You have completed the purchase Windows Intune and you are ready to go! What do you do next? The first step is to configure the Windows Intune Administration center using the admin console. To access the administrator portal login to
http://Accounts.manage.microsoft.com
and use your Office 365 Global administrator account, select Admin Console (Figure 7-7).
The Windows Intune administration console (Figure 7-8) has four areas for management that need to be configured before you can use the service. These are the Windows Intune configuration for Agent (software that runs on a device), Mobile (governs how to manage mobile devices), Firewall (Windows firewall settings), and Intune Center Settings.
As an administrator, you have different options on the configuration of Windows Intune. As you become more experienced with Windows Intune, you can adjust the capabilities to meet your desired objectives.
Windows Intune Policy Management
Windows Intune manages devices and users by policy. Policies are applied to the groups and are pushed out to the clients. In the December 2013 release, there are four policies available for Windows Intune. There two different policy configuration options: default (Microsoft chooses) and custom (you choose). Our Windows Intune configuration will walk through the processes we use in the configuration of a Window’s Intune center. The Windows Intune policies are listed in Table 7-1 and are configured in the steps listed below.
Table 7-1. Window Intune Policy Settings
We have discovered a very interesting side effect as we have deployed Windows Intune. When we combine an Office 365 subscription with a Windows Intune subscription, our support call load has decreased. There are many different reasons this is the case, but what we have found is that Systems that are managed by Windows Intune with very aggressive updates – the Office 365 integration just works. Cloud solutions require that the desktop devices must have the latest security patches and fixes. Those clients that we have not deployed Windows Intune for have a higher support call load, either internally to their own IT organization or with our post-sales support.
Configuration of Window’s Intune consist of the following nine steps
-
1.
Add Administrator Notification
-
2.
Configure Auto Updates
-
3.
Configure Agent Policies
-
4.
Configure Mobile Policies
-
5.
Configure DNS changes for Mobile Devices
-
6.
Configure Device Firewall Policies
-
7.
Configure Intune center Policies
-
8.
Deploy Window’s Intune
-
9.
Linking users to Windows Intune Accounts
The nine-step process for deploying Windows Intune is outlined below. All of our initial Window’s Intune accounts are configured this way with very aggressive Windows Auto update configuration.
Step 1: Add Administrator Notification
Windows Intune notifies administrators when there is an error event on the device. This is used to inform the administrator list on the necessary corrective actions you need to take to resolve device issues. There are two steps in setting up notifications: adding the user to be notified and adding the notification that you wish the user to receive. When you add a user for notification, you define the rights for access to the Windows Intune Admin console.
-
1.
Login to
Account.manage.microsoft.com
.
-
2.
Select the Admin Console (see previous Figure 7-7).
-
3.
Select the Administration tab, select Recipients, and then Add. Enter the email address for notification, then click OK (see Figure 7-9).
-
4.
Select the notification rules, assign the recipient to the notification rules, and then click OK (see Figure 7-10).
-
5.
Select OK when completed.
Step 2: Configure Auto Updates
After you have set the notification rules, you need to configure the auto updates. There are two philosophies on updates: configure the minimum updates you need, or configure all updates (including optional ones). What we have discovered is that for the clients where we have configured all updates including optional ones), there are less support calls and the Windows desktop runs faster.
-
1.
Select the Update tab then click Configure Automatic Approval Settings (Figure 7-11).
-
2.
Scroll down until you see the Auto Update window and select New (Figure 7-12).
-
3.
Name the rule and fill in the description (Figure 7-13). Click “Next” when completed.
-
4.
Select All Categories (Intune works best if you apply all updates), as shown in Figure 7-14, and then select Next.
-
5.
Select All Classifications (Figure 7-15), and then select Next.
-
6.
Select the deployment. This is extremely important and this is where Windows Intune differs from other update products. Windows Intune will install updates if the user fails to install the update by required deployment date, Window’s Intune will install the update and force a systems reboot. Make sure you select All Computers to install updates (Figure 7-16).
-
7.
Select Next and then Finished. This creates the Automatic installation rule. The rule will execute and force updates to be installed three days after approval. The user can install updates early.
Step 3: Configure Agent Policies
Windows Intune manages desktop and mobile devices based upon Group Policies. There are four policy collections that you need to configure in Windows Intune. These policy collections enforce group policies on the clients that are enrolled in the Windows Intune service. The policy collections that you need to configure are the agent policy, mobile policy, firewall policy, and support policy. The first policy to configure is the agent policy. Select the policy icon (Figure 7-17), and then select Add Policy. Our configuration uses the “Custom Policy”. We do not recommend that you use the Default Policy.
Select the Windows Intune Agent Policy and Create and Deploy a Custom Policy (see Figure 7-18).
Each policy is different. Depending upon your business needs, you may need to modify the policy settings to meet certain business objectives. Our approach is to identify the policies that we used in our standard deployment. We do not use all policies in the Collection; only a few. The ones we have identified in the following configuration are the important policies for the Windows Intune Operation. Follow the configuration wizard and the item configuration listed below.
-
1.
Name the policy and supply a description (Figure 7-19).
-
2.
Configure the antivirus settings (Figure 7-20).
-
3.
Configure the daily and full scans (Figure 7-21). This is an important configuration. Office 365 will filter most viruses out of your environment, but you need to make sure you scan to eliminate the other problem areas.
-
4.
Configure the Quarantine settings (Figure 7-22).
-
5.
Configure the update settings and membership in the active protection services. The active protection services coordinate information about known viruses to help the community to address threats (Figure 7-23).
-
6.
The final steps are the configuration of the data transfer to reduce bandwidth consumption during working hours (Figure 7-24).
-
7.
Select Save Policy and you have created the first policy. Windows Intune will ask if you want to deploy the policy; select Yes to deploy the policy (Figure 7-25).
-
8.
Deploy the policies by selecting the group for deployment. The default group is either All Computers or Ungrouped Devices (see Figure 7-26). Just select the group, then click Add, and then click OK. The policy is deployed.
Step 4: Configure Mobile Policies
After you configure the policy for desktop, you need to configure the policies for Mobile Device Management. If the policies are not configured, then the mobile devices will not be allowed to enroll in the Windows Intune management service. Select the Policy icon, and then select Add Policy.
-
1.
Select Mobile Device Security Policy and select Create and Deploy a custom Policy (Figure 7-27).
-
2.
Enter a policy name for the mobile device policy.
-
3.
Define the password structure for the mobile device and enable the RT passwords (Figure 7-28).
-
4.
Configure the additional security policies for mobile devices that your organization supports. In this case, the organization does not allow the SharePoint documents to be backed on iCloud, so they are restricted (Figure 7-29).
-
5.
Select Save Policy and then deploy the policy. When you deploy the policy, you deploy it to users (Figure 7-30). The model is that users bring mobile devices, and are licensed according to Windows Intune. Each user can support up to five devices under one Windows Intune license.
Step 5: Configure Mobile Device DNS Enrollment
After you have configured the mobile device policies, you need to configure the DNS changes to allow the mobile devices (such as Windows Phone 8) to find the Windows Intune management service. There are two parts of this configuration: 1) DNS changes and 2) testing the changes with Windows Intune. These are outlined below.
-
1.
Add the following CNAME “enterpriseenrollment” to your DNS. If your domain name was “kamind.biz”, you would add the following CNAME shown in Figure 7-31.
If you have multiple domain names “verified” in Office 365, you will need to enter a CNAME for all domains in your DNS. Otherwise, the enrollment test validation will fail.
-
2.
Enable the Windows Intune device management. Do this only if you are not planning to use Microsoft Systems center 2012. Select the Mobile Device management Option (see Figure 7-32). Windows Intune will verify that you want to make this change. This change cannot be reversed.
-
3.
Verify the DNS changes in the Windows Intune Administration center. Under the Mobile Device Management Select the Windows management (Figure 7-33).
-
4.
Enter the domain name for verification (Figure 7-34). Click test and verify the domain.
The basic Windows Intune Mobile device management has been setup. There are different steps that you will need to follow to add the mobile device management support. These are company-specific changes. What we covered here was the basic enabling of the Mobile Device Manage services.
Step 6: Configure Firewall Policies
The firewall policies (Figure 7-35) are designed to set up and configure the desktop policies for a firewall: domain, public access, and private network. There are additional configuration parameters set up to manage the branch cache. The normal configuration for these policies is the default. If you have any predefined exceptions, then you enable all of the policies and define the exceptions. After you create the policy, save and deploy the policy.
Step 7: Configure Intune Center Policies
After you have created the base policies, you build the desktop support center to allow your user to contact your support services. This is the purpose of the Intune Center policies. Figure 7-36 and Figure 7-37 show the support center for Windows Intune.
To configure the support center, just select the Windows Intune Center and enter the organization support information and deploy the policy (Figure 7-38). The process is identical to the previous policy deployments.
Step 8: Deploy Users
At this point you are ready to deploy users to Windows Intune. There are two ways to deploy users: either through the administrative download (Figure 7-39), or by having the user self-enroll using the Company Portal (described later). The enrollment process for each of these steps is outlined in detail later and briefly described below. As an administrator, if you deploy Windows Intune, you need to link the user to the device in the administrative console.
Step 9: Linking users
After you have deployed Windows Intune using the administrative deployment, you need to link the user to the device that they use. Earlier we federated Office 365 into Windows Intune. In federation we link the user accounts so the user will have a seamless experience between different environments. This is extremely important, because Mobile devices are linked to user accounts. When you enable a user in Windows Intune, you are allowing the user to access the Windows Intune Company portal to download company applications and to self-enroll Windows Intune on the user’s device.
Follow these steps:
-
1.
Select the group icon and then select the number of computers enrolled (Figure 7-40).
-
2.
Select the computer and then select Link User (Figure 7-41).
-
3.
Select Link User and assign the user to the device. The users listed are those users that have been assigned a Windows Intune license in the administration center (Figure 7-42). After you link the user, then click OK. The user is now linked to the device.
If you deployed users via the self-enrollment of the Company Portal, the user accounts will automatically be assigned to the device.
You are finished with the configuration of Windows Intune. At this point you can use Windows Intune for the desktop, user, and device management. The Windows Mobile management, was a basic enablement. The configuration that we completed has set up the service so everything just works with the minimum of oversight. When you need to add users, just purchase licenses and assign the licenses to the appropriate user from your Office 365 account. Mobile device management is organized around line of Business application deployment. At this point, we wanted the Mobile device management enabled so you can proceed to work with your developer on the company application deployment for your smartphone. In the reference link section, we included number of links on how to add additional capabilities to Windows Intune for smartphone management.