As part of the new updated release of administrative templates that will let you use Intune to configure select Group Policy settings for Windows PCs. These templates use the Policy Configuration Service Provider (CSP) to provide up to 2500 additional settings from Office, Windows, and OneDrive.
With the ADMX based policies in Intune , we can easy create a policy that sets the OneDrive Know Folder Move (KFM) – in my opinion KFM is necessary to give the end user the best user experience for a Microsoft 365 driven device. It means that with 3 easy policy settings you can enable KFM for users.
To get started you need information on your tenant ID:
Go into your favorite Azure Active Directive (AAD) tool and get your tenant ID.
Click Properties
Select the copy function from the Directory ID and save it to later
How to create the policy in Intune:
Start the M365 Device Management Portal
Select Device configuration
Select Profiles
Select Create profile
Enter a name : OneDrive KFM
Platform : Windows 10 and later
Profile type : Administrative Templates
Click Settings
Search for OneDrive
Then it is just to find and configure the 3 most important setting to get KFM to work – you can also set other settings as your need in your enviroment.
Silently sign in users to the OneDrive sync client with their Windows credentials
Use OneDrive Files On-Demand
Silently move Windows known folders to OneDrive
Select Enable
Enter your tenant ID you found in the AAD portal
Select No
Then you end up with a policy with this 3 settings and you are ready to deploy.
How does it looks like from a end user perspective:
First of all the end user OneDrive verion has to be at least 2018 Build 18.116.0610.0002 I have seen that even if the OneDrive has been update for one user on the device user number 2 can have a different OneDrive version and there for the KFM will not work for that user.
OneDrive will get a new blade called “Auto Save” when KFM is enabled.
The Known Windows folder will get OneDrive Sync icon
The known Windows folders will show up in OneDrive
Happy deployment
Read more at :
Migrate Your Files to OneDrive Easily with Known Folder Move
Our new TeamViewer integration delivers a remote assistance solution for Intune agent-managed Windows PCs.
We’ve introduced a TeamViewer Connector within the Intune admin console that allows you to register your company’s TeamViewer account with Intune. Once you’ve done this, your end users can use the Intune Center on their PCs to request remote assistance, and they’ll receive help from your help desk through a TeamViewer connection. All of the TeamViewer features are available to use during your remote session including chat, remote restart, video, screen annotation, file transfer, and more.
If you’re not already using TeamViewer and want to see how this works, get started with a trial account from TeamViewer. Once you’ve tried it out, jump over to the TeamViewer site to purchase a license from TeamViewer. There are several license options, and all of them work with Intune. For more information about Intune and TeamViewer, please visit their site.
To integrate TeamViewer into Intune go to https://manage.microsoft.com
Admin –> TeamViewer –> Enable
Select Accept
Click Enable
Sign In to your TeamViewer Account
Click Allow
Click Close
Now TeamViewer is enabled and ready to use in Intune
I have upgraded a customer’s AD Connect to the new version just release – with the feature of Device Write back gone from preview to GA. (remember Device back is a AzureAD premium feature)
The device write back was enable as this guide descripted https://azure.microsoft.com/da-dk/documentation/articles/active-directory-aadconnect-get-started-custom-device-writeback/
The only problem was that it was not working 😦
The devices came from AzureAD to the AD Connect database but not into the local AD – after some search for errors with Microsoft Support the solutions was found.
The solutions was to run a “Refresh directory schema”
Microsoft have released CU1 for SCCM 2012 R2 – http://support.microsoft.com/kb/2938441/da
New stuff:
OSD fix for UEFI device – Task sequences may fail on a UEFI-based client if the “Format and Partition” task sequence step runs two times
EndPoint Protection is now included in the MS CU – http://blogs.technet.com/b/configmgrteam/archive/2014/03/27/anti-malware-platform-updates-for-endpoint-protection-will-be-released-to-mu.aspx
FEP and SCEP anti-malware protection support after OSes reach end-of-life – http://blogs.technet.com/b/configmgrteam/archive/2014/03/27/fep-and-scep-anti-malware-protection-support-after-oses-reach-end-of-life.aspx – For example, for Windows XP, this stage starts on July 14th, 2015.
I started this blog post series with “How to get started with Conditional Access” and will continue with some use cases. This use cases can be combined or be implemented stand alone – it all depends what you are your organisation want to accomplish.
In this use case we just add a extra layer of security on top of Azure Active Directory – by disabling legacy authentication, Service Now and other apps that provided a web access through Azure Active directory. This is a recommendation I have when I do EMS projects at customers – and it is a easy way to stop the bad guys from accessing your corporate data. After blog post #2 in the serie about enable MFA you already have modern authentication enabled on your tenant.
By disabling legacy authentication you block access from unsecure protocols – and you need this to be secure in the future. When enabling this you will remove all the loopholes that are in Conditional Access – where you can “cheat” the application to fall back to legacy authentication if modern authentication is failing. But design it will block:
Older Office clients that do not use modern authentication (e.g., Office 2010 client)
Clients that use mail protocols such as IMAP/SMTP/POP
The layout is to disable legacy authentication when:
Accessing all services integrated with Azure AD
From Mobile apps and desktop clients
Inside or Outside of the corporate network
On any devices
Note: Disable legacy auth for Office 365 requires modern authentication enabled
Start the Azure Active Directory admin center
Click Azure Active Directory
Click Conditional Access
Enter a name that makes sense to you : “CA – Block Legacy authentication”
Select Assignments
Select All users
It is recommended to do this at a test group first, and go into production in faces
Select Cloud apps
Select Selected apps
Select All cloud apps
Important : Don’t lock yourself out! Please read and understand what you are doing so you don’t lock you out of the Azure Management Portal
Select Cloud apps
Select Exclude – Selected apps
Select Microsoft Intune Enrollment
Note: When you are trying to create a Conditional Access rules that block you need to have a exclusion on users, apps or conditions
Select Conditions
Select Device Platform
Click Configure – Yes
Select All platforms (Including unsupported)
If you for some reason what different rules on different OS then here is the place to select it
Note: If you have application that do not understand modern authentication like some users that are using Office 2010 on the inside network you need to find a solution if it is not possible to upgrade the application, and example is to use the location to allow legacy authentication on the inside of the network.
Select Conditions
Select Client Apps
Select Configure – Yes
Select Mobile apps and desktop clients – other clients
Select Access controls
Select “Block Access”
Now the Conditional Access rule are created and will first take effect when you sets the Enable policy to On
Now for the end user experience:
If the end user is using a application that understand modern authentication there is no change for the end user, but it the end user is using a application the do not understand modern authentication like Office 2010 some mail clients on Android and others.
Here is the example where the end user is trying to use the mail client on a Samsung Android phone with IMAP and getting blocked:
When we look at the sign in logs from Azure AD and see how many attempt that there are with legacy authentication
With in the Sign-ins logs we can see all the failed login attempts with legacy authentication in this case POP.
Note: When legacy authentication is not blocked there are approved application that can fallback to legacy authentication even if you have a Conditional Access rule that requires MFA.
You can also use PowerBi to investigate logins you don’t know about.
Start Microsoft PowerBi : https://powerbi.microsoft.com
In almost every tenant I have started using Conditional Access on – there has been sign-ins both failed but also success from places and applications the companies are using.
It is recommended to block all legacy authentication if it is possible. For some reasons there can be application that still are using legacy authentication – then you can limit from where, from what devices or to what application legacy authentication is allowed instead of allowing legacy authentication by default.
For some Office 365 service it is possible to block for legacy authentication on a service (Sharepoint, Onedrive, etc) level without Conditional Access so if you do not have the Azure AD P1 license please take a look at this.
Read more:
Azure AD Conditional Access support for blocking legacy auth is in Public Preview!
How to use the Azure Active Directory Power BI Content Pack