This is a short blog post to warn about upcoming changes to device support in Intune.
iOS
iOS 8.0 devices will no longer be supported from September 2017. They will no longer be able to access the Company Portal or managed apps. iOS 9.0 or later will be required to access corporate resources.
Android
Android 4.3 devices will no longer be supported from October 2017. They will no longer be able to access the Company Portal or managed apps. Android 4.4 or later will be required to access corporate resources.
Windows Phone
Windows Phone 8.1 platform reached end of mainstream support in July 2017 but Intune still supports their management. However there will be no improvements to Intune service management for these devices.
More details can be found in the Intune docs
Until next time.....
Wednesday, 30 August 2017
Tuesday, 8 August 2017
See Intune Data Warehouse in action
We've heard a little
about this feature recently but the Intune Data Warehouse is finally in public
preview. It will give us powerful custom reporting with a dataset spanning up to 90 days of historical data. You can use Power BI or Excel to connect to the warehouse, or indeed any other tool that supports OData feeds.
There is a good blog post describing the feature but I wanted to see it in action with my own data. It is very easy to configure and get started.
Open the Intune admin console on your Azure Portal
Click on the Intune Data Warehouse tile on the bottom right of the screen. This opens the Intune Data Warehouse blade.
The blade gives us the instructions we need.
- Download and install the Power BI desktop app
- Download the Power BI template file
- Open the Power BI template with the Power BI desktop app
- Authenticate with your tenant
This is the Power BI app......
....and the Power BI template file. It contains a set of custom reports to get you started.
Install the app.
When the app installs select File -> Open.
Browse to the template file.
Select to Apply changes.
You will see the changes being applied.
The OData feed dialog box open. Select the Organizational account section. Sign in with an a global admin account on your tenant. Click Connect.....
.....and we can see the reports have been populated with our own data.
New ConfigMgr video training series
After months of work I'm very pleased to say that the second in this two-part series has been published by Packt Publishing. This involved a lot of weekends and late nights so thanks a lot to my wife for having a good sense of humour. Thanks also to Paul Winstanley (MVP and WMUG colleague) for reviewing the course.
The course is titled "Implementing Configuration Manager features" and is available here
The course contents are as follows:
The course is titled "Implementing Configuration Manager features" and is available here
The course contents are as follows:
Software Deployment
- Configuration Manager Applications
- Packages and Programs
Software Updates
- Introduction to software updates
- Deploy a software updates solution
- Automatic Deployment rules
- Introduction to Operating System Deployment
- Build and Capture a Windows 10 image
- Deploying a Windows 10 image
- Working with device drivers
- Endpoint Protection in Configuration Manager
- Implementing Endpoint Protection
- Protecting Endpoints
- Integrating Configuration Manager with Microsoft Intune
- Managing mobile devices
- Advanced hybrid features
Part 1 of the series is titled "Introducing System Center Configuration Manager"
Monday, 7 August 2017
ConfigMgr 1706 - Azure Services wizard
ConfigMgr 1706 Current Branch was recently released and I got a chance to install it in my lab this weekend. The ConfigMgr product group have done an amazing job and I'm impressed with some of the new features, making it easier to deploy Windows 10, Office 365 and Surface drivers. However my favourite feature has to be the Azure Services wizard. We were given an advance preview of this feature under NDA months ago and it's great to see it in production.
So what is that all about?
The Azure Services Wizard provides a common configuration experience to set up Azure services in ConfigMgr. You can use it for configuring Cloud Management (Azure AD authentication and user discovery), OMS Connector, Upgrade Readiness and Windows Store for Business.
Look back at the 1610 console. See that the Windows Store for Business and the Upgrade Analytics Connector were separate nodes under Cloud Services. Remember that the OMS Connector wasn't available until 1702.
WSfB was configured independently of any other service.
Now look at the 1706 console. See the new Azure Services node. You will see that my WSfB configuration has already been migrated.
So how do we configure this? We'll need Azure tenant details and credentials to complete the process. We'll also create some web apps along the way and grant the required permissions to the web apps (thanks to Nick Hogarth who figured this out).
Right click on the Azure Services node and select Configure Azure Services.
The Azure Services Wizard is launched. Enter a suitable name and select an Azure service. You'll see that Windows Update for Business is missing as it's already configured in this environment. We'll select Cloud Management to allow clients to authenticate with the hierarchy using Azure AD
In the App Properties dialog box we see that we're going to have to create some apps - web app and Native Client app. Browse in the web app section.
Select Create in the Server app dialog box.
Enter the following information in the Create Server Application box.
Enter your Azure AD credentials when prompted.
Your Azure AD Tenant Name is automatically detected.
The server app has been configured and can be selected.
Now browse in the Native Client app section.
Enter the following information in the Create Client Application box.
Your Azure AD Tenant Name is automatically detected.
The client app has been configured and can be selected.
Click Next to continue with the wizard when all the App Properties have been configured.
Now we can optionally choose to enable Azure AD Discovery. It allows you to add cloud-only users to your ConfigMgr environment.
Review the summary.
The Azure Services wizard has completed.
Some of my colleagues have discovered that you have to grant permissions to the web apps in Azure so that the solution can authenticate correctly (Nick Hogarth, Peter van der Woude).
In the Azure Portal, choose More Services -> App registrations
See the newly created server and client apps. Select each one in turn.
Select Required Permissions and choose Grant Permissions.
Review the SMS_AZUREAD_DISCOVERY_AGENT.log file for any errors.
So we've now completed the following:
Check this out. We won't need so much information the next time we need to add an Azure service.
This time I'll choose Upgrade Readiness.
This time I just need to choose a web app and I don't have to sign in to Azure.
I hope this blog post has been helpful. Until next time.....
So what is that all about?
The Azure Services Wizard provides a common configuration experience to set up Azure services in ConfigMgr. You can use it for configuring Cloud Management (Azure AD authentication and user discovery), OMS Connector, Upgrade Readiness and Windows Store for Business.
Look back at the 1610 console. See that the Windows Store for Business and the Upgrade Analytics Connector were separate nodes under Cloud Services. Remember that the OMS Connector wasn't available until 1702.
WSfB was configured independently of any other service.
Now look at the 1706 console. See the new Azure Services node. You will see that my WSfB configuration has already been migrated.
So how do we configure this? We'll need Azure tenant details and credentials to complete the process. We'll also create some web apps along the way and grant the required permissions to the web apps (thanks to Nick Hogarth who figured this out).
Right click on the Azure Services node and select Configure Azure Services.
The Azure Services Wizard is launched. Enter a suitable name and select an Azure service. You'll see that Windows Update for Business is missing as it's already configured in this environment. We'll select Cloud Management to allow clients to authenticate with the hierarchy using Azure AD
In the App Properties dialog box we see that we're going to have to create some apps - web app and Native Client app. Browse in the web app section.
Select Create in the Server app dialog box.
Enter the following information in the Create Server Application box.
- Application name (suitable friendly name)
- Home page URL (this does not have to exist - max 200 characters)
- App ID URI (this does not have to exist - max 200 characters)
- Secret key validity period (2 years max)
Enter your Azure AD credentials when prompted.
Your Azure AD Tenant Name is automatically detected.
The server app has been configured and can be selected.
Now browse in the Native Client app section.
Enter the following information in the Create Client Application box.
- Application name (suitable friendly name)
- Reply URL (this does not have to exist - max 200 characters)
Your Azure AD Tenant Name is automatically detected.
The client app has been configured and can be selected.
Click Next to continue with the wizard when all the App Properties have been configured.
Now we can optionally choose to enable Azure AD Discovery. It allows you to add cloud-only users to your ConfigMgr environment.
Review the summary.
The Azure Services wizard has completed.
Some of my colleagues have discovered that you have to grant permissions to the web apps in Azure so that the solution can authenticate correctly (Nick Hogarth, Peter van der Woude).
In the Azure Portal, choose More Services -> App registrations
See the newly created server and client apps. Select each one in turn.
Select Required Permissions and choose Grant Permissions.
Review the SMS_AZUREAD_DISCOVERY_AGENT.log file for any errors.
So we've now completed the following:
- Added the Cloud Management Service
- Enabled Azure AD Discovery
Check this out. We won't need so much information the next time we need to add an Azure service.
This time I'll choose Upgrade Readiness.
This time I just need to choose a web app and I don't have to sign in to Azure.
I hope this blog post has been helpful. Until next time.....
Tuesday, 1 August 2017
ConfigMgr patching - KB4025339 fails to install on Windows Server 2016
I had this problem recently on a customer site. It's an easy fix but I wanted to share to save others time.
Problem:
The CU for Windows Server 2016 July 2017 (KB4025339) failed to install on Windows Server 2016.
Resolution:
It's a pretty big update - over 1GB.
However the maximum run time of the update was incorrectly set to 10 minutes. Raising this to 60 minutes solves the problem.
I came across some other challenges while troubleshooting this issue.
I hope this information helps you. Until next time......
Problem:
The CU for Windows Server 2016 July 2017 (KB4025339) failed to install on Windows Server 2016.
Resolution:
It's a pretty big update - over 1GB.
However the maximum run time of the update was incorrectly set to 10 minutes. Raising this to 60 minutes solves the problem.
Additional information:
I came across some other challenges while troubleshooting this issue.
- The Windows Update log file is no longer available by default on Windows Server 2016. The file can be exposed using the PoSH cmdlet get-WindowsUpdateLog
- However executing this command on the server resulted in this error:
Cannot find path "C:\Program Files\Windows Defender\SymSrv.dll" because it does not exist".
Subscribe to:
Posts (Atom)