Managing Microsoft Teams Rooms with Intune
Published Dec 16 2019 03:54 PM 131K Views

We’ve heard a few questions recently from customers looking for guidance how to manage your Microsoft Teams Rooms devices with Intune. This post answers a few of the frequently asked questions and provides general guidance. If you’ve discovered additional tips or tricks on your deployment journey, or have other feedback or suggestions, let us know by commenting on this post!

 

Picture1.png

 

Teams Room devices can be enrolled and managed by Intune to provide many of the device management and security capabilities available to other endpoints managed by Intune. Because these devices run Windows 10 under the hood, several of the Windows 10 features will be available to use, but many are not applicable or recommended.

 

In break this post, we'll discuss recommendations for these Intune feature areas:

  • Enrollment
  • Windows 10 configuration profiles
  • Compliance policies
  • Conditional Access
  • Grouping and targeting

 

Enrollment

Recommendation: Use an Intune DEM account to Azure Active Directory (Azure AD)-join the device from Windows Settings.

 

Windows 10 based Teams devices arrive from suppliers prepared with an OS image, user accounts, and pre-configured profiles. For a smooth, automatic MDM enrollment, sign in to the device with the admin profile and perform the Azure AD join from the Settings menu. We recommend you use an Intune device enrollment manager (DEM) account specifically because Teams Room devices are shared and DEM accounts are more practical for managing shared-device scenarios. Learn more about DEM accounts here.

 

The Teams Rooms resource account can be used for Intune enrollment, but it should not be used for Windows 10 sign-in on the device because it can cause issues during automatic sign-in of the Microsoft Teams Room application account. Please use a tenant or device admin account to administer local device settings.

 

An additional tip is to name Teams Room devices with a prefix that allows devices to be grouped dynamically. For example, use “MTR” for meeting room. You can rename devices with either a Windows 10 configuration policy or manually per device in Intune. We’ll talk about this approach a bit more below, under Grouping and Targeting.

 

Depending on your current scenario, there are several other enrollment options available:

  • Use Windows Configuration Designer to create a Windows 10 provisioning package that performs a bulk Azure AD Join. Details are here.
  • Customers who have some devices domain joined and/or managed by Configuration Manager may choose to enable co-management or initiate an Intune enrollment via the Enable automatic MDM enrollment using default Azure AD credentials Group Policy setting.

 

For more details about available enrollment methods, see Intune enrollment methods for Windows devices.

 

Windows 10 Configuration Profiles

Recommendation: Use Windows configuration profiles to configure device settings that you need to change beyond the shipped defaults.

 

The following Windows 10 Configuration Policy types may be used with Windows 10 based meeting room devices:

 

Profile type

Can you use the profile?

Administrative Templates

Yes

Certificates

Yes

Delivery Optimization

Yes

Device Firmware Configuration Interface

Check for supported hardware here

Device restrictions

Yes

Edition Upgrade

Not supported

Email

Not recommended

Endpoint Protection

Yes

eSim

Not supported

Identity Protection

Not supported

Kiosk

Not supported

PowerShell Scripts

Yes (Devices must be Azure AD joined or hybrid Azure AD joined)

Security baselines

Not supported

Shared multi-user device

Not supported

VPN

Not recommended

Wi-Fi

Not recommended

Windows Information Protection

Not recommended

 

NOTE: “Not recommended” in the table means that the Windows 10 policy type is not a good fit for Teams Room scenarios. For example, Team Room devices are not enabled for Wi-Fi, therefore it’s not recommended (or necessary) to configure a Wi-Fi profile. Learn more about available configuration policies here: Create a device profile in Microsoft Intune.

 

Compliance policies
Recommendation: Use compliance policies to achieve the desired security level for your Teams devices.


You can use compliance policies on your Teams Room devices. Make sure to create the appropriate exclusions for any existing Windows 10 compliance policies that are currently deployed in your organization to All devices.  For example, you may have configured the setting Maximum minutes of inactivity before password is required in a policy for all Windows 10 desktop devices but this would result in a poor meeting room experience if applied to Teams Room devices. If you currently have Windows 10 compliance policies deployed to large groups of devices, make sure you use the Exclude group feature so that you can target a more specific compliance policy for the Teams Room devices.


For detailed guidance, see Use compliance policies to set rules for devices you manage with Intune.

 

Conditional Access

Conditional Access policies with only location-based conditions can be applied to Microsoft Teams Rooms accounts at this time.  Microsoft is currently working on updates that will allow additional conditions to be set, such as device compliance.

 

Grouping and Targeting

It’s helpful to use Azure AD dynamic groups to effectively group all Teams Room devices. To help implement this more easily, use a naming standard during deployment/enrollment. For example, as mentioned earlier in this article, if you want to prefix all device names with “MTR," you can use “MTR-%SER%” to name your devices, which will append the device serial number to the prefix. Then you can use the dynamic group feature to group together all devices that start with MTR. Keep in mind, Azure AD dynamic groups is an Azure AD P1 feature.

 

Picture2.png

NOTE: Device renaming via Intune device management is supported on Azure AD-joined devices but not hybrid Azure AD-joined devices.

 

When targeting configuration profiles, compliance policies, and apps it’s a good idea to target a group that contains devices rather than users. The reason for device-group assignment is that Teams Room devices sign in to Windows with a local user account (instead of an Azure AD user account) and during sync with Intune, would not request any user-assigned policy.

 

More info and feedback

As always, we want to hear from you! If you have any suggestions, questions, or comments, please comment below. You can also tag @IntuneSuppTeam on Twitter.

 

Blog post updates:

  • 1/21/2022: Updated Windows 10 configuration profile table to show that security baselines are not supported, removed requirement for Azure AD Premium (now included), additional minor edits.
  • 1/27/2021: Updated the More info and feedback section.
  • 4/20/2020: Updated the post to include an enrollment best practice: " The Teams Rooms resource account can be used for Intune enrollment, but it should not be used for Windows 10 sign-in on the device because it can cause issues during automatic sign-in of the Microsoft Teams Room application account. Please use a tenant or device admin account to administer local device settings.
  • 3/6/2020: Updated the post to clarify what works with Conditional Access and Microsoft Teams Rooms. Removed mention of device compliance checks for CA; that feature is coming.
77 Comments
Copper Contributor

@PLJ_HolisticIT did you have an direct access in the internet? we had so much problems with the proxy. SSL inspection, Proxy trought IE settings and proxy on the host system....

Microsoft

The link that is in the following sentence is broken: -"Use Windows Configuration Designer to create a Windows 10 Provisioning Package that performs a bulk Azure AD Join. Details are"

Thank for the feedback @yayoayala. Link fixed!

Brass Contributor

Can we get a similar kind of document for managing Surface Hub devices using Intune?

Thanks for the feedback @Frank Rijt-van! We have a couple of resources available in our docs. Please see: Manage Microsoft Surface Hub - Surface Hub and Manage Microsoft Teams configuration on Surface Hub - Microsoft Teams to learn more. Hope this helps!

Brass Contributor

@marcchampoux thanks for the analysis and how to troubleshoot the issue. It was very useful in my situations!

Copper Contributor

Thanks for the article, question here: we are using DEM account as recommended to enroll MTR devices, but we have encountered a limit to continue the enrollment mandated by Azure AD config “Maximum number of devices per user”, we have 250+ rooms but we don’t want to raise it to unlimited, we want certain control over how many devices can be registered, is there another way to still use DEM bypassing the 100 limitation and not changing to unlimited tenant wide? (If you ask me DEM accounts should NOT be limited by this setting)

Copper Contributor

Is there any news about the properties exposed for AAD Device Dynamic groups?

I plan to manage many Teams Room Devices (Win10, Android and SurfaceHub) with Intune and I would like to dynamic group them.

Thanks!

Copper Contributor

@FrancescoFacco so u can use the Device Name, and Re-Name your devices befor or after joining. 

Brass Contributor

I find this statement a bit strange: "The additional recommendation to use an Intune Device Enrollment Manager (DEM) account is due to these meeting room devices being a shared device rather than one that has User-Device association in Intune". These devices use a typically a Microsoft Room Account which comes with an Intune license, so why not leverage the roomaccount itself for registering the device in Intune as recommendation instead of a DEM account?

Copper Contributor

@Frank Rijt-van My two cents for using DEM, the resource account is recommended to have a non-expiration password policy, with DEM you can have an expiration policy defined resulting in a more secure configuration. One drawback of using DEM I have encountered is the Azure AD max # of devices per user limitation (in my opinion that should not affect DEM accounts because it undermines its purpose) it requires you to increase or changing it to unlimited only for this reason... or create several DEM accounts creating an unnecessary management overhead

Copper Contributor

Hi @Scott Duffey 
I have two questions for the MSToW Intune management:
a) Is there a special reason why Security baseline is official not supported - sure there are some settings which doesn't make sense for an MTRoW (Device Lock, Lock Screen, etc.) and should be reconfigured

b) Currently I don't see any possibility to use the device compliance status as an additional factor to secure the M365 with Conditional Access Rules - I suspect this is based on the local Skype account. Are they any plan/possibilities to use device state in Conditional Access Rules?
Thanks Simon

Hi @Simon Benz, thanks for the feedback! Though we don't have any details to currently share around Security Baseline support for MTR, stay tuned to: Microsoft Teams Blog - Microsoft Tech Community & What's new in Microsoft Intune | Microsoft Docs to stay up to date on new features coming to. Support has been released in the application to support Device Compliance based Conditional Access for Exchange and Teams sign-in for MTR on Windows devices, and we’d like to know more about your scenario. Be on the lookout for an incoming message to talk though your scenario. Thanks!

Copper Contributor

Hi @Intune_Support_Team  and @Scott Duffey  


I have seen that cazawideh has last week published two great docs articles regarding Intune compliance and MTR:

https://docs.microsoft.com/en-us/microsoftteams/rooms/conditional-access-and-compliance-for-devices

https://docs.microsoft.com/en-us/microsoftteams/rooms/supported-ca-and-compliance-policies?tabs=mtr-...

 

I believe the setup doesn't work for me as my DefaultUserName for AutoAdminLogon is "local\Skype". In the best practice article, the example policy mentioned "3. The resource account must be signing in on the Windows device platform". If there is no misunderstanding from my side, the normal design is always that the account which logs in to Windows is always the local Skype account. Can you please clarify this point?

My setup:

- Windows 10 Enterprise 20H2 (19042.1526)
- MTR app version 4.11.12.0
- Azure AD joined and Intune managed device (compliant)
- HP Elite Slice G2
- Local Skype account for AutoLogin
- Pure Online Resource Account licensed with Microsoft Teams Rooms Standard
- Supported meeting mode Microsoft Teams only with Modern Authentication enabled

 

My issue:

- If the resource account is authenticated against Azure AD the Sing-in logs "User sing-ins (non interactive)" shows under Device info only the Browser and operating system information, the Device id is empty and Compliant state is no


My test:

- Log in with the Azure AD resource account in Windows an start the Microsoft Teams Room app manually -> Sign-In request consider device information and Conditional Access Policy grant the access based on compliant device state

 

Thank you

Simon

Hi @Simon Benz, thanks for the feedback. We've followed up with you over a private message to talk though your scenario.

Brass Contributor

@Intune_Support_Team  I have enrolled the devices according to your tutorial, everything works except WIN32 App Deployment. The Apps are stuck was "Waiting for Install Status" the Support Engineers for "Intune Enterprise" are unable to help and say that "Windows 10 IOT is not supported by Intune"

 

Whats going on?

[Case #:30419623] Win32 Apps not deploying to Win10 IOT Meeting Rookm PCs

Copper Contributor

@Intune_Support_Team Does an MTR device also support the Windows Autopilot self-deploying mode (Public Preview) | Microsoft Docs instead of a DEM account?

Copper Contributor

Hello,

Is there any documentation describing the MTR configuration using XML file though Intune ?

Thanks !

Copper Contributor

Hi @Simon Benz @Intune_Support_Team

 

we have the same setup and challenge with the Conditional Access Policy.

When we use the local Account, we have no device information and no device compliance information.

 

Could you please share if and how you solved the problem?

 

Thanks and regards,

Christian

@maximilianforst - MTR does not support Autopilot at all today. I typically use provision packages : 
Enrolling Microsoft Teams Rooms on Windows devices with Microsoft Endpoint Manager - Microsoft Commu...


Copper Contributor

Hi @Christian_Hoerbe 

It is still an open point on our side, we have still some devices which are not migrated to Intune.
It's our plan to come back on this topic as soon as the migration is completed.

 

But I see as well that we still miss the device information in the sign-in logs.
Simon

 

Copper Contributor

Hi @Simon Benz thanks for your response.

It seems like that feature is already in GA: https://www.microsoft.com/de-de/microsoft-365/roadmap?filters=Microsoft%20Teams&searchterms=%2C89068

 

We opened a ticket to investigate on this.

All prerequisites have been fulfilled but we still don't see any device information.

I'll keep you posted.

 

Thanks

Christian

Hi @Christian_Hoerbe, sorry to hear you are running into issues. If you could DM us the support request number, we can certainly have a look, and ensure a resolution can be obtained. Thanks!

Brass Contributor

My experience is that the device must be AAD Joined i.e. not AAD registered, for compliance to work (Hybrid joined should in theory also work).
That means selecting "Join this device to Azure Active Directory" in the "Connect to" wizard.

Further, the device should be fully patched, specifically KB5020030 or newer applied.

Compliance works with the older "Standard" rooms license (as it should since AAD P1 is included).
Aengus

Copper Contributor

Is the list with supported Configurations Profile types still up to date?

Brass Contributor

Hi all, 

 

What are the recommendations about inrolling MTR devices in Intune? 
Is it recommended or not absolutely necessary? 

Because it works without enrollment in Intune.

Copper Contributor

Can someone suggest on how we can manage the process of "Deletion of Teams Meeting Room Accounts"?

- What will be the impact on EndUsers who already have schdeuled their Meeting post deletion?

- What is the best way of handling these Account Deletion process, with little or no impact on User's convenience!

 

 

Version history
Last update:
‎Nov 30 2023 04:15 PM
Updated by: