By Lothar Zeitler – Senior Program Manager | Microsoft Intune
This article covers some methods to help enroll and configure Windows-based Microsoft Teams Rooms devices with Microsoft Endpoint Manager - Intune. Teams Rooms comes with a specially configured Windows 10 image supplied by the original equipment manufacturer (OEM). Successful installation and deployment of Teams Rooms requires preparation, such as account provisioning and a device deployment and enrollment strategy. For detailed information to help you plan your Teams Rooms deployments, see Microsoft Teams Rooms | Deployment overview.
Note: Microsoft Teams devices can be managed in the Teams admin center or in Microsoft Teams Rooms Pro Management Service. Mobile device management (MDM) enrollment is not part of the default installation process for Teams devices. Windows Autopilot enrollment is not supported.
There are two methods for enrolling Teams Rooms Windows devices in Intune. Our recommended method is to use bulk enrollment, which allows you to also set up the device in shared device mode. For detailed instructions, see Bulk enrollment for Windows devices and the blog post Bulk join a Windows device to Azure AD and Microsoft Endpoint Manager using a provisioning package.
The other method is to use a Teams resource or DEM account to enroll the device in Intune. Please note that these steps must be done manually, and you will need to give passwords to local technicians. Additionally, keep in mind that a Teams resource account will have privileges on Exchange (read/write calendar, browse/search in the GAL), Teams (chats, call, meeting, etc.), as well as read in Azure AD.
From a license perspective, everything you need to register the device in Azure Active Directory (Azure AD) and enroll it in Intune is already covered by the Microsoft Teams Rooms licenses.
|
Microsoft Teams Rooms Standard |
Microsoft Teams Rooms Premium |
Microsoft Teams |
✔ |
✔ |
Phone System |
✔ |
✔ |
Audio Conferencing |
✔ |
✔ |
Microsoft Intune |
✔ |
✔ |
Azure Active Directory P1 |
✔ |
✔ |
Worldwide Availability |
✔ |
✔ |
Channel Availability |
EA, EAS, CSP, |
EA, EAS, CSP, |
Managed Services |
✔ |
Refer to the Microsoft Teams documentation for specific availability details and limits: Teams Meeting Room Licensing Update.
Your organization might already have unmanaged Teams Rooms Windows devices in operation that are set up with local user accounts. The local account is used to perform an automated sign in to Windows, while the Teams app on these devices is using the Azure AD Teams resource account to sign in. However, the Teams Rooms device isn’t registered with Azure AD or Intune.
There are two options for registering and enrolling these devices. The first option is to use a resource account to register and enroll the device. The second and preferred option is to create a provisioning package with Windows Configuration Designer and apply this to a Teams Rooms device. This will restart the device and apply the settings (for example, a computer name), and join it to Azure AD.
Before we get started, let’s ensure that we have a dynamic group in Azure AD that adds all the Teams Rooms devices. This helps to identify which devices to apply Teams Rooms-related settings and policies to, and will handle them as a group, separate from other Windows devices.
To learn more about Teams device enrollment and policies, see the blog post Managing Microsoft Teams Rooms with Intune.
In our example scenario, we use a naming convention to include “MTR” to help identify Teams Rooms. Then, in the rule we use the name as the criteria and create a rule to add every computer containing “MTR” to the group.
Check if the computer name follows a standard. There is no name generation for Teams Rooms devices that are installed only as “workgroup” computers. Instead, generic names such as “Desktop-1234” will be used.
Using a resource account to register Teams Rooms devices is a manual process. On the device user interface, select More (…) and then select Settings.
Confirm that you are signing in with a local Administrator account and enter the password.
In the Settings menu, choose Windows Settings and you will be prompted to sign in with an Administrator account again. Save and exit Teams.
From the Windows Start menu, open Settings, select Accounts, and then select Access work or school. On the Set up a work or school account dialog, under Alternate actions, select Join this device to Azure Active Directory.
Sign in with the resource account credentials. Keep in mind that the resource account is added to the local machine and uses Administrator credentials. However, in Azure AD the user does not have any rights.
If the connection was successful, you’ll see the account under Access work or school.
After the device has joined Azure AD it will appear in Intune as a Windows device. We used a user account for enrollment, so the device is mapped to the resource account, as we can see in the Primary user field.
Typically, these types of devices are considered shared devices, so you should manually remove the primary user. Select Properties, and then select Remove primary user and select Save at the top of the page.
Note: You can use a DEM account to enroll Teams Rooms devices in the same way. However, the DEM account will become the primary user of the device, and you’ll need to remove it as well. A benefit of using a DEM account over a resource account is that the DEM account can only enroll devices and will not have any rights to access mailboxes, calendars etc.
You’ll see a notification that the device will now operate in shared mode.
At this point, we have successfully enrolled Teams Rooms in Intune. In the next section, we’ll review how to bulk enroll Teams Rooms using a Windows Configuration Designer package.
An easy way to enroll Teams Rooms Windows devices is with a Windows Configuration Designer provisioning package. First, install Windows Configuration Designer from the Windows Store: https://www.microsoft.com/store/productId/9NBLGGH4TX22.
Open Windows Configuration Designer—it should look like this:
For our example, we select Provision desktop devices to create a new project, add a name, the project folder path, and an optional description, and then select Finish.
In the package definition, you can specify some rules for the computer name. For this example, we want to ensure that every device starts with “MTR” followed by a three-digit random number. We use the value: MTR-%RAND:3%
Note:
We disable the Wi-Fi connection for Teams Rooms, which require LAN connections in meeting rooms. Select Next.
Under Account management, select Enroll in Azure AD to join the device to Azure AD. Next, select Get Bulk Token to request an enrollment token from Azure AD. You can use a DEM account, or any other account that has rights to gather the bulk token. During the enrollment, a new account will be created. Note the token expiration date in the Bulk Token Expiry field and select Next.
When the token is issued, we see the status Bulk Token Fetched Successfully.
In Intune, we see the new, corresponding enrollment account that Windows Configuration Designer created.
Note: The account that was used for the token request is not stored in the package.
For our example, we do not need to add any apps and there are no certificates, either. Select Next to continue to the Finish page, review the summary, and then select Create to generate the package.
After the package is created, you’ll see the storage location below the create button.
As a last step, copy the PPKG File to a USB drive.
To assign a Windows configuration Designer package, open Windows Settings as an Administrator. From the Windows Start menu, select Settings and then sign in with a local Administrator account (if you are not already signed is as a local Admin).
In Settings, select Accounts > Access work and school > Add or remove a provisioning package.
In the Provisioning packages dialog, select Add a package.
Then select and add the package we created earlier from the USB drive.
In the User Account Control (UAC) dialog, select Yes.
A dialog opens, confirming that the package is from a trusted source. Additionally, it shows you the information about the changes that will be made to the system. To continue with the installation, select Yes, add it.
After the confirmation, the device reboots and begins the setup process.
Note: If you install a provisioning package on a device which is already in use, but not enrolled in Intune, it does not reset the system. Windows applies the new settings, renames the computer, and joins the device to Azure AD, if specified. Furthermore, enrollment accounts used by the provisioning process do not assign a primary user for the device.
For more information about using Windows Configuration Designer for bulk enrollment, see Bulk join a Windows device to Azure AD and Microsoft Endpoint Manager using a provisioning package.
The only way to enroll a new Teams Rooms device during setup is to use a provisioning package. You can use the package we built in our example and copy it to a USB drive in the root folder. Connect the drive to Teams Rooms during the Out of Box Experience (OOBE) phase. Setup will find the file and will continue with the enrollment. For more information, see Apply a provisioning package.
Important: Windows Autopilot enrollment is not supported for Teams Rooms devices.
If you have completed a new installation or have enrolled an existing device with a provisioning package, the User Account Control dialog will not show the local Administrator account anymore in your Teams Rooms settings. If you want to enter the device settings as an administrator, sign in with “.\” as a prefix for your local Admin account. For example, you will sign in with the account .\Admin.
There are several ways to enroll Teams Rooms Windows devices in Intune. For existing devices, you can use the Teams resource account or a DEM account to perform an Azure AD join and enroll the device in Intune. However, instead of using these accounts and the manual steps they require, you can use a provisioning package to enroll Teams Rooms devices in Intune. This is the recommended method for a few reasons: the provisioning package enrolls the device with a token, so you don’t need to know or use a resource or DEM account and share the password; the device won’t have a primary user and will apply computer naming according to the rules defined in the package; and the device will be restarted, not reset, and will keep all the relevant settings.
If you do decide to enroll Teams Rooms devices with a resource account, remember that the account still has resource access to certain services. Using a DEM account will help you limit the account’s rights to device enrollment only. But in both scenarios, you will need to complete some manual post-installation tasks to remove the device’s primary user in Intune to make it a shared device, and to modify the computer name if needed.
For new installations of Teams Rooms, you can apply a provisioning package during the OOBE phase of the setup process. After completion, the device is already enrolled in Intune.
We hope this post helps you better understand the different options for enrolling Teams Rooms devices in Intune. Keep in mind that we recommend using a provisioning package and a dedicated account for enterprise installations and registrations with minimal interaction. If you have any questions or feedback, reply to this post or reach out to @IntuneSuppTeam on Twitter.
Post Updates:
01/09/21: Updated hyperlink.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.