Skip to content

Commit

Permalink
Merge pull request MicrosoftDocs#2328 from isaiahwilliams/dev-smbdevi…
Browse files Browse the repository at this point in the history
…ce-update

Updating the Hybrid AAD join documentation
  • Loading branch information
Sirkkuw authored Jul 31, 2020
2 parents c9bccfc + 097e5a3 commit e0f9fff
Show file tree
Hide file tree
Showing 2 changed files with 20 additions and 30 deletions.
3 changes: 3 additions & 0 deletions .gitignore
Original file line number Diff line number Diff line change
Expand Up @@ -9,6 +9,9 @@ _repo.*/
.DS_Store
*.db

# Visual Studio 2015/2017 cache/options directory
.vs/

.openpublishing.buildcore.ps1
.vs/slnx.sqlite
.vs/slnx.sqlite
Expand Down
47 changes: 17 additions & 30 deletions microsoft-365/business/manage-windows-devices.md
Original file line number Diff line number Diff line change
Expand Up @@ -72,44 +72,32 @@ On the Microsoft Intune page, select **Device enrollment** and on the **Overview
- Add the desired domain users synced in Azure AD to a [security group](../admin/create-groups/create-groups.md).
- Choose **Select groups** to enable MDM user scope for that security group.

## 4. Set up Service connection point (SCP)
## 4. Create the required resources

These steps are simplified from [configure hybrid azure AD join](https://docs.microsoft.com/azure/active-directory/devices/hybrid-azuread-join-managed-domains#configure-hybrid-azure-ad-join). To complete the steps you need to use Azure AD Connect and your Microsoft 365 Business Premium global admin and Active Directory admin passwords.
Performing the required tasks to [configure hybrid Azure AD join](https://docs.microsoft.com/azure/active-directory/devices/hybrid-azuread-join-managed-domains#configure-hybrid-azure-ad-join) has been simplified through the use of the [Initialize-SecMgmtHybirdDeviceEnrollment](https://github.com/microsoft/secmgmt-open-powershell/blob/master/docs/help/Initialize-SecMgmtHybirdDeviceEnrollment.md) cmdlet found in the [SecMgmt](https://www.powershellgallery.com/packages/SecMgmt) PowerShell module. When you invoke this cmdlet it will create and configure the required service connection point and group policy.

1. Start Azure AD Connect, and then select **Configure**.
2. On the **Additional tasks** page, select **Configure device options**, and then select **Next**.
3. On the **Overview** page, select **Next**.
4. On the **Connect to Azure AD** page, enter the credentials of a global administrator for Microsoft 365 Business Premium.
5. On the **Device options** page, select **Configure Hybrid Azure AD join**, and then select **Next**.
6. On the **SCP** page, for each forest where you want Azure AD Connect to configure the SCP, complete the following steps, and then select **Next**:
- Check the box beside the forest name. The forest should be your AD domain name.
- Under the **Authentication Service** column, open the dropdown and select matching domain name (there should only be one only option).
- Select **Add** to enter the domain administrator credentials.
7. On the **Device operating systems** page, select Windows 10 or later domain-joined devices only.
8. On the **Ready to configure** page, select **Configure**.
9. On the **Configuration complete** page, select **Exit**.
You can install this module by invoking the following from an instance of PowerShell:

```powershell
Install-Module SecMgmt
```

## 5. Create a GPO for Intune Enrollment – ADMX method
> [!IMPORTANT]
> It is recommended that you install this module on the Windows Server running Azure AD Connect.
Use .ADMX template file.
To create the required service connection point and group policy, you will invoke the [Initialize-SecMgmtHybirdDeviceEnrollment](https://github.com/microsoft/secmgmt-open-powershell/blob/master/docs/help/Initialize-SecMgmtHybirdDeviceEnrollment.md) cmdlet. You will need your Microsoft 365 Business Premium global admin credentials when performing this task. When you are ready to create the resources, invoke the following:

1. Log on to AD server, search and open **Server Manager** > **Tools** > **Group Policy Management**.
2. Select your domain name under **Domains** and right-click **Group Policy Objects** to select **New**.
3. Give the new GPO an name, for example “*Cloud_Enrollment*” and then select **OK**.
4. Right-click the new GPO under **Group Policy Objects** and select **Edit**.
5. In the **Group Policy Management Editor**, go to **Computer Configuration** > **Policies** > **Administrative Templates** > **Windows Components** > **MDM**.
6. Right-click **Enable automatic MDM enrollment using default Azure AD credentials** and then select **Enabled** > **OK**. Close the editor window.
```powershell
PS C:\> Connect-SecMgmtAccount
PS C:\> Initialize-SecMgmtHybirdDeviceEnrollment -GroupPolicyDisplayName 'Device Management'
```

> [!IMPORTANT]
> If you do not see the policy **Enable automatic MDM enrollment using default Azure AD credentials**, see [Get the latest Administrative Templates](#get-the-latest-administrative-templates).
The first command will establish a connection with the Microsoft cloud, and when you are prompted, specify your Microsoft 365 Business Premium global admin credentials.

## 6. Deploy the Group Policy
## 5. Link the Group Policy

1. In the Server Manager, under **Domains** > Group Policy objects, select the GPO from Step 3 above, for example “Cloud_Enrollment”.
2. Select the **Scope** tab for your GPO.
3. In the GPO’s Scope tab, right-click the link to the domain under **Links**.
4. Select **Enforced** to deploy the GPO and then **OK** in the confirmation screen.
1. In the Group Policy Management Console (GPMC), right-click on the location where you want to link the policy and select *Link an existing GPO...* from the context menu.
2. Select the policy created in the above step, then click **OK**.

## Get the latest Administrative Templates

Expand All @@ -124,4 +112,3 @@ If you do not see the policy **Enable automatic MDM enrollment using default Azu
6. Restart the Primary Domain Controller for the policy to be available. This procedure will work for any future version as well.

At this point you should be able to see the policy **Enable automatic MDM enrollment using default Azure AD credentials** available.

0 comments on commit e0f9fff

Please sign in to comment.