Microsoft Intune, along with Microsoft Entra ID, facilitates a safe, streamlined course of for registering and enrolling gadgets that need entry to your inside sources. As soon as customers and gadgets are registered inside your Microsoft Entra ID (additionally known as a tenant), then you possibly can make the most of Intune for its endpoint administration capabilities. The method that allows machine administration for a tool is named machine enrollment.
A profitable Microsoft Intune deployment or migration begins with planning. This information helps you propose your transfer or adoption of Intune as your unified endpoint administration resolution.
Overview
Throughout enrollment, Intune installs a Cell System Administration (MDM) certificates on the enrolling machine. The MDM certificates communicates with the Intune service, and permits Intune to begin imposing your group’s insurance policies, like:
- Enrollment insurance policies that restrict the quantity or kind of gadgets somebody can enroll.
- Compliance insurance policies that assist customers and gadgets meet your guidelines.
- Configuration profiles that configure work-appropriate options and settings on gadgets.
Usually, insurance policies are deployed throughout enrollment. Some teams, relying on their roles in your group, can require stricter insurance policies than others. Many organizations begin by making a baseline of required insurance policies for customers and gadgets. Then, add to this baseline as wanted for various teams and use circumstances.
Minimal really helpful baseline insurance policies:
- Step 1 – Arrange Intune subscription
- Step 2 – Add, configure, and defend apps
- Step 3 – Create compliance insurance policies
- Step 4 – Configure machine options and safety settings
- Step 5 – Enroll gadgets
Step 1 – Arrange Intune subscription
Step 2 – Add, configure, and defend apps
Managing functions on gadgets in your group is a central half to a safe and productive enterprise ecosystem. You should use Microsoft Intune to handle the apps that your organization’s workforce makes use of. By managing apps, you assist management which apps your organization makes use of, in addition to the configuration and safety of the apps. This performance is named cellular utility administration (MAM). MAM in Intune is designed to guard group knowledge on the utility stage, together with customized apps and retailer apps. App administration can be utilized on organization-owned gadgets and private gadgets. When it’s used with private gadgets, solely organization-related entry and knowledge is managed. The sort of app administration is named MAM with out enrollment, or from an end-user perspective, carry your individual machine (BYOD).
Step 3 – Plan for compliance insurance policies
Subsequent, plan for and configure machine compliance settings and insurance policies to assist defend organizational knowledge by requiring gadgets to fulfill necessities that you just set.
You deploy compliance insurance policies to teams of gadgets or customers. When deployed to customers, any machine the person indicators into should then meet the insurance policies necessities. Some widespread examples of compliance necessities embody:
- Requiring a minimal working system model.
- Use of a password or PIN that meets sure complexity and size necessities.
- A tool being at or beneath a menace stage as decided by cellular menace protection software program you employ. Cell menace protection software program contains Microsoft Defender for Endpoint or one in every of Intune’s different supported companions.
Step 4 – Configure machine options and settings to safe gadgets and entry sources
On this step, you’re able to configure a minimal or baseline set of safety and machine options that every one gadgets will need to have.
Step 5 – Enroll gadgets in Microsoft Intune
Within the last part of deployment, gadgets are registered or joined in Microsoft Entra ID, enrolled in Microsoft Intune, and checked for compliance.
Throughout enrollment, Microsoft Intune installs a cellular machine administration (MDM) certificates on the machine, which permits Intune to implement enrollment profiles, enrollment restrictions, and the insurance policies and profiles you created earlier on this information.
If gadgets are at present enrolled in one other MDM supplier, unenroll the gadgets from the prevailing MDM supplier earlier than enrolling them in Intune. The next desk reveals the gadgets that require a manufacturing facility reset earlier than enrolling in Intune.
Computerized Enrollment
Configure Home windows gadgets to enroll once they be a part of or register with Azure Lively Listing.
Make enrollment in Intune simpler for workers and college students by enabling automated enrollment for Home windows. For extra data, see Allow automated enrollment.
-
Microsoft Entra be a part of with automated enrollment: This feature is supported on gadgets which are procured by you or the machine person for work use. Enrollment happens throughout the out-of-box-experience, after the person indicators in with their work account and joins Microsoft Entra ID or by selecting to hitch the machine in Microsoft Entra ID when connecting a piece or college account from the Settings app (as described in Home windows machine enrollment information – Finish person duties). This resolution is for once you don’t have entry to the machine, similar to in distant work environments. When these gadgets enroll, their machine possession modifications to corporate-owned and also you get entry to administration options that aren’t accessible on gadgets marked as personal-owned.
-
Home windows Autopilot user-driven or self-deploying mode: Computerized enrollment is supported with the Home windows Autopilot user-driven (for each the Microsoft Entra hybrid be a part of and Microsoft Entra be a part of eventualities) or self-deploying (Microsoft Entra be a part of solely) profiles and can be utilized for corporate-owned desktops, laptops, and kiosks. System customers get desktop entry after required software program and insurance policies are put in. A Microsoft Entra ID P1 or P2 license is required. We advocate utilizing solely Microsoft Entra be a part of, which offers the most effective person expertise and is less complicated to configure. In eventualities the place on-premises Lively Listing remains to be wanted, Microsoft Entra hybrid be a part of can be utilized however it’s a must to set up the Intune connector for Lively Listing, and your gadgets should be capable of hook up with a website controller through both an on-premises community or VPN connection.
-
Co-management with Configuration Supervisor: Co-management is greatest for environments that already handle gadgets with Configuration Supervisor, and wish to combine Microsoft Intune workloads. Co-management is the act of shifting workloads from Configuration Supervisor to Intune and telling the Home windows shopper who the administration authority is for that specific workload. For instance, you possibly can handle gadgets with compliance insurance policies and machine configuration workloads in Intune, and make the most of Configuration Supervisor for all different options, like app deployment and safety insurance policies.
-
Enrollment utilizing Group Coverage: A Group Coverage can be utilized to set off the automated enrollment of Microsoft Entra hybrid joined gadgets with none person interplay. The enrollment course of begins within the background (through a scheduled process) after a Microsoft Entra ID-synced person indicators in on the machine. We advocate this methodology in environments the place gadgets are Microsoft Entra hybrid joined and never managed utilizing Configuration Supervisor.
Onboard A Home windows System into InTune
1 Settings – Entry work or college
Be a part of this machine to Microsoft Entra ID
2 Login along with your Entra ID
Ensure that that is your group then be a part of:
As soon as performed, you’re going to get a message to ask you turn account:
3 Change Account to log in
Change person
4 Onboard Account
Movies
References
$AzureAdCred = Get-Credential
Join-AzureAD -Credential $AzureAdCred
[netsec@centos1docker hihttps]$ netstat -lntp | grep 80
(No data may very well be learn for "-p": geteuid()=1000 however you need to be root.)
tcp 0 0 0.0.0.0:80 0.0.0.0:* LISTEN -
[netsec@centos1docker hihttps]$
root@4ccb3643b7e4:/#
cat /and so forth/nginx/conf.d/wp.conf
server {
hear 80;
server_name opc2armwp.51sec.eu.org 51sec.org www.51sec.org;
}
#/bin/bash
set_chinese_lang
apt-get autoremove -y
echo “Set up Achieved!”
echo “Now you possibly can reboot and join port 3389 with rdp shopper”
echo “Notice: chromium-browser is just not displayed on the desktop, please begin it manually if crucial”
echo “Default Username: rdpuser”
echo “Default Password: rdpuser_password”