1. Home
  2. Beginner Courses
  3. Deploy Intune 101
  4. Deploy Intune 101 – For Beginners – Part 2πŸ“±πŸ’»

Deploy Intune 101 – For Beginners – Part 2πŸ“±πŸ’»


The information on this course is provided β€˜AS IS’ with no warranties and confers no rights. This course does not represent the views of my employer. All content on this site is solely my own personal views and recommendations.


Introduction

In this free training course, you will learn how to configure and deploy Intune (Endpoint Manager) as a stand-alone UEM solution. This article will teach you steps to enable Intune (Endpoint Manager) to a state where the solution is ready to onboard mobile devices.
 
For your convenience, this free training course has been slip into two parts. This blog article is Part 2. Make sure to read and follow Part 1 first before continuing here.

Guide

This guide is presented in both video and written format to provide maximum learning potential. We recommend watching each follow-along video with the written guide to hand, as a secondary aid.


Episode 5 – Device Categories & Azure AD Groups

Create Device Categories

Sign in to your Endpoint Manager portal by browsing to https://endpoint.microsoft.com

From the home dashboard, navigate to Devices > Device Categories.

Select the ‘Create Device Category’ button.

Set a Name and Description.
**Example**
Name: Marketing
Description: Device category for Marketing devices

Select ‘Next’ and keep the default Scope Tag selected.

Select ‘Next’ and the ‘Create.

You will see Marketing device category appear in the list ready for use.

Create an Azure AD Dynamic Group

Sign in to your Azure portal by browsing to https://portal.azure.com

From the home dashboard, select ‘Azure Active Directory’.

From the left side menu, select ‘Groups’.

Select the ‘New Group’ button.

Complete the required information:

**Example**
Group Type: Security
Group Name: Marketing Devices
Group Description: Group for Marketing devices.
Azure AD roles can be assigned to the group: No
Membership Type: Dynamic Device
Owners: No

Select ‘Add Dynamic Query’

Within the query builder, we configure the query values as below:

Property: deviceCategory
Operator: Equals
Value: Marketing (Friendly name given to your device category in Endpoint Manager)

Clicking away from the query builder, we can see Azure AD automatically translates your configuration values into a Rule Syntax.

The Rule Syntax should look identical to this: (exception of the value between quotation marks is unique to your device category friendly name)

(device.deviceCategory -eq “Your_Device_Category_Name”)

Select the ‘Save’ button to save the dynamic query.

Select the ‘Create’ button to build the Azure AD dynamic group.

Once created, you will see Marketing Devices Azure AD dynamic group appear in the list ready for use.

See in Action

During enrolment to Endpoint Manager, Company Portal app will request the user select a device category from the list provided.

In this example, the Marketing device category is selected in order to demonstrate an Azure AD dynamic group at work.

Once enrolment has been completed, the Azure AD dynamic group triggers an evaluation of the tenant against criteria set in the dynamic rule syntax. If the evaluation finds a device matching the criteria, that device is automatically added as a member of the group.

We can see our iPhone is now a member of the Marketing Devices group.

Episode 6 – iOS Compliance Policy, iOS Configuration Profile & Email Profile

Create an iOS Compliance Policy

Note – Compliance requires users and devices to meet criteria set by an organisation. Rules and settings are defined which Endpoint Manager compliance engine will assess users and against to determine their respective compliance status. Compliance does not configure the device.

Sign in to your Endpoint Manager portal by browsing to https://endpoint.microsoft.com
From the home dashboard, navigate to Devices > Compliance Policies.

Select the ‘Create Policy’ button.

Select ‘iOS/iPadOS’ as the platform and then select ‘Create’.

Set a Name and Description.
**Example**
Name: iOS – Compliance Policy
Description: Compliance policy for iOS devices.

Select ‘Next’

For the purposes of this training course, the following example baseline compliance settings will be set:
**Example**
Email

  • Unable to set up email on the device: Require

Device Health

  • Jailbroken devices: Block
  • Require the device to be at or under the Device Threat Level: Not Configured

Device Properties

  • Minimum OS version: 13.0
  • Microsoft Defender for Endpoint: Not Configured

System Security

  • Require a password to unlock mobile devices: Require
  • Simple passwords: Block

Minimum password length: 6

  • Required password type: Numeric
  • Number of non-alphanumeric characters in password: 1
  • Maximum minutes after screen lock before the password is required: Immediately
  • Maximum minutes of inactivity until screen locks: 5 minutes

Select ‘Next’.
Actions for noncompliance will remain unchanged.

Select ‘Next’.

Under Assignments, select ‘Add Groups’.

In this example, the ‘Corporate Devices’ group will be selected.

Select ‘Select’ to add your Azure AD Group.

Select ‘Next’ and then ‘Create’.

Once created, you will see the compliance policy appear in the list ready for use.

See in Action

Device compliance status can be validated on the device by the user. Observing our enrolled device with Company Portal app, we can see the status says “Can access company resources”.

Within the Endpoint Manager portal, we can validate the compliance status of a device by navigating to Devices > All Devices.

Observing the device in question, we can see the compliance column indicates the device is compliant.

Selecting the device entry, under Device Compliance on the left side menu, we can see the compliance policy we created successfully assessed the device.

Create an iOS Configuration Profile

Note – Apple iOS/iPadOS supervised mode gives administrators more options when managing Apple devices, making it useful for corporate-owned devices deployed at scale. For example, you can restrict AirDrop or prevent users from changing the name of the device. For a list of settings that require supervised mode, see iOS device restriction settings in Intune.

From the home dashboard, navigate to Devices > Configuration Profiles.

Select the ‘Create Profile’ button.

Select ‘iOS/iPadOS’ as the platform.

Select ‘Device Restrictions’ as the Profile Type and then select ‘Create’.

Set a Name and Description.
**Example**
Name: iOS – Device Restrictions Profile
Description: Device Restrictions profile for iOS devices.

Select ‘Next’

For the purposes of this training course, the following example baseline configuration profile settings will be tailored to an Unsupervised device:
**Example**
App Store, Doc Viewing, Gaming

  • Treat AirDrop as an unmanaged destination: Yes

Cloud and Storage

  • Force encrypted backup: Yes

Password

  • Require password: Yes
  • Block simple passwords: Yes
  • Required password type: Numeric
  • Number of non-alphanumeric characters in password: 1
  • Minimum password length: 6
  • Maximum minutes after screen lock before the password is required: Immediately
  • Maximum minutes of inactivity until screen locks: 5 minutes

Show or Hide Apps

  • Type of apps list: Hidden apps
  • Apps list: (Microsoft kindly provide a list of known Apple native app bundle ID’s)
    • App bundle ID: com.apple.gamecenter
    • App Name: Game Center

Wireless

  • Block data roaming: Yes

Select ‘Next’.

Under Assignments, select ‘Add Groups’.

In this example, the ‘Corporate Devices’ group will be selected.

Select ‘Select’ to add your Azure AD Group.

Select ‘Next’ and then ‘Create’.

Once created, you will see the configuration profile appear in the list ready for use.

See in Action

Installed configuration can be validated on the device by the user. Observing our enrolled device with the setting app, under General > Device Management > Management Profile, we can see “2 Restrictions” and “Password Policy” listed in the Contains list.

Selecting Restrictions, we can further validate device restriction settings match the Endpoint Manager deployed configuration profile we created.

Drilling down into more detail by selecting the password policy, again, we can validate the password policy being enforced on the device matches the Endpoint Manager deployed configuration profile.

Within the Endpoint Manager portal, we can validate the configuration profile has been successfully installed on the device by navigating to Devices > All Devices.

Selecting the device entry, under Device Configuration on the left side menu, we can see the configuration profile we created successfully installed.

Create an iOS Email Profile

Note – The email profile uses the native or built-in email app on the device, and allows users to connect to their work email. This profile will not apply settings for Outlook mobile app.

From the home dashboard, navigate to Devices > Configuration Profiles.

Select the ‘Create Profile’ button.

Select ‘iOS/iPadOS’ as the platform.

Select ‘Email’ as the Profile Type and then select ‘Create’.

Set a Name and Description.
**Example**
Name: iOS – Email Profile
Description: Email profile for iOS devices.

Select ‘Next’

For the purposes of this training course, the following example email profile settings will be set:
**Example**
Exchange ActiveSync account settings

  • Email server: outlook.office365.com
  • Account name: Work Email
  • Username attribute from AAD: User Principal Name
  • Email address attribute from AAD: Primary SMTP Address
  • Authentication method: Username and password
  • SSL: Enable

Exchange ActiveSync profile configuration

  • Exchange data to sync: All data

Select ‘Next’.

Under Assignments, select ‘Add Groups’.

In this example, the ‘Corporate Devices’ group will be selected.

Select ‘Select’ to add your Azure AD Group.

Select ‘Next’ and then ‘Create’.

Once created, you will see the email profile appear in the list ready for use.

See in Action

Note – Device prompts and their wording may change and present slightly different between iOS versions.

Once the email profile has been successfully installed, the device will automatically prompt the user to complete Exchange ActiveSync authentication by asking for a password.

After authentication is complete, within the settings app under Mail > Accounts, we can see our account listed. Drilling down further into detail by selecting the email profile, we can validate the details match the Endpoint Manager deployed email profile.

Moving over to the native mail app, a test email has been received successfully.

Within the Endpoint Manager portal, we can validate the email profile has been successfully installed on the device by navigating to Devices > All Devices.

Selecting the device entry, under Device Configuration on the left side menu, we can see the email profile we created successfully installed.

Episode 7 – Applications, App Configuration & App Protection (MAM)

Add Outlook for iOS

Note – Apps deployed straight from the public app store require an Apple ID account signed in on the device. If an Apple ID account isn’t present, the operating system will prompt the user to sign in before apps can be installed.

Sign in to your Endpoint Manager portal by browsing to https://endpoint.microsoft.com

From the home dashboard, navigate to Apps > iOS/iPadOS > iOS/iPadOS apps.

Select the ‘Add’ button.

Select ‘iOS store app’ from the App Type drop-down and then press ‘Select’.

Select ‘Search the App Store’.

Ensure the correct locale is selected before search for an app. (United States is the default)

Enter Outlook into the search field.

Select ‘Microsoft Outlook’ from the list and then press ‘Select’.

In the App Information section, observe that Endpoint Manager will conveniently pull all information about the app from the app store.

Select ‘Next’.

Choose the correct type of assignment relevant to your organisation requirements.

For the purpose of this training course, we assign Outlook as ‘Required’.

Select ‘Add Group’.

In this example, the ‘Corporate Devices’ group will be selected.

Select ‘Select’ to add your Azure AD Group.

Select ‘Next’ and then ‘Save’.

Once created, you will see Outlook app appear in the list ready for use.

See in Action

After assigning your chosen application as ‘Required’, Endpoint Manager will automatically prompt the user to install the application. Should the user select, ‘Cancel’, Endpoint Manager will prompt again upon the next scheduled device check-in.

Within the Endpoint Manager portal, we can validate the email profile has been successfully installed on the device by navigating to Devices > All Devices.

Selecting the device entry, under Managed App on the left side menu, we can see the application successfully installed.

Add Outlook for Android

Note – By default, once Managed Google Play Store has been integrated with Endpoint Manager, Endpoint Manager will pre-populate four Microsoft apps.
– Intune Company Portal
– Managed Home Screen
– Microsoft Authenticator
– Microsoft Intune

From the home dashboard, navigate to Apps > Android > Android apps.

Select the ‘Add’ button.

Select ‘Managed Google Play Store’ from the App Type drop-down and then press ‘Select’.

Managed Google Play Store will render within the Endpoint Manager console using an integrated API called iFrame.

Enter Outlook into the search field.

Select Outlook from the search results.

Select ‘Approve’.

Select ‘Approve’ and then select ‘Done’.

Invoke a manual synchronisation by selecting the ‘Sync’ button.

Allow up to 5 minutes whilst Managed Google Play syncs with Endpoint Manager.

Select the ‘Refresh’ button in order to update the apps list.

Now select ‘Outlook’ from the list and then select ‘Properties’.

Under Assignments, select ‘Edit’.

Choose the correct type of assignment relevant to your organisation requirements.

For the purpose of this training course, we assign Outlook as ‘Required’.

Select ‘Add Group’.

In this example, the ‘Corporate Devices’ group will be selected.

Select ‘Select’ to add your Azure AD Group.

Select ‘Next’ and then ‘Save’.

See in Action

After assigning your chosen application as ‘Required’, Endpoint Manager will automatically install the application. Gesturing down from the top of the screen, Google Play Store displays a notification “Installing apps from your organisation”.

Pressing the notification, Google Play Store shows the chosen app being installed.

Within the Endpoint Manager portal, we can validate the email profile has been successfully installed on the device by navigating to Devices > All Devices.

Selecting the device entry, under Managed App on the left side menu, we can see the application successfully installed.

Create an App Configuration Policy

Note – Save Contacts settings refers to the enablement of Outlook Contacts and Calendar synchronization with your respective Native contacts and calendar apps. At present, only contacts sync is supported with Outlook for iOS. Outlook for Andoird supports both contacts and calendar sync. Refer to Microsoft documentation for further guidance.

Important – Outlook for Android supports bi-directional contact synchronization. However, if a user edits a field in the native contacts app that is restricted (such as the Notes field), then that data will not synchronize back into Outlook for Android.

From the home dashboard, navigate to Apps > App Configuration Policies.

Select the ‘Add’ button and then select ‘Managed Devices’.

Set a Name and Description.
**Example**
Name: iOS – Outlook App Configuration Policy
Description: App Configuration policy for Outlook on iOS.

Select iOS/iPadOS from the Platform dropdown.

Press the ‘Select app’ button, select Outlook from the list and then press ‘Ok’.

Select ‘Next’.

Select ‘Use Configuration Designer’ from the Configuration Settings Format dropdown.

For the purposes of this training course, the following Outlook App Configuration settings will be set:
**Example**
Email Account Configuration

  • Configure email account settings: Yes
  • Authentication type: Basic authentication
  • Username attribute from AAD: User Principal Name
  • Email address attribute from AAD: Primary SMTP Address
  • Email Server: outlook.office365.com
  • Email Account Name: Corporate Email

General App Configuration

  • Focused Inbox: On
  • Require Biometrics to access app: Off
  • Save Contacts: On
  • Allow user to change settings: Yes
  • Default app signature: On

Select ‘Next’.

Under Assignments, select ‘Add Groups’.

In this example, the ‘Corporate Devices’ group will be selected.

Select ‘Select’ to add your Azure AD Group.

Select ‘Next’ and then ‘Create’.

Once created, you will see the App Configuration Policy appear in the list ready for use.

See in Action

App Configuration can be enabled and validated on the device by the user. Observing our enroled device in Outlook, we can see App Configuration has detected and pre-populated our enroled user account – johndoe@traininguemauthority.onmicrosoft.com

After selecting ‘Add Account’, we sign in to complete authentication.

Within the Endpoint Manager portal, we can validate the App Configuration policy has been successfully installed on the device by navigating to Devices > All Devices.

Selecting the device entry, under App Configuration on the left side menu, we can see the App Configuration policy we created successfully installed.

Create an App Protection Policy

Note – Outlook MAM protection requires an Azure AD account (Hybrid or Cloud) and Exchange Online mailbox (Hybrid or Cloud)

From the home dashboard, navigate to Apps > App Protection Policies.

Select the ‘Add’ button and then select ‘iOS/iPadOS’.

Set a Name and Description.
**Example**
Name: iOS – MAM Policy
Description: MAM Policy for iOS devices.

Select ‘Next’.

For the purposes of this training course, MAM will be targeted to both Managed and Unmanaged iOS devices.

The following App Protection settings will be set:
**Example**
Target to apps on all device types: Yes

Press ‘Select Public Apps’ and then select Outlook from the list.

Select ‘Next’.

Data Transfer

  • Backup org data to iTunes and iCloud backups: Block
  • Send org data to other apps: Policy managed apps
  • Select apps to exempt: Default
  • Save copies of org data: Block
  • Allow user to save copies to select services: OneDrive for Business & SharePoint
  • Transfer telecommunication data to: Any dialer app
  • Dialer App URL Scheme: None
  • Receive data from other apps: Policy managed apps
  • Open data into Org documents: Block
  • Allow to user open data from select services: OneDrive for Business, SharePoint & Camera
  • Restrict cut, copy, and paste between other apps: Policy managed apps
  • Cut and copy character limit for any app: 0
  • Third-party keyboards: Allow

Encryption

  • Encrypt org data: Require

Functionality

  • Sync policy managed app data with native apps: Allow
  • Printing org data: Block
  • Restrict web content transfer with other apps: Microsoft Edge
  • Unmanaged browser protocol: None
  • Org data notifications: Allow

Access Requirements

  • Pin for Acces: Not Required
  • Work or school account credentials for access: Not Required
  • Recheck the access requirements after (minutes of inactivity): 30

Conditional Launch

  • Offline grace period: 720 – Block access (minutes)
  • Offline grace period: 90 – Wipe data (days)
  • Jailbroken/Rooted devices: Block access

Select ‘Next’.

Under Assignments, select ‘Add Groups’.

In this example, the ‘Corporate Devices’ group will be selected.

Select ‘Select’ to add your Azure AD Group.

Select ‘Next’ and then ‘Create’.

Once created, you will see the App Protection Policy appear in the list ready for use.

See in Action

App Protection can be validated on the device by the user. Observing our enroled device in Outlook, we can test cut, copy and paste restrictions that are being enforced by our App Protection policy.

For the purposes of this demonstration, we have received an email from our fictional organisation that contains sensitive information. We will attempt to exfiltrate this information by means of Copy and Paste.

Copying text from the body of the email, we close Outlook and then open the native Notes app. Attempting to paste the copied information, App Protection replaces the original text in the clipboard cache with “Your orginastion’s data cannot be pasted here”.

Within the Endpoint Manager portal, we can validate which apps App Protection is applied to by app or user. Navigating to Apps > Monitor > App Protection Status > Reports.

Selecting the User Report, we choose the enroled user – johndoe@traininguemauthority.onmicrosoft.com.

The report shows iOS – MAM Policy is successfully applied against Microsoft Outlook.

Episode 8 – Enrol iOS & Android Devices

iOS Device Manual Enrolment

Note – A manually enroled iOS/iPadOS device will automatically be assigned a ‘Personal’ ownership designation. For this reason, Corporate Device Identifiers are used for pre-declaring known Corporate Owned devices, prior to enrolment.

Android Device Manual Enrolment

Note – For the purposes of this training course, enrolment of the Android Enterprise Corporate Owned Business Only (COBO) management mode will be demonstrated using the Token method.

Enable Android Enterprise Enrolment

To support Android Enterprise Corporate Owned Business Only enrolment to Endpoint Manager, the relevant enrolment profile must first be activated.

From the home dashboard, navigate to Devices > Android > Android Enrolment.

Under Enrolment Profiles, Select ‘Corporate-owned, fully managed user devices’.

Next to Allow user to enrol corporate-owned user devices, toggle to ‘Yes’.

Intune will generate a unique QR code and Token ID.

Once enrolment has been invoked using AFW#SETUP during Out of Box setup wizard, the Token ID must be inputted when prompted.

Updated on January 20, 2022

Was this article helpful?

Related Articles

Leave a Comment