--- title: "Quickstart: Configure a Restricted User Experience With Assigned Access" description: Learn how to configure a restricted user experience with Assigned Access using the Assigned Access configuration service provider (CSP), Microsoft Intune, PowerShell, or group policy (GPO). ms.topic: quickstart ms.date: 3/7/2025 appliesto: zone_pivot_groups: windows-versions-11-10 --- # Quickstart: configure a restricted user experience with Assigned Access This quickstart provides practical examples of how to configure a restricted user experience on Windows. The examples describe the steps using a mobile device management solution (MDM) like Microsoft Intune, provisioning packages (PPKG), and PowerShell. While different solutions are used, the configuration settings and results are the same. The examples can be modified to fit your specific requirements. For example, you can add or remove applications from the list of allowed apps, or change the name of the user that automatically signs in to Windows. ## Prerequisites >[!div class="checklist"] >Here's a list of requirements to complete this quickstart: > >- A Windows device >- Microsoft Intune, or a non-Microsoft MDM solution, if you want to configure the settings using MDM >- Windows Configuration Designer, if you want to configure the settings using a provisioning package >- Access to the [psexec tool](/sysinternals/downloads/psexec), if you want to test the configuration using Windows PowerShell ## Configure a restricted user experience [!INCLUDE [tab-intro](../../../includes/configure/tab-intro.md)] #### [:::image type="icon" source="../images/icons/intune.svg"::: **Intune/CSP**](#tab/intune) > [!TIP] > Use the following Graph call to automatically create a custom policy in your Microsoft Intune tenant without assignments nor scope tags. > > When using this call, authenticate to your tenant in the Graph Explorer window. If it's the first time using Graph Explorer, you may need to authorize the application to access your tenant or to modify the existing permissions. This graph call requires *DeviceManagementConfiguration.ReadWrite.All* permissions. [!INCLUDE [quickstart-restricted-experience-intune.md](includes/quickstart-restricted-experience-intune.md)] [!INCLUDE [intune-custom-settings-2](../../../includes/configure/intune-custom-settings-2.md)] Alternatively, you can configure devices using a [custom policy][MEM-1] with the [AssignedAccess CSP][WIN-3]. - **Setting:** `./Vendor/MSFT/AssignedAccess/Configuration` - **Value:** [!INCLUDE [quickstart-restricted-experience-xml.md](includes/quickstart-restricted-experience-xml.md)] #### [:::image type="icon" source="../images/icons/provisioning-package.svg"::: **PPKG**](#tab/ppkg) [!INCLUDE [provisioning-package-1](../../../includes/configure/provisioning-package-1.md)] - **Path:** `AssignedAccess/MultiAppAssignedAccessSettings` - **Value:** [!INCLUDE [quickstart-restricted-experience-xml.md](includes/quickstart-restricted-experience-xml.md)] [!INCLUDE [provisioning-package-2](../../../includes/configure/provisioning-package-2.md)] #### [:::image type="icon" source="../images/icons/powershell.svg"::: **PowerShell**](#tab/ps) [!INCLUDE [powershell-wmi-bridge-1](../../../includes/configure/powershell-wmi-bridge-1.md)] [!INCLUDE [quickstart-restricted-experience-ps.md](includes/quickstart-restricted-experience-ps.md)] [!INCLUDE [powershell-wmi-bridge-2](../../../includes/configure/powershell-wmi-bridge-2.md)] --- ## User experience After the settings are applied, reboot the device. A local user account is automatically signed in, with access to a limited set of applications, which are pinned to the Start menu. ::: zone pivot="windows-11" :::image type="content" source="images/restricted-user-experience-windows-11.png" alt-text="Screenshot of the Windows 11 desktop used for the quickstart." border="false"::: ::: zone-end ::: zone pivot="windows-10" :::image type="content" source="images/restricted-user-experience-windows-10.png" alt-text="Screenshot of the Windows 10 desktop used for the quickstart." border="false"::: ::: zone-end ## Remove Assigned Access Once you no longer need the restricted user experience, you can remove it. Deleting the Assigned Access configuration removes the policy settings associated with the users, but it can't revert all the changes. For example, the Start menu configuration is maintained. Here's a PowerShell example to remove the configuration: ```powershell $namespaceName="root\cimv2\mdm\dmmap" $className="MDM_AssignedAccess" $obj = Get-CimInstance -Namespace $namespaceName -ClassName $className $obj.Configuration = $null Set-CimInstance -CimInstance $obj ``` Reboot the device to apply the changes. ## Next steps > [!div class="nextstepaction"] > Learn more about Assigned Access and how to configure it: > > [Assigned Access overview](index.md) [WIN-3]: /windows/client-management/mdm/assignedaccess-csp [MEM-1]: /mem/intune/configuration/custom-settings-windows-10