Managing Windows and Surface Devices 1
Managing Windows and Surface Devices 1
FOR USE ONLY AS PART OF MICROSOFT VIRTUAL TRAINING DAYS PROGRAM. THESE MATERIALS ARE NOT AUTHORIZED
FOR DISTRIBUTION, REPRODUCTION OR OTHER USE BY NON-MICROSOFT PARTIES.
Microsoft 365 Virtual Training
Day: Managing Windows and
Surface Devices
Device Enrollment
Managing Device Authentication
Agenda
Device Enrollment using Microsoft Intune
Lesson 1: Managing Device Authentication
Lesson Introduction
Azure AD join
Group Policy is not always available or supported for devices that join Azure AD
Azure AD supports integration with mobile device management (MDM) services such as Intune
When integration between Intune and Azure AD is configured, a device that joins Azure AD
automatically enrolls with Intune (additional licensing may be required)
DEMO: Enroll a Windows 10 device automatically
Lesson 2: Device Enrollment using Microsoft
Endpoint Configuration Manager
Lesson Introduction
Configuration Microsoft
Manager Intune
Win Server
Client online status. Online (connected to its assigned management point) or offline.
Client activity. Active (it has communicated with Configuration Manager in the past seven days) or
inactive.
Primary User. The primary user of this device, calculated over a 60-day period of the most frequent
logins.
Operating System Build. See the OS version of a device without having to connect to or perform
any remote management.
Client check. State of the periodic evaluation that the Configuration Manager client runs on the
device. The evaluation checks the device and can remediate some of the problems it finds.
Managing with Microsoft Endpoint Configuration Manager
Enroll/Unenroll devices
Remote tasks
Application Management
One consistent set of MDM capabilities across Mobile, Desktop, and IoT
Enabling Mobile Device Management
Enable Intune as the MDM Authority
Apps Supported:
• Apps from the various stores (Apple and Google)
• Apps for Windows 10 from Windows Store or an app catalog
• Microsoft 365 Apps
• Web Links
• Built-in Apps (i.e. OneDrive and Edge)
• LOB Apps
• Win32 Apps
Managing Win32 apps with Intune
Requirements Revisions
Supercedence
Deployment applications
Application groups
Creating an Application in
Configuration Manager
To create an application:
1. In the Configuration Manager console, choose Software Library
> Application Management > Applications. Select Users and
groups, and then select All users.
2. On the Home tab, in the Create group, choose Create
Application.
3. On the General page of the Create Application Wizard, choose
Automatically detect information about this application from
installation files.
1. Type: Choose Windows Installer (*.msi file).
2. Location: Type the location (or choose Browse to select the
location) of the installation file Contoso.msi.
4. On the General Information page, you can supply further
information about the application.
5. In the Installation program field, specify the full command line
that will be used to install the application on PCs.
6. Choose Next. On the Summary page, confirm your application
settings and then complete the wizard.
Choosing an Endpoint Manager Solution for Deploying an
Application
.IntuneWin No Yes
Appv Yes No
DEMO: Deploy a Windows 10 app using
Configuration Manager
Resources Microsoft Intune documentation
Deployment Using Microsoft
Endpoint Manager (Segment 1
of 2)
Assessing Deployment Readiness
Traditional Deployment
• Boot images
‒ The Windows Preinstallation Environment (Windows
PE) images that are used to start a Windows 10
deployment
‒ Start boot images from a CD or DVD, an ISO file, a
USB device, or over the network using a Pre-Boot
Execution Environment (PXE) server
‒ Two default boot images: One to support x86
platforms and the other to support x64 platforms
• Considerations for customizing boot images
Deploying Windows 10 using Configuration Manager:
Introduction
Exploring the Deployment Components Configuration Manager
Tools for preparing the deployment Windows ADK, Windows Windows Configuration
Deployment Services, Designer and Windows
Microsoft Deployment Toolkit Autopilot
(MDT), and Configuration
Manager
Requirements for Windows Autopilot
Devices must have internet connectivity: Organization must be using Azure AD:
• Windows Autopilot is a cloud service • It must also use Microsoft Store for
Business or Intune
Create
deployment Deploy Self-
Upload deploy
profile device IDs
Existing devices
Hardware vendor Device IDs
Employee unboxes
device and self-deploys
Device Registration and OOBE Customization
Step 1 Step 2
Create a Windows Autopilot deployment file Apply a deployment profile
You can create and use multiple deployment profiles with Windows Windows Autopilot takes control of the OOBE setup phase on the
Autopilot, but can only use a single profile to deploy each device devices to which you apply the profile
Windows Autopilot Documentation
Module
Agenda Dynamic Deployment Methods
Lesson 1:
Deploying New Devices Using Autopilot
Lesson introduction
Autopilot Scenarios
Default OOBE setup phase OOBE setup phase with Windows Autopilot
Dynamic provisioning methods
Change the edition of Windows 10 Auto-enroll existing Windows 10 devices to Apply configuration settings to a Windows 10
apply configuration policies and applications devices using either removable media or
installed downloaded directly to the device
DEMO: Review Subscription Activation and
Provisioning Packages
Troubleshooting Windows 10 Autopilot
When troubleshooting Windows Autopilot, the key things to understand are:
Autopilot flow 1. Network connection established
2. Autopilot profile downloaded
3. User is authenticated (user-driven deployment mode only)
4. Azure AD join occurs
5. Auto MDM enrollment
6. Settings applied
Profile download 1. Ensure user connected device to the internet
2. Ensure profile exists and is assigned
1. If a blank profile downloaded, check Microsoft Endpoint Manager admin
center and assign a profile
2. New profile can be downloaded by rebooting the device
3. Ensure only one profile is assigned to the device
Key actions to perform 1. Review Azure AD and Microsoft Intune for proper licensing and profile and user
assignments
2. Look for Azure AD join issues and MDM enrollment issues
3. Gather troubleshooting logs mdmdiagnosticstool.exe –area Autopilot –cab <path>
Lesson 2: Dynamic Deployment Methods
Lesson Introduction
What it is
• Registers devices in Azure AD and auto-
enrolls them into Intune
• Simplifies provisioning of devices
• Applies to BYOD/CYOD scenarios
Latest Azure AD connect must be installed and configured to sync computer accounts to Azure AD
All users must have Enterprise Mobility + Security (EMS) or Intune license assigned
Scenarios that may require you to use imaging with • A device cannot boot into Windows, resulting in the
modern management need for a bare-metal build
• Bare-metal deployments
• Client storage drive replacements
• A device is procured with a newer version of
Windows 10 than has been standardized in your
company
DRIVERS POLICIES
SETTINGS
Create a USMT Package from Setup a State Migration Point Task Sequence Use USMT Templates for
Configuration Manager (Configuration Manager Site Migration
Can include USMT
System Role)
Create a custom USMT package xml templates that control data
Occurs in the task sequence
or use the default package Acts as a file share to store data that is collected in a user’s
when:
profile:
Stores a unique hash:
• Capturing settings
• MigApp.xml
• Device that allows data to be
• Reinstating the settings for a
captured • MigDocs.xml
user depending on selected
• Device upgraded options • MigUser.xml
• Relevant data to be restored • ConfigMgr.xml
Migrating user data the modern way
Known Folder Move - A Modern Alternative to Managing User Settings
Doesn't need to reinstall apps or transfer data You can control what migrates
Only certain upgrade paths are possible You must reinstall the apps
You must use the in-place Windows 10 image You can use a custom Windows 10 image
In-Place Upgrades
Configuration Microsoft
Manager Intune
Familiar IT challenges
Management
Surface Devices across the lifecycle: Windows Autopilot and White Glove
Microsoft 365
Endpoint
2 Manager
Azure AD
Microsoft
Endpoint Manager
Office 365 Windows Autopilot
1 Device information
(Automated Process)
device serial #
Autopilot profile Zero-touch Provisioning
4 • Driven by corporate login
Device actions
• Remote wipe • Windows
User Enterprise
settings & configurations Partner / reseller or
• Autopilot reset Security configuration & policies
•
• User targeted applications customer’s IT staff
• UEFI configuration & management
•• Quicker provisioning
Microsoft time
365 Apps & Teams
Lessofbandwidth
•• Line strain
business applications
• Intercept and pre-provision
• • User privileges
Consistent user experience! • Device settings & configurations
• Software updates
• Hardware & security configuration
5 • Device targeted applications
3
Full lifecycle Reseal
management On demand
Deprovisioning
(EOL)
Steady use Fulfill and deliver
Warranty
Replacement
Windows Autopilot on Surface
End-users are immediately productive with Surface!
Deployment Management Security
Streamlined deployments
25
78%
Windows Autopilot
White Glove
Autopilot
Device apps,
White Glove: Windows image
settings, policies;
User settings
and drivers and profiles
user apps
Demo
Modern Management on Surface
Help my users
collaborate
remotely
Familiar IT challenges
Deployment Management Security
Intune Zero-touch
UEFI Management
Deployment Management Security
Surface Enterprise
Management Mode (SEMM)
Deployment Management Security
Intune Zero-touch
UEFI Management
Deployment Management Security
Modern management
15%
78%
Demo
DFCI + INTUNE
DEMO
Deployment Management Security
Tenant Lockdown
Surface continues to implement
Microsoft 365 technologies 1st and Best
Deployment Management Security
Best-in-class security
80%
50%
Deployment, Management, and Security
The User Lies at the center of deployment,
management and security
Removing the barriers
five hours
21%
76%
Our Surface Family
Teamwork without boundaries
.
Surface to Chip Cloud Security
Today’s workplace
needs an integrated
security solution
✓ Organizations are pivoting to remote work
✓ Current network infrastructures were not built
with today’s security in mind
1NASCIO, Ponemon Institute’s 2018 Cost of a Data Breach Study, September 2018. 2Gartner, Gartner Forecasts Worldwide Information Security to Exceed $124 Billion in
2019, August 2018. 3https://www.cpomagazine.com/cyber-security/11-eye-opening-cyber-security-statistics-for-2019, June 2019.
Did you know? Security effects more than just IT
C-Suite & Product HR & Legal
Finance Development Operations
1 300+ Terrifying Cybercrime and Cybersecurity Statistics & Trends [2020] EDITION] – Comparitech, July 2020, https://www.comparitech.com/vpn/cybersecurity-cyber-crime-statistics-facts-trends/
2 https://www.blackstratus.com/risk-liability-assessment/
There is a clear need for device protection.
The answer? Layered security with Microsoft Surface.
Every layer of Surface from chip to cloud is developed and maintained by Microsoft, giving you
ultimate control, proactive protection, and peace of mind wherever and however work gets done.
Defense in Depth: Layered security with Surface a
Every layer of Surface from chip to cloud is developed and maintained by Microsoft, giving you
ultimate control, proactive protection, and peace of mind wherever and however work gets done.
Defense in Depth: Layered security with Surface 1
Microsoft built UEFI for Boot Security and
Firmware Management
Every layer of Surface from chip to cloud is developed and maintained by Microsoft, giving you
ultimate control, proactive protection, and peace of mind wherever and however work gets done.
Defense in Depth: Layered security with Surface 2
Every layer of Surface from chip to cloud is developed and maintained by Microsoft, giving you
ultimate control, proactive protection, and peace of mind wherever and however work gets done.
Defense in Depth: Layered security with Surface 3
Every layer of Surface from chip to cloud is developed and maintained by Microsoft, giving you
ultimate control, proactive protection, and peace of mind wherever and however work gets done.
Defense in Depth: Layered security with Surface 4
Component inspection and testing
at final assembly locations
Every layer of Surface from chip to cloud is developed and maintained by Microsoft, giving you
ultimate control, proactive protection, and peace of mind wherever and however work gets done.
Defense in Depth: Layered security with Surface 6
Every layer of Surface from chip to cloud is developed and maintained by Microsoft, giving you
ultimate control, proactive protection, and peace of mind wherever and however work gets done.
Defense in Depth: Layered security with Surface 7
Every layer of Surface from chip to cloud is developed and maintained by Microsoft, giving you
ultimate control, proactive protection, and peace of mind wherever and however work gets done.
Defense in Depth: Layered security with Surface 9
Every layer of Surface from chip to cloud is developed and maintained by Microsoft, giving you
ultimate control, proactive protection, and peace of mind wherever and however work gets done.
Defense in Depth: Layered security with Surface x
Ultimate control
Automatic Updates from
via remote device Windows Update for Business Highly Secure
management
Surface PC
Granular firmware management
to disable components pre-boot
via MEM
Every layer of Surface from chip to cloud is developed and maintained by Microsoft, giving you
ultimate control, proactive protection, and peace of mind wherever and however work gets done.
Defense in Depth: Layered security with Surface z
Every layer of Surface from chip to cloud is developed and maintained by Microsoft, giving you
ultimate control, proactive protection, and peace of mind wherever and however work gets done.
Why firmware defense matters
Jan 2018
! Spectre & Meltdown vulnerability at processor level of all x86, PowerPC and select ARM
devices.
Jan 2019
! ShadowHammer supply chain attack against ASUS firmware infecting > 1M devices.
Sept 2020
!
“
MosaicRegressor is identified as a bootkit that over-writes the UEFI and is used for espionage
and data exfiltration.
By 2022, 70% of organizations that
do not have a firmware upgrade
plan in place will be breached due to Sept 2020
!
”
a firmware vulnerability. US National Security Agency (NSA) issues technical report recommending Secure Boot and
protections for UEFI/Firmware.
- Gartner
Dec 2020
! Trickbot malware begins to target UEFI vulnerabilities to overwrite firmware and takeover
OS as a bootkit.
Chip to cloud security is built-in to Surface DNA
Protect with
hardware root of
trust
Defend against
firmware level
attack
Prevent access to
unverified code
Protect identities
from external
threats
Microsoft Surface & Secured Core PCs
Different approaches but the same result: best-in-class endpoint
security from Microsoft.
Protect with hardware Defend against Prevent access to Protect identities
root of trust firmware level attack unverified code from external threats
Replaces the standard basic input/output system (BIOS) with new features including faster startup and improved
Custom Built UEFI Yes ¹ security. The Unified Extensible Firmware Interface (UEFI) — built by Microsoft without third-party involvement —
ensures significantly more control over the hardware of a device and speedier react times. ¹
Delivers cloud-scale remote firmware management with zero-touch device provisioning. Microsoft’s own UEFI allows
DCFI (Device Firmware
Yes ² stronger DCFI implementation, enabling organizations to disable hardware elements and remotely lock UEFI using
Configuration Interface)
Intune. ¹
Mitigates potential security vulnerabilities associated with using removable SSDs or external storage devices. Newer
Protected DMA Access Yes
Surface devices come with DMA Protection enabled by default.
Surface Data Eraser Yes Provides a bootable USB tool to securely wipe data from your Surface devices.
Removable SSD Yes Yes ³ Helps organizations protect their data and comply with data retention policies.
Uses a physical, discrete TPM 2.0 chip, implementing a secure and sandboxed environment for storing passwords, PIN
Physical TPM 2.0 Yes
numbers, and certificates.
BitLocker Yes Yes Yes Combined with physical TPM and UEFI, provides a significantly improved and integrated encryption solution.
[1] Surface Go and Surface Go 2 use a third party UEFI and do not support DFCI. DFCI is currently available for Surface Laptop Go, Surface Book 3, Surface Laptop 3, Surface Pro 7, and Surface Pro X. about managing Surface UEFI settings.
[2] DFCI is currently available for Surface Laptop Go, Surface Book 3, Surface Laptop 3, Surface Pro 7, and Surface Pro X. about managing Surface UEFI settings.
[3] Removable SSD available on Surface Laptop 3, Surface Laptop Go, and Surface Pro X. Hard drive is only removable by skilled technicians following Microsoft instructions. Hard drive replacement may cause damage or safety risk and is not recommended.
Windows Hello for Replaces passwords with strong two-factor authentication on PCs and mobile devices. This authentication
Yes Yes Yes
Business consists of a new type of user credential that is tied to a device and uses a biometric or PIN.
Enabled by UEFI and TPM 2.0, ensures that only code signed, measured, and correctly implemented code can execute
Secure Boot Yes Yes Yes
on a Surface device.
Microsoft Defender with Ships Provides an enterprise endpoint security platform designed to help enterprise networks prevent, detect, investigate,
Yes Yes
Endpoint Enabled and respond to advanced threats.
Windows Defender Ships Isolates and hardens key systems and user secrets, making an attack against user credentials much harder to
Yes Yes
Credential Guard Enabled perform.
Windows Defender Ships Hardens computers against malware and prevents malicious code. If code is not previously confirmed as
Yes Yes
Application Control Enabled secure, it cannot run.
[1] Surface Go and Surface Go 2 use a third party UEFI and do not support DFCI. DFCI is currently available for Surface Laptop Go, Surface Book 3, Surface Laptop 3, Surface Pro 7, and Surface Pro X. about managing Surface UEFI settings.
[2] DFCI is currently available for Surface Laptop Go, Surface Book 3, Surface Laptop 3, Surface Pro 7, and Surface Pro X. about managing Surface UEFI settings.
[3] Removable SSD available on Surface Laptop 3, Surface Laptop Go, and Surface Pro X. Hard drive is only removable by skilled technicians following Microsoft instructions. Hard drive replacement may cause damage or safety risk and is not recommended.
• Defense in depth
• Layering of independent
defensive sub-components
CHIP to CLOUD
Securing boot
Security standard to boot only a trusted OS
Trust chain Security components
BDS
Soc SEC PEI DXE
Power on initialization security Pre-EFI Drivers
Boot device Boot to OS
selection
OEM key
Bitlocker Recovery
Removable SSD
Windows Hello for Business
Replaces passwords with strong
two-factor authentication on Surface
Trusted authentication
Conditional access
Geo-fencing, automated
posture-changing and network-based
firmware management… maybe!
Microsoft Defender 365
Detect, investigate, and respond to attacks
Agentless, cloud-powered
Unparalleled optics
Microsoft Defender ATP
Automated security
Synchronized defense
Windows Update
for Business
Always up to date with latest security defenses
Deployment
Management
Retirement
Download: aka.ms/SurfaceTools
Documentation: aka.ms/SuraceToolsDocs
Videos: aka.ms/SurfaceToolsVideo
Key takeaways
Built from the ground up for best-in-class security
Surface is secured chip-to-cloud
CHIP to CLOUD
Thank You