Skip to content

Commit ab101d5

Browse files
committed
update for 2209 ODJ .net
1 parent 32ba5df commit ab101d5

2 files changed

Lines changed: 63 additions & 75 deletions

File tree

memdocs/autopilot/windows-autopilot-hybrid.md

Lines changed: 54 additions & 66 deletions
Original file line numberDiff line numberDiff line change
@@ -1,37 +1,20 @@
11
---
2-
# required metadata
3-
4-
title: Enrollment for hybrid Azure AD-joined devices - Windows Autopilot
5-
titleSuffix:
2+
title: Enrollment for hybrid Azure AD-joined devices
3+
titleSuffix: Windows Autopilot
64
description: Use Windows Autopilot to enroll hybrid Azure AD-joined devices in Microsoft Intune.
7-
keywords:
8-
author: ErikjeMS
9-
ms.author: erikje
5+
author: aczechowski
6+
ms.author: aaroncz
107
manager: dougeby
11-
ms.date: 06/22/2021
8+
ms.reviewer: jubaptis
9+
ms.date: 08/03/2022
1210
ms.topic: how-to
13-
ms.service: microsoft-intune
14-
ms.subservice: enrollment
15-
ms.localizationpriority: high
16-
ms.technology:
17-
ms.assetid: 8518d8fa-a0de-449d-89b6-8a33fad7b3eb
18-
19-
# optional metadata
20-
21-
#ROBOTS:
22-
#audience:
23-
24-
ms.reviewer: priyar
25-
ms.suite: ems
26-
search.appverid: MET150
27-
#ms.tgt_pltfrm:
28-
ms.custom: seodec18
11+
ms.prod: w10
12+
ms.localizationpriority: medium
2913
ms.collection:
3014
- M365-identity-device-management
3115
- highpri
3216
---
3317

34-
3518
# Deploy hybrid Azure AD-joined devices by using Intune and Windows Autopilot
3619

3720
**Applies to**
@@ -43,7 +26,7 @@ You can use Intune and Windows Autopilot to set up hybrid Azure Active Directory
4326

4427
## Prerequisites
4528

46-
Successfully configure your [hybrid Azure AD-joined devices](/azure/active-directory/devices/hybrid-azuread-join-plan). Be sure to [verify your device registration](/azure/active-directory/devices/hybrid-azuread-join-managed-domains#verify-the-registration) by using the Get-MsolDevice cmdlet.
29+
Successfully configure your [hybrid Azure AD-joined devices](/azure/active-directory/devices/hybrid-azuread-join-plan). Be sure to [verify your device registration](/azure/active-directory/devices/howto-hybrid-join-verify) by using the Get-MsolDevice cmdlet.
4730

4831
The device to be enrolled must follow these requirements:
4932

@@ -115,60 +98,62 @@ The organizational unit that's granted the rights to create computers must match
11598

11699
### Before you begin
117100

118-
- The Intune Connector for Active Directory must be installed on a computer that's running Windows Server 2016 or later.
119-
- The computer must have access to the internet and your Active Directory.
101+
- The Intune Connector for Active Directory must be installed on a computer that's running Windows Server 2016 or later with .NET Framework version 4.7.2 or later.
102+
103+
- The computer must have access to the internet and your Active Directory.
104+
120105
- To increase scale and availability, you can install multiple connectors in your environment. We recommend installing the Connector on a server that's not running any other Intune connectors. Each connector must be able to create computer objects in any domain that you want to support.
121106

122107
- If your organization has multiple domains and you install multiple Intune Connectors, you must use a service account that can create computer objects in all domains, even if you plan to implement hybrid Azure AD join only for a specific domain. If these are untrusted domains, you must uninstall the connectors from domains in which you don't want to use Windows Autopilot. Otherwise, with multiple connectors across multiple domains, all connectors must be able to create computer objects in all domains.
123108

124109
This connector service account must have the following permissions:
125110

126-
- **[Log on as a service](/system-center/scsm/enable-service-log-on-sm)**
111+
- [**Log on as a service**](/windows/security/threat-protection/security-policy-settings/log-on-as-a-service)
127112
- Must be part of the **Domain user** group
128113
- Must be a member of the local **Administrators** group on the Windows server that hosts the connector
129114

130115
- The Intune Connector requires the [same endpoints as Intune](../intune/fundamentals/intune-endpoints.md).
131116

132117
### Install steps
133118

134-
1. Turn off IE Enhanced Security Configuration. By default Windows Server has Internet Explorer Enhanced Security Configuration turned on. If you're unable to sign in to the Intune Connector for Active Directory, then turn off IE Enhanced Security Configuration for the Administrator. [How To Turn Off Internet Explorer Enhanced Security Configuration](/archive/blogs/chenley/how-to-turn-off-internet-explorer-enhanced-security-configuration).
135-
2. In the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), select **Devices** > **Windows** > **Windows enrollment** > **Intune Connector for Active Directory** > **Add**.
119+
1. Turn off IE Enhanced Security Configuration. By default Windows Server has Internet Explorer Enhanced Security Configuration turned on. If you're unable to sign in to the Intune Connector for Active Directory, then turn off IE Enhanced Security Configuration for the Administrator. [How to turn off Internet Explorer enhanced security configuration](/archive/blogs/chenley/how-to-turn-off-internet-explorer-enhanced-security-configuration).
120+
2. In the [Microsoft Endpoint Manager admin center](https://endpoint.microsoft.com/), select **Devices** > **Windows** > **Windows enrollment** > **Intune Connector for Active Directory** > **Add**.
136121
3. Follow the instructions to download the Connector.
137122
4. Open the downloaded Connector setup file, *ODJConnectorBootstrapper.exe*, to install the Connector.
138123
5. At the end of the setup, select **Configure**.
139124
6. Select **Sign In**.
140-
7. Enter the Global administrator or Intune administrator role credentials.
125+
7. Enter the Global administrator or Intune administrator role credentials.
141126
The user account must have an assigned Intune license.
142127
8. Go to **Devices** > **Windows** > **Windows enrollment** > **Intune Connector for Active Directory**, and then confirm that the connection status is **Active**.
143128

144129
> [!NOTE]
145-
>
130+
>
146131
> - The Global administrator role is a temporary requirement at the time of installation.
147-
> - After you sign in to the Connector, it can take several minutes to appear in the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431). It appears only if it can successfully communicate with the Intune service.
132+
> - After you sign in to the Connector, it can take several minutes to appear in the [Microsoft Endpoint Manager admin center](https://endpoint.microsoft.com/). It appears only if it can successfully communicate with the Intune service.
148133
> - Inactive Intune connectors still appear in the Intune Connectors blade and will automatically be cleaned up after 30 days.
149134
150135
### Configure web proxy settings
151136

152137
If you have a web proxy in your networking environment, ensure that the Intune Connector for Active Directory works properly by referring to [Work with existing on-premises proxy servers](../intune/enrollment/autopilot-hybrid-connector-proxy.md).
153138

154-
155139
## Create a device group
156-
1. In the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), select **Groups** > **New group**.
140+
141+
1. In the [Microsoft Endpoint Manager admin center](https://endpoint.microsoft.com/), select **Groups** > **New group**.
157142

158143
1. In the **Group** pane, choose the following options:
159144

160145
1. For **Group type**, select **Security**.
161146
2. Enter a **Group name** and **Group description**.
162147
3. Select a **Membership type**.
163148

164-
4. If you selected **Dynamic Devices** for the membership type, in the **Group** pane, select **Dynamic device members**.
149+
1. If you selected **Dynamic Devices** for the membership type, in the **Group** pane, select **Dynamic device members**.
165150

166-
5. Select **Edit** in the **Rule syntax** box and enter one of the following code lines:
151+
1. Select **Edit** in the **Rule syntax** box and enter one of the following code lines:
167152
- To create a group that includes all your Autopilot devices, enter `(device.devicePhysicalIDs -any _ -contains "[ZTDId]")`.
168153
- Intune's Group Tag field maps to the OrderID attribute on Azure AD devices. If you want to create a group that includes all of your Autopilot devices with a specific Group Tag (OrderID), type: `(device.devicePhysicalIds -any _ -eq "[OrderID]:179887111881")`.
169154
- To create a group that includes all your Autopilot devices with a specific Purchase Order ID, enter `(device.devicePhysicalIds -any _ -eq "[PurchaseOrderId]:76222342342")`.
170-
171-
6. Select **Save** > **Create**.
155+
156+
1. Select **Save** > **Create**.
172157

173158
## Register your Autopilot devices
174159

@@ -190,24 +175,27 @@ If your devices aren't yet enrolled, you can register them yourself. For more in
190175
If you're buying new devices, some OEMs can register the devices for you. For more information, see [OEM registration](oem-registration.md).
191176

192177
Before they're enrolled in Intune, *registered* Autopilot devices are displayed in three places (with names set to their serial numbers):
178+
193179
- The **Autopilot Devices** pane in the Intune in the Azure portal. Select **Device enrollment** > **Windows enrollment** > **Devices**.
194180
- The **Azure AD devices** pane in the Intune in the Azure portal. Select **Devices** > **Azure AD Devices**.
195181
- The **Azure AD All Devices** pane in Azure Active Directory in the Azure portal by selecting **Devices** > **All Devices**.
196182

197183
After your Autopilot devices are *enrolled*, they're displayed in four places:
184+
198185
- The **Autopilot Devices** pane in the Intune in the Azure portal. Select **Device enrollment** > **Windows enrollment** > **Devices**.
199186
- The **Azure AD devices** pane in the Intune in the Azure portal. Select **Devices** > **Azure AD Devices**.
200187
- The **Azure AD All Devices** pane in Azure Active Directory in the Azure portal. Select **Devices** > **All Devices**.
201188
- The **All Devices** pane in the Intune in the Azure portal. Select **Devices** > **All Devices**.
202189

203190
After your Autopilot devices are enrolled, their names become the hostname of the device. By default, the hostname begins with *DESKTOP-*.
204-
A device object is pre-created in Azure AD once a device is registered in Autopilot. When a device goes through a hybrid Azure AD deployment, by design, another device object is created resulting in duplicate entries.
191+
A device object is pre-created in Azure AD once a device is registered in Autopilot. When a device goes through a hybrid Azure AD deployment, by design, another device object is created resulting in duplicate entries.
205192

206-
## Supported BYO VPNs
193+
## Supported BYO VPNs
207194

208-
Here is a list of VPN clients that are known to be tested and validated:
195+
Here's a list of VPN clients that are known to be tested and validated:
196+
197+
### Supported clients
209198

210-
**Supported clients:**
211199
- In-box Windows VPN client
212200
- Cisco AnyConnect (Win32 client)
213201
- Pulse Secure (Win32 client)
@@ -217,17 +205,17 @@ Here is a list of VPN clients that are known to be tested and validated:
217205
- SonicWall (Win32 client)
218206
- FortiClient VPN (Win32 client)
219207

220-
**Not supported clients:**
208+
### Not supported clients
209+
221210
- UWP-based VPN plug-ins
222211
- Anything that requires a user cert
223212
- DirectAccess
224-
225-
226213

227214
## Create and assign an Autopilot deployment profile
215+
228216
Autopilot deployment profiles are used to configure the Autopilot devices.
229217

230-
1. In the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), select **Devices** > **Windows** > **Windows enrollment** > **Deployment Profiles** > **Create Profile**.
218+
1. In the [Microsoft Endpoint Manager admin center](https://endpoint.microsoft.com/), select **Devices** > **Windows** > **Windows enrollment** > **Deployment Profiles** > **Create Profile**.
231219
2. On the **Basics** page, type a **Name** and optional **Description**.
232220
3. If you want all devices in the assigned groups to automatically convert to Autopilot, set **Convert all targeted devices to Autopilot** to **Yes**. All corporate owned, non-Autopilot devices in assigned groups will register with the Autopilot deployment service. Personally owned devices won't be converted to Autopilot. Allow 48 hours for the registration to be processed. When the device is unenrolled and reset, Autopilot will enroll it. After a device is registered in this way, disabling this option or removing the profile assignment won't remove the device from the Autopilot deployment service. You must instead [remove the device directly](add-devices.md#delete-autopilot-devices).
233221
4. Select **Next**.
@@ -245,43 +233,43 @@ It takes about 15 minutes for the device profile status to change from *Not assi
245233

246234
## (Optional) Turn on the enrollment status page
247235

248-
1. In the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), select **Devices** > **Windows** > **Windows enrollment** > **Enrollment Status Page**.
236+
1. In the [Microsoft Endpoint Manager admin center](https://endpoint.microsoft.com/), select **Devices** > **Windows** > **Windows enrollment** > **Enrollment Status Page**.
249237
2. In the **Enrollment Status Page** pane, select **Default** > **Settings**.
250238
3. In the **Show app and profile installation progress** box, select **Yes**.
251239
4. Configure the other options as needed.
252240
5. Select **Save**.
253241

254242
## Create and assign a Domain Join profile
255243

256-
1. In the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), select **Devices** > **Configuration profiles** > **Create Profile**.
257-
2. Enter the following properties:
244+
1. In the [Microsoft Endpoint Manager admin center](https://endpoint.microsoft.com/), select **Devices** > **Configuration profiles** > **Create Profile**.
245+
1. Enter the following properties:
258246
- **Name**: Enter a descriptive name for the new profile.
259247
- **Description**: Enter a description for the profile.
260248
- **Platform**: Select **Windows 10 and later**.
261249
- **Profile type**: Select **Templates**, choose the template name **Domain Join**, and select **Create**.
262-
3. Enter the **Name** and **Description** and select **Next**.
263-
5. Provide a **Computer name prefix** and **Domain name**.
264-
6. (Optional) Provide an **Organizational unit** (OU) in [DN format](/windows/desktop/ad/object-names-and-identities#distinguished-name). Your options include:
250+
1. Enter the **Name** and **Description** and select **Next**.
251+
1. Provide a **Computer name prefix** and **Domain name**.
252+
1. (Optional) Provide an **Organizational unit** (OU) in [DN format](/windows/desktop/ad/object-names-and-identities#distinguished-name). Your options include:
265253
- Provide an OU in which you've delegated control to your Windows 2016 device that is running the Intune Connector.
266-
- Provide an OU in which you've delegated control to the root computers in your on-prem Active Directory.
267-
- If you leave this blank, the computer object will be created in the Active Directory default container (CN=Computers if you never [changed it](https://support.microsoft.com/help/324949/redirecting-the-users-and-computers-containers-in-active-directory-dom)).
268-
254+
- Provide an OU in which you've delegated control to the root computers in your on-premises Active Directory.
255+
- If you leave this blank, the computer object will be created in the Active Directory default container (`CN=Computers` if you never [changed it](/troubleshoot/windows-server/identity/redirect-users-computers-containers)).
256+
269257
Here are some valid examples:
270-
- OU=Sub OU,OU=TopLevel OU,DC=contoso,DC=com
271-
- OU=Mine,DC=contoso,DC=com
272-
258+
- `OU=Sub OU,OU=TopLevel OU,DC=contoso,DC=com`
259+
- `OU=Mine,DC=contoso,DC=com`
260+
273261
Here are some examples that aren't valid:
274-
- CN=Computers,DC=contoso,DC=com (you can't specify a container, instead leave the value blank to use the default for the domain)
275-
- OU=Mine (you must specify the domain via the DC= attributes)
276-
262+
- `CN=Computers,DC=contoso,DC=com` (you can't specify a container, instead leave the value blank to use the default for the domain)
263+
- `OU=Mine` (you must specify the domain via the `DC=` attributes)
264+
277265
> [!NOTE]
278266
> Don't use quotation marks around the value in **Organizational unit**.
279267
280-
5. Select **OK** > **Create**. The profile is created and displayed in the list.
281-
6. [Assign a device profile](../intune/configuration/device-profile-assign.md#assign-a-device-profile) to the same group used at the step [Create a device group](windows-autopilot-hybrid.md#create-a-device-group). Different groups can be used if there's a need to join devices to different domains or OUs.
268+
1. Select **OK** > **Create**. The profile is created and displayed in the list.
269+
1. [Assign a device profile](../intune/configuration/device-profile-assign.md#assign-a-device-profile) to the same group used at the step [Create a device group](windows-autopilot-hybrid.md#create-a-device-group). Different groups can be used if there's a need to join devices to different domains or OUs.
282270

283271
> [!NOTE]
284-
> The naming capabilities for Windows Autopilot for Hybrid Azure AD Join do not support variables such as %SERIAL% and only support prefixes for the computer name.
272+
> The naming capabilities for Windows Autopilot for Hybrid Azure AD Join don't support variables such as %SERIAL% and only support prefixes for the computer name.
285273
286274
## Next steps
287275

0 commit comments

Comments
 (0)