* Preprovisioning - devices have the right certificates and know about your corporate networks. They have the necessary apps and just work.
* Tracking - if a device is lost or stolen, monitor where it is and remotely lock or wipe it
* Monitoring - have a log to audit if someone does something malicious
* Security - reduce the chance of your employees installing malware, spyware, etc. whether by accident or intention
* Locking things down - put gates in the way of bad actions like copying sensitive data into public apps or clouds. Even if you're unable to block everything, attempts to block remind honest employees and provide strong evidence that anyone who proceeds was intentionally violating policy and should be fired.
Etc., etc.
* Predictability - eliminating the number of unknown factors that could cause a person to have issues using their computer. Reminds me of how a secretary I serviced was somehow able to install Google Desktop back in the day, and how that caused a massive argument between my boss and theirs when their computer needed to be re-imaged. Most IT approved programs are known to store user data in known locations on a computer, which makes backups and restorations very easy. Stuff like Google Desktop did not do that, which means likely breaking someone's workflow in the re-image process.
I can understand the underlying reasons, you would be surprised how many employees have bad security hygiene, which becomes an issue when they have access to high value information, tokens, etc. But since they often somewhat draconian rules, they tend to have bad side-effects (similar to password reminders). E.g. Linux users will often set up ClamAV to fulfill the anti-virus requirement. However, ClamAV parses untrusted data in C code without any sandboxing, so it probably opens a new attack vector (as opposed to Windows Defender, which as far as AFAIR uses sandboxing or a micro-VM to parse untrusted data).
Even if your Corp doesn't want to do full user surveillance, there's still a lot of advantages to group policy. Roll out new software instantly, SSO enforcement, remote troubleshooting, etc.
a laptop in a stock configuration can be swapped out for a new one when it breaks. a laptop that has three years of accumulated customizations installed on it means that the employee wants their laptop back when it breaks, and they want it fixed ASAP.
when you're supporting a user who doesn't know how to type a URL into their web browser, it's a whole lot easier if you don't have to start that call with asking what web browser they're using.
SOC2 also encourages SSO.
Most of the rest of this stuff .. well, who is responsible if the laptop is compromised?