When joining a Windows 10 device to Azure AD which supports “InstantGo” or “Connected standby” e.g. Surface. Microsoft Automatically enables bitlocker.
For all other devices you need to manually enable bitlocker on your drive.
As an IT admin you can create a Compliance Policy that checks if Bitlocker has been enabled. Here is how:
First let me start of by saying that almost all android phones are different in respect to enrollment. These screenshots are taken on a Sony Device. The most complicated part with Android is that the End User have to fix the compliance settings yourself.
How good are your users?
e.g. as seen here the end user need to set the pin-code him/herself to be compliant. Make sure that your users can do this themselves before you start.
Picture by picture guide
Here is how you as a end user will experience Intune in your organization
If you are an IT admin, check out this guide on how it looks like for you in the Intune Portal
This device is healthy and should have access to email and does not need attention.
If you need device info, the Intune MDM agent will pull information from the device and display some of it here in the general info tab just right to the health status
Just some of the info pulled from Intune
There are many different Android phones out there. They all provide info to Intune MDM differently. Here Sony is not able to convey the OS name correctly to Intune.
Not all android phones report OS correctly
In the device list you can see and sort the list of devices on most of the general information.
Sort and find your device
When the end user enrolled this Sony Android Device he was prompted to group his device himself into a group. This group is displayed here. I have named this group myeself in the Intune portal. You could name it anything other than personal if you want to.
Device Group Mapping
Management channel should be set to intune or intune and EAS when your device is enrolled. We should also se the Compliant status. If it is not compliant, check your compliance policies in intune policy tab or make sure that you have made the device compliant e.g. enabled PIN or encryption/screen lock +++
If your device is not compliant it will be blocked from exchange when you run Conditional Access.
If you want to enable a user for Self Service Password Reset the user need to navigate to one of these endpoints and register his/her phone as a second factor.
Endpoints:
This endpoint verifies your phone and enrolls the user in SSPR: http://aka.ms/ssprsetup It does not change your password!
Here is a screen dump of what the user will have to do:
Standard LoginYou get routed to or enrollment serviceasks to verify your phone (if it is already there) if not you have to enter your phone numberIf your phone is not registered in azure AD you see this
Call goes fastest
In Azure AD you select how many factors your users need to setup. I have selected 1This is where you end up
I now delete the Exchange Connection to see what happens on the iPad for the end-user.
Connection Deleted.
-> With the connection deleted you can still send and recieve mails from any device without any Conditional Access. As long as you enter the login credentials into any mail app it works.
Removed the device from the company portal app and severed the Intune connection. There is no conditional access so you can still send and recieve mails.
Then add the exchange connector again from http://manage.microsoft.com and now my device should be blocked since Conditional access prevents non-enrolled devices from reading mail.
Nothing will happen untill the service has synced with exchange so click the “Run Fast Sync”button
A prompt will appear, just close it.
Exchange Conditional Access will now apply to all acounts again. If you have a device which is approved in Intune, no action required. If it is not enrolled in Intune you will have to enroll it.
After some hours when Exchange discovered that this device is not enrolled anymore it will also block mail. This takes about two hours.
Notice the top email asking for renrollment.
Background: The Exchange Connector sends power shell cmdlets to the exchange server. In the Azure AD Microsoft saves the ActiveSync ID with the ID of the Object or Device. This enables our service to block or allow certain devices from reading email. The comprehensive overview of what the connector does can be found here:https://docs.microsoft.com/en-us/intune/deploy-use/intune-on-premises-exchange-connector
You must be logged in to post a comment.