We all have been using Group Policies for decades for all of our on-prem domain joined machine. Now Microsoft has introduced, in preview, ADMX template style settings in Intune.
MS Docs for details. https://docs.microsoft.com/en-us/intune/administrative-templates-windows
- Assumption is you have some Intune knowledge and know how to assign profiles.
- To access the Preview, go into your Azure Portal – Microsoft Intune -> Device configuration – Profiles
Create a new profile
Name your profile, choose Windows 10 or Later as the platform, and Profile type is Administrative Templates (Preview)
- In the profile, choose Settings and you will see all the policies available (there are few pages).
5. In the filter, search for a policy setting if needed like the screen shot below or sort the columns accordingly.
6. Select a setting like I have below and choose an option (similar to GPO). For the Excel save setting, I chose the default to be Excel 5.0/95 Workbook so I can see the change (as Excel XLS is default anyways).
7. In my test I have chosen several different settings.
8. Assign the profile accordingly to your test group.
9. Monitor deployment status
10. Once the settings are applied, check the device for results.
To be able to review Windows 10 endpoints (Anniversary Update or higher) into Windows Defender ATP, you will need to onboard first. There are several ways to do so including scripts, Group Policy, Intune, Configuration Manager 2012 through current branch 1602. With the release of Configuration Manager branch update 1606, it now includes integrated Windows Defender ATP to be able to monitor and deploy the policies.
- To get started, login to the Windows Defender ATP site to download the policies https://securitycenter.windows.com/download
Choose the drop down Select your deployment tool, and select the System Center Configuration Manager (current branch) version 1606
- This will download a ZIP file with the onboarding package. Unzip it to where you can access it with ConfigMgr.
- Under Assets and Compliance, expand Endpoint Protection where you will see Windows Defender ATP Policies. Select Windows Defender ATP Policies , and click Create Windows Defender ATP Policy from the toolbar or right click.
- Follow the wizard to import the onboarding file you downloaded from the site. (NOTE: SCREENSHOT SHOWS OFFBOARDING, BUT SHOULD BE ONBOARDING)
- Once done, you will see the policies in the console. Right client or from the toolbar, click Deploy.
- You can do this for off-boarding as well. From the same site, you can select to download the off-boarding package and then follow the steps above to import into ConfigMgr.
On September 24, 2015 Microsoft announced support for iOS9 through he iOS9 extension for Microsoft Intune in Configuration Manager.
To enable the extension, go to your SCCM console (2012 R2 SP1 CU1). Under Administration, expand Cloud Services and click Extension for Microsoft Intune.
In the right pane, right click the iOS 9 Extension and click Enable (or from the toolbar). If you do not have CU1, this can fail.
Accept the License Terms – make sure you read all of it first 🙂
The MDM capabilities provided in Windows covers the complete lifecycle of the device.
- Enrollment capabilities to automate the MDM enrollment of the device as part of the Azure Active Directory join process.
- New controls for configuring and managing the Start menu.
- New controls over Windows updates, allowing you to control when specific Windows updates are deployed to MDM-managed devices (think “WSUS from the cloud”).
- New AppLocker and Enterprise Data Protection configuration settings.
- Integration with the Windows Store and the Business Store Portal (BSP) to enable automated app management.
- Full device wipe capabilities, even for PCs.
These capabilities are supported on all types of devices, including Windows phone devices, PCs and tablets, and Internet-of-Things (IoT) devices.
The following are quick steps to enroll the Microsoft Windows 10 Insiders Preview (as of build 10130) to Microsoft Intune in a hybrid environment with Microsoft System Center 2012 R2 SP1 Configuration Manager (SCCM).
This assume you have already configured Microsoft Intune into your SCCM environment.
- In the SCCM console, navigate to Administration -> Overview -> Cloud Services -> Microsoft Intune Subscriptions.
On the top ribbon bar, click the Configure Platforms button. Click Windows in the drop down
From the Microsoft Intune Subscription Properties, click the Enable Windows enrollment.
Log onto your Windows 10 desktop, go to Settings and choose Network and Internet
Click on Accounts and then Work access. On the Connect to work or school section, click the + Connect
Enter your work email address that are Intune enabled (an account that has synchronization between your on-premise Active Directory and Windows Azure Active Directory). After you click continue, you will be sent to the Microsoft site to authenticate.
Once done, you see the connected account on the main section.
In the SCCM console, you will now be able to see your newly enrolled device as a Mobile device. You will be able to deploy applicable compliance policies just like any other mobile devices in your organization.
As most have seen the blog announcing the Intune Mobile Application Management and Conditional Access for Outlook. At the very bottom, there is a Note about the hybrid customers (SCCM) availability that seems to be missed by few folks when they update to SP1.
Quick query to dynamically identify Android devices in Configuration Manager 2012 R2
select SMS_R_SYSTEM.ResourceID,SMS_R_SYSTEM.ResourceType,SMS_R_SYSTEM.Name,SMS_R_SYSTEM.SMSUniqueIdentifier,SMS_R_SYSTEM.ResourceDomainORWorkgroup,SMS_R_SYSTEM.Client from SMS_R_System inner join SMS_G_System_DEVICE_OSINFORMATION on SMS_G_System_DEVICE_OSINFORMATION.ResourceId = SMS_R_System.ResourceId where SMS_G_System_DEVICE_OSINFORMATION.Platform like “%Android%”