Search icon
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
Mastering Microsoft Intune - Second Edition
Mastering Microsoft Intune - Second Edition

Mastering Microsoft Intune: Deploy Windows 11, Windows 365 via Microsoft Intune, Copilot and advance management via Intune Suite, Second Edition

By Christiaan Brinkhoff , Per Larsen
€32.99 €22.99
Book Mar 2024 822 pages 2nd Edition
eBook
€32.99 €22.99
Print
€41.99
Subscription
€14.99 Monthly
eBook
€32.99 €22.99
Print
€41.99
Subscription
€14.99 Monthly

What do you get with eBook?

Product feature icon Instant access to your Digital eBook purchase
Product feature icon Download this book in EPUB and PDF formats
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want
Buy Now

Product Details


Publication date : Mar 13, 2024
Length 822 pages
Edition : 2nd Edition
Language : English
ISBN-13 : 9781835468517
Vendor :
Microsoft
Category :
Concepts :
Table of content icon View table of contents Preview book icon Preview Book

Mastering Microsoft Intune - Second Edition

Understanding Policy Management

In this chapter, you will learn about how policy management from Microsoft Intune is different from Group Policy Objects (GPOs) and the different policy types in Intune that give you various options to customize and secure the Windows Enterprise desktops in your environment. This chapter will be very broad in terms of content, but it will give you the basic information needed to understand how policy management works between Windows and Microsoft Intune.

We have divided policy management into three chapters in this book, and the following one is the first one – Chapter 10, Advanced Policy Management. That chapter deals with advanced policy management with different scenarios. In this chapter, we’ll cover the following topics:

  • Policy management
  • What is a Configuration Service Provider (CSP) policy?
  • Windows Push Notification Service (WNS)
  • Getting started with policy design
  • Policy management within Microsoft Intune
  • Migrating existing policies from Azure Directory (AD) – Group Policy management

Policy management

Using Microsoft Intune to manage your Windows Enterprise desktops is all about standardizing and simplifying the management layer of your environment. As explained in the previous chapter, everything is centered around structuring your configuration sets (and applications) separately from the target Operating System (OS) to remove the need to create custom images that might include these things from the get-go.

Policy management within Microsoft Intune makes it possible to configure the following options from within the Devices menu:

  • Compliance policies
  • Conditional access
  • Configuration profiles
  • Settings catalog
  • ADMX import
  • Scripts
  • Group policy analytics
  • Enrollment restrictions

Group Policy management has been around for more than 20 years and is a way to configure the behavior of a group of users or computers in a domain. This is still possible with an on-premises domain today, but if you want to start modernizing your policy and settings management, you should start looking at Microsoft Intune and the feature set it provides for policy management. There are some disadvantages associated with using GPOs, one of them being that it requires a line of sight to a domain controller. Another is that GPOs are fire-and-forget, but what do we mean by this? GPOs are assigned to a specific group of users and devices, and they are applied when a device connects to a domain controller on a regular basis. There is no reporting back to the domain controller if the device receives and applies the policy correctly, if no domain controller can be contacted, or if no new or changed policies are applied.

Sometimes, due to misconfiguration, a Windows device may try to contact a domain controller far away on the internal network with very slow connectivity, which can result in very long boot and sign-in times. Many of these issues can be avoided with a purely cloud-joined and -managed device.

Microsoft Intune is a perfect match for a new way of working guided by modern management and cloud-native, as it just requires internet connectivity following the initial onboarding into Microsoft Intune.

In this chapter, we will focus on cloud-native devices, that is, Enrtra-joined and Intune-managed Windows devices, but what we learn will also apply to hybrid domain-joined devices that are managed from Microsoft Intune in a co-managed state. One important thing to note here is that GPO and Mobile Device Management (MDM) settings are on the device identity layer, where policies and configurations are either target users or devices, whereas co-management between Microsoft Intune and System Center Configuration Manager (SCCM) is on the management plane.

First, we need to look back at traditional Windows management, where all Windows devices were on-premises in the office, in production, or with end users working at home with VPNs. Modern policy management is still an option on those devices if they are hybrid-joined to Entra ID.

The best option moving forward with new devices is to go purely Entra-joined and onboarded with Windows Autopilot. What we cover in this chapter covers both scenarios. This book is dedicated to cloud management, and certain scenarios do not apply to hybrid-joined devices, which is why you need to make some decisions to go to Entra-joined devices to get the best end-user experience. Start small, start with a Proof of Concept (POC), and showcase the benefits of modern policy management. A best-practice approach is to block on-premises devices in your POC from getting GPOs from the local Active Directory instance; otherwise, you can end up in a situation where you are not 100% sure where the settings are being applied from.

A Configuration Service Provider (CSP) is an interface for reading, setting, modifying, and deleting configuration settings on a device. These settings map to registry keys or files. Some CSPs support WAP format, some support SyncML, and some support both. SyncML is only used over the air for Open Mobile Alliance Device Management (OMA DM). On the other hand, WAP can be used over the air for OMA client provisioning, or it can be included in a phone image as a .provxml file that is installed during boot.

What is a CSP policy?

Some policies can only be configured at the device level, whereas other policies can be configured at the user level. This means that device-level policies will have an effect independent of the user logging in to the device, whereas user-level policies will only have an effect depending on the user logging in to the device. As an example, different users can have different homepages in Microsoft Edge, so it is appropriate to assign a policy with that setting to a user group, whereas security settings that need to be applied at the device level are appropriate to assign to device groups.

User scope is where the policy only applies to the user who logs in to the device, and the policy can vary depending on who is logging in to the device. The following is an example of what the CSP tree looks like when configuring a user policy:

  • ./User/Vendor/MSFT/Policy/Config/AreaName/PolicyName is used to configure the policy.
  • ./User/Vendor/MSFT/Policy/Result/AreaName/PolicyName is used to get the result.

Device scope is where the policy only applies to the device itself, regardless of the user who logs in to the device. The following is an example of what the CSP tree looks like when configuring a device policy:

  • ./Device/Vendor/MSFT/Policy/Config/AreaName/PolicyName is used to configure the policy.
  • ./Device/Vendor/MSFT/Policy/Result/AreaName/PolicyName is used to get the result.

The biggest difference between a GPO and a CSP policy is that a CSP policy has a result channel as well, so every setting that is configured on the device will report back to the MDM system – in this case, Microsoft Intune.

If we take a closer look at the policy structure, it looks like the Windows registry is arranged in a tree structure:

Figure 9.1: CSP policy tree

By using ADMXInstall, you can add ADMX-backed policies for those Win32 or Desktop Bridge apps that have been added between OS releases. ADMX-backed policies are ingested by your device by using the CSP policy URI: ./Vendor/MSFT/Policy/ConfigOperations/ADMXInstall.

The OMA-URI string needs to go into the CSP policy URI:

  • ./Vendor/MSFT/Policy/ConfigOperations/ADMXInstall/Applicationname/Policy/ADMXFileName.
  • ./Vendor/MSFT/Policy/Config/ remains the same for all machine-based policies that you deploy to the device.

Applicationname and ADMXFileName are user-defined. In this case, Applicationname is App1, and you can use the same name as ADMXFileName. Just remember that ADMXFileName needs to be unique, which means you cannot deploy two ADMX files with the same name on a device, as it will fail and any additional ADMX files will not be added to the device.

Here is the content of the ADMX file in my case – this could also have been Google Chrome, Microsoft Office, Internet Explorer, or others:

Figure 9.2: Registry entry for AdmxInstalled

Then, if you take a closer look at the registry, the first place where they are written is HKLM\SOFTWARE\MICROSOFT\PolicyManager\AdmxInstalled.

The policy is always declared under a GUID and with the name you gave the policy in Microsoft Intune when you created the policy.

Then, you will be able to see the naming of the policy category that you are using when creating a policy setting: HKLM\Software\Microsoft\PolicyManager\AdmxDefault

If the policy is a device policy, you will be able to see the direct results that apply to the devices in the following location: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\PolicyManager\current\device.

In the end, all a policy does on a Windows device is set some registry keys, and it is the same with MDM policies. All the policy settings go here: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\.

MDM policies are applied when a device syncs, either from Microsoft Intune or as part of the 8-hour schedule when a Windows device is running with MDM sync on.

For an IT admin to sync a device from Microsoft Intune, they need to start the Microsoft Intune admin center and follow these steps:

  1. Click Home | Devices | Windows | Windows devices.
  2. Search for the device you want to sync, and then select the device and click Sync. Intune will then try and reach out to the device through Windows Push Notification Service (WNS).
  3. You can read more about WNS in the next section.

Figure 9.3: Device sync

  1. In the same view, where you just selected a single device, you can also leverage Bulk Device Actions:

Figure 9.4: Bulk device actions

  1. Select Windows for OS.
  2. For Device type, select Cloud PCs or Physical devices.
  3. Select Sync as Device action:

Figure 9.5: Bulk device action – Windows

  1. Then, you can select up to 100 devices that Microsoft Intune will reach out to and perform the sync:

Figure 9.6: Bulk device action

When leveraging bulk device actions, Microsoft Intune uses WNS. In the next section, you will learn about how WNS works.

Windows Push Notification Service (WNS)

WNS enables Microsoft Intune to send toast, tile, badge, and raw updates from Microsoft Intune to MDM-enrolled devices. This provides a mechanism to deliver new updates to your users in a power-efficient and dependable way:

  1. Microsoft Intune makes an HTTP POST to the channel URI. This request is made over SSL and contains the necessary headers and the notification payload.
  2. WNS responds to indicate that the notification has been received and will be delivered at the next available opportunity.

    WNS does not provide end-to-end confirmation that your notification has been received by the device or application. Microsoft Intune provides this option by showing the status in the Device actions status view on the Overview blade for a specific device:

    Figure 9.7: WNS workflow

  1. There is also an option for an end user to do this from the client side. On the client side, you can do a sync from Company Portal or the settings app.
  2. In the Start menu, you can search for Company Portal (we recommend that IT admins always push Company Portal to the end user’s Windows device), which will give you the option to sync this device:

Figure 9.8: Company Portal

  1. If Company Portal is pinned to the Start menu, you can right-click and sync this device:
Figure 9.9 – Sync this device

Figure 9.9: Sync this device

  1. In Company Portal, go to settings, and then click Sync:

Figure 9.10: Manually sync your device

  1. In the Windows settings app, you can go to Accounts | Access work or school.
  2. Select the identity from Entra ID, and then click Info.
  3. You are then able to see the policy areas managed by your company.

    On Windows 11, you also have the same option as on Windows 10, but you can perform an export of your management log files directly from the Access work or school page in the Settings app:

    Figure 9.11: Managed by your company

  1. When you click Info, you will get a more detailed page:

Figure 9.12: Managed by your company

  1. If you scroll to the bottom of this Settings page, you will see Device sync status, where you can see Last Attempted Sync and the Sync button:

Figure 9.13: Device sync status

When a user is doing an MDM sync, all new policies will be applied to the device and it will be verified that all existing policies have been applied.

That concludes this section on WNS and MDM synchronization. In the next section, we will cover getting started with policy design in Microsoft Intune.

Getting started with policy design

When designing your strategy for policy management with Microsoft Intune, it is important to take the right approach.

By starting with a security baseline, we get well-tested and secure sets of policies; you can even disable or remove individual settings in the security baseline if they do not suit your organization. When you have deployed the security baseline, you can start adding other policy types that suit your security or configuration needs.

There are several policy types in Microsoft Intune. In the following list, you can see the different policy types and the order in which you should start creating policies:

  1. Configure the security baseline.
  2. Configure the policy from the Endpoint Security blade.
  3. Configure the policy from the Settings catalog.
  4. Configure the administrative template.
  5. Configure the device configuration.
  6. Leverage a custom policy as a last resort.

Just remember that there are no right and wrong approaches, but if you’re undertaking a migration from Active Directory GPOs to MDM settings management, it might be a good time to start afresh and see what you need to configure instead of taking the legacy GPO settings of your on-premises environment with you. Sometimes, organizations do not even know why they implemented a specific policy setting back when they originally created it. Perhaps the person responsible for implementing this policy setting is no longer even with the company and did not leave any documentation on why the setting was configured the way it was in the first place.

As there is no conflict handling in the MDM stack, you might inadvertently create a conflict between two settings coming from two different policies to the same user or device. These could be from the same policy type or different policy types, so it is important to spot and monitor any conflicting policies.

  1. In order to monitor any conflicting policies, head to the Microsoft Intune admin center, and under each device, go to Home | Configuration:

Figure 9.14: Configuration policy status

  1. You can see the policy that has conflicts and the work required to remediate the conflict:

Figure 9.15: Policy conflict

  1. When drilling down into the policy, you can see which settings are in conflict. In this case, I see that there is a conflict between a policy in the Endpoint Security blade and the Antivirus – Windows Defender Antivirus policy type:

Figure 9.16: Profile settings

  1. Going to that policy, you can see in the Per-setting status blade that the top line, CPU usage limit per scan, has conflicts. When you find conflicts, you need to go into the policies with conflicts and change the conflicting settings so they are only configured in one policy:

Figure 9.17: Per-setting status

Let’s now have a look at how to implement different policy types.

Migrating existing policies from AD – Group Policy management

It’s possible to migrate your existing Active Directory-based group policies into Microsoft Intune. This can be done with the Group Policy analytics feature.

Many businesses that are looking at Microsoft Intune management need a good path to the new modern workplace. The translation of existing policy settings to Intune can be tricky. This service will make life much easier for IT admins. Let me explain in more detail what Group Policy analytics does and how you can use it yourself; it can be found on the Devices blade:

Figure 9.18: Group Policy analytics

  1. First, make sure to perform an export of your existing policy settings from within your on-premises Group Policy Management console.
  2. Export the policies by right-clicking and selecting Save Report….
  3. Save the files somewhere centralized, as we need to upload them to Microsoft Intune:

Figure 9.19: Save the policy report

  1. In the Microsoft Intune admin center, select Devices | Group Policy analytics.
  2. Click on Import:

Figure 9.20: Import

  1. Search for the policy report file you exported:

    Figure 9.21: Import the GPO files

    NOTE

    When you have multiple policies, you can upload them all here, too, for further analysis.

  1. After you run the policy analysis, you will see the MDM Support column (which also applies to Windows), showing how many of your settings/policies are also available in Microsoft Intune to migrate from GPOs to Intune settings on a 1:1 basis:

Figure 9.22: MDM Support

  1. You will get the information you need to proceed. The GPOs you imported are now all listed with the following information:
    • Group policy name: The name is automatically generated using the information in the GPO.
    • Active Directory Target: The target is automatically generated using the Organizational Unit (OU) target information in the GPO.
    • MDM Support: This shows the percentage of Group Policy settings in the GPO that have the same setting in Intune.
    • Targeted in AD: Yes means the GPO is linked to an OU in an on-premises Group Policy. No means the GPO isn’t linked to an on-premises OU.
    • Last imported: This shows the date of the last import.
    Figure 9.24 – Default Domain Policy

    Figure 9.23: Default Domain Policy

    With Group Policy analytics, you import your on-premises GPOs. The tool analyzes your imported GPOs and shows the settings that are also available in Microsoft Intune. For the settings that are available, you can create a Settings Catalog policy and then deploy the policy to your managed devices.

  1. After you have imported your GPOs, you can select the GPO that you want to migrate to Intune by clicking the Migrate button.

Figure 9.24: Migrating GPOs to Intune

  1. You need to select the GPO settings that you want to migrate and then click Next:

    Figure 9.25: Migrating GPOs to the cloud

    These are the settings you’ve identified as necessary to your organization as you move to cloud-based policy management. Configure the setting values as per your organization’s requirements. Where possible, we configured the settings values as per the Group Policy:

    Figure 9.26: Migrating GPO settings

  1. You need to give the new settings catalog profile a name:

Figure 9.27: Migrating profile info

  1. Continue with the guide to add scope tags and assignments, and then finally deploy the policy. You can skip the assignment and the policy will be created without an active assignment.

Figure 9.28: New browser policy

You have successfully migrated your browser policy and are ready to test it on Intune-managed devices before you deploy the policy at scale.

This concludes the section on Group Policy analytics, which can help you with your policy migration from on-premises GPOs to Microsoft Intune MDM policies.

Summary

In this chapter, you’ve learned about the basic policies in Microsoft Intune and how they apply to your Windows endpoints. This is knowledge that you can use to better understand what happens on a Windows device when you start to deploy policies to your endpoints from Microsoft Intune.

In the next chapter, we will go into more depth on how to configure different policy types from within Microsoft Intune.

Questions

  1. Do CSP and ADMX policies write to the local registry in the same way?
    1. No
    2. Yes
  2. What is the maximum number of devices for bulk actions in MDM?
    1. 10
    2. 50
    3. 100
    4. 1000
  3. What does WNS stand for?
    1. Windows Name Server
    2. Windows Push Notification Service

Answers

  1. (a)
  2. (c)
  3. (b)

Further reading

If you want to learn more after reading this chapter, please use the following free online resources:

Learn more on Discord

To join the Discord community for this book – where you can share feedback, ask questions to the author, and learn about new releases – follow the QR code below:

https://packt.link/SecNet

Left arrow icon Right arrow icon

Key benefits

  • This new edition covers the latest updates of Microsoft Intune, Windows 365, Intune Suite, Windows Autopatch, Microsoft Defender and Universal Print
  • Get detailed guidance on device enrolment, app deployment, management, data security, and policy configuration
  • Secure data on personal devices with app policies, encryption, and more

Description

The slow adoption of modern Work solutions, which are designed to streamline the management of your environment, can often be attributed to a lack of understanding and familiarity with those solutions. This book will provide you with all the information you need to successfully transition to Microsoft Intune. Mastering Microsoft Intune, Second Edition, explains various concepts in detail to give you the clarity on how to use Microsoft Intune and eliminate any migration challenges. You'll master Cloud Computing services such as Windows 365 Cloud PCs, Intune Suite, Windows Autopatch, Windows Autopilot, profile management, monitoring and analytics, Universal Print, and much more. The book will take you through the latest features and new Microsoft Cloud services to help you to get grips with the fundamentals of Intune and understand which services you can manage. Whether you're interested in physical or cloud endpoints it's all covered. By the end of the book, you'll be able to set up Intune and use it to run Windows and Windows 365 efficiently, using all the latest features of Intune.

What you will learn

Simplify the deployment of Windows in the cloud with Windows 365 Cloud PCs Deliver next-generation security features with Intune Suite Simplify Windows Updates with Windows Autopatch Configure advanced policy management within Intune Discover modern profile management and migration options for physical and Cloud PCs Harden security with baseline settings and other security best practices Find troubleshooting tips and tricks for Intune, Windows 365 Cloud PCs, and more Discover deployment best practices for physical and cloud-managed endpoints

What do you get with eBook?

Product feature icon Instant access to your Digital eBook purchase
Product feature icon Download this book in EPUB and PDF formats
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want
Buy Now

Product Details


Publication date : Mar 13, 2024
Length 822 pages
Edition : 2nd Edition
Language : English
ISBN-13 : 9781835468517
Vendor :
Microsoft
Category :
Concepts :

Table of Contents

25 Chapters
Preface Chevron down icon Chevron up icon
Understanding the Basics Chevron down icon Chevron up icon
Introduction to Microsoft 365 Chevron down icon Chevron up icon
Cloud-Native Endpoints Chevron down icon Chevron up icon
Requirements for Microsoft Intune Chevron down icon Chevron up icon
Windows 365 Chevron down icon Chevron up icon
What Is Windows 365? Chevron down icon Chevron up icon
Deploying Windows 365 Chevron down icon Chevron up icon
Mastering Microsoft Intune Chevron down icon Chevron up icon
Windows Deployment and Management Chevron down icon Chevron up icon
Windows Autopilot Chevron down icon Chevron up icon
Application Management and Delivery Chevron down icon Chevron up icon
Understanding Policy Management Chevron down icon Chevron up icon
Advanced Policy Management Chevron down icon Chevron up icon
Intune Suite Chevron down icon Chevron up icon
Copilot/AI Chevron down icon Chevron up icon
Identity and Security Management Chevron down icon Chevron up icon
Monitoring and Endpoint Analytics Chevron down icon Chevron up icon
Universal Print Chevron down icon Chevron up icon
Troubleshooting and Community Chevron down icon Chevron up icon
Troubleshooting Microsoft Intune Chevron down icon Chevron up icon
Troubleshooting Windows 365 Chevron down icon Chevron up icon
Community Help Chevron down icon Chevron up icon
Other Books You May Enjoy Chevron down icon Chevron up icon
Index Chevron down icon Chevron up icon

Customer reviews

Filter icon Filter
Top Reviews
Rating distribution
Empty star icon Empty star icon Empty star icon Empty star icon Empty star icon 0
(0 Ratings)
5 star 0%
4 star 0%
3 star 0%
2 star 0%
1 star 0%

Filter reviews by


No reviews found
Get free access to Packt library with over 7500+ books and video courses for 7 days!
Start Free Trial

FAQs

How do I buy and download an eBook? Chevron down icon Chevron up icon

Where there is an eBook version of a title available, you can buy it from the book details for that title. Add either the standalone eBook or the eBook and print book bundle to your shopping cart. Your eBook will show in your cart as a product on its own. After completing checkout and payment in the normal way, you will receive your receipt on the screen containing a link to a personalised PDF download file. This link will remain active for 30 days. You can download backup copies of the file by logging in to your account at any time.

If you already have Adobe reader installed, then clicking on the link will download and open the PDF file directly. If you don't, then save the PDF file on your machine and download the Reader to view it.

Please Note: Packt eBooks are non-returnable and non-refundable.

Packt eBook and Licensing When you buy an eBook from Packt Publishing, completing your purchase means you accept the terms of our licence agreement. Please read the full text of the agreement. In it we have tried to balance the need for the ebook to be usable for you the reader with our needs to protect the rights of us as Publishers and of our authors. In summary, the agreement says:

  • You may make copies of your eBook for your own use onto any machine
  • You may not pass copies of the eBook on to anyone else
How can I make a purchase on your website? Chevron down icon Chevron up icon

If you want to purchase a video course, eBook or Bundle (Print+eBook) please follow below steps:

  1. Register on our website using your email address and the password.
  2. Search for the title by name or ISBN using the search option.
  3. Select the title you want to purchase.
  4. Choose the format you wish to purchase the title in; if you order the Print Book, you get a free eBook copy of the same title. 
  5. Proceed with the checkout process (payment to be made using Credit Card, Debit Cart, or PayPal)
Where can I access support around an eBook? Chevron down icon Chevron up icon
  • If you experience a problem with using or installing Adobe Reader, the contact Adobe directly.
  • To view the errata for the book, see www.packtpub.com/support and view the pages for the title you have.
  • To view your account details or to download a new copy of the book go to www.packtpub.com/account
  • To contact us directly if a problem is not resolved, use www.packtpub.com/contact-us
What eBook formats do Packt support? Chevron down icon Chevron up icon

Our eBooks are currently available in a variety of formats such as PDF and ePubs. In the future, this may well change with trends and development in technology, but please note that our PDFs are not Adobe eBook Reader format, which has greater restrictions on security.

You will need to use Adobe Reader v9 or later in order to read Packt's PDF eBooks.

What are the benefits of eBooks? Chevron down icon Chevron up icon
  • You can get the information you need immediately
  • You can easily take them with you on a laptop
  • You can download them an unlimited number of times
  • You can print them out
  • They are copy-paste enabled
  • They are searchable
  • There is no password protection
  • They are lower price than print
  • They save resources and space
What is an eBook? Chevron down icon Chevron up icon

Packt eBooks are a complete electronic version of the print edition, available in PDF and ePub formats. Every piece of content down to the page numbering is the same. Because we save the costs of printing and shipping the book to you, we are able to offer eBooks at a lower cost than print editions.

When you have purchased an eBook, simply login to your account and click on the link in Your Download Area. We recommend you saving the file to your hard drive before opening it.

For optimal viewing of our eBooks, we recommend you download and install the free Adobe Reader version 9.