background preloader

Intune

Facebook Twitter

Azure AD Connect: Custom installation. Azure AD Connect Custom settings is used when you want more options for the installation. It is used if you have multiple forests or if you want to configure optional features not covered in the express installation. It is used in all cases where the express installation option does not satisfy your deployment or topology. Before you start installing Azure AD Connect, make sure to download Azure AD Connect and complete the pre-requisite steps in Azure AD Connect: Hardware and prerequisites.

Also make sure you have required accounts available as described in Azure AD Connect accounts and permissions. If customized settings does not match your topology, for example to upgrade DirSync, see related documentation for other scenarios. Custom settings installation of Azure AD Connect Express Settings On this page, click on Customize to start a customized settings installation. Install required components User sign-in Connect to Azure AD Pages under the section Sync Connect your directories Warning: Note: Build and deploy an image for Windows 10 Mobile - Windows 10 hardware dev. The document is archived and information here might be outdated You can use Windows Imaging and Configuration Designer (ICD) to create a new Windows 10 Mobile image and customize it by adding settings and some assets. This imaging method requires a pre-installed OS kit so you must have all the necessary Microsoft OS packages and feature manifest files in your default install path.

A configuration data file (BSP.config.xml), which contains information about the hardware component packages for your board support package (BSP), is also required. For the BSP.config.xml file, you can: Use the BSP.config.xml file you downloaded as part of the BSP kit, or,Generate your own BSP.config.xml by running the BSP kit configuration tools from the SoC vendor and selecting your component drivers. Copy the mobile OS packages and feature manifest files The MobileOS-arm-fre.zip file contains the mobile OS packages that you need to build a Windows 10 Mobile image. Install the OEM certificates. Automagically set the mobile device owner to company – More than just ConfigMgr. Blog » Intune.

Thanks for attending my Hybrid Management session @NIC 2015. Slide deck Deploy wifi profiles with shared secret – Change device ownership in configmgr – Intune Extensions fail to install – and Device based vs User based policies – Troubleshooting iOS certificate deployments – Deny Apps on Windows Phone – […] Category: Configuration Manager, MDM | Comment. Devices Ownership and Wipe option in SCCM 2012. Download and own all parts of the blog series in a single PDF file. Use our products page or use the download button below. This blog post won’t be updated, only the document will be. In Part 1 of this series, we prepared the Intune environment for mobile device management. We also make sure we got the Intune subscription account. In Part 2, we configured Active Directory and create users in Intune.

In Part 3, we prepared our Configuration Manager server in order to link it to Intune using the SCCM connector. In Part 4, we enrolled an Apple iOS devices in SCCM. In Part 5, we enrolled an Android device in SCCM. In Part 6, we enrolled an Windows Phone device in SCCM. In Part 7, we created a compliance setting on a mobile device. In Part 8, we will cover some SCCM 2012 mobiles devices management features. Device Ownership All enrolled mobile devices can be assigned as Company or Personal devices in the SCCM console. What’s the difference between both ? Select Change Ownership Retire / Wipe 5 - 2 votes. MDM in SCCM 2012 R2 - Device Ownership (Company or Personal) Back to ConfigMgr main menu Back to MDM Menu Devices enrolled using the ConfigMgr 2012/Windows Intune unified solution can be managed in the ConfigMgr console. These devices can be assigned to be either "Company" or "Personal" devices.

Note that a device is automatically assigned to be Personal by default.What is the difference - Company V Personal? Inventory: Company devices will report all hardware and software information. For Personal devices, only software installed by the unified solution is reported. Software Distribution: You can target software or compliance settings to devices based on ownership. Right click a device to change the ownership Select "Change Ownership". Select your preference.

You can still carry out a "Full Wipe". Choose "Retire/Wipe" (this option is not available if you choose multiple devices). Select your option. Read and accept the Warning. Note the different features of Full and Selective Wipe. Note the company content that is removed by a Selective Wipe. Hybrid Sync Issue with MDM Client on Windows 10 Error 0x80072f0c.

A green field environment with all new trail versions of SCCM CB 1511, AD, Intune, AAD Premium and EMS. SCCM current branch 1511 is connected to trail Intune subscription and on premises AD is synced with Azure AD Premium using AD connect. I could see on premises AD users in Azure AD as well in Intune console. We have also enabled the Azure AD + MDM auto enrolment feature in Azure AD tenant. This setting helps users to get Out Of Box Experience as I explained in the post here. In this scenario the Windows 10 1511 device was able to auto enrol to Azure AD and MDM, however Intune MDM agent (not full Intune Agent) was not able to sync with Intune. When we try to sync it was giving following error “The sync could not be initiated (0x80072f0c)“. The error translates to “A certificate is required to complete client authentication Source: Winhttp“ Basic troubleshooting didn’t help us much.

We need to bounce back / restart the SMS executive thread called “SMS_CLOUD_USERSYNC”. More than just ConfigMgr – Peter blogs about Configuration Manager and Microsoft Intune. What’s New and Upcoming with Microsoft Intune and System Center Configuration Manager | Microsoft Ignite 2015. Assign Enterprise Mobility Suite licenses– Quick Reference Guide – System Management. As consultant and Microsoft MVP I work for Inovativ, a Dutch IT company specialized in Enterprise Mobility, System Center, Cloud & Data Center Management. My primary focus is on MicrosoftTechnologies with Enterprise Mobility Suite, System Center and Microsoft Azure as main competences. As a trainer I'm providing Microsoft courses and being active in the community as blogger, & member of System Center User Group NL.

Furthermore I'm a speaker at international community events like TechDays, Experts Live and user group meetings. Cloud & Data Center Management: System Center Advisor, Microsoft Azure, Windows Azure Pack, Windows Server 2012 R2, Hyper-V, OpsMgr, SvcMgr, Orchestrator Enterprise Client Management: CfgMgr, MDT, MAP, Windows 8.1, Windows 10, Microsoft Intune, Enterprise Mobility Suite (EMS) Blacklist applications on mobile devices with Microsoft Intune. Back to Microsoft Intune menu This has also been an eagerly awaited feature in Microsoft Intune. Now we can blacklist and whitelist applications that can be installed on mobile devices.The following levels of support are available: Windows Phone 8.1 or later: you can specify blocked applications or you can specify only applications that can be installed. The user will not be able to install blocked applications.Android 4 or later: you can specify a list of applications that are compliant (or not compliant).

Non- compliant applications can still be installed but will be reported as non-compliant in the Noncompliant Apps Report.iOS: you can specify a list of applications that are compliant (or not compliant). Non- compliant applications can still be installed but will be reported as non-compliant in the Noncompliant Apps Report. Lets have a look at a managed Windows Phone 8.1 device. First we have to create the policy. Enter the details. Now Save the policy. This is the "more info". ConfigMgr 2012 R2 & Windows Intune UDM : How to prevent an “End-User” can un-enroll his “Corporate” Windows Phone 8.1 | System Center Configuration Manager. Scenario : Last week we had a discussion at a customer during a Windows Intune UDM Proof of concept and the customer was willing to order about 3000 corporate owned Nokia Lumia 630 Windows Phones.

He wanted us to provide the option when a ‘device owner’ in CM12 R2 is set to “corporate” , a user can’t un-enroll a “corporate” device and to prevent them from doing so , unless you are the ConfigMgr 2012 MDM admin. As this seemed a logic request to me , we couldn’t do it out of the box with windows phone 8 or with Windows Intune. Missed opportunity , I would say. However with the launch of Windows Phone 8.1 at Build conference , there was a new set of OMA-DM management capabilities being added.

At this stage , the writing and the testing of the blog post is being done with a developer edition of Windows Phone 8.1. I doubt that when being rolled out as RTM , these policies will be changed. Solution to problem : First of all , you will need to know what OMA-DM is . . . 1. 2. 3. 4. 5. 6. 7. 8. 1. 9. Deployment Guide for Enterprise Solutions to Protect Email Data on Mobil... App Configuration Policies for iOS apps. Intune Co-existence with MDM for Office 365. In mid-November 2015, we released a service update to Microsoft Intune. It was a massive update for us, and included a huge amount of new features.

You can view the announcement post here. One of the features announced has gone a little under the radar, and that’s co-existence with MDM for Office 365 You can now activate and use both MDM for Office 365 and Intune concurrently on your tenant and set the management authority to either Intune or MDM for Office 365 for each user to dictate which service will be used to manage their mobile devices. User’s management authority is defined based on the license assigned to the user. If the user is assigned with the EMS or Intune license, Intune will manage user’s devices and apps. If the user is assigned with the Office 365 license (without the EMS or Intune license), then MDM for Office 365 will manage user’s devices. This is great news for customers who currently use the built-in MDM for Office 365. How do we enable Co-existence?

Assign EMS licenses based on Local Active Directory Group Membership – System Management. As all roads lead to Rome there are many ways to assign Enterprise Mobility Suite (EMS) licenses to end-users. This can be a manual process or automated by using PowerShell. Both options have in common that you must be a global administrator of your Azure subscription to assign these licenses. The majority of the available public resources and publications describes the (manual) process bassed on per user- or group assignment through the Azure Management Portal.

Downside of assigning EMS licenses through the Azure Management Portal or by PowerShell is that you must be a member of the global administrator user role. A right you want to keep to a limited number of accounts, further these accounts are often not responsible for such tasks as assigning licenses. When using a native Azure AD (Premium) this is currently the only way to assign EMS licenses. This allows us to assign EMS licenses based on local AD group membership without being global administrator of your Azure subscription.