MDlab - Lab Guide - v2
MDlab - Lab Guide - v2
MDlab - Lab Guide - v2
Version: 1803
Table of Contents
1 Introduction............................................................................................................................................... 7
1.1 Lab Overview................................................................................................................................................ 12
2 Prerequisites............................................................................................................................................ 14
2.1 On-Premises Environment...................................................................................................................... 14
3 Lab Setup.................................................................................................................................................. 16
3.1 On-Premises Environment...................................................................................................................... 16
4 Servicing.................................................................................................................................................... 36
4.1 Windows Analytics Update Compliance..................................................................................... 36
4.1.1 .......................................................................................................... Sign-Up and Overview
.....................................................................................................................................................................36
4.1.2 ..................................................................................................................... Need Attention!
.....................................................................................................................................................................39
4.1.3 .......................................................................................................... Security Update Status
.....................................................................................................................................................................43
4.1.4 ............................................................................................................ Feature Update Status
.....................................................................................................................................................................45
4.1.5 ............................................................................................... Windows Defender AV Status
.....................................................................................................................................................................47
6 Security................................................................................................................................................... 128
6.1 Credential Guard...................................................................................................................................... 128
6.1.1 ................................................................................. Check Credential Guard Requirements
...................................................................................................................................................................128
6.1.2 ............................................................................................................. Modern Management
...................................................................................................................................................................130
6.1.3 ........................................................................................................ Traditional Management
...................................................................................................................................................................132
7 Compatibility........................................................................................................................................ 206
7.1 Windows Analytics Upgrade Readiness.......................................................................................... 206
7.1.1 .......................................................................................................... Sign-Up and Overview
...................................................................................................................................................................206
7.1.2 ......................................................................... Configure Upgrade Readiness (OPTIONAL)
...................................................................................................................................................................209
7.1.3 ............................................................................. Deploy Upgrade Readiness (OPTIONAL)
...................................................................................................................................................................211
7.1.4 .................................................................... Review Upgrade Readiness Data (OPTIONAL)
...................................................................................................................................................................211
Microsoft 365 comprises the best of Windows 10, Office 365 ProPlus and Enterprise Mobility +
Security giving you a direct path to a modern desktop.
A modern desktop is Windows 10 and Office 365, kept up to date. Making the shift to a modern
desktop helps you to foster a highly secure workspace, empowered by the latest productivity,
teamwork and collaboration experiences for your organization. As an IT Admin, making the shift
also removes much of the pain of keeping your desktop environment secure with built in end
point protection and easier access to the latest security updates, as well as improved
information protection and integrated identity and access management. Deploying new PCs or
getting PCs back to a business ready state gets easier and you can keep your user populations
happy and secure with the most up to date experiences.
This is best achieved through Microsoft 365, which brings together Office 365 with Windows 10
Enterprise, and Enterprise Mobility + Security, in a complete intelligent solution. The chart below
summarizes key steps required to make the shift.
The first step of your deployment is to create a high-level plan and get necessary approvals and
project sponsors. Next you can assemble your teams and assign areas of responsibility across
the following eight steps:
1. Device and App Readiness. Now with the broad plan in place, you can focus on
assessing your current devices. For that, we’ve built new tools with Windows Analytics:
Upgrade Readiness to help identify devices, OS versions, apps, add-ins, drivers and more
to assess those against compatibility information to help target your initial deployments.
Continue with this tool as you test and mitigate for app compatibility.
Where to start: Windows Analytics, ConfigMgr CB HW/SW inventory
2. Directory and Networking Readiness. This is the next step and is your plan for
implementing Azure Active Directory – if not currently in use – as well as getting your
network ready for moving system images, application packages and user files across
your network to support later deployment and migration activities.
Where to Start: Azure AD, Peer Cache, Branch Cache, C2R Binary Delta Compression,
EXO archive + OST limit
Where to Go Next: Delivery Optimization
3. Office and Line of Business App Delivery carries on from readiness planning and is the
process of collecting app packages, packaging applications, making necessary changes
to intranet or web-based apps to support modern browsers and determining how apps
will be delivered to users’ devices. Common delivery options include installation as part
of an installation sequence, preinstalling in captured images, installation via Business
Store or user self-installation from a Company Portal in Intune or Software Center in
System Center Configuration Manager (ConfigMgr).
Where to Start: Click-to-Run, MSI for LOB apps
Where to go next: MSIX/Desktop Bridge, Store
4. User Files and Settings Migration is necessary in PC replacement scenarios and can be
accomplished by implementing services like file sync in OneDrive for Business in advance
of PC replacement, using the User State Migration Tool as part of the ConfigMgr or MDT
installation sequence at deploy time or using custom solutions to copy files from the
source PCs typically to a network share and finally back on to new PCs. This step is often
a timing bottleneck for PC replacement, due to the physics involved in transferring
sometimes hundreds of GB per PC each direction. Leveraging cloud file sync with
OneDrive for Business and files on demand can help limit the amount of files delivered
back to the new PC.
Where to Start: User State Migration Tool (USMT), 3rd party, scripting, manual
Where to go Next: OneDrive Known Folder Move
5. Security & Compliance is the targeting of which new capabilities are implemented as
well as how to prepare for existing security and compliance tools. A common
consideration is how to deal with third party disk encryption for in-place PC refresh or
upgrade scenarios; these services can be challenging to disable in Windows 7 and re-
enable in Windows 10. Further considerations include anti-malware strategies and which
new capabilities to implement in Windows 10.
6. OS Deployment and Feature Updates. The deployment and servicing functions here
are combined because Feature Updates use a process similar to in-place upgrades and
follow similar hardware and app validation processes. Prior to carrying out OS
Deployment, it’s important to plan how you phase the roll-out. The recommended
approach is to use deployment rings, where a representative set of hardware and apps is
targeted to early adopters in your organization. You can use Windows Analytics to target
PCs least likely to experience hardware or software issues and note which devices and
applications pass or fail post install. There are three primary deployment types when
moving to a new operating system:
PC refresh – this is an upgrade to an existing computer that will remain with the
same user. It is accomplished via in-place upgrade or in-place wipe-and-reload.
In these cases, user state using either install option can remain on the local disk
and in the case of in-place upgrade, apps can also remain installed. You can
customize PC refresh by using an automated task sequence to update application
versions or remove unwanted files and apps.
New PC – this is when a user is given a new PC without the expectation to move
files from another PC. This scenario is used for new users or cases where
important files are stored outside the local hard drive – such as desktop or app
virtualization – or cases when users are tasked with backing up and restoring
their local data
In addition to the tools and processes you may already be using to deploy Windows or
Office for these three deployment types – such as ConfigMgr or the Microsoft
Deployment Toolkit - For new PC scenarios, the new Windows Autopilot deployment
service allows you to work with select OEMs to configure devices before shipping to end
users and PCs can be customized as part of the setup process when users connect to the
Internet and sign in to the device. The process can continue by leveraging Microsoft
Intune to install apps – like Office 365 ProPlus – and configure policies over the web to
make the device business ready.
7. User Communication and Training is critical to driving usage of new capabilities for
enhancing teamwork, communications and productivity. Before broad deployment is
targeted to users outside early adopter rings, User Communication and Training should
be planned to drive desired changes in how people use new capabilities in Office,
Windows or other line of business apps and services. If you’re deploying Office 365
ProPlus for the first time, this is when you can communicate the benefits of signing in to
Office apps and saving files to OneDrive or SharePoint locations to enable easier sharing,
reduce file branching and enable real-time co-authoring. Detailed training templates for
these and other local or browser-based apps, like Teams and Planner or in-app
capabilities like attaching to OneDrive in Outlook or PowerPoint Morph and Designer are
available. Windows 10 user capabilities like Windows Hello to log in securely with
biometrics, Start Menu updates to personalize your Windows experience, Timeline to
easily get back to what you were working on, Focus Assist to help minimize distractions,
Nearby Sharing Virtual Desktops, Cortana and more are great differentiators to inform
and prepare users to take advantage of. You can use Microsoft FastTrack services and
resources like the Productivity Library to help drive usage of new capabilities.
Additionally, the reporting and analytics are available via the Microsoft 365 and Office
365 admin portals as well as built-in and integrated Power BI usage dashboards. With
Windows 10 and Office 365 ProPlus, we made the shift to delivering both experiences as
a service, which introduces new ways for how we build, deploy and service Windows and
Office.
8. Windows and Office as a Service. There are a couple of concepts core to Windows and
Office as a service. The first is semi-annual Feature Updates which deliver new
capabilities in the Fall and Spring. Second are monthly cumulative Quality Updates which
contain security, reliability and bug fixes. Office 365 ProPlus also has the option for a
Monthly Channel with feature updates that are fully-supported. Each semi-annual
Feature Update release will be serviced for 18 months from the initial date of release, so
you have the option of skipping semi-annual updates, while continuing to receive
monthly Quality Updates. To help ensure all of your devices are being kept up to date
with the latest updates, we’ve also added Update Compliance capabilities to Windows
Analytics. So for any Feature Update release there are usually three phases to consider
from the IT point of view – evaluation, piloting and broad production deployment. In
fact, the process follows a scaled down version of the desktop deployment process
highlighted here, so the skills and tools used will help you keep your desktops current
and up-to-date with the latest capabilities.
Hopefully this gives you a better idea of how to plan your path to a modern desktop. While
there may be some up front learning to take advantage of new resources and updated
approaches, the value of making the shift should outweigh the initial investment. Microsoft’s
comprehensive guidance should also help you to move to Windows 10, Office, and take
advantage of modern management with Enterprise Mobility + Security, more efficiently.
Lab Setup
o On-Premises Environment
o Cloud Environment
o On-Premises Environment Post Setup Manual Steps
Servicing
o Windows Analytics Update Compliance
o Servicing Windows 10 with Configuration Manager
o Servicing Office 365 ProPlus with Configuration Manager
o Known Folder Migration
Deployment & Management
o Modern Device Deployment
o Modern Device Management
o Office 365 ProPlus Deployment
o BIOS to UEFI Conversion
o Modern Application Management
o Enterprise State Roaming
o Remote Access (VPN)
Security
o Credential Guard
o BitLocker
o Windows Defender Advanced Threat Protection
o Windows Defender Antivirus
o Windows Hello for Business
o Windows Defender Exploit Guard
o Windows Information Protection
o Windows Defender Application Control
o Windows Defender Application Guard
Compatibility
o Windows Analytics Upgrade Readiness
o Desktop Bridges
o Browser Compatibility
o Windows App Certification Kit
Appendix
o Upgrading to Configuration Manager Current Branch
o Configuring Windows Analytics
o Wipe and Load
o Application Virtualization
o Troubleshooting the SCCM Client Install
2 Prerequisites
The following requirements for each environment are needed to support the labs.
Complete Task
☐ The customer will provide a total of five (5) client devices.
Three (3) devices that have a new or corporate image–based installation
of Windows 7 Release to Manufacturing (RTM) or later, running a sample
of customer applications. If possible, include at least one touch device.
These devices will be used for the labs on Windows 10 in-place upgrade
and BIOS to UEFI conversion.
Two (2) devices of the same architecture (32-bit or 64-bit) that can be
formatted or do not have a corporate image installed that are compatible
with Windows 10 hardware specifications. These devices will be used for
the labs on Wipe and Load and Credential Guard.
☐ One (1) physical server or workstation to host the virtual lab environment. The
requirements are listed below:
Operating System: Windows Server 2016, 2012 R2, or Windows 10 with
Hyper-V installed (recommended to use Windows Server OS) and fully
updated. Administrative rights on the host.
Memory: At least 32Gb or more.
Disk Space: At least 300Gb or more.
Disk Subsystem: High throughput/speed.
Ethernet: Two (2) or more Gb NICs.
Network Connections: Internet connection and lab switch.
Applications: Microsoft Azure PowerShell modules installed
(https://docs.microsoft.com/en-us/powershell/azure/install-azurerm-ps?
view=azurermps-4.0.0).
☐ One (1) gigabit network lab switch with sufficient ports to connect client devices
and lab environment.
☐ Download the Windows 10 Enterprise dev environment for Hyper-V.
https://developer.microsoft.com/en-us/windows/downloads/virtual-machines
☐ Download the latest Windows 10 from MSDN or VLSC that matches the
architecture of the current image installed on the client devices.
☐ Download the latest Windows 10 Assessment and Deployment Kit.
https://go.microsoft.com/fwlink/?linkid=873065
☐ [OPTIONAL] Provide the source of any security guidance that is being used with
HTML Reports and GPO Backups.
Complete Task
☐ Provide licensed subscriptions or sign-up for a trial subscription for the following
Microsoft Cloud Services. A trial subscription will only be used if the customer has
no existing subscription to these services.
Microsoft Azure: https://azure.microsoft.com/en-us/free/
Enterprise Mobility + Security: http://www.microsoft.com/en-us/cloud-
platform/enterprise-mobility-security-trial (configured as part of the Lab
Setup)
Windows Defender Advanced Threat Protection:
http://www.microsoft.com/en-us/WindowsForBusiness/windows-atp
(configured as part of the Lab Setup)
Operations Management Suite: http://www.microsoft.com/en-us/cloud-
platform/operations-management-suite-trial
Office 365 Enterprise E5: https://aka.ms/e5trial (configured as part of the
Lab Setup)
Follow the Microsoft 365 Powered Device Lab Kit – Setup Guide to provision the virtual
machines on Hyper-V.
When setup is complete, the following virtual machines are configured and the deployment lab
system is available for use.
The table below lists the credentials and access type available in the default implementation.
In this section, you will learn how to use the Configuration Manager console to locate and install
updates that provide fixes and new capabilities to your Configuration Manager infrastructure
and clients.
Note: This lab can only be performed if the System Center Configuration Manager environment
is on Current Branch.
3.3.1.1 Configure as Online Mode
In this activity, you will locate and install Configuration Manager updates from the internet
connected site server. Follow this activity if your environment has internet connection (if not,
move to the next activity 3.3.1.2).
In the activity, you will locate and install Configuration Manager updates from another computer
that has internet connection. Follow this section if your environment has no internet
connection.
For this task, you will build, and domain-join a Windows 7 virtual machine that will be used to
perform the upgrade later.
In the activity, you will build Windows 10 1709 client virtual machine.
In the activity, you will build Windows 10 1803 client virtual machine.
In this activity, you will build Windows 10 client virtual machine with developer tools installed.
Update Compliance:
Uses telemetry gathered from user devices to form an all-up view of Windows 10 devices
in your organization.
Enables you to maintain a high-level perspective on the progress and status of updates
across all devices.
Provides a workflow that can be used to quickly identify which devices require attention.
Summarizes Windows Defender Antivirus status for devices that use it.
The Operations Manager Suite Experience Center will be used to evaluate Windows Analytics
Update Compliance using read-only demo data and will not require devices to be configured to
send telemetry to the Update Compliance service.
Note:
This lab guide is aimed at getting you familiar with Update Compliance workspace. It is
not supposed to be a comprehensive guide to using the solution in your organization.
4. Click the Update Compliance tile which will open the Update Compliance
workspace.
General In Update Compliance, data is separated into vertically-sliced sections. Each section
Workspace is referred to as a blade. Within a blade, there may or may not be multiple tiles,
Information which serve to represent the data in different ways.
Blades are summarized by their title in the upper-left corner above it. Every number
displayed in OMS is the direct result of one or more queries. Clicking on data in
blades will often navigate you to the query view, with the query used to produce that
data.
Some of these queries have perspectives attached to them; when a perspective is
present, an additional tab will load in the query view.
These additional tabs provide blades containing more information relevant to the
results of the query.
Overview Blade 5. The Overview blade provides a summarization of all the data Update Compliance
focuses on. It functions as a hub from which different sections can be navigated to.
6. The total number of devices detected by Update Compliance are counted within the
title of this blade.
7. What follows is a distribution for all devices as to whether they are up to date on:
Quality updates: A device is up to date on quality updates whenever it has the
latest applicable quality update installed. Quality updates are monthly
cumulative updates that are specific to a version of Windows 10.
Feature updates: A device is up to date on feature updates whenever it has the
latest applicable feature update installed. Update Compliance considers
Servicing Channel when determining update applicability.
AV Signature: A device is up to date on Antivirus Signature when the latest
Windows Defender Signatures have been downloaded. This distribution only
considers devices that are running Windows Defender Antivirus.
8. The blade also provides the time at which your Update Compliance workspace was
refreshed.
Example:
9. Below the “Last Updated” time, a list of the different sections follows that can be
clicked on to view more information, they are:
Need Attention!: This section is the default section when arriving to your
Update Compliance workspace. It counts the number of devices which are
encountering issues and need immediate attention; clicking into this provides
blades that summarize the different issues that devices are encountering, and
provides a List of Queries that Microsoft finds useful.
Security Update Status: This section lists the percentage of devices that are on
the latest security update released for the version of Windows 10 it is running.
Clicking into this section provides blades that summarize the overall status of
Quality updates across all devices; including deployment.
Feature Update Status: This section lists the percentage of devices that are on
the latest feature update that is applicable to a given device. Clicking into this
section provides blades that summarize the overall feature update status across
all devices, with an emphasis on deployment progress.
3. Under Device issues click Out of support OS Version to take you to the Log Search
view for more information.
4. Click Table to get a table view of all devices on an unsupported OS.
5. Change the date range in the top left to 7 DAYS then click OK.
6. Edit the filter for the column FeatureDeferralDays to Is greater than 0 to look at
any devices that may not have been upgraded due to deferral.
7. Click the Home button and then navigate back to Update Compliance.
11. Change the date range in the top left to 1 DAY then click OK.
12. In the left hand pane, scroll down to DEPLOYMENTERROR to view the types of
errors that are causing updates to fail.
13. Note log search query
WaaSDeploymentStatus | where DeploymentStatus=="Failed"
14. Click Disk Full then Apply to see all devices that are failing due to not enough free
disk space.
15. Note log search query
WaaSDeploymentStatus | where DeploymentStatus=="Failed" | where
( DeploymentError == "Disk Full" )
16. Remove | where ( DeploymentError == "Disk Full" ) from the end of the query
and click the Search button to return you to the original query.
17. Click the Home button and then navigate back to Update Compliance.
List of Queries 18. This blade contains a list of queries with a description and a link to the query. These
queries contain important meta-information that did not fit within any specific
section or were listed to serve as a good starting point for modification into custom
queries.
19. Browse and modify queries at your own pace.
20. The OMS search query reference is available on docs.microsoft.com:
https://docs.microsoft.com/en-us/azure/log-analytics/log-analytics-search-reference
4.1.3 Security Update Status
The Security Update Status section provides information about quality updates across all
devices. The section tile within the Overview Blade lists the percentage of devices on the latest
security update to provide the most essential data without needing to navigate into the section.
2. The Overall Quality Update Status provides a visualization of devices that are and
are not up-to-date on the latest quality updates (not just security updates). Below is
an example of the visualization showcasing all devices further broken down by OS
Version.
Latest Security 8. The Latest Security Update Status provides a visualization of the different
Update Status deployment states devices are in regarding the latest update for each build (or
and Previous version) of Windows 10. The Previous Security Update Status blade provides the
Security Update same information without the accompanying visualization.
Status 9. What follows is a breakdown of the different deployment states reported by devices:
Installed devices are devices that have completed installation for the given
update.
When a device is counted as “In Progress” or “Deferred”, it has either begun the
installation process for the given update or has been intentionally deferred or
paused using WU for Business Settings.
Devices that have “Update Failed”, failed updating at some point during the
installation process of the given security update.
If a device should be, in some way, progressing toward this security update, but
its status cannot be inferred, it will count as Status Unknown. Devices not using
Windows Update are the most likely devices to fall into this category.
10. Drill down as required.
11. Click the Home button and then navigate back to Update Compliance.
2. The Overall Feature Update Status blade breaks down how many devices are up-to-
date or not, with a special callout for how many devices are running a build that is
not supported. The table beneath the visualization breaks devices down by Servicing
Channel and OS Version, then defining whether this combination is up-to-date, not
up-to-date or out of support.
3. Drill down as required.
4. Click the Home button and then navigate back to Update Compliance\Feature
Update Status.
Deployment 5. To effectively track deployment, Deployment Status Blades are divided into each
Status by Servicing Channel chosen for the device. This is because Deployment for each
Servicing channel will happen at different periods in time and feature updates are targeted
Channel separately for each channel. Within each Deployment Status tile, devices are
aggregated on their feature update distribution, and the columns list the states each
device is in.
Here are some important terms when utilizing the Windows Defender AV Status
section of Update Compliance:
Signature out of date devices are devices with signature older than 14 days.
No real-time protection devices are devices who are using Windows Defender
AV but have turned off Real-time protection.
Recently disappeared devices are devices that were previously seen by Windows
Defender AV and are no longer seen in the past 7 days.
Remediation failed devices are devices where Windows Defender AV failed to
remediate the threat. This can be due to reason like disk full, network error,
operation aborted, etc. Manual intervention may be needed from IT team.
Not assessed devices are devices where either a third-party AV solution is used
or it has been more than 7 days since the device recently disappeared.
2. The Protection Status blade gives a count for devices that have either out-of-date
signatures or real-time protection turned off.
3. Click Real-time protection is off.
4. Change the date range to 1 DAY then click OK.
5. On the left hand side scroll down to DETAILEDSTATUS and look at the reasons
why Real-time protection is off.
6. Drill down as required.
7. Click the Home button and then navigate back to Update Compliance\Windows
Defender AV Status.
Threat Status 8. The Threat Status blade provides a visualization of devices that have encountered
threats and how many were and were not remediated successfully.
13. Drag the ThreatAlertLevel field onto the bar below the List and Table buttons to
group by ThreatAlertLevel.
14. Scroll back to the left of the table and you will see the query is grouped by
ThreatAlertLevel and you will be able to expand and collapse the groups. Unless
you change the number of items that are displayed per page, you may still need to
cycle through the pages to look at all the results.
15. Set the results to show 200 items per page.
In this section, you will go through how to configure Configuration Manager to support the new
model of Windows as a Service.
Note: This lab can only be performed if the System Center Configuration Manager environment
is on Current Branch.
Note: This lab can only be performed if the System Center Configuration Manager environment
is on Current Branch.
You can enable the Office COM object by using either the Office Deployment Tool or Group
Policy.
This lab guide will use Group Policy to enable Office COM Objects. This does the same thing as
setting the OfficeMgmtCOM attribute to True in the configuration.xml file used by the Office
Deployment Tool. But, with Group Policy, you can apply this setting to multiple computers, an
organizational unit (OU), or a domain.
7. Go to
C:\SYSVOL\sysvol\corp.contoso.com\Policies\PolicyDefinitions to
your domain's Central Store.
8. Paste the .admx file in your domain's Central Store and the .adml file in
the appropriate language subfolder (such as en-us). Note: If you get an
“Access Denied” alert when pasting the files, right click the Policy
Definitions folder, and then click Properties>Security>Advanced. Click
Task Detailed Steps
the Permissions tab, click “Select principal” and add “Labadmin” with
full permissions.
9. Go to Server Manager>Tools>Active Directory Users and
Computers and right-click CORP, then click Organizational Unit.
5.1.1 AutoPilot
Windows AutoPilot is a collection of technologies used to set up and pre-configure new devices,
getting them ready for productive use.
In this section, you will use the Microsoft Intune to configure AutoPilot for pre-configuring
devices.
5.1.1.1 Prerequisites
After you complete the following tasks, you are ready to manage mobile devices and computers.
In this activity, you will configure automatic MDM enrollment to Intune upon joining Azure AD.
In this activity, you will add an app to Intune which will automatically download once the device
is enrolled into MDM.
In this activity, you will configure automatic MDM enrollment to Intune upon joining Azure AD.
5.1.1.6 AutoPilot
In this activity, you will walk through the experience of self-service AutoPilot while in OOBE.
In this section, you will go through the process of automating the upgrade process through
System Center Configuration Manager for enterprise wide deployments or, optionally,
performing manual upgrade for very small scale scenarios. At the end of the section, the device
will be upgraded to Windows 10.
Note: The Trial Download of the Windows 10 Enterprise Media does not allow an In-Place
Upgrade to be performed. To complete this lab, Windows 10 Enterprise Media must be sourced
from either MSDN Subscriber Downloads or from the Volume Licensing Site of the customer.
Note: This lab can only be performed if the System Center Configuration Manager environment
is on Current Branch.
5.1.2.1 Prerequisites
This activity will perform an in-place upgrade of the Windows 7 device to Windows 10 using
System Center Configuration Manager (current branch).
Note: Only perform this activity if the System Center Configuration Manager deployed is version
1802 or newer. If not, skip this and perform the next section.
In this section, you will perform a manual in-place upgrade to Windows 10 on a Customer-
Provided device. The requirements are as follows:
Note: Download and Install the latest Windows 10 Assessment and Deployment Kit.
https://go.microsoft.com/fwlink/?linkid=873065 on CLIENT1.
When considering your content distribution strategy for Windows 10, think about enabling a form of
peer-to-peer content sharing to reduce bandwidth issues during updates. Windows 10 offers two peer-to-
peer options for update content distribution: Delivery Optimization and BranchCache. These technologies
can be used with several of the servicing tools for Windows 10. Two methods of peer-to-peer content
distribution are available in Windows 10.
Note: System Center Configuration Manager has an additional feature called Client Peer Cache
that allows peer-to-peer content sharing between clients you use System Center Configuration
Manager to manage, in the same Configuration Manager boundary Group. For more information,
see Client Peer Cache.
9. Right-click the Organizational Unit created above and click Create a GPO
in this domain and link it here.
After you complete the following tasks, you are ready to manage mobile devices and computers.
This section outlines how to enroll a Windows 10 device into Microsoft Intune for MDM.
This section outlines how to configure Policies for Windows 10 in Intune available through the
Intune Interface and a Policy through OMA-URI.
Use the Microsoft Intune Windows Phone OMA-URI Policy to deploy OMA-URI (Open Mobile
Alliance Uniform Resource Identifier) settings that can be used to control features on Windows
Phone Devices. These are standard settings that many mobile device manufacturers use to
control device features.
This capability is intended to allow you to deploy Windows 10 Settings that are not configurable
with an Intune Policy. For information about the Settings you can configure with these Policies,
see Configure Security Policy for Mobile Devices in Microsoft Intune.
For help creating OMA-URI Settings for Windows 10 Services, see Windows Phone 10 CSP
Documentation - http://aka.ms/win10csp.
In this lab, you will setup and configure Mobile App Management for an unmanaged Windows
10 device.
5.2.4 Co-Management
Starting with Configuration Manager version 1802, co-management enables you to concurrently
manage Windows 10, version 1803 (also known as the April 2018 Update) devices by using both
Configuration Manager and Intune. It’s a solution that provides a bridge from traditional to
modern management and gives you a path to make the transition using a phased approach.
After you enable co-management, Configuration Manager continues to manage all workloads.
When you decide that you are ready, you can have Intune start managing available workloads.
You can have Intune manage the following workloads: Compliance policies, Windows Update for
Business policies, Resource Access policies, and Endpoint Protection.
5.2.4.1 Prerequisites
Once Co-management is enabled, devices in the Pilot group can automatically enroll into
Intune. This requires using a verified domain during the Setup Process of Azure AD Connect.
For unverified domains, co-management can still be enabled by enrolling the domain-joined
device into Intune.
Licensing
Deployment
Updates (Channel Management)
Further information on the similar and differences are in the About Office 365 ProPlus in the
enterprise
Enterprise Managed
Locally Managed
Cloud Managed
Further information on the 3 scenarios are in the Best practices: Recommended deployment
scenarios
Monthly
Semi-Annual (Targeted)
Semi-Annual
Further information on Office365 ProPlus Channels are in Overview of update channels for
Office 365 ProPlus
[Within the Windows PE environment]: Convert any attached MBR-formatted disk to GPT,
including the system disk.
[From within the currently running OS]: Convert any attached MBR-formatted disk to
GPT, including the system disk.
Note: MBR2GPT is available in Windows 10 version 1803, also known as Windows 10 April 2018
Update, and later versions. The tool is available in both the full OS environment and Windows
PE.
5.4.1 Prerequisites
Perform the following tasks before proceeding.
In the following section, you will assign the Line-of-business app to users and devices.
Separation of corporate and consumer data – Organizations are in control of their data,
and there is no mixing of corporate data in a consumer cloud account or consumer data
in an enterprise cloud account.
Enhanced security – Data is automatically encrypted before leaving the user’s Windows
10 device by using Azure Rights Management (Azure RMS), and data stays encrypted at
rest in the cloud. All content stays encrypted at rest in the cloud, except for the
namespaces, like settings names and Windows app names.
Better management and monitoring – Provides control and visibility over who syncs
settings in your organization and on which devices through the Azure AD portal
integration.
5.6.1 Prerequisites
Perform the following tasks before proceeding.
5.7.1 Prerequisites
Perform the following tasks before proceeding.
In this activity, you will configure VPN profiles through the Settings app.
In this activity, you will configure VPN profiles through PowerShell and ProfileXML.
Credential Guard
BitLocker
Windows Defender Advanced Threat Protection
Windows Defender Anti-Virus
Windows Hello for Business
Windows Defender Exploit Guard
Windows Information Protection
Windows Defender Application Control
Windows Defender Application Guard
Credential Guard provides an additional layer for protecting secrets, specifically domain user
credentials by storing them in a container, secured by the Virtual Secure Mode (VSM), based on
Virtualization Based Security (VBS).
These types of containers are separated both from the kernel and the user mode, therefore
increasing the difficulty for an attacker, even after compromising the system to steal the
credentials directly from Local Security Authority Subsystem (LSASS), for example.
A Physical Computer with a Trusted Platform Module (TPM) chip (2.0 recommended), a
CPU with VT-x and VT-d capabilities.
Windows 10 Enterprise running on the Host.
Local Administrator Account.
It is recommended that you use a Host for testing purposes. Please do not use your
personal machines. Also, the Host must not be domain joined into your company
domain, so that there is no compliance or configuration/support issues.
Now that the required features and components are in place, activate the Virtualization Based
Security and Credential Guard.
After enabling all of the above features and settings, make sure that no errors were logged and
all the components are properly configured.
Registry 4. Browse to
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\DeviceGuard.
5. Verify if EnableVirtualizationBasedSecurity is set to 1.
6. Verify if RequirePlatformSecurityFeatures is set to 1 (Secure Boot).
7. Browse to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa.
8. Verify if the LsaCfgFlags is set to 1.
Process 9. Open Task Manager.
10. Verify the presence of Lsalso.exe.
1.2 BitLocker
In this section we will walk you through setting up BitLocker using modern and traditional
management.
BitLocker Drive Encryption is a data protection feature that integrates with the operating system
and addresses the threats of data theft or exposure from lost, stolen, or inappropriately
decommissioned computers.
BitLocker provides the most protection when used with a Trusted Platform Module (TPM)
version 1.2 or later. The TPM is a hardware component installed in many newer computers by
the computer manufacturers. It works with BitLocker to help protect user data and to ensure
that a computer has not been tampered with while the system was offline.
On computers that do not have a TPM version 1.2 or later, you can still use BitLocker to encrypt
the Windows operating system drive. However, this implementation will require the user to
insert a USB startup key to start the computer or resume from hibernation. Starting with
Windows 8, you can use an operating system volume password to protect the operating system
volume on a computer without TPM. Both options do not provide the pre-startup system
integrity verification offered by BitLocker with a TPM.
In addition to the TPM, BitLocker offers the option to lock the normal startup process until the
user supplies a personal identification number (PIN) or inserts a removable device, such as a USB
flash drive, that contains a startup key. These additional security measures provide multifactor
authentication and assurance that the computer will not start or resume from hibernation until
the correct PIN or startup key is presented.
The below section will walk you through setting up BitLocker with Intune.
Stand Alone
Configuration Manager
Both of these installations include the following components: Self-Service Portal, Key Database,
Reports Database, Reports, Administration Monitoring Server, Group Policy Template.
1.2.2.1 Prerequisites
This activity will guide you through creating and deploying a group policy object that will
enforce the configuration of MBAM and BitLocker on the targeted devices.
This activity will guide you through the client experience of MBAM assuming control of
BitLocker management.
The following activity may be used to demonstrate the access and use of the Self-Service portal
provided by MBAM.
The following activity may be used to demonstrate the access and use of the Helpdesk portal
provided by MBAM.
Windows Defender ATP uses the following combination of technology built into Windows 10
and Microsoft's robust cloud service:
Endpoint behavioral sensors: Embedded in Windows 10, these sensors collect and
process behavioral signals from the operating system (for example, process, registry, file,
and network communications) and sends this sensor data to your private, isolated, cloud
instance of Windows Defender ATP.
Cloud security analytics: Leveraging big-data, machine-learning, and unique Microsoft
optics across the Windows ecosystem (such as the Microsoft Malicious Software Removal
Tool, enterprise cloud products (such as Office 365), and online assets (such as Bing and
SmartScreen URL reputation), behavioral signals are translated into insights, detections,
and recommended responses to advanced threats.
Threat intelligence: Generated by Microsoft hunters, security teams, and augmented by
threat intelligence provided by partners, threat intelligence enables Windows Defender
ATP to identify attacker tools, techniques, and procedures, and generate alerts when
these are observed in collected sensor data.
In this section, you will learn how to configure and use Windows Defender ATP to detect and
respond to threats.
Note: This lab can only be performed if the customer has already registered and approved for
the Microsoft WDATP Preview/Trial program (Section 3.2.3).
Note: The setup guide also contains instructions and links for the attack demo.
In this section you can use modern or traditional management to configure WDAV.
In this section you are going to configure Windows defender using intune.
1.4.2.1 WDAV
Add “Endpoint 1. Open the Configuration Manager Console from the Start Menu.
Protection Role” to 2. From the Configuration Manager Console, browse to Administration.
your Site 3. Expand Site Configuration.
4. Click on Servers and Site System Roles.
5. Right Click on CM1.corp.contoso.com.
6. Select Add Site System Roles.
7. Click Next on the Add Site System Roles Wizard.
8. Click Next on the Specify Internet proxy server.
9. Check Endpoint Protection Point.
10. Click OK.
11. Click Next.
12. Check box to Accept License.
13. Click Next.
14. Click Next.
15. Click Next.
16. Click Close.
Enable SCCM to 17. Click Administration.
Manage Client 18. Click on Client Settings.
Endpoint 19. Right click on Default Client Settings.
Protection 20. Click on Properties.
21. Click on Endpoint Protection.
22. Change Manage Endpoint Protection client on client computer to Yes.
23. Click on OK.
Create a Collection 24. Open the Configuration Manager Console from the Start Menu.
25. From the Configuration Manager Console, browse to Assets and Compliance.
26. Click on Devices.
27. Right click on CLIENT1.
28. Click on Add Selected Items.
29. Select Add Selected Items to New Device Collection.
30. Enter WDAV Client1 for the collection name.
31. Limit collection to All Desktop and Server Clients.
32. Select Next.
33. Select Next.
34. Select Next.
35. Select Close.
Creating a Custom 36. Open the Configuration Manager Console from the Start Menu.
Antimalware 37. From the Configuration Manager Console, browse to Assets and Compliance.
Policy 38. Expand on Endpoint Protection.
39. Click on Antimalware Policies.
40. Click on Create Antimalware Policy.
41. Fill out the form:
Name: WDAV Demo Policy
Description: WDAV Demo Policy
Check the following boxes:
Schedule scans
Scan settings
Default actions
Real-time protection
Exclusion settings
Advanced
Threat overrides
Cloud Protection Service
Definition updates
42. Click on OK.
43. Right Click on WDAV Demo Policy.
44. Click Deploy.
45. In the right hand, click on WDAV CLIENT1.
46. Click OK.
Complete these steps on the CLIENT1 virtual machine.
Check Policy 47. Open Control Panel.
Configuration 48. Search for Configuration Manager.
49. Open Configuration Manager.
50. Click on the Actions Tab.
51. Click on Machine Policy Retrieval & Evaluation Cycle .
52. Click on Run Now. Click OK.
53. Wait 3 to 5 minutes then continue.
54. Click Start.
55. Type Windows Defender Security Center.
56. Open Windows Defender Security Center.
57. Click on Virus and threat protection.
58. Click on Virus and threat protection settings.
59. Notice that the These settings are managed by your administrator.
In this lab, you will find all the information to deploy Windows Hello for Business in a Certificate
Trust Model in your on-premises environment.
1.5.1 Modern Management
Follow the following sections for managing Windows Hello for Business through modern
management tools.
In this lab we are going to setup Windows Hello for Business in the Cloud.
The key registration process for the On-prem deployment of Windows Hello for Business needs
the Windows Server 2016 Active Directory schema. The key-trust model receives the schema
extension when the first Windows Server 2016 domain controller is added to the forest. The
certificate trust model requires manually updating the current schema to the Windows Server
2016 schema. If you already have a Windows Server 2016 domain controller in your forest, you
can skip the next step.
Create the 7. Right-click the Users container. Click New > Group.
Windows Hello 8. Type Windows Hello for Business Users in the Group name text box.
for Business Users 9. Click OK.
Security Global
Group
Windows Hello for Business must have a public key infrastructure regardless of the deployment
or trust model. All trust models depend on the domain controllers having a certificate. The
certificate serves as a root of trust for clients to ensure they are not communicating with a rogue
domain controller. The certificate trust model extends certificate issuance to client computers.
During Windows Hello for Business provisioning, the user receives a sign-in certificate.
Note: The following instructions may be used to deploy simple public key infrastructure that is
suitable for a lab environment.
Configure and 25. Start the Group Policy Management Console (gpmc.msc).
Deploy the 26. Expand the domain and select the Group Policy Objects node in the navigation
Domain pane.
Controller Auto 27. Right-click Group Policy Objects and select New.
Certificate 28. Type Domain Controller Auto Certificate Enrollment in the Name box and
Enrollment Group click OK.
Policy Object 29. Right-click the Domain Controller Auto Certificate Enrollment Group Policy
object and click Edit.
30. In the navigation pane, expand Policies under Computer Configuration.
31. Expand Windows Settings, Security Settings, and click Public Key Policies.
32. In the details pane, right-click Certificate Services Client – Auto-Enrollment and
select Properties.
33. Select Enabled from the Configuration Model list.
34. Select the Renew expired certificates, update pending certificates, and remove
revoked certificates check box.
35. Select the Update certificates that use certificate templates check box.
36. Click Apply and OK. Close the Group Policy Management Editor.
37. In the navigation pane, expand the domain and expand the node that has your
Active Directory domain name. Right-click the Domain Controllers
organizational unit and click Link an Existing GPO…
38. In the Select GPO dialog box, select Domain Controller Auto Certificate
Enrollment or the name of the domain controller certificate enrollment Group
Policy object you previously created and click OK.
1.5.2.3 Prepare and Deploy Windows Server 2016 Active Directory Federation
Services
Deploy the 11. Start Server Manager. Click Local Server in the navigation pane.
Active Directory 12. Click Manage and then click Add Roles and Features.
Federation 13. Click Next on the Before you begin page.
Service Role 14. On the Select installation type page, select Role-based or feature-based
installation and click Next.
15. On the Select destination server page, choose Select a server from the server
pool. Select the federation server from the Server Pool list. Click Next.
16. On the Select server roles page, select Active Directory Federation Services.
Click Next.
17. Click Next on the Select features page.
18. Click Next on the Active Directory Federation Services (AD FS) page.
19. Click Install to start the role installation.
20. Click Close.
Create KDS Root 21. Start an elevated Windows PowerShell console. Accept the UAC prompt if
Key required.
22. Type and execute Add-KdsRootKey -EffectiveTime (Get-Date).AddHours(-
10).
Configure the 54. Open the AD FS Management console. Accept the UAC prompt.
Device 55. In the navigation pane, expand Service. Click Device Registration.
Registration 56. In the details pane, click Configure device registration.
Service 57. In the Configure Device Registration dialog, click OK.
Mark the 82. Open an elevated command prompt. Accept the UAC prompt.
Template as the 83. Run
Windows Hello certutil –dsTemplate WHFBAuthentication msPKI-Private-Key-
Sign-In Template Flag +CTPRIVATEKEY_FLAG_HELLO_LOGON_KEY
Complete these steps on the DC1 virtual machine.
Configure the 91. Open an elevated Windows PowerShell prompt. Accept the UAC prompt.
Registration 92. Type and execute the following command Set-AdfsCertificateAuthority
Authority -EnrollmentAgent -EnrollmentAgentCertificateTemplate
WHFBEnrollmentAgent -WindowsHelloCertificateTemplate
WHFBAuthentication
Create an Intranet 99. Start the Group Policy Management Console (gpmc.msc).
Zone Group 100.Expand the domain and select the Group Policy Objects node in the navigation
Policy pane.
101.Right-click Group Policy Objects and select New.
102.Type Intranet Zone Settings in the name box and click OK.
103.In the content pane, right-click the Intranet Zone Settings Group Policy object
and click Edit.
104.In the navigation pane, expand Policies under Computer Configuration.
105.Expand Administrative Templates > Windows Components > Internet
Explorer > Internet Control Panel, and select Security Page.
106.In the content pane, double-click Site to Zone Assignment List. Click Enabled.
107.Click Show… In the Value name column, type the url of the federation service
beginning with https (https://fs.corp.contoso.com). In the Value column, type
the number 1. Click OK.
108.Click Apply | OK.
109.Then close the Group Policy Management Editor.
Deploy the 110.In the navigation pane, expand the domain and right-click the node that has your
Intranet Zone Active Directory domain name and click Link an Existing GPO…
Group Policy 111.In the Select GPO dialog box, select Intranet Zone Settings or the name of the
Windows Hello for Business Group Policy object you previously created and
click OK.
Install and 11. Double-click the executable and click Install to install the prerequisites. Follow the
Configure the prompts until those are installed.
MFA Server 12. Select I Agree and click Next.
13. On the Select Installation Folder screen, make sure that the folder is correct and
click Next. Accept the UAC prompt.
14. Once the installation is complete, click Finish.
15. Start the Multi-Factor Authentication Server and accept the UAC prompt.
16. Back on the page that you downloaded the server from, click the Generate link.
Copy this information into the Azure MFA Server in the boxes provided and click
Activate. Cancel any prompts.
The Azure MFA server uses a primary and secondary replication model for its configuration
database. The primary Azure MFA server hosts the writeable partition of the configuration
database. All secondary Azure MFA servers hosts read-only partitions of the configuration
database. All production environment should deploy a minimum of two MFA Servers.
For this lab, the primary MFA uses the name mf*a* or mfa.corp.contoso.com. All secondary
servers use the name mfa*n* or mfan.corp.contoso.com, where n is the number of the
deployed MFA server.
The primary MFA server is also responsible for synchronizing from Active Directory, therefore, it
should be domain joined and fully patched.
Install the Web 11. Install the following services if they are already not installed:
Server Role Common HTTP Features > Default Document.
Common HTTP Features > Directory Browsing.
Common HTTP Features > HTTP Errors.
Common HTTP Features > Static Content.
Health and Diagnostics > HTTP Logging.
Performance > Static Content Compression.
Security > Request Filtering.
Security > Basic Authentication.
Management Tools > IIS Management Console.
Management Tools > IIS 6 Management Compatibility.
Application Development > ASP & ASP.NET <AllVersions>.
Update the Server 12. Update the server using Windows Update until the server has no required or
optional updates as the Azure MFA Server software may require one or more of
these updates for the installation and software to correctly work. These procedures
install additional components that may need to be updated.
Configure the IIS 13. Start the Internet Information Services (IIS) Manager console.
Server’s Certificate 14. In the navigation pane, expand the node with the same name as the local
computer. Expand Sites and select Default Web Site.
15. In the Actions pane, click Bindings…
16. In the Site Bindings dialog, Click Add…
17. In the Add Site Binding dialog, select https from the Type list. In the SSL
certificate list, select the certificate (app1.corp.contoso.com) with the name that
matches the FQDN of the computer.
18. Click OK. Click Close. From the Actions pane, click Restart.
The User Portal is an IIS Internet Information Server web site that allows users to enroll in Multi-
Factor Authentication and maintain their accounts. A user may change their phone number,
change their PIN, or bypass Multi-Factor Authentication during their next sign on. Users will log
in to the User Portal using their normal username and password and will either complete a
Multi-Factor Authentication call or answer security questions to complete their authentication. If
user enrollment is allowed, a user will configure their phone number and PIN the first time they
log in to the User Portal. User Portal Administrators may be set up and granted permission to
add new users and update existing users.
Configure the IIS 13. Start the Internet Information Services (IIS) Manager console.
Server’s 14. In the navigation pane, expand the node with the same name as the local computer.
Certificate Expand Sites and select Default Web Site.
15. In the Actions pane, click Bindings…
16. In the Site Bindings dialog, Click Add…
17. In the Add Site Binding dialog, select https from the Type list, select a different
Port than 443, example 444. In the SSL certificate list, select the certificate
(app1.corp.contoso.com) with the name that matches the FQDN of the computer.
18. Click OK. Click Close. From the Actions pane, click Restart.
Add the MFA 23. In the navigation pane, expand the node with the organization’s Active Directory
SDK User domain name. Select Users. In the content pane, right-click the Phonefactor
Account to the Admins security group and select Properties.
Phonefactor 24. Click the Members tab.
Admins Group 25. Click Add… Type the PFWSDK_ user name in the Enter the object names to
select box and then click Check Names | OK | Apply | OK. Now it should show
the following:
The computer account for the primary MFA Server (APP1).
The Webservices SDK user account (PFWSDK_).
Group or User account that will manage the User Portal Server (Domain Admins).
When you install Azure Multi-Factor Authentication Server, you have the following options:
1. Install Azure Multi-Factor Authentication Server locally on the same server as AD FS (this
2. Install the Azure Multi-Factor Authentication adapter locally on the AD FS server, and
Configure 12. Start the Multi-Factor Authentication Server application. Accept the UAC
Company Settings prompt.
13. Click Company Settings.
14. On the General Tab, select Fail Authentication from the When internet is not
accessible list.
15. In User defaults, select Phone call or Text message.
16. Select Enable Global Services if you want to allow Multi-Factor Authentications
to be made to telephone numbers in rate zones that have an associated charge.
17. Clear the User can change phone check box to prevent users from changing their
phone during the Multi-Factor Authentication call or in the User Portal. A
consistent configuration is for users to change their phone numbers in Active
Directory and let those changes synchronize to the multi-factor server using the
Synchronization features in Directory Integration.
18. Select Fail Authentication from the When user is disabled list. Users should
provision their account through the user portal.
19. Select the appropriate language from the Phone call language, Text message
language, Mobile app language, and OATH token language lists.
20. Under Default PIN rules, select the User can change PIN checkbox to enable
users to change their PIN during multi-factor authentication and through the user
portal.
21. Configure the Minimum length for the PIN.
22. Select the Prevent weak PINs check box to reject weak PINs. A weak PIN is any
PIN that could be easily guessed by a hacker are not allowed:
3 sequential digits.
3 repeating digits.
Or any 4 digit subset of user phone number.
If you clear this box, then there are no restrictions on PIN format. For
example: User tries to reset PIN to 1235 and is rejected because it's a weak
PIN. User will be prompted to enter a valid PIN.
23. Select the Expiration days check box if you want to expire PINs. If enabled,
provide a numeric value representing the number of days the PIN is valid.
24. Select the PIN history check box if you want to remember previously used PINs
for the user. PIN history stores old PINs for each user. Users are not allowed to
reset their PIN to any value stored in their PIN History. When cleared, no PIN
history is stored. The default value is 5 and range is 1 to 10.
Configure 25. From the Multi-Factor Authentication Server window, click the Directory
Directory Integration icon.
Integration 26. Click the Settings tab.
Settings and 27. Select Use Active Directory.
Synchronization 28. Select Include trusted domains to have the Multi-Factor Authentication Server
attempt to connect to domains trusted by the current domain, another domain in the
forest, or domains involved in a forest trust. When not importing or synchronizing
users from any of the trusted domains, clear the checkbox to improve performance.
Add Test User to 29. Open Active Directory Users and Computers.
WHfB Group 30. Click the CORP | USERS OU in the navigation pane.
31. Right-click TestUser1 and click Properties.
Complete these
32. Click the Telephones tab and enter a Mobile number including the country code.
steps on the DC1
33. Click the Member Of tab and click Add…
virtual machine.
34. In the Enter the object names to select text box, type Windows Hello for Business
Users. Click Check Names | OK.
35. Click Apply | OK to return to Active Directory Users and Computers.
Install the Web 47. From the Multi-Factor Authentication Server window, click the Web Service SDK
Service SDK icon and click Install Web Service SDK…
48. Select the Site as Default Web Site, Virtual directory as
MultiFactorAuthWebServiceSdk and Application Pool as DefaultAppPool.
Click Next.
49. Once installed, click Close.
Edit the MFA AD 50. Copy the below 4 Files from C:\Program Files\Multi-Factor Authentication
FS Adapter Server to C:\inetpub\wwwroot\MultiFactorAuthWebServiceSdk.
Config File MultiFactorAuthenticationAdfsAdapterSetup64.msi
Register-MultiFactorAuthenticationAdfsAdapter.ps1
Unregister-MultiFactorAuthenticationAdfsAdapter.ps1
MultiFactorAuthenticationAdfsAdapter.config
51. Browse to C:\inetpub\wwwroot\MultiFactorAuthWebServiceSdk (or
appropriate directory based on the virtual directory name) and edit the
MultiFactorAuthenticationAdfsAdapter.config file.
52. Locate the UseWebServiceSdk key and change the value from false to true.
53. Locate the WebServiceSdkUsername key and set the value to the username of the
Web Service SDK account in the PhoneFactor Admins security group. Use a
qualified username, like domain\username or machine\username
(CORP\PFWSDK_).
54. Locate the WebServiceSdkPassword key and set the value to the password of the
Web Service SDK account in the PhoneFactor Admins security group.
(P@ssw0rd).
55. Locate the WebServiceSdkUrl key and set the value to the URL of the Web
Service SDK that is running on the Azure Multi-Factor Authentication Server
(https://app1.corp.contoso.com/MultiFactorAuthWebServiceSdk/PfWsSdk.asmx).
Since SSL is used for this connection, refer to the Web Service SDK by server
name, not IP address, since the SSL certificate was issued for the server name. If
the server name does not resolve to an IP address from the internet-facing server,
add an entry to the hosts file on that server to map the name of the Azure Multi-
Factor Authentication Server to its IP address. Save the
MultiFactorAuthenticationAdfsAdapter.config file after changes have been
made.
Run the ADFS Note: At this stage, do not run the Register-
Adapter Windows MultiFactorAuthenticationAdfsAdapter.ps1 script in PowerShell to register the
PowerShell adapter because the adapter is already registered as
Cmdlet WindowsAzureMultiFactorAuthentication.
57. Restart the ADFS service for the changes to take effect.
Test AD FS with 58. In the Multi-Factor Authentication server, on the left, click Users.
the Multifactor 59. In the list of users, select a user (TestUser1) that is enabled and has a valid phone
Authentication number to which you have access.
Connector 60. Click Test…
61. In the Test User dialog, provide the user’s password to authenticate the user to
Active Directory and click Test.
62. Enter the one-time passcode once received on the phone and click OK.
63. Click OK on the Authentication successful message and click Close.
The Multi-Factor Authentication server communicates with the Azure MFA cloud service to
perform a second factor authentication for the user. The Azure MFA cloud service contacts the
phone number provided and asks for the user to perform the second factor authentication
configured for the user. Successfully providing the second factor should result in the Multi-
factor authentication server showing a success dialog.
Configure 10. In the navigation pane, expand Policies under User Configuration.
Automatic 11. Expand Windows Settings > Security Settings, and click Public Key Policies.
Certificate 12. In the details pane, double-click Certificate Services Client – Auto-Enrollment.
Enrollment 13. Select Enabled from the Configuration Model list.
14. Select the Renew expired certificates, update pending certificates, and remove
revoked certificates check box.
15. Select the Update certificates that use certificate templates check box.
16. Click Apply | OK. Close the Group Policy Management Editor.
Configure 17. Double-click the Enable Windows Hello for Business Group Policy object.
Security in the 18. In the Security Filtering section of the content pane, click Add… Type Windows
WHfB GPO Hello for Business Users or the name of the security group you previously created
and click Check Names | OK.
19. Click the Delegation tab. Select Authenticated Users and click Advanced…
20. In the Group or user names list, select Authenticated Users. In the Permissions for
Authenticated Users list, clear the Allow check box for the Apply group policy
permission. Click Apply | OK.
Deploy the WHfB 21. In the navigation pane, expand the domain and right-click the node that has your
GPO Active Directory domain name and click Link an Existing GPO…
22. In the Select GPO dialog box, select Enable Windows Hello for Business or the
name of the Windows Hello for Business Group Policy object you previously
created and click OK.
Just to reassure, linking the Windows Hello for Business Group Policy object to the domain
ensures the Group Policy object is in scope for all domain users. However, not all users will have
the policy settings applied to them. Only users who are members of the Windows Hello for
Business group receive the policy settings. All others users ignore the Group Policy object.
Validate Policies 1. Restart the machine. Even restart DC1 and APP1 and wait for some time.
2. Log in as TestUser1.
3. You should be able to see the Windows Hello for Business screen.
In this section we are going to create a group that will be used to assign users a Exploit Guard
controlled folder policy. In addition we will configure the policy and test that it works.
management tools.
In this section you will configure a WIP policy where Edge and Notepad are managed
applications. You will test your policy by copy and pasting between managed and unmanaged
applications.
Note: This lab can only be performed if the System Center Configuration Manager environment
is on Current Branch (1802) or higher.
Follow the following sections for managing Windows Information Protection through traditional
management tools.
1.7.2.1 Prerequisites
In this activity, you will create and enroll for a Data Recovery Agent certificate which is a
prerequisite in configuring WIP policies through System Center Configuration Manager.
In this activity, you will create and deploy a WIP configuration item and baseline that will block
inappropriate data sharing practices.
In this activity, you will perform various tests to test the enforcement of the WIP policies in
different scenarios.
In this section, you will learn how to Configure and Deploy Code Integrity Policies and Enable
Device Guard in an enterprise.
1.8.2.1 Prerequisites
In this activity, you will go through the steps in creating your first Code Integrity (CI) policy from
a “Golden” system.
In this activity, you will create a CI policy and deploy it in audit mode.
In this activity, you will go through the steps in creating a Code Integrity (CI) policy from audit
log events.
In this activity, you will deploy and enforce a CI policy to lock down the system.
In this activity, you will learn how to configure and deploy group policies to enforce the
configuration.
If an employee goes to an untrusted site through either Microsoft Edge or Internet Explorer,
Microsoft Edge opens the site in an isolated Hyper-V-enabled container, which is separate from
the host operating system. This container isolation means that if the untrusted site turns out to
be malicious, the host PC is protected, and the attacker can't get to your enterprise data.
Note: Windows Defender Application Guard can only be enabled if the Hardware Requirements
are met as stated in https://docs.microsoft.com/en-us/windows/threat-protection/windows-
defender-application-guard/reqs-wd-app-guard
1.9.1 Modern Management
Follow the following sections for managing Windows Defender Application Guard through
modern management tools.
In the section below you will be configuring WDAG using modern management.
1.9.2.1 Prerequisites
In this section, you will learn how to navigate Upgrade Readiness to understand how you might
use it in your environment.
The Operations Manager Suite Experience Center will be used to evaluate Windows Analytics
Upgrade Readiness using read-only demo data and will not require devices to be configured to
send telemetry to the Update Compliance service.
Note:
This lab guide is aimed at getting you familiar with the Upgrade Readiness workspace. It
is not supposed to be a comprehensive guide to using the solution in your organization.
Appendix – Configuring Windows Analytics has more details on configuring, deploying and
reviewing Windows Analytics.
4. Click the Upgrade Readiness tile which will open the Upgrade Readiness
workspace.
Upgrade 5. The Upgrade Overview blade provides a summarization of all the data Upgrade
Overview Blade Readiness focuses on.
6. This blade displays the total count of computers sharing data with Microsoft, and the
count of computers upgraded.
7. The upgrade overview blade displays data refresh status, including the date and time
of the most recent data update. The refresh status is color coded:
No delay in processing device inventory data = Green
Delay processing device inventory data = Amber
This Lab provides a walkthrough of converting a Win32 app to a UWP using the Desktop App
Converter.
10. Download the ‘Hello Centennial’ sample Win32 app’s MSI file from here:
https://github.com/qmatteoq/DesktopBridge/blob/master/1.%20Desktop%20App
%20Converter/HelloCentennial.msi
11. Create a folder called C:\Installer and copy the file HelloCentennial.msi here.
12. Create another folder called C:\Output\HelloCentennial.
Launch the 13. Press ‘Start’, type ‘Desktop App Converter’.
‘Desktop App 14. Right click on the ‘Desktop App Converter’ icon and choose Run as
Converter’ as administrator). Accept the UAC prompt.
Administrator
Start the Desktop Note: DesktopAppConverter flags:
App Converter -Installer is the path to the setup file we need to convert. In this case, it’s the
Process HelloCentennial.msi file we’ve previously downloaded from GitHub.
-Destination is the folder where we want to store the output files created by the
conversion process.
-PackageName is the name we want to give to the package.
-Publisher is the publisher’s name of the application. If you have some previous
experience with UWP development, you’ll recall seeing this information in the
manifest file of a UWP app. It’s univocally assigned by the Dev Center when you
open a developer account. For the moment, for test purposes, you can just use the
name you want, it’s just important that it starts with CN= and that it doesn’t
contain spaces.
-Version is the version number of the app.
-MakeAppx means that, other than generating the folder which will contain all
the files that needs to be packaged (like assets, the manifest, etc.), you want also
to immediately generate the AppX package.
-Verbose is an optional parameter, which is useful because it will show you all
the details of what’s going on during the conversion process.
-Sign is a parameter that allows to automatically generate the needed certificates
to properly sign the AppX package. Without this digital signature, the package
can’t be installed on a machine which doesn’t trust the generated certificate.
15. Download the Windows 10 1803 SDK: https://developer.microsoft.com/en-
US/windows/downloads/windows-10-sdk
16. In PowerShell type the command:
DesktopAppConverter.exe -Installer "C:\Installer\HelloCentennial.msi"
-Destination "C:\Output\HelloCentennial" -PackageName
"HelloCentennial" -Publisher "CN=Awesome-Apps-Inc" -Version "1.0.0.0"
-MakeAppx -Verbose -Sign
17. Inspect the Output folder. At the end of the process, you will get a folder
structure like the following one:
The real work done by the tool can be found inside the PackageFiles folder:
18. As you can see, this folder looks a bit like the one that Visual Studio creates when
you start a new UWP project. You have an Assets folder, which contains the
default images to be used for the tile, the Store, or the icon in the Start menu. You
have also a manifest file, the one called AppxManifest.xml.
Open the 19. Notice that it’s like the manifest file of a UWP app. However, compared to a
AppxManifest.xml native UWP app, you’ll find a couple of differences:
File You’ll find the following Capability, which allows the application to run in full
trust. This option is available only for converted apps, a native UWP app will not
have this kind of access.
<Capabilities>
<rescap:Capability Name="runFullTrust" />
</Capabilities>
You’ll find an Application entry with all the info about the Win32 process that
the UWP container will launch.
<Application Id="HelloCentennial" Executable="HelloCentennial.exe"
EntryPoint="Windows.FullTrustApplication">
Continue 20. You’ll find other files and folders that captured the MSI setup process. For
Inspecting Output: example, the Registry.dat file contains all the changes applied to the registry. Or,
Registry.Dat, VFS if you explore the VFS folder, you will find all the files that are copied during the
Folder installation process. For instance, you’ll be able to find the main executable (the
original Windows Forms app) following the path
VFS\Users\ContainerAdministrator\AppData\Roaming\Matteo Pagani\Hello
Centennial.
Attempt to Install 21. Double click on the file HelloCentennial.appx and you’ll be prompted with the
the Converted App following dialog.
(APPX)
However, if you press the Install button out of the box, you’ll see the following error.
Install Certificate Note: The reason is that, by default, a UWP package needs to be signed with a valid
to Resolve Error certificate to be installed and this certificate needs to be trusted by the computer. When we
publish a UWP app on the Store, this process is completely transparent: it’s the Store that
takes care of signing the AppX package with a valid certificate during the submission
process. In this case, instead, we’re trying to sideload a package without using the Store, so
we need to take care of signing it.
If you remember, when we used the Desktop App Converter tool, we passed a parameter
called -Sign, which already did the hard work for us. The package is already signed: the
problem is that the certificate used for signing it, now, isn’t trusted by our computer, which
leads to an installation failure.
22. To solve this problem, you’ll need to add the certificate in the Trusted Root
Certification Authority of the computer. You’ll find it in the folder generated by
the tool (the one with the AppX package and the PackageFiles folder) and it’s
called auto-generated.cer: simply double click on it, choose Install Certificate
and, when you’re prompted where to install it, choose Local Machine and then
the option Place all certificates in the following store. By pressing the Browse
button, make sure to choose Trusted Root Certification Authorities and
complete the process.
Retry Installing the 23. Double click on the file HelloCentennial.appx. Uncheck Launch when ready.
Converted App This time, after pressing the Install button, you will see a progress bar showing
(APPX) the installation status and, at the end, the window will become like the following
one.
Launch the 25. Select the app from the Start menu to launch it. You’ll notice that it’s still a
Converted App: Win32 app and it will be able to create a text file on the user’s desktop just fine,
‘HelloCentennial’ without requiring any extra dialog or permission.
Note: You might have to download and install the prerequisites for the app to
launch, which it will do automatically, which is .Net Framework 3.5 (includes 2.0
and 3.0).
7.3.1 Prerequisites
Perform the following tasks before proceeding.
In this section, you will learn how to use and configure Enterprise Mode and the Enterprise
Mode Site List Manager.
7.3.3.1 Prerequisites
Web developers used to check Navigator.AppName property to get the name of the web client.
Until Internet Explorer 10, it is used to return “Microsoft Internet Explorer” but from IE 11 it
returns “Netscape”. After completing this lab session, you will be able to use the IE Developer
Toolbar to change the IE Browser mode.
Box Model issue is caused by the difference in the browser rendering engine implementation of
width and height properties of a container element including the padding, borders and margins.
The Pop-Up Blocker is a feature that blocks pop-up (and pop-under) windows initiated
automatically by a Web site. Windows Internet Explorer 10/9/8/7 block pop-up windows in the
Internet and Restricted sites zones by default. However, Pop-up Blocker allows pop-up windows
initiated by a user's actions. This feature can interfere with the functionality of older sites that
use popup window on page load.
To change the class attribute of an element the earlier versions of IE required us to use
className as the attribute name. This has been fixed in the IE11 and applications targeting IE 11
Browser should use class instead of className for assigning class attribute.
http://msdn.microsoft.com/en-us/library/ms536429(VS.85).aspx
Note: In order to fix the problem permanently, the script on the page would have to be changed
on the Server which is hosting the website to reflect the correct width.
Note: This issue can also be fixed by forcing the page to render in IE7 standards mode by
adding an X-UA-Compatible meta tag as shown below to the head section of this page on the
server.
7.3.3.6 GetElementByID
Changes in the getElementById API causes the webpage to break as it is case sensitive. To
remediate this, we will have to modify the CSS of the webpage at the source. One would use
Fiddler Auto Responder to change the code to onclick="LaunchVideo('overview');".
Note: In order to fix the problem permanently, the source code of the page would have to be
changed on the Server which is hosting the website to reflect the correct width.
Note: This issue can also be fixed by changing the Document Mode to IE5 Quirks Mode in the
Developer Toolbar.
For IE browser 5/6/7 the default value for Z-Index is 0 but for IE 8+ it is Auto.
Note: This issue can also be fixed by forcing the page to render in IE5 Quirks mode by adding
an X-UA-Compatible meta tag as shown below to the head section of this page on the server.
Content Centering using text align property is not supported in Internet Explorer 9+. This causes
any site developed for IE6 to be left aligned on IE9+ standards mode if they are using text align
property for centering. We would need to use the width and margin properties to center align
the content.
To remediate this, we will have to modify the CSS of the webpage at the source. In order to find
the correct CSS values that need to be added to the source of the page on the server we can use
the Developer Tools.
Note: This issue can also be fixed by forcing the page to render in Quirks mode by adding an X-
UA-Compatible meta tag as shown below to the head section of this page on the server.
Microsoft ActiveX controls are reusable software components based on ActiveX technology.
ActiveX controls add interactivity and additional functionality, such as animations or pop-up
menus to a Web page, application, or software development tool. Internet Explorer 7+ and
Microsoft Internet Explorer 6 for Windows XP Service Pack 2 (SP2) block controls that are
unsigned, invalid, or explicitly distrusted by the user. In Internet Explorer 9+, users can allow
controls to run on more than one Web site, or all Web sites, by responding to the Information
Bar that drops down when a control is requested for use. These sites can also be edited through
the Manage Add-ons interface.
1. Ensure that the ActiveX control is signed. Please refer the below link for ActiveX Signing:
http://msdn.microsoft.com/en-us/library/aa231196(VS.60).aspx
2. Ensure that the client side security certificate matches the server side security certificate.
3. Add the website to the list of local intranet sites.
Note: This lab can only be performed if your lab is on the System Center Configuration Manager
Version 2012 R2.
8.1 Prerequisites
Perform the following tasks before proceeding.
In this section, you will go through the process of creating a Windows 10 image and deploying
the image through Lite Touch Installation (LTI) and Zero Touch Installation (ZTI) wipe and load
deployment.
Notes: Create New GEN1 HYD-CLIENT5 and HYD-CLIENT6 Blank VMs, with Legacy Network
Adapter as the first boot device and connected to the Corp Network. Create checkpoints for
both.
10.1.1 Prerequisites
Perform the following tasks before proceeding.
10.3.1 Prerequisites
Perform the following tasks before proceeding.
In this section, you will learn how to sequence applications with Microsoft Application
Virtualization (App-V) and deploying these packages with Configuration Manager.
Note: This lab can only be performed if the System Center Configuration Manager environment
is on Current Branch.
11.1 Prerequisites
Perform the following tasks before proceeding.
Issue: You try to install the SCCM client to a workstation from the SCCM console and the client
never gets installed.
The most probable cause of this is that the workstation’s firewall is blocking “Remote
Management” and “WMI”.
C:\Windows\ccmsetup\logs\ccmsetup.log.
If you cannot find the client-side log look into the server-side logs to determine why the
server is not communicating with the client.
The best tool for monitoring the logs is cmtrace.exe and it can be found on the SCCM server at: