Intune Setup – UEM Authority https://guides.uemauthority.com Learn. Test. Deploy Thu, 20 Jan 2022 16:25:04 +0000 en-GB hourly 1 https://wordpress.org/?v=6.5.3 https://guides.uemauthority.com/wp-content/uploads/2021/11/cropped-UEM_Authority_Logo_favicon-32x32.png Intune Setup – UEM Authority https://guides.uemauthority.com 32 32 214635633 Configure Enrolment Restrictions https://guides.uemauthority.com/knowledge-base/configure-enrolment-restrictions/?utm_source=rss&utm_medium=rss&utm_campaign=configure-enrolment-restrictions https://guides.uemauthority.com/knowledge-base/configure-enrolment-restrictions/#respond Mon, 17 Jan 2022 16:22:22 +0000 http://guides.uemauthority.com/?post_type=ht_kb&p=939 In the guide, we explore Device Type Restrictions and Enrolment Limit Restriction. Combined, both settings allow an organisation to define what devices can enrol into management with Intune, including the:

  • Number of devices.
  • Operating systems and versions.
Configure Device Type Restrictions

Note – Enrollment restrictions are not security features. Compromised devices can misrepresent their character. These restrictions are a best-effort barrier for non-malicious users.

From the home dashboard, navigate to Devices > Enrol Devices > Enrolment Restrictions

Under Device Type Restrictions, select the Default Policy called All Users.

Select Properties. Under Platform Settings, select Edit.

In this example, the Default Policy will be modified to reflect the below settings:
**Example**
Android Enterprise (Work Profile)

  • Platform: Allow
  • Versions: 10.0 min
  • Personally Owned: Block

Android Device Administrator

  • Platform: Block

iOS/iPadOS

  • Platform: Allow
  • Versions: 13.0 min
  • Personally Owned: Block

macOS

  • Platform: Block

Windows (MDM)

  • Platform: Allow
  • Personally Owned: Block

Select ‘Review + Save’ and then ‘Save’.

Top Tip – A separate personally owned device type policy allows an organisation better control over whom and what has access to corporate resources. For example, an organisation may choose to limit personal device or BYOD enrolment to eligible users or personas. Device Type restriction enables such granular gate keeping.

To create a personally owned or BYOD policy, using the best practice example below, select the ‘Create Restriction’ button.

Select the ‘Device Type Restriction’ option.

Set a Name and Description:
**Example**
Name: Personally Owned/BYOD Policy
Description: A device type restriction policy that limits enrolment of personally owned and BYOD devices to an eligible group of users.

Select ‘Next’.

Set the policy Platform Settings:
**Example**
Android Enterprise (Work Profile)

  • Platform: Allow
  • Versions: 10.0 min
  • Personally Owned: Allow

Android Device Administrator

  • Platform: Block

iOS/iPadOS

  • Platform: Allow
  • Versions: 13.0 min
  • Personally Owned: Allow

macOS

  • Platform: Block

Windows (MDM)

  • Platform: Allow
  • Personally Owned: Block

Select ‘Next’, and then ‘Next’.

Under Assignments, select ‘Add Groups’.

In this example, the ‘Personal BYOD Devices’ group will be selected.

Select ‘Select’ to add your Azure AD Group.

Select ‘Next’ and then ‘Create’.

You will see the Device Type Restrictions policy appear ready for use.

See in Action

Top Tip – During Personally Owned/BYOD enrolment for an iOS/iPadOS device, the enrolment profile will fail to install. The Personally Owned Device Type Restrictions policy will block this device from being able to enrol. Generally, this means the user’s Azure AD/AD account does not yet reside in the eligible Azure AD Group.

Test User 01 Azure AD user account does not yet reside within any groups.

Attempting to enrol on an iOS device, installation of the profile will fail.

Observing Intune enrolment failures report under Devices > Monitor > Enrolment Failures, we can see the reason why enrolment was blocked.

Configure Device Limit Restrictions

Important – Device limit restrictions don’t apply for the following Windows enrollment types:
– Co-managed enrollments
– GPO enrollments
– Azure Active Directory joined enrollments
– Bulk Azure Active Directory joined enrollments
– Autopilot enrollments
– Device Enrollment Manager enrollments

From the home dashboard, navigate to Devices > Enrol Devices > Enrolment Restrictions

Under Device Type Restrictions, select the Default Policy called All Users.

Select Properties. Under Platform Settings, select Edit.

In this example, the Default Policy will be modified to reflect the below settings:
**Example**
Device Limit: From 10 to 5

Select ‘Review + Save’ and then ‘Save’.

]]>
https://guides.uemauthority.com/knowledge-base/configure-enrolment-restrictions/feed/ 0 939
Configure Managed Google Play for Intune https://guides.uemauthority.com/knowledge-base/configure-managed-google-play-for-intune/?utm_source=rss&utm_medium=rss&utm_campaign=configure-managed-google-play-for-intune https://guides.uemauthority.com/knowledge-base/configure-managed-google-play-for-intune/#respond Mon, 17 Jan 2022 15:12:18 +0000 http://guides.uemauthority.com/?post_type=ht_kb&p=934 In this guide, we explore steps to enable Intune for management of Android devices.

The second step in the process involves integrating Google Managed Play with Intune.

Configure Managed Google Play for Intune

Important – Managed Google Play carries no validity. This means the integration with Endpoint Manager is persistent.

In the Endpoint Manager Console, navigate to Devices > Enroll Devices > Android Enrollment > Managed Google Play

At Step 1, select the toggle box to acknowledge you agree Microsoft to send user and device information to Google.

At Step 2, select ‘Launch Google to Connect Now’.

Google Play will open in a new window, select ‘Sign In’.

Once signed in with the Google Account created in the last section or a Google Account already belonging to your company, select ‘Get Started’.

Enter your organisation business or trading name.

You will see Microsoft Intune is identified as the EMM provider.

Select ‘Next’.

Note – This next section is optional. Data Protection Officer and EU Representative contact details can be added later, in the Google Account admin portal, if you do not have them to hand right now.

Toggle the tick box to acknowledge that you have read and agree to Managed Google Play Agreement.

Select ‘Confirm’ to continue.

Select ‘Complete Registration’ to finish the setup.

Head back to your Endpoint Manager console. Observe a notification appear to confirm “Managed google Play successfully configured with tenant”

To confirm a successful integration, the following information should be present:
Status: Setup (With green tick)
Organistion: Your organisation name or trading name
Google Account: The Google Account used to set up integration
Registration Date: The date and time Managed Google Play was configured

Managed Google Play is now integrated with your Endpoint Manager tenant.

]]>
https://guides.uemauthority.com/knowledge-base/configure-managed-google-play-for-intune/feed/ 0 934
Create a Managed Google Play account. https://guides.uemauthority.com/knowledge-base/create-a-managed-google-play-account/?utm_source=rss&utm_medium=rss&utm_campaign=create-a-managed-google-play-account https://guides.uemauthority.com/knowledge-base/create-a-managed-google-play-account/#respond Mon, 17 Jan 2022 15:07:20 +0000 http://guides.uemauthority.com/?post_type=ht_kb&p=932 In this guide, we explore steps to enable Intune for management of Android devices.

The first step in the process involves registration to Google by creating a Google Account.

After completing this step, head over to Configure Managed Google Play for Intune.

Create a Managed Google Play Account

Important – Managed Google Play requires a personal or consumer Google Account. A G Suite or Workspace account is not valid.

In the Endpoint Manager Console, navigate to Devices > Enroll Devices > Android Enrollment > Managed Google Play

At Step 1, select the toggle box to acknowledge you agree for Microsoft to send user and device information to Google.

At Step 2, select ‘Launch Google to Connect Now’.

Google Play will open in a new window, select ‘Sign In’.

Select ‘Create Account’, then select ‘For Myself’.

Top Tip – The Managed Google Play integration is associated with the Google Account used to create it. As best practice, use a consumer Google Account, which belongs to your organisation for management tasks and make sure the mailbox is monitored by more than one person like a distribution list.

To create a Google Account, complete the required information:
**Example**
First Name: UEM
Last Name: Authority
Username: uemauthority@gmail.com
Password: (8 characters or more, Upper and lowercase letters & At least one number)
Phone Number: 0000000
Recovery Email Address: (Use an email address that belongs to your company domain. A shared mailbox for admins only, for example)
Birthday: 01/01/1990
Gender: (Your preference)
Birthday: 01/01/1990

Personalisation Settings: Express Personalisation

Select ‘Next’ to confirm personalisation settings.

Select ‘Confirm’ to acknowledge how Google will use your account data.

Select ‘I Agree’ to agree with Google privacy and terms.

You have now created a Google Account.

]]>
https://guides.uemauthority.com/knowledge-base/create-a-managed-google-play-account/feed/ 0 932
Configure Apple Push Cert (APNS) for Intune https://guides.uemauthority.com/knowledge-base/configure-apple-push-cert-apns-for-intune/?utm_source=rss&utm_medium=rss&utm_campaign=configure-apple-push-cert-apns-for-intune https://guides.uemauthority.com/knowledge-base/configure-apple-push-cert-apns-for-intune/#respond Mon, 17 Jan 2022 14:53:31 +0000 http://guides.uemauthority.com/?post_type=ht_kb&p=926 In this guide, we explore steps to enable Intune for management of Apple devices.

The second and third steps in the process involve creation of a APNS or Apple Push Cert and then to integrate said certificate with Intune.

Configure Apple APNS certificate for Intune

Note – During these steps, you will flick back and forth between Apple Push Certificates Portal and Endpoint Manager console. Ensure you are signed into Endpoint Manager console in a new browser tab.

Select the ‘Create a Certificate’ button to get started.

Select the toggle box to acknowledge you agree to Apple’s terms and conditions.

Select the ‘Accept’ button to proceed.

Switch tabs to Endpoint Manager console.

Navigate to Devices > Enroll Devices > Apple Enrollment > Apple MDM Push Certificate

At Step 1, select the toggle box to acknowledge you agree for Microsoft to send user and device information to Apple.

At Step 2, select ‘Download your CSR’.

Switch tabs to Apple Push Certificates Portal.

Under Notes, provide a comment to differentiate this certificate from others. (Handy when you carry out a certificate renewal).

Select the ‘Choose File’ button. Select the recently downloaded IntuneCSR.csr file.

Select the ‘Upload’ button.

Select the ‘Download’ button to download the MDM APNs certificate (which is a .pem file).

Switch tabs to Endpoint Manager console.

At ‘Step 4’, input the same Apple ID used to create the certificate.

At ‘Step 5’, browse and locate the recently downloaded MDM APNs certificate (which is a .pem file).

Select the ‘Upload’ button.

Intune will notify you as to a successful MDM Push Certificate creation.

Scroll to the top of the dialogue box in order to validate a successful configuration. Hopefully, you will observe the following:
Status: Active
Days until expiration: 365 (From the date of Last Updated)
Last Updated: Date certificate was created
Expiration: 365 days from date certificate was created
Apple ID: Same Apple ID used to create the certificate.

Should the MDM Push Certificate process fail or the status returns an error, delete the Endpoint Manager configuration and repeat this section again from the beginning.

]]>
https://guides.uemauthority.com/knowledge-base/configure-apple-push-cert-apns-for-intune/feed/ 0 926
Create an Apple Push Cert (APNS) Apple ID https://guides.uemauthority.com/knowledge-base/create-an-apple-push-cert-apns-apple-id/?utm_source=rss&utm_medium=rss&utm_campaign=create-an-apple-push-cert-apns-apple-id https://guides.uemauthority.com/knowledge-base/create-an-apple-push-cert-apns-apple-id/#respond Mon, 17 Jan 2022 14:42:38 +0000 http://guides.uemauthority.com/?post_type=ht_kb&p=925 In this guide, we explore steps to enable Intune for management of Apple devices.

The first step in the process involves registration to the APNS or Apple Push Cert portal by creating an Apple ID.

After completing this step, head over to Configure Apple Push Cert (APNS) for Intune.

Configure an APNS Apple ID

Important – An Apple MDM Push certificate is required for Intune to manage iOS/iPadOS and macOS devices.
When a push certificate expires, you must renew it. When renewing, make sure to use the same Apple ID that you used when you first created the push certificate.

Critical – Revoking or allowing this certificate to expire means existing devices will need to be re-enroled with a new push certificate.

Open a browser and navigate to https://identity.apple.com/pushcert

Sign in with your Apple ID or select the ‘Create yours now’ button to register for an Apple ID.

Top Tip – The certificate is associated with the Apple ID used to create it. As a best practice, use a company Apple ID for management tasks and make sure the mailbox is monitored by more than one person like a distribution list. Never use a personal Apple ID.

To create an Apple ID, complete the required information:
**Example**
First Name: UEM
Last Name: Authority
Country/Region: United Kingdom
Birthday: 01/01/1990
Email Address: training1@uemauthority.com
Password: (8 characters or more, Upper and lowercase letters & At least one number)
Area Code: +44 United Kingdom
Phone Number: 0000000
2FA Verify Method: Text Message
Marketing Preference: None toggled
Security Code: Type the characters in the image

Select the ‘Continue’ button to complete registration.

You will now be required to verify the account, Apple will:

  1. Send you an email containing a verification code.
  2. Validate 2FA using the provided phone number, whether by text message or phone call.

Once your Apple ID account is verified, navigate back to https://identity.apple.com/pushcert and sign in with your Apple ID.

]]>
https://guides.uemauthority.com/knowledge-base/create-an-apple-push-cert-apns-apple-id/feed/ 0 925
Configure an End User Terms & Conditions Policy https://guides.uemauthority.com/knowledge-base/configure-an-end-user-terms-conditions-policy/?utm_source=rss&utm_medium=rss&utm_campaign=configure-an-end-user-terms-conditions-policy https://guides.uemauthority.com/knowledge-base/configure-an-end-user-terms-conditions-policy/#respond Mon, 17 Jan 2022 14:27:47 +0000 http://guides.uemauthority.com/?post_type=ht_kb&p=923 In the guide, we explore and configure a feature of Intune which enforces end user terms and conditions prior to a device given permission to enrol.

Configure an end-user Terms & Conditions policy

From the home dashboard, select ‘Tenant Administration’.

Under ‘End User Experiences’ select ‘Terms and Conditions’.

Select the ‘Create’ button.

Set a Name and Description.

Select the ‘Next’ button.

Complete the required information:
**Example**
Title: The name for your terms that users see in the Company Portal above the Summary.
Terms and Conditions: The terms and conditions that users see and must either accept or reject.
Summary of Terms: Text that explains what it means when users accept the terms. For example, “By enrolling your device, you’re agreeing to the terms of use set out by UEM Authority. Read the terms carefully before proceeding.”

Select the ‘Next’ button.

On the Assignments page, choose whether to target select groups or all enrolled users.

Select the ‘Next’ button, then select the ‘Create’ button.

Once created, you will see the new policy populate in the Terms and Conditions settings overview pane.

See in Action

During enrolment to Endpoint Manager, Company Portal app will display a Terms & Conditions policy applied by your organisation. The user is given a choice to accept or decline.

]]>
https://guides.uemauthority.com/knowledge-base/configure-an-end-user-terms-conditions-policy/feed/ 0 923
Configure Company Portal Branding and Customisation https://guides.uemauthority.com/knowledge-base/configure-company-portal-branding-and-customisation/?utm_source=rss&utm_medium=rss&utm_campaign=configure-company-portal-branding-and-customisation https://guides.uemauthority.com/knowledge-base/configure-company-portal-branding-and-customisation/#respond Mon, 17 Jan 2022 14:22:01 +0000 http://guides.uemauthority.com/?post_type=ht_kb&p=920 In this guide, we explore tenant administration options which allow customisation and branding livery to be configured for the company portal app.

Configure Company Portal Branding and Customisation

Sign in to your Endpoint Manager portal by browsing to https://endpoint.microsoft.com

From the home dashboard, select ‘Tenant Administration’.

Under ‘End User Experiences’ select ‘Customisation’.

Next to ‘Settings’ select the ‘Edit’ button.

Under ‘Branding’, set an Organisation Name.

Our example here is UEM Authority.

Set a Standard or Custom colour by sliding the toggle.

If choosing Standard, select a colour from the ‘Theme Colour’ drop-down list.

If choosing Custom, define a custom colour by providing a Hex Code.

Select what should be displayed in the header of Company Portal app.

Our example will select Organisation Logo Only to be displayed in the header.

Upload a logo for the theme colour background.
(Max image size: 400 x 400 px. Max file size : 750KB. File type: PNG, JPG or JPEG)

Note – Upload the logo you want to show on top of your selected theme color. For the best appearance, upload a logo with a transparent background. You can see how this will look in the preview box below the setting.

Upload a logo for a white or light background.
(Max image size: 400 x 400 px. Max file size : 750KB. File type: PNG, JPG or JPEG)

Note – Upload the logo you want to show on top of white or light-colored backgrounds. For the best appearance, upload a logo with a transparent background. You can see how this will look on a white background in the preview box below the setting.

Upload a brand image.
(Recommended image width: Greater than 1125 px. Max file size: 1.3 MB. File type: PNG, JPG, or JPEG.​)

Brand image is displayed in these locations:

  • iOS/iPadOS Company Portal: Background image on the user’s profile page.
  • Windows Company Portal: Background image on the user’s profile page.
  • Company Portal website: Background image on the user’s profile page.
  • Android Intune app: In the drawer and as a background image on the user’s profile page.

Top Tip – Enter your organisation’s support information, so employees can reach out with questions. This support information will be displayed on Support, Help & Support, and Helpdesk pages across the end-user experience.

Under Support Information, complete the optional information:
**Example**
Contact Name: UEM Authority IT Help Desk
Phone Number: 0123456789
Email Address: support@uemauthority.com
Website Name: (This is a website-friendly name, so the ticketing and support system used by your organisation, such as ZenDesk or ServiceNow, etc.)
Website URL: https://uemauthority.com/internalitsupport for example
Additional Information: (Include any additional support-related messaging to users here.)

Important – The following settings apply only to traditional/manual enrolment for both Android and iOS/iPadOS devices. For more information, refer to Microsoft documentation

Under Configuration, you can customise the setup experience in Company Portal for Android and iOS/iPadOS devices.

Next to Device Enrolment, select the drop-down box to choose how users should be prompted to enroll into mobile device management.

Next, provide a URL to send employees to your company’s Privacy Statement.

Next, we can retain the Endpoint Manager default Privacy message about what admins can’t/can see or do, or you may choose to define a custom message. (Applies to iOS/iPadOS only.)

Top Tip – Custom message input supports markdown so you can add bullets, bolding, italics, and links.

Depending on the use case and its respective transparency obligation, you can choose to configure a push notification to send to both your Android and iOS Company Portal users when their device ownership type has been changed from Personal to Corporate as a privacy courtesy.

Choose ‘Yes’ or ‘No’ for Device Ownership Notification.

Note – App Sources settings apply to Windows Company Portal app only.

Choose to ‘Hide’ or ‘Show’ Azure AD Enterprise Applications in the Company Portal for each end user.

Choose to ‘Hide’ or ‘Show’ Office Online Applications in the Company Portal for each end user.

To help prevent unintended device actions, you can customise the available self-service device actions that are shown to end users in the Company Portal app:
**Example**
Hide Remove button on corporate Windows devices: Toggled by default
Hide Reset button on corporate Windows devices: Not toggled
Hide Remove button on corporate iOS/iPadOS devices: Toggled
Hide Reset button on corporate iOS/iPadOS devices: Toggled

Select the ‘Review + Save’ button.

Under Policies, Endpoint Manager allows you to manage multiple customisation policies.

For this training guide, policies will not be explored, however, feel free to experiment.

See in Action

Note – Company branding may render different on certain form factors. For example, Windows 10 Company Portal app may display your company logo in the header banner, where Company Portal app for iPhone only shows the organisation name.

Post enrolment to Endpoint Manager on iPhone, the Company Portal app will display the organisation name in the header.

Selecting the user account icon, we can see UEM Authority logo applied as the background.

In the Support tab, we can see our support information applied.

Selecting More, Company Portal app lists additional custom information and links related to our organisation, such as a link to UEM Authority Privacy Policy.

]]>
https://guides.uemauthority.com/knowledge-base/configure-company-portal-branding-and-customisation/feed/ 0 920
Set the MDM Authority for Intune https://guides.uemauthority.com/knowledge-base/set-the-mdm-authority-for-intune/?utm_source=rss&utm_medium=rss&utm_campaign=set-the-mdm-authority-for-intune https://guides.uemauthority.com/knowledge-base/set-the-mdm-authority-for-intune/#respond Mon, 17 Jan 2022 14:11:41 +0000 http://guides.uemauthority.com/?post_type=ht_kb&p=918 The mobile device management (MDM) authority setting determines how you manage your devices. As an IT admin, you must set an MDM authority before users can enrol devices for management.

In this guide, we validate the MDM authority is set as Intune.

Set the MDM Authority for Intune

Sign in to your Endpoint Manager portal by browsing to https://endpoint.microsoft.com

From the home dashboard, select ‘Tenant Administration’.

From the left menu, select Tenant Status > Tenant Status.

Important – Observe the Service Release for your tenant, because if your tenant is using 1911 and later, the MDM Authority is set automatically to Microsoft Intune. You will therefore not need to carry out further steps.

If your tenant is using a Service Release pre-1911, you must set the MDM Authority manually. Continue to follow the steps for this section.

Select the Orange Banner from the top right corner of the Endpoint Manager portal.

If the banner is no longer visible, select the notifications icon to reveal the notification.

In the Mobile Device Management Authority dialogue box, select ‘Intune MDM Authority’

A message in the top right corner of the Endpoint Manager portal will indicate that you have successfully set the MDM authority.

To validate this, under Tenant Status > Tenant Details, MDM Authority is ‘Microsoft Intune’.

]]>
https://guides.uemauthority.com/knowledge-base/set-the-mdm-authority-for-intune/feed/ 0 918
Create a Cloud Azure AD User https://guides.uemauthority.com/knowledge-base/create-a-cloud-azure-ad-user/?utm_source=rss&utm_medium=rss&utm_campaign=create-a-cloud-azure-ad-user https://guides.uemauthority.com/knowledge-base/create-a-cloud-azure-ad-user/#respond Mon, 17 Jan 2022 11:58:43 +0000 http://guides.uemauthority.com/?post_type=ht_kb&p=913 In this guide, we create a Cloud Only standard user account directly in Azure Active Directory.

We then assign an active Enterprise Mobility & Security trial license to this account.

Create a Cloud Azure AD user

We shall create an Azure AD user for enrolment testing purposes only. This account will not be granted administrator access to the Azure portal.

From the home dashboard, select ‘Azure Active Directory’.

From the left menu, select Users.

Select ‘All Users’ and then select the ‘New User’ button.

Select the ‘Create User’ option as we are not inviting a guest user into your organisation.

Under Identity, complete the required information:
**Example**
Username: johndoe@johndoe.onmicrosoft.com or a custom domain
Name: John Doe
First Name: John
Last Name: Doe

Under Password, you are offered the choice to have Azure AD generate a password for you or allow you to set a custom password.

For the purpose of this guide, we will select Auto-generate.

Select the ‘Show Password’ toggle to reveal the password.

Groups and Roles are covered later in this training guide.

Under Settings:

Block Sign In: No
Usage Location: Your locale-specific location

Under Job Info, we have the option to set specific information about the Azure AD account owner. We will skip past this section, however, feel free to experiment here.

Select the ‘Create’ button to finish.

You will see the newly created account populate in the All Users pane.

Select the user account to review its details.

Things to note:
User Principal Name (UPN) should match the information provided during account creation.
User Type is set as Member, and not Guest, because the account is part of your organisation.
Object ID is a unique static attribute number assigned to this account.
Source is set as Azure Active Directory because this account originated in and resides in Azure Active Directory and not On-Premise Active Directory.

Assign a license to an Azure AD user account

Under Manage, select ‘Licenses’.

Select the ‘Assignments’ button.

Select ‘Enterprise Mobility + Security E5’.

Review licensing options to ensure the correct set of sub-services is included.

Select the ‘Save’ button.

Once the trial license has been applied to the user, you will see Enterprise Mobility + Security E5 present with an active state.

]]>
https://guides.uemauthority.com/knowledge-base/create-a-cloud-azure-ad-user/feed/ 0 913
Activate a trial Enterprise Mobility & Security license https://guides.uemauthority.com/knowledge-base/activate-a-trial-enterprise-mobility-security-license/?utm_source=rss&utm_medium=rss&utm_campaign=activate-a-trial-enterprise-mobility-security-license https://guides.uemauthority.com/knowledge-base/activate-a-trial-enterprise-mobility-security-license/#respond Sun, 16 Jan 2022 11:07:45 +0000 http://guides.uemauthority.com/?post_type=ht_kb&p=908 Benefit from Microsoft’s product trial programme to enable your organisation to evaluate products and services at very little, to no cost.

In this guide, we enable Endpoint Manager, as a standalone service, by activtaing a trial Enteprise Mobility & Security license.

Activate a trial Enterprise Mobility & Security license

Sign in to your Azure portal by browsing to https://portal.azure.com From the home dashboard, select ‘Azure Active Directory’.

From the left menu, select Licenses > All Products.

Select the ‘Try / Buy’ button.

Under Enterprise Mobility + Security E5, select ‘Free Trial’.

Carefully read the description to understand which services are included and how many users can utilise this trial license.

Select the ‘Activate’ button.

Azure Active Directory takes up to 5 minutes to initialise the trial license within your tenant. We recommend you sign out and back into the Azure portal to allow the interface to refresh, alternatively press Ctrl + F5 to refresh the browser page and flush its cache.

Once the trial license has applied to your tenant, you will see Enterprise Mobility + Security E5 present in the ‘All Products’ pane with 250 assignments available.

]]>
https://guides.uemauthority.com/knowledge-base/activate-a-trial-enterprise-mobility-security-license/feed/ 0 908