Event details

Have questions about the latest security features and updates for Windows 11? Learn how to better protect your data and identities. Explore defaults, customization, and best practices that enable you to “lock down” Windows in your environment. Our product and engineering teams are here to help you stay ahead of evolving threats with Windows. Ask us anything!

 

This session is part of Tech Community Live: Windows edition.

Add it to your calendar, RSVP for event reminders, and post your questions and comments below! This session will also be recorded and available on demand shortly after conclusion of the live event.

 

Heather_Poulsen
Updated Dec 27, 2024

38 Comments

  • mohaa98's avatar
    mohaa98
    Brass Contributor
    Is there a way to deploy a standard M365 Update channel to clients via Intune but also permit users to change to a different channel if they choose? (We have the monthly channel set in the App deployment via Intune and set in M365 Admin channel) Are there any security concerns with permitting users to choose a different update channel?
    • NateNielsen's avatar
      NateNielsen
      Icon for Microsoft rankMicrosoft
      Hi Jonathan, users are unable to change to a different update channel. Only an IT administrator can control what updates from a specific channel get pushed down to an end user device.
      • mohaa98's avatar
        mohaa98
        Brass Contributor
        Are you able to target a subset of users via a separate app deployment with Intune to use a different channel or is your tenant locked to one channel due to the setting in the M365 admin center?
  • rb-qcm's avatar
    rb-qcm
    Copper Contributor
    Can you give a quick description of how Lighthouse can also be used not only to manage Office 365, but to also create new user accounts in On-prem hybrid environments and sync to Azure using Automation through Azure Arc?
  • Char_Cheesman's avatar
    Char_Cheesman
    Bronze Contributor

    Welcome to the AMA: Windows security and best practices. Let's get started! Post your questions in the Comments. We'll be answering questions in the live stream and in chat.

  • Andrew_Beard's avatar
    Andrew_Beard
    Copper Contributor
    Hi - I am interested in deploying the cloud PKI infrastructure for Intune to a customer who uses cloud only Windows devices but wishes to authenticate their Wi-Fi and VPN using certificates from the computers and users. https://learn.microsoft.com/en-us/mem/intune/protect/microsoft-cloud-pki-deployment The VPN accesses a few servers in an AzureAD DS or in a legacy AD lifted to run on Azure cloud machines. They have no legacy Certificate Authority and as a small company of between 20 and 50 users and client workstations, cannot afford third party solutions for RADIUS which are all the instructions I find when searching the web for practical step by step implementation instructions like this from Oliver Kieselbach: https://oliverkieselbach.com/2024/03/04/how-to-configure-cloud-pki-certificate-based-wifi-with-intune/ My issue when reading through the Microsoft learning documentation I find that it wants another separate PKI or CA service is needed (or a certificate from the third party Radius service?) - I thought that was they whole point of the Cloud PKI service - not to have to have another one? "When connecting to a relying party such as a Wi-Fi access point or VPN server, an SSL/TLS connection is first established by the managed Intune device when attempting to connect. Microsoft Cloud PKI doesn't provide these TLS/SSL certificates. You must obtain these certificates through another PKI or CA service." From: https://learn.microsoft.com/en-us/mem/intune/protect/microsoft-cloud-pki-deployment#ensure-chain-of-trust Can you help me with this as I don't understand why the cloud PKI alone would not be sufficient to provide the Root and intermediate root certs exported and uploaded to the VPN gateway/firewall and the network access point controllers for Wi-Fi when combined perhaps with the Microsoft cloud NPS extension service, but then again that also needs an on prem AD with Radius server and presumably a CA server? https://learn.microsoft.com/en-us/entra/architecture/auth-radius I am happy to use SAML and SSO in Entra for the VPN which may negate the requirement for RADIUS and NPS, but how would that work for Wi-Fi? Is that also possible?
    • Jason_Sandys's avatar
      Jason_Sandys
      Icon for Microsoft rankMicrosoft
      Hi Andrew. The crux of the limitation here is that the current Cloud PKI offering in Intune is for issuing certs to managed devices only. VPNs and WAPs typically require their own SSL/TLS cert to establish the secure connection with the client but since these are not Intune manageable devices, Cloud PKI cannot be used to issue certs to them. Note that a service side cert is required to established the secure channel -- a client-side cert cannot be used for this. We are aware of these types of scenarios (there are others) but they were not part of the initial scope for the solution; they are something we've discussed investigating but there's nothing to share about this today.