You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: memdocs/autopilot/windows-autopilot-hybrid.md
+54-66Lines changed: 54 additions & 66 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,37 +1,20 @@
1
1
---
2
-
# required metadata
3
-
4
-
title: Enrollment for hybrid Azure AD-joined devices - Windows Autopilot
5
-
titleSuffix:
2
+
title: Enrollment for hybrid Azure AD-joined devices
3
+
titleSuffix: Windows Autopilot
6
4
description: Use Windows Autopilot to enroll hybrid Azure AD-joined devices in Microsoft Intune.
7
-
keywords:
8
-
author: ErikjeMS
9
-
ms.author: erikje
5
+
author: aczechowski
6
+
ms.author: aaroncz
10
7
manager: dougeby
11
-
ms.date: 06/22/2021
8
+
ms.reviewer: jubaptis
9
+
ms.date: 08/03/2022
12
10
ms.topic: how-to
13
-
ms.service: microsoft-intune
14
-
ms.subservice: enrollment
15
-
ms.localizationpriority: high
16
-
ms.technology:
17
-
ms.assetid: 8518d8fa-a0de-449d-89b6-8a33fad7b3eb
18
-
19
-
# optional metadata
20
-
21
-
#ROBOTS:
22
-
#audience:
23
-
24
-
ms.reviewer: priyar
25
-
ms.suite: ems
26
-
search.appverid: MET150
27
-
#ms.tgt_pltfrm:
28
-
ms.custom: seodec18
11
+
ms.prod: w10
12
+
ms.localizationpriority: medium
29
13
ms.collection:
30
14
- M365-identity-device-management
31
15
- highpri
32
16
---
33
17
34
-
35
18
# Deploy hybrid Azure AD-joined devices by using Intune and Windows Autopilot
36
19
37
20
**Applies to**
@@ -43,7 +26,7 @@ You can use Intune and Windows Autopilot to set up hybrid Azure Active Directory
43
26
44
27
## Prerequisites
45
28
46
-
Successfully configure your [hybrid Azure AD-joined devices](/azure/active-directory/devices/hybrid-azuread-join-plan). Be sure to [verify your device registration](/azure/active-directory/devices/hybrid-azuread-join-managed-domains#verify-the-registration) by using the Get-MsolDevice cmdlet.
29
+
Successfully configure your [hybrid Azure AD-joined devices](/azure/active-directory/devices/hybrid-azuread-join-plan). Be sure to [verify your device registration](/azure/active-directory/devices/howto-hybrid-join-verify) by using the Get-MsolDevice cmdlet.
47
30
48
31
The device to be enrolled must follow these requirements:
49
32
@@ -115,60 +98,62 @@ The organizational unit that's granted the rights to create computers must match
115
98
116
99
### Before you begin
117
100
118
-
- The Intune Connector for Active Directory must be installed on a computer that's running Windows Server 2016 or later.
119
-
- The computer must have access to the internet and your Active Directory.
101
+
- The Intune Connector for Active Directory must be installed on a computer that's running Windows Server 2016 or later with .NET Framework version 4.7.2 or later.
102
+
103
+
- The computer must have access to the internet and your Active Directory.
104
+
120
105
- To increase scale and availability, you can install multiple connectors in your environment. We recommend installing the Connector on a server that's not running any other Intune connectors. Each connector must be able to create computer objects in any domain that you want to support.
121
106
122
107
- If your organization has multiple domains and you install multiple Intune Connectors, you must use a service account that can create computer objects in all domains, even if you plan to implement hybrid Azure AD join only for a specific domain. If these are untrusted domains, you must uninstall the connectors from domains in which you don't want to use Windows Autopilot. Otherwise, with multiple connectors across multiple domains, all connectors must be able to create computer objects in all domains.
123
108
124
109
This connector service account must have the following permissions:
125
110
126
-
-**[Log on as a service](/system-center/scsm/enable-service-log-on-sm)**
111
+
-[**Log on as a service**](/windows/security/threat-protection/security-policy-settings/log-on-as-a-service)
127
112
- Must be part of the **Domain user** group
128
113
- Must be a member of the local **Administrators** group on the Windows server that hosts the connector
129
114
130
115
- The Intune Connector requires the [same endpoints as Intune](../intune/fundamentals/intune-endpoints.md).
131
116
132
117
### Install steps
133
118
134
-
1. Turn off IE Enhanced Security Configuration. By default Windows Server has Internet Explorer Enhanced Security Configuration turned on. If you're unable to sign in to the Intune Connector for Active Directory, then turn off IE Enhanced Security Configuration for the Administrator. [How To Turn Off Internet Explorer Enhanced Security Configuration](/archive/blogs/chenley/how-to-turn-off-internet-explorer-enhanced-security-configuration).
135
-
2. In the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), select **Devices** > **Windows** > **Windows enrollment** > **Intune Connector for Active Directory** > **Add**.
119
+
1. Turn off IE Enhanced Security Configuration. By default Windows Server has Internet Explorer Enhanced Security Configuration turned on. If you're unable to sign in to the Intune Connector for Active Directory, then turn off IE Enhanced Security Configuration for the Administrator. [How to turn off Internet Explorer enhanced security configuration](/archive/blogs/chenley/how-to-turn-off-internet-explorer-enhanced-security-configuration).
120
+
2. In the [Microsoft Endpoint Manager admin center](https://endpoint.microsoft.com/), select **Devices** > **Windows** > **Windows enrollment** > **Intune Connector for Active Directory** > **Add**.
136
121
3. Follow the instructions to download the Connector.
137
122
4. Open the downloaded Connector setup file, *ODJConnectorBootstrapper.exe*, to install the Connector.
138
123
5. At the end of the setup, select **Configure**.
139
124
6. Select **Sign In**.
140
-
7. Enter the Global administrator or Intune administrator role credentials.
125
+
7. Enter the Global administrator or Intune administrator role credentials.
141
126
The user account must have an assigned Intune license.
142
127
8. Go to **Devices** > **Windows** > **Windows enrollment** > **Intune Connector for Active Directory**, and then confirm that the connection status is **Active**.
143
128
144
129
> [!NOTE]
145
-
>
130
+
>
146
131
> - The Global administrator role is a temporary requirement at the time of installation.
147
-
> - After you sign in to the Connector, it can take several minutes to appear in the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431). It appears only if it can successfully communicate with the Intune service.
132
+
> - After you sign in to the Connector, it can take several minutes to appear in the [Microsoft Endpoint Manager admin center](https://endpoint.microsoft.com/). It appears only if it can successfully communicate with the Intune service.
148
133
> - Inactive Intune connectors still appear in the Intune Connectors blade and will automatically be cleaned up after 30 days.
149
134
150
135
### Configure web proxy settings
151
136
152
137
If you have a web proxy in your networking environment, ensure that the Intune Connector for Active Directory works properly by referring to [Work with existing on-premises proxy servers](../intune/enrollment/autopilot-hybrid-connector-proxy.md).
153
138
154
-
155
139
## Create a device group
156
-
1. In the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), select **Groups** > **New group**.
140
+
141
+
1. In the [Microsoft Endpoint Manager admin center](https://endpoint.microsoft.com/), select **Groups** > **New group**.
157
142
158
143
1. In the **Group** pane, choose the following options:
159
144
160
145
1. For **Group type**, select **Security**.
161
146
2. Enter a **Group name** and **Group description**.
162
147
3. Select a **Membership type**.
163
148
164
-
4. If you selected **Dynamic Devices** for the membership type, in the **Group** pane, select **Dynamic device members**.
149
+
1. If you selected **Dynamic Devices** for the membership type, in the **Group** pane, select **Dynamic device members**.
165
150
166
-
5. Select **Edit** in the **Rule syntax** box and enter one of the following code lines:
151
+
1. Select **Edit** in the **Rule syntax** box and enter one of the following code lines:
167
152
- To create a group that includes all your Autopilot devices, enter `(device.devicePhysicalIDs -any _ -contains "[ZTDId]")`.
168
153
- Intune's Group Tag field maps to the OrderID attribute on Azure AD devices. If you want to create a group that includes all of your Autopilot devices with a specific Group Tag (OrderID), type: `(device.devicePhysicalIds -any _ -eq "[OrderID]:179887111881")`.
169
154
- To create a group that includes all your Autopilot devices with a specific Purchase Order ID, enter `(device.devicePhysicalIds -any _ -eq "[PurchaseOrderId]:76222342342")`.
170
-
171
-
6. Select **Save** > **Create**.
155
+
156
+
1. Select **Save** > **Create**.
172
157
173
158
## Register your Autopilot devices
174
159
@@ -190,24 +175,27 @@ If your devices aren't yet enrolled, you can register them yourself. For more in
190
175
If you're buying new devices, some OEMs can register the devices for you. For more information, see [OEM registration](oem-registration.md).
191
176
192
177
Before they're enrolled in Intune, *registered* Autopilot devices are displayed in three places (with names set to their serial numbers):
178
+
193
179
- The **Autopilot Devices** pane in the Intune in the Azure portal. Select **Device enrollment** > **Windows enrollment** > **Devices**.
194
180
- The **Azure AD devices** pane in the Intune in the Azure portal. Select **Devices** > **Azure AD Devices**.
195
181
- The **Azure AD All Devices** pane in Azure Active Directory in the Azure portal by selecting **Devices** > **All Devices**.
196
182
197
183
After your Autopilot devices are *enrolled*, they're displayed in four places:
184
+
198
185
- The **Autopilot Devices** pane in the Intune in the Azure portal. Select **Device enrollment** > **Windows enrollment** > **Devices**.
199
186
- The **Azure AD devices** pane in the Intune in the Azure portal. Select **Devices** > **Azure AD Devices**.
200
187
- The **Azure AD All Devices** pane in Azure Active Directory in the Azure portal. Select **Devices** > **All Devices**.
201
188
- The **All Devices** pane in the Intune in the Azure portal. Select **Devices** > **All Devices**.
202
189
203
190
After your Autopilot devices are enrolled, their names become the hostname of the device. By default, the hostname begins with *DESKTOP-*.
204
-
A device object is pre-created in Azure AD once a device is registered in Autopilot. When a device goes through a hybrid Azure AD deployment, by design, another device object is created resulting in duplicate entries.
191
+
A device object is pre-created in Azure AD once a device is registered in Autopilot. When a device goes through a hybrid Azure AD deployment, by design, another device object is created resulting in duplicate entries.
205
192
206
-
## Supported BYO VPNs
193
+
## Supported BYO VPNs
207
194
208
-
Here is a list of VPN clients that are known to be tested and validated:
195
+
Here's a list of VPN clients that are known to be tested and validated:
196
+
197
+
### Supported clients
209
198
210
-
**Supported clients:**
211
199
- In-box Windows VPN client
212
200
- Cisco AnyConnect (Win32 client)
213
201
- Pulse Secure (Win32 client)
@@ -217,17 +205,17 @@ Here is a list of VPN clients that are known to be tested and validated:
217
205
- SonicWall (Win32 client)
218
206
- FortiClient VPN (Win32 client)
219
207
220
-
**Not supported clients:**
208
+
### Not supported clients
209
+
221
210
- UWP-based VPN plug-ins
222
211
- Anything that requires a user cert
223
212
- DirectAccess
224
-
225
-
226
213
227
214
## Create and assign an Autopilot deployment profile
215
+
228
216
Autopilot deployment profiles are used to configure the Autopilot devices.
2. On the **Basics** page, type a **Name** and optional **Description**.
232
220
3. If you want all devices in the assigned groups to automatically convert to Autopilot, set **Convert all targeted devices to Autopilot** to **Yes**. All corporate owned, non-Autopilot devices in assigned groups will register with the Autopilot deployment service. Personally owned devices won't be converted to Autopilot. Allow 48 hours for the registration to be processed. When the device is unenrolled and reset, Autopilot will enroll it. After a device is registered in this way, disabling this option or removing the profile assignment won't remove the device from the Autopilot deployment service. You must instead [remove the device directly](add-devices.md#delete-autopilot-devices).
233
221
4. Select **Next**.
@@ -245,43 +233,43 @@ It takes about 15 minutes for the device profile status to change from *Not assi
245
233
246
234
## (Optional) Turn on the enrollment status page
247
235
248
-
1. In the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), select **Devices** > **Windows** > **Windows enrollment** > **Enrollment Status Page**.
236
+
1. In the [Microsoft Endpoint Manager admin center](https://endpoint.microsoft.com/), select **Devices** > **Windows** > **Windows enrollment** > **Enrollment Status Page**.
249
237
2. In the **Enrollment Status Page** pane, select **Default** > **Settings**.
250
238
3. In the **Show app and profile installation progress** box, select **Yes**.
251
239
4. Configure the other options as needed.
252
240
5. Select **Save**.
253
241
254
242
## Create and assign a Domain Join profile
255
243
256
-
1. In the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), select **Devices** > **Configuration profiles** > **Create Profile**.
257
-
2. Enter the following properties:
244
+
1. In the [Microsoft Endpoint Manager admin center](https://endpoint.microsoft.com/), select **Devices** > **Configuration profiles** > **Create Profile**.
245
+
1. Enter the following properties:
258
246
-**Name**: Enter a descriptive name for the new profile.
259
247
-**Description**: Enter a description for the profile.
260
248
-**Platform**: Select **Windows 10 and later**.
261
249
-**Profile type**: Select **Templates**, choose the template name **Domain Join**, and select **Create**.
262
-
3. Enter the **Name** and **Description** and select **Next**.
263
-
5. Provide a **Computer name prefix** and **Domain name**.
264
-
6. (Optional) Provide an **Organizational unit** (OU) in [DN format](/windows/desktop/ad/object-names-and-identities#distinguished-name). Your options include:
250
+
1. Enter the **Name** and **Description** and select **Next**.
251
+
1. Provide a **Computer name prefix** and **Domain name**.
252
+
1. (Optional) Provide an **Organizational unit** (OU) in [DN format](/windows/desktop/ad/object-names-and-identities#distinguished-name). Your options include:
265
253
- Provide an OU in which you've delegated control to your Windows 2016 device that is running the Intune Connector.
266
-
- Provide an OU in which you've delegated control to the root computers in your on-prem Active Directory.
267
-
- If you leave this blank, the computer object will be created in the Active Directory default container (CN=Computers if you never [changed it](https://support.microsoft.com/help/324949/redirecting-the-users-and-computers-containers-in-active-directory-dom)).
268
-
254
+
- Provide an OU in which you've delegated control to the root computers in your on-premises Active Directory.
255
+
- If you leave this blank, the computer object will be created in the Active Directory default container (`CN=Computers` if you never [changed it](/troubleshoot/windows-server/identity/redirect-users-computers-containers)).
256
+
269
257
Here are some valid examples:
270
-
- OU=Sub OU,OU=TopLevel OU,DC=contoso,DC=com
271
-
- OU=Mine,DC=contoso,DC=com
272
-
258
+
-`OU=Sub OU,OU=TopLevel OU,DC=contoso,DC=com`
259
+
-`OU=Mine,DC=contoso,DC=com`
260
+
273
261
Here are some examples that aren't valid:
274
-
- CN=Computers,DC=contoso,DC=com (you can't specify a container, instead leave the value blank to use the default for the domain)
275
-
- OU=Mine (you must specify the domain via the DC= attributes)
276
-
262
+
-`CN=Computers,DC=contoso,DC=com` (you can't specify a container, instead leave the value blank to use the default for the domain)
263
+
-`OU=Mine` (you must specify the domain via the `DC=` attributes)
264
+
277
265
> [!NOTE]
278
266
> Don't use quotation marks around the value in **Organizational unit**.
279
267
280
-
5. Select **OK** > **Create**. The profile is created and displayed in the list.
281
-
6.[Assign a device profile](../intune/configuration/device-profile-assign.md#assign-a-device-profile) to the same group used at the step [Create a device group](windows-autopilot-hybrid.md#create-a-device-group). Different groups can be used if there's a need to join devices to different domains or OUs.
268
+
1. Select **OK** > **Create**. The profile is created and displayed in the list.
269
+
1.[Assign a device profile](../intune/configuration/device-profile-assign.md#assign-a-device-profile) to the same group used at the step [Create a device group](windows-autopilot-hybrid.md#create-a-device-group). Different groups can be used if there's a need to join devices to different domains or OUs.
282
270
283
271
> [!NOTE]
284
-
> The naming capabilities for Windows Autopilot for Hybrid Azure AD Join do not support variables such as %SERIAL% and only support prefixes for the computer name.
272
+
> The naming capabilities for Windows Autopilot for Hybrid Azure AD Join don't support variables such as %SERIAL% and only support prefixes for the computer name.
0 commit comments