If you ever tried to deploy a W-Fi Profile that is secured by WPA3 Enterprise to Windows Clients in Intune, you probably noticed, that this is not possible using the built-in Wi-Fi Template. Don’t worry, the solution is really simple, you can configure the Wi-Fi Profile on a Client, export it and then deploy it via Custom OMA-URI Policy.
Built-in Wi-Fi Template
If you ever configured a Wi-Fi Profile in Intune, you most likely saw, that you can’t select WPA2 vs. WPA3. The only option is Basic vs. Enterprise:

If you export the resulting profile from an endpoint, you will see it automatically creates it for WPA2:


Create a WPA3 Enterprise Profile
To create a WPA3 Enterprise Wi-Fi Profile, we can simply create it manually from within Windows:

Enter the SSID and select WPA3 Enterprise:

At the last screen of the wizard, you have to modify the freshly created profile to match your configuration needs, like switch to EAP-TLS and modify the certificate selection properties.

Once the Profile is created and working, we just have to export it with the following command: (Replace the Profile Name with your selected SSID)
netsh wlan export profile <ProfileName>

Intune Configuration Profile
Lastly, we just have to create a Custom OMA-URI Configuration Profile in Intune. Use the following OMA-URI and change <SSID> with your SSID:
./Vendor/MSFT/WiFi/Profile/<SSID>/WlanXml
Let’s start with a new blank Custom profile:

Give it a Name:

Add a new Row with the OMA-URI from above and the Data type of “String (XML file) and upload the exported profile from the client:



After the usual stuff, like add Scope Tags and Assignment, we can review our settings and create the Profile.



Conclusion
While it is unfortunately not yet possible to create a WPA3 Enterprise encrypted Wi-Fi Profile in Intune directly, you fortunately create and deploy it pretty easily with the Custom OMA-URI Profile type in Intune.
Update:
If you used this custom OMA-URI Option, you may have noticed, while the Profile works just fine, the added Profile is not marked as “Added by company policy” and therefore can be deleted by any user.

I haven’t found the reason why this happens, but I have a workaround in the form of a small PowerShell script available. We just need to set the connection type in the registry for this profile. I created a small script that searches for the Profile guid using the Profile Name specified in line 2. You can find this script sample on GitHub: Scripts/WPA3-WifiProfile-AddedByCompany.ps1 at main · mmeierm/Scripts
You can deploy it using Platform or Remediation Scripts in Intune.

Once the script has done its job, the profile is now also considered as a managed profile and the user cannot delete it from the settings menu anymore.

Leave a Reply