Intune Starter Guide: Nick Ross - Microsoft Certified Expert Administrator
Intune Starter Guide: Nick Ross - Microsoft Certified Expert Administrator
www.pax8.com
GUIDE DESCRIPTION
The purpose of this guide is to lay out the steps for implementing Intune. This guide is
assuming you have the M365 Business Premium license. It can apply to EMS licenses,
but some features will not be covered, such as Conditional Access and Windows
Autopilot.
**Disclaimer**
This guide is meant to provide best practices for policy creation and implementation of
Intune. It is meant to be used as a template, but the policies defined will not be the same in all
use cases. You must assess the policies and configurations you will need for your client’s
environment and make changes as needed. Pax8 is not liable for any policies you create that
do not meet the client’s standards. As a best practice, test all configurations with a pilot group
before moving to broad deployment across an entire organization.
www.pax8.com
PRE-FLIGHT CHECKLIST
www.pax8.com
TABLE OF CONTENTS
Phase 1: Groups and Licensing
www.pax8.com
Table of Contents Continued (Links to sections of Document):
• Adding Applications
• Adding Microsoft Authenticator App
www.pax8.com
LICENSING USERS
.
b. Select a User>click Licenses and Apps>ensure an M365 license is assigned
www.pax8.com
CREATE GROUPS
Create different groups if you want to separate out different people into different
Intune policies. These groups are typically separated with users who will either be on
different device platforms or users who need more granular policies.
a. Scroll down in the 365 Admin Portal and go to the Endpoint Manager
portal
www.pax8.com
c. Group Type can be 365 or security. You can add whatever users you
would like for this group. This is my test group, so I am going to add my
pilot user
www.pax8.com
DEVICE AUTO-ENROLLMENT
Ensure Device Auto-Enrollment is turned on. Auto-enrollment allows devices that join to
Azure AD to automatically be enrolled in Intune and have policies push down to them.
b. Choose All if it is not already pre-selected. You can choose auto-enrollment for
only subsets of your users by clicking Some. Click Save when finished
www.pax8.com
CONFIGURE DEVICE COMPLIANCE POLICIES
Device Compliance Policies designate which devices are compliant and non-
compliant. When we join devices to Intune after configuring these policies, we will be
able to see why the devices are not compliant. You will want to create a device policy
for every platform you wish to support in your organization.
iOS
a. In the Endpoint Manager admin center, go to Devices>iOS/iPad>Compliance
Policies>Create
www.pax8.com
b. Select iOS/iPadOS from the dropdown and click Create
www.pax8.com
d. For the email section, if you configure to require, then you also need to set up an
email configuration profile for iOS to create a managed email profile on the
native mail client. It’s recommended leaving this off until that profile is set up
e. Under the Device Health section for Jailbroken devices settings, select Block
www.pax8.com
g. Under System Security, enter the values as follows:
www.pax8.com
h. Under Actions for noncompliance, leave the default of Mark device
noncompliant as Immediately. Be careful here if you have set up a conditional
access policy that blocks access to noncompliant devices.
i. Click Next on Scope Tags. On the Assignments tab, scope the policy to one of
the groups you created or select All users from the dropdown menu. Review and
Create
j. For the full Microsoft doc on iOS Compliance Polices, click here.
www.pax8.com
ANDROID
a. Go to Devices>Android>Compliance Policies>Create Policy
b. Select Android Enterprise and Work profile. Note that this policy is for corporately
owned devices, not BYOD. For BYOD, you would select Device Owner
www.pax8.com
c. Enter the Name, enter Description (if applicable), and choose Next
d. Skip Microsoft Defender ATP and under Device Health, configure the following:
www.pax8.com
e. Under Device Properties, configure the Minimum and Maximum OS version if
applicable. If you do not want to configure, leave blank
www.pax8.com
g. Under Actions for noncompliance, leave the default of Mark device
noncompliant as Immediately. Be careful here if you have set up a conditional
access policy that blocks access to noncompliant devices
h. Click Next on Scope Tags. On the Assignments tab, scope the policy to one of
the groups you created or select All users from the dropdown menu. Review and
Create
i. For the full Microsoft doc on Android Compliance Polices, click here
www.pax8.com
WINDOWS
a. Click Devices>Windows>Compliance Policies>Create Policy
www.pax8.com
c. Enter a Name and Description (if applicable), and click Next
www.pax8.com
e. Under Device Properties, configure the Minimum and Maximum OS version if
applicable. If you do not want to configure, leave blank
*NOTE* We will not be configuring password settings for Windows mobile. We are
not choosing to require encryption here since we already chose to require
Bitlocker in the Device Health section.
www.pax8.com
j. Click Next. Under Actions for noncompliance, leave the default of Mark device
noncompliant as Immediately. Be careful here if you have set up a conditional
access policy that blocks access to noncompliant devices
a. Click Next on Scope Tags. On the Assignments tab, scope the policy to one of
the groups you created or select All users from the dropdown menu. Review and
Create
www.pax8.com
CREATE DEVICE PROFILE
Device profiles allow you to have uniform settings for all devices across your
organization. Examples:
• You create a Wi-Fi profile that automatically configures the Wi-Fi on devices that
are enrolled with Intune.
• Assume that you want to provision all iOS devices with the settings required to
connect to a file share on the corporate network. You create a VPN profile that
contains the settings to connect to the corporate network. Then you assign this
profile to all users who have iOS devices. The users see the VPN connection in the
list of available networks and can connect with minimal effort.
• You want to have a uniform start menu and settings for all of your Windows 10
Devices. You can create this with a Device Restriction Profile.
www.pax8.com
Since we configured a policy in the previous section to require Bitlocker, we are going
to set up a profile for Bitlocker so that users are immediately prompted to configure if
they do not have it already.
www.pax8.com
c. Enter a Name, Description (if applicable), click Next
www.pax8.com
e. Click Next. Skip Scope Tags. On the Assignments tab, scope the policy to one of
the groups you created or select All users or All Users and Devices from the
dropdown menu. Review and Create
www.pax8.com
SET UP APPLE MDM PUSH CERTIFICATE
The Apple MDM Push Certificate allows us to start enrolling iOS devices. You can think of
this certificate as a shell account in which you can put all over your clients under. The
certificate is associated with the Apple ID used to create it. As a best practice, use a
company Apple ID for management tasks and make sure the mailbox is monitored by
more than one person like a distribution list. Never use a personal Apple ID.
b. Agree to the terms and conditions, download your CSR (save to another
location or keep in downloads. The file is used to request a trust relationship
certificate from the Apple Push Certificates Portal.), and click Create your MDM
push Certificate to open the Apple Center
www.pax8.com
c. Sign in with your Business Apple ID or create a new Apple account for your
business if you do not have one already (takes 5 minutes and no financial
commitment). This should be an Apple ID associated to your MSP
www.pax8.com
d. After you sign in click Create a Certificate
a. Upload your CSR file and then download the MDM Push Certificate
www.pax8.com
e. Back in Microsoft, enter your Apple ID and upload the MDM Certificate you just
downloaded
www.pax8.com
f. You will see the status as Active
www.pax8.com
SETTING UP ANDROID ENROLLMENT
Setting up Android enrollment requires that you link Intune to an existing Google Play
account. If you do not have one you can create one for the client’s business. This
needs to be unique per client. As a best practice, use a company Google Account for
management tasks and make sure the mailbox is monitored by more than one person
like a distribution list. Never use a personal Google Account.
www.pax8.com
b. Agree to the terms and conditions and click Launch Google to connect now
c. Sign into your business Google Account. If you do not have one, create one
now. Click Get started
www.pax8.com
d. Enter your Business name and click Next
e. If you are in the EU, you can enter the contact of an EU representative. If not,
simply agree to the terms and click Confirm
www.pax8.com
f. Click Complete Registration and you will be redirected back to Microsoft
g. You will get a green check for the status. Registration is complete
www.pax8.com
ADD AN APPLICATION
Intune allows you to add applications so that when users enroll, they immediately have
access to those applications via the Microsoft Store for Business, Company Portal App,
or these apps can be required and automatically installed without end user interaction.
The most common of these for the Office Suite of which we will be configuring below.
www.pax8.com
c. Here you can leave the default settings or white-label the name. After you are
done, click Next
www.pax8.com
d. Under Configuration settings format select Enter XML data
*Note* We are making this selection because we have M365 Business Premium
Plan. If we have a plan that comes with ProPlus (E3, E5, M365 E3, M365 E5) we
would select Configuration designer
www.pax8.com
f. Select your appropriate architecture and select Microsoft 365 Apps for business
from the dropdown
www.pax8.com
g. De-select any apps you do not want to deploy and choose Monthly for the
update channel and Latest for the version
www.pax8.com
i. Under the Licensing and activation section turn the Automatically accept the
EULA to
On
www.pax8.com
k. Agree to the terms, name your file, and click Export
www.pax8.com
l. Open the XML file and copy the text
m. Back in the Microsoft portal, click Enter XML data, paste the text, and click Next
www.pax8.com
n. For Assignments, click Add all users under Required
o. When a user enrolls into Intune the XML file will be pushed and they will get office
installed without any interaction
www.pax8.com
ADDING THE MICROSOFT AUTHENTICATOR APP
The Microsoft Authenticator app is widely using for MFA that comes with M365 Business
Premium. You can add this app in Intune so that it is immediately available for
download for your clients.
iOS
www.pax8.com
c. Click Search the App Store, then search for “Microsoft Authenticator”
*NOTE* You will have to search for this text in its entirety for it to find this app
d. Select the app and click Configure under App Information. Say Yes for displaying
app in Company Portal. Leave all other settings defaulted
www.pax8.com
e. For Assignments, click Add all users under Required. Review and Create
www.pax8.com
Android
*Note* you will want to link a managed Google Play account for this client before
starting these steps. Click here to move to that section.
www.pax8.com
c. Search for “Microsoft Authenticator” and select the app
d. Click Approve to add this app>Approve again and keep the default settings for
app permissions
www.pax8.com
e. Click Sync in the upper left corner
www.pax8.com
g. Click on the app>click Properties>click Edit under Assignments
www.pax8.com
SETTING UP TERMS AND CONDITIONS
As an Intune admin, you can require that users accept your company's terms and
conditions before enrolling their device via in the Settings area or using the Company
Portal app.
www.pax8.com
b. Give a name and description
www.pax8.com
Ex. Summary of Terms
By enrolling your device, you agree to <Company X> terms and conditions.
www.pax8.com
ADD COMPANY BRANDING
Company branding allows you to white label the end user experience when they are
enrolling their device to Intune. This applies to both existing devices that are just now
enrolling and OOBE for new devices.
www.pax8.com
b. Enter Organization name and all other information you want to include. Choose
your theme and upload your logo. When done, click Review + save
www.pax8.com
c. Pax8 Example:
www.pax8.com
ENROLL DEVICES: WINDOWS
a. On the Windows 10 Device, click Start and type “Access work or school”
b. Click Connect
www.pax8.com
c. Click Join this device to Azure Active Directory
www.pax8.com
e. When prompted, click Join
f. You will get a success message when complete. If this is the first device the user is
enrolling, you will be first given Terms and Conditions to accept
www.pax8.com
g. Back in the Intune Portal, you can go to Devices>Windows>Windows devices to
see the devices enrolled and compliance status
Monitoring
I can come back in later to see that the device is still not compliant
www.pax8.com
a. Click on Device compliance
b. We can see the compliance polices are in error and can click to drill down
further. Here you can identify what part of the policy is not compliant on the
devices and take action to remediate. Here we see there is no firewall in place
www.pax8.com
ENROLL DEVICES: IOS AND ANDROID
iOS and Android device enrollment can be completed by downloading the “Intune
Company Portal” app from the Apple App store or Google Play store:
a. Users will be walked through a wizard after they enter their Azure AD credentials
which begins with the following:
www.pax8.com
b. For a detailed list of the entire user experience, you can follow this support guide
from Microsoft:
iOS
Android
• Common FAQs
• Whether we need to tighten or loosen our policies
• End user experience for communications to broad audience
• Common troubleshooting techniques for each platform
Lastly, after we have this pushed out and a target date for deployment, we can go
back into the Device Management Admin Center and begin to add our groups to our
policies and profiles.
www.pax8.com
CONCLUSION
I hope this article provided you some targeted guidance on implementing Intune. Any
feedback to improve this guide further would be greatly appreciated and can be sent
to the following email:
For all other questions or additional assistance, please reach out to your CSA or our
support team:
www.pax8.com