All the latest news from the Microsoft Cloud including updates on Office 365 and Azure.
Tag: Azure
CIAOPS Need to Know Azure Webinar–November 2017
We’ll cover the usual news and updates from everything Azure and then do a deep dive into Azure Virtual machines. Of course, you can bring along all your questions as well and I’ll do my best to answer them for you.
You can register for free at:
November Azure Webinar Registrations
The details are:
CIAOPS Need to Know Azure Webinar – November 2017
Friday 1st of December 2017
2pm – 3pm Sydney Time
All sessions are recorded and posted to the CIAOPS Academy.
There of course will also be open Q and A so make sure you bring your questions for me and I’ll do my best to answer them.
The CIAOPS Need to Know Webinars are free to attend but if you want to receive the recording of the session you need to sign up as a CIAOPS patron which you can do here:
or purchase them individually at:
Also feel free at any stage to email me directly via director@ciaops.com with your webinar topic suggestions.
I’d also appreciate you sharing information about this webinar with anyone you feel may benefit from the session.
Microsoft 365 Windows 10 Device configuration mappings
Microsoft 365 Business allows you to configure Windows 10 devices that are connected. This management is typically done by Intune at the back end while Microsoft 365 Business provides a simplified interface over these settings. However, what settings in Microsoft 365 map to Intune?
The best place to start to understand this mapping is the following document from Microsoft:
How do protection features in Microsoft 365 Business map to Intune settings
Start by navigating to the Admin center in your Microsoft 365 for Business tenant.
Locate the Device policies tile and select it.
You may see a number of policies here but one should be named Windows 10 device configuration as shown above. Select this.
You should be taken to the Edit policy dialog as shown above.
Select the Edit hyperlink at the right of the Windows 10 protection line (the second option from the top).
If you expand the display you should see a list of all the options and their status as shown above.
The question now is, how do these map to settings in Intune?
To view the settings in Intune you’ll need to login to the Azure portal for that tenant and then navigate to the Intune option.
The easiest way to find the Intune settings is to do a search in the top right and then select Intune from the results.
You should see the Intune console displayed as shown above.
From the available options, select Device Configuration. From the blade that appears then select Policies. You should then see a policy that matches the one in the Microsoft 365 for Business console (here Windows 10 device configuration).
Select the policy name.
From the new blade that appears select Properties.
This should open another blade like shown above. The last option on this blade should be Settings. Select this.
This will open a Device restrictions blade with lots of different settings as you can see above. This is where most the mapped settings from Microsoft 365 are.
Working from the top, the Help protect PCs from web-based threats using Windows Defender Antivirus maps to Windows Defender Antivirus as shown.
However, only 3 of the 28 options are set and they are:
Next in Microsoft 365 Business is Help protect PCs from web-based threats in Microsoft Edge,
This maps to SmartScreen for Microsoft Edge in Windows Defender Smart Screen.
The next option is Turn off device screen when idle for:
which maps to Maximum minutes of inactivity until screen locks in Password.
The option Allow users to download apps from Windows store maps to a Custom URI that I haven’t been able to locate in Intune.
I’m still researching what that actually maps to. More soon.
Next is Allow users to access Cortana
maps to Cortana in General in Intune.
Next, Allow users to receive Windows tips and advertisements from Microsoft.
which maps to Windows spotlight in Intune.
Finally, Keep Windows 10 devices up to date automatically
is actually configured from the Software updates option in Intune.
From the main Intune blade select Software updates. From the blade that then appears select Windows 10 Update rings. Then form the new blade select Update policy for Windows 10 devices.
Select the policy and then Properties from the blade that appears.
At the bottom of the Properties page select Settings. This should then show a blade like that shown above.
If the Microsoft 365 Business setting is ON the Service Branch will be set to Semi-Annual Channel (Targeted) like so:
If the Microsoft 365 Business setting is OFF, the Service Branch will be set to Semi-Annual like so:
You can review these update channels here:
Assign devices to servicing channels for Windows 10 updates
So making any changes in the Microsoft 365 Business console will be reflected in the Intune console. However, if you change these settings in Intune and then try and update them you seem to get an error like so
I would have thought that I could change the settings in any console but that doesn’t appear to be the case. I currently can’t find any confirmation of this but I will publish anything I find. So for now the guidance is – only make changes in the Microsoft 365 Business Admin Center.
There are a number of other policies in Microsoft 365 Business that I’ll cover in upcoming posts.
The End of the Domain Controller
Here is my keynote presentation from the Ingram Micro Cloud Connection 2017.
The end of the Domain Controller – A new era, a new opportunity
If businesses no longer require a traditional domain controller what does that means for the IT resellers? How can you utilise the latest cloud services to not only provide identity but security and management for customers? Will this mean a change of business model or simply an integration of new services and techniques into your current offerings? This session will help you understand the direction your business needs to focus on to take full advantage of the evolving cloud services that are fast making traditional domain controllers redundant.
Need to Know podcast–Episode 168

In this episode I talk with Benjamin Elias from Ideocial about on of my favourite Office 365 service – Yammer. We follow up on some of the announcements from the recent Microsoft Ignite and how they will impact the product going forward. Of course, there is also news from Marc and myself on Office 365 and Azure to keep you up to date.
Take a listen and let us know what you think –feedback@needtoknow.cloud
You can listen directly to this episode at:
https://ciaops.podbean.com/e/episode-168-ben-elias/
The podcast is also available on Stitcher at:
http://www.stitcher.com/podcast/ciaops/need-to-know-podcast?refid=stpr
Don’t forget to give the show a rating as well as send us any feedback or suggestions you may have for the show.
Resources
Introduction to Windows Autopilot
Microsoft has introduced a new technology called Windows Autopilot that allows you to easily deploy Windows 10 Professional and Enterprise machines with nothing more than just an Internet connection.
A good way to get a feel of how all this works in practice is to use a Virtual Machine (VM) as a test bed which is what I’ll show you here.
The first thing is that you are going to need to get some information about the machine so that it can be recognised by Windows Autopilot when it is provisioned. Normally, this information will be provided directly by the manufacturer of the PC, but here’s how it actually works behind the scenes.
For this test process we start by running up a new clean virtual machine with Windows Professional installed.
Once the machine is running (we don’t need to worry about connecting to Azure or a domain just yet), we need to run PowerShell as an administrator so we can extract the required information.
The first PowerShell command that needs to be run is:
wmic bios get serialnumber
record the number that it produces.
Next, run the PowerShell command:
Get-ItemPropertyValue “hklm:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\DefaultProductKey\” “ProductId”
once again, record the number that is output.
Finally, run these two commands:
$wmi = Get-WMIObject -Namespace root/cimv2/mdm/dmmap -Class MDM_DevDetail_Ext01 -Filter “InstanceID=’Ext’ AND ParentID=’./DevDetail’”
$wmi.DeviceHardwareData | Out-File “$($env:COMPUTERNAME).txt”
This will create a file containing machine identification information, basically a hash.
This file will be written to the location from which the PowerShell command was run. By default this will be c:\windows\system32.
If you open the text file created (which has the name of the machine) it should appear like that shown above.
With all the information safely recorded, you can now run SYSPREP to generalise the machine and reboot or blow away the version of Windows (but not the actual VM. That needs to be retained so it is correctly identified during the coming provisioning process).
You need to now create a .CSV file to upload so that the machine can be identified at boot and provisioned. You can see the format of the file above.
Basically, the machine configuration file has at least 2 lines. The first is a heading line:
Device, Serial Number, Windows Product ID, Hardware Hash
The second line are the results from your PowerShell commands above separated by commas.
Ensure that you save the file as .CSV not .TXT!
You’ll now need to upload this file to the web. Navigate to:
https://businessstore.microsoft.com/
and login there with the Office 365 global administrator account for your tenant. This will typically be a tenant with Microsoft 365 licenses installed.
Once logged in the screen should appear like that shown above. Select the Manage option from the menu across the top of the page.
This should then take you to a screen like shown above. From the menu on the left hand side select Devices.
If this is the first device you’ve added to Windows Autopilot, you won’t see any existing devices.
Select the + Add devices menu option just under the Search devices box.
Navigate to the location of the .CSV file you created earlier that contains the information about your test VM. Select the file to upload it to the portal.
Since there are currently no deployment groups you’ll be asked to add a new one as shown above. Simply enter a group name and select Add.
The file should successfully upload to the portal and you’ll see a message telling you that it is being currently processed and you should refresh your screen to see the progress.
When the process is complete, you’ll get a happy green bar across the top and you’ll also see you machine listed below as shown above.
You’ll now need to create a profile for the deployment of Windows. Select the menu option AutoPilot deployment from the menu just above the list of devices as shown. From the menu that appears select Create new profile.
Give the new profile a name (here Test-Policy) and select any other desired settings.
Select the Create button when complete.
That will take you back to the list of devices. You’ll now need to apply the new profile you just created to the machine you have just added.
To do this, select the machine from the list.
Then select the option to Apply the appropriate policy.
Most of what we have just done will actually be done by the PC supplier down the track. They will basically get the details of each PC prior to shipment and upload that into the portal where you can then create and apply policies. We have stepped through the whole process here because we are using a virtual machine and to show you what actually happens.
The idea at this point is the new Windows 10 machine is shipped out to the end user. The only requirement the user needs to have is their Office 365 login details plus an Internet connection.
If we now re-provision the original machine it will boot to a point and ask the user to confirm their regional preference.
Make a select and press Yes.
They will then be prompted for a keyboard layout.
Make a selection and press Yes.
The use will also be prompted for any additional keyboard configuration. In most cases the user will select Skip here.
At this point the new machine will check to see whether it is connected to the Internet. If it detects a wifi network it will prompt the user to login. This means the machine can be provisioned ANYWHERE there is an internet connect (i.e.at home, at a coffee shop, etc). It doesn’t need to be connected to the corporate LAN.
The next prompt will ask the user to login with their Office 365 account. This is their Azure AD account which is the same as they use to login to the Office 365 portal.
The user will now be prompted for their password.
The machine will now add itself to the Office 365 Azure AD and apply any policies that have been configured. I’ll cover the deployment of custom policies and application deployment in another article.
After a few moments the user will be logged into the Windows 10 machine and will display the information from their Office 365 account as shown above.
You will also find that the machine has been joined to Azure AD as shown above.
If you dig into the user accounts on the machine you will find that there are no local accounts enabled as we elected back when we set up the initial AutoPilot profile in the portal.
Now, thanks to Windows Autopilot, we have quickly and easily deployed a new Windows 10 machine without the need for administrative intervention (such as joining to a domain). This machine is now directly connected to Azure AD and any Office 365 user can now login.
Although this process has been done using a virtual machine it can be done with any Windows 10 Pro or Enterprise machine. The main requirement is to get the machine information into the web portal so that it can be identified and provisioned at boot. Obtaining that information is as simple as a few PowerShell commands so you can try it for yourself to get a feel of how well it works.
For more information on Windows Autopilot visit – https://docs.microsoft.com/en-us/windows/deployment/windows-10-auto-pilot
Need to Know podcast–Episode 167

Marc and I give you the latest news and updates in the Microsoft cloud featuring information About Office 365 and Azure. We also spend a bit of time looking at the new Azure File sync service that Microsoft announced recently. Both Marc and I set it up recent and we share our experience with getting it all working. Thanks for being a listener.
Take a listen and let us know what you think –feedback@needtoknow.cloud
You can listen directly to this episode at:
https://ciaops.podbean.com/e/episode-167-azure-file-sync/
The podcast is also available on Stitcher at:
http://www.stitcher.com/podcast/ciaops/need-to-know-podcast?refid=stpr
Don’t forget to give the show a rating as well as send us any feedback or suggestions you may have for the show.
Resources
October Azure Webinar resources
Slides from the very first CIAOPS Azure webinar are now available for download here:
https://www.slideshare.net/directorcia/ciaops-need-to-know-azure-webinar-october-2017/
The recording is also available at:
http://www.ciaopsacademy.com.au/p/need-to-know-azure-webinars
which CIAOPS patrons get free access to as part of their subscription.
This webinar set the ground work for upcoming monthly webinars that will go deeper into Azure features and abilities.
So make sure you sign up for next month’s webinar.