APPENDIX B
Co-Managing Microsoft Intune and ConfigMgr

Windows 10 introduces new and streamlined methods for managing Windows, which Microsoft refers to as modern management. There are multiple paths to modern management, depending on where an organization is on its Windows 10 journey and the constraints of that organization’s environment and infrastructure. The main component of modern management is the use of Windows 10’s built-in mobile device management (MDM) agent instead of additional management agents.

This appendix discusses modern management and what it brings to Windows management. It also explains how you can leverage and configure Configuration Manager (ConfigMgr) to create a pathway to modern management. This pathway allows moving workloads from ConfigMgr to Microsoft Intune (and thus the Windows 10 MDM agent) once you have qualified those workloads and are confident they will meet your organization’s requirements.

Modern Management in Windows 10

Windows has historically relied on additional agents to manage PCs. For organizations with ConfigMgr, this is the ConfigMgr agent. Windows has also had basic management capabilities in group policy and Windows Server Update Services (WSUS). These capabilities have not undergone major changes since Windows XP; rather, there have been incremental advances over time through Windows 8.1.

Beginning with Windows 10, Microsoft has significantly increased the release cadence of Windows. Windows now receives approximately two major feature updates every year. This cadence is referred to as the Semi-Annual Channel, and it replaces earlier Current Branch and Current Branch for Business release channels. Since the initial release of Windows 10, these updates have included Windows 10 Anniversary Update (1607), Windows 10 Creators Update (1703), and Windows 10 Fall Creators Update (1709). The four-digit number refers to the year (for example, 17 refers to 2017) and month (for example, 09 refers to September) in which the release’s development was finalized.

The revised release cadence creates a need for equivalent releases of management tools. This is one of the reasons ConfigMgr Current Branch adopted a regular release cadence that aligns to Windows 10 releases. In addition, Windows 10 has a significant investment in MDM as a management method. In Windows 10, the MDM stack has the ability to configure device encryption (BitLocker), take hardware and app inventory, and configure Windows Update for Business, among other enhancements. In addition, with feature updates, or major releases, Windows 10 has received significant enhancements to MDM capabilities. For a comprehensive list of all the management capabilities available in Windows 10 MDM, see the list of configuration service providers (CSPs) at https://docs.microsoft.com/windows/client-management/mdm/configuration-service-provider-reference.

Modern management was introduced as a new way to think about managing Windows. It was meant to enable information technology (IT) to consume Windows regularly—moving away from 3- to 10-year deployments of Windows as large capital expenditure projects and to regular annual or semi-annual operational tasks. The intent is to look at servicing (including updating), application management, security, provisioning, and settings management in new ways, including:

images Modern Servicing: Moving to Windows Update for Business and leveraging ring-based release models.

images Modern Provisioning: Moving from custom images to a clean “signature” image.

images Modern Settings: Moving from group policy objects (GPOs) to MDM policy.

images Modern Authentication: Moving from Kerberos to Windows Hello for business and modern authentication (OAuth in Azure Active Directory [Azure AD]).

images Modern Security: Leveraging Windows Information Protection (WIP), Windows Defender Advanced Threat Protection (ATP; discussed in Chapter 19, “Endpoint Protection”), and other Windows Defender capabilities, such as SmartScreen, Device Guard, Credential Guard, and so on.

images Modern Apps: Moving from legacy .exe/.msi installers to Universal Windows Platform apps, converting to Store format (.appx) using the Desktop Conversion Tool, Office 365 Pro Plus, and Software as a Service (SaaS) web apps.

Modern management is the evolution of the last 10 years of user-centric computing in Windows management.

Defining Co-Management

While many architects and decision makers may have an aspirational or strategic goal to move to modern management, there is significant effort in moving an entire company from traditional agent-based PC management to modern management. There are also human aspects to change to address, and an organization will typically need to create operational roles and move away from a project-based Windows deployment mindset.

There are parallels between moving to modern management and the challenges that Exchange administrators went through when their organizations moved to Exchange Online. Instead of managing an Exchange upgrade every few years, Exchange administrators now consume multiple changes to Exchange Online and Office 365 Pro Plus’s version of Outlook each year. New capabilities must be understood, articulated, determined if they should be used, and then configured; a Windows client administrator now needs to think in a similar fashion.

From a technology standpoint, this transformation is also difficult to accomplish without the ability to have traditional and modern methods co-exist—something ConfigMgr has historically blocked by disabling the MDM agent in Windows when the ConfigMgr agent is installed.

Co-management alleviates this issue by enabling side-by-side management of Windows 10 by the ConfigMgr agent and MDM management via Microsoft Intune. It requires the use of Microsoft Intune standalone rather than the hybrid mode of Intune integrated with ConfigMgr. Using Intune standalone allows you to maintain your ConfigMgr Current Branch environment while obtaining the rapid advancements of the cloud-only version of Intune, without binding Intune to ConfigMgr. Standalone is also Microsoft’s recommended method for deploying Intune.

Co-management also enables a company to evaluate modern management in its own time and control the rollout to its environment. You can choose which workloads to move to co-management. For example, you could move only Windows Update for Business from ConfigMgr update management. Alternatively, you could enable resource profile distribution so that Intune deploys certificates and Wi-Fi profiles to your devices.

In addition, co-management enables Intune-specific scenarios, such as device compliance conditional access. This allows Intune to validate device compliance and write that compliance state to Azure AD for use in conditional access, while continuing to leverage existing ConfigMgr policies to configure and control devices. This allows you to build compliance rules that target a specific month’s patches (using the Windows 10 version number) as part of compliance or require BitLocker prior to allowing access to Office 365 or another SaaS app protected by Azure AD. This control can apply from any location from which a user logs in.

For more information on co-management, see the ConfigMgr documentation at https://docs.microsoft.com/sccm/core/clients/manage/co-management-overview.

Why Co-Management?

One question that often comes up is why is there co-management? Microsoft built co-management based on customer feedback that modern management was on customer roadmaps but had not been heavily investigated or had hit some sort of blocker. However, this feedback was never in-depth because the customer was unable to pilot modern management without completely disabling ConfigMgr.

In addition, countless ConfigMgr environments exist, and loads of effort has been invested in them over the years. Co-management provides the ability to leverage your ConfigMgr investment while making a gradual and controlled move, on your terms, to modern management across all workloads, without a “big bang” migration or a rush to ramp up on modern management and the MDM stack.

For example, consider the complexity of legacy application deployment, which includes multiple application model deployments with supersedence logic and dependencies. Those types of applications are not modern in nature but will continue to exist until they are replaced by newer apps or moved to SaaS solutions or web-based systems. An entire environment should not hinge on those apps, nor should they block your company’s investigation into modern management. Co-management provides the ability to continue to deliver those apps via the ConfigMgr application model while shifting other workloads to Intune. Continuing to deliver those apps via ConfigMgr also allows you to leverage the investment in packaging and testing those apps while examining modern app packaging methods and development methods.

Choosing Where to Start with Co-Management

A major element of any deployment of new technology is choosing where to begin the initial rollout. The following are potential areas you can review as starting points for co-management. This list is not exhaustive; it is meant to provide ideas for low resistance that are relatively easy options:

images Securing Your Office 365 Access Using Azure AD Conditional Access: Enabling co-management allows you to configure conditional access for Windows 10 PCs with Microsoft Intune, so you can require that PCs are managed, encrypted with BitLocker, and up-to-date with the latest features and cumulative updates for Windows 10. ConfigMgr continues to enable and deploy the configuration. This helps prevent access to unmanaged PCs, such as a home PC, from Office 365. Compliance policies should be the first workload to consider moving from ConfigMgr to Intune.

images Enabling Your Remote Workers to Setup PCs over the Internet: You can combine co-management with Windows AutoPilot and/or Azure AD Join automatic MDM enrollment. This combination allows you to leverage AutoPilot or Azure AD Join to automate provisioning of off-the-shelf devices during the Windows 10 out of box experience (OOBE). Azure AD Join, either manually or via AutoPilot, during OOBE causes the PC to register with Microsoft Intune. You can configure Intune as part of co-management to install the ConfigMgr agent and thus light up co-management, combining the flexibility of MDM with the detailed control of ConfigMgr.

images Piloting Highly Mobile Users Who Use SaaS Apps: Most organizations have a set of users who are primarily mobile or remote workers in a field role. If you use Office 365 and other SaaS solutions for these users, they might be a good fit for initial co-management of devices with minimal workloads delivered from ConfigMgr. Office 365 ProPlus (a.k.a. Click2Run) can be delivered directly via Intune over the MDM channel in Windows 10, and most SaaS apps rely on web-based portals or simply client apps that self-update. In addition, SaaS solutions do not require intranet connectivity.

images Leveraging Intune to Provision Wi-Fi Profile and Associated Certs: Organizations requiring WPA2-Enterprise or 802.1x using x.509 certificates for access are often challenged with issuing certificates, as certificates must be issued and renewed to devices over a wired network while on-premise or via a virtual private network (VPN). Co-management enables you to leverage Intune’s ability to deploy certificates using Personal Information Exchange (PFX) (or Public Key Cryptography Standards #12 [PKCS#12]). This negates the need to stand up a Simple Certification Enrollment Protocol (SCEP) Connector and Network Device Enrollment Service (NDES) server. Intune can then bind the issued certificates to a Wi-Fi profile issued by Intune. This means those devices can be ready to use the corporate Wi-Fi as soon as users get to work.

Configuring Co-Management in ConfigMgr

The following sections discuss the configuration and the multiple enablement methods of co-management. The first section describes the prerequisites within ConfigMgr for co-management, assuming that Microsoft Intune standalone is configured and ready for Windows 10 devices to enroll. If Microsoft Intune is already configured in a hybrid setup with ConfigMgr and you want to move from hybrid to standalone, see the documentation at https://docs.microsoft.com/sccm/mdm/deploy-use/change-mdm-authority. Note that as of ConfigMgr Current Branch 1610, you can change MDM authority to standalone from hybrid without contacting Microsoft support.

Subsequent sections explain how to configure co-management on Windows 10 devices. Each is based on the starting states of those clients: existing Intune clients, existing ConfigMgr clients, or new devices. Use one or more of these sections to move your selected clients to co-management.

The final section explains how to select and transition workloads from ConfigMgr to Intune. This should be performed when you are ready to move those workloads. You do not need to move all clients when you move a workload; you can phase out that change across a group of client devices.

Co-Management Prerequisites

Multiple simple prerequisites—both ConfigMgr and Intune prerequisites—are required for co-management:

images ConfigMgr Version: Configuration Manager Current Branch version 1710.

images Licenses: Microsoft Enterprise Mobility + Security (EMS) license for users or Microsoft Intune and Azure AD Premium. While Azure AD Premium is not strictly required for co-management, it is required for conditional access to Office 365 and other SaaS apps protected by Azure AD, MDM auto-enrollment, self-service BitLocker recovery, and Enterprise State Roaming.

images Microsoft Intune Tenant Authority: The Microsoft Intune tenant should be set to a standalone authority and configured via the Microsoft Azure portal. The documentation at https://docs.microsoft.com/sccm/mdm/deploy-use/change-mdm-authority discusses moving from hybrid to standalone. The tenant should also be configured for Windows 10 device enrollment. For details on how to configure Intune for Windows 10 device enrollment, see https://docs.microsoft.com/intune/windows-enroll.

images Windows 10 Version: Windows 10 devices should be running the Fall Creators Update or later (version 1709 or later).

images Configure Hybrid Azure AD Join: To join existing ConfigMgr clients, you must set up hybrid Azure AD Join in your Active Directory environment. The Azure AD documentation discusses how to do so at https://docs.microsoft.com/azure/active-directory/device-management-hybrid-azuread-joined-devices-setup.

images Cloud Management Gateway (Optional): Installing ConfigMgr clients from the Internet using Microsoft Intune requires that you deploy a cloud management gateway (CMG). The CMG site system acts as a Microsoft Azure hosted channel for Internet-connected ConfigMgr clients. You cannot use an Internet-based client management (IBCM) management point (MP), as that requires the client to be on-premise for initial installation. You do not require a CMG to enable co-management; however, it does enable ConfigMgr to manage co-managed clients on the Internet. For more information on the CMG, see Chapter 4, “Architecture Design Planning,” and Chapter 9, “Client Management.”

images Cloud Distribution Point (Optional): To leverage the CMG and fully manage ConfigMgr clients, consider deploying a cloud distribution point (DP), which you can use to deploy complex applications to co-managed Windows 10 devices.

Enabling Devices for Co-Management

This section covers the ways to enable existing Microsoft Intune or ConfigMgr clients for co-management. You need to configure one or more of these onboarding options, although you do not have to enable all options. For more information, see the co-management documentation at https://docs.microsoft.com/sccm/core/clients/manage/co-management-prepare.

Windows 10 Devices with ConfigMgr Clients

The approach described in this section is the simplest way to enable co-management. Essentially, ConfigMgr uses a new feature of Windows 10 version 1709 (Windows 10 Fall Creators Update) to trigger an automated enrollment into MDM enrollment. This can be enabled from the Co-management Onboarding Wizard. Perform the following steps to launch the wizard:

1. In the ConfigMgr console, navigate to Administration -> Overview -> Cloud Services -> Co-management. Choose Configure co-management to launch the wizard.

2. On the Subscription page, click Sign In and enter the credentials of an Intune service administrator or a tenant global administrator. Click Next.

3. On the Staging page, choose how you want to enable co-management on your ConfigMgr clients:

images Pilot group: This is the inclusive method of enabling co-management, where you must include each collection where you want to enable co-management. This allows you to granularly control enabling co-management. You can either change the definition of the collections as required or change the pilot group collections by using the co-management properties.

images Production: This is an exclusive method of enabling co-management, where you must exclude each collection in which you do not want to enable co-management. This allows you to automatically opt in any new ConfigMgr clients for co-management, regardless of their collection membership, while excluding any Windows 10 devices where you do not want to enable co-management.

4. On the Enablement page, choose either Pilot or All, depending on what you chose on the Staging page in step 3. This triggers the configured enablement of co-management of Windows 10 devices with the ConfigMgr agent.

Windows 10 Devices Enrolled in Intune

For devices enrolled in Intune, you can configure Intune to install the ConfigMgr client via Intune’s Windows Installer software distribution method. This is accomplished using the traditional ccmsetup.msi installation method, along with additional command-line options to enable the location and authentication to the CMG. Chapter 9 discusses how to enable this method. To obtain the required command-line parameters, perform the following steps:

1. In the ConfigMgr console, navigate to Administration -> Overview -> Cloud Services -> Co-management.

2. Select Configure co-management to launch the wizard.

3. On the Subscription page, click Sign In to sign in as an Intune service administrator or tenant global administrator.

4. In the Enablement page, see the Devices enrolled in Intune section of the wizard for the command line required to install the client from Intune.

New Windows 10 Devices

If you have new Windows 10 devices that are being built not using operating system deployment (OSD) but using a modern provisioning method, you can use this method to enable co-management. This method is essentially a variation of the method described in the “Windows 10 Devices Enrolled in Intune” section, earlier in this appendix, and uses either the AutoPilot service or Azure AD Join via OOBE to trigger MDM enrollment in Microsoft Intune. Once you are enrolled in Intune, Intune can push the ConfigMgr client via ccmsetup.msi installation.

To enable this method, follow these steps:

1. Configure AutoPilot for new Windows 10 devices with the help of the documentation at https://docs.microsoft.com/windows/deployment/windows-10-auto-pilot.

2. Have AutoPilot trigger Azure AD Join automatically by following the documentation at https://docs.microsoft.com/intune/windows-enroll#enable-windows-10-automatic-enrollment. This also causes manually configured Azure AD Join to be automatically enrolled in Microsoft Intune. Manual Azure AD Join can be triggered during OOBE, when the user selects My work or school owns it when asked who owns the PC; in this case, the user can select Join Azure AD. Azure AD Join can also be performed on an existing Windows 10 device by using the Settings app: Go to System -> About and select Join Azure AD.

3. Configure Intune to install the ConfigMgr agent by following the steps outlined earlier in this appendix, in the “Windows 10 Devices Enrolled in Intune” section.

Moving Workloads from ConfigMgr to Intune

When co-management is enabled, you can use the co-management settings to choose which workloads are enabled. This can be done from the Co-management Onboarding Wizard or the co-management properties after completing the wizard. It is anticipated that Microsoft will continue to invest in adding support for transitioning new workloads with each new release of ConfigMgr. The following are workloads you can move from ConfigMgr to Intune:

images Compliance Policies: Moving this workload to Intune enables you to leverage Intune to assess device compliance for the purposes of Azure AD conditional access. For more information, refer to the “Choosing Where to Start with Co-Management” section, earlier in this appendix. For information on how to configure compliance policies for Windows 10 devices in Microsoft Intune, see https://docs.microsoft.com/intune/compliance-policy-create-windows.

images Resource Access Profiles: Moving this workload to Intune enables you to push resource access profiles to Windows 10 via MDM. Resource access profiles include VPN, certificate, Wi-Fi, or email account (for the Mail Universal Windows Platform [UWP] app) profiles. For information on how to configure resource profiles for Windows 10 devices in Microsoft Intune, see the following links:

images Certificates: https://docs.microsoft.com/intune/certificates-configure

images Wi-Fi Profiles: https://docs.microsoft.com/intune/wi-fi-settings-configure

images VPN Profiles: https://docs.microsoft.com/intune/vpn-settings-configure

images Windows Update for Business Policies: Moving this workload to Intune enables you to move to modern servicing, where you define deferral policies for Windows 10 feature and/or quality updates. This is accomplished by configuring Windows 10 update rings in Microsoft Intune. For more information, see https://docs.microsoft.com/intune/windows-update-for-business-configure. These updates are then delivered directly from Windows Update for Business.

You can switch workloads from ConfigMgr to Intune by modifying the properties of the co-management configuration at Administration -> Overview -> Cloud Services -> Co-management. For more details on how to switch workloads from ConfigMgr, see the co-management documentation at https://docs.microsoft.com/sccm/core/clients/manage/co-management-switch-workloads.

TIP: MONITORING CLIENT-SIDE CO-MANAGEMENT STATES

ConfigMgr provides a SQL Server view (v_ClientCoManagementState) and a site provider Windows Management Instrumentation (WMI) class (SMS_Client_CoManagementState) to monitor the client-side rollout of co-management. You can use the v_ClientCoManagementState view to build reports to track the enablement of co-management and the automatic MDM enrollment into Intune triggered by ConfigMgr. The SMS_Client_CoManagementState class can be used to create collections in ConfigMgr, which can be used for monitoring or to target deployments based on MDM state.

Note that for a client to be co-managed, both the MDMEnrolled column/property and the CoMgmtPolicyPresent column/property must be set to a value of 1.

In addition to these workloads, you can also trigger remote actions on Windows 10 devices co-managed with Intune and ConfigMgr. These actions are triggered from the Microsoft Intune blade in Azure Portal:

images Factory reset

images Selective wipe (not applicable for Azure AD Join devices)

images Delete device

images Restart device

images Fresh start

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset