuration
Some Devices Failed Deployment
Problem: A percentage of managed devices show "Failed" status.
Solution:
- Check if those devices are running Windows 10 (version 1903 or later) or macOS
- Verify devices have checked into Intune recently
- Force sync those specific devices
- Check device event logs for Intune policy errors
- If issue persists, contact your Intune support team
Users Can Uninstall the Extension
Problem: The extension is forced-installed, but users can still uninstall it.
Solution:
- This is by design in Intune; administrators cannot prevent user uninstalls
- If uninstalled, Intune will reinstall it within 24 hours
- To reduce uninstalls, communicate the security benefits to your teams
- Monitor uninstall events in Intune device logs
Pre-Configured Token Not Applied
Problem: Extension is installed, but users still see "Configure API Token" prompt.
Solution:
- Check your Intune policy JSON is valid (use a JSON validator)
- Verify the
api_tokenfield matches the actual token in Noxys Dashboard - Wait 24 hours for devices to receive the configuration
- Force device sync to apply immediately
- Check device event logs for policy application errors
Best Practices
- Use per-team tokens for better auditing and token rotation
- Test with a pilot group before rolling out to entire organization
- Enable Tier 2 classification for enhanced PII detection (may add ~30ms latency)
- Set up webhook alerts to integrate with your SOC
- Monitor deployment status weekly and address failures promptly
- Communicate the rollout to users explaining the security benefits
- Rotate API tokens quarterly and deploy new versions via Intune
- Review device compliance monthly to ensure all devices remain managed
Integration with Entra ID Groups
To deploy only to specific departments using dynamic Entra ID groups:
- In Intune, when assigning the profile, use dynamic groups:
- Security Engineering team:
dept:security - Finance department:
dept:finance
- Security Engineering team:
- Intune automatically applies the profile to users in these groups
- New employees added to the group automatically receive the extension
Next Steps
- Create Your First Policy
- Admin Console for policy management
- Extension Guide
Need Help?
- Email: support@noxys.eu
- Security Issues: security@noxys.eu
- Intune Support: Your organization's IT support team