SlideShare una empresa de Scribd logo
1 de 14
Microsoft Solves BYOD Using
Microsoft System Center
Configuration Manager and Windows
Intune
Published November 2013

Microsoft IT uses Microsoft System Center 2012 Configuration Manager with
Windows Intune as their enterprise tool to create a consistent, reliable, and
secure work environment that allows users to be productive anytime,
anywhere, on any device they choose, while meeting Microsoft compliance
and security requirements and while simplifying administration across
heterogeneous device platforms.
Situation
Microsoft Information Technology (Microsoft IT) needed to embrace and adapt to the rising bring
your own device (BYOD) culture by enabling users to access corporate resources from personal
devices without compromising corporate security, increasing infrastructure costs or complexity, or
increasing administrative overhead.
Solution
To address the changes in the enterprise landscape, Microsoft IT enabled Unified Device
Management (UDM). By adding a Windows Intune subscription and deploying the Intune
connector to their Microsoft System Center 2012 Configuration Manager Service Pack 1 (SP1)
environment, Microsoft IT brings all devices, company-owned and user-owned, into the scope of
centralized management while providing users a flexible work environment across multiple device
platforms.
Benefits
• Reduced costs by unifying IT management
infrastructure.
• Simplified administration for managing all
PCs and mobile devices.
Products and Technology

• Increased user productivity while
maintaining compliance and reducing risk.
2 | Microsoft Solves BYOD Using Microsoft System Center Configuration Manager and Windows Intune

• System Center 2012 Configuration Manager
SP1
• Windows Intune

• Active Directory
• Microsoft Online Directory Services
3 | Microsoft Solves BYOD Using Microsoft System Center Configuration Manager and Windows Intune

Situation
Microsoft IT, like many other enterprises, faces an explosion of heterogeneous devices and the
growing challenges created by the bring your own device (BYOD) culture. Long gone are the days of
managing a single user using a single corporate-owned device to access corporate resources. To keep
pace with the need to allow users to work when, where, and with which device best suits them,
Microsoft IT needed to find a new approach for managing the modern workplace. A solution that
would:
Deliver simplified, comprehensive management across device platforms, on-premises and in the
cloud, using a single console for administration, deployment, and reporting.
Integrate into the existing network design without additional investments in hardware or increase
in complexity.
Provide a consistent user experience across device platforms.
Enable access to line of business (LOB) applications from the user’s device of choice without
compromising corporate security.
Microsoft IT uses Microsoft System Center 2012 Configuration Manager to manage devices
connected to its corporate network but was looking for a solution to also manage devices and
applications in the cloud.

Solution
Microsoft IT enabled Unified Device Management (UDM) by leveraging Windows Intune and System
Center 2012 Configuration Manager SP1. This solution retains the scalability and administrative
functionality of Configuration Manager while extending its reach via Windows Intune to cloud-based
device management. With UDM, Microsoft IT uses a single Configuration Manager–based
administrative console to centrally manage both on-premises and cloud-connected computers,
devices, and applications.
With UDM, Microsoft IT is able to:
Extend Configuration Manager infrastructure with Windows Intune to support cloud
management of mobile devices, enabling publication of corporate apps and services across
multiple device types.
Provide consistent access to corporate resources for a variety of devices, regardless of location.
Offer and deploy LOB modern applications dynamically based on device type.
Apply policies across various devices and platforms to meet Microsoft compliance and security
requirements.
Remove corporate data and applications if a device is lost, stolen, or retired from use.
As part of the solution, Microsoft IT implementeda self-service app store, the Company Portal,which
gives Microsoft users the ability to install internal LOB apps on all their devices, virtually anytime or
anywhere.

Deployment
The Microsoft IT UDM service offering focuses on four key areas: device enrollment, application
provisioning, policy, and inventory of hardware and software. Before the deployment and
configuration of UDM could begin, Microsoft IT needed to determine the type of devices they would
support. Based on an analysis of device volume and native LOB apps, the initial scope of the UDM
project was set to support Microsoft Surface RT, Windows Phone 8, and Apple iOSdevices. While UDM
supports Android devices, Microsoft IT did not include them in the initial scope due to lack of internal
LOB apps developed for Android platform. Understanding the scope of devices enabled Microsoft IT
4 | Microsoft Solves BYOD Using Microsoft System Center Configuration Manager and Windows Intune

to coordinate with the appropriate Microsoft teams to configure the Intune Connector, define security
policies, and publish apps to the new Company Portal.

Architecture
UDM consists of a series of components working in concert:
Configuration Manager provides the central administration console for administering both onpremises and cloud-based devices.
Windows Intune Subscription establishes the connection between Configuration Manager and
Intune. It specifies the configuration settings for the Windows Intune service, such as which users
can enroll their devices and which mobile device platforms to manage.
Windows Intune Connector, a Configuration Manager site role, acts as a gateway between
Windows Intune and on-premises Configuration Manager, sending settings and software
deployment information to WindowsIntune and retrieving status and inventory messages from
mobile devices.

Figure 1.Microsoft IT Unified Device Management infrastructure.

The following sections describe the various activities involved in Microsoft IT'sUDM deployment.
Deployment Process
Microsoft IT took a five-step approach to deploying UDM into their existing Configuration Manager
environment.

Build CM SP1
environment

Provision users

Provision
Intune services

Set up DNS
redirection

Acquire device
specific
certificates

Step 1: Build Configuration Manager SP1 environment
Microsoft IT added a Configuration Manager SP1 primary site in the corporate domain hierarchy
specifically for mobile device management. Server hardware consisted of:
A primary site server using a virtual machine with 12 GB of RAM and four core processors.
A Microsoft SQL Server server with 64 GB of RAM and six core processors.
Creating a separate site for mobile device management is not a UDM requirement—UDM is capable
of scaling to large volumes of devices. For Microsoft IT, the decision to create a separate mobile
5 | Microsoft Solves BYOD Using Microsoft System Center Configuration Manager and Windows Intune

device management site instead of incorporating UDM into an existing Configuration Manager site
used for managing PCs and laptops was based around the anticipated volume of mobile devices. With
approximately 180,000 users between full time employees (FTEs) and vendors, Microsoft IT needed to
ensure that the UDM environment could handle a very large number of enrolled mobile devices.
Most small and medium size organizations will not require a separate site and can incorporate Unified
Device Management into their existing site hierarchy.
Step 2: Provision users
Microsoft IT performed user discovery for the entire Microsoft corporate Active Directory forest using
the existing production Configuration Manager environment. This process took a few hours due to
the large user base in Microsoft IT and ensured that all users were added to a user collection before
enabling UDM.
Your organization must determine the extent of your BYOD environment to see if performing a full
user discovery is necessary or if you want to manually add the users allowed to enroll their mobile
devices to Configuration Manager.
Step 3: Provision Windows Intune services
Microsoft IT worked with the Microsoft Online Directory Services (MSODS) team to provision Intune
services for Microsoft IT organizational user (tenant) account and set up the UDM services Admin (the
account used for authentication when creating the Intune Subscription in Configuration Manager).
They also worked with the Active Directory team to configure Directory Sync (DirSync) and Active
Directory Federation Services (ADFS) 2.0.DirSync ensured that all users were synchronized into the
cloud, and ADFS allowed for users to use a single sign-on (SSO) to access all cloud services.
Microsoft had an existing tenant account as they already use Microsoft Office 365 and other cloud
services and already had DirSync and ADFS in place to synchronize data into the cloud. If your
company does not, you will need to:
Sign up for a Windows Intune organizational (tenant) account.
Deploy and configure DirSync to synchronize on-premises Activity Directory users with the
MSODS, creating the user ID used for cloud-based applications.
Deploy ADFS to allow a single identity for each user across both on-premises and cloud-based
applications.
Step 4: Set up DNS redirection
Most companies will benefit from creating a DNS alias (CNAME record type) to redirect
enterpriseenrollment.<yourcompany>.com to allow for server auto discovery. This means users will
not need to know the actual server name when they enroll their device.
Step 5: Acquire device-specific certificates
Each device platform has different requirements for loading applications. Microsoft IT worked with the
Microsoft App team to acquire the certificates required for the supported mobile devices.
At Microsoft, Configuration Manager Admins do not maintain certificates. The Product Release &
Security Services (PRSS) team is the central authority for the signing process used to sign all Windows
Phone 8 and Windows apps applicable to Windows RT devices at Microsoft.
For signing Windows RT and Windows 8 modern apps,Microsoft IT uses one of the child certificates of
the Microsoft Root CA. They configure the Microsoft root certificate in the WindowsIntune
subscription page, enabling Windows RT devices to trust those signed apps.
6 | Microsoft Solves BYOD Using Microsoft System Center Configuration Manager and Windows Intune

Depending on the size of your organization, your model for managing and deploying certificates may
be different. For more information on certificates and/or keys required for each mobile device
platform and from where your company needs to obtain the certificate or key, see Obtain Certificates
or Keys to Meet Prerequisites per Platform under the Prerequisites section of How to Manage Mobile
Devices by Using Configuration Manager and Windows Intune.
UDM Configuration
Enabling UDM requires creating a Windows Intune Subscription and defining a Windows Intune
Connector role in Configuration Manager. To setup and configure UDM, Microsoft IT:
1.

Created a new Intune Subscription. In the Subscription Wizard, they selected Allow the
Configuration Manager console to manage this subscription. This enabled Configuration
Manager to become the authoritative source for managing all mobile devices, providing a
single administration console for on-premises systems, cloud-connected devices, and
application life cycle management.

2.

Defined a user collection. Microsoft IT created a custom user collection for all Microsoft
employees based on the users discovered after performing user discovery for the entire
Microsoft corporate Active Directory forest. This ensured that members of this collection
were licensed for enrollment in UDM.

3.

Configured platform, certificates, and keys.The three platforms that were identified as in
scope for UDM were enabled: Windows Phone 8, Windows RT, and iOS. For each platform,
the required certificates were applied. For Windows Phone 8, they also deployed the
Company Portal app to allow users to start using the Company Portal and installing
applications almost immediately after enrolling their device.

4.

Assigned connector role. Microsoft IT added the Windows Intune Connector site server role
to the Central Administration Site (CAS) server. The Intune Connector server role
communicates directly with Windows Intune and provides the communication gateway
between Configuration Manager and Intune for all incoming and outgoing communication.

Cloud User Sync Monitoring
After UDM is configured, Cloud User Sync, a component in Configuration Manager, provides
communication between Configuration Manager and Windows Intune. It monitors the collection of
users for additions, synchronizes changes with Windows Intune to license users and enables them to
enroll their devices. Microsoft IT makes the following recommendations.
Use delta user discovery and incremental updates settings.
By enabling delta discovery in your Active Directory User Discovery settings and selecting
incremental updates on the collection settings, updates are synchronized on a more frequent
schedule. This ensures licensing of new users and removal of licenses for disabled users happens
quickly.
Use default Cloud User Sync setting.
Cloud User Sync synchronizes changes—new users added to the collection are licensed and
enabled for enrollment; users removed from the collection have their Windows Intune license
revoked. By default, synchronization occurs every five (5) minutes and is a minimal burden on
your Configuration Manager hierarchy and network.
Monitor the following Intune Connector log files:
o Dmpdownloader.logto monitor policy changes downloaded from Windows Intune to
Configuration Manager.
o Dmpuploader.logto monitor policy changes uploaded to Windows Intune from
Configuration Manager.
o Cloudusersync.logto monitor user licensing in Windows Intune.
7 | Microsoft Solves BYOD Using Microsoft System Center Configuration Manager and Windows Intune

Use the CloudUserID field in the User_Disc table in Configuration Manager to identify if users
are licensed.
o Null indicates that user is not licensed to enroll devices.
o All zero GUID indicates that user was previously licensed but is no longer a member of
the user licensing collection.
o Non-zero GUID indicates that the user is licensed to enroll devices.
Note: There is no need to license users separately for each device. When a user is licensed, they are
licensed for up to 20 devices.

Device Enrollment
Along with configuring the UDM architecture, Microsoft IT had to plan the user experience as part of
their deployment. They wanted to ensure that enrolling devices:
Provided a good user experience where users could enroll their devices, gain access to the
Company Portal, and install LOB applications with minimum user intervention.
Enabled users to become productive quickly with the LOB apps by providing a seamless single
sign-on installation. ADFS enables Microsoft users to use the same credentials (their corporate
user ID, email account, and network password) regardless of device.
When a user enrolls a device, Microsoft IT collects general information about the device, such as
manufacturer and any LOB apps installed from the Company Portal (not the Microsoft Store).
Enrollment installs the Company Portal application on the device, enabling users to install applications
by showing them only the applications that are targeted to their user account.
Company Portal
Microsoft has provided their users with the ability to install business applications in the past. The
Company Portal is the next generation, a Windows 8x modern application platform,which allows users
to installinternal business applications by showing them which applications they have permissions to
install based on their role, language, and location. This included an iOS Self-Service Portal (‘Company
Portal’) for users who needed to install enterprise iOS applications on their iPad and iPhone devices.
Microsoft IT tried to create an end user experience that was as similar as possible between all
supported device platforms, but each device platform had some minor differences when deploying
the Company Portal.
Windows Phone 8.The Company Portal is installed as part of the enrollment process. Installing
the Company Portal during enrollment requires the user to select the Install company app or
hubcheck box. This check box is selected by default. If the user clears this check box, they would
need to unenroll the device and then re-enroll if the Company Portal was needed in the future.
Windows RT. The Company Portal is installed as a required app after the enrollment is
completed. Microsoft IT deployed the Company Portal to all users asRequired.
Apple iOS.Usersmust install the Company Portal app from the iOS Self Service Portal, then enroll
their iOS devices.
Modern Application Publishing
Two types of apps are published via the Company Portal:
Sideloaded apps—modern LOB applications developed and published to the Company Portal
where the content is hosted and provided by the Configuration Manager and Windows Intune
hierarchy.
Deep link apps—link to an application in the Microsoft Store (or Apple Marketplace for iOS
apps)stored in Configuration Manager, that users access via the Company Portal. Microsoft IT
8 | Microsoft Solves BYOD Using Microsoft System Center Configuration Manager and Windows Intune

used these for apps that are likely to update often (such as Skype or Microsoft OneNote). It
enabled them to reduce administrative overhead, redirecting users to the Microsoft Store for the
latest version instead of having to manage and publish updates to the Company Portal.
While modern apps are not as resource intensive to provision and deploy, there is still a cost
associated with developing and maintaining them. Microsoft IT applied the following business rules
when determining what applications would be published through the Company Portal. They started
by determining the target number of users for the app. The threshold was set at 1,000 users. While
they did publish a few applications with a user population of 500 users, if the application was used by
less than 1 percent of the company (less than 1,000 users), the application would not be available
through the Company Portal and would require the LOB be publishedvia Microsoft SharePoint or
some other LOB-created site.
As discussed earlier, each platform has different requirements for signing and publishing apps, but
there are some common areas that helped streamline the process for Microsoft IT. Before their users
started to enroll their devices, Microsoft IT:
Worked with the app provisioning team to sign both the Company Portal app and apps created
by the internal Microsoft developers before publishing the apps.
Signed all Windows RT apps with a child certificate from the Microsoft Root CA. As all child
certificates of the Microsoft Root CA cert are trusted, Windows RT apps that are published are
automatically trusted by Windows RT devices.
Worked with PRSS team and formulated a process for signing apps for Windows Phone 8.
Categorized all apps per Microsoft IT App team standards to reduce the need for users to scroll
through hundreds of apps. Users can use Search, but categories made locating apps easier—
especially on mobile phone devices.
Targeted most applications to the built-in All Users and User Groups collection as Available. This
made the apps available in the Company Portal as soon as the user enrolled a device.
Used custom collections based on Active Directory Security Groups to limit the targeted users for
a few applications with specific access requirements,limiting which users could install them.
Troubleshooting Enrollment
Microsoft IT experienced enrollment failures due to a non-standard User Principle Name (UPN)
for some users. The enrollment process is based on a user’s UPN. For some Microsoft users, their
UPN deviated from the standard naming convention and was different from their user alias.
Microsoft IT created a DNS redirection to resolve this issue.
As there are no client logs for enrollment troubleshooting, Microsoft IT needed to take a
systematic approach to troubleshooting.
For troubleshooting general device enrollment issues, Microsoft IT recommends that you verify
the following:
o

The Admin has configured mobile device management.

o

The Admin has enabled enrollment for specific device types.

o

The Admin provisioned the user for mobile device enrollment.

o

The user is not trying to enroll several devices at the same time or does not have
more than 20 mobile devices enrolled in the system.

o

For Windows Phone 8 devices, the code signing certificate is configured properly.

o

For iOS devices, the Apple Push Notification Service certificate is configured or
hasn’t expired, and the device is running iOS v5.0 or later.

For troubleshooting Company Portal related issues, a good place to start the troubleshooting
process is:
9 | Microsoft Solves BYOD Using Microsoft System Center Configuration Manager and Windows Intune

o For Windows RT devices, use the portal log
c:users<useraccount>appdataLocalPacakgesMicrosoft.CompanyportalLocalstateSS
PLOG_<number>.log.
o For Windows Phone 8 devices, a log can be retreived from the portal itself and sent via
email.
Enrollment Lessons Learned
Microsoft IT learned from a few issues that occurred during the enrollment process.
Microsoft IT discovered that both enrollment and re-enrollment of a Windows RT device
consumed a sideloading key. During unenrollment, the sideloading key and assigned device ID
are removed. Re-enrollment is treated as a new device, and a new device ID with sideloading key
is provisioned.
User-initiated un-enrollment did not remove the Company Portal, only disconnected the
Windows RT device from Windows Intune. This is due to the fact that the Company Portal
provides other functions, such as the ability to manage other devices. Microsoft IT needed to
educate both their users and IT admins that this was by design.
User education requirements was another area of learning for Microsoft IT.
o Users were concerned as to what type of information Microsoft IT could see and collect
about their personal devices. They needed to reassure users that the only information
Microsoft IT collects is general information about the device itself (such as the
manufacturer) and any LOB apps installed from the Company Portal—and that no
personal information, such as phone number, personal apps, or apps installed from the
Microsoft Store is collected.
o There were delays in refreshing Windows RT policies due to the Windows RT
maintenance window being set for every 24 hours. Microsoft IT needed to educate users
that some changes were impacted by the default maintenace window. Microsoft IT used
user communications and the company support website, ITWeb, to inform users of
expected delays.
o Differences in the enrollment process for the various mobile devices platforms. For
example, the Windows Phone 8 enrollment user experience and user interfaces are
different from Windows RT, and iOS device enrollment presents additional screens for
adding management profiles on the device that are not seen on Windows Phone 8 or
Windows RT devices. These differences were generating support requests. To address
this, Microsoft IT documented the enrollment process for each device and made available
through the company support website, ITWeb.

Policy and Security Configuration
Making sure that corporate security was maintained as well as providing a good end user experience
required that Microsoft IT coordinate with:
The Microsoft Security team to define the policies that would enforce Microsoft corporate
compliance settings, such as password policy and encryption settings, on mobile devices.
The Exchange team to align policy settings between Exchange ActiveSync (EAS) and UDM.
Microsoft IT leveraged default Compliance Rules built into the Configuration Manager for mobile
devices. They created new Configuration Items (CIs) for mobile devices (different CIs for each device
type to make troubleshooting easier), added built-in compliance rules with values (see table 1) based
on Microsoft IT security requirements, then created a Configuration Baseline for those CIs and
targeted Configuration Baseline to the collection of mobile devices.
Table 1.Microsoft IT compliance settings for mobile devices.
10 | Microsoft Solves BYOD Using Microsoft System Center Configuration Manager and Windows Intune

Corporate Policy

Windows Phone 8

Windows RT

iOS

Device Encryption

TRUE

Not Supported

Not Supported

Password Required

TRUE

Not Supported

TRUE

Allow Simple Password

Not set

Not Supported

TRUE

Min Password Length

4

5 (local only)

4

Max inactive time to lock

15 minutes

15 minutes

15 minutes

Max failed attempts
before wipe

5

Not set

5

Password Expiration

Not Set

70 days (local)

Not Set

Password History

Not Set

Not Set

0

Min Complex Characters

1

1 (local only)

0

Removed Storage

TRUE

Not Supported

Not Supported

Allow Convenience Logon

Not Supported

TRUE

Not Supported

Allow Browser

Not Supported

Not Supported

TRUE

Allow Camera

Not Supported

Not Supported

TRUE

Microsoft IT’s goal is to develop a common set of policies that would scale across devices while
providing a good end user experience. The one policy that created the most issues was the minimum
password length; Windows Phone 8 was four (4) while Windows RT was six (6). Microsoft IT is working
with the Security teams and the Exchange teams to see if they can find a common ground between
their requirements that provides good corporate security without impacting the end user experience.
Microsoft IT makes the following recommendations for configuring your mobile device policies.
Align your policies, such as password/PIN policies, across EAS and UDM to ensure the best end
user experience.
Note: Although the most restrictive policy will apply, different user experiences have the potential
to increase support calls.
If the policy is not applicable to a particular device platform, it will report back which platforms
do not support the policy. Common policies will simplify administration. For example, if you set
the same password requirements across all mobile device platforms, you will not require multiple
CIs and different device collections to support various password policies.
Create custom device collections when policies cannot be aligned across platforms. Use the
Agent Edition attribute in the Configuration Manager console, which shows enrolled device by
device type, to create custom device collections and then target policy baselines to each
collection.
In both your Configuration Items and your Configuration Baselines, enable Remediate
noncompliant settings to enforce compliance settings on the device. If Remediate
noncompliant settings is not enabled on both your Configuration Items and your Configuration
Baselines, your reports will only reflect the current compliance state of enrolled devices but not
enforce compliance rules/settings on those devices.

Device Retirement
11 | Microsoft Solves BYOD Using Microsoft System Center Configuration Manager and Windows Intune

Organizations need a means to enforce security if the user leaves the company or loses their device.
Microsoft IT used the Configuration Manager SP1 wipe and retire options to enforce device security
for retiring enrolled devices.
Microsoft IT used role-based access control (RBAC) in Configuration Manager to limit which
administrators had access to wipe or retire a device by restricting their view in the console.
Note:If you have finished conducting a UDM pilot in your test hierarchy and want to move to a
production hierarchy, it is important to retire all devices from the Configuration Manager console
so that the enrollment from devices is cleaned up and ready for enrollment into your production
hierarchy.

Reporting
Configuration Manager includes many ready-to-use, built-in reports for UDM, including reports for
apps, hardware inventory, and settings management. There is no need to create custom reports or
separate reports for PC and mobile device management. The same report can be used to report on
both environments.
Microsoft IT used built-in Configuration Manager reports to report on their UDM environment. Two
built-in reports that provided Microsoft IT with insight into application install status and policy
compliance status for UDM were:
Security policy compliance report. Home > ConfigMgr_<sitecode>> Compliance and Settings
Management > Summary compliance by configuration baseline
Application compliance report. Home > ConfigMgr_<sitecode>> Software Distribution Application Monitoring > Application compliance
Microsoft IT also used the Configuration Manager console monitoring to easily view and drill down to
the asset level on the status of app deployment and security policy compliance.

While custom reports were not needed due to the built-in reporting capabilities of Configuration
Manager, Microsoft IT did create a custom UDM dashboard specifically for Microsoft executive
management using Microsoft SQL Server 2012 Reporting Services. It provided executive management
visibility into enrollment count trends using graphs and a similar look and feel of other Microsoft IT
dashboards.

Results
12 | Microsoft Solves BYOD Using Microsoft System Center Configuration Manager and Windows Intune

By creating a solution that streamlined administration and deployment of devices and applications,
Microsoft IT was able to increase the scope of their centrally managed devices by 10 percent without
adding additional resources or administrative overhead. They expect this number to continue to
increase at a rapid pace with the potential of centrally managing more than 125,000 mobile devices.
The following table provides a summary of the Microsoft IT UDM deployment.
Windows Phone 8

Windows RT

iOS

Devices enrolled

10,998

1,732

248

LOB apps published

74

124

0

Deep linked apps

36

2

16

Benefits
The Microsoft IT UDM solution provides the following benefits:
Low-cost, scalable solution. Windows Intuneintegrates into the existing Configuration Manager
environment without the need to add new infrastructure, hardware, or network complexity to the
Microsoft IT environment. It provides enterprise-level scalability, extending the reach of
Configuration Manager to support management of Windows RT, Windows Phone 8, and iOS
devices.
Simplified administration.The Configuration Manager console unifies device management,
providing Microsoft IT administators with a single console for administration, application
management, and reporting across multiple device types.
Empowered users.Provide a consistent end user experience across device platforms. Microsoft
users can enroll their personal devices, install internal business applications, and manage their
mobile devices through the Company Portal, allowing them to be more productive from almost
anywhere on almost any device.
Maintained compliance.Apply policies across multiple device platforms to meet Microsoft
compliance and security requirements while providing a good end user experience for Microsoft
users. Security risks for lost, stolen, or retired devices are reduced by removing corporate data
and applications from the device by Microsoft IT administrators through Configuration Manager
or Microsoft users through the Company Portal.

Best Practices
When implementing UDM, Microsoft IT recommends the following best practices:
Plan your deployment.Proper planning before deployment will increase deployment efficiency.
Review your Configuration Manager hierarchy to determine how you will integrate UDM.
Remember, UDM does not require a separate site in your Configuration Manager hierarchy.
Understand which platforms your organization will support. This will help you determine what
types of certificates are required for app deployment.
Acquire and deploy certificates and sideloading keys before enabling user enrollment.
Coordinate with other teams to streamline the app certification process.
Identify and license specific users by using user discovery in Configuration Manager and then
add users to a custom collection that will synchronize these user accounts with Windows Intune.
Enable ADFS to allow users to use the same user name and password to access coprorate
resources.
13 | Microsoft Solves BYOD Using Microsoft System Center Configuration Manager and Windows Intune

Work with your security team and your Exchange team to align passwords and policies across
device platforms to ensure a good user experience without compromising corporate security.
Promote collaboration among all teams involved.A number of different teams in your organization
may need to be involved—including Security, Compliance, application developers, services, and
infrastructure providers. It is important to ensure that all stakeholders can provide input at an early
stage and can work together to allow for a smooth deployment.
Develop a detailed communication and readiness plan.A well-developed support plan and
documentation for user and helpdesk readiness can reduce support costs.
Train helpdesk technicians before deployment. Have training and support content ready on
modern device support, especially any differences in user experience across device platforms.
Educate users. Provide users with documentation on the enrollment steps for each supported
device platform to reduce support calls. Set expectations for any delays between enrollment and
when Company Portal apps are available for installation.Ensure users understand what is being
inventoried on their device to reduce their concerns. Create FAQs for common questions and
document any known issues.
Plan your enrollment process.To ensure a good user experience and to reduce support costs,
consider how you will deploy the Company Portal and LOB apps.
Use categories to organize applications on the Company Portal to make them easier to find.
Use security groups to limit what apps users can see based on their role in the company.
Determine which apps to publish on the Company Portal based on business needs. Determine
how long apps will be maintained on the Company Portal before retiring them.
Evaluate which apps might change frequently and consider using a deep link instead of
deploying the full app.
Use the Windows Phone emulator in the Windows Phone SDK to test the Windows Phone
enrollment experience.

Resources
How to Manage Mobile Devices by Using Configuration Manager and Windows Intune
System Center 2012 Configuration Manager Documentation Library
System Center 2012 Technical Documentation Library
Empower People-Centric IT
Directory Synchronization Roadmap
Microsoft SQL Server 2012 Reporting Services Features and Tasks (SSRS)
How Microsoft IT Deployed System Center 2012 Configuration Manager

Related videos
Microsoft System Center 2012 SP1 - Configuration Manager Overview

For More Information
14 | Microsoft Solves BYOD Using Microsoft System Center Configuration Manager and Windows Intune

For more information about Microsoft products or services, call the Microsoft Sales Information
Center at (800) 426-9400. In Canada, call the Microsoft Canada Order Centre at (800) 933-4750.
Outside the 50 United States and Canada, please contact your local Microsoft subsidiary. To access
information via the World Wide Web, go to:
http://www.microsoft.com
http://www.microsoft.com/microsoft-IT

© 2013 Microsoft Corporation. All rights reserved. Microsoft, Active Directory, Office 365, OneNote,
SharePoint, Skype, SQL Server, Surface, Windows, and Windows Intune are either registered trademarks
or trademarks of Microsoft Corporation in the United States and/or other countries. The names of actual
companies and products mentioned herein may be the trademarks of their respective owners. This
document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR
IMPLIED, IN THIS SUMMARY.

Más contenido relacionado

La actualidad más candente

Cloud vs.data center
Cloud vs.data centerCloud vs.data center
Cloud vs.data center
APEX Global
 

La actualidad más candente (20)

Azure Cloud PPT
Azure Cloud PPTAzure Cloud PPT
Azure Cloud PPT
 
Get started with Windows AutoPilot Deployment
Get started  with Windows AutoPilot DeploymentGet started  with Windows AutoPilot Deployment
Get started with Windows AutoPilot Deployment
 
Microsoft 365 UG Windows Autopilot 1st May 2019
Microsoft 365 UG Windows Autopilot 1st May 2019Microsoft 365 UG Windows Autopilot 1st May 2019
Microsoft 365 UG Windows Autopilot 1st May 2019
 
Microsoft azure
Microsoft azureMicrosoft azure
Microsoft azure
 
Microsoft Azure Cloud Services
Microsoft Azure Cloud ServicesMicrosoft Azure Cloud Services
Microsoft Azure Cloud Services
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Eucalyptus cloud computing
Eucalyptus cloud computingEucalyptus cloud computing
Eucalyptus cloud computing
 
Aws seminar report
Aws seminar report Aws seminar report
Aws seminar report
 
Microsoft Windows Intune getting started guide dec 2012 release
Microsoft Windows Intune getting started guide   dec 2012 releaseMicrosoft Windows Intune getting started guide   dec 2012 release
Microsoft Windows Intune getting started guide dec 2012 release
 
Azure Fundamentals || AZ-900
Azure Fundamentals || AZ-900Azure Fundamentals || AZ-900
Azure Fundamentals || AZ-900
 
Disaster Recovery in the Cloud
Disaster Recovery in the CloudDisaster Recovery in the Cloud
Disaster Recovery in the Cloud
 
Azure Fundamentals Part 1
Azure Fundamentals Part 1Azure Fundamentals Part 1
Azure Fundamentals Part 1
 
Cloud computing presentation.pdf
Cloud computing presentation.pdfCloud computing presentation.pdf
Cloud computing presentation.pdf
 
cloud computing
cloud computingcloud computing
cloud computing
 
PRESENTATION ON CLOUD COMPUTING
PRESENTATION ON CLOUD COMPUTINGPRESENTATION ON CLOUD COMPUTING
PRESENTATION ON CLOUD COMPUTING
 
Cloud Computing and Services | PPT
Cloud Computing and Services | PPTCloud Computing and Services | PPT
Cloud Computing and Services | PPT
 
Modernise your Windows 10 deployment with Windows Autopilot
Modernise your Windows 10 deployment with Windows AutopilotModernise your Windows 10 deployment with Windows Autopilot
Modernise your Windows 10 deployment with Windows Autopilot
 
Cloud vs.data center
Cloud vs.data centerCloud vs.data center
Cloud vs.data center
 
SCCM 2012 Presentation
SCCM 2012 PresentationSCCM 2012 Presentation
SCCM 2012 Presentation
 
AWS Concepts - Internship Presentation - week 10
AWS Concepts - Internship Presentation - week 10AWS Concepts - Internship Presentation - week 10
AWS Concepts - Internship Presentation - week 10
 

Similar a Microsoft Solves BYOD Using Microsoft System Center Configuration Manager and Windows Intune

Enabling People Centric Processes - a Microsoft IT Preview Guide
Enabling People Centric Processes  - a Microsoft IT Preview GuideEnabling People Centric Processes  - a Microsoft IT Preview Guide
Enabling People Centric Processes - a Microsoft IT Preview Guide
David J Rosenthal
 
Wally Mead - Deploying a system center 2012 r2 configuration manager environm...
Wally Mead - Deploying a system center 2012 r2 configuration manager environm...Wally Mead - Deploying a system center 2012 r2 configuration manager environm...
Wally Mead - Deploying a system center 2012 r2 configuration manager environm...
Nordic Infrastructure Conference
 
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Nordic Infrastructure Conference
 

Similar a Microsoft Solves BYOD Using Microsoft System Center Configuration Manager and Windows Intune (20)

Sysctr Track: Managing your hybrid Mobile cloud Workforce Demystified with Sy...
Sysctr Track: Managing your hybrid Mobile cloud Workforce Demystified with Sy...Sysctr Track: Managing your hybrid Mobile cloud Workforce Demystified with Sy...
Sysctr Track: Managing your hybrid Mobile cloud Workforce Demystified with Sy...
 
Enabling People Centric Processes - a Microsoft IT Preview Guide
Enabling People Centric Processes  - a Microsoft IT Preview GuideEnabling People Centric Processes  - a Microsoft IT Preview Guide
Enabling People Centric Processes - a Microsoft IT Preview Guide
 
Wally Mead - Deploying a system center 2012 r2 configuration manager environm...
Wally Mead - Deploying a system center 2012 r2 configuration manager environm...Wally Mead - Deploying a system center 2012 r2 configuration manager environm...
Wally Mead - Deploying a system center 2012 r2 configuration manager environm...
 
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
 
4 Ways to Ensure a Smooth Windows 10 Migration
4 Ways to Ensure a Smooth Windows 10 Migration4 Ways to Ensure a Smooth Windows 10 Migration
4 Ways to Ensure a Smooth Windows 10 Migration
 
Unified Endpoint Management: Security & Productivity for the Mobile Enterprise
Unified Endpoint Management: Security & Productivity for the Mobile EnterpriseUnified Endpoint Management: Security & Productivity for the Mobile Enterprise
Unified Endpoint Management: Security & Productivity for the Mobile Enterprise
 
System Center 2012 R2 Configuration Manager (SCCM) with Windows Intune
System Center 2012 R2 Configuration Manager (SCCM) with Windows IntuneSystem Center 2012 R2 Configuration Manager (SCCM) with Windows Intune
System Center 2012 R2 Configuration Manager (SCCM) with Windows Intune
 
Enterprise Mobility (Admin)
Enterprise Mobility (Admin)Enterprise Mobility (Admin)
Enterprise Mobility (Admin)
 
Tres formas de modernizar la TI del dispositivo y mejorar la productividad
Tres formas de modernizar la TI del dispositivo y mejorar la productividadTres formas de modernizar la TI del dispositivo y mejorar la productividad
Tres formas de modernizar la TI del dispositivo y mejorar la productividad
 
Mobile Convention Amsterdam 2014 - Microsoft - Maarten Sonneveld
Mobile Convention Amsterdam 2014 - Microsoft - Maarten SonneveldMobile Convention Amsterdam 2014 - Microsoft - Maarten Sonneveld
Mobile Convention Amsterdam 2014 - Microsoft - Maarten Sonneveld
 
IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)
 
Beyond BYOD
Beyond BYODBeyond BYOD
Beyond BYOD
 
Webinar: Securing Remote Workforce on the Microsoft Cloud
Webinar: Securing Remote Workforce on the Microsoft CloudWebinar: Securing Remote Workforce on the Microsoft Cloud
Webinar: Securing Remote Workforce on the Microsoft Cloud
 
Lab 14
Lab 14Lab 14
Lab 14
 
One Step Ahead 2014 Samlet formiddag
One Step Ahead 2014 Samlet formiddagOne Step Ahead 2014 Samlet formiddag
One Step Ahead 2014 Samlet formiddag
 
What's new in the windows intune dec 2012 release
What's new in the windows intune dec 2012 releaseWhat's new in the windows intune dec 2012 release
What's new in the windows intune dec 2012 release
 
EPC Group Intune Practice and Capabilities Overview
EPC Group Intune Practice and Capabilities OverviewEPC Group Intune Practice and Capabilities Overview
EPC Group Intune Practice and Capabilities Overview
 
Bsm mw10
Bsm mw10Bsm mw10
Bsm mw10
 
Hexnode Unified Endpoint Management
Hexnode Unified Endpoint ManagementHexnode Unified Endpoint Management
Hexnode Unified Endpoint Management
 
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
 

Más de Microsoft

Más de Microsoft (20)

Modern Finance at Microsoft US
Modern Finance at Microsoft USModern Finance at Microsoft US
Modern Finance at Microsoft US
 
Modern Marketing: The Case of Microsoft US
Modern Marketing: The Case of Microsoft USModern Marketing: The Case of Microsoft US
Modern Marketing: The Case of Microsoft US
 
Cybersecurity threats you should know about in 2018
Cybersecurity threats you should know about in 2018Cybersecurity threats you should know about in 2018
Cybersecurity threats you should know about in 2018
 
Norwegian Refugee Council
Norwegian Refugee CouncilNorwegian Refugee Council
Norwegian Refugee Council
 
Millennials and the Next Generation of IT
Millennials and the Next Generation of ITMillennials and the Next Generation of IT
Millennials and the Next Generation of IT
 
7 Steps to Better Cybersecurity Hygiene
7 Steps to Better Cybersecurity Hygiene  7 Steps to Better Cybersecurity Hygiene
7 Steps to Better Cybersecurity Hygiene
 
Microsoft to Acquire LinkedIn: Overview for Investors
Microsoft to Acquire LinkedIn: Overview for InvestorsMicrosoft to Acquire LinkedIn: Overview for Investors
Microsoft to Acquire LinkedIn: Overview for Investors
 
Reimagining Business Operations
Reimagining Business OperationsReimagining Business Operations
Reimagining Business Operations
 
Bring Your Own Device
Bring Your Own DeviceBring Your Own Device
Bring Your Own Device
 
Office365 Security Task Force
Office365 Security Task ForceOffice365 Security Task Force
Office365 Security Task Force
 
5 Ways Affordable Innovation Can Revolutionize your Business
5 Ways Affordable Innovation Can Revolutionize your Business5 Ways Affordable Innovation Can Revolutionize your Business
5 Ways Affordable Innovation Can Revolutionize your Business
 
Top 5 Note Taking Tips from Future Innovators
Top 5 Note Taking Tips from Future InnovatorsTop 5 Note Taking Tips from Future Innovators
Top 5 Note Taking Tips from Future Innovators
 
Empowering Employee Engagement: Creating an Engaged Workforce through Afforda...
Empowering Employee Engagement: Creating an Engaged Workforce through Afforda...Empowering Employee Engagement: Creating an Engaged Workforce through Afforda...
Empowering Employee Engagement: Creating an Engaged Workforce through Afforda...
 
Media in Transformation: A Technology Perspective
Media in Transformation: A Technology PerspectiveMedia in Transformation: A Technology Perspective
Media in Transformation: A Technology Perspective
 
Total Economic Impact of Microsoft Office 365 Forrester Study
Total Economic Impact of Microsoft Office 365 Forrester StudyTotal Economic Impact of Microsoft Office 365 Forrester Study
Total Economic Impact of Microsoft Office 365 Forrester Study
 
Integrated Customer Service Maximization Experience Vision Demonstrator
Integrated Customer Service Maximization Experience Vision DemonstratorIntegrated Customer Service Maximization Experience Vision Demonstrator
Integrated Customer Service Maximization Experience Vision Demonstrator
 
Ignite Theater: Microsoft Enterprise Services Connected Collaboration Approach
Ignite Theater: Microsoft Enterprise Services Connected Collaboration ApproachIgnite Theater: Microsoft Enterprise Services Connected Collaboration Approach
Ignite Theater: Microsoft Enterprise Services Connected Collaboration Approach
 
The Digital Airline
The Digital AirlineThe Digital Airline
The Digital Airline
 
Driving results through a connected omni-channel retail sales experience
Driving results through a connected omni-channel retail sales experienceDriving results through a connected omni-channel retail sales experience
Driving results through a connected omni-channel retail sales experience
 
Making Your Marketing More Effective
Making Your Marketing More Effective Making Your Marketing More Effective
Making Your Marketing More Effective
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Último (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

Microsoft Solves BYOD Using Microsoft System Center Configuration Manager and Windows Intune

  • 1. Microsoft Solves BYOD Using Microsoft System Center Configuration Manager and Windows Intune Published November 2013 Microsoft IT uses Microsoft System Center 2012 Configuration Manager with Windows Intune as their enterprise tool to create a consistent, reliable, and secure work environment that allows users to be productive anytime, anywhere, on any device they choose, while meeting Microsoft compliance and security requirements and while simplifying administration across heterogeneous device platforms. Situation Microsoft Information Technology (Microsoft IT) needed to embrace and adapt to the rising bring your own device (BYOD) culture by enabling users to access corporate resources from personal devices without compromising corporate security, increasing infrastructure costs or complexity, or increasing administrative overhead. Solution To address the changes in the enterprise landscape, Microsoft IT enabled Unified Device Management (UDM). By adding a Windows Intune subscription and deploying the Intune connector to their Microsoft System Center 2012 Configuration Manager Service Pack 1 (SP1) environment, Microsoft IT brings all devices, company-owned and user-owned, into the scope of centralized management while providing users a flexible work environment across multiple device platforms. Benefits • Reduced costs by unifying IT management infrastructure. • Simplified administration for managing all PCs and mobile devices. Products and Technology • Increased user productivity while maintaining compliance and reducing risk.
  • 2. 2 | Microsoft Solves BYOD Using Microsoft System Center Configuration Manager and Windows Intune • System Center 2012 Configuration Manager SP1 • Windows Intune • Active Directory • Microsoft Online Directory Services
  • 3. 3 | Microsoft Solves BYOD Using Microsoft System Center Configuration Manager and Windows Intune Situation Microsoft IT, like many other enterprises, faces an explosion of heterogeneous devices and the growing challenges created by the bring your own device (BYOD) culture. Long gone are the days of managing a single user using a single corporate-owned device to access corporate resources. To keep pace with the need to allow users to work when, where, and with which device best suits them, Microsoft IT needed to find a new approach for managing the modern workplace. A solution that would: Deliver simplified, comprehensive management across device platforms, on-premises and in the cloud, using a single console for administration, deployment, and reporting. Integrate into the existing network design without additional investments in hardware or increase in complexity. Provide a consistent user experience across device platforms. Enable access to line of business (LOB) applications from the user’s device of choice without compromising corporate security. Microsoft IT uses Microsoft System Center 2012 Configuration Manager to manage devices connected to its corporate network but was looking for a solution to also manage devices and applications in the cloud. Solution Microsoft IT enabled Unified Device Management (UDM) by leveraging Windows Intune and System Center 2012 Configuration Manager SP1. This solution retains the scalability and administrative functionality of Configuration Manager while extending its reach via Windows Intune to cloud-based device management. With UDM, Microsoft IT uses a single Configuration Manager–based administrative console to centrally manage both on-premises and cloud-connected computers, devices, and applications. With UDM, Microsoft IT is able to: Extend Configuration Manager infrastructure with Windows Intune to support cloud management of mobile devices, enabling publication of corporate apps and services across multiple device types. Provide consistent access to corporate resources for a variety of devices, regardless of location. Offer and deploy LOB modern applications dynamically based on device type. Apply policies across various devices and platforms to meet Microsoft compliance and security requirements. Remove corporate data and applications if a device is lost, stolen, or retired from use. As part of the solution, Microsoft IT implementeda self-service app store, the Company Portal,which gives Microsoft users the ability to install internal LOB apps on all their devices, virtually anytime or anywhere. Deployment The Microsoft IT UDM service offering focuses on four key areas: device enrollment, application provisioning, policy, and inventory of hardware and software. Before the deployment and configuration of UDM could begin, Microsoft IT needed to determine the type of devices they would support. Based on an analysis of device volume and native LOB apps, the initial scope of the UDM project was set to support Microsoft Surface RT, Windows Phone 8, and Apple iOSdevices. While UDM supports Android devices, Microsoft IT did not include them in the initial scope due to lack of internal LOB apps developed for Android platform. Understanding the scope of devices enabled Microsoft IT
  • 4. 4 | Microsoft Solves BYOD Using Microsoft System Center Configuration Manager and Windows Intune to coordinate with the appropriate Microsoft teams to configure the Intune Connector, define security policies, and publish apps to the new Company Portal. Architecture UDM consists of a series of components working in concert: Configuration Manager provides the central administration console for administering both onpremises and cloud-based devices. Windows Intune Subscription establishes the connection between Configuration Manager and Intune. It specifies the configuration settings for the Windows Intune service, such as which users can enroll their devices and which mobile device platforms to manage. Windows Intune Connector, a Configuration Manager site role, acts as a gateway between Windows Intune and on-premises Configuration Manager, sending settings and software deployment information to WindowsIntune and retrieving status and inventory messages from mobile devices. Figure 1.Microsoft IT Unified Device Management infrastructure. The following sections describe the various activities involved in Microsoft IT'sUDM deployment. Deployment Process Microsoft IT took a five-step approach to deploying UDM into their existing Configuration Manager environment. Build CM SP1 environment Provision users Provision Intune services Set up DNS redirection Acquire device specific certificates Step 1: Build Configuration Manager SP1 environment Microsoft IT added a Configuration Manager SP1 primary site in the corporate domain hierarchy specifically for mobile device management. Server hardware consisted of: A primary site server using a virtual machine with 12 GB of RAM and four core processors. A Microsoft SQL Server server with 64 GB of RAM and six core processors. Creating a separate site for mobile device management is not a UDM requirement—UDM is capable of scaling to large volumes of devices. For Microsoft IT, the decision to create a separate mobile
  • 5. 5 | Microsoft Solves BYOD Using Microsoft System Center Configuration Manager and Windows Intune device management site instead of incorporating UDM into an existing Configuration Manager site used for managing PCs and laptops was based around the anticipated volume of mobile devices. With approximately 180,000 users between full time employees (FTEs) and vendors, Microsoft IT needed to ensure that the UDM environment could handle a very large number of enrolled mobile devices. Most small and medium size organizations will not require a separate site and can incorporate Unified Device Management into their existing site hierarchy. Step 2: Provision users Microsoft IT performed user discovery for the entire Microsoft corporate Active Directory forest using the existing production Configuration Manager environment. This process took a few hours due to the large user base in Microsoft IT and ensured that all users were added to a user collection before enabling UDM. Your organization must determine the extent of your BYOD environment to see if performing a full user discovery is necessary or if you want to manually add the users allowed to enroll their mobile devices to Configuration Manager. Step 3: Provision Windows Intune services Microsoft IT worked with the Microsoft Online Directory Services (MSODS) team to provision Intune services for Microsoft IT organizational user (tenant) account and set up the UDM services Admin (the account used for authentication when creating the Intune Subscription in Configuration Manager). They also worked with the Active Directory team to configure Directory Sync (DirSync) and Active Directory Federation Services (ADFS) 2.0.DirSync ensured that all users were synchronized into the cloud, and ADFS allowed for users to use a single sign-on (SSO) to access all cloud services. Microsoft had an existing tenant account as they already use Microsoft Office 365 and other cloud services and already had DirSync and ADFS in place to synchronize data into the cloud. If your company does not, you will need to: Sign up for a Windows Intune organizational (tenant) account. Deploy and configure DirSync to synchronize on-premises Activity Directory users with the MSODS, creating the user ID used for cloud-based applications. Deploy ADFS to allow a single identity for each user across both on-premises and cloud-based applications. Step 4: Set up DNS redirection Most companies will benefit from creating a DNS alias (CNAME record type) to redirect enterpriseenrollment.<yourcompany>.com to allow for server auto discovery. This means users will not need to know the actual server name when they enroll their device. Step 5: Acquire device-specific certificates Each device platform has different requirements for loading applications. Microsoft IT worked with the Microsoft App team to acquire the certificates required for the supported mobile devices. At Microsoft, Configuration Manager Admins do not maintain certificates. The Product Release & Security Services (PRSS) team is the central authority for the signing process used to sign all Windows Phone 8 and Windows apps applicable to Windows RT devices at Microsoft. For signing Windows RT and Windows 8 modern apps,Microsoft IT uses one of the child certificates of the Microsoft Root CA. They configure the Microsoft root certificate in the WindowsIntune subscription page, enabling Windows RT devices to trust those signed apps.
  • 6. 6 | Microsoft Solves BYOD Using Microsoft System Center Configuration Manager and Windows Intune Depending on the size of your organization, your model for managing and deploying certificates may be different. For more information on certificates and/or keys required for each mobile device platform and from where your company needs to obtain the certificate or key, see Obtain Certificates or Keys to Meet Prerequisites per Platform under the Prerequisites section of How to Manage Mobile Devices by Using Configuration Manager and Windows Intune. UDM Configuration Enabling UDM requires creating a Windows Intune Subscription and defining a Windows Intune Connector role in Configuration Manager. To setup and configure UDM, Microsoft IT: 1. Created a new Intune Subscription. In the Subscription Wizard, they selected Allow the Configuration Manager console to manage this subscription. This enabled Configuration Manager to become the authoritative source for managing all mobile devices, providing a single administration console for on-premises systems, cloud-connected devices, and application life cycle management. 2. Defined a user collection. Microsoft IT created a custom user collection for all Microsoft employees based on the users discovered after performing user discovery for the entire Microsoft corporate Active Directory forest. This ensured that members of this collection were licensed for enrollment in UDM. 3. Configured platform, certificates, and keys.The three platforms that were identified as in scope for UDM were enabled: Windows Phone 8, Windows RT, and iOS. For each platform, the required certificates were applied. For Windows Phone 8, they also deployed the Company Portal app to allow users to start using the Company Portal and installing applications almost immediately after enrolling their device. 4. Assigned connector role. Microsoft IT added the Windows Intune Connector site server role to the Central Administration Site (CAS) server. The Intune Connector server role communicates directly with Windows Intune and provides the communication gateway between Configuration Manager and Intune for all incoming and outgoing communication. Cloud User Sync Monitoring After UDM is configured, Cloud User Sync, a component in Configuration Manager, provides communication between Configuration Manager and Windows Intune. It monitors the collection of users for additions, synchronizes changes with Windows Intune to license users and enables them to enroll their devices. Microsoft IT makes the following recommendations. Use delta user discovery and incremental updates settings. By enabling delta discovery in your Active Directory User Discovery settings and selecting incremental updates on the collection settings, updates are synchronized on a more frequent schedule. This ensures licensing of new users and removal of licenses for disabled users happens quickly. Use default Cloud User Sync setting. Cloud User Sync synchronizes changes—new users added to the collection are licensed and enabled for enrollment; users removed from the collection have their Windows Intune license revoked. By default, synchronization occurs every five (5) minutes and is a minimal burden on your Configuration Manager hierarchy and network. Monitor the following Intune Connector log files: o Dmpdownloader.logto monitor policy changes downloaded from Windows Intune to Configuration Manager. o Dmpuploader.logto monitor policy changes uploaded to Windows Intune from Configuration Manager. o Cloudusersync.logto monitor user licensing in Windows Intune.
  • 7. 7 | Microsoft Solves BYOD Using Microsoft System Center Configuration Manager and Windows Intune Use the CloudUserID field in the User_Disc table in Configuration Manager to identify if users are licensed. o Null indicates that user is not licensed to enroll devices. o All zero GUID indicates that user was previously licensed but is no longer a member of the user licensing collection. o Non-zero GUID indicates that the user is licensed to enroll devices. Note: There is no need to license users separately for each device. When a user is licensed, they are licensed for up to 20 devices. Device Enrollment Along with configuring the UDM architecture, Microsoft IT had to plan the user experience as part of their deployment. They wanted to ensure that enrolling devices: Provided a good user experience where users could enroll their devices, gain access to the Company Portal, and install LOB applications with minimum user intervention. Enabled users to become productive quickly with the LOB apps by providing a seamless single sign-on installation. ADFS enables Microsoft users to use the same credentials (their corporate user ID, email account, and network password) regardless of device. When a user enrolls a device, Microsoft IT collects general information about the device, such as manufacturer and any LOB apps installed from the Company Portal (not the Microsoft Store). Enrollment installs the Company Portal application on the device, enabling users to install applications by showing them only the applications that are targeted to their user account. Company Portal Microsoft has provided their users with the ability to install business applications in the past. The Company Portal is the next generation, a Windows 8x modern application platform,which allows users to installinternal business applications by showing them which applications they have permissions to install based on their role, language, and location. This included an iOS Self-Service Portal (‘Company Portal’) for users who needed to install enterprise iOS applications on their iPad and iPhone devices. Microsoft IT tried to create an end user experience that was as similar as possible between all supported device platforms, but each device platform had some minor differences when deploying the Company Portal. Windows Phone 8.The Company Portal is installed as part of the enrollment process. Installing the Company Portal during enrollment requires the user to select the Install company app or hubcheck box. This check box is selected by default. If the user clears this check box, they would need to unenroll the device and then re-enroll if the Company Portal was needed in the future. Windows RT. The Company Portal is installed as a required app after the enrollment is completed. Microsoft IT deployed the Company Portal to all users asRequired. Apple iOS.Usersmust install the Company Portal app from the iOS Self Service Portal, then enroll their iOS devices. Modern Application Publishing Two types of apps are published via the Company Portal: Sideloaded apps—modern LOB applications developed and published to the Company Portal where the content is hosted and provided by the Configuration Manager and Windows Intune hierarchy. Deep link apps—link to an application in the Microsoft Store (or Apple Marketplace for iOS apps)stored in Configuration Manager, that users access via the Company Portal. Microsoft IT
  • 8. 8 | Microsoft Solves BYOD Using Microsoft System Center Configuration Manager and Windows Intune used these for apps that are likely to update often (such as Skype or Microsoft OneNote). It enabled them to reduce administrative overhead, redirecting users to the Microsoft Store for the latest version instead of having to manage and publish updates to the Company Portal. While modern apps are not as resource intensive to provision and deploy, there is still a cost associated with developing and maintaining them. Microsoft IT applied the following business rules when determining what applications would be published through the Company Portal. They started by determining the target number of users for the app. The threshold was set at 1,000 users. While they did publish a few applications with a user population of 500 users, if the application was used by less than 1 percent of the company (less than 1,000 users), the application would not be available through the Company Portal and would require the LOB be publishedvia Microsoft SharePoint or some other LOB-created site. As discussed earlier, each platform has different requirements for signing and publishing apps, but there are some common areas that helped streamline the process for Microsoft IT. Before their users started to enroll their devices, Microsoft IT: Worked with the app provisioning team to sign both the Company Portal app and apps created by the internal Microsoft developers before publishing the apps. Signed all Windows RT apps with a child certificate from the Microsoft Root CA. As all child certificates of the Microsoft Root CA cert are trusted, Windows RT apps that are published are automatically trusted by Windows RT devices. Worked with PRSS team and formulated a process for signing apps for Windows Phone 8. Categorized all apps per Microsoft IT App team standards to reduce the need for users to scroll through hundreds of apps. Users can use Search, but categories made locating apps easier— especially on mobile phone devices. Targeted most applications to the built-in All Users and User Groups collection as Available. This made the apps available in the Company Portal as soon as the user enrolled a device. Used custom collections based on Active Directory Security Groups to limit the targeted users for a few applications with specific access requirements,limiting which users could install them. Troubleshooting Enrollment Microsoft IT experienced enrollment failures due to a non-standard User Principle Name (UPN) for some users. The enrollment process is based on a user’s UPN. For some Microsoft users, their UPN deviated from the standard naming convention and was different from their user alias. Microsoft IT created a DNS redirection to resolve this issue. As there are no client logs for enrollment troubleshooting, Microsoft IT needed to take a systematic approach to troubleshooting. For troubleshooting general device enrollment issues, Microsoft IT recommends that you verify the following: o The Admin has configured mobile device management. o The Admin has enabled enrollment for specific device types. o The Admin provisioned the user for mobile device enrollment. o The user is not trying to enroll several devices at the same time or does not have more than 20 mobile devices enrolled in the system. o For Windows Phone 8 devices, the code signing certificate is configured properly. o For iOS devices, the Apple Push Notification Service certificate is configured or hasn’t expired, and the device is running iOS v5.0 or later. For troubleshooting Company Portal related issues, a good place to start the troubleshooting process is:
  • 9. 9 | Microsoft Solves BYOD Using Microsoft System Center Configuration Manager and Windows Intune o For Windows RT devices, use the portal log c:users<useraccount>appdataLocalPacakgesMicrosoft.CompanyportalLocalstateSS PLOG_<number>.log. o For Windows Phone 8 devices, a log can be retreived from the portal itself and sent via email. Enrollment Lessons Learned Microsoft IT learned from a few issues that occurred during the enrollment process. Microsoft IT discovered that both enrollment and re-enrollment of a Windows RT device consumed a sideloading key. During unenrollment, the sideloading key and assigned device ID are removed. Re-enrollment is treated as a new device, and a new device ID with sideloading key is provisioned. User-initiated un-enrollment did not remove the Company Portal, only disconnected the Windows RT device from Windows Intune. This is due to the fact that the Company Portal provides other functions, such as the ability to manage other devices. Microsoft IT needed to educate both their users and IT admins that this was by design. User education requirements was another area of learning for Microsoft IT. o Users were concerned as to what type of information Microsoft IT could see and collect about their personal devices. They needed to reassure users that the only information Microsoft IT collects is general information about the device itself (such as the manufacturer) and any LOB apps installed from the Company Portal—and that no personal information, such as phone number, personal apps, or apps installed from the Microsoft Store is collected. o There were delays in refreshing Windows RT policies due to the Windows RT maintenance window being set for every 24 hours. Microsoft IT needed to educate users that some changes were impacted by the default maintenace window. Microsoft IT used user communications and the company support website, ITWeb, to inform users of expected delays. o Differences in the enrollment process for the various mobile devices platforms. For example, the Windows Phone 8 enrollment user experience and user interfaces are different from Windows RT, and iOS device enrollment presents additional screens for adding management profiles on the device that are not seen on Windows Phone 8 or Windows RT devices. These differences were generating support requests. To address this, Microsoft IT documented the enrollment process for each device and made available through the company support website, ITWeb. Policy and Security Configuration Making sure that corporate security was maintained as well as providing a good end user experience required that Microsoft IT coordinate with: The Microsoft Security team to define the policies that would enforce Microsoft corporate compliance settings, such as password policy and encryption settings, on mobile devices. The Exchange team to align policy settings between Exchange ActiveSync (EAS) and UDM. Microsoft IT leveraged default Compliance Rules built into the Configuration Manager for mobile devices. They created new Configuration Items (CIs) for mobile devices (different CIs for each device type to make troubleshooting easier), added built-in compliance rules with values (see table 1) based on Microsoft IT security requirements, then created a Configuration Baseline for those CIs and targeted Configuration Baseline to the collection of mobile devices. Table 1.Microsoft IT compliance settings for mobile devices.
  • 10. 10 | Microsoft Solves BYOD Using Microsoft System Center Configuration Manager and Windows Intune Corporate Policy Windows Phone 8 Windows RT iOS Device Encryption TRUE Not Supported Not Supported Password Required TRUE Not Supported TRUE Allow Simple Password Not set Not Supported TRUE Min Password Length 4 5 (local only) 4 Max inactive time to lock 15 minutes 15 minutes 15 minutes Max failed attempts before wipe 5 Not set 5 Password Expiration Not Set 70 days (local) Not Set Password History Not Set Not Set 0 Min Complex Characters 1 1 (local only) 0 Removed Storage TRUE Not Supported Not Supported Allow Convenience Logon Not Supported TRUE Not Supported Allow Browser Not Supported Not Supported TRUE Allow Camera Not Supported Not Supported TRUE Microsoft IT’s goal is to develop a common set of policies that would scale across devices while providing a good end user experience. The one policy that created the most issues was the minimum password length; Windows Phone 8 was four (4) while Windows RT was six (6). Microsoft IT is working with the Security teams and the Exchange teams to see if they can find a common ground between their requirements that provides good corporate security without impacting the end user experience. Microsoft IT makes the following recommendations for configuring your mobile device policies. Align your policies, such as password/PIN policies, across EAS and UDM to ensure the best end user experience. Note: Although the most restrictive policy will apply, different user experiences have the potential to increase support calls. If the policy is not applicable to a particular device platform, it will report back which platforms do not support the policy. Common policies will simplify administration. For example, if you set the same password requirements across all mobile device platforms, you will not require multiple CIs and different device collections to support various password policies. Create custom device collections when policies cannot be aligned across platforms. Use the Agent Edition attribute in the Configuration Manager console, which shows enrolled device by device type, to create custom device collections and then target policy baselines to each collection. In both your Configuration Items and your Configuration Baselines, enable Remediate noncompliant settings to enforce compliance settings on the device. If Remediate noncompliant settings is not enabled on both your Configuration Items and your Configuration Baselines, your reports will only reflect the current compliance state of enrolled devices but not enforce compliance rules/settings on those devices. Device Retirement
  • 11. 11 | Microsoft Solves BYOD Using Microsoft System Center Configuration Manager and Windows Intune Organizations need a means to enforce security if the user leaves the company or loses their device. Microsoft IT used the Configuration Manager SP1 wipe and retire options to enforce device security for retiring enrolled devices. Microsoft IT used role-based access control (RBAC) in Configuration Manager to limit which administrators had access to wipe or retire a device by restricting their view in the console. Note:If you have finished conducting a UDM pilot in your test hierarchy and want to move to a production hierarchy, it is important to retire all devices from the Configuration Manager console so that the enrollment from devices is cleaned up and ready for enrollment into your production hierarchy. Reporting Configuration Manager includes many ready-to-use, built-in reports for UDM, including reports for apps, hardware inventory, and settings management. There is no need to create custom reports or separate reports for PC and mobile device management. The same report can be used to report on both environments. Microsoft IT used built-in Configuration Manager reports to report on their UDM environment. Two built-in reports that provided Microsoft IT with insight into application install status and policy compliance status for UDM were: Security policy compliance report. Home > ConfigMgr_<sitecode>> Compliance and Settings Management > Summary compliance by configuration baseline Application compliance report. Home > ConfigMgr_<sitecode>> Software Distribution Application Monitoring > Application compliance Microsoft IT also used the Configuration Manager console monitoring to easily view and drill down to the asset level on the status of app deployment and security policy compliance. While custom reports were not needed due to the built-in reporting capabilities of Configuration Manager, Microsoft IT did create a custom UDM dashboard specifically for Microsoft executive management using Microsoft SQL Server 2012 Reporting Services. It provided executive management visibility into enrollment count trends using graphs and a similar look and feel of other Microsoft IT dashboards. Results
  • 12. 12 | Microsoft Solves BYOD Using Microsoft System Center Configuration Manager and Windows Intune By creating a solution that streamlined administration and deployment of devices and applications, Microsoft IT was able to increase the scope of their centrally managed devices by 10 percent without adding additional resources or administrative overhead. They expect this number to continue to increase at a rapid pace with the potential of centrally managing more than 125,000 mobile devices. The following table provides a summary of the Microsoft IT UDM deployment. Windows Phone 8 Windows RT iOS Devices enrolled 10,998 1,732 248 LOB apps published 74 124 0 Deep linked apps 36 2 16 Benefits The Microsoft IT UDM solution provides the following benefits: Low-cost, scalable solution. Windows Intuneintegrates into the existing Configuration Manager environment without the need to add new infrastructure, hardware, or network complexity to the Microsoft IT environment. It provides enterprise-level scalability, extending the reach of Configuration Manager to support management of Windows RT, Windows Phone 8, and iOS devices. Simplified administration.The Configuration Manager console unifies device management, providing Microsoft IT administators with a single console for administration, application management, and reporting across multiple device types. Empowered users.Provide a consistent end user experience across device platforms. Microsoft users can enroll their personal devices, install internal business applications, and manage their mobile devices through the Company Portal, allowing them to be more productive from almost anywhere on almost any device. Maintained compliance.Apply policies across multiple device platforms to meet Microsoft compliance and security requirements while providing a good end user experience for Microsoft users. Security risks for lost, stolen, or retired devices are reduced by removing corporate data and applications from the device by Microsoft IT administrators through Configuration Manager or Microsoft users through the Company Portal. Best Practices When implementing UDM, Microsoft IT recommends the following best practices: Plan your deployment.Proper planning before deployment will increase deployment efficiency. Review your Configuration Manager hierarchy to determine how you will integrate UDM. Remember, UDM does not require a separate site in your Configuration Manager hierarchy. Understand which platforms your organization will support. This will help you determine what types of certificates are required for app deployment. Acquire and deploy certificates and sideloading keys before enabling user enrollment. Coordinate with other teams to streamline the app certification process. Identify and license specific users by using user discovery in Configuration Manager and then add users to a custom collection that will synchronize these user accounts with Windows Intune. Enable ADFS to allow users to use the same user name and password to access coprorate resources.
  • 13. 13 | Microsoft Solves BYOD Using Microsoft System Center Configuration Manager and Windows Intune Work with your security team and your Exchange team to align passwords and policies across device platforms to ensure a good user experience without compromising corporate security. Promote collaboration among all teams involved.A number of different teams in your organization may need to be involved—including Security, Compliance, application developers, services, and infrastructure providers. It is important to ensure that all stakeholders can provide input at an early stage and can work together to allow for a smooth deployment. Develop a detailed communication and readiness plan.A well-developed support plan and documentation for user and helpdesk readiness can reduce support costs. Train helpdesk technicians before deployment. Have training and support content ready on modern device support, especially any differences in user experience across device platforms. Educate users. Provide users with documentation on the enrollment steps for each supported device platform to reduce support calls. Set expectations for any delays between enrollment and when Company Portal apps are available for installation.Ensure users understand what is being inventoried on their device to reduce their concerns. Create FAQs for common questions and document any known issues. Plan your enrollment process.To ensure a good user experience and to reduce support costs, consider how you will deploy the Company Portal and LOB apps. Use categories to organize applications on the Company Portal to make them easier to find. Use security groups to limit what apps users can see based on their role in the company. Determine which apps to publish on the Company Portal based on business needs. Determine how long apps will be maintained on the Company Portal before retiring them. Evaluate which apps might change frequently and consider using a deep link instead of deploying the full app. Use the Windows Phone emulator in the Windows Phone SDK to test the Windows Phone enrollment experience. Resources How to Manage Mobile Devices by Using Configuration Manager and Windows Intune System Center 2012 Configuration Manager Documentation Library System Center 2012 Technical Documentation Library Empower People-Centric IT Directory Synchronization Roadmap Microsoft SQL Server 2012 Reporting Services Features and Tasks (SSRS) How Microsoft IT Deployed System Center 2012 Configuration Manager Related videos Microsoft System Center 2012 SP1 - Configuration Manager Overview For More Information
  • 14. 14 | Microsoft Solves BYOD Using Microsoft System Center Configuration Manager and Windows Intune For more information about Microsoft products or services, call the Microsoft Sales Information Center at (800) 426-9400. In Canada, call the Microsoft Canada Order Centre at (800) 933-4750. Outside the 50 United States and Canada, please contact your local Microsoft subsidiary. To access information via the World Wide Web, go to: http://www.microsoft.com http://www.microsoft.com/microsoft-IT © 2013 Microsoft Corporation. All rights reserved. Microsoft, Active Directory, Office 365, OneNote, SharePoint, Skype, SQL Server, Surface, Windows, and Windows Intune are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. The names of actual companies and products mentioned herein may be the trademarks of their respective owners. This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY.