User Profile
NielsScheffers
Iron Contributor
Joined 4 years ago
User Widgets
Recent Discussions
Re: Device marked as not compliant even it should be marked as compliant
Hi preuley30! First and foremost: KurtBMayer's solution is obviously the correct solution. I do want to point out that assigning a "Windows" compliance policy to a user (like MrNeo mentions) is absolutely valid. In fact, I'd prefer it that way. A user (and its assigned privileges) mandates a certain level of device security, on any (in this case Windows) device they use. Now, that isn't always possible, so I'm not saying that assigning them to devices is bad practice, either. I'd just only use it for special circumstances.13KViews0likes1CommentRe: DLP
Hi sanjay_senapati95! Let's see if we can put you on the right track here. Let's start with your point b): to restrict access to OneDrive (and other cloud apps, like Exchange Online, for that matter) you will need to employ https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/. That looks like it's user-based, but don't be fooled. The https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/concept-condition-filters-for-devices option is immensely powerful and will let you include (or exclude) the policy based on device properties (including device ownership). Now, I don't really understand what you mean with point a). Could you elaborate?1.2KViews0likes1CommentRe: Exclude some Android devices from Intune
Hi TompaB! Am I right to assume what you're really looking for is to deny access to Teams for unmanaged (i.e. not Intune-enrolled) Android devices? If so, you will need to apply Conditional Access. For instance, a policy like below: Users or workload identities: include "All users", or select a group that suits your needs. Make sure you don't lock yourself out by accident, so exclude your admin account while testing. Cloud apps or actions: include "Microsoft Teams", or all Office 365 apps if you want to deny access to things like Exchange Online as well. Conditions: Device platforms: select "Yes" to enable this, and then include "Android". Client apps: select "Yes" to enable this, and then include all client apps, assuming you want to block access in browsers and such as well. Filter for devices: select "Yes" to enable this, and then use a filter to exclude managed devices, like "(device.mdmAppId -in ["0000000a-0000-0000-c000-000000000000"])". This is the most important bit as this is where we make sure that devices managed by Intune (which is what that mdmAppID GUID means) will be excluded from this policy. See also: https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/concept-condition-filters-for-devices. Grant: select "Block access". Now, to complete your configuration, you may want to explicitly configure a minimal OS-version required for Intune enrollment (and not depend on it not being available). To do this, take a look under Devices > Enroll devices > Enrollment device platform restrictions. You can either change the base, catch-all "Default" policy, or create a new one with a higher priority. Please note, this will still require the Conditional Access policy above to block access to cloud apps, like Teams. Finally, I'd like to add that keeping these Android 4.4 devices in your environment (even though you are blocking them like above) expands your attack surface. It's better to get rid of them completely, if at all possible.5.3KViews0likes2CommentsRe: Intune Android app - Location permission
I assume you're pushing out a WiFi profile? Android Enterprise then requests the "Location" permission as the information exposed by this API could be used to determine an approximate location for the device. Please note that the "Use precise location" item is left unchecked, meaning a GPS-location is not part of the request.17KViews0likes24CommentsRe: How to block certain apps in intune?
Hi BUBCEN! You're resurrecting a four-year-old thread here. More importantly: I don't think any of the answers here are aimed towards blacklisting (as in preventing the use and/or installation of) apps. The "Conditional Access" route mainly allows you to determine which apps are allowed to connect to a web service (like Exchange Online). If you really want to prevent the use (and, once again, installation) of certain apps, you'll want to have a look at Application Control/AppLocker. I recommend this post by Rudy_Ooms_MVP: https://call4cloud.nl/2021/06/wdac-or-the-unexpected-virtue-of-ignorance/.13KViews0likes1CommentRe: Autopilot Windows 11 (Host Process for Windows Services) constantly notification
Maybe you can use "ProcessTokenElevation" in the "DeviceProcessEvents" table to find processes with elevation, but I doubt that'll give you an answer. Isn't it easier to just exclude the device/user from the app and test if the UAC-prompt disappears?6.7KViews1like2CommentsRe: Disk Encryption
Hi ElieAT! My answer would be: it depends. That's not very helpful, though :). In my opinion, disk encryption is a configuration that is tied to a device, so I would assign it to a device. Should you, however, have a use case where this configuration should apply to any (enrolled) device the user logs on to: assign it to users. I just really can't think of any reason you'd want that.1.7KViews0likes3CommentsRe: Change MDM Authority from MDE to MEM
Hi jrfre! I have to admit, I haven't actually done this yest myself. But let's walk through the theory first. MDE offboarding is instant, you don't have to wait 7 days. That's just how long the Defender portal will allow an endpoint to stop sending telemetry before marking it 'inactive'. The MDE agent simply detaches itself from the tenant. If you then enroll it in Intune, the MDM channel should be switched over. Assuming you've configured something to onboard the endpoint in MDE again in Intune, so that'll be restored as well. I'd be happy to test it out for you, but am not in a position to do that before monday. Let me know if you need any more help!8.3KViews0likes1CommentRe: Intune enterprise wi-fi profile for windows - clients stuck on pending
Hi RahamimL! Some questions: Did all (related) certificates deploy correctly? Can you manually connect to the network with the same configuration? Is anything of interest logged in Applications and Services Logs > Microsoft > Windows > DeviceManagement-Enterprise-Diagnostic-Provider?7.4KViews0likes1CommentRe: Can't restore access to USB storage device
Hi perty1976! Unfortunately, like you've noticed, this configuration is tattooed on the device (it's not removed when unassigned, it just isn't enforced anymore). When you say you already "changed the registry value", did you do it manually or via OMA-URI (./Device/Vendor/MSFT/Policy/Config/System/AllowStorageCard = (integer) 1)? The latter should work. It requires a restart, though.6.2KViews0likes6CommentsRe: Forms for Private App on Google Play Console
Hi AdamA85! You can use https://docs.microsoft.com/en-us/mem/intune/apps/app-configuration-policies-use-android#preconfigure-the-permissions-grant-state-for-apps for auto-granting permissions. It's only available for https://docs.microsoft.com/en-us/mem/intune/apps/app-configuration-policies-overview#apps-that-support-app-configuration as they have to support this capability. Is that what you were looking for?906Views0likes0CommentsRe: Intune Integration with another API
Hi DeoEstrada! I'm sure you can do this with some Azure Automation magic and a custom (Graph-based) connector. Take a look at these posts: https://www.petervanderwoude.nl/post/using-a-custom-connector-for-device-management-actions-in-microsoft-intune/ https://www.systanddeploy.com/2022/08/automatically-sending-teams.html They don't meet your needs but it'll give you an idea of what's possible.2.9KViews1like1CommentRe: Hybrid Azure AD joined Devices WITHOUT Intune show up as Non Compliant
Hi ErikVet! As your Azure AD shows these devices as "MDM: None", we would indeed expect "Compliant: N/A". Were these devices ever enrolled in Intune (accidentally, or for testing)? If so, check if there's a "Manage" button in the Azure AD device page. If there is, there's will be a Managed Device object (Intune) linked to the Azure AD Device object, which is probably marked non-compliant.16KViews0likes1CommentRe: Device Status when enrolled - Error
No disrespect intended, but I think you should take a couple of steps back and reconsider your design options here. It kind of sounds like your management thinks hybrid-joining is a stop-over in a migration trajectory. That's not true: it's a solution for very specific use cases (and it can be a tricky thing to operate). Anyway, addressing your first question: AADConnect and the Intune Connector are separate installs because they serve two distinctly different purposes. They don't even belong to the same solution. Azure AD Connect is part of Azure AD. It is what enables you to create a relation between your on-prem AD and Azure AD. There's a lot of stuff involved here (like you authentication flow and such) so take your time and do it right. It is also https://docs.microsoft.com/en-us/azure/active-directory/devices/howto-hybrid-azure-ad-join#prerequisites for hybrid-join, as it lays the ground-work for all this hybrid identity stuff. So, this would be the first thing you need to set up. The Intune Connector for AD is part of the Intune (MEM) solution. It makes sure Intune can coordinate the (offline) domain-join (to your on-prem AD) for your devices. You can only get this working after connecting your on-prem AD to Azure AD. Before we go any further into this, start by setting up your hybrid AD. All the other things are irrelevant until you've got that up and running.2.2KViews0likes1CommentRe: Setup School PC user rights problem
You are aware that only disabling Windows Installer (msiexec) doesn't block all installation options? If you're looking to prevent any software from being installed, your best bet would be something like https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/wdac-and-applocker-overview. To address your specific question: is anything logged to your DeviceManagement-Enterprise-Diagnostics-Provider event log?1.6KViews0likes2CommentsRe: Device Status when enrolled - Error
AADConnect will not affect your existing, on-prem devices (unless you tell it to do so ). Are you sure you need to hybrid join, though? I would suggest you simply try to work with AAD joined devices, and only start looking into hybrid joining if you really need to.2.2KViews0likes3CommentsRe: Device Status when enrolled - Error
oryxway, there's a lot that may be going awry here. Your screenshots show issues with hybrid join and app deployment. Assuming you're trying to hybrid join here (as that's what that configuration profile is for), may we also assume you've set up hybrid join in your AAD following these docs? https://docs.microsoft.com/en-us/azure/active-directory/devices/howto-hybrid-azure-ad-join Assuming this screenshot shows the device status for the "Domain Join" profile. Can you see any details else when you click on the error row? This screenshot seems to show app installations. That's completely unrelated, in my opinion, but it does make me suspect there's some other things that may be misconfigured. . I suggest you troubleshoot things one step at a time, making sure each element works before moving adding the next.2.3KViews0likes5CommentsRe: User Assignment Autopilot Issue
Unfortunately, there's no way this will work with ADFS. The only ADFS authentication method available in OOBE is form-based, which means it simply shows the authentication page hosted by your ADFS-platform. As Autopilot has no control over your ADFS-platform, it can't be personalized with this option.1KViews0likes1CommentRe: Intune with Autopilot, Kiosk Mode and device only licenses
I think your looking to https://docs.microsoft.com/en-us/mem/autopilot/add-devices (with the hardware hash)? That, indeed, needs to be done first to 'link' your device(s) to your tenant. Without it, Windows has no way of knowing that it needs to get an Autopilot profile from your tenant.8.1KViews0likes0Comments
Recent Blog Articles
No content to show