Blog Post

Configuration Manager Blog
4 MIN READ

Managing remote machines with cloud management gateway in Microsoft Endpoint Configuration Manager

RobYork's avatar
RobYork
Icon for Microsoft rankMicrosoft
Mar 18, 2020

In light of the global situation that has escalated over the past weeks regarding COVID-19 and the coronavirus; there has been a significant increase in the number people working from home. Indeed, myself and the rest of the Microsoft Endpoint Manager team are among 100,000+ Redmond based Microsoft employees who are entering our third week of remote work.

 

This increase in the global workforce working from home is unsurprisingly putting an added focus from organizations on remote functionality and management. Not to mention an increased load and strain on services that were implemented to accommodate lower concurrent numbers of remote working employees.

 

Naturally we have seen an increase in the number of queries, questions and tweets around the tools and features Microsoft Endpoint Manager can offer in the way of remote management of the workforce. One of the most common topics I have had to field enquiries is around the use of cloud management gateway (CMG), usually in conjunction with keeping traffic off the VPN.

 

Firstly, let’s clarify some terms….

 

Internet-based client management is a longstanding concept in Configuration Manager whereby servers are placed in the DMZ and published to the Internet to allow clients to continue to be managed when roaming on the Internet.

 

Cloud management gateway, or as I shall refer to it in the rest of the blog, CMG for short, is a cloud service hosted in Azure that acts as a proxy for clients. It greatly simplifies the configuration required to manage clients on the Internet.

 

The final concept is cloud distribution point, also a cloud service hosted in Azure, that allows clients to retrieve content. For the purposes of simplicity, and because cloud distribution point has been deprecated in favor of enabling content distribution from a CMG, I will use the term “CMG” to refer to a content-enabled cloud management gateway for the remainder of this blog

 

Secondly, let’s talk about why clients will potentially still communicate over the VPN when a CMG is deployed. Essentially, the Configuration Manager client has logic that looks at several factors, including being able to resolve a management point and the internal domain. When these factors are not met, the client will evaluate as IsInternet=1 and will communicate with resources published to the Internet.  When a client is connected to a VPN it is likely that the client will meet enough criteria to consider itself IsInternet=0 which is why client traffic will go over the VPN and not the Internet even if split tunneling is configured to allow direct Internet traffic.

 

NOTE: Everything in this blog will require a split-tunnel VPN. If all the traffic is directed back to the corporate network by the VPN client, then even if the Configuration Manager client is ultimately going out to cloud services, it won’t be alleviating VPN traffic.

 

The good news is that there are a couple of configuration options that you can take to move traffic away from the VPN and directly to Internet sources. These options should hopefully free up some bandwidth for line of business traffic whilst ensuring clients remain managed and up to date.

 

When the VPN has a known IP range

 

If your VPN clients are sat neatly in a known IP range or ranges, then firstly you need to create boundaries in Configuration Manager to cover the VPN ranges:

 
 

 

and then add them to a boundary group:

 

 

Then you need to configure that boundary group to use cloud services. You do this on the references tab, to explicitly accommodate the CMG with the boundary group:

 

 

And also on the options tab select  Prefer cloud based sources over on-premise sources

 

 

This option will apply even if you don’t have a CMG, so can offer some respite to your VPN by directing clients to Microsoft Update for content.

 

When the VPN doesn’t have a known IP range

 

Admittedly this complicates matters, but we added the concept of default site boundary group in version 1610 as a replacement to the concept of fallback content location. This behavior means that if your VPN clients do not fall into a known boundary group, they can fallback to communicate with referenced site systems from the default site boundary group.

 

Again, add the CMG to the references tab

 

 

NOTE: This will result in clients in the corporate network, but not in a known boundary, to connect to the CMG.

 

Force the client to Always Internet mode

 

If networking or boundary configuration makes either of the first two options unviable, you can always force the client to always consider itself IsInternet=1, effectively overriding the logic I talked about earlier. Toggling the client back and forth from explicitly Always Internet is not possible, hence why we make the previous options available. If needed, as a matter of last resort, you could (re)deploy the client using the CCMALWAYSINF parameter to ensure your remote clients are always managed by the CMG.

 

Finally, I wanted to call out an implementation within the Configuration Manager client when it comes to Microsoft Updates. You do not need to deploy your Microsoft software updates packages to the CMG: If a client is on the Internet communicating to a CMG, it will instead retrieve updates from Microsoft Updates. As long as the client can download directly from Microsoft Updates it will never download Microsoft updates from a CMG. Although, a good practice is to not deploy updates packages to a CMG that contain Microsoft Updates.

 

We had previously blocked the deploying of update packages to CMG and CDP for this very reason, but we relaxed the restriction in order to facilitate third party updates.

 

 

To allow clients to use cloud sources for Microsoft Update content, ensure you select the “If software updates are not available on distribution point in current, neighbor or site boundary groups, download content from Microsoft Updates” check box on the updates deployment:

 

 

Rob York

@robdotyork

Program Manager

Microsoft Endpoint Manager

Updated Mar 18, 2020
Version 3.0

70 Comments

  • https://twitter.com/robdotyork We've been implementing CMG (using Enhanced HTTP + Azure AD) and are happy to see already quite some traffic from the Cloud DP's.
    However, we run into an issue where clients using the CMG as management point, don't see user-targeted applications in their Software Center, and in the SCClient logs it shows: 

     

    Using endpoint Url: https://*********.CLOUDAPP.NET/CCM_Proxy_MutualAuth/72057594037927951:443/CMUserService_WindowsAuth, Windows authentication (Microsoft.SoftwareCenter.Client.Data.ACDataSource+<>c at <RefreshLocalSettingsAsync>b__16_0) SCClient 3/26/2020 12:33:19 PM 5 (0x0005)

    GetApplicationsAsync: The HTTP request was forbidden with client authentication scheme 'Negotiate'.. Unable to fetch user categories, unknown communication problem.      (Microsoft.SoftwareCenter.Client.ViewModels.SoftwareListViewModel+<LoadAppCatalogApplicationsAsync>d__164 at MoveNext)
     
    Any ideas on what I'm missing? All the rest seems to work fine. 
  • dbc67's avatar
    dbc67
    Copper Contributor

    Anything to add for clients who are on Direct Access? Gotcha's when it comes to ADRs?

  • Jakob-STG's avatar
    Jakob-STG
    Copper Contributor

    Doogle2006 https://miketerrill.net/2020/03/18/forcing-configuration-manager-vpn-clients-to-get-patches-from-microsoft-update/

  • Doogle2006 there is no list available with IPs addresses for WU. The WU endpoints are distributed across the world with different CDNs and there is no possibility to provide/maintain a list of the IPs.

  • Doogle2006's avatar
    Doogle2006
    Copper Contributor

    Where can I find the IP addresses of the Windows updates servers to include in the split tunneling rules (can only find URL's or the whole MS IP address space) !

  • PhilWilcock's avatar
    PhilWilcock
    Copper Contributor

    You might want to turn off P2P for that boundary group too if using Peer Cache 😉

  • myeatman's avatar
    myeatman
    Copper Contributor

    For those of us without CMG, if you create the VPN boundary group and configure it to prefer cloud resources do you need to associate site system servers with it or can that be left blank since it prefers the cloud anyways.

  • Mike__808's avatar
    Mike__808
    Copper Contributor

    We have still Windows 10 1709, I now we are late! Also with the cloud distribution point it's hard to upgrade all devices until April 14. Still 2000 devices left. Employee can't go back to work during the quarantine time to change their devices (a few devices need to be replaced). 

    Microsoft can you please postpone the end-of- life for this build during the COVID-19 days. Two more months security updates would help a lot.

     

     

    Edit:

    Oh great news! Thank you guys :hearteyes:

    https://techcommunity.microsoft.com/t5/windows-it-pro-blog/revised-end-of-service-date-for-windows-10-version-1709-october/ba-p/1239043#

  • Stefano_Nieri's avatar
    Stefano_Nieri
    Brass Contributor

    This is a cool way only if the computer are not under AlwaysOnVpn device force-tunnel mode. I always say this to my customers first by listing the pros and cons between aovpn device and CMG. They generally choose aovpn for better mgmt and fully netlogon approach into the DC. 
    No more errors in trust relationship between workstations domain for "fully away" users 😉


    Cheers

  • R3gM0rris's avatar
    R3gM0rris
    Copper Contributor

    Is it possible to just manage Windows Updates through these methods? Is there a way to manage standard content via on-prem and Winodws Updates via CMG / Internet?