Saturday, September 7, 2024

Using Azure Virtual Desktop with Microsoft Intune

The following steps are not needed within Windows 365, as the enrolment into Intune happens automatically. Also, make sure that you have followed the previous step (setting MDM user scope to All and MAM user scope to None) before continuing.

Prerequisites:

•  Running Windows 10 Enterprise, version 1809 or later, or running Windows 11.

•  Set up personal remote desktops in Azure.

•  Microsoft Entra hybrid joined and enrolled in Intune in one of the following methods:

            •  Configure Active Directory group policy to automatically enrol devices that are Microsoft Entra                 hybrid joined.

            •  Configuration Manager co-management.

            •  User self-enrollment via Microsoft Entra join.

            •  Microsoft Entra joined and enrolled in Intune by enabling Enroll the VM with Intune in the                        Azure portal. 

Keep in mind that the following Windows 10 desktop device remote actions aren’t supported/recom- mended for Azure Virtual Desktop virtual machines:

•  Autopilot reset

•  BitLocker key rotation 

•  Fresh start

•  Remote lock

•  Reset password

•  Wipe and Retire

Deleting VMs from Azure leaves orphaned device records in Intune. They’ll be automatically cleaned up if the built-in cleanup rules are configured for the tenant.

Let’s get started configuring the GPO that configures automatic MDM enrolment for Hybrid Entra joined devices with a device token:

1.  Log on to your session host.

2.  Open Local Computer Policy and click Administrative Templates | Windows Components | MDM:


Figure : Local group policy – MDM
3. Set the policy to Enabled.

4. Set the credential type to Device Credential:



Figure : Local group policy – MDM

5.  Confirm the MDM enrollment of your session hosts into Entra, which should look like the following examples:

Figure : Admin center – all Windows devices

Thant Zin Phyo@Cracky (MCT, MCE, MVP)

No comments:

Post a Comment