Merge branch 'main' into carmenf_basic_10_13_23
5
.github/ISSUE_TEMPLATE/config.yml
vendored
Normal file
@ -0,0 +1,5 @@
|
||||
blank_issues_enabled: false
|
||||
contact_links:
|
||||
- name: New feedback experience
|
||||
url: https://learn.microsoft.com/office/new-feedback
|
||||
about: We’re transitioning our feedback experience away from GitHub Issues. For more information, select Open.
|
@ -12,7 +12,8 @@
|
||||
"type_mapping": {
|
||||
"Conceptual": "Content",
|
||||
"ManagedReference": "Content",
|
||||
"RestApi": "Content"
|
||||
"RestApi": "Content",
|
||||
"ZonePivotGroups": "Toc"
|
||||
},
|
||||
"build_entry_point": "docs",
|
||||
"template_folder": "_themes"
|
||||
@ -90,6 +91,7 @@
|
||||
"moniker_ranges": [],
|
||||
"open_to_public_contributors": true,
|
||||
"type_mapping": {
|
||||
"ZonePivotGroups": "Toc",
|
||||
"Conceptual": "Content",
|
||||
"ManagedReference": "Content",
|
||||
"RestApi": "Content"
|
||||
@ -106,6 +108,7 @@
|
||||
"moniker_ranges": [],
|
||||
"open_to_public_contributors": false,
|
||||
"type_mapping": {
|
||||
"ZonePivotGroups": "Toc",
|
||||
"Conceptual": "Content",
|
||||
"ManagedReference": "Content",
|
||||
"RestApi": "Content"
|
||||
@ -122,6 +125,7 @@
|
||||
"moniker_ranges": [],
|
||||
"open_to_public_contributors": true,
|
||||
"type_mapping": {
|
||||
"ZonePivotGroups": "Toc",
|
||||
"Conceptual": "Content",
|
||||
"ManagedReference": "Content",
|
||||
"RestApi": "Content"
|
||||
@ -138,6 +142,7 @@
|
||||
"moniker_ranges": [],
|
||||
"open_to_public_contributors": true,
|
||||
"type_mapping": {
|
||||
"ZonePivotGroups": "Toc",
|
||||
"Conceptual": "Content",
|
||||
"ManagedReference": "Content",
|
||||
"RestApi": "Content"
|
||||
@ -170,6 +175,7 @@
|
||||
"moniker_ranges": [],
|
||||
"open_to_public_contributors": true,
|
||||
"type_mapping": {
|
||||
"ZonePivotGroups": "Toc",
|
||||
"Conceptual": "Content",
|
||||
"ManagedReference": "Content",
|
||||
"RestApi": "Content"
|
||||
@ -186,6 +192,7 @@
|
||||
"moniker_ranges": [],
|
||||
"open_to_public_contributors": true,
|
||||
"type_mapping": {
|
||||
"ZonePivotGroups": "Toc",
|
||||
"Conceptual": "Content",
|
||||
"ManagedReference": "Content",
|
||||
"RestApi": "Content"
|
||||
|
@ -159,6 +159,46 @@
|
||||
"source_path": "education/windows/windows-automatic-redeployment.md",
|
||||
"redirect_url": "/education/windows/autopilot-reset",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "education/windows/tutorial-school-deployment/enroll-aadj.md",
|
||||
"redirect_url": "/education/windows/tutorial-school-deployment/enroll-entra-join",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "education/windows/tutorial-school-deployment/set-up-azure-ad.md",
|
||||
"redirect_url": "/education/windows/tutorial-school-deployment/set-up-microsoft-entra-id",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "education/windows/set-up-school-pcs-whats-new.md",
|
||||
"redirect_url": "/education/windows",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "education/windows/deploy-windows-10-in-a-school-district.md",
|
||||
"redirect_url": "/education/windows",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "education/windows/deploy-windows-10-in-a-school.md",
|
||||
"redirect_url": "/education/windows",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "education/windows/deploy-windows-10-overview.md",
|
||||
"redirect_url": "/education/windows",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "education/windows/chromebook-migration-guide.md",
|
||||
"redirect_url": "/education/windows",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "education/windows/autopilot-reset.md",
|
||||
"redirect_url": "/autopilot/windows-autopilot-reset",
|
||||
"redirect_document_id": false
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -177,7 +177,12 @@
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/hardware-protection/tpm/trusted-platform-module-top-node.md",
|
||||
"redirect_url": "/windows/security/hardware-security/tpm/trusted-platform-module-top-node",
|
||||
"redirect_url": "/windows/security/hardware-security/tpm/trusted-platform-module-overview",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/hardware-security/tpm/trusted-platform-module-top-node.md",
|
||||
"redirect_url": "/windows/security/hardware-security/tpm/trusted-platform-module-overview",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
@ -532,7 +537,7 @@
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/information-protection/bitlocker/bitlocker-device-encryption-overview-windows-10.md",
|
||||
"redirect_url": "/windows/security/operating-system-security/data-protection/bitlocker/bitlocker-device-encryption-overview-windows-10",
|
||||
"redirect_url": "/windows/security/operating-system-security/data-protection/bitlocker#device-encryption",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
@ -587,7 +592,7 @@
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/information-protection/bitlocker/bitlocker-recovery-guide-plan.md",
|
||||
"redirect_url": "/windows/security/operating-system-security/data-protection/bitlocker/bitlocker-recovery-guide-plan",
|
||||
"redirect_url": "/windows/security/operating-system-security/data-protection/bitlocker/recovery-overview",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
@ -617,7 +622,7 @@
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/information-protection/bitlocker/bitlocker-use-bitlocker-recovery-password-viewer.md",
|
||||
"redirect_url": "/windows/security/operating-system-security/data-protection/bitlocker/bitlocker-use-bitlocker-recovery-password-viewer",
|
||||
"redirect_url": "/windows/security/operating-system-security/data-protection/bitlocker/manage-recovery-passwords#bitlocker-recovery-password-viewer",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
@ -6842,7 +6847,7 @@
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-firewall/configure-the-windows-firewall-log.md",
|
||||
"redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/configure-the-windows-firewall-log",
|
||||
"redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/configure-logging",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
@ -6925,11 +6930,6 @@
|
||||
"redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/create-wmi-filters-for-the-gpo",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-firewall/designing-a-windows-firewall-with-advanced-security-strategy.md",
|
||||
"redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/designing-a-windows-firewall-with-advanced-security-strategy",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-firewall/determining-the-trusted-state-of-your-devices.md",
|
||||
"redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/determining-the-trusted-state-of-your-devices",
|
||||
@ -7077,7 +7077,7 @@
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-firewall/isolating-apps-on-your-network.md",
|
||||
"redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/isolating-apps-on-your-network",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/hh831418(v=ws.11)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
@ -7414,6 +7414,776 @@
|
||||
"source_path": "windows/security/operating-system-security/data-protection/personal-data-encryption/faq-pde.yml",
|
||||
"redirect_url": "/windows/security/operating-system-security/data-protection/personal-data-encryption/faq",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/data-protection/bitlocker/bitlocker-group-policy-settings.md",
|
||||
"redirect_url": "/windows/security/operating-system-security/data-protection/bitlocker/configure#$bitlocker-policy-settings",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/data-protection/bitlocker/bitlocker-deployment-comparison.md",
|
||||
"redirect_url": "/windows/security/operating-system-security/data-protection/bitlocker/configure#bitlocker-policy-settings",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/data-protection/bitlocker/bitlocker-countermeasures.md",
|
||||
"redirect_url": "/windows/security/operating-system-security/data-protection/bitlocker/countermeasures",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/data-protection/bitlocker/bitlocker-recovery-guide-plan.md",
|
||||
"redirect_url": "/windows/security/operating-system-security/data-protection/bitlocker/recovery-overview",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/data-protection/bitlocker/bitlocker-use-bitlocker-recovery-password-viewer.md",
|
||||
"redirect_url": "/windows/security/operating-system-security/data-protection/bitlocker/recovery-process#bitlocker-recovery-password-viewer",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/data-protection/bitlocker/bitlocker-how-to-enable-network-unlock.md",
|
||||
"redirect_url": "/windows/security/operating-system-security/data-protection/bitlocker/network-unlock",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/data-protection/bitlocker/bitlocker-basic-deployment.md",
|
||||
"redirect_url": "/windows/security/operating-system-security/data-protection/bitlocker/configure",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/data-protection/bitlocker/bitlocker-management-for-enterprises.md",
|
||||
"redirect_url": "/windows/security/operating-system-security/data-protection/bitlocker/configure",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/data-protection/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies.md",
|
||||
"redirect_url": "/windows/security/operating-system-security/data-protection/bitlocker/plan",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/data-protection/bitlocker/bitlocker-use-bitlocker-drive-encryption-tools-to-manage-bitlocker.md",
|
||||
"redirect_url": "/windows/security/operating-system-security/data-protection/bitlocker/operations-guide",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/data-protection/bitlocker/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md",
|
||||
"redirect_url": "/windows/security/operating-system-security/data-protection/bitlocker/csv-san",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/data-protection/bitlocker/bitlocker-how-to-deploy-on-windows-server.md",
|
||||
"redirect_url": "/windows/security/operating-system-security/data-protection/bitlocker/install-server",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/data-protection/bitlocker/bitlocker-device-encryption-overview-windows-10.md",
|
||||
"redirect_url": "/windows/security/operating-system-security/data-protection/bitlocker#device-encryption",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/basic-firewall-policy-design.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/jj721530(v=ws.11)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/boundary-zone.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc725978(v=ws.10)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/boundary-zone-gpos.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc770729(v=ws.10)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/certificate-based-isolation-policy-design.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc731463(v=ws.10)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/certificate-based-isolation-policy-design-example.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc771822(v=ws.10)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/documenting-the-zones.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc753825(v=ws.10)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/domain-isolation-policy-design.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc725818(v=ws.10)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/domain-isolation-policy-design-example.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc732933(v=ws.10)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/encryption-zone.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc753367(v=ws.10)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/encryption-zone-gpos.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc770426(v=ws.10)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/exemption-list.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc732202(v=ws.10)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/firewall-gpos.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc771233(v=ws.10)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/firewall-policy-design-example.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc731164(v=ws.10)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/gpo-domiso-boundary.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc770565(v=ws.10)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/gpo-domiso-encryption.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc754085(v=ws.10)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/gpo-domiso-firewall.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc731123(v=ws.10)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/gpo-domiso-isolateddomain-clients.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc770836(v=ws.10)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/gpo-domiso-isolateddomain-servers.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc731908(v=ws.10)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/isolated-domain.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc731788(v=ws.10)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/isolated-domain-gpos.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc731447(v=ws.10)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/mapping-your-deployment-goals-to-a-windows-firewall-with-advanced-security-design.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/jj721532(v=ws.11)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/planning-certificate-based-authentication.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc730835(v=ws.10)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/planning-domain-isolation-zones.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc771044(v=ws.10)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/planning-gpo-deployment.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc771733(v=ws.10)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/planning-group-policy-deployment-for-your-isolation-zones.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc732752(v=ws.10)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/planning-isolation-groups-for-the-zones.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc725693(v=ws.10)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/planning-network-access-groups.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc771664(v=ws.10)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/planning-server-isolation-zones.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc732615(v=ws.10)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/planning-settings-for-a-basic-firewall-policy.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc754986(v=ws.10)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/planning-the-gpos.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc771716(v=ws.10)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/planning-to-deploy-windows-firewall-with-advanced-security.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc947826(v=ws.10)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/planning-your-windows-firewall-with-advanced-security-design.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc730841(v=ws.10)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/server-isolation-gpos.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc732486(v=ws.10)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/server-isolation-policy-design.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/jj721528(v=ws.11)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/server-isolation-policy-design-example.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc732413(v=ws.10)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/appendix-a-sample-gpo-template-files-for-settings-used-in-this-guide.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc770289(v=ws.10)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/checklist-configuring-basic-firewall-settings.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc947845(v=ws.10)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/checklist-configuring-rules-for-an-isolated-server-zone.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc947794(v=ws.10)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/checklist-configuring-rules-for-servers-in-a-standalone-isolated-server-zone.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc947848(v=ws.10)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/checklist-configuring-rules-for-the-boundary-zone.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc947836(v=ws.10)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/checklist-configuring-rules-for-the-encryption-zone.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc947800(v=ws.10)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/checklist-configuring-rules-for-the-isolated-domain.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc947783(v=ws.10)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/checklist-creating-group-policy-objects.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc947791(v=ws.10)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/checklist-creating-inbound-firewall-rules.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc947799(v=ws.10)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/checklist-creating-outbound-firewall-rules.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc947827(v=ws.10)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/checklist-creating-rules-for-clients-of-a-standalone-isolated-server-zone.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc947819(v=ws.10)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/checklist-implementing-a-basic-firewall-policy-design.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/jj717261(v=ws.11)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/checklist-implementing-a-certificate-based-isolation-policy-design.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/jj717238(v=ws.11)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/checklist-implementing-a-domain-isolation-policy-design.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/jj717284(v=ws.11)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/checklist-implementing-a-standalone-server-isolation-policy-design.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/jj717277(v=ws.11)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/identifying-your-windows-firewall-with-advanced-security-deployment-goals.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc732023(v=ws.10)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/implementing-your-windows-firewall-with-advanced-security-design-plan.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/jj717256(v=ws.11)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/protect-devices-from-unwanted-network-traffic.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc772556(v=ws.10)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/require-encryption-when-accessing-sensitive-network-resources.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc770865(v=ws.10)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/restrict-access-to-only-specified-users-or-devices.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc753064(v=ws.10)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/restrict-access-to-only-trusted-devices.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc725659(v=ws.10)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/understanding-the-windows-firewall-with-advanced-security-design-process.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc731951(v=ws.10)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/windows-firewall-with-advanced-security-deployment-guide.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/jj717241(v=ws.11)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/windows-firewall-with-advanced-security-design-guide.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc732024(v=ws.10)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/add-production-devices-to-the-membership-group-for-a-zone.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/jj717262(v=ws.11)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/add-test-devices-to-the-membership-group-for-a-zone.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/jj717263(v=ws.11)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/assign-security-group-filters-to-the-gpo.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/jj717260(v=ws.11)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/change-rules-from-request-to-require-mode.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/jj717237(v=ws.11)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/configure-authentication-methods.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/jj717279(v=ws.11)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/configure-data-protection-quick-mode-settings.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/jj717293(v=ws.11)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/configure-group-policy-to-autoenroll-and-deploy-certificates.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/jj717253(v=ws.11)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/configure-key-exchange-main-mode-settings.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/jj717249(v=ws.11)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/configure-the-rules-to-require-encryption.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/jj717270(v=ws.11)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/configure-the-workstation-authentication-certificate-template.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/jj717275(v=ws.11)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/configure-windows-firewall-to-suppress-notifications-when-a-program-is-blocked.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/jj717278(v=ws.11)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/confirm-that-certificates-are-deployed-correctly.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/jj717245(v=ws.11)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/copy-a-gpo-to-create-a-new-gpo.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/jj717246(v=ws.11)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/create-a-group-account-in-active-directory.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/jj717247(v=ws.11)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/create-a-group-policy-object.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/jj717274(v=ws.11)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/create-an-authentication-exemption-list-rule.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/jj717243(v=ws.11)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/create-an-authentication-request-rule.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/jj717283(v=ws.11)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/create-wmi-filters-for-the-gpo.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/jj717288(v=ws.11)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/enable-predefined-inbound-rules.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/jj717281(v=ws.11)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/enable-predefined-outbound-rules.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/jj717259(v=ws.11)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/exempt-icmp-from-authentication.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/jj717292(v=ws.11)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/link-the-gpo-to-the-domain.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/jj717264(v=ws.11)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/modify-gpo-filters-to-apply-to-a-different-zone-or-version-of-windows.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/jj717265(v=ws.11)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/open-the-group-policy-management-console-to-ip-security-policies.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/jj717290(v=ws.11)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/open-the-group-policy-management-console-to-windows-firewall-with-advanced-security.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/jj717269(v=ws.11)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/open-the-group-policy-management-console-to-windows-firewall.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/jj717266(v=ws.11)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/open-windows-firewall-with-advanced-security.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/jj717254(v=ws.11)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/restrict-server-access-to-members-of-a-group-only.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/jj717267(v=ws.11)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/turn-on-windows-firewall-and-configure-default-behavior.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/jj717251(v=ws.11)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/verify-that-network-traffic-is-authenticated.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/jj717273(v=ws.11)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/gathering-the-information-you-need.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc731454(v=ws.10)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/gathering-information-about-your-current-network-infrastructure.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc770899(v=ws.10)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/gathering-information-about-your-active-directory-deployment.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc771366(v=ws.10)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/gathering-information-about-your-devices.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc726039(v=ws.10)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/gathering-other-relevant-information.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc771791(v=ws.10)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/determining-the-trusted-state-of-your-devices.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc753540(v=ws.10)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/windows-firewall-with-advanced-security.md",
|
||||
"redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/create-inbound-rules-to-support-rpc.md",
|
||||
"redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/configure",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/create-an-outbound-program-or-service-rule.md",
|
||||
"redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/configure",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/create-an-outbound-port-rule.md",
|
||||
"redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/configure",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/create-an-inbound-program-or-service-rule.md",
|
||||
"redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/configure",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/create-an-inbound-port-rule.md",
|
||||
"redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/configure",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/create-an-inbound-icmp-rule.md",
|
||||
"redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/configure",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall-with-advanced-security-administration-with-windows-powershell.md",
|
||||
"redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/configure-with-command-line",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-firewall/designing-a-windows-firewall-with-advanced-security-strategy.md",
|
||||
"redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/designing-a-windows-firewall-with-advanced-security-strategy.md",
|
||||
"redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/windows-firewall-with-advanced-security-administration-with-windows-powershell.md",
|
||||
"redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/configure-with-command-line",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/securing-end-to-end-ipsec-connections-by-using-ikev2.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/hh831807(v=ws.11)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/best-practices-configuring.md",
|
||||
"redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/configure",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/isolating-apps-on-your-network.md",
|
||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/hh831418(v=ws.11)",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/configure-the-windows-firewall-log.md",
|
||||
"redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/configure-logging",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/create-windows-firewall-rules-in-intune.md",
|
||||
"redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/configure",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/firewall-settings-lost-on-upgrade.md",
|
||||
"redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/identity-protection/hello-for-business/hello-feature-remote-desktop.md",
|
||||
"redirect_url": "/windows/security/identity-protection/hello-for-business/rdp-sign-in",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/identity-protection/hello-for-business/hello-deployment-rdp-certs.md",
|
||||
"redirect_url": "/windows/security/identity-protection/hello-for-business/rdp-sign-in",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/security-foundations/msft-security-dev-lifecycle.md",
|
||||
"redirect_url": "/compliance/assurance/assurance-microsoft-security-development-lifecycle",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/identity-protection/hello-for-business/hello-feature-pin-reset.md",
|
||||
"redirect_url": "/windows/security/identity-protection/hello-for-business/pin-reset",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/identity-protection/hello-for-business/hello-adequate-domain-controllers.md",
|
||||
"redirect_url": "/windows-server/administration/performance-tuning/role/active-directory-server/capacity-planning-for-active-directory-domain-services",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/identity-protection/hello-for-business/hello-cert-trust-validate-ad-prereq.md",
|
||||
"redirect_url": "/windows/security/identity-protection/hello-for-business/deploy/on-premises-cert-trust",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/identity-protection/hello-for-business/hello-deployment-cert-trust.md",
|
||||
"redirect_url": "/windows/security/identity-protection/hello-for-business/deploy/on-premises-cert-trust",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-settings-adfs.md",
|
||||
"redirect_url": "/windows/security/identity-protection/hello-for-business/deploy/hybrid-cert-trust-adfs",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-provision.md",
|
||||
"redirect_url": "/windows/security/identity-protection/hello-for-business/deploy/hybrid-cert-trust-enroll",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/identity-protection/hello-for-business/hello-hybrid-cert-trust-validate-pki.md",
|
||||
"redirect_url": "/windows/security/identity-protection/hello-for-business/deploy/hybrid-cert-trust-pki",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/identity-protection/hello-for-business/hello-hybrid-cert-trust.md",
|
||||
"redirect_url": "/windows/security/identity-protection/hello-for-business/deploy/hybrid-cert-trust",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/identity-protection/hello-for-business/hello-cert-trust-adfs.md",
|
||||
"redirect_url": "/windows/security/identity-protection/hello-for-business/deploy/on-premises-cert-trust-adfs",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/identity-protection/hello-for-business/hello-cert-trust-policy-settings.md",
|
||||
"redirect_url": "/windows/security/identity-protection/hello-for-business/deploy/on-premises-cert-trust-enroll",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/identity-protection/hello-for-business/hello-cert-trust-validate-deploy-mfa.md",
|
||||
"redirect_url": "/windows/security/identity-protection/hello-for-business/deploy/on-premises-cert-trust-mfa",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/identity-protection/hello-for-business/hello-cert-trust-validate-pki.md",
|
||||
"redirect_url": "/windows/security/identity-protection/hello-for-business/deploy/on-premises-cert-trust-pki",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/identity-protection/hello-for-business/hello-deployment-key-trust.md",
|
||||
"redirect_url": "/windows/security/identity-protection/hello-for-business/deploy/on-premises-key-trust",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/identity-protection/hello-for-business/hello-key-trust-validate-ad-prereq.md",
|
||||
"redirect_url": "/windows/security/identity-protection/hello-for-business/deploy/on-premises-key-trust",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/identity-protection/hello-for-business/hello-aad-join-cloud-only-deploy.md",
|
||||
"redirect_url": "/windows/security/identity-protection/hello-for-business/deploy/cloud",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/identity-protection/hello-for-business/hello-hybrid-cloud-kerberos-trust-provision.md",
|
||||
"redirect_url": "/windows/security/identity-protection/hello-for-business/deploy/hybrid-cloud-kerberos-trust-enroll",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/identity-protection/hello-for-business/hello-hybrid-cloud-kerberos-trust.md",
|
||||
"redirect_url": "/windows/security/identity-protection/hello-for-business/deploy/hybrid-cloud-kerberos-trust",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-provision.md",
|
||||
"redirect_url": "/windows/security/identity-protection/hello-for-business/deploy/hybrid-key-trust-enroll",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-validate-pki.md",
|
||||
"redirect_url": "/windows/security/identity-protection/hello-for-business/deploy/hybrid-key-trust-pki",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust.md",
|
||||
"redirect_url": "/windows/security/identity-protection/hello-for-business/deploy/hybrid-key-trust",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/identity-protection/hello-for-business/hello-deployment-guide.md",
|
||||
"redirect_url": "/windows/security/identity-protection/hello-for-business/deploy/",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/identity-protection/hello-for-business/hello-key-trust-adfs.md",
|
||||
"redirect_url": "/windows/security/identity-protection/hello-for-business/deploy/on-premises-key-trust-adfs",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/identity-protection/hello-for-business/hello-key-trust-policy-settings.md",
|
||||
"redirect_url": "/windows/security/identity-protection/hello-for-business/deploy/on-premises-key-trust-enroll",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/identity-protection/hello-for-business/hello-key-trust-validate-deploy-mfa.md",
|
||||
"redirect_url": "/windows/security/identity-protection/hello-for-business/deploy/on-premises-key-trust-mfa",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/identity-protection/hello-for-business/hello-key-trust-validate-pki.md",
|
||||
"redirect_url": "/windows/security/identity-protection/hello-for-business/deploy/on-premises-key-trust-pki",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/identity-protection/hello-for-business/hello-identity-verification.md",
|
||||
"redirect_url": "/windows/security/identity-protection/hello-for-business/deploy/requirements",
|
||||
"redirect_document_id": false
|
||||
}
|
||||
]
|
||||
}
|
@ -56,7 +56,10 @@
|
||||
"jborsecnik",
|
||||
"tiburd",
|
||||
"garycentric",
|
||||
"beccarobins"
|
||||
"beccarobins",
|
||||
"Stacyrch140",
|
||||
"v-stsavell",
|
||||
"American-Dipper"
|
||||
]
|
||||
},
|
||||
"fileMetadata": {},
|
||||
|
@ -40,14 +40,6 @@ landingContent:
|
||||
- text: Evaluate the impact
|
||||
url: ./microsoft-edge-forrester.md
|
||||
|
||||
# Card (optional)
|
||||
- title: Test your site on Microsoft Edge
|
||||
linkLists:
|
||||
- linkListType: overview
|
||||
links:
|
||||
- text: Test your site on Microsoft Edge for free on BrowserStack
|
||||
url: https://developer.microsoft.com/microsoft-edge/tools/remote/
|
||||
|
||||
# Card (optional)
|
||||
- title: Improve compatibility with Enterprise Mode
|
||||
linkLists:
|
||||
|
@ -48,7 +48,10 @@
|
||||
"jborsecnik",
|
||||
"tiburd",
|
||||
"garycentric",
|
||||
"beccarobins"
|
||||
"beccarobins",
|
||||
"Stacyrch140",
|
||||
"v-stsavell",
|
||||
"American-Dipper"
|
||||
]
|
||||
},
|
||||
"externalReference": [],
|
||||
|
@ -1,24 +1,4 @@
|
||||
items:
|
||||
- name: Docs
|
||||
tocHref: /
|
||||
topicHref: /
|
||||
items:
|
||||
- name: Microsoft Education
|
||||
tocHref: /education/
|
||||
topicHref: /education/index
|
||||
items:
|
||||
- name: Get started
|
||||
tocHref: /education/get-started
|
||||
topicHref: /education/get-started/index
|
||||
- name: Windows
|
||||
tocHref: /education/windows
|
||||
topicHref: /education/windows/index
|
||||
- name: Windows
|
||||
tocHref: /windows/configuration/
|
||||
topicHref: /education/windows/index
|
||||
- name: Windows
|
||||
tocHref: /windows/deployment/
|
||||
topicHref: /education/windows/index
|
||||
- name: Windows
|
||||
tocHref: /windows/Security/Application Control for Windows/
|
||||
topicHref: /education/windows/index
|
||||
- name: Windows
|
||||
tocHref: /windows/
|
||||
topicHref: /windows/index
|
||||
|
@ -42,9 +42,8 @@
|
||||
"ms.localizationpriority": "medium",
|
||||
"breadcrumb_path": "/education/breadcrumb/toc.json",
|
||||
"uhfHeaderId": "MSDocsHeader-Windows",
|
||||
"feedback_system": "GitHub",
|
||||
"feedback_github_repo": "MicrosoftDocs/windows-itpro-docs",
|
||||
"feedback_product_url": "https://support.microsoft.com/windows/send-feedback-to-microsoft-with-the-feedback-hub-app-f59187f8-8739-22d6-ba93-f66612949332",
|
||||
"feedback_system": "Standard",
|
||||
"feedback_product_url": "https://support.microsoft.com/windows/send-feedback-to-microsoft-with-the-feedback-hub-app-f59187f8-8739-22d6-ba93-f66612949332",
|
||||
"_op_documentIdPathDepotMapping": {
|
||||
"./": {
|
||||
"depot_name": "Win.education",
|
||||
@ -66,7 +65,8 @@
|
||||
"garycentric",
|
||||
"v-stsavell",
|
||||
"beccarobins",
|
||||
"v-stchambers"
|
||||
"Stacyrch140",
|
||||
"American-Dipper"
|
||||
]
|
||||
},
|
||||
"fileMetadata": {
|
||||
|
@ -2,20 +2,13 @@
|
||||
|
||||
|
||||
|
||||
## Week of September 11, 2023
|
||||
## Week of December 11, 2023
|
||||
|
||||
|
||||
| Published On |Topic title | Change |
|
||||
|------|------------|--------|
|
||||
| 9/11/2023 | [Configure education themes for Windows 11](/education/windows/edu-themes) | modified |
|
||||
| 9/11/2023 | [Configure federated sign-in for Windows devices](/education/windows/federated-sign-in) | modified |
|
||||
|
||||
|
||||
## Week of September 04, 2023
|
||||
|
||||
|
||||
| Published On |Topic title | Change |
|
||||
|------|------------|--------|
|
||||
| 9/5/2023 | [Configure federated sign-in for Windows devices](/education/windows/federated-sign-in) | modified |
|
||||
| 9/5/2023 | [Windows for Education documentation](/education/windows/index) | modified |
|
||||
| 9/5/2023 | [Windows 11 SE Overview](/education/windows/windows-11-se-overview) | modified |
|
||||
| 12/12/2023 | Chromebook migration guide | removed |
|
||||
| 12/12/2023 | Deploy Windows 10 in a school district | removed |
|
||||
| 12/12/2023 | Deploy Windows 10 in a school | removed |
|
||||
| 12/12/2023 | Windows 10 for Education | removed |
|
||||
| 12/12/2023 | [Reset devices with Autopilot Reset](/education/windows/autopilot-reset) | modified |
|
||||
|
@ -8,7 +8,7 @@ metadata:
|
||||
title: Microsoft 365 Education Documentation
|
||||
description: Learn about product documentation and resources available for school IT administrators, teachers, students, and education app developers.
|
||||
ms.topic: hub-page
|
||||
ms.date: 08/10/2022
|
||||
ms.date: 11/06/2023
|
||||
|
||||
productDirectory:
|
||||
title: For IT admins
|
||||
@ -40,7 +40,7 @@ productDirectory:
|
||||
imageSrc: ./images/EDU-Lockbox.svg
|
||||
links:
|
||||
- url: /azure/active-directory/fundamentals/active-directory-deployment-checklist-p2
|
||||
text: Azure Active Directory feature deployment guide
|
||||
text: Microsoft Entra feature deployment guide
|
||||
- url: https://techcommunity.microsoft.com/t5/security-compliance-and-identity/azure-information-protection-deployment-acceleration-guide/ba-p/334423
|
||||
text: Azure information protection deployment acceleration guide
|
||||
- url: /defender-cloud-apps/get-started
|
||||
|
@ -1,114 +0,0 @@
|
||||
---
|
||||
title: Reset devices with Autopilot Reset
|
||||
description: Learn about Autopilot Reset and how to enable and use it.
|
||||
ms.date: 08/10/2022
|
||||
ms.topic: how-to
|
||||
appliesto:
|
||||
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 10</a>
|
||||
ms.collection:
|
||||
- highpri
|
||||
- tier2
|
||||
- education
|
||||
---
|
||||
|
||||
# Reset devices with Autopilot Reset
|
||||
|
||||
IT admins or technical teachers can use Autopilot Reset to quickly remove personal files, apps, and settings, and reset Windows 10 devices from the lock screen anytime and apply original settings and management enrollment (Azure Active Directory and device management) so the devices are ready to use. With Autopilot Reset, devices are returned to a fully configured or known IT-approved state.
|
||||
|
||||
To enable Autopilot Reset you must:
|
||||
|
||||
1. [Enable the policy for the feature](#enable-autopilot-reset)
|
||||
2. [Trigger a reset for each device](#trigger-autopilot-reset)
|
||||
|
||||
## Enable Autopilot Reset
|
||||
|
||||
To use Autopilot Reset, [Windows Recovery Environment (WinRE) must be enabled on the device](#winre).
|
||||
|
||||
**DisableAutomaticReDeploymentCredentials** is a policy that enables or disables the visibility of the credentials for Autopilot Reset. It's a policy node in the [Policy CSP](/windows/client-management/mdm/policy-csp-credentialproviders), **CredentialProviders/DisableAutomaticReDeploymentCredentials**. By default, this policy is set to 1 (Disable). This setting ensures that Autopilot Reset isn't triggered by accident.
|
||||
|
||||
You can set the policy using one of these methods:
|
||||
|
||||
- MDM provider
|
||||
|
||||
Check your MDM provider documentation on how to set this policy. If your MDM provider doesn't explicitly support this policy, you can manually set this policy if your MDM provider allows specific OMA-URIs to be manually set.
|
||||
|
||||
For example, in Intune, create a new configuration policy and add an OMA-URI.
|
||||
- OMA-URI: ./Vendor/MSFT/Policy/Config/CredentialProviders/DisableAutomaticReDeploymentCredentials
|
||||
- Data type: Integer
|
||||
- Value: 0
|
||||
|
||||
- Windows Configuration Designer
|
||||
|
||||
You can [use Windows Configuration Designer](/windows/configuration/provisioning-packages/provisioning-create-package) to set the **Runtime settings > Policies > CredentialProviders > DisableAutomaticReDeploymentCredentials** setting and create a provisioning package.
|
||||
|
||||
- Set up School PCs app
|
||||
|
||||
Autopilot Reset in the Set up School PCs app is available in the latest release of the app. Make sure you're running Windows 10, version 1709 on the student PCs if you want to use Autopilot Reset through the Set up School PCs app. You can check the version several ways:
|
||||
|
||||
- Reach out to your device manufacturer.
|
||||
|
||||
- If you manage your PCs using Intune or Intune for Education, you can check the OS version by checking the **OS version** info for the device. If you're using another MDM provider, check the documentation for the MDM provider to confirm the OS version.
|
||||
|
||||
- Log into the PCs, go to the **Settings > System > About** page, look in the **Windows specifications** section and confirm **Version** is set to 1709.
|
||||
|
||||
To use the Autopilot Reset setting in the Set up School PCs app:
|
||||
|
||||
- When using [Set up School PCs](use-set-up-school-pcs-app.md), in the **Configure student PC settings** screen, select **Enable Windows 10 Autopilot Reset** among the list of settings for the student PC as shown in the following example:
|
||||
|
||||

|
||||
|
||||
## Trigger Autopilot Reset
|
||||
Autopilot Reset is a two-step process: trigger it and then authenticate. Once you've done these two steps, you can let the process execute and once it's done, the device is again ready for use.
|
||||
|
||||
**To trigger Autopilot Reset**
|
||||
|
||||
1. From the Windows device lock screen, enter the keystroke: **CTRL + Windows key + R**.
|
||||
|
||||

|
||||
|
||||
This keystroke will open up a custom sign-in screen for Autopilot Reset. The screen serves two purposes:
|
||||
|
||||
1. Confirm/verify that the end user has the right to trigger Autopilot Reset
|
||||
|
||||
2. Notify the user in case a provisioning package, created using Windows Configuration Designer or Set up School PCs, will be used as part of the process.
|
||||
|
||||

|
||||
|
||||
2. Sign in with the admin account credentials. If you created a provisioning package, plug in the USB drive and trigger Autopilot Reset.
|
||||
|
||||
> [!IMPORTANT]
|
||||
> To reestablish Wi-Fi connectivity after reset, make sure the **Connect automatically** box is checked for the device's wireless network connection.
|
||||
|
||||
Once Autopilot Reset is triggered, the reset process starts.
|
||||
|
||||
After reset, the device:
|
||||
|
||||
- Sets the region, language, and keyboard.
|
||||
|
||||
- Connects to Wi-Fi.
|
||||
|
||||
- If you provided a provisioning package when Autopilot Reset is triggered, the system will apply this new provisioning package. Otherwise, the system will reapply the original provisioning package on the device.
|
||||
|
||||
- Is returned to a known good managed state, connected to Azure AD and MDM.
|
||||
|
||||

|
||||
|
||||
Once provisioning is complete, the device is again ready for use.
|
||||
|
||||
<span id="winre"/>
|
||||
|
||||
## Troubleshoot Autopilot Reset
|
||||
|
||||
Autopilot Reset will fail when the [Windows Recovery Environment (WinRE)](/windows-hardware/manufacture/desktop/windows-recovery-environment--windows-re--technical-reference) isn't enabled on the device. You'll see `Error code: ERROR_NOT_SUPPORTED (0x80070032)`.
|
||||
|
||||
To make sure WinRE is enabled, use the [REAgentC.exe tool](/windows-hardware/manufacture/desktop/reagentc-command-line-options) to run the following command:
|
||||
|
||||
```console
|
||||
reagentc /enable
|
||||
```
|
||||
|
||||
If Autopilot Reset fails after enabling WinRE, or if you're unable to enable WinRE, kindly contact [Microsoft Support](https://support.microsoft.com) for assistance.
|
||||
|
||||
## Related articles
|
||||
|
||||
[Set up Windows devices for education](set-up-windows-10.md)
|
@ -211,13 +211,13 @@ A firmware embedded key is only required to upgrade using Subscription Activatio
|
||||
|
||||
### What is a multiple activation key and how does it differ from using KMS, Active Directory based activation or Subscription Activation?
|
||||
|
||||
A multiple activation key activates either individual computers or a group of computers by connecting directly to servers over the internet or by telephone. KMS, Active Directory based activation and subscription activation are bulk activation methods that work based on network proximity or joining to Active Directory or Azure Active Directory. The table below shows which methods can be used for each scenario.
|
||||
A multiple activation key activates either individual computers or a group of computers by connecting directly to servers over the internet or by telephone. KMS, Active Directory based activation and subscription activation are bulk activation methods that work based on network proximity or joining to Active Directory or Microsoft Entra ID. The table below shows which methods can be used for each scenario.
|
||||
|
||||
| Scenario | Ownership | MAK | KMS | AD based activation | Subscription Activation |
|
||||
|-|-|:-:|:-:|:-:|:-:|
|
||||
| **Workplace join (add work or school account)** | Personal (or student-owned) | X | | | |
|
||||
| **Azure AD Join** | Organization | X | X | | X |
|
||||
| **Hybrid Azure AD Join** | Organization | X | X | X | X |
|
||||
| **Microsoft Entra join** | Organization | X | X | | X |
|
||||
| **Microsoft Entra hybrid join** | Organization | X | X | X | X |
|
||||
|
||||
## Related links
|
||||
|
||||
|
@ -1,593 +0,0 @@
|
||||
---
|
||||
title: Chromebook migration guide
|
||||
description: Learn how to migrate a Google Chromebook-based learning environment to a Windows 10-based learning environment.
|
||||
ms.topic: how-to
|
||||
ms.date: 08/10/2022
|
||||
appliesto:
|
||||
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 10</a>
|
||||
---
|
||||
|
||||
# Chromebook migration guide
|
||||
|
||||
In this guide, you'll learn how to migrate a Google Chromebook-based learning environment to a Windows 10-based learning environment. You'll learn how to perform the necessary planning steps, including Windows device deployment, migration of user and device settings, app migration or replacement, and cloud storage migration. You'll then learn the best method to perform the migration by using automated deployment and migration tools.
|
||||
|
||||
## <a href="" id="plan-migration"></a>Plan Chromebook migration
|
||||
|
||||
|
||||
Before you begin to migrate Chromebook devices, plan your migration. As with most projects, there can be an urge to immediately start doing before planning. When you plan your Chromebook migration before you perform the migration, you can save countless hours of frustration and mistakes during the migration process.
|
||||
|
||||
In the planning portion of this guide, you'll identify all the decisions that you need to make and how to make each decision. At the end of the planning section, you'll have a list of information you need to collect and what you need to do with the information. You'll be ready to perform your Chromebook migration.
|
||||
|
||||
## <a href="" id="plan-app-migrate-replace"></a>Plan for app migration or replacement
|
||||
|
||||
|
||||
App migration or replacement is an essential part of your Chromebook migration. In this section, you'll plan how you'll migrate or replace Chromebook (Chrome OS) apps that are currently in use with the same or equivalent Windows apps. At the end of this section, you'll have a list of the active Chrome OS apps and the Windows app counterparts.
|
||||
|
||||
**Identify the apps currently in use on Chromebook devices**
|
||||
|
||||
Before you can do any analysis or make decisions about which apps to migrate or replace, you need to identify which apps are currently in use on the Chromebook devices. You'll create a list of apps that are currently in use (also called an app portfolio).
|
||||
|
||||
> [!NOTE]
|
||||
> The majority of Chromebook apps are web apps. For these apps you need to first perform Microsoft Edge compatibility testing and then publish the web app URL to the Windows users. For more information, see the [Perform app compatibility testing for web apps](#perform-testing-webapps) section.
|
||||
|
||||
|
||||
|
||||
You can divide the apps into the following categories:
|
||||
|
||||
- **Apps installed and managed by the institution.** These apps are typically managed in the Apps section in the Google Admin Console. You can record the list of these apps in your app portfolio.
|
||||
|
||||
- **Apps installed by faculty or students.** Faculty or students might have installed these apps as a part of a classroom curriculum. Obtain the list of these apps from faculty or students. Ensure you only record apps that are legitimately used as a part of classroom curriculum (and not for personal entertainment or use).
|
||||
|
||||
Record the following information about each app in your app portfolio:
|
||||
|
||||
- App name
|
||||
|
||||
- App type (such as offline app, online app, web app, and so on)
|
||||
|
||||
- App publisher or developer
|
||||
|
||||
- App version currently in use
|
||||
|
||||
- App priority (how necessary is the app to the day-to-day process of the institution or a classroom? Rank as high, medium, or low)
|
||||
|
||||
Throughout the entire app migration or replacement process, focus on the higher priority apps. Focus on lower priority apps only after you've determined what you'll do with the higher priority apps.
|
||||
|
||||
### <a href="" id="select-googleapps"></a>
|
||||
|
||||
**Select Google Apps replacements**
|
||||
|
||||
Table 1 lists the Windows device app replacements for the common Google Apps on Chromebook devices. If your users rely on any of these Google Apps, use the corresponding app on the Windows device. Use the information in Table 1 to select the Google App replacement on a Windows device.
|
||||
|
||||
Table 1. Google App replacements
|
||||
|
||||
| If you use this Google app on a Chromebook | Use this app on a Windows device |
|
||||
|--------------------------------------------|--------------------------------------|
|
||||
| Google Docs | Word 2016 or Word for the web |
|
||||
| Google Sheets | Excel 2016 or Excel for the web |
|
||||
| Google Slides | PowerPoint 2016 or PowerPoint for the web |
|
||||
| Google Apps Gmail | Outlook 2016 or Outlook Web App |
|
||||
| Google Hangouts | Microsoft Skype for Business |
|
||||
| Chrome | Microsoft Edge |
|
||||
| Google Drive | Microsoft OneDrive for Business |
|
||||
|
||||
|
||||
|
||||
It may be that you'll decide to replace Google Apps after you deploy Windows devices. For more information on making this decision, see the [Select cloud services migration strategy](#select-cs-migrationstrat) section of this guide.
|
||||
|
||||
**Find the same or similar apps in the Microsoft Store**
|
||||
|
||||
In many instances, software vendors will create a version of their app for multiple platforms. You can search the Microsoft Store to find the same or similar apps to any apps not identified in the [Select Google Apps replacements](#select-googleapps) section.
|
||||
|
||||
In other instances, the offline app doesn't have a version written for the Microsoft Store or isn't a web app. In these cases, look for an app that provides similar functions. For example, you might have a graphing calculator offline Android app published on the Chrome OS, but the software publisher doesn't have a version for Windows devices. Search the Microsoft Store for a graphing calculator app that provides similar features and functionality. Use that Microsoft Store app as a replacement for the graphing calculator offline Android app published on the Chrome OS.
|
||||
|
||||
Record the Windows app that replaces the Chromebook app in your app portfolio.
|
||||
|
||||
### <a href="" id="perform-testing-webapps"></a>
|
||||
|
||||
**Perform app compatibility testing for web apps**
|
||||
|
||||
Most of the Chromebook apps are web apps. Because you can't run native offline Chromebook apps on a Windows device, there's no reason to perform app compatibility testing for offline Chromebook apps. However, you may have many web apps that will run on both platforms.
|
||||
|
||||
Ensure that you test these web apps in Microsoft Edge. Record the level of compatibility for each web app in Microsoft Edge in your app portfolio.
|
||||
|
||||
## <a href="" id="plan-migrate-user-device-settings"></a>Plan for migration of user and device settings
|
||||
|
||||
|
||||
Some institutions have configured the Chromebook devices to make the devices easier to use by using the Google Chrome Admin Console. You've also probably configured the Chromebook devices to help ensure the user data access and ensure that the devices themselves are secure by using the Google Chrome Admin Console.
|
||||
|
||||
However, in addition to your centralized configuration in the Google Admin Console, Chromebook users have probably customized their device. In some instances, users may have changed the web content that is displayed when the Chrome browser starts. Or they may have bookmarked websites for future reference. Or users may have installed apps for use in the classroom.
|
||||
|
||||
In this section, you'll identify the user and device configuration settings for your Chromebook users and devices. Then you'll prioritize these settings to focus on the configuration settings that are essential to your educational institution.
|
||||
|
||||
At the end of this section, you should have a list of Chromebook user and device settings that you want to migrate to Windows, and a level of priority for each setting. You may discover at the end of this section that you've few or no higher priority settings to be migrated. If so, you can skip the [Perform migration of user and device settings](#migrate-user-device-settings) section of this guide.
|
||||
|
||||
**Identify Google Admin Console settings to migrate**
|
||||
|
||||
You use the Google Admin Console (as shown in Figure 1) to manage user and device settings. These settings are applied to all the Chromebook devices in your institution that are enrolled in the Google Admin Console. Review the user and device settings in the Google Admin Console and determine which settings are appropriate for your Windows devices.
|
||||
|
||||

|
||||
|
||||
Figure 1. Google Admin Console
|
||||
|
||||
Table 2 lists the settings in the Device Management node in the Google Admin Console. Review the settings and determine which settings you'll migrate to Windows.
|
||||
|
||||
Table 2. Settings in the Device Management node in the Google Admin Console
|
||||
|
||||
|Section |Settings |
|
||||
|---------|---------|
|
||||
|Network | <p>These settings configure the network connections for Chromebook devices and include the following settings categories:<ul></p><li> **Wi-Fi.** Configures the Wi-Fi connections that are available. The Windows devices will need these configuration settings to connect to the same Wi-Fi networks.</p></li> <li>**Ethernet.** Configures authentication for secured, wired Ethernet connections (802.1x). The Windows devices will need these configuration settings to connect to the network.</p><li>**VPN.** Specifies the VPN network connections used by devices when not directly connected to your intranet. The Windows devices will need the same VPN network connections for users to remotely connect to your intranet.</p><li>**Certificates.** Contains the certificates used for network authentication. The Windows devices will need these certificates to connect to the network.</p> |
|
||||
|Mobile |These settings configure and manage companion devices (such as smartphones or tablets) that are used in conjunction with the Chromebook devices and include the following settings categories:<ul> <li>**Device management settings.** Configures settings for mobile (companion) devices, such as device synchronization, password settings, auditing, enable remote wipe, and other settings. Record these settings so that you can ensure the same settings are applied when the devices are being managed by Microsoft Intune or another mobile device management (MDM) provider.<li>**Device activation.** Contains a list of mobile (companion) devices that need to be approved for management by using the Google Admin Console. Approve or block any devices in this list so that the list of managed devices accurately reflects active managed devices.<li>**Managed devices.** Performs management tasks on mobile (companion) devices that are managed by the Google Admin Console. Record the list of companion devices on this page so that you can ensure the same devices are managed by Intune or another MDM provider.<li> **Set Up Apple Push Certificate.** Configures the certificate that is essentially the digital signature that lets the Google Admin Console manage iOS devices. You'll need this certificate if you plan to manage iOS devices by using Intune or another MDM provider. <li>**Set Up Android for Work.** Authorizes the Google Admin Console to be the MDM provider for Android devices by providing an Enterprise Mobility Management (EMM) token. You'll need this token if you plan to manage Android devices by using another MDM provider. |
|
||||
|Chrome management |These settings configure and manage companion devices (such as smartphones or tablets) that are used in conjunction with the Chromebook devices and include the following settings categories:<ul> <li>**User settings.** Configures user-based settings for the Chrome browser and Chromebook devices. Most of these Chromebook user-based settings can be mapped to a corresponding setting in Windows. Record the settings and then map them to settings in Group Policy or Intune.<li>**Public session settings.** Configures Public Sessions for Chrome devices that are used as kiosks, loaner devices, shared computers, or for any other work or school-related purpose for which users don't need to sign in with their credentials. You can configure Windows devices similarly by using Assigned Access. Record the settings and apps that are available in Public Sessions so that you can provide similar configuration in Assigned Access.<li> **Device settings.** Configures device-based settings for the Chrome browser and Chromebook devices. You can map most of these Chromebook device-based settings to a corresponding setting in Windows. Record the settings and then map them to settings in Group Policy or Intune.<li>**Devices.** Manages Chrome device management licenses. The number of licenses recorded here should correspond to the number of licenses you'll need for your new management system, such as Intune. Record the number of licenses and use those to determine how many licenses you'll need to manage your Windows devices <li>**App Management.** Provides configuration settings for Chrome apps. Record the settings for any apps that you've identified that will run on Windows devices. |
|
||||
|
||||
Table 3 lists the settings in the Security node in the Google Admin Console. Review the settings and determine which settings you'll migrate to Windows.
|
||||
|
||||
Table 3. Settings in the Security node in the Google Admin Console
|
||||
|
||||
|Section|Settings|
|
||||
|--- |--- |
|
||||
|Basic settings|These settings configure password management and whether or not two-factor authentication (2FA) is configured. You can set the minimum password length, the maximum password length, if non-admin users can recover their own passwords, and enable 2FA.<br> Record these settings and use them to help configure your on-premises Active Directory or Azure Active Directory (Azure AD) to mirror the current behavior of your Chromebook environment.|
|
||||
|Password monitoring|This section is used to monitor the strength of user passwords. You don’t need to migrate any settings in this section.|
|
||||
|API reference|This section is used to enable access to various Google Apps Administrative APIs. You don’t need to migrate any settings in this section.|
|
||||
|Set up single sign-on (SSO)|This section is used to configure SSO for Google web-based apps (such as Google Apps Gmail or Google Apps Calendar). While you don’t need to migrate any settings in this section, you probably will want to configure Azure Active Directory synchronization to replace Google-based SSO.|
|
||||
|Advanced settings|This section is used to configure administrative access to user data and to configure the Google Secure Data Connector (which allows Google Apps to access data on your local network). You don’t need to migrate any settings in this section.|
|
||||
|
||||
**Identify locally configured settings to migrate**
|
||||
|
||||
In addition to the settings configured in the Google Admin Console, users may have locally configured their devices based on their own personal preferences (as shown in Figure 2). Table 4 lists the Chromebook user and device settings that you can locally configure. Review the settings and determine which settings you'll migrate to Windows. Some of the settings listed in Table 4 can only be seen when you click the **Show advanced settings** link (as shown in Figure 2).
|
||||
|
||||

|
||||
|
||||
Figure 2. Locally configured settings on Chromebook
|
||||
|
||||
Table 4. Locally configured settings
|
||||
|
||||
| Section | Settings |
|
||||
|------------------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
|
||||
| Internet connections | These settings configure the Internet connection for the devices, such as Wi-Fi and VPN connections. Record the network connection currently in use and configure the Windows device to use the same network connection settings. |
|
||||
| Appearances | These settings affect the appearance of the desktop. Record the wallpaper image file that is used. Migrate the image file to the Windows device and configure as the user’s wallpaper to maintain similar user experience. |
|
||||
| Search | These settings configure which search engine is used to search for content. Record this setting so that you can use as the search engine on the Windows device. |
|
||||
| Advanced sync settings | These settings configure which user settings are synchronized with the Google cloud, such as Apps, Extensions, History, Passwords, Settings, and so on. Record these settings and configure the Windows device with the same settings if you decide to continue to use Google Apps and other cloud services after you migrate to Windows devices. |
|
||||
| Date and time | These settings configure the time zone and if 24-hour clock time should be used. Record these settings and configure the Windows device to use these settings. |
|
||||
| Privacy | These settings configure Google Chrome web browser privacy settings (such as prediction service, phishing and malware protection, spelling errors, resource pre-fetch, and so on). Record these settings and configure Microsoft Edge, Internet Explorer, or the web browser of your choice with these settings. |
|
||||
| Bluetooth | This setting configures whether or not Bluetooth is enabled on the device. Record this setting and configure the Windows device similarly. |
|
||||
| Passwords and forms | These settings configure Google Chrome web browser to enable autofill of web forms and to save web passwords. Record these settings and configure Microsoft Edge, Internet Explorer, or the web browser of your choice with these settings. |
|
||||
| Smart lock | These settings configure the Chromebook when the user’s Android phone is nearby and unlocked, which eliminates the need to type a password. You don’t need to migrate settings in this section. |
|
||||
| Web content | These settings configure how the Chrome web browser displays content (such as font size and page zoom). Record these settings and configure Microsoft Edge, Internet Explorer, or the web browser of your choice with these settings. |
|
||||
| Languages | These settings configure the language in use for the Chromebook. Record these settings and configure the Windows device to support the same language. |
|
||||
| Downloads | These settings configure the default folder for file download, if the user should be prompted where to save files, and if the Google Drive account should be disconnected. Record these settings and configure the Windows device with similar settings. |
|
||||
| HTTPS/SSL | These settings configure client-side certificates that are used to authenticate the device. Depending on the services or apps that use these certificates, you may need to export and then migrate these certificates to the Windows device. Contact the service or app provider to determine if you can use the existing certificate or if a new certificate needs to be issued. Record these settings and migrate the certificate to the Windows device or enroll for a new certificate as required by the service or app. |
|
||||
| Google Cloud Print | These settings configure the printers that are available to the user. Record the list of printers available to the user and configure the Windows device to have the same printers available. Ensure that the user-friendly printer names in Windows are the same as for the Chromebook device. For example, if the Chromebook device has a printer named “Laser Printer in Registrar’s Office”, use that same name in Windows. |
|
||||
| On startup | These settings configure which web pages are opened when the Chrome web browser starts. Record these settings and configure Microsoft Edge, Internet Explorer, or the web browser of your choice with these settings. |
|
||||
| Accessibility | These settings configure the Chromebook ease of use (such as display of large mouse cursor, use of high contrast mode, enablement of the screen magnifier, and so on). Record these settings and configure the Windows device with similar settings. |
|
||||
| Powerwash | This action removes all user accounts and resets the Chromebook device back to factory settings. You don’t have to migrate any settings in this section. |
|
||||
| Reset settings | This action retains all user accounts, but restores all settings back to their default values. You don’t have to migrate any settings in this section. |
|
||||
|
||||
|
||||
|
||||
Determine how many users have similar settings and then consider managing those settings centrally. For example, a large number of users may have many of the same Chrome web browser settings. You can centrally manage these settings in Windows after migration.
|
||||
|
||||
Also, as a part of this planning process, consider settings that may not be currently managed centrally, but should be managed centrally. Record the settings that are currently being locally managed, but you want to manage centrally after the migration.
|
||||
|
||||
**Prioritize settings to migrate**
|
||||
|
||||
After you've collected all the Chromebook user, app, and device settings that you want to migrate, you need to prioritize each setting. Evaluate each setting and assign a priority to the setting based on the levels of high, medium, and low.
|
||||
|
||||
Assign the setting-migration priority based on how critical the setting is to the faculty performing their day-to-day tasks and how the setting affects the curriculum in the classrooms. Focus on the migration of higher priority settings and put less effort into the migration of lower priority settings. There may be some settings that aren't necessary at all and can be dropped from your list of settings entirely. Record the setting priority in the list of settings you plan to migrate.
|
||||
|
||||
## <a href="" id="plan-email-migrate"></a>Plan for email migration
|
||||
|
||||
|
||||
Many of your users may be using Google Apps Gmail to manage their email, calendars, and contacts. You need to create the list of users you'll migrate and the best time to perform the migration.
|
||||
|
||||
Office 365 supports automated migration from Google Apps Gmail to Office 365. For more information, see [Migrate Google Apps mailboxes to Office 365](/Exchange/mailbox-migration/migrating-imap-mailboxes/migrate-g-suite-mailboxes).
|
||||
|
||||
**Identify the list of user mailboxes to migrate**
|
||||
|
||||
With regard to creating the list of users you'll migrate, it might seem that the answer “all the users” might be the best one. However, depending on the time you select for migration, only a subset of the users may need to be migrated. For example, you may not persist student email accounts between semesters or between academic years. In this case, you would only need to migrate faculty and staff.
|
||||
|
||||
Also, when you perform a migration, it's a great time to verify that all user mailboxes are active. In many environments there are a significant number of mailboxes that were provisioned for users that are no longer a part of the institution (such as interns or student assistants). You can eliminate these users from your list of user mailboxes to migrate.
|
||||
|
||||
Create your list of user mailboxes to migrate in Excel 2016 based on the format described in step 7 in [Create a list of Gmail mailboxes to migrate](/Exchange/mailbox-migration/migrating-imap-mailboxes/migrate-g-suite-mailboxes). If you follow this format, you can use the Microsoft Excel spreadsheet to perform the actual migration later in the process.
|
||||
|
||||
**Identify companion devices that access Google Apps Gmail**
|
||||
|
||||
In addition to Chromebook devices, users may have companion devices (smartphones, tablets, desktops, laptops, and so on) that also access the Google Apps Gmail mailbox. You'll need to identify those companion devices and identify the proper configuration for those devices to access Office 365 mailboxes.
|
||||
|
||||
After you've identified each companion device, verify the settings for the device that are used to access Office 365. You only need to test one type of each companion device. For example, if users use Android phones to access Google Apps Gmail mailboxes, configure the device to access Office 365 and then record those settings. You can publish those settings on a website or to your helpdesk staff so that users will know how to access their Office 365 mailbox.
|
||||
|
||||
In most instances, users will only need to provide in their Office 365 email account and password. However, you should verify these credentials on each type of companion device. For more information about how to configure a companion device to work with Office 365, see [Compare how different mobile devices work with Office 365](https://support.microsoft.com/office/compare-how-different-mobile-devices-work-with-office-365-bdd06229-776a-4824-947c-82425d72597b).
|
||||
|
||||
**Identify the optimal timing for the migration**
|
||||
|
||||
Typically, the best time to perform the migration is between academic years or during semester breaks. Select the time of least activity for your institution. And during that time, the optimal time to perform the migration might be during an evening or over a weekend.
|
||||
|
||||
Ensure that you communicate the time the migration will occur to your users well in advance. Also, ensure that users know how to access their Office 365 email after the migration is complete. Finally, ensure that your users know how to perform the common tasks they performed in Google Apps Gmail in Office 365 and/or Outlook 2016.
|
||||
|
||||
## <a href="" id="plan-cloud-storage-migration"></a>Plan for cloud storage migration
|
||||
|
||||
|
||||
Chromebook devices have limited local storage. So, most of your users will store data in cloud storage, such as Google Drive. You'll need to plan how to migrate your cloud storage as a part of the Chromebook migration process.
|
||||
|
||||
In this section, you'll create a list of the existing cloud services, select the Microsoft cloud services that best meet your needs, and then optimize your cloud storage services migration plan.
|
||||
|
||||
**Identify cloud storage services currently in use**
|
||||
|
||||
Typically, most Chromebook users use Google Drive for cloud storage services because your educational institution purchased other Google cloud services and Google Drive is a part of those services. However, some users may use cloud storage services from other vendors. For each member of your faculty and staff and for each student, create a list of cloud storage services that includes the following details:
|
||||
|
||||
- Name of the cloud storage service
|
||||
|
||||
- Cloud storage service vendor
|
||||
|
||||
- Associated licensing costs or fees
|
||||
|
||||
- Approximate storage currently in use per user
|
||||
|
||||
Use this information as the requirements for your cloud storage services after you migrate to Windows devices. If at the end of this discovery you determine there's no essential data being stored in cloud storage services that requires migration, then you can skip to the [Plan for cloud services migration](#plan-cloud-services) section.
|
||||
|
||||
**Optimize cloud storage services migration plan**
|
||||
|
||||
Now that you know the current cloud storage services configuration, you need to optimize your cloud storage services migration plan for Microsoft OneDrive for Business. Optimization helps ensure that your use only the cloud storage services resources that are necessary for your requirements.
|
||||
|
||||
Consider the following to help optimize your cloud storage services migration plan:
|
||||
|
||||
- **Eliminate inactive user storage.** Before you perform the cloud storage services migration, identify cloud storage that is currently allocated to inactive users. Remove this storage from your list of cloud storage to migrate.
|
||||
|
||||
- **Eliminate or archive inactive files.** Review cloud storage to identify files that are inactive (haven't been accessed for some period of time). Eliminate or archive these files so that they don't consume cloud storage.
|
||||
|
||||
- **Consolidate cloud storage services.** If multiple cloud storage services are in use, reduce the number of cloud storage services and standardize on one cloud storage service. This standardization will help reduce management complexity, support time, and typically will reduce cloud storage costs.
|
||||
|
||||
Record your optimization changes in your cloud storage services migration plan.
|
||||
|
||||
## <a href="" id="plan-cloud-services"></a>Plan for cloud services migration
|
||||
|
||||
|
||||
Many of your users may use cloud services on their Chromebook device, such as Google Apps, Google Drive, or Google Apps Gmail. You've planned for these individual cloud services in the [Plan for app migration or replacement](#plan-app-migrate-replace), [Plan for Google Apps Gmail to Office 365 migration](#plan-email-migrate), and [Plan for cloud storage migration](#plan-cloud-storage-migration) sections.
|
||||
|
||||
In this section, you'll create a combined list of these cloud services and then select the appropriate strategy to migrate these cloud services.
|
||||
|
||||
### <a href="" id="identify-cloud-services-inuse"></a>
|
||||
|
||||
**Identify cloud services currently in use**
|
||||
|
||||
You've already identified the individual cloud services that are currently in use in your educational institution in the [Plan for app migration or replacement](#plan-app-migrate-replace), [Plan for Google Apps Gmail to Office 365 migration](#plan-email-migrate), and [Plan for cloud storage migration](#plan-cloud-storage-migration) sections. Create a unified list of these cloud services and record the following about each service:
|
||||
|
||||
- Cloud service name
|
||||
|
||||
- Cloud service provider
|
||||
|
||||
- Number of users that use the cloud service
|
||||
|
||||
**Select cloud services to migrate**
|
||||
|
||||
One of the first questions you should ask after you identify the cloud services currently in use is, “Why do we need to migrate from these cloud services?” The answer to this question largely comes down to finances and features.
|
||||
|
||||
Here's a list of reasons that describe why you might want to migrate from an existing cloud service to Microsoft cloud services:
|
||||
|
||||
- **Better integration with Office 365.** If your long-term strategy is to migrate to Office 365 apps (such as Word 2016 or Excel 2016), then a migration to Microsoft cloud services will provide better integration with these apps. The use of existing cloud services may not be as intuitive for users. For example, Office 365 apps will integrate better with OneDrive for Business compared to Google Drive.
|
||||
|
||||
- **Online apps offer better document compatibility.** Microsoft Office apps (such as Word and Excel for the web) provide the highest level of compatibility with Microsoft Office documents. The Office apps allow you to open and edit documents directly from SharePoint or OneDrive for Business. Users can access the Office app from any device with Internet connectivity.
|
||||
|
||||
- **Reduce licensing costs.** If you pay for Office 365 licenses, then Office 365 apps and cloud storage are included in those licenses. Although you could keep existing cloud services, you probably would pay more to keep those services.
|
||||
|
||||
- **Improve storage capacity and cross-platform features.** Microsoft cloud services provide competitive storage capacity and provide more Windows-centric features than other cloud services providers. While the Microsoft cloud services user experience is highly optimized for Windows devices, Microsoft cloud services are also highly optimized for companion devices (such as iOS or Android devices).
|
||||
|
||||
Review the list of existing cloud services that you created in the [Identify cloud services currently in use](#identify-cloud-services-inuse) section and identify the cloud services that you want to migrate to Microsoft cloud services. If you determine at the end of this task that there are no cloud services to be migrated, then skip to the [Plan for Windows device deployment](#plan-windevice-deploy) section. Also, skip the [Perform cloud services migration](#perform-cloud-services-migration) section later in this guide.
|
||||
|
||||
**Prioritize cloud services**
|
||||
|
||||
After you've created your aggregated list of cloud services currently in use by Chromebook users, prioritize each cloud service. Evaluate each cloud service and assign a priority based on the levels of high, medium, and low.
|
||||
|
||||
Assign the priority based on how critical the cloud service is to the faculty and staff performing their day-to-day tasks and how the cloud service affects the curriculum in the classrooms. Also, make cloud services that are causing pain for the users a higher priority. For example, if users experience outages with a specific cloud service, then make migration of that cloud service a higher priority.
|
||||
|
||||
Focus on the migration of higher priority cloud services first and put less effort into the migration of lower priority cloud services. There may be some cloud services that are unnecessary and you can remove them from your list of cloud services to migrate entirely. Record the cloud service migration priority in the list of cloud services you plan to migrate.
|
||||
|
||||
### <a href="" id="select-cs-migrationstrat"></a>
|
||||
|
||||
**Select cloud services migration strategy**
|
||||
|
||||
When you deploy the Windows devices, should you migrate the faculty, staff, and students to the new cloud services? Perhaps. But, in most instances you'll want to select a migration strategy that introduces many small changes over a period of time.
|
||||
|
||||
Consider the following when you create your cloud services migration strategy:
|
||||
|
||||
- **Introduce small changes.** The move from Chrome OS to Windows will be simple for most users as most will have exposure to Windows from home, friends, or family. However, users may not be as familiar with the apps or cloud services. Consider the move to Windows first, and then make other changes as time progresses.
|
||||
|
||||
- **Start off by using existing apps and cloud services.** Immediately after the migration to Windows devices, you may want to consider running the existing apps and cloud services (such Google Apps, Google Apps Gmail, and Google Drive). This option gives users a familiar method to perform their day-to-day tasks.
|
||||
|
||||
- **Resolve pain points.** If some existing apps or cloud services cause problems, you may want to migrate them sooner rather than later. In most instances, users will be happy to go through the learning curve of a new app or cloud service if it's more reliable or intuitive for them to use.
|
||||
|
||||
- **Migrate classrooms or users with common curriculum.** Migrate to Windows devices for an entire classroom or for multiple classrooms that share common curriculum. You must ensure that the necessary apps and cloud services are available for the curriculum prior to the migration of one or more classrooms.
|
||||
|
||||
- **Migrate when the fewest number of active users are affected.** Migrate your cloud services at the end of an academic year or end of a semester. This migration will ensure you've minimal impact on faculty, staff, and students. Also, a migration during this time will minimize the learning curve for users as they're probably dealing with new curriculum for the next semester. Also, you may not need to migrate student apps and data because many educational institutions don't preserve data between semesters or academic years.
|
||||
|
||||
- **Overlap existing and new cloud services.** For faculty and staff, consider overlapping the existing and new cloud services (having both services available) for one business cycle (end of semester or academic year) after migration. This overlap operation allows you to easily recover any data that might not have migrated successfully from the existing cloud services. At a minimum, overlap the user of existing and new cloud services until the user can verify the migration. The tradeoff for using this strategy is the cost of the existing cloud services. However, depending on when license renewal occurs, the cost may be minimal.
|
||||
|
||||
## <a href="" id="plan-windevice-deploy"></a>Plan for Windows device deployment
|
||||
|
||||
|
||||
You need to plan for Windows device deployment to help ensure that the devices are successfully installed and configured to replace the Chromebook devices. Even if the vendor that provides the devices pre-loads Windows 10 on them, you still will need to perform other tasks.
|
||||
|
||||
In this section, you'll select a Windows device deployment strategy; plan for Active Directory Domain Services (AD DS) and Azure AD services; plan for device, user, and app management; and plan for any necessary network infrastructure remediation.
|
||||
|
||||
### <a href="" id="select-windows-device-deploy"></a>
|
||||
|
||||
**Select a Windows device deployment strategy**
|
||||
|
||||
What decisions need to be made about Windows device deployment? You just put the device on a desk, hook up power, connect to Wi-Fi, and then let the users operate the device, right? That approach is correct, but depending on the extent of your deployment and other factors, you need to consider different deployment strategies.
|
||||
|
||||
For each classroom that has Chromebook devices, select a combination of the following device deployment strategies:
|
||||
|
||||
- **Deploy one classroom at a time.** In most cases, you'll want to perform your deployment in batches of devices and a classroom is an excellent way to batch devices. You can treat each classroom as a unit and check each classroom off your list after you've deployed the devices.
|
||||
|
||||
- **Deploy based on curriculum.** Deploy the Windows devices after you've confirmed that the curriculum is ready for the Windows devices. If you deploy Windows devices without the curriculum installed and tested, you could significantly reduce the ability for students and teachers to perform effectively in the classroom. Also, deployment based on curriculum has the advantage of letting you move from classroom to classroom quickly if multiple classrooms use the same curriculum.
|
||||
|
||||
- **Deploy side-by-side.** In some instances, you may need to have both the Chromebook and Windows devices in one or more classrooms. You can use this strategy if some of the curriculum only works on Chromebook and other parts of the curriculum works on Windows devices. This method helps prevent delays in Windows device deployment, while ensuring that students and teachers can make optimal use of technology in their curriculum.
|
||||
|
||||
- **Deploy after apps and cloud services migration.** If you deploy a Windows device without the necessary apps and cloud services to support the curriculum, this arrangement provides only a portion of your complete solution. Ensure that the apps and cloud services are tested, provisioned, and ready for use prior to the deployment of Windows devices.
|
||||
|
||||
- **Deploy after the migration of user and device settings.** Ensure that you've identified the user and device settings that you plan to migrate and that those settings are ready to be applied to the new Windows devices. For example, you would want to create Group Policy Objects (GPOs) to apply the user and device settings to Windows devices.
|
||||
|
||||
If you ensure that Windows devices closely mirror the Chromebook device configuration, you'll ease user learning curve and create a sense of familiarity. Also, when you've the settings ready to be applied to the devices, it helps ensure you'll deploy your new Windows devices in a secure configuration.
|
||||
|
||||
Record the combination of Windows device deployment strategies that you selected.
|
||||
|
||||
### <a href="" id="plan-adservices"></a>
|
||||
|
||||
**Plan for AD DS and Azure AD services**
|
||||
|
||||
The next decision you'll need to make concerns AD DS and Azure AD services. You can run AD DS on-premises, in the cloud by using Azure AD, or a combination of both (hybrid). The decision about which of these options is best is closely tied to how you'll manage your users, apps, and devices and if you'll use Office 365 and other Azure-based cloud services.
|
||||
|
||||
In the hybrid configuration, your on-premises AD DS user and group objects are synchronized with Azure AD (including passwords). The synchronization happens both directions so that changes are made in both your on-premises AD DS and Azure AD.
|
||||
|
||||
Table 5 is a decision matrix that helps you decide if you can use only on-premises AD DS, only Azure AD, or a combination of both (hybrid). If the requirements you select from the table require on-premises AD DS and Azure AD, then you should select hybrid. For example, if you plan to use Office 365 and use Group Policy for management, then you would select hybrid. However, if you plan to use Office 365 and use Intune for management, then you would select only Azure AD.
|
||||
|
||||
Table 5. Select on-premises AD DS, Azure AD, or hybrid
|
||||
|
||||
|If you plan to...|On-premises AD DS|Azure AD|Hybrid|
|
||||
|--- |--- |--- |--- |
|
||||
|Use Office 365||✔️|✔️|
|
||||
|Use Intune for management||✔️|✔️|
|
||||
|Use Microsoft Configuration Manager for management|✔️||✔️|
|
||||
|Use Group Policy for management|✔️||✔️|
|
||||
|Have devices that are domain-joined|✔️||✔️|
|
||||
|Allow faculty and students to Bring Your Own Device (BYOD) which aren't domain-joined||✔️|✔️|
|
||||
|
||||
### <a href="" id="plan-userdevapp-manage"></a>
|
||||
|
||||
**Plan device, user, and app management**
|
||||
|
||||
You may ask the question, “Why plan for device, user, and app management before you deploy the device?” The answer is that you'll only deploy the device once, but you'll manage the device throughout the remainder of the device's lifecycle.
|
||||
|
||||
Also, planning management before deployment is essential to being ready to support the devices as you deploy them. You want to have your management processes and technology in place when the first teachers, facility, or students start using their new Windows device.
|
||||
|
||||
Table 6 is a decision matrix that lists the device, user, and app management products and technologies and the features supported by each product or technology. The primary device, user, and app management products and technologies include Group Policy, Microsoft Configuration Manager, Intune, and the Microsoft Deployment Toolkit (MDT). Use this decision matrix to help you select the right combination of products and technologies for your plan.
|
||||
|
||||
Table 6. Device, user, and app management products and technologies
|
||||
|
||||
|Desired feature|Windows provisioning packages|Group Policy|Configuration Manager|Intune|MDT|Windows Software Update Services|
|
||||
|--- |--- |--- |--- |--- |--- |--- |
|
||||
|Deploy operating system images|✔️||✔️||✔️||
|
||||
|Deploy apps during operating system deployment|✔️||✔️||✔️||
|
||||
|Deploy apps after operating system deployment|✔️|✔️|✔️||||
|
||||
|Deploy software updates during operating system deployment|||✔️||✔️||
|
||||
|Deploy software updates after operating system deployment|✔️|✔️|✔️|✔️||✔️|
|
||||
|Support devices that are domain-joined|✔️|✔️|✔️|✔️|✔️||
|
||||
|Support devices that aren't domain-joined|✔️|||✔️|✔️||
|
||||
|Use on-premises resources|✔️|✔️|✔️||✔️||
|
||||
|Use cloud-based services||||✔️|||
|
||||
|
||||
You can use Configuration Manager and Intune with each other to provide features from both products and technologies. In some instances, you may need only one of these products or technologies. In other instances, you may need two or more to meet the device, user, and app management needs for your institution.
|
||||
|
||||
Record the device, user, and app management products and technologies that you selected.
|
||||
|
||||
### <a href="" id="plan-network-infra-remediation"></a>
|
||||
|
||||
**Plan network infrastructure remediation**
|
||||
|
||||
In addition to AD DS, Azure AD, and management components, there are other network infrastructure services that Windows devices need. In most instances, Windows devices have the same network infrastructure requirements as the existing Chromebook devices.
|
||||
|
||||
Examine each of the following network infrastructure technologies and services and determine if any remediation is necessary:
|
||||
|
||||
- **Domain Name System (DNS)** provides translation between a device name and its associated IP address. For Chromebook devices, public facing, Internet DNS services are the most important. For Windows devices that only access the Internet, they have the same requirements.
|
||||
|
||||
However, if you intend to communicate between Windows devices (peer-to-peer or client/server) then you'll need local DNS services. Windows devices will register their name and IP address with the local DNS services so that Windows devices can locate each other.
|
||||
|
||||
- **Dynamic Host Configuration Protocol (DHCP)** provides automatic IP configuration for devices. Your existing Chromebook devices probably use DHCP for configuration. If you plan to immediately replace the Chromebook devices with Windows devices, then you only need to release all the DHCP reservations for the Chromebook devices prior to the deployment of Windows devices.
|
||||
|
||||
If you plan to run Chromebook and Windows devices side-by-side, then you need to ensure that your DHCP service has adequate IP addresses available for both sets of devices.
|
||||
|
||||
- **Wi-Fi.** Chromebook devices are designed to connect to Wi-Fi networks. Windows devices are the same. Your existing Wi-Fi network for the Chromebook devices should be adequate for the same number of Windows devices.
|
||||
|
||||
If you plan to significantly increase the number of Windows devices or you plan to run Chromebook and Windows devices side-by-side, then you need to ensure that Wi-Fi network can support the number of devices.
|
||||
|
||||
- **Internet bandwidth.** Chromebook devices consume more Internet bandwidth (up to 700 times more) than Windows devices. This consumption behavior means that if your existing Internet bandwidth is adequate for the Chromebook devices, then the bandwidth will be more than adequate for Windows devices.
|
||||
|
||||
However, if you plan to significantly increase the number of Windows devices or you plan to run Chromebook and Windows devices side-by-side, then you need to ensure that your Internet connection can support the number of devices.
|
||||
|
||||
For more information that compares Internet bandwidth consumption for Chromebook and Windows devices, see the following resources:
|
||||
|
||||
- [Chromebook vs. Windows Notebook Network Traffic Analysis](https://www.principledtechnologies.com/Microsoft/Chromebook_PC_network_traffic_0613.pdf)
|
||||
|
||||
- [Hidden Cost of Chromebook Deployments](https://www.principledtechnologies.com/Microsoft/Windows_Chromebook_bandwidth_0514.pdf)
|
||||
|
||||
- [Microsoft Windows 8.1 Notebook vs. Chromebooks for Education](https://www.principledtechnologies.com/Microsoft/Windows_8.1_vs_Chromebooks_in_Education_0715.pdf)
|
||||
|
||||
- **Power.** Although not specifically a network infrastructure, you need to ensure your classrooms have adequate power. Chromebook and Windows devices should consume similar amounts of power. This condition means that your existing power outlets should support the same number of Windows devices.
|
||||
|
||||
If you plan to significantly increase the number of Windows devices or you plan to run Chromebook and Windows devices side-by-side, you need to ensure that the power outlets, power strips, and other power management components can support the number of devices.
|
||||
|
||||
At the end of this process, you may determine that no network infrastructure remediation is necessary. If so, you can skip the [Perform network infrastructure remediation](#network-infra-remediation) section of this guide.
|
||||
|
||||
## Perform Chromebook migration
|
||||
|
||||
|
||||
Thus far, planning has been the primary focus. Believe it or not most of the work is now done. The rest of the Chromebook migration is just the implementation of the plan you've created.
|
||||
|
||||
In this section, you'll perform the necessary steps for the Chromebook device migration. You'll perform the migration based on the planning decision that you made in the [Plan Chromebook migration](#plan-migration) section earlier in this guide.
|
||||
|
||||
You must perform some of the steps in this section in a specific sequence. Each section has guidance about when to perform a step. You can perform other steps before, during, or after the migration. Again, each section will tell you if the sequence is important.
|
||||
|
||||
## <a href="" id="network-infra-remediation"></a>Perform network infrastructure remediation
|
||||
|
||||
|
||||
The first migration task is to perform any network infrastructure remediation. In the [Plan network infrastructure remediation](#plan-network-infra-remediation) section, you determined the network infrastructure remediation (if any) that you needed to perform.
|
||||
|
||||
It's important that you perform any network infrastructure remediation first because the remaining migration steps are dependent on the network infrastructure. Use the following Microsoft network infrastructure products and technologies:
|
||||
|
||||
- [Core network guidance for Windows Server](/windows-server/networking/core-network-guide/core-network-guide-windows-server)
|
||||
- [DHCP overview](/windows-server/networking/technologies/dhcp/dhcp-top)
|
||||
- [DNS overview](/windows-server/networking/dns/dns-top)
|
||||
|
||||
If you use network infrastructure products and technologies from other vendors, refer to the vendor documentation on how to perform the necessary remediation. If you determined that no remediation is necessary, you can skip this section.
|
||||
|
||||
## Perform AD DS and Azure AD services deployment or remediation
|
||||
|
||||
|
||||
It's important that you perform AD DS and Azure AD services deployment or remediation right after you finish network infrastructure remediation. Many of the remaining migration steps are dependent on you having your identity system (AD DS or Azure AD) in place and up to necessary expectations.
|
||||
|
||||
In the [Plan for Active Directory services](#plan-adservices) section, you determined the AD DS and/or Azure AD deployment or remediation (if any) that needed to be performed. Use the following resources to deploy or remediate on-premises AD DS, Azure AD, or both:
|
||||
|
||||
- [Core network guidance for Windows Server](/windows-server/networking/core-network-guide/core-network-guide-windows-server)
|
||||
- [AD DS overview](/windows-server/identity/ad-ds/active-directory-domain-services)
|
||||
- [Azure AD documentation](/azure/active-directory/)
|
||||
- [Azure AD Premium](https://azure.microsoft.com/pricing/details/active-directory/)
|
||||
- [Safely virtualizing Active Directory Domain Services (AD DS)](/windows-server/identity/ad-ds/introduction-to-active-directory-domain-services-ad-ds-virtualization-level-100)|
|
||||
|
||||
If you decided not to migrate to AD DS or Azure AD as a part of the migration, or if you determined that no remediation is necessary, you can skip this section. If you use identity products and technologies from another vendor, refer to the vendor documentation on how to perform the necessary steps.
|
||||
|
||||
## Prepare device, user, and app management systems
|
||||
|
||||
In the [Plan device, user, and app management](#plan-userdevapp-manage) section of this guide, you selected the products and technologies that you'll use to manage devices, users, and apps on Windows devices. You need to prepare your management systems prior to Windows 10 device deployment. You'll use these management systems to manage the user and device settings that you selected to migrate in the [Plan for migration of user and device settings](#plan-migrate-user-device-settings) section. You need to prepare these systems prior to the migration of user and device settings.
|
||||
|
||||
Use the following Microsoft management systems and the deployment resources to prepare (deploy or remediate) these management systems.
|
||||
|
||||
- [Microsoft Intune](/mem/intune/fundamentals/setup-steps)
|
||||
|
||||
- [Windows Autopilot](/mem/autopilot/windows-autopilot)
|
||||
|
||||
- Microsoft Configuration Manager [core infrastructure documentation](/mem/configmgr/core/)
|
||||
|
||||
- Provisioning packages:
|
||||
|
||||
- [Build and apply a provisioning package](/windows/configuration/provisioning-packages/provisioning-create-package)
|
||||
- [Windows Imaging and Configuration Designer](/windows/configuration/provisioning-packages/provisioning-install-icd)
|
||||
- [Step-By-Step: Building Windows 10 Provisioning Packages](/archive/blogs/canitpro/step-by-step-building-windows-10-provisioning-packages)
|
||||
|
||||
- Group policy
|
||||
|
||||
- [Core Network Companion Guide: Group Policy Deployment](/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/jj899807(v=ws.11))
|
||||
- [Deploying Group Policy](/previous-versions/windows/it-pro/windows-server-2003/cc737330(v=ws.10))
|
||||
|
||||
If you determined that no new management system or no remediation of existing systems is necessary, you can skip this section. If you use a management system from another vendor, refer to the vendor documentation on how to perform the necessary steps.
|
||||
|
||||
## <a href="" id="perform-app-migration-or-replacement-"></a>Perform app migration or replacement
|
||||
|
||||
|
||||
In the [Plan for app migration or replacement](#plan-app-migrate-replace) section, you identified the apps currently in use on Chromebook devices and selected the Windows apps that will replace the Chromebook apps. You also performed app compatibility testing for web apps to ensure that web apps on the Chromebook devices would run on Microsoft Edge and Internet Explorer.
|
||||
|
||||
In this step, you need to configure your management system to deploy the apps to the appropriate Windows users and devices. Use the following Microsoft management systems and the app deployment resources to configure these management systems to deploy the apps that you selected in the [Plan for app migration or replacement](#plan-app-migrate-replace) section of this guide.
|
||||
|
||||
- [Manage apps in Microsoft Intune](/mem/intune/apps/)
|
||||
- [App management in Configuration Manager](/mem/configmgr/apps/)
|
||||
- Group policy
|
||||
- [Edit an AppLocker policy](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/ee791894(v=ws.10))
|
||||
- [Group policy software deployment background](/previous-versions/windows/it-pro/windows-server-2003/cc739305(v=ws.10))
|
||||
- [Assigning and publishing software](/previous-versions/windows/it-pro/windows-server-2003/cc783635(v=ws.10))
|
||||
|
||||
If you determined that no deployment of apps is necessary, you can skip this section. If you use a management system from another vendor, refer to the vendor documentation on how to perform the necessary steps.
|
||||
|
||||
## <a href="" id="migrate-user-device-settings"></a>Perform migration of user and device settings
|
||||
|
||||
In the [Plan for migration of user and device settings](#plan-migrate-user-device-settings) section, you determined the user and device settings that you want to migrate. You selected settings that are configured in the Google Admin Console and locally on the Chromebook device.
|
||||
|
||||
Perform the user and device setting migration by using the following steps:
|
||||
|
||||
1. From the list of institution-wide settings that you created in the [Plan for migration of user and device settings](#plan-migrate-user-device-settings) section, configure as many as possible in your management system (such as Group Policy, Configuration Manager, or Intune).
|
||||
|
||||
2. From the list of device-specific settings that you created in the [Plan for migration of user and device settings](#plan-migrate-user-device-settings) section, configure device-specific setting for higher priority settings.
|
||||
|
||||
3. From the list of user-specific settings that you created in the [Plan for migration of user and device settings](#plan-migrate-user-device-settings) section, configure user-specific setting for higher priority settings.
|
||||
|
||||
4. Verify that all higher-priority user and device settings have been configured in your management system.
|
||||
|
||||
If you do no want to migrate any user or device settings from the Chromebook devices to the Windows devices, you can skip this section.
|
||||
|
||||
## Perform email migration
|
||||
|
||||
|
||||
In the [Plan for email migration](#plan-email-migrate) section, you identified the user mailboxes to migrate, identified the companion devices that access Google Apps Gmail, and identified the optimal timing for migration. You can perform this migration before or after you deploy the Windows devices.
|
||||
|
||||
Office 365 supports automated migration from Google Apps Gmail to Office 365. For more information on how to automate the migration from Google Apps Gmail to Office 365, see [Migrate Google Apps mailboxes to Office 365](/Exchange/mailbox-migration/migrating-imap-mailboxes/migrate-g-suite-mailboxes).
|
||||
|
||||
Alternatively, if you want to migrate to Office 365 from:
|
||||
|
||||
- **On-premises Microsoft Exchange Server.** Use the following resources to migrate to Office 365 from an on-premises Microsoft Exchange Server:
|
||||
|
||||
- [What you need to know about a cutover email migration in Exchange Online](/exchange/mailbox-migration/what-to-know-about-a-cutover-migration)
|
||||
|
||||
- [Step-By-Step: Migration of Exchange 2003 Server to Office 365](/archive/blogs/canitpro/step-by-step-migration-of-exchange-2003-server-to-office-365)
|
||||
|
||||
- [Step-By-Step: Migrating from Exchange 2007 to Office 365](/archive/blogs/canitpro/step-by-step-migrating-from-exchange-2007-to-office-365)
|
||||
|
||||
- **Another on-premises or cloud-based email service.** Follow the guidance from that vendor.
|
||||
|
||||
## Perform cloud storage migration
|
||||
|
||||
In the [Plan for cloud storage migration](#plan-cloud-storage-migration) section, you identified the cloud storage services currently in use, selected the Microsoft cloud storage services that you'll use, and optimized your cloud storage services migration plan. You can perform the cloud storage migration before or after you deploy the Windows devices.
|
||||
|
||||
Manually migrate the cloud storage migration by using the following steps:
|
||||
|
||||
1. Install both Google Drive app and OneDrive for Business or OneDrive app on a device.
|
||||
|
||||
2. Sign in as the user in the Google Drive app.
|
||||
|
||||
3. Sign in as the user in the OneDrive for Business or OneDrive app.
|
||||
|
||||
4. Copy the data from the Google Drive storage to the OneDrive for Business or OneDrive storage.
|
||||
|
||||
5. Optionally uninstall the Google Drive app.
|
||||
|
||||
There are also many software vendors who provide software that helps automate the migration from Google Drive to OneDrive for Business, Office 365 SharePoint, or OneDrive. For more information about these automated migration tools, contact the vendors.
|
||||
|
||||
## Perform cloud services migration
|
||||
|
||||
|
||||
In the [Plan for cloud services migration](#plan-cloud-services)section, you identified the cloud services currently in use, selected the cloud services that you want to migrate, prioritized the cloud services to migrate, and then selected the cloud services migration strategy. You can perform the cloud services migration before or after you deploy the Windows devices.
|
||||
|
||||
Migrate the cloud services that you currently use to the Microsoft cloud services that you selected. For example, you could migrate from a collaboration website to Office 365 SharePoint. Perform the cloud services migration based on the existing cloud services and the Microsoft cloud services that you selected.
|
||||
|
||||
There are also many software vendors who provide software that helps automate the migration from other cloud services to Microsoft cloud services. For more information about these automated migration tools, contact the vendors.
|
||||
|
||||
## Perform Windows device deployment
|
||||
|
||||
|
||||
In the [Select a Windows device deployment strategy](#select-windows-device-deploy) section, you selected how you wanted to deploy Windows 10 devices. The other migration task that you designed in the [Plan for Windows device deployment](#plan-windevice-deploy) section have already been performed. Now it's time to deploy the actual devices.
|
||||
|
||||
For example, if you selected to deploy Windows devices by each classroom, start with the first classroom and then proceed through all of the classrooms until you’ve deployed all Windows devices.
|
||||
|
||||
In some instances, you may receive the devices with Windows 10 already deployed, and want to use provisioning packages. In other cases, you may have a custom Windows 10 image that you want to deploy to the devices by using Configuration Manager or MDT. For more information on how to deploy Windows 10 images to the devices, see the following resources:
|
||||
|
||||
- [OS deployment in Configuration Manager](/mem/configmgr/osd/)
|
||||
|
||||
- [Windows Imaging and Configuration Designer](/windows/configuration/provisioning-packages/provisioning-install-icd)
|
||||
|
||||
- [Build and apply a provisioning package](/windows/configuration/provisioning-packages/provisioning-create-package)
|
||||
|
||||
- [Step-By-Step: Installing Windows 8.1 From A USB Key](/archive/blogs/canitpro/step-by-step-installing-windows-8-1-from-a-usb-key)
|
||||
|
||||
In addition to the Windows 10 image deployment, you may need to perform the following tasks as a part of device deployment:
|
||||
|
||||
- Enroll the device with your management system.
|
||||
|
||||
- Ensure that Windows Defender is enabled and configured to receive updates.
|
||||
|
||||
- Ensure that Windows Update is enabled and configured to receive updates.
|
||||
|
||||
- Deploy any apps that you want the user to immediately be able to access when they start the device (such as Word 2016 or Excel 2016).
|
||||
|
||||
After you complete these steps, your management system should take over the day-to-day maintenance tasks for the Windows 10 devices. Verify that the user and device settings migrated correctly as you deploy each batch of Windows 10 devices. Continue this process until you deploy all Windows 10 devices.
|
||||
|
||||
## Related topics
|
||||
|
||||
[Try it out: Windows 10 deployment (for education)](../index.yml)
|
||||
|
||||
[Try it out: Windows 10 in the classroom](../index.yml)
|
@ -1,60 +1,62 @@
|
||||
---
|
||||
title: Configure federation between Google Workspace and Azure AD
|
||||
description: Configuration of a federated trust between Google Workspace and Azure AD, with Google Workspace acting as an identity provider (IdP) for Azure AD.
|
||||
title: Configure federation between Google Workspace and Microsoft Entra ID
|
||||
description: Configuration of a federated trust between Google Workspace and Microsoft Entra ID, with Google Workspace acting as an identity provider (IdP) for Microsoft Entra ID.
|
||||
ms.date: 09/11/2023
|
||||
ms.topic: how-to
|
||||
appliesto:
|
||||
---
|
||||
|
||||
# Configure federation between Google Workspace and Azure AD
|
||||
# Configure federation between Google Workspace and Microsoft Entra ID
|
||||
|
||||
This article describes the steps required to configure Google Workspace as an identity provider (IdP) for Azure AD.\
|
||||
Once configured, users will be able to sign in to Azure AD with their Google Workspace credentials.
|
||||
Once configured, users will be able to sign in to Microsoft Entra ID with their Google Workspace credentials.
|
||||
|
||||
## Prerequisites
|
||||
|
||||
To configure Google Workspace as an IdP for Azure AD, the following prerequisites must be met:
|
||||
To configure Google Workspace as an IdP for Microsoft Entra ID, the following prerequisites must be met:
|
||||
|
||||
1. An Azure AD tenant, with one or multiple custom DNS domains (that is, domains that aren't in the format \**.onmicrosoft.com*)
|
||||
- If the federated domain hasn't yet been added to Azure AD, you must have access to the DNS domain to create a DNS record. This is required to verify the ownership of the DNS namespace
|
||||
- Learn how to [Add your custom domain name using the Azure Active Directory portal](/azure/active-directory/fundamentals/add-custom-domain)
|
||||
1. Access to Azure AD with an account with the *Global Administrator* role
|
||||
1. A Microsoft Entra tenant, with one or multiple custom DNS domains (that is, domains that aren't in the format \**.onmicrosoft.com*)
|
||||
- If the federated domain hasn't yet been added to Microsoft Entra ID, you must have access to the DNS domain to create a DNS record. This is required to verify the ownership of the DNS namespace
|
||||
- Learn how to [Add your custom domain name using the Microsoft Entra admin center](/azure/active-directory/fundamentals/add-custom-domain)
|
||||
1. Access to Microsoft Entra ID with an account with the *Global Administrator* role
|
||||
1. Access to Google Workspace with an account with *super admin* privileges
|
||||
|
||||
To test federation, the following prerequisites must be met:
|
||||
|
||||
1. A Google Workspace environment, with users already created
|
||||
> [!IMPORTANT]
|
||||
> Users require an email address defined in Google Workspace, which is used to match the users in Azure AD.
|
||||
> For more information about identity matching, see [Identity matching in Azure AD](federated-sign-in.md#identity-matching-in-azure-ad).
|
||||
1. Individual Azure AD accounts already created: each Google Workspace user will require a matching account defined in Azure AD. These accounts are commonly created through automated solutions, for example:
|
||||
> Users require an email address defined in Google Workspace, which is used to match the users in Microsoft Entra ID.
|
||||
> For more information about identity matching, see [Identity matching in Microsoft Entra ID](federated-sign-in.md#identity-matching-in-azure-ad).
|
||||
1. Individual Microsoft Entra accounts already created: each Google Workspace user will require a matching account defined in Microsoft Entra ID. These accounts are commonly created through automated solutions, for example:
|
||||
- School Data Sync (SDS)
|
||||
- Azure AD Connect sync for environment with on-premises AD DS
|
||||
- Microsoft Entra Connect Sync for environment with on-premises AD DS
|
||||
- PowerShell scripts that call the Microsoft Graph API
|
||||
- Provisioning tools offered by the IdP - this capability is offered by Google Workspace through [auto-provisioning](https://support.google.com/a/answer/7365072)
|
||||
|
||||
## Configure Google Workspace as an IdP for Azure AD
|
||||
<a name='configure-google-workspace-as-an-idp-for-azure-ad'></a>
|
||||
|
||||
## Configure Google Workspace as an IdP for Microsoft Entra ID
|
||||
|
||||
1. Sign in to the [Google Workspace Admin Console](https://admin.google.com) with an account with *super admin* privileges
|
||||
1. Select **Apps > Web and mobile apps**
|
||||
1. Select **Add app > Search for apps** and search for *microsoft*
|
||||
1. In the search results page, hover over the *Microsoft Office 365 - Web (SAML)* app and select **Select**
|
||||
:::image type="content" source="images/google/google-admin-search-app.png" alt-text="Screenshot showing Google Workspace and the search button for Microsoft Office 365 SAML app.":::
|
||||
1. On the **Google Identity Provider details** page, select **Download Metadata** and take note of the location where the **IdP metadata** - *GoogleIDPMetadata.xml* - file is saved, as it will be used to setup Azure AD later
|
||||
1. On the **Google Identity Provider details** page, select **Download Metadata** and take note of the location where the **IdP metadata** - *GoogleIDPMetadata.xml* - file is saved, as it will be used to setup Microsoft Entra ID later
|
||||
1. On the **Service provider detail's** page
|
||||
- Select the option **Signed response**
|
||||
- Verify that the Name ID format is set to **PERSISTENT**
|
||||
- Depending on how the Azure AD users have been provisioned in Azure AD, you may need to adjust the **Name ID** mapping.\
|
||||
- Depending on how the Microsoft Entra users have been provisioned in Microsoft Entra ID, you may need to adjust the **Name ID** mapping.\
|
||||
If using Google auto-provisioning, select **Basic Information > Primary email**
|
||||
- Select **Continue**
|
||||
1. On the **Attribute mapping** page, map the Google attributes to the Azure AD attributes
|
||||
1. On the **Attribute mapping** page, map the Google attributes to the Microsoft Entra attributes
|
||||
|
||||
|Google Directory attributes|Azure AD attributes|
|
||||
|Google Directory attributes|Microsoft Entra attributes|
|
||||
|-|-|
|
||||
|Basic Information: Primary Email|App attributes: IDPEmail|
|
||||
|
||||
> [!IMPORTANT]
|
||||
> You must ensure that your the Azure AD user accounts email match those in your Google Workspace.
|
||||
> You must ensure that your the Microsoft Entra user accounts email match those in your Google Workspace.
|
||||
|
||||
1. Select **Finish**
|
||||
|
||||
@ -66,10 +68,12 @@ Now that the app is configured, you must enable it for the users in Google Works
|
||||
1. Select **User access**
|
||||
1. Select **ON for everyone > Save**
|
||||
|
||||
## Configure Azure AD as a Service Provider (SP) for Google Workspace
|
||||
<a name='configure-azure-ad-as-a-service-provider-sp-for-google-workspace'></a>
|
||||
|
||||
The configuration of Azure AD consists of changing the authentication method for the custom DNS domains. This configuration can be done using PowerShell.\
|
||||
Using the **IdP metadata** XML file downloaded from Google Workspace, modify the *$DomainName* variable of the following script to match your environment, and then run it in a PowerShell session. When prompted to authenticate to Azure AD, use the credentials of an account with the *Global Administrator* role.
|
||||
## Configure Microsoft Entra ID as a Service Provider (SP) for Google Workspace
|
||||
|
||||
The configuration of Microsoft Entra ID consists of changing the authentication method for the custom DNS domains. This configuration can be done using PowerShell.\
|
||||
Using the **IdP metadata** XML file downloaded from Google Workspace, modify the *$DomainName* variable of the following script to match your environment, and then run it in a PowerShell session. When prompted to authenticate to Microsoft Entra ID, use the credentials of an account with the *Global Administrator* role.
|
||||
|
||||
```powershell
|
||||
Set-ExecutionPolicy -ExecutionPolicy RemoteSigned -Scope CurrentUser -Force
|
||||
@ -125,12 +129,14 @@ SigningCertificate : <BASE64 encoded certificate>
|
||||
AdditionalProperties : {}
|
||||
```
|
||||
|
||||
## Verify federated authentication between Google Workspace and Azure AD
|
||||
<a name='verify-federated-authentication-between-google-workspace-and-azure-ad'></a>
|
||||
|
||||
## Verify federated authentication between Google Workspace and Microsoft Entra ID
|
||||
|
||||
From a private browser session, navigate to https://portal.azure.com and sign in with a Google Workspace account:
|
||||
|
||||
1. As username, use the email as defined in Google Workspace
|
||||
1. The user will be redirected to Google Workspace to sign in
|
||||
1. After Google Workspace authentication, the user will be redirected back to Azure AD and signed in
|
||||
1. After Google Workspace authentication, the user will be redirected back to Microsoft Entra ID and signed in
|
||||
|
||||
:::image type="content" source="images/google/google-sso.gif" alt-text="A GIF that shows the user authenticating the Azure portal using a Google Workspace federated identity.":::
|
@ -29,7 +29,7 @@ It's easy to be education ready when using Microsoft products. We recommend the
|
||||
|
||||
1. Use an Office 365 Education tenant.
|
||||
|
||||
With Office 365, you also have Azure Active Directory (Azure AD). To learn more about Office 365 Education features and pricing, see [Office 365 Education plans and pricing](https://products.office.com/en-us/academic/compare-office-365-education-plans).
|
||||
With Office 365, you also have Microsoft Entra ID. To learn more about Office 365 Education features and pricing, see [Office 365 Education plans and pricing](https://products.office.com/en-us/academic/compare-office-365-education-plans).
|
||||
|
||||
2. Activate Intune for Education in your tenant.
|
||||
|
||||
@ -39,11 +39,11 @@ It's easy to be education ready when using Microsoft products. We recommend the
|
||||
1. Provision the PC using one of these methods:
|
||||
* [Provision PCs with the Set up School PCs app](use-set-up-school-pcs-app.md) - The usage of this method will automatically set both **SetEduPolicies** to True and **AllowCortana** to False.
|
||||
* [Provision PCs with a custom package created with Windows Configuration Designer](/windows/configuration/provisioning-packages/provisioning-create-package) - Make sure to set both **SetEduPolicies** to True and **AllowCortana** to False.
|
||||
2. Join the PC to Azure Active Directory.
|
||||
* Use Set up School PCs or Windows Configuration Designer to bulk enroll to Azure AD.
|
||||
* Manually Azure AD join the PC during the Windows device setup experience.
|
||||
2. Join the PC to Microsoft Entra ID.
|
||||
* Use Set up School PCs or Windows Configuration Designer to bulk enroll to Microsoft Entra ID.
|
||||
* Manually Microsoft Entra join the PC during the Windows device setup experience.
|
||||
3. Enroll the PCs in MDM.
|
||||
* If you've activated Intune for Education in your Azure AD tenant, enrollment will happen automatically when the PC is joined to Azure AD. Intune for Education will automatically set **SetEduPolicies** to True and **AllowCortana** to False.
|
||||
* If you've activated Intune for Education in your Microsoft Entra tenant, enrollment will happen automatically when the PC is joined to Microsoft Entra ID. Intune for Education will automatically set **SetEduPolicies** to True and **AllowCortana** to False.
|
||||
4. Ensure that needed assistive technology apps can be used.
|
||||
* If you've students or school personnel who rely on assistive technology apps that aren't available in the Microsoft Store, and who are using a Windows 10 S device, configure their device to Windows 10 Pro Education to allow the download and use of non-Microsoft Store assistive technology apps. See [Switch to Windows 10 Pro Education from Windows 10 Pro or Windows 10 S](change-to-pro-education.md) for more info.
|
||||
|
||||
@ -136,13 +136,15 @@ Provide an ad-free experience that is a safer, more private search option for K
|
||||
|
||||
### Configurations
|
||||
|
||||
#### Azure AD and Office 365 Education tenant
|
||||
<a name='azure-ad-and-office-365-education-tenant'></a>
|
||||
|
||||
#### Microsoft Entra ID and Office 365 Education tenant
|
||||
To suppress ads when searching with Bing on Microsoft Edge on any network, follow these steps:
|
||||
|
||||
1. Ensure your Office 365 tenant is registered as an education tenant. For more information, see [Verify your Office 365 domain to prove education status](https://support.office.com/article/Verify-your-Office-365-domain-to-prove-ownership-nonprofit-or-education-status-or-to-activate-viva-engage-87d1844e-aa47-4dc0-a61b-1b773fd4e590).
|
||||
2. Domain join the Windows 10 PCs to your Azure AD tenant (this tenant is the same as your Office 365 tenant).
|
||||
2. Domain join the Windows 10 PCs to your Microsoft Entra tenant (this tenant is the same as your Office 365 tenant).
|
||||
3. Configure **SetEduPolicies** according to one of the methods described in the previous sections in this topic.
|
||||
4. Have students sign in with their Azure AD identity, which is the same as your Office 365 identity, to use the PC.
|
||||
4. Have students sign in with their Microsoft Entra identity, which is the same as your Office 365 identity, to use the PC.
|
||||
> [!NOTE]
|
||||
> If you are verifying your Office 365 domain to prove education status (step 1 above), you may need to wait up to 7 days for the ad-free experience to take effect. Microsoft recommends not to roll out the browser to your students until that time.
|
||||
|
||||
|
@ -1,878 +0,0 @@
|
||||
---
|
||||
title: Deploy Windows 10 in a school
|
||||
description: Learn how to integrate your school environment with Microsoft Office 365, Active Directory Domain Services (AD DS), and Microsoft Azure Active Directory (Azure AD). Deploy Windows 10 and apps to new devices or upgrade existing devices to Windows 10. Manage faculty, students, and devices by using Microsoft Intune and Group Policy.
|
||||
ms.topic: how-to
|
||||
ms.date: 08/10/2022
|
||||
appliesto:
|
||||
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 10</a>
|
||||
---
|
||||
|
||||
# Deploy Windows 10 in a school
|
||||
|
||||
This guide shows you how to deploy the Windows 10 operating system in a school environment. You learn how to deploy Windows 10 in classrooms; integrate the school environment with Microsoft Office 365, Active Directory Domain Services (AD DS), and Microsoft Azure Active Directory (Azure AD); and deploy Windows 10 and your apps to new devices or upgrade existing devices to Windows 10. This guide also describes how to use Microsoft Intune and Group Policy to manage devices. Finally, the guide discusses common, ongoing maintenance tasks that you'll perform after initial deployment and the automated tools and built-in features of the operating system.
|
||||
|
||||
## Prepare for school deployment
|
||||
|
||||
Proper preparation is essential for a successful school deployment. To avoid common mistakes, your first step is to plan a typical school configuration. As with building a house, you need a blueprint for what your school should look like when it’s finished. The second step in preparation is to learn how you'll configure your school. Just as a builder needs to have the right tools to build a house, you need the right set of tools to deploy your school.
|
||||
|
||||
### Plan a typical school configuration
|
||||
|
||||
As part of preparing for your school deployment, you need to plan your configuration—the focus of this guide. Figure 1 illustrates a typical finished school configuration that you can use as a model (the blueprint in our builder analogy) for the finished state.
|
||||
|
||||
:::image type="content" source="images/deploy-win-10-school-figure1.png" alt-text="A finished school configuration for a Windows client deployment.":::
|
||||
|
||||
*Figure 1. Typical school configuration for this guide*
|
||||
|
||||
Figure 2 shows the classroom configuration this guide uses.
|
||||
|
||||
:::image type="content" source="images/deploy-win-10-school-figure2.png" alt-text="See the classroom configuration used in this Windows client deployment guide.":::
|
||||
|
||||
*Figure 2. Typical classroom configuration in a school*
|
||||
|
||||
This school configuration has the following characteristics:
|
||||
- It contains one or more admin devices.
|
||||
- It contains two or more classrooms.
|
||||
- Each classroom contains one teacher device.
|
||||
- The classrooms connect to each other through multiple subnets.
|
||||
- All devices in each classroom connect to a single subnet.
|
||||
- All devices have high-speed, persistent connections to each other and to the Internet.
|
||||
- All teachers and students have access to Microsoft Store or Microsoft Store for Business.
|
||||
- All devices receive software updates from Intune (or another device management system).
|
||||
- You install a 64-bit version of Windows 10 on the admin device.
|
||||
- You install the Windows Assessment and Deployment Kit (Windows ADK) on the admin device.
|
||||
- You install the Windows Assessment and Deployment Kit (Windows ADK) on the admin device.
|
||||
- You install the 64-bit version of the Microsoft Deployment Toolkit (MDT) 2013 Update 2 on the admin device.
|
||||
|
||||
> [!NOTE]
|
||||
> In this guide, all references to MDT refer to the 64-bit version of MDT 2013 Update 2.
|
||||
|
||||
- The devices use Azure AD in Office 365 Education for identity management.
|
||||
- If you've on-premises AD DS, you can [integrate Azure AD with on-premises AD DS](/azure/active-directory/hybrid/whatis-hybrid-identity).
|
||||
- Use [Intune](/mem/intune/), [Set up Basic Mobility and Security](/microsoft-365/admin/basic-mobility-security/set-up), or Group Policy in AD DS to manage devices.
|
||||
- Each device supports a one-student-per-device or multiple-students-per-device scenario.
|
||||
- The devices can be a mixture of different make, model, and processor architecture (32 bit or 64 bit) or be identical.
|
||||
- To start a Windows 10 deployment, use a USB flash drive, DVD-ROM or CD-ROM, or Pre-Boot Execution Environment Boot (PXE Boot).
|
||||
- The devices can be a mixture of different Windows 10 editions, such as Windows 10 Home, Windows 10 Pro, and Windows 10 Education.
|
||||
|
||||
Office 365 Education allows:
|
||||
|
||||
- Students and faculty to use Microsoft Office to create and edit Microsoft Word, OneNote, PowerPoint, and Excel documents in a browser.
|
||||
- Teachers to use the [OneNote Class Notebook app](https://www.onenote.com/classnotebook) to share content and collaborate with students.
|
||||
- Faculty to use the [OneNote Staff Notebooks app](https://www.onenote.com/staffnotebookedu) to collaborate with other teachers, administration, and faculty.
|
||||
- Teachers to employ Sway to create interactive educational digital storytelling.
|
||||
- Students and faculty to use email and calendars, with mailboxes up to 50 GB per user.
|
||||
- Faculty to use advanced email features like email archiving and legal hold capabilities.
|
||||
- Faculty to help prevent unauthorized users from accessing documents and email by using Azure Rights Management.
|
||||
- Faculty to use advanced compliance tools on the unified eDiscovery pages in the Microsoft Purview compliance portal.
|
||||
- Faculty to host online classes, parent–teacher conferences, and other collaboration in Skype for Business or Skype.
|
||||
- Students and faculty to access up to 1 TB of personal cloud storage that users inside and outside the educational institution can share through OneDrive for Business.
|
||||
- Teachers to provide collaboration in the classroom through Microsoft SharePoint Online team sites.
|
||||
- Students and faculty to use Office 365 Video to manage videos.
|
||||
- Students and faculty to use Viva Engage to collaborate through private social networking.
|
||||
- Students and faculty to access classroom resources from anywhere on any device (including iOS and Android devices).
|
||||
|
||||
For more information about Office 365 Education features and a FAQ, go to [Office 365 Education](https://www.microsoft.com/microsoft-365/academic/compare-office-365-education-plans).
|
||||
|
||||
## How to configure a school
|
||||
|
||||
Now that you've the plan (blueprint) for your classroom, you’re ready to learn about the tools you'll use to deploy it. There are many tools you could use to accomplish the task, but this guide focuses on using those tools that require the least infrastructure and technical knowledge.
|
||||
|
||||
The primary tool you'll use to deploy Windows 10 in your school is MDT, which uses Windows ADK components to make deployment easier. You could just use the Windows ADK to perform your deployment, but MDT simplifies the process by providing an intuitive, wizard-driven user interface (UI).
|
||||
|
||||
You can use MDT as a stand-alone tool or integrate it with Microsoft Configuration Manager. As a stand-alone tool, MDT performs Lite Touch Installation (LTI) deployments—deployments that require minimal infrastructure and allow you to control the level of automation. When integrated with Configuration Manager, MDT performs Zero Touch Installation (ZTI) deployments, which require more infrastructure (such as Configuration Manager) but result in fully automated deployments.
|
||||
|
||||
MDT includes the Deployment Workbench—a console from which you can manage the deployment of Windows 10 and your apps. You configure the deployment process in the Deployment Workbench, including the management of operating systems, device drivers, apps, and migration of user settings on existing devices.
|
||||
|
||||
LTI performs deployment from a *deployment share*—a network-shared folder on the device where you installed MDT. You can perform over-the-network deployments from the deployment share or perform deployments from a local copy of the deployment share on a USB drive or DVD. You'll learn more about MDT in the [Prepare the admin device](#prepare-the-admin-device) section.
|
||||
|
||||
The focus of MDT is deployment, so you also need tools that help you manage your Windows 10 devices and apps. You can manage Windows 10 devices and apps with [Microsoft Intune](/mem/intune/fundamentals/what-is-intune), [Configuration Manager](/mem/configmgr/core/understand/introduction), the Compliance Management feature in Office 365, or Group Policy in AD DS. You can use any combination of these tools based on your school requirements.
|
||||
|
||||
The configuration process requires the following devices:
|
||||
|
||||
- **Admin device.** This is the device you use for your day-to-day job functions. It’s also the one you use to create and manage the Windows 10 and app deployment process. You install the Windows ADK and MDT on this device.
|
||||
- **Faculty devices.** These are the devices that the teachers and other faculty use for their day-to-day job functions. You use the admin device to deploy (or upgrade) Windows 10 and apps to these devices.
|
||||
- **Student devices.** The students will use these devices. You'll use the admin device deploy (or upgrade) Windows 10 and apps to them.
|
||||
|
||||
The high-level process for deploying and configuring devices within individual classrooms and the school as a whole is as follows and illustrated in Figure 3:
|
||||
|
||||
1. Prepare the admin device for use, which includes installing the Windows ADK and MDT.
|
||||
2. On the admin device, create and configure the Office 365 Education subscription that you'll use for each classroom in the school.
|
||||
3. On the admin device, configure integration between on-premises AD DS and Azure AD (if you've an on premises AD DS configuration).
|
||||
4. On the admin device, create and configure a Microsoft Store for Business portal.
|
||||
5. On the admin device, prepare for management of the Windows 10 devices after deployment.
|
||||
6. On the student and faculty devices, deploy Windows 10 to new or existing devices, or upgrade eligible devices to Windows 10.
|
||||
7. On the admin device, manage the Windows 10 devices and apps, the Office 365 subscription, and the AD DS and Azure AD integration.
|
||||
|
||||
:::image type="content" source="images/deploy-win-10-school-figure3.png" alt-text="See the high level process of configuring Windows client devices in a classroom and the school":::
|
||||
|
||||
*Figure 3. How school configuration works*
|
||||
|
||||
Each of the steps illustrated in Figure 3 directly correspond to the remaining high-level sections in this guide.
|
||||
|
||||
### Summary
|
||||
|
||||
In this section, you looked at the final configuration of your individual classrooms and the school as a whole upon completion of this guide. You also learned the high-level steps you need to perform to deploy the faculty and student devices in your school.
|
||||
|
||||
## Prepare the admin device
|
||||
|
||||
Now, you’re ready to prepare the admin device for use in the school. This process includes installing the Windows ADK, installing the MDT, and creating the MDT deployment share.
|
||||
|
||||
### Install the Windows ADK
|
||||
|
||||
The first step in preparing the admin device is to install the Windows ADK. The Windows ADK contains the deployment tools that MDT uses, including the Windows Preinstallation Environment (Windows PE), the Windows User State Migration Tool (USMT), and Deployment Image Servicing and Management.
|
||||
|
||||
When you install the Windows ADK on the admin device, select the following features:
|
||||
|
||||
- Deployment tools
|
||||
- Windows Preinstallation Environment (Windows PE)
|
||||
- User State Migration Tool (USMT)
|
||||
|
||||
For more information about installing the Windows ADK, see [Step 2-2: Install the Windows ADK](/mem/configmgr/mdt/lite-touch-installation-guide#InstallWindowsADK).
|
||||
|
||||
### Install MDT
|
||||
|
||||
Next, install MDT. MDT uses the Windows ADK to help you manage and perform Windows 10 and app deployment and is a free tool available directly from Microsoft.
|
||||
|
||||
You can use MDT to deploy 32-bit or 64-bit versions of Windows 10. Install the 64-bit version of MDT to support deployment of 32-bit and 64-bit operating systems.
|
||||
|
||||
> [!NOTE]
|
||||
> If you install the 32-bit version of MDT, you can install only 32-bit versions of Windows 10. Ensure that you download and install the 64-bit version of MDT so that you can install 64-bit and 32-bit versions of the operating system.
|
||||
|
||||
For more information about installing MDT on the admin device, see [Installing a New Instance of MDT](/mem/configmgr/mdt/use-the-mdt#InstallingaNewInstanceofMDT).
|
||||
|
||||
Now, you’re ready to create the MDT deployment share and populate it with the operating system, apps, and device drivers you want to deploy to your devices.
|
||||
|
||||
### Create a deployment share
|
||||
|
||||
MDT includes the Deployment Workbench, a graphical user interface that you can use to manage MDT deployment shares. A deployment share is a shared folder that contains all the MDT deployment content. The LTI Deployment Wizard accesses the deployment content over the network or from a local copy of the deployment share (known as MDT deployment media).
|
||||
|
||||
For more information about how to create a deployment share, see [Step 3-1: Create an MDT Deployment Share](/mem/configmgr/mdt/lite-touch-installation-guide#step-3-configure-mdt-to-create-the-reference-computer).
|
||||
|
||||
### Summary
|
||||
|
||||
In this section, you installed the Windows ADK and MDT on the admin device. You also created the MDT deployment share that you'll configure and use later in the LTI deployment process.
|
||||
|
||||
## Create and configure Office 365
|
||||
|
||||
Office 365 is one of the core components of your classroom environment. You create and manage student identities in Office 365, and students and teachers use the suite as their email, contacts, and calendar system. Teachers and students use Office 365 collaboration features such as SharePoint, OneNote, and OneDrive for Business.
|
||||
|
||||
As a first step in deploying your classroom, create an Office 365 Education subscription, and then configure Office 365 for the classroom. For more information about Office 365 Education deployment, see [School deployment of Office 365 Education](https://www.microsoft.com/education/products/office).
|
||||
|
||||
### Select the appropriate Office 365 Education license plan
|
||||
|
||||
Complete the following steps to select the appropriate Office 365 Education license plan for your school:
|
||||
|
||||
- Determine the number of faculty members and students who will use the classroom. Office 365 Education licensing plans are available specifically for faculty and students. You must assign faculty and students the correct licensing plan.
|
||||
|
||||
- Determine the faculty members and students who need to install Office applications on devices (if any). Faculty and students can use Office applications online (standard plans) or run them locally (Microsoft 365 Apps for enterprise plans). Table 1 lists the advantages and disadvantages of standard and Microsoft 365 Apps for enterprise plans.
|
||||
|
||||
*Table 1. Comparison of standard and Microsoft 365 Apps for enterprise plans*
|
||||
|
||||
---
|
||||
| Plan | Advantages | Disadvantages |
|
||||
| --- | --- | --- |
|
||||
| Standard | - Less expensive than Microsoft 365 Apps for enterprise <br/>- Can be run from any device <br/>- No installation necessary | - Must have an Internet connection to use it<br/>- Doesn't support all the features found in Microsoft 365 Apps for enterprise |
|
||||
| Office ProPlus | - Only requires an Internet connection every 30 days (for activation)<br/>- Supports full set of Office features | - Requires installation <br/>- Can be installed on only five devices per user (there's no limit to the number of devices on which you can run Office apps online) |
|
||||
|
||||
---
|
||||
|
||||
The best user experience is to run Microsoft 365 Apps for enterprise or use native Office apps on mobile devices. If neither of these options is available, use Office applications online. In addition, all Office 365 plans provide a better user experience by storing documents in OneDrive for Business, which is included in all Office 365 plans. OneDrive for Business keeps content in sync among devices and helps ensure that users always have access to their documents on any device.
|
||||
|
||||
- Determine whether students or faculty need Azure Rights Management.
|
||||
|
||||
You can use Azure Rights Management to protect classroom information against unauthorized access. Azure Rights Management protects your information inside or outside the classroom through encryption, identity, and authorization policies, securing your files and email. You can retain control of the information, even when it’s shared with people outside the classroom or your educational institution. Azure Rights Management is free to use with all Office 365 Education license plans. For more information, see [Azure Rights Management](/information-protection/).
|
||||
|
||||
- Record the Office 365 Education license plans needed for the classroom in Table 2.
|
||||
|
||||
*Table 2. Office 365 Education license plans needed for the classroom*
|
||||
|
||||
---
|
||||
| Quantity | Plan |
|
||||
| --- | --- |
|
||||
| | Office 365 Education for students |
|
||||
| | Office 365 Education for faculty |
|
||||
| | Azure Rights Management for students |
|
||||
| | Azure Rights Management for faculty |
|
||||
|
||||
---
|
||||
|
||||
You'll use the Office 365 Education license plan information you record in Table 2 in the [Create user accounts in Office 365](#create-user-accounts-in-office-365) section of this guide.
|
||||
|
||||
### Create a new Office 365 Education subscription
|
||||
|
||||
To create a new Office 365 Education subscription for use in the classroom, use your educational institution’s email account. There are no costs to you or to students for signing up for Office 365 Education subscriptions.
|
||||
|
||||
> [!NOTE]
|
||||
> If you already have an Office 365 Education subscription, you can use that subscription and continue to the next section, [Add domains and subdomains](#add-domains-and-subdomains).
|
||||
|
||||
#### To create a new Office 365 subscription
|
||||
|
||||
1. In Microsoft Edge or Internet Explorer, type `https://portal.office.com/start?sku=faculty` in the address bar.
|
||||
|
||||
If you've already used your current sign-in account to create a new Office 365 subscription, you'll be prompted to sign in. If you want to create a new Office 365 subscription, start an In-Private Window. Your options:
|
||||
|
||||
- In Microsoft Edge, select Ctrl+Shift+N. Or, select **More actions** > **New InPrivate window**.
|
||||
- In Internet Explorer, select Ctrl+Shift+P. Or, select **Settings** > **Safety** > **InPrivate Browsing**.
|
||||
|
||||
2. On the **Get started** page, type your school email address in the **Enter your school email address** box, and then click **Sign up**. You'll receive an email in your school email account.
|
||||
3. Click the hyperlink in the email in your school email account.
|
||||
4. On the **One last thing** page, complete your user information, and then click **Start**. The wizard creates your new Office 365 Education subscription, and you're automatically signed in as the administrative user you specified when you created the subscription.
|
||||
|
||||
### Add domains and subdomains
|
||||
|
||||
Now that you've created your new Office 365 Education subscription, add the domains and subdomains that your institution uses. For example, if your institution has `contoso.edu` as the primary domain name but you've subdomains for students or faculty (such as students.contoso.edu and faculty.contoso.edu), then you need to add the subdomains.
|
||||
|
||||
#### To add more domains and subdomains
|
||||
|
||||
1. In the admin center, in the list view, click **DOMAINS**.
|
||||
2. In the details pane, above the list of domains, on the menu bar, click **Add domain**.
|
||||
3. In the Add a New Domain in Office 365 Wizard, on the **Verify domain wizard** page, click **Let’s get started**.
|
||||
4. On the **Verify domain** wizard page, in the **Enter a domain you already own** box, type your domain name, and then click **Next**.
|
||||
5. Sign in to your domain name management provider (for example, Network Solutions or GoDaddy), and then complete the steps for your provider.
|
||||
6. Repeat these steps for each domain and subdomain you want faculty and students to use for your institution.
|
||||
|
||||
### Configure automatic tenant join
|
||||
|
||||
To make it easier for faculty and students to join your Office 365 Education subscription (or *tenant*), allow them to automatically sign up to your tenant (*automatic tenant join*). In automatic tenant join, when a faculty member or student signs up for Office 365, Office 365 automatically adds (joins) the user to your Office 365 tenant.
|
||||
|
||||
> [!NOTE]
|
||||
> By default, automatic tenant join is enabled in Office 365 Education, except for certain areas in Europe, the Middle East, and Africa. These countries/regions require opt-in steps to add new users to existing Office 365 tenants. Check your country/region requirements to determine the automatic tenant join default configuration. Also, if you use Azure AD Connect, then automatic tenant join is disabled.
|
||||
|
||||
Office 365 uses the domain portion of the user’s email address to know which Office 365 tenant to join. For example, if a faculty member or student provides an email address of user@contoso.edu, then Office 365 automatically performs one of the following tasks:
|
||||
|
||||
- If an Office 365 tenant with that domain name (contoso.edu) exists, Office 365 automatically adds the user to that tenant.
|
||||
- If an Office 365 tenant with that domain name (contoso.edu) doesn't exists, Office 365 automatically creates a new Office 365 tenant with that domain name and adds the user to it.
|
||||
|
||||
You'll always want faculty and students to join the Office 365 tenant that you created. Ensure that you perform the steps in the [Create a new Office 365 Education subscription](#create-a-new-office-365-education-subscription) and [Add domains and subdomains](#add-domains-and-subdomains) sections before allowing other faculty and students to join Office 365.
|
||||
|
||||
> [!NOTE]
|
||||
> You can't merge multiple tenants, so any faculty or students who create their own tenant will need to abandon their existing tenant and join yours.
|
||||
|
||||
All new Office 365 Education subscriptions have automatic tenant join enabled by default, but you can enable or disable automatic tenant join by using the Windows PowerShell commands in Table 3. For more information about how to run these commands, see [How can I prevent students from joining my existing Office 365 tenant](/microsoft-365/education/deploy/office-365-education-self-sign-up#how-can-i-prevent-students-from-joining-my-existing-office-365-tenant).
|
||||
|
||||
*Table 3. Windows PowerShell commands to enable or disable Automatic Tenant Join*
|
||||
|
||||
---
|
||||
| Action | Windows PowerShell command |
|
||||
|---------|-----------------------------------------------------------|
|
||||
| Enable | `Set-MsolCompanySettings -AllowEmailVerifiedUsers $true` |
|
||||
| Disable | `Set-MsolCompanySettings -AllowEmailVerifiedUsers $false` |
|
||||
|
||||
---
|
||||
|
||||
> [!NOTE]
|
||||
> If your institution has AD DS, then disable automatic tenant join. Instead, use Azure AD integration with AD DS to add users to your Office 365 tenant.
|
||||
|
||||
### Disable automatic licensing
|
||||
|
||||
To reduce your administrative effort, automatically assign Office 365 Education or Office 365 Education Plus licenses to faculty and students when they sign up (automatic licensing). Automatic licensing also enables Office 365 Education or Office 365 Education Plus features that don't require administrative approval.
|
||||
|
||||
> [!NOTE]
|
||||
> By default, automatic licensing is enabled in Office 365 Education. If you want to use automatic licensing, then skip this section and go to the next section.
|
||||
|
||||
Although all new Office 365 Education subscriptions have automatic licensing enabled by default, you can enable or disable it for your Office 365 tenant by using the Windows PowerShell commands in Table 4. For more information about how to run these commands, see [How can I prevent students from joining my existing Office 365 tenant](/microsoft-365/education/deploy/office-365-education-self-sign-up#how-can-i-prevent-students-from-joining-my-existing-office-365-tenant).
|
||||
|
||||
*Table 4. Windows PowerShell commands to enable or disable automatic licensing*
|
||||
|
||||
---
|
||||
| Action | Windows PowerShell command |
|
||||
|---------|-----------------------------------------------------------|
|
||||
| Enable | `Set-MsolCompanySettings -AllowAdHocSubscriptions $true` |
|
||||
| Disable | `Set-MsolCompanySettings -AllowAdHocSubscriptions $false` |
|
||||
|
||||
---
|
||||
|
||||
### Enable Azure AD Premium
|
||||
|
||||
When you create your Office 365 subscription, you create an Office 365 tenant that includes an Azure AD directory. Azure AD is the centralized repository for all your student and faculty accounts in Office 365, Intune, and other Azure AD–integrated apps. Azure AD has different editions, which may include Office 365 Education. For more information, see [Introduction to Azure Active Directory Tenants](/microsoft-365/education/deploy/intro-azure-active-directory).
|
||||
|
||||
Educational institutions can obtain Azure AD Basic edition licenses at no cost. After you obtain your licenses, activate your Azure AD access by completing the steps in [Step 3: Activate your Azure Active Directory access](/azure/active-directory/fundamentals/active-directory-get-started-premium#step-3-activate-your-azure-active-directory-access).
|
||||
|
||||
The Azure AD Premium features that aren't in Azure AD Basic include:
|
||||
|
||||
- Allow designated users to manage group membership
|
||||
- Dynamic group membership based on user metadata
|
||||
- Multifactor authentication (MFA)
|
||||
- Identify cloud apps that your users run
|
||||
- Automatic enrollment in a mobile device management (MDM) system (such as Intune)
|
||||
- Self-service recovery of BitLocker
|
||||
- Add local administrator accounts to Windows 10 devices
|
||||
- Azure AD Connect health monitoring
|
||||
- Extended reporting capabilities
|
||||
|
||||
You can assign Azure AD Premium licenses to the users who need these features. For example, you may want the users who have access to confidential student information to use MFA. In this example, you could assign Azure AD Premium to only those users.
|
||||
|
||||
You can sign up for Azure AD Premium, and then assign licenses to users. In this section, you sign up for Azure AD Premium. You'll assign Azure AD Premium licenses to users later in the deployment process.
|
||||
|
||||
For more information, see:
|
||||
|
||||
- [Azure Active Directory licenses](/azure/active-directory/fundamentals/active-directory-whatis)
|
||||
- [Sign up for Azure Active Directory Premium](/azure/active-directory/fundamentals/active-directory-get-started-premium)
|
||||
|
||||
### Summary
|
||||
You provision and initially configure Office 365 Education as part of the initial configuration. With the subscription in place, automatic tenant join configured, automatic licensing established, and Azure AD Premium enabled (if necessary), you’re ready to select the method you'll use to create user accounts in Office 365.
|
||||
|
||||
## Select an Office 365 user account–creation method
|
||||
|
||||
|
||||
Now that you've an Office 365 subscription, you need to determine how you'll create your Office 365 user accounts. Use the following methods to create Office 365 user accounts:
|
||||
|
||||
- **Method 1:** Automatically synchronize your on-premises AD DS domain with Azure AD. Select this method if you've an on-premises AD DS domain.
|
||||
- **Method 2:** Bulk-import the user accounts from a .csv file (based on information from other sources) into Azure AD. Select this method if you don’t have an on-premises AD DS domain.
|
||||
|
||||
### Method 1: Automatic synchronization between AD DS and Azure AD
|
||||
|
||||
In this method, you've an on-premises AD DS domain. As shown in Figure 4, the Azure AD Connector tool automatically synchronizes AD DS with Azure AD. When you add or change any user accounts in AD DS, the Azure AD Connector tool automatically updates Azure AD.
|
||||
|
||||
> [!NOTE]
|
||||
> Azure AD Connect also supports synchronization from any Lightweight Directory Access Protocol version 3 (LDAPv3)–compliant directory by using the information provided in [LDAP synchronization with Azure Active Directory](/azure/active-directory/fundamentals/sync-ldap).
|
||||
|
||||
:::image type="content" source="images/deploy-win-10-school-figure4.png" alt-text="See the automatic synchronization between Active Directory Directory Services and Azure AD.":::
|
||||
|
||||
*Figure 4. Automatic synchronization between AD DS and Azure AD*
|
||||
|
||||
For more information about how to perform this step, see the [Integrate on-premises AD DS with Azure AD](#integrate-on-premises-ad-ds-with-azure-ad) section in this guide.
|
||||
|
||||
### Method 2: Bulk import into Azure AD from a .csv file
|
||||
|
||||
In this method, you've no on-premises AD DS domain. As shown in Figure 5, you manually prepare a `.csv` file with the student information from your source, and then manually import the information directly into Azure AD. The `.csv` file must be in the format that Office 365 specifies.
|
||||
|
||||
:::image type="content" source="images/deploy-win-10-school-figure5.png" alt-text="Create a csv file with student information, and import the csv file into Azure AD.":::
|
||||
|
||||
*Figure 5. Bulk import into Azure AD from other sources*
|
||||
|
||||
To implement this method, perform the following steps:
|
||||
|
||||
1. Export the student information from the source. Ultimately, you want to format the student information in the format the bulk-import feature requires.
|
||||
2. Bulk-import the student information into Azure AD. For more information about how to perform this step, see the [Bulk-import user accounts into Office 365](#bulk-import-user-accounts-into-office-365) section.
|
||||
|
||||
### Summary
|
||||
|
||||
In this section, you selected the method for creating user accounts in your Office 365 subscription. Ultimately, these user accounts are in Azure AD (which is the identity management system for Office 365). Now, you’re ready to create your Office 365 accounts.
|
||||
|
||||
## Integrate on-premises AD DS with Azure AD
|
||||
|
||||
You can integrate your on-premises AD DS domain with Azure AD to provide identity management for your Office 365 tenant. With this integration, you can synchronize the users, security groups, and distribution lists in your AD DS domain with Azure AD with the Azure AD Connect tool. Users will be able to sign in to Office 365 automatically by using their email account and the same password they use to sign in to AD DS.
|
||||
|
||||
> [!NOTE]
|
||||
> If your institution doesn't have an on-premises AD DS domain, you can skip this section.
|
||||
|
||||
### Select synchronization model
|
||||
|
||||
Before you deploy AD DS and Azure AD synchronization, you need to determine where you want to deploy the server that runs Azure AD Connect.
|
||||
|
||||
You can deploy the Azure AD Connect tool by using one of the following methods:
|
||||
|
||||
- **On premises**: As shown in Figure 6, Azure AD Connect runs on premises, which have the advantage of not requiring a virtual private network (VPN) connection to Azure. It does, however, require a virtual machine (VM) or physical server.
|
||||
|
||||
:::image type="content" source="images/deploy-win-10-school-figure6.png" alt-text="Azure AD Connect runs on-premises and uses a virtual machine.":::
|
||||
|
||||
*Figure 6. Azure AD Connect on premises*
|
||||
|
||||
- **In Azure**: As shown in Figure 7, Azure AD Connect runs on a VM in Azure AD which has the advantages of being faster to provision (than a physical, on-premises server), offers better site availability, and helps reduce the number of on-premises servers. The disadvantage is that you need to deploy a VPN gateway on premises.
|
||||
|
||||
:::image type="content" source="images/deploy-win-10-school-figure7.png" alt-text="Azure AD Connect runs on a VM in Azure AD, and uses a VPN gateway on-premises.":::
|
||||
|
||||
*Figure 7. Azure AD Connect in Azure*
|
||||
|
||||
This guide describes how to run Azure AD Connect on premises. For information about running Azure AD Connect in Azure, see [Deploy Office 365 Directory Synchronization (DirSync) in Microsoft Azure](/microsoft-365/enterprise/deploy-microsoft-365-directory-synchronization-dirsync-in-microsoft-azure).
|
||||
|
||||
### Deploy Azure AD Connect on premises
|
||||
|
||||
In this synchronization model (illustrated in Figure 6), you run Azure AD Connect on premises on a physical device or VM. Azure AD Connect synchronizes AD DS user and group accounts with Azure AD. Azure AD Connect includes a wizard that helps you configure Azure AD Connect for your AD DS domain and Office 365 subscription. First, you install Azure AD Connect; then, you run the wizard to configure it for your institution.
|
||||
|
||||
#### To deploy AD DS and Azure AD synchronization
|
||||
|
||||
1. Configure your environment to meet the prerequisites for installing Azure AD Connect by performing the steps in [Prerequisites for Azure AD Connect](/azure/active-directory/hybrid/how-to-connect-install-prerequisites).
|
||||
2. On the VM or physical device that will run Azure AD Connect, sign in with a domain administrator account.
|
||||
3. Install Azure AD Connect by performing the steps in [Install Azure AD Connect](/azure/active-directory/hybrid/how-to-connect-install-select-installation).
|
||||
4. Configure Azure AD Connect features based on your institution’s requirements. For more information, see [Azure AD Connect sync: Understand and customize synchronization](/azure/active-directory/hybrid/how-to-connect-sync-whatis).
|
||||
|
||||
Now that you've used on premises Azure AD Connect to deploy AD DS and Azure AD synchronization, you’re ready to verify that Azure AD Connect is synchronizing AD DS user and group accounts with Azure AD.
|
||||
|
||||
### Verify synchronization
|
||||
|
||||
Azure AD Connect should start synchronization immediately. Depending on the number of users in your AD DS domain, the synchronization process can take some time. To monitor the process, view the number of AD DS users and groups the tool has synchronized with Azure AD in the Office 365 admin console.
|
||||
|
||||
#### To verify AD DS and Azure AD synchronization
|
||||
|
||||
1. In your web browser, go to [https://portal.office.com](https://portal.office.com).
|
||||
2. Using the administrative account that you created in the [Create a new Office 365 Education subscription](#create-a-new-office-365-education-subscription) section, sign in to Office 365.
|
||||
3. In the list view, expand **USERS**, and then click **Active Users**.
|
||||
4. In the details pane, view the list of users. The list of users should mirror the users in AD DS.
|
||||
5. In the list view, click **GROUPS**.
|
||||
6. In the details pane, view the list of security groups. The list of users should mirror the security groups in AD DS.
|
||||
7. In the details pane, double-click one of the security groups.
|
||||
8. The list of security group members should mirror the group membership for the corresponding security group in AD DS.
|
||||
9. Close the browser.
|
||||
|
||||
Now that you've verified Azure AD Connect synchronization, you’re ready to assign user licenses for Azure AD Premium.
|
||||
|
||||
### Summary
|
||||
|
||||
In this section, you selected your synchronization model, deployed Azure AD Connect, and verified that Azure AD is synchronizing properly.
|
||||
|
||||
## Bulk-import user and group accounts into AD DS
|
||||
|
||||
You can bulk-import user and group accounts into your on-premises AD DS domain. Bulk-importing accounts helps reduce the time and effort needed to create users compared to creating the accounts manually in the Office 365 Admin portal. First, you select the appropriate method for bulk-importing user accounts into AD DS. Next, you create the .csv file that contains the user accounts. Finally, you use the selected method to import the .csv file into AD DS.
|
||||
|
||||
> [!NOTE]
|
||||
> If your institution doesn’t have an on-premises AD DS domain, you can skip this section.
|
||||
|
||||
### Select the bulk import method
|
||||
|
||||
Several methods are available to bulk-import user accounts into AD DS domains. Table 5 lists the methods that the Windows Server operating system supports natively. In addition, you can use partner solutions to bulk-import user and group accounts into AD DS.
|
||||
|
||||
*Table 5. AD DS bulk-import account methods*
|
||||
|
||||
---
|
||||
| Method | Description and reason to select this method |
|
||||
|---|---|
|
||||
| **Ldifde.exe** | This command-line tool allows you to import and export objects (such as user accounts) from AD DS. Select this method if you aren’t comfortable with Microsoft Visual Basic Scripting Edition (VBScript), Windows PowerShell, or other scripting languages. For more information about using Ldifde.exe, see [Step-by-Step Guide to Bulk Import and Export to Active Directory](https://social.technet.microsoft.com/wiki/contents/articles/116.active-directory-step-by-step-guide-bulk-import-and-export.aspx), [LDIFDE—Export/Import data from Active Directory—LDIFDE commands](https://support.microsoft.com/kb/555636), [Import or Export Directory Objects Using Ldifde](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc816781(v=ws.10)), and [LDIFDE](/previous-versions/orphan-topics/ws.10/cc755456(v=ws.10)). |
|
||||
| **VBScript** | This scripting language uses the Active Directory Services Interfaces (ADSI) Component Object Model interface to manage AD DS objects, including user and group objects. Select this method if you’re comfortable with VBScript. For more information about using VBScript and ADSI, see [Step-by-Step Guide to Bulk Import and Export to Active Directory](https://social.technet.microsoft.com/wiki/contents/articles/116.active-directory-step-by-step-guide-bulk-import-and-export.aspx). |
|
||||
| **Windows PowerShell** | This scripting language natively supports cmdlets to manage AD DS objects, including user and group objects. Select this method if you’re comfortable with Windows PowerShell scripting. For more information about using Windows PowerShell, see [Import Bulk Users to Active Directory](/archive/blogs/technet/bettertogether/import-bulk-users-to-active-directory) and [PowerShell: Bulk create AD Users from CSV file](https://social.technet.microsoft.com/wiki/contents/articles/24541.powershell-bulk-create-ad-users-from-csv-file.aspx). |
|
||||
|
||||
---
|
||||
|
||||
### Create a source file that contains the user and group accounts
|
||||
|
||||
After you've selected your user and group account bulk import method, you’re ready to create the source file that contains the user and group account. You’ll use the source file as the input to the import process. The source file format depends on the method you selected. Table 6 lists the source file format for the bulk import methods.
|
||||
|
||||
*Table 6. Source file format for each bulk import method*
|
||||
|
||||
---
|
||||
| Method | Source file format |
|
||||
|---|---|
|
||||
| **Ldifde.exe** | Ldifde.exe requires a specific format for the source file. Use Ldifde.exe to export existing user and group accounts so that you can see the format. For examples of the format that Ldifde.exe requires, see [Step-by-Step Guide to Bulk Import and Export to Active Directory](https://social.technet.microsoft.com/wiki/contents/articles/116.active-directory-step-by-step-guide-bulk-import-and-export.aspx), [LDIFDE—Export/Import data from Active Directory—LDIFDE commands](https://support.microsoft.com/kb/555636), [Import or Export Directory Objects Using Ldifde](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc816781(v=ws.10)), and [LDIFDE](/previous-versions/orphan-topics/ws.10/cc755456(v=ws.10)). |
|
||||
| **VBScript** | VBScript can use any .csv file format to create a source file for the bulk-import process. To create the .csv file, use software such as Excel. For examples of how to format your source file in comma-separated values (CSV) format, see [Step-by-Step Guide to Bulk Import and Export to Active Directory](https://social.technet.microsoft.com/wiki/contents/articles/116.active-directory-step-by-step-guide-bulk-import-and-export.aspx) |
|
||||
| **Windows PowerShell** | Windows PowerShell can use any .csv file format you want to create as a source file for the bulk-import process. To create the .csv file, use software such as Excel. For examples of how to format your source file in CSV format, see [Import Bulk Users to Active Directory](/archive/blogs/technet/bettertogether/import-bulk-users-to-active-directory) and [PowerShell: Bulk create AD Users from CSV file](https://social.technet.microsoft.com/wiki/contents/articles/24541.powershell-bulk-create-ad-users-from-csv-file.aspx). |
|
||||
|
||||
---
|
||||
|
||||
### Import the user accounts into AD DS
|
||||
|
||||
With the bulk-import source file finished, you’re ready to import the user and group accounts into AD DS. The steps for importing the file are slightly different for each method.
|
||||
|
||||
> [!NOTE]
|
||||
> Bulk-import your group accounts first, and then import your user accounts. Importing in this order allows you to specify group membership when you import your user accounts.
|
||||
|
||||
For more information about how to import user accounts into AD DS by using:
|
||||
|
||||
- Ldifde.exe: See [Step-by-Step Guide to Bulk Import and Export to Active Directory](https://social.technet.microsoft.com/wiki/contents/articles/116.active-directory-step-by-step-guide-bulk-import-and-export.aspx), [LDIFDE—Export/Import data from Active Directory—LDIFDE commands](https://support.microsoft.com/kb/555636), [Import or Export Directory Objects Using Ldifde](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc816781(v=ws.10)), and [LDIFDE](/previous-versions/orphan-topics/ws.10/cc755456(v=ws.10)).
|
||||
- VBScript: See [Step-by-Step Guide to Bulk Import and Export to Active Directory](https://social.technet.microsoft.com/wiki/contents/articles/116.active-directory-step-by-step-guide-bulk-import-and-export.aspx).
|
||||
- Windows PowerShell: See [Import Bulk Users to Active Directory](/archive/blogs/technet/bettertogether/import-bulk-users-to-active-directory) and [PowerShell: Bulk create AD Users from CSV file](https://social.technet.microsoft.com/wiki/contents/articles/24541.powershell-bulk-create-ad-users-from-csv-file.aspx).
|
||||
|
||||
### Summary
|
||||
|
||||
In this section, you selected the bulk-import method, created the source file that contains the user and group accounts, and imported the user and group accounts in to AD DS. If you've Azure AD Connect, it automatically synchronizes the new AD DS user and group accounts to Azure AD. Now, you’re ready to assign user licenses for Azure AD Premium in the [Assign user licenses for Azure AD Premium](#assign-user-licenses-for-azure-ad-premium) section later in this guide.
|
||||
|
||||
## Bulk-import user accounts into Office 365
|
||||
|
||||
You can bulk-import user and group accounts directly into Office 365, reducing the time and effort required to create users. First, you bulk-import the user accounts into Office 365. Then, you create the security groups for your institution. Finally, you create the email distribution groups your institution requires.
|
||||
|
||||
### Create user accounts in Office 365
|
||||
|
||||
Now that you've created your new Office 365 Education subscription, you need to create user accounts. You can add user accounts for the teachers, other faculty, and students who will use the classroom.
|
||||
|
||||
You can use the Microsoft 365 admin center to add individual Office 365 accounts manually—a reasonable process when you’re adding only a few users. If you've many users, however, you can automate the process by creating a list of those users, and then use that list to create user accounts (that is, bulk-add users).
|
||||
|
||||
The bulk-add process assigns the same Office 365 Education license plan to all users on the list. Therefore, you must create a separate list for each license plan you recorded in Table 2. Depending on the number of faculty members who need to use the classroom, you may want to add the faculty Office 365 accounts manually; however, use the bulk-add process to add student accounts.
|
||||
|
||||
For more information about how to bulk-add users to Office 365, see [Add several users at the same time to Office 365](/microsoft-365/enterprise/add-several-users-at-the-same-time).
|
||||
|
||||
> [!NOTE]
|
||||
> If you encountered errors during bulk add, resolve them before you continue the bulk-add process. You can view the log file to see which users caused the errors, and then modify the .csv file to correct the problems. Click **Back** to retry the verification process.
|
||||
|
||||
The email accounts are assigned temporary passwords upon creation. Communicate these temporary passwords to your users before they can sign in to Office 365.
|
||||
|
||||
### Create Office 365 security groups
|
||||
|
||||
Assign SharePoint Online resource permissions to Office 365 security groups, not individual user accounts. For example, create one security group for faculty members and another for students. Then, you can assign unique SharePoint Online resource permissions to faculty members and a different set of permissions to students. Add or remove users from the security groups to grant or revoke access to SharePoint Online resources.
|
||||
|
||||
> [!NOTE]
|
||||
> If your institution has AD DS, don’t create security accounts in Office 365. Instead, create the security groups in AD DS, and then use Azure AD integration to synchronize the security groups with your Office 365 tenant.
|
||||
|
||||
For information about creating security groups, see [Create a group in the Microsoft 365 admin center](/microsoft-365/admin/create-groups/create-groups).
|
||||
|
||||
You can add and remove users from security groups at any time.
|
||||
|
||||
> [!NOTE]
|
||||
> Office 365 evaluates group membership when users sign in. If you change group membership for a user, that user may need to sign out, and then sign in again for the change to take effect.
|
||||
|
||||
### Create email distribution groups
|
||||
|
||||
Microsoft Exchange Online uses an email distribution group as a single email recipient for multiple users. For example, you could create an email distribution group that contains all students. Then, you could send a message to the email distribution group instead of individually addressing the message to each student.
|
||||
|
||||
You can create email distribution groups based on job role (such as teachers, administration, or students) or specific interests (such as robotics, drama club, or soccer team). You can create any number of distribution groups, and users can be members of more than one group.
|
||||
|
||||
> [!NOTE]
|
||||
> Office 365 can take some time to complete the Exchange Online creation process. You'll have to wait until Office 365 completes the Exchange Online creation process before you can perform the following steps.
|
||||
|
||||
For information about how to create security groups, see [Create a group in the Microsoft 365 admin center](/microsoft-365/admin/create-groups/create-groups).
|
||||
|
||||
### Summary
|
||||
|
||||
Now, you've bulk-imported the user accounts into Office 365. First, you selected the bulk-import method. Next, you created the Office 365 security groups in Office 365. Finally, you created the Office 365 email distribution groups. Now, you’re ready to assign user licenses for Azure AD Premium.
|
||||
|
||||
## Assign user licenses for Azure AD Premium
|
||||
|
||||
Azure AD is available in Free, Basic, and Premium editions. Azure AD Free, which is included in Office 365 Education, has fewer features than Azure AD Basic, which in turn has fewer features than Azure AD Premium. Educational institutions can obtain Azure AD Basic licenses at no cost and Azure AD Premium licenses at a reduced cost.
|
||||
|
||||
You can assign Azure AD Premium licenses to the users who need the features this edition offers. For example, you may want the users who have access to confidential student information to use MFA. In this example, you could assign Azure AD Premium only to those users.
|
||||
|
||||
For more information about:
|
||||
|
||||
- Azure AD editions, see [Azure Active Directory editions](/azure/active-directory/fundamentals/active-directory-whatis).
|
||||
- How to assign user licenses for Azure AD Premium, see [How to assign EMS/Azure AD Premium licenses to user accounts](https://channel9.msdn.com/Series/Azure-Active-Directory-Videos-Demos/How-to-assign-Azure-AD-Premium-Licenses-to-user-accounts).
|
||||
|
||||
## Create and configure a Microsoft Store for Business portal
|
||||
|
||||
Microsoft Store for Business allows you to create your own private portal to manage Microsoft Store apps in your institution. With Microsoft Store for Business, you can do the following:
|
||||
|
||||
- Find and acquire Microsoft Store apps.
|
||||
- Manage apps, app licenses, and updates.
|
||||
- Distribute apps to your users.
|
||||
|
||||
For more information, see [Microsoft Store for Business overview](/microsoft-store/microsoft-store-for-business-overview).
|
||||
|
||||
The following section shows you how to create a Microsoft Store for Business portal and configure it for your school.
|
||||
|
||||
### Create and configure your Microsoft Store for Business portal
|
||||
|
||||
To create and configure your Microsoft Store for Business portal, use the administrative account for your Office 365 subscription to sign in to Microsoft Store for Business. Microsoft Store for Business automatically creates a portal for your institution and uses your account as its administrator.
|
||||
|
||||
#### To create and configure a Microsoft Store for Business portal
|
||||
|
||||
1. In Microsoft Edge or Internet Explorer, go to [https://microsoft.com/business-store](https://microsoft.com/business-store).
|
||||
2. On the **Microsoft Store for Business** page, click **Sign in with an organizational account**.
|
||||
|
||||
If your institution has AD DS, then don’t create security accounts in Office 365. Instead, create the security groups in AD DS, and then use Azure AD integration to synchronize the security groups with your Office 365 tenant.
|
||||
|
||||
1. On the Microsoft Store for Business sign-in page, use the administrative account for the Office 365 subscription you created in the [Create a new Office 365 Education subscription](#create-a-new-office-365-education-subscription) section to sign in.
|
||||
2. On the **Microsoft Store for Business Services Agreement** page, review the agreement, select the **I accept this agreement and certify that I have the authority to bind my organization to its terms** check box, and then click **Accept**
|
||||
3. In the **Welcome to the Microsoft Store for Business** dialog box, click **OK**.
|
||||
|
||||
After you create the Microsoft Store for Business portal, configure it by using the commands in the settings menu listed in Table 7. Depending on your institution, you may (or may not) need to change these settings to further customize your portal.
|
||||
|
||||
*Table 7. Menu selections to configure Microsoft Store for Business settings*
|
||||
|
||||
---
|
||||
| Menu selection | What you can do in this menu |
|
||||
|---|---|
|
||||
| Account information | Displays information about your Microsoft Store for Business account (no settings can be changed). You make changes to this information in Office 365 or the Azure portal. For more information, see [Update Microsoft Store for Business account settings](/microsoft-store/update-microsoft-store-for-business-account-settings).|
|
||||
| Device Guard signing | Allows you to upload and sign Device Guard catalog and policy files. For more information about Device Guard, see [Device Guard deployment guide](/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-deployment-guide). |
|
||||
| LOB publishers | Allows you to add line-of-business (LOB) publishers that can then publish apps to your private store. LOB publishers are internal developers or software vendors that are working with your institution. For more information, see [Working with line-of-business apps](/microsoft-store/working-with-line-of-business-apps). |
|
||||
| Management tools | Allows you to add tools that you can use to distribute (deploy) apps in your private store. For more information, see [Distribute apps with a management tool](/microsoft-store/distribute-apps-with-management-tool). |
|
||||
| Offline licensing | Allows you to show (or not show) offline licensed apps to people shopping in your private store. For more information, see [Licensing model: online and offline licenses](/microsoft-store/apps-in-microsoft-store-for-business#licensing-model). |
|
||||
| Permissions | Allows you to grant other users in your organization the ability to buy, manage, and administer your Microsoft Store for Business portal. You can also remove permissions you've previously granted. For more information, see [Roles and permissions in Microsoft Store for Business](/microsoft-store/roles-and-permissions-microsoft-store-for-business). |
|
||||
| Private store | Allows you to change the organization name used in your Microsoft Store for Business portal. When you create your portal, the private store uses the organization name that you used to create your Office 365 subscription. For more information, see [Distribute apps using your private store](/microsoft-store/distribute-apps-from-your-private-store). |
|
||||
|
||||
---
|
||||
|
||||
### Find, acquire, and distribute apps in the portal
|
||||
|
||||
Now that you've created your Microsoft Store for Business portal, you’re ready to find, acquire, and distribute apps that you'll add to your portal. You do this task by using the Inventory page in Microsoft Store for Business.
|
||||
|
||||
> [!NOTE]
|
||||
> Your educational institution can now use a credit card to pay for apps in Microsoft Store for Business.
|
||||
|
||||
You can deploy apps to individual users or make apps available to users through your private store. Deploying apps to individual users restricts the app to those specified users. Making apps available through your private store allows all your users.
|
||||
|
||||
For more information about how to find, acquire, and distribute apps in the portal, see [App inventory management for Microsoft Store for Business](/microsoft-store/app-inventory-management-microsoft-store-for-business).
|
||||
|
||||
### Summary
|
||||
|
||||
At the end of this section, you should have a properly configured Microsoft Store for Business portal. You've also found and acquired your apps from Microsoft Store. Finally, you should have deployed all your Microsoft Store apps to your users. Now, you’re ready to deploy Microsoft Store apps to your users.
|
||||
|
||||
## Plan for deployment
|
||||
|
||||
You'll use the LTI deployment process in MDT to deploy Windows 10 to devices or to upgrade devices to Windows 10. Prior to preparing for deployment, you must make some deployment planning decisions, including selecting the operating systems you'll use, the approach you'll use to create your Windows 10 images, and the method you'll use to initiate the LTI deployment process.
|
||||
|
||||
### Select the operating systems
|
||||
|
||||
Later in the process, you'll import the versions of Windows 10 you want to deploy. You can deploy the operating system to new devices, refresh existing devices, or upgrade existing devices. If:
|
||||
|
||||
- New devices or refreshing existing devices, you'll complete replace the existing operating system on a device with Windows 10.
|
||||
- Upgrading existing devices, you'll upgrade the existing operating system (the Windows 8.1 or Windows 7 operating system) to Windows 10.
|
||||
|
||||
Depending on your school’s requirements, you may need any combination of the following Windows 10 editions:
|
||||
|
||||
- **Windows 10 Home**. Use this operating system to upgrade existing eligible institution-owned and personal devices that are running Windows 8.1 Home or Windows 7 Home to Windows 10 Home.
|
||||
- **Windows 10 Pro**. Use this operating system to:
|
||||
- Upgrade existing eligible institution-owned and personal devices running Windows 8.1 Pro or Windows 7 Professional to Windows 10 Pro.
|
||||
- Deploy new instances of Windows 10 Pro to devices so that new devices have a known configuration.
|
||||
- **Windows 10 Education**. Use this operating system to:
|
||||
- Upgrade institution-owned devices to Windows 10 Education.
|
||||
- Deploy new instances of Windows 10 Education so that new devices have a known configuration.
|
||||
- **Windows 10 Pro Education**. Use this operating system to upgrade existing eligible institution-owned devices running Windows 10 Pro Education, version 1903 or later, to Windows 10 Education using [subscription activation](/windows/deployment/windows-10-subscription-activation).
|
||||
|
||||
> [!NOTE]
|
||||
> Although you can use Windows 10 Home on institution-owned devices, Microsoft recommends that you use Windows 10 Pro or Windows 10 Education, instead. Windows 10 Pro and Windows 10 Education provide support for MDM, policy-based management, and Microsoft Store for Business. These features aren't available in Windows 10 Home.
|
||||
|
||||
One other consideration is the mix of processor architectures you'll support. If you can, support only 64-bit versions of Windows 10. If you've devices that can run only 32-bit versions of Windows 10, you'll need to import both 64-bit and 32-bit versions of the Windows 10 editions listed above.
|
||||
|
||||
> [!NOTE]
|
||||
> On devices that have minimal system resources (such as devices with only 2 GB of memory or 32 GB of storage), use 32-bit versions of Windows 10 because 64-bit versions of Windows 10 place more stress on device system resources.
|
||||
|
||||
Finally, as a best practice, minimize the number of operating systems that you deploy and manage. If possible, standardize institution-owned devices on one Windows 10 edition (such as a 64-bit version of Windows 10 Education or Windows 10 Pro). You can't standardize personal devices on a specific operating system version or processor architecture.
|
||||
|
||||
### Select an image approach
|
||||
|
||||
A key operating system image decision is whether to use a “thin” or “thick” image. *Thin images* contain only the operating system, and MDT installs the necessary device drivers and apps after the operating system has been installed. *Thick images* contain the operating system, “core” apps (such as Office), and device drivers. With thick images, MDT installs any device drivers and apps not included in the thick image after the operating system has been installed.
|
||||
|
||||
The advantage to a thin image is that the final deployment configuration is dynamic, and you can easily change the configuration without having to capture another image. The disadvantage of a thin image is that it takes longer to complete the deployment.
|
||||
|
||||
The advantage of a thick image is that the deployment takes less time than it would for a thin image. The disadvantage of a thick image is that you need to capture a new image each time you want to make a change to the operating system, apps, or other software in the image.
|
||||
|
||||
### Select a method to initiate deployment
|
||||
|
||||
The MDT deployment process is highly automated, requiring minimal information to deploy or upgrade Windows 10, but you must manually initiate the MDT deployment process. To do so, use the method listed in Table 8 that best meets the needs of your institution.
|
||||
|
||||
*Table 8. Methods to initiate MDT deployment*
|
||||
|
||||
---
|
||||
| Method | Description and reason to select this method |
|
||||
| --- | --- |
|
||||
| **Windows Deployment Services** | This method:<br/><br/>- Uses diskless booting to initiate MDT deployment<br/>- Works only with devices that support PXE boot. <br/>- Deploys Windows 10 over the network, which consumes more network bandwidth than deployment from local media. <br/>-Deploys images more slowly than when using local media. <br/>- Requires that you deploy a Windows Deployment Services server. <br/><br/> Select this method when you want to deploy Windows over-the-network and perform diskless booting. The advantage of this method is that the diskless media are generic and typically don’t require updates after you create them (the Deployment Wizard accesses the centrally located deployment share over the network). The disadvantage of this method is that over-the-network deployments are slower than deployments from local media, and you must deploy a Windows Deployment Services server. |
|
||||
| **Bootable media** | This method:<br/><br/>- Initiates MDT deployment by booting from local media, including from USB drives, DVD-ROM, or CD-ROM.<br/>- Deploys Windows 10 over the network, which consumes more network bandwidth than deployment from local media. <br/>- Deploys images more slowly than when using local media. <br/>- Requires no extra infrastructure.<br/><br/>Select this method when you want to deploy Windows over-the-network and are willing to boot the target device from local media. The advantage of this method is that the media are generic and typically don’t require updates after you create them (the Deployment Wizard accesses the centrally located deployment share over the network). The disadvantage of this method is that over-the-network deployments are slower than deployment from local media. |
|
||||
| **MDT deployment media** | This method:<br/><br/>- Initiates MDT deployment by booting from a local USB hard disk.<br/>- Deploys Windows 10 from local media, which consumes less network bandwidth than over-the-network methods.<br/>- Deploys images more quickly than network-based methods do.<br/>- Requires a USB hard disk because of the deployment share’s storage requirements (up to 100 GB).<br/><br/>Select this method when you want to perform local deployments and are willing to boot the target device from a local USB hard disk. The advantage of this method is that local deployments are faster than over-the-network deployments. The disadvantage of this method is that each time you change the deployment share, you must regenerate the MDT deployment media and update the USB hard disk. |
|
||||
|
||||
---
|
||||
|
||||
### Summary
|
||||
|
||||
At the end of this section, you should know the Windows 10 editions and processor architecture that you want to deploy (and will import later in the process). You also determined whether you want to use thin or thick images. Finally, you selected the method for initiating your LTI deployment. Now, you can prepare for Windows 10 deployment.
|
||||
|
||||
## Prepare for deployment
|
||||
|
||||
To deploy Windows 10 to devices, using the LTI deployment method in MDT. In this section, you prepare your MDT environment and Windows Deployment Services for Windows 10 deployment.
|
||||
|
||||
### Configure the MDT deployment share
|
||||
|
||||
The first step in preparation for Windows 10 deployment is to configure—that is, *populate*—the MDT deployment share. Table 9 lists the MDT deployment share configuration tasks that you must perform. Perform the tasks in the order represented in Table 9.
|
||||
|
||||
*Table 9. Tasks to configure the MDT deployment share*
|
||||
|
||||
---
|
||||
| Task | Description |
|
||||
| --- | --- |
|
||||
| **1. Import operating systems** | Import the operating systems that you selected in the [Select operating systems](#select-the-operating-systems) section into the deployment share. For more information about how to import operating systems, see [Import an Operating System into the Deployment Workbench](/mem/configmgr/mdt/use-the-mdt#ImportanOperatingSystemintotheDeploymentWorkbench). |
|
||||
| **2. Import device drives** | Device drivers allow Windows 10 to know a device’s hardware resources and connected hardware accessories. Without the proper device drivers, certain features may be unavailable. For example, without the proper audio driver, a device can't play sounds; without the proper camera driver, the device can't take photos or use video chat.<br/><br/> Import device drivers for each device in your institution. For more information about how to import device drivers, see [Import Device Drivers into the Deployment Workbench](/mem/configmgr/mdt/use-the-mdt#ImportDeviceDriversintotheDeploymentWorkbench). |
|
||||
| **3. Create MDT applications for Microsoft Store apps** | Create an MDT application for each Microsoft Store app you want to deploy. You can deploy Microsoft Store apps by using <em>sideloading</em>, which allows you to use the <strong>Add-AppxPackage</strong> Windows PowerShell cmdlet to deploy the .appx files associated with the app (called <em>provisioned apps</em>). Use this method to deploy up to 24 apps to Windows 10.<br/><br/>Prior to sideloading the .appx files, obtain the Microsoft Store .appx files that you'll use to deploy (sideload) the apps in your provisioning package. For apps in Microsoft Store, you'll need to obtain the .appx files from the app software vendor directly. If you're unable to obtain the .appx files from the app software vendor, then you or the students will need to install the apps on the student devices directly from Microsoft Store or Microsoft Store for Business.<br/><br/>If you've Intune, you can deploy Microsoft Store apps after you deploy Windows 10, as described in the [Deploy apps by using Intune](#deploy-apps-by-using-intune) section. This method provides granular deployment of Microsoft Store apps, and you can use it for ongoing management of Microsoft Store apps. This method is the preferred one for deploying and managing Microsoft Store apps.<br/><br/>In addition, you must prepare your environment for sideloading (deploying) Microsoft Store apps. For more information about how to:<br/><br/>- Prepare your environment for sideloading, see [Sideload LOB apps in Windows 10](/windows/application-management/sideload-apps-in-windows-10).<br/>- Create an MDT application, see [Create a New Application in the Deployment Workbench](/mem/configmgr/mdt/use-the-mdt#CreateaNewApplicationintheDeploymentWorkbench). |
|
||||
| **4. Create MDT applications for Windows desktop apps** | You need to create an MDT application for each Windows desktop app you want to deploy. You can obtain the Windows desktop apps from any source, but ensure that you've sufficient licenses for them.<br/><br/>To help reduce the effort needed to deploy Microsoft Office 2016 desktop apps, use the Office Deployment Tool, as described in [Deploy Click-to-Run for Office 365 products by using the Office Deployment Tool](/deployoffice/deploy-microsoft-365-apps-local-source?f=255&MSPPError=-2147217396).<br/><br/>If you've Intune, you can deploy Windows desktop apps after you deploy Windows 10, as described in the [Deploy apps by using Intune](#deploy-apps-by-using-intune) section. This method provides granular deployment of Windows desktop apps, and you can use it for ongoing management of the apps. This method is the preferred one for deploying and managing Windows desktop apps.<br/><br/> You can also deploy Windows desktop apps after you deploy Windows 10, as described in the [Deploy apps by using Intune](#deploy-apps-by-using-intune) section.<br/><br/>For more information about how to create an MDT application for Windows desktop apps, see [Create a New Application in the Deployment Workbench](/mem/configmgr/mdt/use-the-mdt#CreateaNewApplicationintheDeploymentWorkbench). |
|
||||
| **5. Create task sequences.** | You must create a separate task sequence for each Windows 10 edition, processor architecture, operating system upgrade process, and new operating system deployment process. Minimally, create a task sequence for each Windows 10 operating system you imported in Step 1—for example, (1) if you want to deploy Windows 10 Education to new devices or refresh existing devices with a new deployment of Windows 10 Education; (2) if you want to upgrade existing devices running Windows 8.1 or Windows 7 to Windows 10 Education; or (3) if you want to run deployments and upgrades for both 32 bit and 64-bit versions of Windows 10. To do so, you must create task sequences that will:<br/><br/>- Deploy Windows 10 Education 64-bit to devices.<br/>- Deploy Windows 10 Education 32-bit to devices.<br/>- Upgrade existing devices to Windows 10 Education 64-bit.<br/>- Upgrade existing devices to Windows 10 Education 32-bit.<br/><br/>Again, you'll create the task sequences based on the operating systems that you imported in Step 1. For more information about how to create a task sequence, see [Create a New Task Sequence in the Deployment Workbench](/mem/configmgr/mdt/use-the-mdt#CreateaNewTaskSequenceintheDeploymentWorkbench). |
|
||||
| **6. Update the deployment share.** | Updating a deployment share generates the MDT boot images you use to initiate the Windows 10 deployment process. You can configure the process to create 32 bit and 64-bit versions of the .iso and .wim files you can use to create bootable media or in Windows Deployment Services.<br/><br/> For more information about how to update a deployment share, see [Update a Deployment Share in the Deployment Workbench](/mem/configmgr/mdt/use-the-mdt#UpdateaDeploymentShareintheDeploymentWorkbench).|
|
||||
|
||||
---
|
||||
|
||||
### Configure Windows Deployment Services for MDT
|
||||
|
||||
You can use Windows Deployment Services with MDT to automatically initiate boot images on target computers. These boot images can be Windows PE images (which you generated in Step 6 in Table 9) or custom images that can deploy operating systems directly to the target computers.
|
||||
|
||||
#### To configure Windows Deployment Services for MDT
|
||||
|
||||
1. Set up and configure Windows Deployment Services.
|
||||
|
||||
Windows Deployment Services is a server role available in all Windows Server editions. You can enable the Windows Deployment Services server role on a new server or on any server running Windows Server in your institution. For more information about how to perform this step, see the following resources:
|
||||
|
||||
- [Windows Deployment Services overview](/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/hh831764(v=ws.11))
|
||||
- The Windows Deployment Services Help file, included in Windows Deployment Services
|
||||
- [Windows Deployment Services Getting Started Guide for Windows Server 2012](/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/jj648426(v=ws.11))
|
||||
|
||||
2. Add LTI boot images (Windows PE images) to Windows Deployment Services.
|
||||
|
||||
The LTI boot images (.wim files) that you'll add to Windows Deployment Services are in the MDT deployment share. Locate the .wim files in the Boot subfolder in the deployment share. For more information about how to perform this step, see [Add LTI Boot Images to Windows Deployment Services](/mem/configmgr/mdt/use-the-mdt#AddLTIBootImagestoWindowsDeploymentServices).
|
||||
|
||||
### Summary
|
||||
|
||||
Now, Windows Deployment Services is ready to initiate the LTI deployment process in MDT. You've set up and configured Windows Deployment Services and added the LTI boot images, which you generated in the previous section, to Windows Deployment Services. Now, you’re ready to prepare to manage the devices in your institution.
|
||||
|
||||
## Prepare for device management
|
||||
|
||||
Before you deploy Windows 10 in your institution, you must prepare for device management. You'll deploy Windows 10 in a configuration that complies with your requirements, but you want to help ensure that your deployments remain compliant.
|
||||
|
||||
### Select the management method
|
||||
|
||||
If you've only one device to configure, manually configuring that one device is tedious but possible. When you've multiple classrooms of devices to configure, however, manually configuring each device becomes overwhelming. In addition, manually keeping an identical configuration on each device is difficult as the number of devices in the school increases.
|
||||
|
||||
For a school, there are many ways to manage devices. Table 10 lists the methods that this guide describes and recommends. Use the information in Table 10 to determine which combination of management methods is right for your institution.
|
||||
|
||||
*Table 10. School management methods*
|
||||
|
||||
---
|
||||
| Method | Description |
|
||||
| --- | --- |
|
||||
| **Group Policy** | Group Policy is an integral part of AD DS and allows you to specify configuration settings for Windows 10 and previous versions of Windows. Select this method when you: <br/><br/>- Want to manage institution-owned devices that are domain joined (personally owned devices are typically not domain joined).<br/>- Want more granular control of device and user settings.<br/>- Have an existing AD DS infrastructure.<br/>- Typically manage on-premises devices.<br/>- Can manage a required setting only by using Group Policy.<br/><br/>The advantages of this method include:<br/><br/>- No cost beyond the AD DS infrastructure.<br/>- A larger number of settings.<br/><br/>The disadvantages of this method are:<br/><br/>- Can only manage domain-joined (institution-owned devices).<br/>- Requires an AD DS infrastructure (if the institution doesn't have AD DS already).<br/>- Typically manages on-premises devices (unless devices connect by using a VPN or DirectAccess). |
|
||||
| **Intune** | Intune is a cloud-based management system that allows you to specify configuration settings for Windows 10 and other operating systems, such as iOS/iPadOS, macOS, and Android. Intune is a subscription-based cloud service that integrates with Microsoft 365 and Azure AD.<br/><br/>Select this method when you:<br/><br/>- Want to manage institution-owned and personal devices (doesn't require that the device be domain joined).<br/>- Don’t require the level of granular control over device and user settings (compared to Group Policy).<br/>- Don’t have an existing AD DS infrastructure.<br/>- Need to manage devices regardless of where they are (on or off premises).<br/>- Can manage a required setting only by using Intune.<br/><br/>The advantages of this method are:<br/><br/>- You can manage institution-owned and personal devices.<br/>- It doesn’t require that devices be domain joined.<br/>- It doesn’t require any on-premises infrastructure.<br/>- It can manage devices regardless of their location (on or off premises).<br/><br/>The disadvantages of this method are:<br/><br/>- Carries an extra cost for subscription.<br/>- Doesn’t have a granular level control over device and user settings (compared to Group Policy). |
|
||||
|
||||
---
|
||||
|
||||
### Select Microsoft-recommended settings
|
||||
|
||||
Microsoft has several recommended settings for educational institutions. Table 11 lists them, provides a brief description of why you need to configure them, and recommends methods for configuring the settings. Review the settings in Table 11 and evaluate their relevancy to your institution. Use the information to help you determine whether you need to configure the setting and which method you'll use to do so. At the end, you'll have a list of settings that you want to apply to the Windows 10 devices and know which management method you'll use to configure the settings.
|
||||
|
||||
*Table 11. Recommended settings for educational institutions*
|
||||
|
||||
---
|
||||
| Recommendation | Description |
|
||||
| --- | --- |
|
||||
| **Use of Microsoft accounts** | You want faculty and students to use only Azure AD accounts for institution-owned devices. For these devices, don't use Microsoft accounts or associate a Microsoft account with the Azure AD accounts.<br/><br/>Personal devices typically use Microsoft accounts. Faculty and students can associate their Microsoft account with their Azure AD account on these devices.<br/><br/>**Group Policy**: Configure the [Accounts: Block Microsoft accounts](/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/jj966262(v=ws.11)?amp;MSPPError=-2147217396&f=255) Group Policy setting to use the Users can’t add Microsoft accounts setting option.<br/><br/>**Intune**: Enable or disable Microsoft accounts by using the **Allow Microsoft account**, **Allow adding non-Microsoft accounts manually**, and **Allow settings synchronization for Microsoft accounts** policy settings under the **Accounts and Synchronization** section of a **Windows 10 General Configuration** policy. |
|
||||
| **Restrict local administrator accounts on the devices** | Ensure that only authorized users are local administrators on institution-owned devices. Typically, you don’t want students to be administrators on instruction-owned devices. Explicitly specify the users who will be local administrators on a group of devices.<br/><br/>**Group Policy**: Create a **Local Group** Group Policy preference to limit the local administrators group membership. Select the **Delete all member users** and **Delete all member groups** check boxes to remove any existing members. For more information about how to configure Local Group preferences, see [Configure a Local Group Item](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc732525(v=ws.11)).<br/><br/>**Intune**: Not available |
|
||||
| **Manage the built-in administrator account created during device deployment** | When you use MDT to deploy Windows 10, the MDT deployment process automatically creates a local Administrator account with the password you specified. As a security best practice, rename the built-in Administrator account and optionally disable it.<br/><br/>**Group Policy**: Rename the built-in Administrator account by using the **Accounts: Rename administrator account** Group Policy setting. For more information about how to rename the built-in Administrator account, see [To rename the Administrator account using the Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-essentials-sbs/cc747484(v=ws.10)). You'll specify the new name for the Administrator account. You can disable the built-in Administrator account by using the **Accounts: Administrator account status** Group Policy setting. For more information about how to disable the built-in Administrator account, see [Accounts: Administrator account status](/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/jj852165(v=ws.11)).<br/><br/>**Intune**: Not available. |
|
||||
| **Control Microsoft Store access** | You can control access to Microsoft Store and whether existing Microsoft Store apps receive updates. You can only disable the Microsoft Store app in Windows 10 Education and Windows 10 Enterprise.<br/><br/>**Group Policy**: You can disable the Microsoft Store app by using the **Turn off the Store Application** Group Policy setting. You can prevent Microsoft Store apps from receiving updates by using the **Turn off Automatic Download and Install of updates** Group Policy setting. For more information about configuring these settings, see [Can I use Group Policy to control the Microsoft Store in my enterprise environment?](/previous-versions/windows/it-pro/windows-8.1-and-8/hh832040(v=ws.11)#BKMK_UseGP).<br/><br/>**Intune**: You can enable or disable the camera by using the **Allow application store** policy setting in the **Apps** section of a **Windows 10 General Configuration** policy. |
|
||||
| **Use of Remote Desktop connections to devices** | Remote Desktop connections could allow unauthorized access to the device. Depending on your institution’s policies, you may want to disable Remote Desktop connections on your devices.<br/><br/>**Group Policy**: You can enable or disable Remote Desktop connections to devices by using the **Allow Users to connect remotely using Remote Desktop setting** in Computer Configuration\Policies\Administrative Templates\Windows Components\Remote Desktop Services\Remote Desktop Session Host\Connections.<br/><br/>**Intune**: Not available. |
|
||||
| **Use of camera** | A device’s camera can be a source of disclosure or privacy issues in an education environment. Depending on your institution’s policies, you may want to disable the camera on your devices.<br/><br/>**Group Policy**: Not available.<br/><br/>**Intune**: You can enable or disable the camera by using the **Allow camera** policy setting in the **Hardware** section of a **Windows 10 General Configuration** policy. |
|
||||
| **Use of audio recording** | Audio recording (by using the Sound Recorder app) can be a source of disclosure or privacy issues in an education environment. Depending on your institution’s policies, you may want to disable the Sound Recorder app on your devices.<br/><br/>**Group Policy**: You can disable the Sound Recorder app by using the **Do not allow Sound Recorder to run** Group Policy setting. You can disable other audio recording apps by using AppLocker policies. Create AppLocker policies by using the information in [Editing an AppLocker Policy](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/ee791894(v=ws.10)) and [Create Your AppLocker Policies](/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/ee791899(v=ws.11))<br/><br/>**Intune**: You can enable or disable the camera by using the **Allow voice recording** policy setting in the **Features** section of a **Windows 10 General Configuration** policy. |
|
||||
| **Use of screen capture** | Screen captures can be a source of disclosure or privacy issues in an education environment. Depending on your institution’s policies, you may want to disable the ability to perform screen captures on your devices.<br/><br/>**Group Policy**: Not available.<br/><br/>**Intune**: You can enable or disable the camera by using the **Allow screen capture** policy setting in the **System** section of a **Windows 10 General Configuration** policy. |
|
||||
| **Use of location services** | Providing a device’s location can be a source of disclosure or privacy issues in an education environment. Depending on your institution’s policies, you may want to disable the location service on your devices.<br/><br/>**Group Policy**: You can enable or disable location services by using the **Turn off location** Group Policy setting in User Configuration\Windows Components\Location and Sensors.<br/><br/>**Intune**: You can enable or disable the camera by using the **Allow geolocation** policy setting in the **Hardware** section of a **Windows 10 General Configuration** policy. |
|
||||
| **Changing wallpaper** | Displaying a custom wallpaper can be a source of disclosure or privacy issues in an education environment (if the wallpaper displays information about the user or the device). Depending on your institution’s policies, you may want to prevent users from changing the wallpaper on your devices.<br/><br/>**Group Policy**: You can configure the wallpaper by using the **Desktop WallPaper** setting in User Configuration\Administrative Templates\Desktop\Desktop.<br/><br/>**Intune**: Not available. |
|
||||
|
||||
---
|
||||
|
||||
### Configure settings by using Group Policy
|
||||
|
||||
Now, you’re ready to configure settings by using Group Policy. The steps in this section assume that you've an AD DS infrastructure. You'll configure the Group Policy settings you select in the [Select Microsoft-recommended settings](#select-microsoft-recommended-settings) section.
|
||||
|
||||
For more information about Group Policy, see [Group Policy Planning and Deployment Guide](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc754948(v=ws.10)).
|
||||
|
||||
#### To configure Group Policy settings
|
||||
|
||||
1. Create a Group Policy object (GPO) that will contain the Group Policy settings by completing the steps in [Create a new Group Policy object](/previous-versions/windows/it-pro/windows-server-2003/cc738830(v=ws.10)).
|
||||
2. Configure the settings in the GPO by completing the steps in [Edit a Group Policy object](/previous-versions/windows/it-pro/windows-server-2003/cc739902(v=ws.10)).
|
||||
3. Link the GPO to the appropriate AD DS site, domain, or organizational unit by completing the steps in [Link a Group Policy object to a site, domain, or organizational unit](/previous-versions/windows/it-pro/windows-server-2003/cc738954(v=ws.10)).
|
||||
|
||||
### Configure settings by using Intune
|
||||
|
||||
Now, you’re ready to configure settings using Intune. The steps in this section assume that you've an Office 365 subscription. You'll configure the Intune settings that you selected in the [Select Microsoft-recommended settings](#select-microsoft-recommended-settings) section.
|
||||
|
||||
For more information about Intune, see [Documentation for Microsoft Intune](/mem/intune/).
|
||||
|
||||
#### To configure Intune settings
|
||||
|
||||
1. Check your Intune licensing. If you've a Microsoft 365 subscription, you may already have Intune. For more information, see [Microsoft Intune licensing](/mem/intune/fundamentals/licenses).
|
||||
2. Enroll devices in Microsoft Intune. For more information on your enrollment options, see [Intune enrollment methods for Windows devices](/mem/intune/enrollment/windows-enrollment-methods).
|
||||
3. Configure the [compliance settings](/mem/intune/protect/device-compliance-get-started) and [configuration settings](/mem/intune/configuration/device-profiles) that meet your school system's needs.
|
||||
4. Use the reporting features in Intune to monitor devices. For more information, see [Intune reports](/mem/intune/fundamentals/reports).
|
||||
|
||||
### Deploy apps by using Intune
|
||||
|
||||
You can use Intune to deploy apps to Android, iOS/iPadOS, macOS, and Windows devices. You can manage app security and features on organization-owned devices and personal devices.
|
||||
|
||||
For more information about how to configure Intune to manage your apps, see:
|
||||
|
||||
- [What is Microsoft Intune app management?](/mem/intune/apps/app-management)
|
||||
- [App protection policies overview](/mem/intune/apps/app-protection-policy)
|
||||
|
||||
### Summary
|
||||
|
||||
In this section, you prepared your institution for device management. You determined whether you want to use Group Policy or Intune to manage your devices. You identified the configuration settings that you want to use to manage your users and devices. Finally, you configured the Group Policy and Intune settings in Group Policy and Intune, respectively.
|
||||
|
||||
## Deploy Windows 10 to devices
|
||||
|
||||
You’re ready to deploy Windows 10 to faculty and student devices. You must complete the steps in this section for each student device in the classrooms and for any new student devices you add in the future. You can also perform these actions for any device that’s eligible for a Windows 10 upgrade. This section discusses deploying Windows 10 to new devices, refreshing Windows 10 on existing devices, and upgrading existing devices that are running eligible versions of Windows 8.1 or Windows to Windows 10.
|
||||
|
||||
### Prepare for deployment
|
||||
|
||||
Prior to deployment of Windows 10, ensure that you complete the tasks listed in Table 12. Most of these tasks are already complete, but use this step to make sure.
|
||||
|
||||
*Table 12. Deployment preparation checklist*
|
||||
|
||||
---
|
||||
| Tasks |
|
||||
|-------|
|
||||
| The target devices have sufficient system resources to run Windows 10. |
|
||||
| Identify the necessary devices drivers, and import them to the MDT deployment share. |
|
||||
| Create an MDT application for each Microsoft Store and Windows desktop app. |
|
||||
| Notify the students and faculty about the deployment. |
|
||||
|
||||
---
|
||||
|
||||
### Perform the deployment
|
||||
|
||||
Use the Deployment Wizard to deploy Windows 10. The LTI deployment process is almost fully automated: You provide only minimal information to the Deployment Wizard at the beginning of the process. After the wizard collects the necessary information, the remainder of the process is fully automated.
|
||||
|
||||
> [!NOTE]
|
||||
> To fully automate the LTI deployment process, complete the steps in the “Fully Automated LTI Deployment Scenario” section in the [Microsoft Deployment Toolkit Samples Guide](/mem/configmgr/mdt/samples-guide).
|
||||
|
||||
In most instances, deployments occur without incident. Only in rare occasions do deployments experience problems.
|
||||
|
||||
#### To deploy Windows 10
|
||||
|
||||
1. **Initiate the LTI deployment process**. Initiate the LTI deployment process booting over the network (PXE boot) or from local media. You selected the method for initiating the LTI deployment process in the [Select a method to initiate deployment](#select-a-method-to-initiate-deployment) section earlier in this guide.
|
||||
2. **Complete the Deployment Wizard**. For more information about how to complete the Deployment Wizard, see the “Running the Deployment Wizard” topic in [Using the Microsoft Deployment Toolkit](/mem/configmgr/mdt/use-the-mdt#Running%20the%20Deployment%20Wizard).
|
||||
|
||||
### Set up printers
|
||||
|
||||
After you've deployed Windows 10, the devices are almost ready for use. First, you must set up the printers that each classroom will use. Typically, you connect the printers to the same network as the devices in the same classroom. If you don’t have printers in your classrooms, skip this section and proceed to the [Verify deployment](#verify-deployment) section.
|
||||
|
||||
> [!NOTE]
|
||||
> If you’re performing an upgrade instead of a new deployment, the printers remain configured as they were in the previous version of Windows. As a result, you can skip this section and proceed to the [Verify deployment](#verify-deployment) section.
|
||||
|
||||
#### To set up printers
|
||||
|
||||
1. Review the printer manufacturer’s instructions for installing the printer drivers.
|
||||
2. On the admin device, download the printer drivers.
|
||||
3. Copy the printer drivers to a USB drive.
|
||||
4. On a device, use the same account you used to set up Windows 10 in the [Perform the deployment](#perform-the-deployment) section to sign in to the device.
|
||||
5. Insert the USB drive in the device.
|
||||
6. Follow the printer manufacturer’s instructions to install the printer drivers from the USB drive.
|
||||
7. Verify that the printer drivers were installed correctly by printing a test page.
|
||||
8. Complete steps 1–8 for each printer.
|
||||
|
||||
### Verify deployment
|
||||
|
||||
As a final quality control step, verify the device configuration to ensure that all apps run. Microsoft recommends that you perform all the tasks that the user would perform. Specifically, verify the following requirements:
|
||||
|
||||
- The device can connect to the Internet and view the appropriate web content in Microsoft Edge.
|
||||
- Windows Update is active and current with software updates.
|
||||
- Windows Defender is active and current with malware Security intelligence.
|
||||
- Windows Defender SmartScreen is active.
|
||||
- All Microsoft Store apps are properly installed and updated.
|
||||
- All Windows desktop apps are properly installed and updated.
|
||||
- Printers are properly configured.
|
||||
|
||||
When you've verified that the first device is properly configured, you can move to the next device and perform the same steps.
|
||||
|
||||
### Summary
|
||||
|
||||
You prepared the devices for deployment by verifying that they have adequate system resources and that the resources in the devices have corresponding Windows 10 device drivers. You performed device deployment over the network or by using local MDT media. Next, you configured the appropriate printers on the devices. Finally, you verified that the devices are properly configured and ready for use.
|
||||
|
||||
## Maintain Windows devices and Office 365
|
||||
|
||||
After the initial deployment, you'll need to perform certain tasks to maintain the Windows 10 devices and your Office 365 Education subscription. You should perform these tasks on the following schedule:
|
||||
|
||||
- **Monthly.** These tasks help ensure that the devices are current with software updates and properly protected against viruses and malware.
|
||||
- **New semester or academic year.** Perform these tasks prior to the start of a new curriculum—for example, at the start of a new academic year or semester. These tasks help ensure that the classroom environments are ready for the next group of students.
|
||||
- **As required (ad hoc).** Perform these tasks as necessary in a classroom. For example, a new version of an app may be available, or a student may inadvertently corrupt a device so that you must restore it to the default configuration.
|
||||
|
||||
Table 13 lists the school and individual classroom maintenance tasks, the resources for performing the tasks, and the schedule (or frequency) on which you should perform the tasks.
|
||||
|
||||
*Table 13. School and individual classroom maintenance tasks, with resources and the schedule for performing them*
|
||||
|
||||
---
|
||||
| Task and resources | Monthly | New semester or academic year | As required |
|
||||
| --- | --- | --- | --- |
|
||||
| Verify that Windows Update is active and current with operating system and software updates.<br/><br/>For more information about completing this task, see:<br/><br/>- Intune: See [Keep Windows PCs up to date with software updates in Microsoft Intune](https://www.microsoft.com/en-us/insidetrack/keeping-windows-10-devices-up-to-date-with-microsoft-intune-and-windows-update-for-business)<br/>- Group Policy: See [Windows Update for Business](/windows/deployment/update/waas-manage-updates-wufb)<br/>- Windows Server Update Services (WSUS): See [Deploy Windows Server Update Services](/windows-server/administration/windows-server-update-services/deploy/deploy-windows-server-update-services)<br/>- Neither Intune, Group Policy, or WSUS: See [Update Windows](https://support.microsoft.com/windows/update-windows-3c5ae7fc-9fb6-9af1-1984-b5e0412c556a). | ✔️ | ✔️ | ✔️ |
|
||||
| Verify that Windows Defender is active and current with malware Security intelligence.<br/><br/>For more information, see [Enforce compliance for Microsoft Defender for Endpoint with Conditional Access in Intune](/mem/intune/protect/advanced-threat-protection) and [Enable and configure Microsoft Defender Antivirus always-on protection in Group Policy](/microsoft-365/security/defender-endpoint/configure-real-time-protection-microsoft-defender-antivirus)). | ✔️ | ✔️ | ✔️ |
|
||||
| Verify that Windows Defender has run a scan in the past week and that no viruses or malware were found.<br/><br/>For more information about completing this task, see [Protect my PC from viruses](https://support.microsoft.com/windows/protect-my-pc-from-viruses-b2025ed1-02d5-1e87-ba5f-71999008e026). | ✔️ | ✔️ | ✔️ |
|
||||
| Verify that you're using the appropriate Windows 10 servicing options for updates and upgrades (such as selecting whether you want to use Current Branch or Current Branch for Business).<br/><br/> For more information about Windows 10 servicing options for updates and upgrades, see [Windows 10 servicing options for updates and upgrades](/windows/deployment/update/). | | ✔️ | ✔️ |
|
||||
| Refresh the operating system and apps on devices.<br/><br/>For more information about completing this task, see the [Deploy Windows 10 to devices](#deploy-windows-10-to-devices) section. | | ✔️ | ✔️ |
|
||||
| Install any new Windows desktop apps or update any Windows desktop apps that are used in the curriculum.<br/><br/>For more information, see the [Deploy apps by using Intune](#deploy-apps-by-using-intune) section. | | ✔️ | ✔️ |
|
||||
| Install new or update existing Microsoft Store apps that are used in the curriculum.<br/><br/>Microsoft Store apps are automatically updated from Microsoft Store. The menu bar in the Microsoft Store app shows whether any Microsoft Store app updates are available for download.<br/><br/>You can also deploy Microsoft Store apps directly to devices by using Intune. For more information, see the [Deploy apps by using Intune](#deploy-apps-by-using-intune) section. | | ✔️ | ✔️ |
|
||||
| Remove unnecessary user accounts (and corresponding licenses) from Office 365.<br/><br/>For more information, see:<br/><br/>- Remove unnecessary user accounts, see [Delete a user from your organization](/microsoft-365/admin/add-users/delete-a-user).<br/>- Unassign licenses, see [Add users and assign licenses at the same time](/microsoft-365/admin/add-users/add-users). | | ✔️ | ✔️ |
|
||||
| Add new accounts (and corresponding licenses) to Office 365.<br/><br/>For more information, see [Add users and assign licenses at the same time](/microsoft-365/admin/add-users/add-users) and [Assign licenses to users](/microsoft-365/admin/manage/assign-licenses-to-users). | | ✔️ | ✔️ |
|
||||
| Create or modify security groups and manage group membership in Office 365.<br/><br/>For more information, see:<br/><br/>- [Create a group in the Microsoft 365 admin center](/microsoft-365/admin/create-groups/create-groups)<br/>- [Add or remove members from Microsoft 365 groups using the admin center](/microsoft-365/admin/create-groups/add-or-remove-members-from-groups) | | ✔️ | ✔️ |
|
||||
| Create or modify Exchange Online or Microsoft Exchange Server distribution lists in Office 365.<br/><br/>For more information, see [Create and manage distribution list groups in Exchange Online](/exchange/recipients-in-exchange-online/manage-distribution-groups/manage-distribution-groups) and [Create, edit, or delete a security group in the Microsoft 365 admin center](/microsoft-365/admin/email/create-edit-or-delete-a-security-group) | | ✔️ | ✔️ |
|
||||
| Install new student devices<br/><br/>Follow the same steps in the [Deploy Windows 10 to devices](#deploy-windows-10-to-devices) section. | | | ✔️ |
|
||||
|
||||
---
|
||||
|
||||
### Summary
|
||||
|
||||
Now, you've identified the tasks you need to perform monthly, at the end of an academic year or semester, and as required. Your school configuration should match the typical school configuration that you saw in the [Plan a typical school configuration](#plan-a-typical-school-configuration) section. By running these maintenance tasks, you help ensure that your school stays secure and is configured as you specified.
|
||||
|
||||
## Related resources
|
||||
|
||||
- [Try it out: Windows 10 deployment (for educational institutions)](../index.yml)
|
||||
- [Try it out: Windows 10 in the classroom](../index.yml)
|
||||
- [Chromebook migration guide](/education/windows/chromebook-migration-guide)
|
@ -1,92 +0,0 @@
|
||||
---
|
||||
title: Windows 10 for Education
|
||||
description: Learn how to use Windows 10 in schools.
|
||||
ms.topic: how-to
|
||||
ms.date: 08/10/2022
|
||||
appliesto:
|
||||
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 10</a>
|
||||
---
|
||||
|
||||
# Windows 10 for Education
|
||||
|
||||
## Learn
|
||||
|
||||
**[Windows 10 editions for education customers](windows-editions-for-education-customers.md)**
|
||||
|
||||
Windows 10, version 1607 introduces two editions designed for the unique needs of K-12 institutions: Windows 10 Pro Education and Windows 10 Education. These editions provide education-specific default settings for the evolving landscape in K-12 education IT environments.
|
||||
|
||||
**[Compare each Windows edition](https://www.microsoft.com/WindowsForBusiness/Compare)**
|
||||
|
||||
Find out more about the features and functionality we support in each edition of Windows.
|
||||
|
||||
**[Get Windows 10 Education or Windows 10 Pro Education](https://www.microsoft.com/education/buy-license/overview-of-how-to-buy/default.aspx?tabshow=schools)**
|
||||
|
||||
When you've made your decision, find out how to buy Windows for your school.
|
||||
|
||||
## Plan
|
||||
|
||||
**[Windows 10 configuration recommendations for education customers](configure-windows-for-education.md)**
|
||||
|
||||
Provides guidance on ways to customize the OS diagnostic data, consumer experiences, Cortana, search, and some of the preinstalled apps, so that Windows is ready for your school.
|
||||
|
||||
**[Deployment recommendations for school IT administrators](edu-deployment-recommendations.md)**
|
||||
|
||||
Learn how to customize the OS privacy settings, Skype, and Xbox for Windows-based devices used in schools so that you can choose what information is shared with Microsoft.
|
||||
|
||||
**[Get Minecraft Education Edition](get-minecraft-for-education.md)**
|
||||
|
||||
Minecraft Education Edition is built for learning. Learn how to get early access and add it to your Microsoft Store for Business for distribution.
|
||||
|
||||
**[Take tests in Windows](take-tests-in-windows.md)**
|
||||
|
||||
Take a Test is a new app that lets you create the right environment for taking tests. Learn how to use and get it set up.
|
||||
|
||||
**[Chromebook migration guide](chromebook-migration-guide.md)**
|
||||
|
||||
Find out how you can migrate a Chromebook-based learning environment to a Windows 10-based learning environment.
|
||||
|
||||
## Deploy
|
||||
|
||||
**[Set up Windows devices for education](set-up-windows-10.md)**
|
||||
|
||||
Depending on your school's device management needs, you can use the Set up School PCs app or the Windows Configuration Designer tool to quickly set up student PCs.
|
||||
|
||||
**[Deploy Windows 10 in a school](deploy-windows-10-in-a-school.md)**
|
||||
|
||||
Get step-by-step guidance to help you deploy Windows 10 in a school environment.
|
||||
|
||||
**[Deploy Windows 10 in a school district](deploy-windows-10-in-a-school-district.md)**
|
||||
|
||||
Get step-by-step guidance on how to deploy Windows 10 to PCs and devices across a school district.
|
||||
|
||||
**[Test Windows 10 S on existing Windows 10 education devices](test-windows10s-for-edu.md)**
|
||||
|
||||
Test Windows 10 S on various Windows 10 devices (except Windows 10 Home) in your school and share your feedback with us.
|
||||
|
||||
## Switch
|
||||
|
||||
**[Switch to Windows 10 Pro Education from Windows 10 Pro or Windows 10 S](change-to-pro-education.md)**
|
||||
|
||||
If you have an education tenant and use Windows 10 Pro or Windows 10 S in your schools, find out how you can opt-in to a free switch to Windows 10 Pro Education.
|
||||
|
||||
## Windows 8.1
|
||||
|
||||
Follow these links to find step-by-step guidance on how to deploy Windows 8.1 in an academic environment.
|
||||
|
||||
<p><b><a href="/previous-versions/windows/it-pro/windows-8.1-and-8/dn645509(v=ws.11)" target="_blank">Windows 8.1 deployment planning</a></b><br />Explore key considerations and questions that should be answered when planning for Windows 8.1 deployment.</p>
|
||||
<p><b><a href="/previous-versions/windows/it-pro/windows-8.1-and-8/dn645528(v=ws.11)" target="_blank">Windows 8.1 deployment to PCs</a></b><br />Get an overview of Windows 8.1 deployment to PCs in an educational environment.</p>
|
||||
<p><b><a href="/previous-versions/windows/it-pro/windows-8.1-and-8/dn645510(v=ws.11)" target="_blank">BYOD</a></b><br />Explore Bring Your Own Device (BYOD) considerations, including device types, infrastructure, and deployment models.</p>
|
||||
<p><b><a href="/previous-versions/windows/it-pro/windows-8.1-and-8/dn645488(v=ws.11)" target="_blank">Deploying Windows RT 8.1</a></b><br />Get step-by-step instructions on how to configure and deploy Windows RT devices (like Surface and other tablets) in educational environments.</p>
|
||||
<p><b><a href="/previous-versions/windows/it-pro/windows-8.1-and-8/dn645483(v=ws.11)" target="_blank">Virtual Desktop Infrastructure</a></b><br />Learn how to address challenges related to BYOD scenarios using Virtual Desktop Infrastructure (VDI).</p>
|
||||
<p><b><a href="/previous-versions/windows/it-pro/windows-8.1-and-8/dn645532(v=ws.11)" target="_blank">Microsoft Store apps</a></b><br />Explore Microsoft Store app deployment strategies and considerations for educational institutions running Windows 8.1.</p>
|
||||
<p><b><a href="/previous-versions/windows/it-pro/windows-8.1-and-8/dn645486(v=ws.11)" target="_blank">Windows To Go</a></b><br />Learn about the benefits, limitations, and processes involved in deploying Windows To Go.</p>
|
||||
|
||||
## Related articles
|
||||
|
||||
- [Microsoft Education documentation and resources](/education)
|
||||
- [Windows for business](https://www.microsoft.com/windows/business)
|
||||
- [Microsoft 365 for business](https://www.microsoft.com/microsoft-365/business)
|
||||
|
||||
<!--
|
||||
<p><b><a href="/education/" target="_blank">Try it out: Windows 10 deployment (for education)</a></b><br />Learn how to upgrade devices running the Windows 7 operating system to Windows 10 Anniversary Update, and how to manage devices, apps, and users in Windows 10 Anniversary Update.<br /><br />For the best experience, use this guide in tandem with the <a href="https://vlabs.holsystems.com/vlabs/technet?eng=VLabs&auth=none&src=vlabs&altadd=true&labid=20949&lod=true" target="_blank">TechNet Virtual Lab: IT Pro Try-It-Out</a>.</p>
|
||||
-->
|
@ -1,21 +1,17 @@
|
||||
---
|
||||
title: Configure Stickers for Windows 11 SE
|
||||
description: Learn about the Stickers feature and how to configure it via Intune and provisioning package.
|
||||
ms.date: 09/15/2022
|
||||
ms.date: 11/09/2023
|
||||
ms.topic: how-to
|
||||
appliesto:
|
||||
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 11 SE</a>
|
||||
ms.collection:
|
||||
- highpri
|
||||
- education
|
||||
- tier2
|
||||
---
|
||||
|
||||
# Configure Stickers for Windows 11 SE
|
||||
|
||||
Starting in **Windows 11 SE, version 22H2**, *Stickers* is a new feature that allows students to decorate their desktop with digital stickers. Students can choose from over 500 cheerful, education-friendly digital stickers. Stickers can be arranged, resized, and customized on top of the desktop background. Each student's stickers remain, even when the background changes.
|
||||
Starting in **Windows 11 SE, version 22H2**, *Stickers* is a feature that allows students to decorate their desktop with digital stickers. Students can choose from over 500 cheerful, education-friendly digital stickers. Stickers can be arranged, resized, and customized on top of the desktop background. Each student's stickers remain, even when the background changes.
|
||||
|
||||
Similar to the [education theme packs](edu-themes.md "my tooltip example that opens in a new tab"), Stickers is a personalization feature that helps the device feel like it was designed for students.
|
||||
Similar to the [education theme packs](edu-themes.md), Stickers is a personalization feature that helps the device feel like it was designed for students.
|
||||
|
||||
:::image type="content" source="./images/win-11-se-stickers.png" alt-text="Windows 11 SE desktop with 3 stickers" border="true":::
|
||||
|
||||
@ -35,9 +31,9 @@ Stickers aren't enabled by default. Follow the instructions below to configure y
|
||||
|
||||
[!INCLUDE [intune-custom-settings-1](../../includes/configure/intune-custom-settings-1.md)]
|
||||
|
||||
| Setting |
|
||||
|--------|
|
||||
| <li> OMA-URI: **`./Vendor/MSFT/Policy/Config/Stickers/EnableStickers`** </li><li>Data type: **Integer** </li><li>Value: **1**</li>|
|
||||
| Setting |
|
||||
|--------|
|
||||
| <li> OMA-URI: **`./Vendor/MSFT/Policy/Config/Stickers/EnableStickers`** </li><li>Data type: **Integer** </li><li>Value: **1**</li>|
|
||||
|
||||
[!INCLUDE [intune-custom-settings-2](../../includes/configure/intune-custom-settings-2.md)]
|
||||
[!INCLUDE [intune-custom-settings-info](../../includes/configure/intune-custom-settings-info.md)]
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Configure Take a Test in kiosk mode
|
||||
description: Learn how to configure Windows to execute the Take a Test app in kiosk mode, using Intune and provisioning packages.
|
||||
ms.date: 09/30/2022
|
||||
ms.date: 11/08/2023
|
||||
ms.topic: how-to
|
||||
---
|
||||
|
||||
@ -199,7 +199,7 @@ To create a local account, and configure Take a Test in kiosk mode using the Set
|
||||
:::image type="content" source="./images/takeatest/login-screen-take-a-test-single-pc.png" alt-text="Windows 11 SE login screen with the take a test account." border="true":::
|
||||
|
||||
> [!NOTE]
|
||||
> To sign-in with a local account on a device that is joined to Azure AD or Active Directory, you must prefix the username with either `<computername>\` or `.\`.
|
||||
> To sign-in with a local account on a device that is joined to Microsoft Entra ID or Active Directory, you must prefix the username with either `<computername>\` or `.\`.
|
||||
|
||||
---
|
||||
|
||||
|
@ -13,66 +13,71 @@ ms.collection:
|
||||
|
||||
# Configure federated sign-in for Windows devices
|
||||
|
||||
Starting in Windows 11 SE, version 22H2 and Windows 11 Pro Edu/Education, version 22H2 with [KB5022913][KB-1], you can enable your users to sign-in using a federated identity provider (IdP) via web sign-in.\
|
||||
This feature is called *federated sign-in*.\
|
||||
Federated sign-in is a great way to simplify the sign-in process for your users: instead of having to remember a username and password defined in Azure AD, they can sign-in using their existing credentials from the IdP. For example, students and educators can use QR code badges to sign-in.
|
||||
Starting in Windows 11 SE, version 22H2 and Windows 11 Pro Edu/Education, version 22H2 with [KB5022913][KB-1], you can enable your users to sign-in using a federated identity provider (IdP) via a web sign-in experience.
|
||||
Signing in with a federated identity can be a great way to simplify the sign-in process for your users: instead of having to remember a username and password defined in Microsoft Entra ID, they can sign-in using their existing credentials from the IdP. For example, students and educators can use QR code badges to sign-in.
|
||||
|
||||
## Benefits of federated sign-in
|
||||
|
||||
Federated sign-in enables students to sign-in in less time, and with less friction.
|
||||
A federated sign-in experience enables students to sign-in in less time, and with less friction.
|
||||
With fewer credentials to remember and a simplified sign-in process, students are more engaged and focused on learning.
|
||||
|
||||
There are two Windows features that enable a federated sign-in experience:
|
||||
|
||||
- *Federated sign-in*, which is designed for 1:1 student devices. For an optimal experience, you should not enable federated sign-in on shared devices
|
||||
- *Web sign-in*, which provides a similar experience to *Federated sign-in*, and can be used for shared devices
|
||||
|
||||
> [!IMPORTANT]
|
||||
> Currently, this feature is designed for 1:1 devices. For an optimal experience, you should not enable federated sign-in on shared devices.
|
||||
> *Federated sign-in* and *Web sign-in* require different configurations, which are explained in this document.
|
||||
|
||||
## Prerequisites
|
||||
|
||||
To implement federated sign-in, the following prerequisites must be met:
|
||||
To enable a federated sign-in experience, the following prerequisites must be met:
|
||||
|
||||
1. An Azure AD tenant, with one or multiple domains federated to a third-party IdP. For more information, see [What is federation with Azure AD?][AZ-1] and [Use a SAML 2.0 IdP for Single Sign On][AZ-4]
|
||||
1. A Microsoft Entra tenant, with one or multiple domains federated to a third-party IdP. For more information, see [What is federation with Microsoft Entra ID?][AZ-1] and [Use a SAML 2.0 IdP for Single Sign On][AZ-4]
|
||||
>[!NOTE]
|
||||
>If your organization uses a third-party federation solution, you can configure single sign-on to Azure Active Directory if the solution is compatible with Azure Active Directory. For questions regarding compatibility, contact your identity provider. If you're an IdP, and would like to validate your solution for interoperability, refer to these [guidelines][MSFT-1].
|
||||
>If your organization uses a third-party federation solution, you can configure single sign-on to Microsoft Entra ID if the solution is compatible with Microsoft Entra ID. For questions regarding compatibility, contact your identity provider. If you're an IdP, and would like to validate your solution for interoperability, refer to these [guidelines][MSFT-1].
|
||||
|
||||
- For a step-by-step guide on how to configure **Google Workspace** as an identity provider for Azure AD, see [Configure federation between Google Workspace and Azure AD](configure-aad-google-trust.md)
|
||||
- For a step-by-step guide on how to configure **Clever** as an identity provider for Azure AD, see [Setup guide for Badges into Windows and Azure AD][EXT-1]
|
||||
- For a step-by-step guide on how to configure **Google Workspace** as an identity provider for Microsoft Entra ID, see [Configure federation between Google Workspace and Microsoft Entra ID](configure-aad-google-trust.md)
|
||||
- For a step-by-step guide on how to configure **Clever** as an identity provider for Microsoft Entra ID, see [Setup guide for Badges into Windows and Microsoft Entra ID][EXT-1]
|
||||
1. Individual IdP accounts created: each user requires an account defined in the third-party IdP platform
|
||||
1. Individual Azure AD accounts created: each user requires a matching account defined in Azure AD. These accounts are commonly created through automated solutions, for example:
|
||||
1. Individual Microsoft Entra accounts created: each user requires a matching account defined in Microsoft Entra ID. These accounts are commonly created through automated solutions, for example:
|
||||
- [School Data Sync (SDS)][SDS-1]
|
||||
- [Azure AD Connect sync][AZ-3] for environment with on-premises AD DS
|
||||
- [Microsoft Entra Connect Sync][AZ-3] for environment with on-premises AD DS
|
||||
- PowerShell scripts that call the [Microsoft Graph API][GRAPH-1]
|
||||
- provisioning tools offered by the IdP
|
||||
|
||||
For more information about identity matching, see [Identity matching in Azure AD](#identity-matching-in-azure-ad).
|
||||
1. Licenses assigned to the Azure AD user accounts. It's recommended to assign licenses to a dynamic group: when new users are provisioned in Azure AD, the licenses are automatically assigned. For more information, see [Assign licenses to users by group membership in Azure Active Directory][AZ-2]
|
||||
1. Enable federated sign-in on the Windows devices
|
||||
For more information about identity matching, see [Identity matching in Microsoft Entra ID](#identity-matching-in-azure-ad).
|
||||
1. Licenses assigned to the Microsoft Entra user accounts. It's recommended to assign licenses to a dynamic group: when new users are provisioned in Microsoft Entra ID, the licenses are automatically assigned. For more information, see [Assign licenses to users by group membership in Microsoft Entra ID][AZ-2]
|
||||
1. Enable Federated sign-in or Web sign-in on the Windows devices, depending if the devices are shared or assigned to a single student
|
||||
|
||||
To use federated sign-in, the devices must have Internet access. This feature doesn't work without it, as the authentication is done over the Internet.
|
||||
To use Federated sign-in or Web sign-in, the devices must have Internet access. These features don't work without it, as the authentication is done over the Internet.
|
||||
|
||||
> [!IMPORTANT]
|
||||
> WS-Fed is the only supported federated protocol to join a device to Azure AD. If you have a SAML 2.0 IdP, it's recommended to complete the Azure AD join process using one of the following methods:
|
||||
> WS-Fed is the only supported federated protocol to join a device to Microsoft Entra ID. If you have a SAML 2.0 IdP, it's recommended to complete the Microsoft Entra join process using one of the following methods:
|
||||
> - Provisioning packages (PPKG)
|
||||
> - Windows Autopilot self-deploying mode
|
||||
|
||||
[!INCLUDE [federated-sign-in](../../includes/licensing/federated-sign-in.md)]
|
||||
|
||||
Federated sign-in for student assigned (1:1) devices is supported on the following Windows editions and versions:
|
||||
Federated sign-in is supported on the following Windows editions and versions:
|
||||
|
||||
- Windows 11 SE, version 22H2 and later
|
||||
- Windows 11 Pro Edu/Education, version 22H2 with [KB5022913][KB-1]
|
||||
|
||||
Federated sign-in for shared devices is supported starting in Windows 11 SE/Pro Edu/Education, version 22H2 with [KB5026446][KB-2].
|
||||
Web sign-in is supported starting in Windows 11 SE/Pro Edu/Education, version 22H2 with [KB5026446][KB-2].
|
||||
|
||||
## Configure federated sign-in
|
||||
## Configure a federated sign-in experience
|
||||
|
||||
You can configure federated sign-in for student assigned (1:1) devices or student shared devices:
|
||||
You can configure a federated sign-in experience for student assigned (1:1) devices or student shared devices:
|
||||
|
||||
- When federated sign-in is configured for **student assigned (1:1) devices**, the first user who signs in to the device with a federated identity becomes the *primary user*. The primary user is always displayed in the bottom left corner of the sign-in screen
|
||||
- When federated sign-in is configured for **student shared devices**, there's no primary user. The sign-in screen displays, by default, the last user who signed in to the device
|
||||
- When federated sign-in is configured for **student assigned (1:1) devices**, you use a Windows feature called *Federated sign-in*. The first user who signs in to the device with a federated identity becomes the *primary user*. The primary user is always displayed in the bottom left corner of the sign-in screen
|
||||
- When federated sign-in is configured for **student shared devices**, you use a Windows feature called *Web sign-in*. With Web sign-in there's no primary user, and the sign-in screen displays, by default, the last user who signed in to the device
|
||||
|
||||
The configuration is different for each scenario, and is described in the following sections.
|
||||
|
||||
### Configure federated sign-in for student assigned (1:1) devices
|
||||
### Configure Federated sign-in for student assigned (1:1) devices
|
||||
|
||||
To use web sign-in with a federated identity provider, your devices must be configured with different policies. Review the following instructions to configure your devices using either Microsoft Intune or a provisioning package (PPKG).
|
||||
Review the following instructions to configure your devices using either Microsoft Intune or a provisioning package (PPKG).
|
||||
|
||||
#### [:::image type="icon" source="images/icons/intune.svg"::: **Intune**](#tab/intune)
|
||||
|
||||
@ -98,7 +103,7 @@ Alternatively, you can configure devices using a [custom policy][INT-1] with the
|
||||
|
||||
#### [:::image type="icon" source="images/icons/provisioning-package.svg"::: **PPKG**](#tab/ppkg)
|
||||
|
||||
To configure federated sign-in using a provisioning package, use the following settings:
|
||||
To configure Federated sign-in using a provisioning package, use the following settings:
|
||||
|
||||
| Setting |
|
||||
|--------|
|
||||
@ -109,16 +114,16 @@ To configure federated sign-in using a provisioning package, use the following s
|
||||
|
||||
:::image type="content" source="images/federated-sign-in-settings-ppkg.png" alt-text="Screenshot of Custom policy showing the settings to be configured to enable federated sign-in" lightbox="images/federated-sign-in-settings-ppkg.png" border="true":::
|
||||
|
||||
Apply the provisioning package to the single-user devices that require federated sign-in.
|
||||
Apply the provisioning package to the 1:1 devices that require Federated sign-in.
|
||||
|
||||
> [!IMPORTANT]
|
||||
> There was an issue affecting Windows 11, version 22H2 when using provisioning packages during OOBE. The issue was fixed with the KB5020044 update. If you plan to configure federated sign-in with a provisioning package during OOBE, ensure that the devices have the update installed. For more information, see [KB5020044][KB-1].
|
||||
|
||||
---
|
||||
|
||||
### Configure federated sign-in for student shared devices
|
||||
### Configure Web sign-in for student shared devices
|
||||
|
||||
To use web sign-in with a federated identity provider, your devices must be configured with different policies. Review the following instructions to configure your shared devices using either Microsoft Intune or a provisioning package (PPKG).
|
||||
Review the following instructions to configure your shared devices using either Microsoft Intune or a provisioning package (PPKG).
|
||||
|
||||
#### [:::image type="icon" source="images/icons/intune.svg"::: **Intune**](#tab/intune)
|
||||
|
||||
@ -146,7 +151,7 @@ Alternatively, you can configure devices using a [custom policy][INT-1] with the
|
||||
|
||||
#### [:::image type="icon" source="images/icons/provisioning-package.svg"::: **PPKG**](#tab/ppkg)
|
||||
|
||||
To configure federated sign-in using a provisioning package, use the following settings:
|
||||
To configure web sign-in using a provisioning package, use the following settings:
|
||||
|
||||
| Setting |
|
||||
|--------|
|
||||
@ -156,7 +161,7 @@ To configure federated sign-in using a provisioning package, use the following s
|
||||
| <li> Path: **`Policies/Authentication/ConfigureWebSignInAllowedUrls`**<br>Value: Semicolon separated list of domains, for example: **`samlidp.clever.com;clever.com;mobile-redirector.clever.com`**|
|
||||
| <li> Path: **`Policies/Authentication/ConfigureWebCamAccessDomainNames`**<br>Value: This setting is optional, and it should be configured if you need to use the webcam during the sign-in process. Specify the list of domains that are allowed to use the webcam during the sign-in process, separated by a semicolon. For example: **`clever.com`**|
|
||||
|
||||
Apply the provisioning package to the shared devices that require federated sign-in.
|
||||
Apply the provisioning package to the shared devices that require web sign-in.
|
||||
|
||||
> [!IMPORTANT]
|
||||
> There was an issue affecting Windows 11, version 22H2 when using provisioning packages during OOBE. The issue was fixed with the KB5020044 update. If you plan to configure federated sign-in with a provisioning package during OOBE, ensure that the devices have the update installed. For more information, see [KB5020044][KB-1].
|
||||
@ -172,8 +177,8 @@ As users enter their username, they're redirected to the identity provider sign-
|
||||
:::image type="content" source="./images/win-11-se-federated-sign-in.gif" alt-text="Screenshot of Windows 11 SE sign-in using federated sign-in through Clever and QR code badge, in a student assigned (1:1) device." border="false":::
|
||||
|
||||
> [!IMPORTANT]
|
||||
> For student assigned (1:1) devices, once the policy is enabled, the first user who sign-in to the device will also set the disambiguation page to the identity provider domain on the device. This means that the device will be defaulting to that IdP. The user can exit the federated sign-in flow by pressing <kbd>Ctrl</kbd>+<kbd>Alt</kbd>+<kbd>Delete</kbd> to get back to the standard Windows sign-in screen.
|
||||
> The behavior is different for student shared devices, where the disambiguation page is always shown, unless preferred Azure AD tenant name is configured.
|
||||
> For student assigned (1:1) devices, once the policy is enabled, the first user who sign-in to the device will also set the disambiguation page to the identity provider domain on the device. This means that the device will be defaulting to that IdP. The user can exit the Federated sign-in flow by pressing <kbd>Ctrl</kbd>+<kbd>Alt</kbd>+<kbd>Delete</kbd> to get back to the standard Windows sign-in screen.
|
||||
> The behavior is different for student shared devices, where the disambiguation page is always shown, unless preferred Microsoft Entra tenant name is configured.
|
||||
|
||||
## Important considerations
|
||||
|
||||
@ -196,29 +201,33 @@ The following issues are known to affect student shared devices:
|
||||
|
||||
For student shared devices, it's recommended to configure the account management policies to automatically delete the user profiles after a certain period of inactivity or disk levels. For more information, see [Set up a shared or guest Windows device][WIN-3].
|
||||
|
||||
### Preferred Azure AD tenant name
|
||||
<a name='preferred-azure-ad-tenant-name'></a>
|
||||
|
||||
To improve the user experience, you can configure the *preferred Azure AD tenant name* feature.\
|
||||
When using preferred AAD tenant name, the users bypass the disambiguation page and are redirected to the identity provider sign-in page. This configuration can be especially useful for student shared devices, where the disambiguation page is always shown.
|
||||
### Preferred Microsoft Entra tenant name
|
||||
|
||||
To improve the user experience, you can configure the *preferred Microsoft Entra tenant name* feature.\
|
||||
When using preferred Microsoft Entra tenant name, the users bypass the disambiguation page and are redirected to the identity provider sign-in page. This configuration can be especially useful for student shared devices, where the disambiguation page is always shown.
|
||||
|
||||
For more information about preferred tenant name, see [Authentication CSP - PreferredAadTenantDomainName][WIN-4].
|
||||
|
||||
### Identity matching in Azure AD
|
||||
<a name='identity-matching-in-azure-ad'></a>
|
||||
|
||||
When an Azure AD user is federated, the user's identity from the IdP must match an existing user object in Azure AD.
|
||||
After the token sent by the IdP is validated, Azure AD searches for a matching user object in the tenant by using an attribute called *ImmutableId*.
|
||||
### Identity matching in Microsoft Entra ID
|
||||
|
||||
When a Microsoft Entra user is federated, the user's identity from the IdP must match an existing user object in Microsoft Entra ID.
|
||||
After the token sent by the IdP is validated, Microsoft Entra ID searches for a matching user object in the tenant by using an attribute called *ImmutableId*.
|
||||
|
||||
> [!NOTE]
|
||||
> The ImmutableId is a string value that **must be unique** for each user in the tenant, and it shouldn't change over time. For example, the ImmutableId could be the student ID or SIS ID. The ImmutableId value should be based on the federation setup and configuration with your IdP, so confirm with your IdP before setting it.
|
||||
|
||||
If the matching object is found, the user is signed-in. Otherwise, the user is presented with an error message. The following picture shows that a user with the ImmutableId *260051* can't be found:
|
||||
|
||||
:::image type="content" source="images/federation/user-match-lookup-failure.png" alt-text="Screenshot of Azure AD sign-in error: a user with a matching ImmutableId can't be found in the tenant." lightbox="images/federation/user-match-lookup-failure.png":::
|
||||
:::image type="content" source="images/federation/user-match-lookup-failure.png" alt-text="Screenshot of Microsoft Entra sign-in error: a user with a matching ImmutableId can't be found in the tenant." lightbox="images/federation/user-match-lookup-failure.png":::
|
||||
|
||||
> [!IMPORTANT]
|
||||
> The ImmutableId matching is case-sensitive.
|
||||
|
||||
The ImmutableId is typically configured when the user is created in Azure AD, but it can also be updated later.\
|
||||
The ImmutableId is typically configured when the user is created in Microsoft Entra ID, but it can also be updated later.\
|
||||
In a scenario where a user is federated and you want to change the ImmutableId, you must:
|
||||
|
||||
1. Convert the federated user to a cloud-only user (update the UPN to a non-federated domain)
|
||||
|
@ -32,10 +32,10 @@ Users in a Microsoft-verified academic organization with Microsoft 365 accounts
|
||||
|
||||
Organizations can [purchase subscriptions][EDU-2] directly in the *Microsoft 365 admin center*, via volume licensing agreements, or through partner resellers.
|
||||
|
||||
When you sign up for a Minecraft Education trial, or purchase a subscription, Minecraft Education licenses are linked to your Azure Active Directory (Azure AD) tenant. If you don't have an Azure AD tenant:
|
||||
When you sign up for a Minecraft Education trial, or purchase a subscription, Minecraft Education licenses are linked to your Microsoft Entra tenant. If you don't have a Microsoft Entra tenant:
|
||||
|
||||
- Microsoft-verified academic organizations can set up a free [Office 365 Education subscription][EDU-3], which includes an Azure AD tenant
|
||||
- Non-Microsoft-verified academic organizations can set up a free Azure AD tenant when they [purchase Minecraft Education commercial licenses][EDU-4]
|
||||
- Microsoft-verified academic organizations can set up a free [Office 365 Education subscription][EDU-3], which includes a Microsoft Entra tenant
|
||||
- Non-Microsoft-verified academic organizations can set up a free Microsoft Entra tenant when they [purchase Minecraft Education commercial licenses][EDU-4]
|
||||
|
||||
### Direct purchase
|
||||
|
||||
|
Before Width: | Height: | Size: 19 KiB |
Before Width: | Height: | Size: 528 KiB |
Before Width: | Height: | Size: 26 KiB |
Before Width: | Height: | Size: 92 KiB |
Before Width: | Height: | Size: 45 KiB |
Before Width: | Height: | Size: 60 KiB |
Before Width: | Height: | Size: 128 KiB |
Before Width: | Height: | Size: 18 KiB |
Before Width: | Height: | Size: 9.7 KiB |
Before Width: | Height: | Size: 18 KiB |
Before Width: | Height: | Size: 79 KiB |
Before Width: | Height: | Size: 107 KiB |
Before Width: | Height: | Size: 35 KiB |
Before Width: | Height: | Size: 60 KiB |
Before Width: | Height: | Size: 124 KiB |
Before Width: | Height: | Size: 18 KiB |
Before Width: | Height: | Size: 9.7 KiB |
Before Width: | Height: | Size: 18 KiB |
Before Width: | Height: | Size: 79 KiB |
Before Width: | Height: | Size: 84 KiB |
Before Width: | Height: | Size: 15 KiB |
Before Width: | Height: | Size: 169 KiB |
Before Width: | Height: | Size: 119 KiB |
Before Width: | Height: | Size: 57 KiB |
Before Width: | Height: | Size: 45 KiB |
Before Width: | Height: | Size: 56 KiB |
Before Width: | Height: | Size: 517 KiB |
Before Width: | Height: | Size: 221 KiB |
Before Width: | Height: | Size: 29 KiB |
Before Width: | Height: | Size: 76 KiB |
Before Width: | Height: | Size: 31 KiB |
Before Width: | Height: | Size: 54 KiB |
@ -10,153 +10,115 @@ metadata:
|
||||
ms.technology: itpro-edu
|
||||
ms.collection:
|
||||
- education
|
||||
- highpri
|
||||
- tier1
|
||||
author: paolomatarazzo
|
||||
ms.author: paoloma
|
||||
manager: aaroncz
|
||||
ms.date: 07/28/2023
|
||||
ms.date: 10/30/2023
|
||||
|
||||
highlightedContent:
|
||||
items:
|
||||
- title: Get started with Windows 11
|
||||
- title: Get started with Windows 11 SE
|
||||
itemType: get-started
|
||||
url: /windows/whats-new/windows-11-overview
|
||||
url: windows-11-se-overview.md
|
||||
- title: Windows 11, version 22H2
|
||||
itemType: whats-new
|
||||
url: /windows/whats-new/whats-new-windows-11-version-22H2
|
||||
- title: Windows 11, version 22H2 group policy settings reference
|
||||
itemType: download
|
||||
url: https://www.microsoft.com/en-us/download/details.aspx?id=104594
|
||||
- title: Windows release health
|
||||
itemType: whats-new
|
||||
url: /windows/release-health
|
||||
- title: Windows commercial licensing
|
||||
itemType: overview
|
||||
url: /windows/whats-new/windows-licensing
|
||||
- title: Windows 365 documentation
|
||||
itemType: overview
|
||||
url: /windows-365
|
||||
- title: Explore all Windows trainings and learning paths for IT pros
|
||||
itemType: learn
|
||||
url: https://learn.microsoft.com/en-us/training/browse/?products=windows&roles=administrator
|
||||
- title: Enroll Windows client devices in Microsoft Intune
|
||||
- title: Deploy applications to Windows 11 SE with Intune
|
||||
itemType: how-to-guide
|
||||
url: /mem/intune/fundamentals/deployment-guide-enrollment-windows
|
||||
url: /education/windows/tutorial-deploy-apps-winse
|
||||
|
||||
productDirectory:
|
||||
title: Get started
|
||||
items:
|
||||
|
||||
- title: Hardware security
|
||||
imageSrc: /media/common/i_usb.svg
|
||||
- title: Learn how to deploy Windows
|
||||
imageSrc: /media/common/i_deploy.svg
|
||||
links:
|
||||
- url: /windows/security/hardware-security/tpm/trusted-platform-module-overview
|
||||
text: Trusted Platform Module
|
||||
- url: /windows/security/hardware-security/pluton/microsoft-pluton-security-processor
|
||||
text: Microsoft Pluton
|
||||
- url: /windows/security/hardware-security/how-hardware-based-root-of-trust-helps-protect-windows
|
||||
text: Windows Defender System Guard
|
||||
- url: /windows-hardware/design/device-experiences/oem-vbs
|
||||
text: Virtualization-based security (VBS)
|
||||
- url: /windows-hardware/design/device-experiences/oem-highly-secure-11
|
||||
text: Secured-core PC
|
||||
- url: /windows/security/hardware-security
|
||||
text: Learn more about hardware security >
|
||||
|
||||
- title: OS security
|
||||
imageSrc: /media/common/i_threat-protection.svg
|
||||
- url: /education/windows/tutorial-school-deployment/
|
||||
text: "Tutorial: deploy and manage Windows devices in a school"
|
||||
- url: /education/windows/tutorial-school-deployment/enroll-autopilot
|
||||
text: Enrollment in Intune with Windows Autopilot
|
||||
- url: use-set-up-school-pcs-app.md
|
||||
text: Deploy devices with Set up School PCs
|
||||
- url: /windows/deployment
|
||||
text: Learn more about Windows deployment >
|
||||
- title: Learn how to secure Windows
|
||||
imageSrc: /media/common/i_security-management.svg
|
||||
links:
|
||||
- url: /windows/security/operating-system-security
|
||||
text: Trusted boot
|
||||
- url: /windows/security/operating-system-security/system-security/windows-defender-security-center/windows-defender-security-center
|
||||
text: Windows security settings
|
||||
- url: /windows/security/operating-system-security/data-protection/bitlocker/
|
||||
text: BitLocker
|
||||
- url: /windows/security/operating-system-security/device-management/windows-security-configuration-framework/windows-security-baselines
|
||||
text: Windows security baselines
|
||||
- url: /windows/security/operating-system-security/virus-and-threat-protection/microsoft-defender-smartscreen/
|
||||
text: MMicrosoft Defender SmartScreen
|
||||
- url: /windows/security/operating-system-security
|
||||
text: Learn more about OS security >
|
||||
|
||||
- title: Identity protection
|
||||
imageSrc: /media/common/i_identity-protection.svg
|
||||
links:
|
||||
- url: /windows/security/identity-protection/hello-for-business
|
||||
text: Windows Hello for Business
|
||||
- url: /windows/security/identity-protection/credential-guard
|
||||
text: Credential Guard
|
||||
- url: /windows-server/identity/laps/laps-overview
|
||||
text: Windows LAPS (Local Administrator Password Solution)
|
||||
- url: /windows/security/operating-system-security/virus-and-threat-protection/microsoft-defender-smartscreen/enhanced-phishing-protection
|
||||
text: Enhanced phishing protection with SmartScreen
|
||||
- url: /education/windows/federated-sign-in
|
||||
text: Federated sign-in (EDU)
|
||||
- url: /windows/security/identity-protection
|
||||
text: Learn more about identity protection >
|
||||
|
||||
- title: Application security
|
||||
imageSrc: /media/common/i_queries.svg
|
||||
links:
|
||||
- url: /windows/security/application-security/application-control/windows-defender-application-control/
|
||||
text: Windows Defender Application Control (WDAC)
|
||||
- url: federated-sign-in.md
|
||||
text: Configure federated sign-in for Windows devices
|
||||
- url: /windows/security/application-security/application-control/user-account-control
|
||||
text: User Account Control (UAC)
|
||||
- url: /windows/security/application-security/application-control/windows-defender-application-control/design/microsoft-recommended-driver-block-rules
|
||||
text: Microsoft vulnerable driver blocklist
|
||||
- url: /windows/security/application-security/application-isolation/microsoft-defender-application-guard/md-app-guard-overview
|
||||
text: Microsoft Defender Application Guard (MDAG)
|
||||
- url: /windows/security/application-security/application-isolation/windows-sandbox/windows-sandbox-overview
|
||||
text: Windows Sandbox
|
||||
- url: /windows/security/application-security
|
||||
text: Learn more about application security >
|
||||
|
||||
- title: Security foundations
|
||||
imageSrc: /media/common/i_build.svg
|
||||
links:
|
||||
- url: /windows/security/security-foundations/certification/fips-140-validation
|
||||
text: FIPS 140-2 validation
|
||||
- url: /windows/security/security-foundations/certification/windows-platform-common-criteria
|
||||
text: Common Criteria Certifications
|
||||
- url: /windows/security/security-foundations/msft-security-dev-lifecycle
|
||||
text: Microsoft Security Development Lifecycle (SDL)
|
||||
- url: https://www.microsoft.com/msrc/bounty-windows-insider-preview
|
||||
text: Microsoft Windows Insider Preview bounty program
|
||||
- url: https://www.microsoft.com/security/blog/2020/09/15/microsoft-onefuzz-framework-open-source-developer-tool-fix-bugs/
|
||||
text: OneFuzz service
|
||||
- url: /windows/security/security-foundations
|
||||
text: Learn more about security foundations >
|
||||
|
||||
- title: Cloud security
|
||||
imageSrc: /media/common/i_cloud-security.svg
|
||||
links:
|
||||
- url: /mem/intune/protect/security-baselines
|
||||
text: Security baselines with Intune
|
||||
- url: /windows/deployment/windows-autopatch
|
||||
text: Windows Autopatch
|
||||
- url: /windows/deployment/windows-autopilot
|
||||
text: Windows Autopilot
|
||||
- url: /universal-print
|
||||
text: Universal Print
|
||||
- url: /windows/client-management/mdm/remotewipe-csp
|
||||
text: Remote wipe
|
||||
- url: /windows/security/cloud-security
|
||||
text: Learn more about cloud security >
|
||||
- url: /windows/security
|
||||
text: Learn more about Windows security >
|
||||
|
||||
- title: Learn how to manage Windows devices
|
||||
imageSrc: /media/common/i_management.svg
|
||||
links:
|
||||
- url: tutorial-school-deployment/manage-overview.md
|
||||
text: Manage devices with Microsoft Intune
|
||||
- url: tutorial-school-deployment/manage-surface-devices.md
|
||||
text: Management functionalities for Surface devices
|
||||
- url: /education/windows/get-minecraft-for-education
|
||||
text: Get and deploy Minecraft Education
|
||||
- url: /windows/client-management
|
||||
text: Learn more about Windows management >
|
||||
|
||||
- title: Learn how to configure Windows
|
||||
imageSrc: /media/common/i_config-tools.svg
|
||||
links:
|
||||
- url: /education/windows/tutorial-school-deployment/configure-devices-overview
|
||||
text: Configure settings and applications with Microsoft Intune
|
||||
- url: /windows/configuration/set-up-shared-or-guest-pc
|
||||
text: Set up a shared or guest Windows device
|
||||
- url: /education/windows/take-tests-in-windows
|
||||
text: Take tests and assessments in Windows
|
||||
- url: set-up-school-pcs-provisioning-package.md
|
||||
text: Provisioning package settings
|
||||
- url: https://www.youtube.com/watch?v=2ZLup_-PhkA
|
||||
text: "Video: Use the Set up School PCs App"
|
||||
|
||||
additionalContent:
|
||||
sections:
|
||||
- title: More Windows resources
|
||||
items:
|
||||
- title: For developers # < 60 chars (optional)
|
||||
summary: Are you an app developer looking for information about developing solutions on Microsoft Education products? Start here. # < 160 chars (optional)
|
||||
- items:
|
||||
# Card
|
||||
- title: UWP apps for education
|
||||
summary: Learn how to write universal apps for education.
|
||||
url: /windows/uwp/apps-for-education/
|
||||
# Card
|
||||
- title: Take a test API
|
||||
summary: Learn how web applications can use the API to provide a locked down experience for taking tests.
|
||||
url: /windows/uwp/apps-for-education/take-a-test-api
|
||||
|
||||
- title: Windows Server
|
||||
links:
|
||||
- text: Windows Server documentation
|
||||
url: /windows-server
|
||||
- text: What's new in Windows Server 2022?
|
||||
url: /windows-server/get-started/whats-new-in-windows-server-2022
|
||||
- text: Windows Server blog
|
||||
url: https://cloudblogs.microsoft.com/windowsserver/
|
||||
- title: Office dev center
|
||||
summary: Integrate with Office 365 across devices and services to extend Microsoft enterprise-scale compliance and security to students, teachers, and staff in your education app.
|
||||
url: https://developer.microsoft.com/office/
|
||||
|
||||
- title: Data Streamer
|
||||
summary: Bring new STEM experiences into the classroom with real-time data in Excel using Data Streamer. Data Streamer can send data to Excel from a sensor or application.
|
||||
url: /microsoft-365/education/data-streamer
|
||||
- title: For partners # < 60 chars (optional)
|
||||
summary: Looking for resources available to Microsoft Education partners? Start here. # < 160 chars (optional)
|
||||
- items:
|
||||
|
||||
- title: Microsoft Partner Network
|
||||
summary: Discover the latest news and resources for Microsoft Education products, solutions, licensing and readiness.
|
||||
url: https://partner.microsoft.com/explore/education
|
||||
|
||||
- title: Education Partner community Yammer group
|
||||
summary: Sign in with your Microsoft Partner account and join the Education Partner community private group on Yammer.
|
||||
url: https://www.yammer.com/mepn/
|
||||
|
||||
- title: Windows product site and blogs
|
||||
links:
|
||||
|
@ -1,20 +1,20 @@
|
||||
---
|
||||
title: Azure AD Join with Set up School PCs app
|
||||
description: Learn how Azure AD Join is configured in the Set up School PCs app.
|
||||
title: Microsoft Entra join with Set up School PCs app
|
||||
description: Learn how Microsoft Entra join is configured in the Set up School PCs app.
|
||||
ms.topic: reference
|
||||
ms.date: 08/10/2022
|
||||
appliesto:
|
||||
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 10</a>
|
||||
---
|
||||
|
||||
# Azure AD Join for school PCs
|
||||
# Microsoft Entra join for school PCs
|
||||
|
||||
> [!NOTE]
|
||||
> Set up School PCs app uses Azure AD Join to configure PCs. The app is helpful if you use the cloud based directory, Azure Active Directory (AD). If your organization uses Active Directory or requires no account to connect, install and use [Windows Configuration
|
||||
> Set up School PCs app uses Microsoft Entra join to configure PCs. The app is helpful if you use the cloud based directory, Microsoft Entra ID. If your organization uses Active Directory or requires no account to connect, install and use [Windows Configuration
|
||||
> Designer](set-up-students-pcs-to-join-domain.md) to
|
||||
> join your PCs to your school's domain.
|
||||
|
||||
Set up School PCs lets you create a provisioning package that automates Azure AD
|
||||
Set up School PCs lets you create a provisioning package that automates Microsoft Entra ID
|
||||
Join on your devices. This feature eliminates the need to manually:
|
||||
|
||||
- Connect to your school's network.
|
||||
@ -22,23 +22,25 @@ Join on your devices. This feature eliminates the need to manually:
|
||||
|
||||
## Automated connection to school domain
|
||||
|
||||
During initial device setup, Azure AD Join automatically connects your PCs to your school's Azure AD domain. You can skip all of the Windows setup experience that is typically a part of the out-of-the-box-experience (OOBE). Devices that are managed by a mobile device manager, such as Intune, are automatically enrolled with the provider upon initial device startup.
|
||||
During initial device setup, Microsoft Entra join automatically connects your PCs to your school's Microsoft Entra domain. You can skip all of the Windows setup experience that is typically a part of the out-of-the-box-experience (OOBE). Devices that are managed by a mobile device manager, such as Intune, are automatically enrolled with the provider upon initial device startup.
|
||||
|
||||
Students who sign in to their PCs with their Azure AD credentials get access to on-premises apps and the following cloud apps:
|
||||
Students who sign in to their PCs with their Microsoft Entra credentials get access to on-premises apps and the following cloud apps:
|
||||
* Office 365
|
||||
* OneDrive
|
||||
* OneNote
|
||||
|
||||
## Enable Azure AD Join
|
||||
<a name='enable-azure-ad-join'></a>
|
||||
|
||||
Learn how to enable Azure AD Join for your school. After you configure this setting, you'll be able to request an automated Azure AD bulk token, which you need to create a provisioning package.
|
||||
## Enable Microsoft Entra join
|
||||
|
||||
Learn how to enable Microsoft Entra join for your school. After you configure this setting, you'll be able to request an automated Microsoft Entra bulk token, which you need to create a provisioning package.
|
||||
|
||||
1. Sign in to the Azure portal with your organization's credentials.
|
||||
2. Go to **Azure
|
||||
Active Directory** \> **Devices** \> **Device settings**.
|
||||
3. Enable the setting
|
||||
for Azure AD by selecting **All** or **Selected**. If you choose the latter
|
||||
option, select the teachers and IT staff to allow them to connect to Azure AD.
|
||||
for Microsoft Entra ID by selecting **All** or **Selected**. If you choose the latter
|
||||
option, select the teachers and IT staff to allow them to connect to Microsoft Entra ID.
|
||||
|
||||

|
||||
|
||||
@ -50,28 +52,30 @@ The following table describes each setting within **Device Settings**.
|
||||
|
||||
| Setting | Description |
|
||||
|------------------------------------------------------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
|
||||
| Users may join devices to Azure AD | Choose the scope of people in your organization that are allowed to join devices to Azure AD. **All** allows all users and groups within your tenant to join devices. **Selected** prompts you to choose specific users or groups to allow. **None** allows no one in your tenant to join devices to Azure AD. |
|
||||
| More local administrators on Azure AD-joined devices | Only applicable to Azure AD Premium tenants. Grant extra local administrator rights on devices, to selected users. Global administrators and the device owner are granted local administrator rights by default. |
|
||||
| Users may register their devices with Azure AD | Allow all or none of your users to register their devices with Azure AD (Workplace Join). If you're enrolled in Microsoft Intune or Mobile Device Management for Office 365, your devices are required to be registered. In this case, **All** is automatically selected for you. |
|
||||
| Require Multi-Factor Authentication to join devices | Recommended when adding devices to Azure AD. When set to **Yes**, users that are setting up devices must enter a second method of authentication. |
|
||||
| Maximum number of devices per user | Set the maximum number of devices a user is allowed to have in Azure AD. If the maximum is exceeded, the user must remove one or more existing devices before more devices are added. |
|
||||
| Users may sync settings and enterprise app data | Allow all or none of your users to sync settings and app data across multiple devices. Tenants with Azure AD Premium are permitted to select specific users to allow. |
|
||||
| Users may join devices to Microsoft Entra ID | Choose the scope of people in your organization that are allowed to join devices to Microsoft Entra ID. **All** allows all users and groups within your tenant to join devices. **Selected** prompts you to choose specific users or groups to allow. **None** allows no one in your tenant to join devices to Microsoft Entra ID. |
|
||||
| More local administrators on Microsoft Entra joined devices | Only applicable to Microsoft Entra ID P1 or P2 tenants. Grant extra local administrator rights on devices, to selected users. Global administrators and the device owner are granted local administrator rights by default. |
|
||||
| Users may register their devices with Microsoft Entra ID | Allow all or none of your users to register their devices with Microsoft Entra ID (Workplace Join). If you're enrolled in Microsoft Intune or Mobile Device Management for Office 365, your devices are required to be registered. In this case, **All** is automatically selected for you. |
|
||||
| Require Multi-Factor Authentication to join devices | Recommended when adding devices to Microsoft Entra ID. When set to **Yes**, users that are setting up devices must enter a second method of authentication. |
|
||||
| Maximum number of devices per user | Set the maximum number of devices a user is allowed to have in Microsoft Entra ID. If the maximum is exceeded, the user must remove one or more existing devices before more devices are added. |
|
||||
| Users may sync settings and enterprise app data | Allow all or none of your users to sync settings and app data across multiple devices. Tenants with Microsoft Entra ID P1 or P2 are permitted to select specific users to allow. |
|
||||
|
||||
## Clear Azure AD tokens
|
||||
<a name='clear-azure-ad-tokens'></a>
|
||||
|
||||
Your Intune tenant can only have 500 active Azure AD tokens, or packages, at a time. You'll receive a notification in the Intune portal when you reach 500 active tokens.
|
||||
## Clear Microsoft Entra tokens
|
||||
|
||||
Your Intune tenant can only have 500 active Microsoft Entra tokens, or packages, at a time. You'll receive a notification in the Intune portal when you reach 500 active tokens.
|
||||
|
||||
To reduce your inventory, clear out all unnecessary and inactive tokens.
|
||||
1. Go to **Azure Active Directory** > **Users** > **All users**
|
||||
1. Go to **Microsoft Entra ID** > **Users** > **All users**
|
||||
2. In the **User Name** column, select and delete all accounts with a **package\ _**
|
||||
prefix. These accounts are created at a 1:1 ratio for every token and are safe
|
||||
to delete.
|
||||
3. Select and delete inactive and expired user accounts.
|
||||
|
||||
### How do I know if my package expired?
|
||||
Automated Azure AD tokens expire after 180 days. The expiration date for each token is appended to the end of the saved provisioning package, on the USB drive. After this date, you must create a new package. Be careful that you don't delete active accounts.
|
||||
Automated Microsoft Entra tokens expire after 180 days. The expiration date for each token is appended to the end of the saved provisioning package, on the USB drive. After this date, you must create a new package. Be careful that you don't delete active accounts.
|
||||
|
||||

|
||||

|
||||
|
||||
## Next steps
|
||||
Learn more about setting up devices with the Set up School PCs app.
|
||||
|
@ -52,8 +52,8 @@ For a more detailed look of each policy listed, see [Policy CSP](/windows/client
|
||||
|
||||
| Policy name | Default value | Description |
|
||||
|--|--|--|
|
||||
| Authority | User-defined | Authenticates the admin user. Value is set automatically when signed in to Azure AD. |
|
||||
| BPRT | User-defined | Value is set automatically when signed in to Azure AD. Allows you to create the provisioning package. |
|
||||
| Authority | User-defined | Authenticates the admin user. Value is set automatically when signed in to Microsoft Entra ID. |
|
||||
| BPRT | User-defined | Value is set automatically when signed in to Microsoft Entra ID. Allows you to create the provisioning package. |
|
||||
| WLAN Setting | XML is generated from the Wi-Fi profile in the Set up School PCs app. | Configures settings for wireless connectivity. |
|
||||
| Hide OOBE for desktop | True | Hides the interactive OOBE flow for Windows 10. |
|
||||
| Download Mode | 1 - HTTP blended with peering behind the same NAT | Specifies the download method that Delivery Optimization can use in downloads of Windows Updates, Apps, and App updates |
|
||||
@ -125,7 +125,7 @@ Review the table below to estimate your expected provisioning time. A package th
|
||||
|
||||
Learn more about setting up devices with the Set up School PCs app.
|
||||
|
||||
- [Azure AD Join with Set up School PCs](set-up-school-pcs-azure-ad-join.md)
|
||||
- [Microsoft Entra join with Set up School PCs](set-up-school-pcs-azure-ad-join.md)
|
||||
- [Set up School PCs technical reference](set-up-school-pcs-technical.md)
|
||||
- [Set up Windows 10 devices for education](set-up-windows-10.md)
|
||||
|
||||
|
@ -11,11 +11,13 @@ appliesto:
|
||||
|
||||
The **Set up School PCs** app helps you configure new Windows 10 PCs for school use. The app, which is available for Windows 10 version 1703 and later, configures and saves school-optimized settings, apps, and policies into a single provisioning package. You can then save the package to a USB drive and distribute it to your school PCs.
|
||||
|
||||
If your school uses Azure Active Directory (Azure AD) or Office 365, the Set up
|
||||
School PCs app will create a setup file. This file joins the PC to your Azure Active Directory tenant. The app also helps set up PCs for use with or without Internet connectivity.
|
||||
If your school uses Microsoft Entra ID or Office 365, the Set up
|
||||
School PCs app will create a setup file. This file joins the PC to your Microsoft Entra tenant. The app also helps set up PCs for use with or without Internet connectivity.
|
||||
|
||||
## Join PC to Azure Active Directory
|
||||
If your school uses Azure Active Directory (Azure AD) or Office 365, the Set up
|
||||
<a name='join-pc-to-azure-active-directory'></a>
|
||||
|
||||
## Join PC to Microsoft Entra ID
|
||||
If your school uses Microsoft Entra ID or Office 365, the Set up
|
||||
School PCs app creates a setup file that joins your PC to your Azure Active
|
||||
Directory tenant.
|
||||
|
||||
@ -24,7 +26,7 @@ The app also helps set up PCs for use with or without Internet connectivity.
|
||||
## List of Set up School PCs features
|
||||
The following table describes the Set up School PCs app features and lists each type of Intune subscription. An X indicates that the feature is available with the specific subscription.
|
||||
|
||||
| Feature | No Internet | Azure AD | Office 365 | Azure AD Premium |
|
||||
| Feature | No Internet | Microsoft Entra ID | Office 365 | Microsoft Entra ID P1 or P2 |
|
||||
|--------------------------------------------------------------------------------------------------------|-------------|----------|------------|------------------|
|
||||
| **Fast sign-in** | X | X | X | X |
|
||||
| Students sign in and start using the computer in under a minute, even on initial sign-in. | | | | |
|
||||
@ -34,24 +36,24 @@ The following table describes the Set up School PCs app features and lists each
|
||||
| Set up computers for use by anyone with or without an account. | | | | |
|
||||
| **School policies** | X | X | X | X |
|
||||
| Settings create a relevant, useful learning environment and optimal computer performance. | | | | |
|
||||
| **Azure AD Join** | | X | X | X |
|
||||
| Computers join with your existing Azure AD or Office 365 subscription for centralized management. | | | | |
|
||||
| **Microsoft Entra join** | | X | X | X |
|
||||
| Computers join with your existing Microsoft Entra ID or Office 365 subscription for centralized management. | | | | |
|
||||
| **Single sign-on to Office 365** | | | X | X |
|
||||
| Students sign in with their IDs to access all Office 365 web apps or installed Office apps. | | | | |
|
||||
| **Take a Test app** | | | | X |
|
||||
| Administer quizzes and assessments through test providers such as Smarter Balanced. | | | | |
|
||||
| [Settings roaming](/azure/active-directory/devices/enterprise-state-roaming-overview) **via Azure AD** | | | | X |
|
||||
| [Settings roaming](/azure/active-directory/devices/enterprise-state-roaming-overview) **via Microsoft Entra ID** | | | | X |
|
||||
| Synchronize student and application data across devices for a personalized experience. | | | | |
|
||||
|
||||
> [!NOTE]
|
||||
> If your school uses Active Directory, use [Windows Configuration
|
||||
> Designer](set-up-students-pcs-to-join-domain.md)
|
||||
> to configure your PCs to join the domain. You can only use the Set up School
|
||||
> PCs app to set up PCs that are connected to Azure AD.
|
||||
> PCs app to set up PCs that are connected to Microsoft Entra ID.
|
||||
|
||||
## Next steps
|
||||
Learn more about setting up devices with the Set up School PCs app.
|
||||
* [Azure AD Join with Set up School PCs](set-up-school-pcs-azure-ad-join.md)
|
||||
* [Microsoft Entra join with Set up School PCs](set-up-school-pcs-azure-ad-join.md)
|
||||
* [What's in my provisioning package](set-up-school-pcs-provisioning-package.md)
|
||||
* [Set up Windows 10 devices for education](set-up-windows-10.md)
|
||||
|
||||
|
@ -1,97 +0,0 @@
|
||||
---
|
||||
title: What's new in the Windows Set up School PCs app
|
||||
description: Find out about app updates and new features in Set up School PCs.
|
||||
ms.topic: whats-new
|
||||
ms.date: 08/10/2022
|
||||
---
|
||||
|
||||
# What's new in Set up School PCs
|
||||
Learn what's new with the Set up School PCs app each week. Find out about new app features and functionality, see updated screenshots, and find information about past releases.
|
||||
|
||||
## Week of August 24, 2020
|
||||
|
||||
### Longer device names supported in app
|
||||
You can now give devices running Windows 10, version 2004 and later a name that's up to 53 characters long.
|
||||
|
||||
## Week of September 23, 2019
|
||||
|
||||
### Easier way to deploy Office 365 to your classroom devices
|
||||
Microsoft Office now appears as an option on the **Apps** screen. Select the app to add it to your provisioning package. Devices install Microsoft 365 Apps for enterprise. This version includes the cloud-connected and most current versions of apps such as Word, PowerPoint, Excel, and Teams.
|
||||
|
||||
## Week of June 24, 2019
|
||||
|
||||
### Resumed support for Windows 10, version 1903 and later
|
||||
The previously mentioned provisioning problem was resolved, so the Set up School PCs app once again supports Windows 10, version 1903 and later. The Windows 10 settings that were removed are now back in the app.
|
||||
|
||||
### Device rename made optional for Azure AD-joined devices
|
||||
When you set up your Azure AD join devices in the app, you no longer need to rename your devices. You can keep existing device names.
|
||||
|
||||
## Week of May 23, 2019
|
||||
|
||||
### Suspended support for Windows 10, version 1903 and later
|
||||
Due to a provisioning problem, Set up School PCs has temporarily stopped support for Windows 10, version 1903 and later. All settings in the app that were for Windows 10, version 1903 and later have been removed. When the problem is resolved, support will resume again.
|
||||
|
||||
### Mandatory device rename for Azure AD-joined devices
|
||||
If you configure Azure AD Join, you're now required to rename your devices during setup. You can't keep existing device names.
|
||||
|
||||
## Week of April 15, 2019
|
||||
|
||||
### Support for Minecraft Education Edition upgrade
|
||||
Set up School PCs only adds apps to the provisioning package that meet the minimum supported version for Windows 10. For example, Minecraft is the most recent store app to upgrade; it's only installed on devices running Windows 10, version 1709 and later. If you select an earlier version of Windows, Minecraft won't be included in the provisioning package.
|
||||
|
||||
## Week of April 8, 2019
|
||||
|
||||
### Apps configured as non-removeable
|
||||
Apps that you deploy with Set up School PCs are configured as non-removable apps. This feature prevents students from unpinning or uninstalling the apps they need.
|
||||
|
||||
### Domain name automatically added during sign-in
|
||||
Specify your preferred Azure Active Directory tenant domain name to automatically append it to the username on the sign-in screen. With this setting, students don't need to type out long school domain names. To sign in, they type only their unique usernames.
|
||||
|
||||
### Set up devices with hidden Wi-Fi network
|
||||
Set up devices so that they connect to a hidden Wi-Fi network. To configure a hidden network, open the app. When you get to **Wireless network**, choose **Add a Wi-Fi network**. Enter in your Wi-Fi information and select **Hidden network**.
|
||||
|
||||
|
||||
## Week of December 31, 2018
|
||||
|
||||
### Add Microsoft Whiteboard to provisioning package
|
||||
Microsoft Whiteboard is now a Microsoft-recommended app for schools. Whiteboard is a freeform digital canvas where ideas, content, and people come together; students can create and collaborate in real time in the classroom. Add the app to your provisioning package on the **Add apps** page. For more information, see [Use Set up School PCs app](use-set-up-school-pcs-app.md#create-the-provisioning-package).
|
||||
|
||||
## Week of November 5, 2018
|
||||
|
||||
### Sync school app inventory from Microsoft Store
|
||||
During setup, you can now add apps from your school's Microsoft Store inventory. After you sign in with your school's Office 365 account, Set up School PCs will sync the apps from Microsoft Store, and make them visible on the **Add apps** page. For more information about adding apps, see [Use Set Up School PCs app](use-set-up-school-pcs-app.md#create-the-provisioning-package).
|
||||
|
||||
|
||||
## Week of October 15, 2018
|
||||
|
||||
The Set up School PCs app was updated with the following changes:
|
||||
|
||||
### Three new setup screens added to the app
|
||||
The following screens and functionality were added to the setup workflow. Select a screen name to view the relevant steps and screenshots in the Set Up School PCs docs.
|
||||
|
||||
* [**Package name**](use-set-up-school-pcs-app.md#package-name): Customize a package name to make it easy to recognize it from your school's other packages. Azure Active Directory generates the name. It appears as the filename, and as the token name in Azure AD in the Azure portal.
|
||||
|
||||
* [**Product key**](use-set-up-school-pcs-app.md#product-key): Enter a product key to upgrade your current edition of Windows 10, or change the existing product key.
|
||||
|
||||
* [**Personalization**](use-set-up-school-pcs-app.md#personalization): Upload images from your computer to customize how the lock screen and background appears on student devices.
|
||||
|
||||
### Azure AD token expiration extended to 180 days
|
||||
Packages now expire 180 days from the date you create them.
|
||||
|
||||
### Updated apps with more helpful, descriptive text
|
||||
The **Skip** buttons in the app now communicate the intent of each action. An **Exit** button also appears on the last page of the app.
|
||||
|
||||
### Option to keep existing device names
|
||||
The [**Name these devices** screen](use-set-up-school-pcs-app.md#device-names) now gives you the option to keep the original or existing names of your student devices.
|
||||
|
||||
### Skype and Messaging apps to be removed from student PCs by default
|
||||
The Skype and Messaging apps are part of a selection of apps that are, by default, removed from student devices.
|
||||
|
||||
|
||||
## Next steps
|
||||
Learn how to create provisioning packages and set up devices in the app.
|
||||
* [What's in my provisioning package?](set-up-school-pcs-provisioning-package.md)
|
||||
* [Set up School PCs technical reference](set-up-school-pcs-technical.md)
|
||||
* [Set up Windows 10 devices for education](set-up-windows-10.md)
|
||||
|
||||
When you're ready to create and apply your provisioning package, see [Use Set up School PCs app](use-set-up-school-pcs-app.md).
|
@ -16,7 +16,7 @@ You can apply a provisioning package on a USB drive to off-the-shelf devices dur
|
||||
|
||||
- If you want to [provision a school PC to join a domain](set-up-students-pcs-to-join-domain.md) and add apps in the same provisioning package, follow the steps in [Provision PCs with apps](/windows/configuration/provisioning-packages/provision-pcs-with-apps).
|
||||
|
||||
- If you want to provision a school PC to join Azure AD, set up the PC using the steps in [Use Set up School PCs App](use-set-up-school-pcs-app.md). Set up School PCs now lets you add recommended apps from the Store so you can add these apps while you're creating your package through Set up School PCs. You can also follow the steps in [Provision PCs with apps](/windows/configuration/provisioning-packages/provision-pcs-with-apps) if you want to add apps to student PCs after initial setup with the Set up School PCs package.
|
||||
- If you want to provision a school PC to join Microsoft Entra ID, set up the PC using the steps in [Use Set up School PCs App](use-set-up-school-pcs-app.md). Set up School PCs now lets you add recommended apps from the Store so you can add these apps while you're creating your package through Set up School PCs. You can also follow the steps in [Provision PCs with apps](/windows/configuration/provisioning-packages/provision-pcs-with-apps) if you want to add apps to student PCs after initial setup with the Set up School PCs package.
|
||||
|
||||
## Learn more
|
||||
|
||||
|
@ -14,7 +14,7 @@ You have two tools to choose from to set up PCs for your classroom:
|
||||
- Set up School PCs
|
||||
- Windows Configuration Designer
|
||||
|
||||
Choose the tool that is appropriate for how your students will sign in (Active Directory, Azure Active Directory, or no account).
|
||||
Choose the tool that is appropriate for how your students will sign in (Active Directory, Microsoft Entra ID, or no account).
|
||||
|
||||
You can use the following diagram to compare the tools.
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Take a Test app technical reference
|
||||
description: List of policies and settings applied by the Take a Test app.
|
||||
ms.date: 03/31/2023
|
||||
ms.date: 11/02/2023
|
||||
ms.topic: reference
|
||||
---
|
||||
|
||||
@ -11,11 +11,11 @@ Take a Test is an application that locks down a device and displays an online as
|
||||
|
||||
Whether you're a teacher or IT administrator, you can configure Take a Test to meet your testing needs. For high-stakes tests, the app creates a browser-based, locked-down environment. This environment means that students taking the tests that don't have copy/paste privileges, can't access to files and applications, and are free from distractions. For simple tests and quizzes, Take a Test can be configured to use the teacher's preferred assessment website to deliver digital assessments.
|
||||
|
||||
Assessment vendors can use Take a Test as a platform to lock down the operating system. Take a Test supports the [SBAC browser API standard](https://www.smarterapp.org/documents/SecureBrowserRequirementsSpecifications_0-3.pdf) for high stakes common core testing. For more information, see [Take a Test Javascript API](/windows/uwp/apps-for-education/take-a-test-api).
|
||||
Assessment vendors can use Take a Test as a platform to lock down the operating system. Take a Test supports the [SBAC browser API standard](https://www.smarterapp.org/documents/SecureBrowserRequirementsSpecifications_0-3.pdf) for high stakes common core testing. For more information, see [Take a Test JavaScript API](/windows/uwp/apps-for-education/take-a-test-api).
|
||||
|
||||
## PC lock-down for assessment
|
||||
|
||||
When the assessment page initiates lock-down, the student's desktop will be locked and the app will be launched above the Windows lock screen to provide a sandbox that ensures the student can only interact with the Take a Test app. After transitioning to the lock screen, Take a Test will apply local MDM policies to further lock down the device. The whole process of going above the lock screen and applying policies is what defines lock-down. The lock-down process is atomic, which means that if any part of the lock-down operation fails, the app won't be above lock and won't have any of the policies applied.
|
||||
When the assessment page initiates lock-down, the student's desktop is locked and the app executes above the Windows lock screen. This provides a sandbox that ensures the student can only interact with the Take a Test app. After transitioning to the lock screen, Take a Test applies local MDM policies to further lock down the device. The whole process of going above the lock screen and applying policies is what defines lock-down. The lock-down process is atomic, which means that if any part of the lock-down operation fails, the app won't be above lock and won't have any of the policies applied.
|
||||
|
||||
When running above the lock screen:
|
||||
|
||||
@ -25,7 +25,7 @@ When running above the lock screen:
|
||||
- System clipboard is cleared
|
||||
- Web apps can query the processes currently running in the user's device
|
||||
- Extended display shows up as black
|
||||
- Auto-fill is disabled
|
||||
- Autofill is disabled
|
||||
|
||||
## Mobile device management (MDM) policies
|
||||
|
||||
@ -36,7 +36,7 @@ When Take a Test is running, the following MDM policies are applied to lock down
|
||||
| AllowToasts | Disables toast notifications from being shown | 0 |
|
||||
| AllowAppStoreAutoUpdate | Disables automatic updates for Store apps that are installed on the PC | 0 |
|
||||
| AllowDeviceDiscovery | Disables UI for screen sharing | 0 |
|
||||
| AllowInput Panel | Disables the onscreen keyboard, which will disable auto-fill | 0 |
|
||||
| AllowInput Panel | Disables the onscreen keyboard, which disables autofill | 0 |
|
||||
| AllowCortana | Disables Cortana functionality | 0 |
|
||||
| AllowAutoupdate | Disables Windows Update from starting OS updates | 5 |
|
||||
|
||||
@ -61,7 +61,7 @@ When Take a Test is running, the following functionality is available to student
|
||||
- Magnifier is available through <kbd>Win</kbd>+<kbd>+</kbd>
|
||||
- The student can press <kbd>Alt</kbd>+<kbd>Tab</kbd> when locked down. This key press results in the student being able to switch between the following elements:
|
||||
- Take a Test
|
||||
- Assistive technology that may be running
|
||||
- Assistive technology that might be running
|
||||
- Lock screen (not available if student is using a dedicated test account)
|
||||
|
||||
> [!NOTE]
|
||||
@ -77,21 +77,21 @@ When permissive mode is triggered in lock-down mode, Take a Test transitions fro
|
||||
|
||||
When running tests in this mode, keep the following points in mind:
|
||||
- Permissive mode isn't supported in kiosk mode (dedicated test account)
|
||||
- Permissive mode can be triggered from the web app running within Take a Test. Alternatively, you can create a link or shortcut without "#enforcelockdown" and it will launch in permissive mode
|
||||
- Permissive mode can be triggered from the web app running within Take a Test. Alternatively, you can create a link or shortcut without "#enforcelockdown" and it launches in permissive mode
|
||||
|
||||
## Troubleshoot Take a Test with the event viewer
|
||||
|
||||
You can use the Event Viewer to view Take a Test events and errors. Take a Test logs events when a lock-down request has been received, device enrollment has succeeded, lock-down policies were successfully applied, and more.
|
||||
You can use the Event Viewer to view Take a Test events and errors. Take a Test logs events when it receives a lock-down request, device enrollment completes, lock-down policies are successfully applied, and more.
|
||||
|
||||
To enable viewing events in the Event Viewer:
|
||||
|
||||
1. Open the `Event Viewer`
|
||||
1. Navigate to `Applications and Services Logs > Microsoft > Windows > Management-SecureAssessment`
|
||||
1. Select `Operational` > `Enable Log`
|
||||
1. Open the Event Viewer
|
||||
1. Navigate to **Applications and Services Logs** > **Microsoft** > **Windows** > **Management-SecureAssessment**
|
||||
1. Select **Operational** > **Enable Log**
|
||||
|
||||
To save the event logs:
|
||||
|
||||
1. Select `Operational` > `Save All Events As…`
|
||||
1. Select **Operational** > **Save All Events As…**
|
||||
|
||||
## Learn more
|
||||
|
||||
|
@ -46,7 +46,7 @@ items:
|
||||
items:
|
||||
- name: Configure federated sign-in
|
||||
href: federated-sign-in.md
|
||||
- name: Configure federation between Google Workspace and Azure AD
|
||||
- name: Configure federation between Google Workspace and Microsoft Entra ID
|
||||
href: configure-aad-google-trust.md
|
||||
- name: Configure Shared PC
|
||||
href: /windows/configuration/set-up-shared-or-guest-pc?context=/education/context/context
|
||||
@ -56,32 +56,6 @@ items:
|
||||
href: use-set-up-school-pcs-app.md
|
||||
- name: Upgrade Windows Home to Windows Education on student-owned devices
|
||||
href: change-home-to-edu.md
|
||||
- name: Migrate from Chromebook to Windows
|
||||
items:
|
||||
- name: Chromebook migration guide
|
||||
href: chromebook-migration-guide.md
|
||||
- name: Deploy Windows 10 devices in a school
|
||||
items:
|
||||
- name: Overview
|
||||
href: deploy-windows-10-overview.md
|
||||
- name: Deploy Windows 10 in a school
|
||||
href: deploy-windows-10-in-a-school.md
|
||||
- name: Deploy Windows 10 in a school district
|
||||
href: deploy-windows-10-in-a-school-district.md
|
||||
- name: Deployment recommendations for school IT administrators
|
||||
href: edu-deployment-recommendations.md
|
||||
- name: Set up Windows devices for education
|
||||
items:
|
||||
- name: Overview
|
||||
href: set-up-windows-10.md
|
||||
- name: Azure AD join for school PCs
|
||||
href: set-up-school-pcs-azure-ad-join.md
|
||||
- name: Active Directory join for school PCs
|
||||
href: set-up-students-pcs-to-join-domain.md
|
||||
- name: Provision student PCs with apps
|
||||
href: set-up-students-pcs-with-apps.md
|
||||
- name: Reset devices with Autopilot Reset
|
||||
href: autopilot-reset.md
|
||||
- name: Reference
|
||||
items:
|
||||
- name: Set up School PCs
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Configure and secure devices with Microsoft Intune
|
||||
description: Learn how to configure policies with Microsoft Intune in preparation for device deployment.
|
||||
ms.date: 08/31/2022
|
||||
ms.date: 11/09/2023
|
||||
ms.topic: tutorial
|
||||
---
|
||||
|
||||
@ -98,7 +98,7 @@ For more information, see [Security][INT-4].
|
||||
> - [<u>Attack surface reduction</u>][MEM-6]
|
||||
> - [<u>Account protection</u>][MEM-7]
|
||||
|
||||
________________________________________________________
|
||||
---
|
||||
|
||||
## Next steps
|
||||
|
||||
|
@ -1,14 +1,14 @@
|
||||
---
|
||||
title: Configure devices with Microsoft Intune
|
||||
description: Learn how to configure policies and applications in preparation for device deployment.
|
||||
ms.date: 08/31/2022
|
||||
ms.date: 11/09/2023
|
||||
ms.topic: tutorial
|
||||
---
|
||||
|
||||
# Configure settings and applications with Microsoft Intune
|
||||
|
||||
Before distributing devices to your users, you must ensure that the devices will be configured with the required policies, settings, and applications as they get enrolled in Intune.
|
||||
Microsoft Intune uses Azure AD groups to assign policies and applications to devices.
|
||||
Microsoft Intune uses Microsoft Entra groups to assign policies and applications to devices.
|
||||
With Microsoft Intune for Education, you can conveniently create groups and assign policies and applications to them.
|
||||
|
||||
In this section you will:
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Enrollment in Intune with Windows Autopilot
|
||||
description: Learn how to join Azure AD and enroll in Intune using Windows Autopilot.
|
||||
description: Learn how to join Microsoft Entra ID and enroll in Intune using Windows Autopilot.
|
||||
ms.date: 03/08/2023
|
||||
ms.topic: tutorial
|
||||
---
|
||||
@ -61,8 +61,8 @@ More advanced dynamic membership rules can be created from Microsoft Intune admi
|
||||
|
||||
For Autopilot devices to offer a customized OOBE experience, you must create **Windows Autopilot deployment profiles** and assign them to a group containing the devices.
|
||||
A deployment profile is a collection of settings that determine the behavior of the device during OOBE. Among other settings, a deployment profile specifies a **deployment mode**, which can either be:
|
||||
1. **User-driven:** devices with this profile are associated with the user enrolling the device. User credentials are required to complete the Azure AD join process during OOBE
|
||||
1. **Self-deploying:** devices with this profile aren't associated with the user enrolling the device. User credentials aren't required to complete the Azure AD join process. Rather, the device is joined automatically and, for this reason, specific hardware requirements must be met to use this mode.
|
||||
1. **User-driven:** devices with this profile are associated with the user enrolling the device. User credentials are required to complete the Microsoft Entra join process during OOBE
|
||||
1. **Self-deploying:** devices with this profile aren't associated with the user enrolling the device. User credentials aren't required to complete the Microsoft Entra join process. Rather, the device is joined automatically and, for this reason, specific hardware requirements must be met to use this mode.
|
||||
|
||||
To create an Autopilot deployment profile:
|
||||
|
||||
@ -109,8 +109,8 @@ When a Windows device is turned on for the first time, the end-user experience w
|
||||
1. Connect to the internet: if connecting through Wi-Fi, the user will be prompted to connect to a wireless network. If the device is connected through an ethernet cable, Windows will skip this step
|
||||
1. Apply updates: the device will look for and apply required updates
|
||||
1. Windows will detect if the device has an Autopilot profile assigned to it. If so, it will proceed with the customized OOBE experience. If the Autopilot profile specifies a naming convention for the device, the device will be renamed, and a reboot will occur
|
||||
1. The user authenticates to Azure AD, using the school account
|
||||
1. The device joins Azure AD, enrolls in Intune and all the settings and applications are configured
|
||||
1. The user authenticates to Microsoft Entra ID, using the school account
|
||||
1. The device joins Microsoft Entra ID, enrolls in Intune and all the settings and applications are configured
|
||||
|
||||
> [!NOTE]
|
||||
> Some of these steps may be skipped, depending on the Autopilot profile configuration and if the device is using a wired connection.
|
||||
@ -120,7 +120,7 @@ When a Windows device is turned on for the first time, the end-user experience w
|
||||
________________________________________________________
|
||||
## Next steps
|
||||
|
||||
With the devices joined to Azure AD tenant and managed by Intune, you can use Intune to maintain them and report on their status.
|
||||
With the devices joined to Microsoft Entra tenant and managed by Intune, you can use Intune to maintain them and report on their status.
|
||||
|
||||
> [!div class="nextstepaction"]
|
||||
> [Next: Manage devices >](manage-overview.md)
|
||||
|
@ -1,30 +1,32 @@
|
||||
---
|
||||
title: Enrollment in Intune with standard out-of-box experience (OOBE)
|
||||
description: Learn how to join devices to Azure AD from OOBE and automatically get them enrolled in Intune.
|
||||
ms.date: 08/31/2022
|
||||
description: Learn how to join devices to Microsoft Entra ID from OOBE and automatically get them enrolled in Intune.
|
||||
ms.date: 11/09/2023
|
||||
ms.topic: tutorial
|
||||
---
|
||||
# Automatic Intune enrollment via Azure AD join
|
||||
|
||||
If you're setting up a Windows device individually, you can use the out-of-box experience to join it to your school's Azure Active Directory tenant, and automatically enroll it in Intune.
|
||||
# Automatic Intune enrollment via Microsoft Entra join
|
||||
|
||||
If you're setting up a Windows device individually, you can use the out-of-box experience to join it to your school's Microsoft Entra tenant, and automatically enroll it in Intune.
|
||||
With this process, no advance preparation is needed:
|
||||
|
||||
1. Follow the on-screen prompts for region selection, keyboard selection, and network connection
|
||||
1. Wait for updates. If any updates are available, they'll be installed at this time
|
||||
:::image type="content" source="./images/win11-oobe-updates.png" alt-text="Windows 11 OOBE - updates page" border="true":::
|
||||
1. When prompted, select **Set up for work or school** and authenticate using your school's Azure Active Directory account
|
||||
1. When prompted, select **Set up for work or school** and authenticate using your school's Microsoft Entra account
|
||||
:::image type="content" source="./images/win11-oobe-auth.png" alt-text="Windows 11 OOBE - authentication page" border="true":::
|
||||
1. The device will join Azure AD and automatically enroll in Intune. All settings defined in Intune will be applied to the device
|
||||
1. The device will join Microsoft Entra ID and automatically enroll in Intune. All settings defined in Intune will be applied to the device
|
||||
|
||||
> [!IMPORTANT]
|
||||
> If you configured enrollment restrictions in Intune blocking personal Windows devices, this process will not complete. You will need to use a different enrollment method, or ensure that the devices are registered in Autopilot.
|
||||
|
||||
:::image type="content" source="./images/win11-login-screen.png" alt-text="Windows 11 login screen" border="false":::
|
||||
|
||||
________________________________________________________
|
||||
---
|
||||
|
||||
## Next steps
|
||||
|
||||
With the devices joined to Azure AD tenant and managed by Intune, you can use Intune to maintain them and report on their status.
|
||||
With the devices joined to Microsoft Entra tenant and managed by Intune, you can use Intune to maintain them and report on their status.
|
||||
|
||||
> [!div class="nextstepaction"]
|
||||
> [Next: Manage devices >](manage-overview.md)
|
@ -1,16 +1,16 @@
|
||||
---
|
||||
title: Device enrollment overview
|
||||
description: Learn about the different options to enroll Windows devices in Microsoft Intune
|
||||
ms.date: 08/31/2022
|
||||
ms.date: 11/09/2023
|
||||
ms.topic: overview
|
||||
---
|
||||
|
||||
# Device enrollment overview
|
||||
|
||||
There are three main methods for joining Windows devices to Azure AD and getting them enrolled and managed by Intune:
|
||||
There are three main methods for joining Windows devices to Microsoft Entra ID and getting them enrolled and managed by Intune:
|
||||
|
||||
- **Automatic Intune enrollment via Azure AD join** happens when a user first turns on a device that is in out-of-box experience (OOBE), and selects the option to join Azure AD. In this scenario, the user can customize certain Windows functionalities before reaching the desktop, and becomes a local administrator of the device. This option isn't an ideal enrollment method for education devices
|
||||
- **Bulk enrollment with provisioning packages.** Provisioning packages are files that can be used to set up Windows devices, and can include information to connect to Wi-Fi networks and to join an Azure AD tenant. Provisioning packages can be created using either **Set Up School PCs** or **Windows Configuration Designer** applications. These files can be applied during or after the out-of-box experience
|
||||
- **Automatic Intune enrollment via Microsoft Entra join** happens when a user first turns on a device that is in out-of-box experience (OOBE), and selects the option to join Microsoft Entra ID. In this scenario, the user can customize certain Windows functionalities before reaching the desktop, and becomes a local administrator of the device. This option isn't an ideal enrollment method for education devices
|
||||
- **Bulk enrollment with provisioning packages.** Provisioning packages are files that can be used to set up Windows devices, and can include information to connect to Wi-Fi networks and to join a Microsoft Entra tenant. Provisioning packages can be created using either **Set Up School PCs** or **Windows Configuration Designer** applications. These files can be applied during or after the out-of-box experience
|
||||
- **Enrollment via Windows Autopilot.** Windows Autopilot is a collection of cloud services to configure the out-of-box experience, enabling light-touch or zero-touch deployment scenarios. Windows Autopilot simplifies the Windows device lifecycle, from initial deployment to end of life, for OEMs, resellers, IT administrators and end users
|
||||
|
||||
## Choose the enrollment method
|
||||
@ -22,9 +22,9 @@ This [table][INT-1] describes the ideal scenarios for using either option. It's
|
||||
|
||||
Select one of the following options to learn the next steps about the enrollment method you chose:
|
||||
> [!div class="op_single_selector"]
|
||||
> - [Automatic Intune enrollment via Azure AD join](enroll-aadj.md)
|
||||
> - [Automatic Intune enrollment via Microsoft Entra join](enroll-entra-join.md)
|
||||
> - [Bulk enrollment with provisioning packages](enroll-package.md)
|
||||
> - [Enroll devices with Windows Autopilot ](enroll-autopilot.md)
|
||||
> - [Enroll devices with Windows Autopilot](enroll-autopilot.md)
|
||||
|
||||
<!-- Reference links in article -->
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Enrollment of Windows devices with provisioning packages
|
||||
description: Learn about how to enroll Windows devices with provisioning packages using SUSPCs and Windows Configuration Designer.
|
||||
ms.date: 08/31/2022
|
||||
ms.date: 11/09/2023
|
||||
ms.topic: tutorial
|
||||
---
|
||||
|
||||
@ -17,7 +17,7 @@ You can create provisioning packages using either **Set Up School PCs** or **Win
|
||||
|
||||
## Set up School PCs
|
||||
|
||||
With Set up School PCs, you can create a package containing the most common device configurations that students need, and enroll devices in Intune. The package is saved on a USB stick, which can then be plugged into devices during OOBE. Applications and settings will be automatically applied to the devices, including the Azure AD join and Intune enrollment process.
|
||||
With Set up School PCs, you can create a package containing the most common device configurations that students need, and enroll devices in Intune. The package is saved on a USB stick, which can then be plugged into devices during OOBE. Applications and settings will be automatically applied to the devices, including the Microsoft Entra join and Intune enrollment process.
|
||||
|
||||
### Create a provisioning package
|
||||
|
||||
@ -44,15 +44,16 @@ For more information, see [Install Windows Configuration Designer][WIN-1], which
|
||||
|
||||
## Enroll devices with the provisioning package
|
||||
|
||||
To provision Windows devices with provisioning packages, insert the USB stick containing the package during the out-of-box experience. The devices will read the content of the package, join Azure AD and automatically enroll in Intune.
|
||||
To provision Windows devices with provisioning packages, insert the USB stick containing the package during the out-of-box experience. The devices will read the content of the package, join Microsoft Entra ID and automatically enroll in Intune.
|
||||
All settings defined in the package and in Intune will be applied to the device, and the device will be ready to use.
|
||||
|
||||
:::image type="content" source="./images/win11-oobe-ppkg.gif" alt-text="Windows 11 OOBE - enrollment with provisioning package animation." border="false":::
|
||||
|
||||
________________________________________________________
|
||||
---
|
||||
|
||||
## Next steps
|
||||
|
||||
With the devices joined to Azure AD tenant and managed by Intune, you can use Intune to maintain them and report on their status.
|
||||
With the devices joined to Microsoft Entra tenant and managed by Intune, you can use Intune to maintain them and report on their status.
|
||||
|
||||
> [!div class="nextstepaction"]
|
||||
> [Next: Manage devices >](manage-overview.md)
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Introduction to the tutorial deploy and manage Windows devices in a school
|
||||
description: Introduction to deployment and management of Windows devices in education environments.
|
||||
ms.date: 08/31/2022
|
||||
ms.date: 11/09/2023
|
||||
ms.topic: tutorial
|
||||
---
|
||||
|
||||
@ -46,7 +46,7 @@ From enrollment, through configuration and protection, to resetting, Intune for
|
||||
|
||||
:::image type="content" source="./images/device-lifecycle.png" alt-text="The device lifecycle for Intune-managed devices" border="false":::
|
||||
|
||||
- **Enroll:** to enable remote device management, devices must be enrolled in Intune with an account in your Azure AD tenant. Some enrollment methods require an IT administrator to initiate enrollment, while others require students to complete the initial device setup process. This document discusses the facets of various device enrollment methodologies
|
||||
- **Enroll:** to enable remote device management, devices must be enrolled in Intune with an account in your Microsoft Entra tenant. Some enrollment methods require an IT administrator to initiate enrollment, while others require students to complete the initial device setup process. This document discusses the facets of various device enrollment methodologies
|
||||
- **Configure:** once the devices are enrolled in Intune, applications and settings will be applied, as defined by the IT administrator
|
||||
- **Protect and manage:** in addition to its configuration capabilities, Intune for Education helps protect devices from unauthorized access or malicious attacks. For example, adding an extra layer of authentication with Windows Hello can make devices more secure. Policies are available that let you control settings for Windows Firewall, Endpoint Protection, and software updates
|
||||
- **Retire:** when it's time to repurpose a device, Intune for Education offers several options, including resetting the device, removing it from management, or wiping school data. In this document, we cover different device return and exchange scenarios
|
||||
@ -55,18 +55,19 @@ From enrollment, through configuration and protection, to resetting, Intune for
|
||||
|
||||
In the remainder of this document, we'll discuss the key concepts and benefits of modern device management with Microsoft 365 solutions for education. The guidance is organized around the four main pillars of modern device management:
|
||||
|
||||
- **Identity management:** setting up and configuring the identity system, with Microsoft 365 Education and Azure Active Directory, as the foundation for user identity and authentication
|
||||
- **Identity management:** setting up and configuring the identity system, with Microsoft 365 Education and Microsoft Entra ID, as the foundation for user identity and authentication
|
||||
- **Initial setup:** setting up the Intune for Education environment for managing devices, including configuring settings, deploying applications, and defining updates cadence
|
||||
- **Device enrollment:** Setting up Windows devices for deployment and enrolling them in Intune for Education
|
||||
- **Device reset:** Resetting managed devices with Intune for Education
|
||||
|
||||
________________________________________________________
|
||||
---
|
||||
|
||||
## Next steps
|
||||
|
||||
Let's begin with the creation and configuration of your Azure AD tenant and Intune environment.
|
||||
Let's begin with the creation and configuration of your Microsoft Entra tenant and Intune environment.
|
||||
|
||||
> [!div class="nextstepaction"]
|
||||
> [Next: Set up Azure Active Directory >](set-up-azure-ad.md)
|
||||
> [Next: Set up Microsoft Entra ID >](set-up-microsoft-entra-id.md)
|
||||
|
||||
<!-- Reference links in article -->
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Manage devices with Microsoft Intune
|
||||
description: Overview of device management capabilities in Intune for Education, including remote actions, remote assistance and inventory/reporting.
|
||||
ms.date: 08/31/2022
|
||||
ms.date: 11/09/2023
|
||||
ms.topic: tutorial
|
||||
---
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Management functionalities for Surface devices
|
||||
description: Learn about the management capabilities offered to Surface devices, including firmware management and the Surface Management Portal.
|
||||
ms.date: 08/31/2022
|
||||
ms.date: 11/09/2023
|
||||
ms.topic: tutorial
|
||||
appliesto:
|
||||
- ✅ <b>Surface devices</b>
|
||||
@ -9,7 +9,7 @@ appliesto:
|
||||
|
||||
# Management functionalities for Surface devices
|
||||
|
||||
Microsoft Surface devices offer many advanced management functionalities, including the possibility to manage firmware settings and a web portal designed for them.
|
||||
Microsoft Surface devices offer advanced management functionalities, including the possibility to manage firmware settings and a web portal designed for them.
|
||||
|
||||
## Manage device firmware for Surface devices
|
||||
|
||||
@ -27,20 +27,18 @@ When Surface devices are enrolled in cloud management and users sign in for the
|
||||
|
||||
To access and use the Surface Management Portal:
|
||||
|
||||
1. Sign in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431).
|
||||
2. Select **All services** > **Surface Management Portal**
|
||||
1. Sign in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431)
|
||||
1. Select **All services** > **Surface Management Portal**
|
||||
:::image type="content" source="./images/surface-management-portal.png" alt-text="Surface Management Portal within Microsoft Intune" lightbox="./images/surface-management-portal-expanded.png" border="true":::
|
||||
3. To obtain insights for all your Surface devices, select **Monitor**
|
||||
1. To obtain insights for all your Surface devices, select **Monitor**
|
||||
- Devices that are out of compliance or not registered, have critically low storage, require updates, or are currently inactive, are listed here
|
||||
4. To obtain details on each insights category, select **View report**
|
||||
1. To obtain details on each insights category, select **View report**
|
||||
- This dashboard displays diagnostic information that you can customize and export
|
||||
5. To obtain the device's warranty information, select **Device warranty and coverage**
|
||||
6. To review a list of support requests and their status, select **Support requests**
|
||||
1. To obtain the device's warranty information, select **Device warranty and coverage**
|
||||
1. To review a list of support requests and their status, select **Support requests**
|
||||
|
||||
<!-- Reference links in article -->
|
||||
|
||||
[INT-1]: /intune/configuration/device-firmware-configuration-interface-windows
|
||||
|
||||
[MEM-1]: /mem/autopilot/dfci-management
|
||||
|
||||
[SURF-1]: /surface/surface-manage-dfci-guide
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Reset and wipe Windows devices
|
||||
description: Learn about the reset and wipe options for Windows devices using Intune for Education, including scenarios when to delete devices.
|
||||
ms.date: 08/31/2022
|
||||
ms.date: 11/09/2023
|
||||
ms.topic: tutorial
|
||||
---
|
||||
|
||||
@ -86,7 +86,7 @@ There are scenarios that require a device to be deleted from your tenant, for ex
|
||||
|
||||
1. If possible, perform a **factory reset (wipe)** of the device. If the device can't be wiped, delete the device from Intune using [these steps][MEM-1]
|
||||
1. If the device is registered in Autopilot, delete the Autopilot object using [these steps][MEM-2]
|
||||
1. Delete the device from Azure Active Directory using [these steps][MEM-3]
|
||||
1. Delete the device from Microsoft Entra ID using [these steps][MEM-3]
|
||||
|
||||
## Autopilot considerations for a motherboard replacement scenario
|
||||
|
||||
@ -104,6 +104,7 @@ Repairing Autopilot-enrolled devices can be complex, as OEM requirements must be
|
||||
For more information, see [Autopilot motherboard replacement scenario guidance][MEM-4].
|
||||
|
||||
<!-- Reference links in article -->
|
||||
|
||||
[MEM-1]: /mem/intune/remote-actions/devices-wipe#delete-devices-from-the-intune-portal
|
||||
[MEM-2]: /mem/intune/remote-actions/devices-wipe#delete-devices-from-the-intune-portal
|
||||
[MEM-3]: /mem/intune/remote-actions/devices-wipe#delete-devices-from-the-azure-active-directory-portal
|
||||
|
@ -1,16 +1,16 @@
|
||||
---
|
||||
title: Set up Azure Active Directory
|
||||
description: Learn how to create and prepare your Azure AD tenant for an education environment.
|
||||
ms.date: 08/31/2022
|
||||
title: Set up Microsoft Entra ID
|
||||
description: Learn how to create and prepare your Microsoft Entra tenant for an education environment.
|
||||
ms.date: 11/09/2023
|
||||
ms.topic: tutorial
|
||||
appliesto:
|
||||
---
|
||||
|
||||
# Set up Azure Active Directory
|
||||
# Set up Microsoft Entra ID
|
||||
|
||||
The Microsoft platform for education simplifies the management of Windows devices with Intune for Education and Microsoft 365 Education. The first, fundamental step, is to configure the identity infrastructure to manage user access and permissions for your school.
|
||||
|
||||
Azure Active Directory (Azure AD), which is included with the Microsoft 365 Education subscription, provides authentication and authorization to any Microsoft cloud services. Identity objects are defined in Azure AD for human identities, like students and teachers, as well as non-human identities, like devices, services, and applications. Once users get Microsoft 365 licenses assigned, they'll be able to consume services and access resources within the tenant. With Microsoft 365 Education, you can manage identities for your teachers and students, assign licenses to devices and users, and create groups for the classrooms.
|
||||
Microsoft Entra ID, which is included with the Microsoft 365 Education subscription, provides authentication and authorization to any Microsoft cloud services. Identity objects are defined in Microsoft Entra ID for human identities, like students and teachers, as well as non-human identities, like devices, services, and applications. Once users get Microsoft 365 licenses assigned, they'll be able to consume services and access resources within the tenant. With Microsoft 365 Education, you can manage identities for your teachers and students, assign licenses to devices and users, and create groups for the classrooms.
|
||||
|
||||
In this section you will:
|
||||
> [!div class="checklist"]
|
||||
@ -31,7 +31,7 @@ For more information, see [Create your Office 365 tenant account][M365-1]
|
||||
|
||||
The **Microsoft 365 admin center** is the hub for all administrative consoles for the Microsoft 365 cloud. To access the <a href="https://entra.microsoft.com" target="_blank"><u>Microsoft Entra admin center</u></a>, sign in with the same global administrator account when you [created the Microsoft 365 tenant](#create-a-microsoft-365-tenant).
|
||||
|
||||
From the Microsoft 365 admin center, you can access different administrative dashboards: Azure Active Directory, Microsoft Intune, Intune for Education, and others:
|
||||
From the Microsoft 365 admin center, you can access different administrative dashboards: Microsoft Entra ID, Microsoft Intune, Intune for Education, and others:
|
||||
|
||||
:::image type="content" source="./images/m365-admin-center.png" alt-text="*All admin centers* page in *Microsoft 365 admin center*" lightbox="./images/m365-admin-center.png" border="true":::
|
||||
|
||||
@ -45,7 +45,7 @@ For more information, see [Overview of the Microsoft 365 admin center][M365-2].
|
||||
With the Microsoft 365 tenant in place, it's time to add users, create groups, and assign licenses. All students and teachers need a user account before they can sign in and access the different Microsoft 365 services. There are multiple ways to do this, including using School Data Sync (SDS), synchronizing an on-premises Active Directory, manually, or a combination of the above.
|
||||
|
||||
> [!NOTE]
|
||||
> Synchronizing your Student Information System (SIS) with School Data Sync is the preferred way to create students and teachers as users in a Microsoft 365 Education tenant. However, if you want to integrate an on-premises directory and synchronize accounts to the cloud, skip to [<u>Azure Active Directory sync</u>](#azure-active-directory-sync) below.
|
||||
> Synchronizing your Student Information System (SIS) with School Data Sync is the preferred way to create students and teachers as users in a Microsoft 365 Education tenant. However, if you want to integrate an on-premises directory and synchronize accounts to the cloud, skip to [<u>Azure Active Directory Sync</u>](#azure-active-directory-sync) below.
|
||||
|
||||
### School Data Sync
|
||||
|
||||
@ -61,9 +61,9 @@ For more information, see [Overview of School Data Sync][SDS-1].
|
||||
>
|
||||
> Remember that you should typically deploy test SDS data (users, groups, and so on) in a separate test tenant, not your school production environment.
|
||||
|
||||
### Azure Active Directory sync
|
||||
### Azure Active Directory Sync
|
||||
|
||||
To integrate an on-premises directory with Azure Active Directory, you can use **Microsoft Azure Active Directory Connect** to synchronize users, groups, and other objects. Azure AD Connect lets you configure the authentication method appropriate for your school, including:
|
||||
To integrate an on-premises directory with Microsoft Entra ID, you can use **Microsoft Entra Connect** to synchronize users, groups, and other objects. Microsoft Entra Connect lets you configure the authentication method appropriate for your school, including:
|
||||
|
||||
- [Password hash synchronization][AAD-1]
|
||||
- [Pass-through authentication][AAD-2]
|
||||
@ -79,19 +79,20 @@ There are two options for adding users manually, either individually or in bulk:
|
||||
|
||||
1. To add students and teachers as users in Microsoft 365 Education *individually*:
|
||||
- Sign in to the <a href="https://entra.microsoft.com" target="_blank"><b>Microsoft Entra admin center</b></a>
|
||||
- Select **Azure Active Directory** > **Users** > **All users** > **New user** > **Create new user**
|
||||
- Select **Microsoft Entra ID** > **Users** > **All users** > **New user** > **Create new user**
|
||||
For more information, see [Add users and assign licenses at the same time][M365-3].
|
||||
1. To add *multiple* users to Microsoft 365 Education:
|
||||
- Sign in to the <a href="https://entra.microsoft.com" target="_blank"><b>Microsoft Entra admin center</b></a>
|
||||
- Select **Azure Active Directory** > **Users** > **All users** > **Bulk operations** > **Bulk create**
|
||||
- Select **Microsoft Entra ID** > **Users** > **All users** > **Bulk operations** > **Bulk create**
|
||||
|
||||
For more information, see [Add multiple users in the Microsoft 365 admin center][M365-4].
|
||||
|
||||
### Create groups
|
||||
|
||||
Creating groups is important to simplify multiple tasks, like assigning licenses, delegating administration, deploy settings, applications or to distribute assignments to students. To create groups:
|
||||
|
||||
1. Sign in to the <a href="https://entra.microsoft.com" target="_blank"><b>Microsoft Entra admin center</b></a>
|
||||
1. Select **Azure Active Directory** > **Groups** > **All groups** > **New group**
|
||||
1. Select **Microsoft Entra ID** > **Groups** > **All groups** > **New group**
|
||||
1. On the **New group** page, select **Group type** > **Security**
|
||||
1. Provide a group name and add members, as needed
|
||||
1. Select **Next**
|
||||
@ -100,18 +101,18 @@ For more information, see [Create a group in the Microsoft 365 admin center][M36
|
||||
|
||||
### Assign licenses
|
||||
|
||||
The recommended way to assign licenses is through group-based licensing. With this method, Azure AD ensures that licenses are assigned to all members of the group. Any new members who join the group are assigned the appropriate licenses, and when members leave, their licenses are removed.
|
||||
The recommended way to assign licenses is through group-based licensing. With this method, Microsoft Entra ID ensures that licenses are assigned to all members of the group. Any new members who join the group are assigned the appropriate licenses, and when members leave, their licenses are removed.
|
||||
|
||||
To assign a license to a group:
|
||||
|
||||
1. Sign in to the <a href="https://entra.microsoft.com" target="_blank"><b>Microsoft Entra admin center</b></a>
|
||||
1. Select **Azure Active Directory** > **Show More** > **Billing** > **Licenses**
|
||||
1. Select **Microsoft Entra ID** > **Show More** > **Billing** > **Licenses**
|
||||
1. Select the required products that you want to assign licenses for > **Assign**
|
||||
1. Add the groups to which the licenses should be assigned
|
||||
|
||||
:::image type="content" source="images/entra-assign-licenses.png" alt-text="Assign licenses from Microsoft Entra admin center." lightbox="images/entra-assign-licenses.png":::
|
||||
|
||||
For more information, see [Group-based licensing using Azure AD admin center][AAD-4].
|
||||
For more information, see [Group-based licensing using Microsoft Entra admin center][AAD-4].
|
||||
|
||||
## Configure school branding
|
||||
|
||||
@ -120,30 +121,30 @@ Configuring your school branding enables a more familiar Autopilot experience to
|
||||
To configure your school's branding:
|
||||
|
||||
1. Sign in to the <a href="https://entra.microsoft.com" target="_blank"><b>Microsoft Entra admin center</b></a>
|
||||
1. Select **Azure Active Directory** > **Show More** > **User experiences** > **Company branding**
|
||||
1. Select **Microsoft Entra ID** > **Show More** > **User experiences** > **Company branding**
|
||||
1. You can specify brand settings like background image, logo, username hint and a sign-in page text
|
||||
:::image type="content" source="images/entra-branding.png" alt-text="Configure Azure AD branding from Microsoft Entra admin center." lightbox="images/entra-branding.png":::
|
||||
1. To adjust the school tenant's name displayed during OOBE, select **Azure Active Directory** > **Overview** > **Properties**
|
||||
:::image type="content" source="images/entra-branding.png" alt-text="Configure Microsoft Entra ID branding from Microsoft Entra admin center." lightbox="images/entra-branding.png":::
|
||||
1. To adjust the school tenant's name displayed during OOBE, select **Microsoft Entra ID** > **Overview** > **Properties**
|
||||
1. In the **Name** field, enter the school district or organization's name > **Save**
|
||||
:::image type="content" alt-text="Configure Azure AD tenant name from Microsoft Entra admin center." source="images/entra-tenant-name.png" lightbox="images/entra-tenant-name.png":::
|
||||
:::image type="content" alt-text="Configure Microsoft Entra tenant name from Microsoft Entra admin center." source="images/entra-tenant-name.png" lightbox="images/entra-tenant-name.png":::
|
||||
|
||||
For more information, see [Add branding to your directory][AAD-5].
|
||||
|
||||
## Enable bulk enrollment
|
||||
|
||||
If you decide to enroll Windows devices using provisioning packages instead of Windows Autopilot, you must ensure that the provisioning packages can join Windows devices to the Azure AD tenant.
|
||||
If you decide to enroll Windows devices using provisioning packages instead of Windows Autopilot, you must ensure that the provisioning packages can join Windows devices to the Microsoft Entra tenant.
|
||||
|
||||
To allow provisioning packages to complete the Azure AD Join process:
|
||||
To allow provisioning packages to complete the Microsoft Entra join process:
|
||||
|
||||
1. Sign in to the <a href="https://entra.microsoft.com" target="_blank"><b>Microsoft Entra admin center</b></a>
|
||||
1. Select **Azure Active Directory** > **Devices** > **Device Settings**
|
||||
1. Under **Users may join devices to Azure AD**, select **All**
|
||||
1. Select **Microsoft Entra ID** > **Devices** > **Device Settings**
|
||||
1. Under **Users may join devices to Microsoft Entra ID**, select **All**
|
||||
> [!NOTE]
|
||||
> If it is required that only specific users can join devices to Azure AD, select **Selected**. Ensure that the user account that will create provisioning packages is included in the list of users.
|
||||
> If it is required that only specific users can join devices to Microsoft Entra ID, select **Selected**. Ensure that the user account that will create provisioning packages is included in the list of users.
|
||||
1. Select Save
|
||||
:::image type="content" source="images/entra-device-settings.png" alt-text="Configure device settings from Microsoft Entra admin center." lightbox="images/entra-device-settings.png":::
|
||||
|
||||
________________________________________________________
|
||||
---
|
||||
|
||||
## Next steps
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Set up device management
|
||||
description: Learn how to configure the Intune service and set up the environment for education.
|
||||
ms.date: 08/31/2022
|
||||
ms.date: 11/09/2023
|
||||
ms.topic: tutorial
|
||||
appliesto:
|
||||
---
|
||||
@ -74,7 +74,7 @@ To disable Windows Hello for Business at the tenant level:
|
||||
|
||||
For more information how to enable Windows Hello for Business on specific devices, see [Create a Windows Hello for Business policy][MEM-4].
|
||||
|
||||
________________________________________________________
|
||||
---
|
||||
|
||||
## Next steps
|
||||
|
||||
|
@ -3,8 +3,8 @@ items:
|
||||
href: index.md
|
||||
- name: 1. Prepare your tenant
|
||||
items:
|
||||
- name: Set up Azure Active Directory
|
||||
href: set-up-azure-ad.md
|
||||
- name: Set up Microsoft Entra ID
|
||||
href: set-up-microsoft-entra-id.md
|
||||
- name: Set up Microsoft Intune
|
||||
href: set-up-microsoft-intune.md
|
||||
- name: 2. Configure settings and applications
|
||||
@ -19,8 +19,8 @@ items:
|
||||
items:
|
||||
- name: Overview
|
||||
href: enroll-overview.md
|
||||
- name: Enroll devices via Azure AD join
|
||||
href: enroll-aadj.md
|
||||
- name: Enroll devices via Microsoft Entra join
|
||||
href: enroll-entra-join.md
|
||||
- name: Enroll devices with provisioning packages
|
||||
href: enroll-package.md
|
||||
- name: Enroll devices with Windows Autopilot
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Troubleshoot Windows devices
|
||||
description: Learn how to troubleshoot Windows devices from Intune and contact Microsoft Support for issues related to Intune and other services.
|
||||
ms.date: 08/31/2022
|
||||
ms.date: 11/09/2023
|
||||
ms.topic: tutorial
|
||||
---
|
||||
|
||||
@ -25,10 +25,9 @@ Here's a collection of resources to help you troubleshoot Windows devices manage
|
||||
|
||||
Microsoft provides global technical, pre-sales, billing, and subscription support for cloud-based device management services. This support includes Microsoft Intune, Configuration Manager, Windows 365, and Microsoft Managed Desktop.
|
||||
|
||||
Follow these steps to obtain support in Microsoft Intune provides many tools that can help you troubleshoot Windows devices.
|
||||
:
|
||||
Follow these steps to obtain support in Microsoft Intune provides many tools that can help you troubleshoot Windows devices:
|
||||
|
||||
- Sign in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431).
|
||||
- Sign in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431)
|
||||
- Select **Troubleshooting + support** > **Help and support**
|
||||
:::image type="content" source="images/advanced-support.png" alt-text="Screenshot that shows how to obtain support from Microsoft Intune." lightbox="images/advanced-support.png":::
|
||||
- Select the required support scenario: Configuration Manager, Intune, Co-management, or Windows 365
|
||||
|
@ -2,87 +2,89 @@
|
||||
title: Use Set up School PCs app
|
||||
description: Learn how to use the Set up School PCs app and apply the provisioning package.
|
||||
ms.topic: how-to
|
||||
ms.date: 08/10/2022
|
||||
ms.date: 11/09/2023
|
||||
appliesto:
|
||||
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 10</a>
|
||||
---
|
||||
|
||||
# Use the Set up School PCs app
|
||||
|
||||
IT administrators and technical teachers can use the **Set up School PCs** app to quickly set up Windows 10 PCs for students. The app configures PCs with the apps and features students need, and it removes the ones they don't need. During setup, if licensed in your tenant, the app enrolls each student PC into a mobile device management (MDM) provider, such as Intune for Education. You can then manage all the settings the app configures through the MDM.
|
||||
IT administrators and technical teachers can use the **Set up School PCs** app to quickly set up Windows devices for students. The app configures devices with the apps and features students need, and it removes the ones they don't need. During setup, if licensed in your tenant, the app enrolls each student device in Microsoft Intune. You can then manage all the settings the app configures through Intune.
|
||||
|
||||
Set up School PCs also:
|
||||
* Joins each student PC to your organization's Office 365 and Azure Active Directory tenant.
|
||||
* Enables the optional Autopilot Reset feature, to return devices to a fully configured or known IT-approved state.
|
||||
* Utilizes Windows Update and maintenance hours to keep student PCs up-to-date, without interfering with class time.
|
||||
* Locks down the student PC to prevent activity that isn't beneficial to their education.
|
||||
With Set up School PCs you can:
|
||||
|
||||
This article describes how to fill out your school's information in the Set up School PCs app. To learn more about the app's functionality, start with the [Technical reference for the Set up School PCs app](set-up-school-pcs-technical.md).
|
||||
- Joins student devices to your organization's Microsoft Entra tenant
|
||||
- Enable the optional Autopilot Reset feature, to return devices to a fully configured or known IT-approved state
|
||||
- Use Windows Update and maintenance hours to keep student devices up-to-date, without interfering with class time
|
||||
- Lock down student devices to prevent activity that aren't beneficial to their education
|
||||
|
||||
This article describes how to use the Set up School PCs app. To learn more about the app's functionality, review the [Technical reference for the Set up School PCs app](set-up-school-pcs-technical.md).
|
||||
|
||||
## Requirements
|
||||
Before you begin, make sure that you, your computer, and your school's network are configured with the following requirements.
|
||||
|
||||
* Office 365 and Azure Active Directory
|
||||
* [Latest Set up School PCs app](https://www.microsoft.com/store/apps/9nblggh4ls40)
|
||||
* A NTFS-formatted USB drive that is at least 1 GB, if not installing Office; and at least 8 GB, if installing Office
|
||||
* Student PCs must either:
|
||||
* Be within range of the Wi-Fi network that you configured in the app.
|
||||
* Have a wired Ethernet connection when you set them up.
|
||||
Before you begin, make sure that your devices and your school's network are configured with the following requirements:
|
||||
|
||||
### Configure USB drive for additional space
|
||||
USB drives are, by default, FAT32-formatted, and are unable to save more than 4 GB of data. If you plan to install several apps, or large apps like Microsoft Office, you'll need more space. To create more space on the USB drive, reformat it to NTFS.
|
||||
1. Insert the USB drive into your computer.
|
||||
2. Go to the **Start** > **This PC**.
|
||||
3. In the **Devices and drives** section, find your USB drive. Right-click to see its options.
|
||||
4. Select **Format** from the list to bring up the **Format drive name** window.
|
||||
5. Set **File system** to **NTFS**.
|
||||
6. Click **Start** to format the drive.
|
||||
- Microsoft Entra ID and Microsoft 365 licenses
|
||||
- [Latest Set up School PCs app](https://apps.microsoft.com/detail/9NBLGGH4LS40)
|
||||
- A NTFS-formatted USB drive that is at least 1 GB
|
||||
- Student devices must either:
|
||||
- Be within range of the Wi-Fi network that you configured in the app
|
||||
- Have a wired Ethernet connection when you set them up
|
||||
|
||||
### Prepare existing PC account for new setup
|
||||
Apply new packages to factory reset or new PCs. If you apply it to a PC that's already set up, you may lose the accounts and data.
|
||||
|
||||
If a PC has already been set up, and you want to apply a new package, reset the PC to a clean state.
|
||||
Apply new packages to factory reset or new devices. If you apply it to a device that's already set up, you may lose the accounts and data.
|
||||
|
||||
To begin, go to the **Settings** app on the appropriate PC.
|
||||
1. Click **Update & Security** > **Recovery**.
|
||||
2. In the **Reset this PC** section, click **Get started**.
|
||||
3. Click **Remove everything**.
|
||||
If a device is already set up, and you want to apply a new package, reset the device to a clean state. To reset a device, follow these steps:
|
||||
|
||||
You can also go to **Start** > **Power** icon. Hold down the Shift key and click **Restart** to load the Windows boot user experience. From there, follow these steps:
|
||||
1. Click **Troubleshoot** and then choose **Reset this PC**.
|
||||
2. Select **Remove everything**.
|
||||
3. If the option appears, select **Only the drive where Windows is installed**.
|
||||
4. Click **Just remove my files**.
|
||||
5. Click **Reset**.
|
||||
1. Open the **Settings** app on target device
|
||||
1. Select **Update & Security** > **Recovery**
|
||||
1. In the **Reset this PC** section, select **Get started**
|
||||
1. Select **Remove everything**
|
||||
|
||||
Alternatively, you can also select **Start** > **Power** icon. Hold down <kbd>Shift</kbd> while selecting **Restart** to load the Windows boot user experience:
|
||||
|
||||
1. Select **Troubleshoot** > **Reset this PC**
|
||||
1. Select **Remove everything**
|
||||
1. If the option appears, select **Only the drive where Windows is installed**
|
||||
1. Select **Just remove my files**
|
||||
1. Select **Reset**
|
||||
|
||||
## Recommendations
|
||||
|
||||
This section offers recommendations to prepare you for the best possible setup experience.
|
||||
### Run the same Windows 10 build on the admin device and the student PCs
|
||||
We recommend you run the IT administrator or technical teacher's device on the same Windows 10 build as the student PCs.
|
||||
|
||||
### Student PCs should meet OS requirements for the app
|
||||
Check the OS requirements in the Set up School PCs app. We recommend using the latest Set up School PCs app along with the latest Windows 10 images on the student PCs.
|
||||
### Run the same Windows build on the admin device and the student devices
|
||||
|
||||
To check the app's OS requirements, go to the Microsoft Store and locate the Set up School PCs app. In the app's description, go to **System Requirements > OS**.
|
||||
We recommend you run the IT administrator or technical teacher's device on the same Windows build as the student devices.
|
||||
|
||||
### Student devices must meet OS requirements for the app
|
||||
|
||||
Check the OS requirements in the Set up School PCs app. We recommend using the latest Set up School PCs app along with the latest Windows images on the student devices.
|
||||
|
||||
To check the app's OS requirements, go to the Microsoft Store and locate the Set up School PCs app. In the app's description, go to **System Requirements** > **OS**.
|
||||
|
||||
### Use app on a PC that is connected to your school's network
|
||||
We recommend that you run the Set up School PCs app on a computer that's connected to your school's network. That way the app can gather accurate information about your school's wireless networks and cloud subscriptions. If it's not connected, you'll need to enter the information manually.
|
||||
|
||||
> [!NOTE]
|
||||
> Don't use the **Set up Schools PCs** app for PCs that must connect to:
|
||||
>* Enterprise networks that require the user to accept Terms of Use.
|
||||
>* Open Wi-Fi networks that require the user to accept Terms of Use.
|
||||
We recommend that you run the Set up School PCs app on a computer that's connected to your school's network. That way the app can gather accurate information about your school's wireless networks and cloud subscriptions. If it's not connected, you need to enter the information manually.
|
||||
|
||||
>[!NOTE]
|
||||
>Don't use the **Set up Schools PCs** app for devices that must connect to enterprise or open Wi-Fi networds that require the user to accept Terms of Use.
|
||||
|
||||
### Run app on an open network or network that requires a basic password
|
||||
Don't use Set up School PCs over a certification-based network, or one where you have to enter credentials in a browser. If you need to set up many devices over Wi-Fi, make sure that your network configuration can support it.
|
||||
|
||||
Don't use Set up School PCs over a certificate-based network, or one where you have to enter credentials in a browser. If you need to set up many devices over Wi-Fi, make sure that your network configuration can support it.
|
||||
|
||||
We recommend that you:
|
||||
* Configure your DHCP so at least 200 IP addresses are available for your devices. Having available IP addresses will allow you to set up many devices simultaneously.
|
||||
* Configure your IP addresses to expire after a short time--about 30 minutes. IP addresses will free up quickly so you can continue to set up devices without network issues.
|
||||
|
||||
> > [!WARNING]
|
||||
> > Only use the provisioning package on PCs that you want to configure and lock down for students. After you apply the provisioning package to a student PC, the PC must be reset to remove the settings.
|
||||
- Configure your DHCP so at least 200 IP addresses are available for your devices. Having available IP addresses allow you to set up many devices simultaneously
|
||||
- Configure your IP addresses to expire after a short time, for example 30 minutes. IP addresses free up quickly so you can continue to set up devices without network issues.
|
||||
|
||||
>[!WARNING]
|
||||
>Only use the provisioning package on devices that you want to configure and lock down for students. After you apply the provisioning package to a student device, the PC must be reset to remove the settings.
|
||||
|
||||
### Use an additional USB drive
|
||||
|
||||
To set up more than one PC at the same time, save the provisioning package to additional USB drives. Then plug the USBs in at the same time during setup.
|
||||
|
||||
### Limit changes to school-optimized settings
|
||||
@ -91,193 +93,172 @@ We strongly recommend that you avoid changing preset policies. Changes can slow
|
||||
|
||||
## Create the provisioning package
|
||||
|
||||
The **Set up School PCs** app guides you through the configuration choices for the student PCs. To begin, open the app on your PC and click **Get started**.
|
||||
The **Set up School PCs** app guides you through the configuration choices for the student PCs. To begin, open the app on your device and select **Get started**.
|
||||
|
||||

|
||||

|
||||
|
||||
### Package name
|
||||
|
||||
Type a unique name to help distinguish your school's provisioning packages. The name appears:
|
||||
|
||||
* On the local package folder
|
||||
* In your tenant's Azure AD account in the Azure portal
|
||||
- On the local package folder
|
||||
- In your tenant's Microsoft Entra account in the Azure portal
|
||||
|
||||
A package expiration date is also attached to the end of each package. For example, *Set_Up_School_PCs (Expires 4-16-2019)*. The expiration date is 180 days after you create your package.
|
||||
A package expiration date is also attached to the end of each package. For example, *Set_Up_School_PCs (Expires 1-1-2024)*. The expiration date is 180 days after you create your package.
|
||||
|
||||

|
||||
|
||||
After you click **Next**, you can no longer change the name in the app. To create a package with a different name, reopen the Set up School PCs app.
|
||||
|
||||
To change an existing package's name, right-click the package folder on your device and select **Rename**. This action does not change the name in Azure AD. If you have Global Admin permissions, you can go to Azure AD in the Azure portal, and rename the package there.
|
||||
After you select **Next**, you can no longer change the name in the app. To create a package with a different name, reopen the Set up School PCs app.
|
||||
|
||||
To change an existing package's name, right-click the package folder on your device and select **Rename**. This action doesn't change the name in Microsoft Entra ID. If you have Global Admin permissions, you can go to Microsoft Entra ID in the Azure portal, and rename the package there.
|
||||
|
||||
### Sign in
|
||||
|
||||
1. Select how you want to sign in.
|
||||
a. (Recommended) To enable student PCs to automatically be connect to Office 365, Azure AD, and management services like Intune for Education, click **Sign-in**. Then go to step 3.
|
||||
b. To complete setup without signing in, click **Continue without account**. Student PCs won't be connected to your school's cloud services and managing them will be more difficult later. Continue to [Wireless network](#wireless-network).
|
||||
2. In the new window, select the account you want to use throughout setup.
|
||||
1. Select how you want to sign in
|
||||
1. (Recommended) To enable student device to automatically connect and authenticate to Microsoft Entra ID, and management services like Microsoft Intune, select **Sign-in**. Then go to step 3
|
||||
1. To complete setup without signing in, select **Continue without account**. Student devices won't connect to your school's cloud services and their management will be more difficult later. Continue to [Wireless network](#wireless-network)
|
||||
1. In the new window, select the account you want to use throughout setup.
|
||||
|
||||

|
||||
|
||||
To add an account not listed:
|
||||
a. Click **Work or school account** > **Continue**.
|
||||
b. Type in the account username and click **Next**.
|
||||
c. Verify the user account and password, if prompted.
|
||||
1. Select **Work or school account** > **Continue**.
|
||||
1. Type in the account username and select **Next**.
|
||||
1. Verify the user account and password, if prompted.
|
||||
|
||||
|
||||
3. Click **Accept** to allow Set up School PCs to access your account throughout setup.
|
||||
2. When your account name appears on the page, as shown in the image below, click **Next.**
|
||||
1. Select **Accept** to allow Set up School PCs to access your account throughout setup
|
||||
1. When your account name appears on the page, select **Next**
|
||||
|
||||

|
||||
|
||||
### Wireless network
|
||||
Add and save the wireless network profile that you want student PCs to connect to. Only skip Wi-Fi setup if you have an Ethernet connection.
|
||||
|
||||
Select your school's Wi-Fi network from the list of available wireless networks, or click **Add a wireless network** to manually configure it. Then click **Next.**
|
||||
Add and save the wireless network profile that you want student devices to connect to. Only skip Wi-Fi setup if you have an Ethernet connection.
|
||||
|
||||
Select your organization's Wi-Fi network from the list of available wireless networks, or select **Add a wireless network** to manually configure it. Then select **Next**
|
||||
|
||||

|
||||
|
||||
### Device names
|
||||
Create a short name to add as a prefix to each PC. This name will help you recognize and manage this specific group of devices in your mobile device manager. The name must be five (5) characters or less.
|
||||
|
||||
To make sure all device names are unique, Set up School PCs automatically appends `_%SERIAL%` to the name. For example, if you add *Math4* as the prefix, the device names will appear as *Math4* followed by a random string of letters and numbers.
|
||||
Create a name to add as a prefix to each device. This name helps you recognize and manage this group of devices in Intune.
|
||||
|
||||
To keep the default name for your devices, click **Continue with existing names**.
|
||||
To make sure all device names are unique, Set up School PCs automatically appends `_%SERIAL%` to the name. For example, if you add *MATH4* as the prefix, the device names appear as *MATH4* followed by the device serial number.
|
||||
|
||||
To keep the default name for your devices, select **Continue with existing names**.
|
||||
|
||||

|
||||
|
||||
|
||||
|
||||
### Settings
|
||||
Select additional settings to include in the provisioning package. To begin, select the operating system on your student PCs.
|
||||
|
||||
Select more settings to include in the provisioning package. To begin, select the operating system on your student PCs.
|
||||
|
||||

|
||||
|
||||
Setting selections vary based on the OS version you select. The example screenshot below shows the settings that become available when you select **Windows 10 version 1703**. The option to **Enable Autopilot Reset** is not available for this version of Windows 10.
|
||||
|
||||
Setting selections vary based on the OS version you select.
|
||||
|
||||

|
||||
|
||||
|
||||
> [!NOTE]
|
||||
> The [**Time zone** setting](use-set-up-school-pcs-app.md#time-zone), shown in the sidebar of the screenshot above, is not made available to versions of Windows 10 in S mode. If you select a version in S mode, **Time zone** will become disabled.
|
||||
|
||||
The following table describes each setting and lists the applicable Windows 10 versions. To find out if a setting is available in your version of Windows 10, look for an *X* in the setting row and in the version column.
|
||||
|
||||
|Setting |1703|1709|1803|1809|What happens if I select it? |Note|
|
||||
|---------|---------|---------|---------|---------|---------|---------|
|
||||
|Remove apps pre-installed by the device manufacturer |X|X|X|X| Uninstalls apps that came loaded on the computer by the device's manufacturer. |Adds about 30 minutes to the provisioning process.|
|
||||
|Allow local storage (not recommended for shared devices) |X|X|X|X| Lets students save files to the Desktop and Documents folder on the Student PC. |Not recommended if the device will be shared between different students.|
|
||||
|Optimize device for a single student, instead of a shared cart or lab |X|X|X|X|Optimizes the device for use by a single student, rather than many students. |Recommended if the device will be shared between different students. Single-optimized accounts are set to expire, and require a sign-in, 180 days after setup. This setting increases the maximum PC storage to 100% of the available disk space. In this case, student accounts aren't deleted unless the account has been inactive for 180 days. |
|
||||
|Let guests sign in to these PCs |X|X|X|X|Allows guests to use student PCs without a school account. |Common to use within a public, shared space, such as a library. Also used when a student loses their password. Adds a **Guest** account to the PC sign-in screen that anyone can sign in to.|
|
||||
|Enable Autopilot Reset |Not available|X|X|X|Lets you remotely reset a student's PC from the lock screen, apply the device's original settings, and enroll it in device management (Azure AD and MDM). |Requires Windows 10, version 1709 and WinRE must be enabled on the PC. Setup will fail if both requirements aren't met.|
|
||||
|Lock screen background|X|X|X|X|Change the default screen lock background to a custom image.|Click **Browse** to search for an image file on your computer. Accepted image formats are jpg, jpeg, and png.|
|
||||
| Setting | What happens if I select it? | Note |
|
||||
|--|--|--|
|
||||
| Remove apps preinstalled by the device manufacturer | Uninstalls apps that came loaded on the computer by the device's manufacturer. | Adds about 30 minutes to the provisioning process. |
|
||||
| Allow local storage (not recommended for shared devices) | Lets students save files to the Desktop and Documents folder on the Student PC. | Not recommended if the device are shared between different students. |
|
||||
| Optimize device for a single student, instead of a shared cart or lab | Optimizes the device for use by a single student, rather than many students. | Recommended if the device are shared between different students. Single-optimized accounts are set to expire, and require a sign-in, 180 days after setup. This setting increases the maximum PC storage to 100% of the available disk space. In this case, student accounts aren't deleted unless the account has been inactive for 180 days. |
|
||||
| Let guests sign in to these PCs | Allows guests to use student PCs without a school account. | Common to use within a public, shared space, such as a library. Also used when a student loses their password. Adds a **Guest** account to the PC sign-in screen that anyone can sign in to. |
|
||||
| Enable Autopilot Reset | Lets you remotely reset a student's PC from the lock screen, apply the device's original settings, and enroll it in device management (Microsoft Entra ID and MDM). | WinRE must be enabled on the device. |
|
||||
| Lock screen background | Change the default screen lock background to a custom image. | Select **Browse** to search for an image file on your computer. Accepted image formats are jpg, jpeg, and png. |
|
||||
|
||||
After you've made your selections, click **Next**.
|
||||
After you've made your selections, select **Next**.
|
||||
|
||||
### Time zone
|
||||
|
||||
> [!WARNING]
|
||||
> If you are using the Autounattend.xml file to reimage your school PCs, do not specify a time zone in the file. If you set the time zone in the file *and* in this app, you will encounter an error.
|
||||
|
||||
Choose the time zone where your school's PCs are used. This setting ensures that all PCs are provisioned in the same time zone. When you're done, click **Next**.
|
||||
Choose the time zone where your school's devices are used. This setting ensures that all PCs are provisioned in the same time zone. When you're done, select **Next**.
|
||||
|
||||

|
||||
|
||||
### Product key
|
||||
Optionally, type in a 25-digit product key to:
|
||||
* Upgrade your current edition of Windows. For example, if you want to upgrade from Windows 10 Education to Windows 10 Education Pro, enter the product key for the Pro edition.
|
||||
* Change the product key. If you want to associate student devices with a new or different Windows 10 product key, enter it now.
|
||||
|
||||
Optionally, type in a 25-digit product key to upgrade or change the edition of Windows on your student devices. If you don't have a product key, select **Continue without change**.
|
||||
|
||||

|
||||
|
||||
### Take a Test
|
||||
Set up the Take a Test app to give online quizzes and high-stakes assessments. During assessments, Windows locks down the student PC so that students can't access anything else on the device.
|
||||
|
||||
1. Select **Yes** to create a Take a Test button on the sign-in screens of your students' PCs.
|
||||
Set up the Take a Test app to give online quizzes and high-stakes assessments. During assessments, Windows locks down the student devices so that students can't access anything else on the device.
|
||||
|
||||
1. Select **Yes** to create a Take a Test button on the sign-in screens of your students' devices
|
||||
|
||||

|
||||
|
||||
2. Select from the advanced settings. Available settings include:
|
||||
* Allow keyboard auto-suggestions: Allows app to suggest words as the student types on the PC's keyboard.
|
||||
* Allow teachers to monitor online tests: Enables screen capture in the Take a Test app.
|
||||
3. Enter the URL where the test is hosted. When students log in to the Take a Test account, they'll be able to click or enter the link to view the assessment.
|
||||
4. Click **Next**.
|
||||
|
||||
### Add apps
|
||||
Choose from Microsoft recommended apps and your school's own Microsoft Store inventory. The apps you select here are added to the provisioning package and installed on student PCs. After they're assigned, apps are pinned to the device's Start menu.
|
||||
|
||||
If there aren't any apps in your Microsoft Store inventory, or you don't have the permissions to add apps, you'll need to contact your school admin for help. If you receive a message that you can't add the selected apps, click **Continue without apps**. Contact your school admin to get these apps later.
|
||||
|
||||
After you've made your selections, click **Next**.
|
||||
|
||||
|
||||

|
||||
|
||||
The following table lists the recommended apps you'll see.
|
||||
|
||||
|App |Note |
|
||||
|---------|---------|
|
||||
|Office 365 for Windows 10 in S mode (Education Preview) | Setup is only successful on student PCs that run Windows 10 in S mode. The PC you running the Set up School PCs app is not required to have Windows 10 in S mode. |
|
||||
|Microsoft Whiteboard | None|
|
||||
|Minecraft: Education Edition | Free trial|
|
||||
|
||||
|
||||
1. Select from the advanced settings. Available settings include:
|
||||
- Allow keyboard auto-suggestions: Allows app to suggest words as the student types on the device's keyboard
|
||||
- Allow teachers to monitor online tests: Enables screen capture in the Take a Test app
|
||||
1. Enter the URL where the test is hosted. When students log in to the Take a Test account, they'll be able to select or enter the link to view the assessment
|
||||
1. Select **Next**
|
||||
|
||||
### Personalization
|
||||
Upload custom images to replace the student devices' default desktop and lock screen backgrounds. Click **Browse** to search for an image file on your computer. Accepted image formats are jpg, jpeg, and png.
|
||||
|
||||
If you don't want to upload custom images or use the images that appear in the app, click **Continue without personalization**. This option does not apply any customizations, and instead uses the devices' default or preset images.
|
||||
Upload custom images to replace the student devices' default desktop and lock screen backgrounds. Select **Browse** to search for an image file on your computer. Accepted image formats are jpg, jpeg, and png.
|
||||
|
||||

|
||||
If you don't want to upload custom images or use the images that appear in the app, select **Continue without personalization**. This option doesn't apply any customizations, and instead uses the devices' default or preset images.
|
||||
|
||||

|
||||
|
||||
### Summary
|
||||
Review all of the settings for accuracy and completeness. Check carefully. To make changes to a saved package, you have to start over.
|
||||
1. To make changes now, click any page along the left side of the window.
|
||||
2. When finished, click **Accept**.
|
||||
|
||||

|
||||
Review all of the settings for accuracy and completeness
|
||||
|
||||
1. To make changes now, select any page along the left side of the window
|
||||
2. When finished, select **Accept**
|
||||
|
||||

|
||||
|
||||
> [!NOTE]
|
||||
> To make changes to a saved package, you have to start over.
|
||||
|
||||
### Insert USB
|
||||
1. Insert a USB drive. The **Save** button will light up when your computer detects the USB.
|
||||
2. Choose your USB drive from the list and click **Save**.
|
||||
|
||||

|
||||
1. Insert a USB drive. The **Save** button lights up when your computer detects the USB
|
||||
1. Choose your USB drive from the list and select **Save**
|
||||
|
||||
3. When the package is ready, you'll see the filename and package expiration date. You can also click **Add a USB** to save the same provisioning package to another USB drive. When you're done, remove the USB drive and click **Next**.
|
||||

|
||||
|
||||

|
||||
1. When the package is ready, you see the filename and package expiration date. You can also select **Add a USB** to save the same provisioning package to another USB drive. When you're done, remove the USB drive and select **Next**
|
||||
|
||||

|
||||
|
||||
## Run package - Get PCs ready
|
||||
Complete each step on the **Get PCs ready** page to prepare student PCs for set-up. Then click **Next**.
|
||||
|
||||

|
||||
Complete each step on the **Get PCs ready** page to prepare student devices for set-up. Then select **Next**.
|
||||
|
||||

|
||||
|
||||
## Run package - Install package on PC
|
||||
|
||||
The provisioning package on your USB drive is named SetupSchoolPCs_<*devicename*>(Expires <*expiration date*>.ppkg. A provisioning package applies settings to Windows 10 without reimaging the device.
|
||||
The provisioning package on your USB drive is named SetupSchoolPCs_<*devicename*>(Expires <*expiration date*>.ppkg. A provisioning package applies settings to Windows without reimaging the device.
|
||||
|
||||
When used in context of the Set up School PCs app, the word *package* refers to your provisioning package. The word *provisioning* refers to the act of installing the package on the student PC. This section describes how to apply the settings to a PC in your school.
|
||||
When used in context of the Set up School PCs app, the word *package* refers to your provisioning package. The word *provisioning* refers to the act of installing the package on the student device. This section describes how to apply the settings to a device in your school.
|
||||
|
||||
> [!IMPORTANT]
|
||||
> The PC must have a new or reset Windows 10 image and must not already have been through first-run setup (also referred to as OOBE). For instructions about how to reset a computer's image, see [Prepare existing PC account for new setup](use-set-up-school-pcs-app.md#prepare-existing-pc-account-for-new-setup).
|
||||
> The devices must have a new or reset Windows image and must not already have been through first-run setup experience (which is referred to as *OOBE*). For instructions about how to reset a devices's image, see [Prepare existing PC account for new setup](use-set-up-school-pcs-app.md#prepare-existing-pc-account-for-new-setup).
|
||||
|
||||
1. Start with the student PC turned off or with the PC on the first-run setup screen. In Windows 10 version 1803, the first-run setup screen reads, **Let's start with region. Is this right?**
|
||||
1. Start with the student device turned off or with the device on the first-run setup screen. If the device is past the account setup screen, reset the device to start over. To reset the it, go to **Settings** > **Update & security** > **Recovery** > **Reset this PC**
|
||||
|
||||
If the PC has gone past the account setup screen, reset the PC to start over. To reset the PC, go to **Settings** > **Update & security** > **Recovery** > **Reset this PC**.
|
||||

|
||||
|
||||

|
||||
1. Insert the USB drive. Windows automatically recognizes and installs the package
|
||||
|
||||
2. Insert the USB drive. Windows automatically recognizes and installs the package.
|
||||

|
||||
|
||||

|
||||
3. When you receive the message that it's okay to remove the USB drive, remove it from the PC. If there are more PCs to set up, insert the USB drive into the next PC.
|
||||
1. When you receive the message that it's okay to remove the USB drive, remove it from the device. If there are more devices to set up, insert the USB drive into the next one
|
||||
|
||||

|
||||
|
||||
4. If you didn't set up the package with Azure AD Join, continue the Windows device setup experience. If you did configure the package with Azure AD Join, the computer is ready for use and no further configurations are required.
|
||||
|
||||
If successful, you'll see a setup complete message. The PCs start up on the lock screen, with your school's custom background. Upon first use, students and teachers can connect to your school's network and resources.
|
||||
|
||||
1. If you didn't set up the package with Microsoft Entra join, continue the Windows device setup experience. If you did configure the package with Microsoft Entra join, the device is ready for use and no further configurations are required
|
||||
|
||||
If successful, you'll see a setup complete message. The PCs start up on the lock screen, with your school's custom background. Upon first use, students and teachers can connect to your school's network and resources.
|
||||
|
@ -2,18 +2,17 @@
|
||||
title: Windows 11 SE Overview
|
||||
description: Learn about Windows 11 SE, and the apps that are included with the operating system.
|
||||
ms.topic: overview
|
||||
ms.date: 08/03/2023
|
||||
ms.date: 11/02/2023
|
||||
appliesto:
|
||||
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 11 SE</a>
|
||||
ms.collection:
|
||||
- highpri
|
||||
- education
|
||||
- tier1
|
||||
---
|
||||
|
||||
# Windows 11 SE Overview
|
||||
|
||||
Windows 11 SE is an edition of Windows that's designed for education. Windows SE runs on web-first devices that use essential education apps, and it comes with Microsoft Office 365 preinstalled (subscription sold separately).
|
||||
Windows 11 SE is an edition of Windows designed for education. Windows SE runs on web-first devices that use essential education apps, and it comes with Microsoft Office 365 preinstalled (subscription sold separately).
|
||||
|
||||
For education customers seeking cost-effective devices, Microsoft Windows 11 SE is a great choice. Windows 11 SE includes the following benefits:
|
||||
|
||||
@ -35,8 +34,8 @@ The following table lists the different application types available in Windows o
|
||||
| --- | --- | :---: | ---|
|
||||
|Progressive Web Apps (PWAs) | PWAs are web-based applications that can run in a browser and that can be installed as standalone apps. |✅|PWAs are enabled by default in Windows 11 SE.|
|
||||
| Web apps | Web apps are web-based applications that run in a browser. | ✅ | Web apps are enabled by default in Windows 11 SE. |
|
||||
|`Win32`| `Win32` applications are Windows classic applications that may require installation |⛔| If users try to install or execute `Win32` applications that haven't been allowed to run, they fail.|
|
||||
|Universal Windows Platform (UWP)/Store apps |UWP apps are commonly obtained from the Microsoft Store and may require installation |⛔|If users try to install or execute UWP applications that haven't been allowed to run, they fail.|
|
||||
|`Win32`| `Win32` applications are Windows classic applications that might require installation |⛔| If users try to install or execute `Win32` applications that aren't allowed to run, they fail.|
|
||||
|Universal Windows Platform (UWP)/Store apps |UWP apps are commonly obtained from the Microsoft Store and might require installation |⛔|If users try to install or execute UWP applications that haven't been allowed to run, they fail.|
|
||||
|
||||
> [!IMPORTANT]
|
||||
> If there are specific `Win32` or UWP applications that you want to allow, work with Microsoft to get them enabled. For more information, see [Add your own applications](#add-your-own-applications).
|
||||
@ -48,33 +47,33 @@ The following table lists all the applications included in Windows 11 SE and the
|
||||
| App name | App type | Pinned to Start? | Pinned to taskbar? |
|
||||
|:-----------------------------|:--------:|:----------------:|:------------------:|
|
||||
| Alarm & Clock | UWP | | |
|
||||
| Calculator | UWP | ✅ | |
|
||||
| Camera | UWP | ✅ | |
|
||||
| Microsoft Edge | `Win32` | ✅ | ✅ |
|
||||
| Excel | `Win32` | ✅ | |
|
||||
| Calculator | UWP | ✅ | |
|
||||
| Camera | UWP | ✅ | |
|
||||
| Microsoft Edge | `Win32` | ✅ | ✅ |
|
||||
| Excel | `Win32` | ✅ | |
|
||||
| Feedback Hub | UWP | | |
|
||||
| File Explorer | `Win32` | | ✅ |
|
||||
| File Explorer | `Win32` | | ✅ |
|
||||
| FlipGrid | PWA | | |
|
||||
| Get Help | UWP | | |
|
||||
| Media Player | UWP | ✅ | |
|
||||
| Media Player | UWP | ✅ | |
|
||||
| Maps | UWP | | |
|
||||
| Minecraft: Education Edition | UWP | | |
|
||||
| Movies & TV | UWP | | |
|
||||
| News | UWP | | |
|
||||
| Notepad | `Win32` | | |
|
||||
| OneDrive | `Win32` | | |
|
||||
| OneNote | `Win32` | ✅ | |
|
||||
| Outlook | PWA | ✅ | |
|
||||
| Paint | `Win32` | ✅ | |
|
||||
| Notepad | `Win32` | | |
|
||||
| OneDrive | `Win32` | | |
|
||||
| OneNote | `Win32` | ✅ | |
|
||||
| Outlook | PWA | ✅ | |
|
||||
| Paint | `Win32` | ✅ | |
|
||||
| Photos | UWP | | |
|
||||
| PowerPoint | `Win32` | ✅ | |
|
||||
| Settings | UWP | ✅ | |
|
||||
| PowerPoint | `Win32` | ✅ | |
|
||||
| Settings | UWP | ✅ | |
|
||||
| Snip & Sketch | UWP | | |
|
||||
| Sticky Notes | UWP | | |
|
||||
| Teams | `Win32` | ✅ | |
|
||||
| Teams | `Win32` | ✅ | |
|
||||
| To Do | UWP | | |
|
||||
| Whiteboard | UWP | ✅ | |
|
||||
| Word | `Win32` | ✅ | |
|
||||
| Whiteboard | UWP | ✅ | |
|
||||
| Word | `Win32` | ✅ | |
|
||||
|
||||
## Available applications
|
||||
|
||||
|
@ -50,7 +50,7 @@ The following settings can't be changed.
|
||||
| Visible Folders in File Explorer | By default, the Desktop, Downloads, Documents, and Pictures folders are visible to users in File Explorer. Users can make other folders, like **This PC**, visible in **View** > **Options**. |
|
||||
| Launch Windows Maximized | All Windows are opened in the maximized view. |
|
||||
| Windows Snapping | Windows snapping is limited to two Windows. |
|
||||
| Allowed Account Types | Microsoft accounts and Azure AD accounts are allowed. |
|
||||
| Allowed Account Types | Microsoft accounts and Microsoft Entra accounts are allowed. |
|
||||
| Virtual Desktops | Virtual Desktops are blocked. |
|
||||
| Microsoft Store | The Microsoft Store is blocked. |
|
||||
| Administrative tools | Administrative tools, such as the command prompt and Windows PowerShell, can't be opened. Windows PowerShell scripts deployed using Microsoft Intune can run. |
|
||||
|
@ -1,10 +0,0 @@
|
||||
---
|
||||
author: aczechowski
|
||||
ms.author: aaroncz
|
||||
ms.date: 03/31/2023
|
||||
ms.topic: include
|
||||
ms.prod: windows-client
|
||||
---
|
||||
|
||||
> [!NOTE]
|
||||
> This article was partially created with the help of artificial intelligence. Before publishing, an author reviewed and revised the content as needed. For more information, see [Our principles for using AI-generated content in Microsoft Learn](/azure/principles-for-ai-generated-content).
|
@ -6,4 +6,4 @@ ms.topic: include
|
||||
ms.prod: windows-client
|
||||
---
|
||||
|
||||
To configure devices using group policy, [create a group policy object (GPO)](/windows/security/operating-system-security/network-security/windows-firewall/create-a-group-policy-object) and use the following settings:
|
||||
To configure a device with group policy, use the [Local Group Policy Editor](/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc731745(v=ws.10)). To configure multiple devices joined to Active Directory, [create or edit](/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc754740(v=ws.11)) a group policy object (GPO) and use the following settings:
|
||||
|
@ -6,4 +6,4 @@ ms.topic: include
|
||||
ms.prod: windows-client
|
||||
---
|
||||
|
||||
The policy settings can be configured locally by using the Local Group Policy Editor (`gpedit.msc`), linked to the domain or organizational units, and filtered to security groups.
|
||||
Group policies can be [linked](/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc732979(v=ws.10)) to domains or organizational units, [filtered using security groups](/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc752992(v=ws.10)), or [filtered using WMI filters](/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/jj717288(v=ws.11)).
|
||||
|
@ -6,4 +6,4 @@ ms.topic: include
|
||||
ms.prod: windows-client
|
||||
---
|
||||
|
||||
To configure devices using Microsoft Intune, [create a Settings catalog policy](/mem/intune/configuration/settings-catalog) and use the following settings:
|
||||
To configure devices with Microsoft Intune, [create a Settings catalog policy](/mem/intune/configuration/settings-catalog) and use the following settings:
|
9
includes/configure/registry.md
Normal file
@ -0,0 +1,9 @@
|
||||
---
|
||||
author: paolomatarazzo
|
||||
ms.author: paoloma
|
||||
ms.date: 08/15/2023
|
||||
ms.topic: include
|
||||
ms.prod: windows-client
|
||||
---
|
||||
|
||||
To configure devices with the [Registry Editor](/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc755256(v=ws.11)), use the following settings:
|
@ -9,7 +9,7 @@ ms.topic: include
|
||||
|:---|:---:|:---:|:---:|:---:|
|
||||
|**[Access Control (ACL/SACL)](/windows/security/identity-protection/access-control/access-control)**|Yes|Yes|Yes|Yes|
|
||||
|**[Account Lockout Policy](/windows/security/threat-protection/security-policy-settings/account-lockout-policy)**|Yes|Yes|Yes|Yes|
|
||||
|**[Active Directory domain join, Microsoft Entra join, and Microsoft Entra Hybrid join with single sign-on (SSO)](/azure/active-directory/devices/concept-directory-join)**|Yes|Yes|Yes|Yes|
|
||||
|**[Active Directory domain join, Microsoft Entra join, and Microsoft Entra hybrid join with single sign-on (SSO)](/azure/active-directory/devices/concept-directory-join)**|Yes|Yes|Yes|Yes|
|
||||
|**[Always On VPN (device tunnel)](/Windows-server/remote/remote-access/overview-always-on-vpn)**|❌|Yes|❌|Yes|
|
||||
|**[App containers](/virtualization/windowscontainers/about/)**|Yes|Yes|Yes|Yes|
|
||||
|**[AppLocker](/windows/security/application-security/application-control/windows-defender-application-control/applocker/applocker-overview)**|Yes|Yes|Yes|Yes|
|
||||
@ -81,7 +81,7 @@ ms.topic: include
|
||||
|**[Windows Autopilot](/autopilot/)**|Yes|Yes|Yes|Yes|
|
||||
|**[Windows Defender Application Control (WDAC)](/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control)**|Yes|Yes|Yes|Yes|
|
||||
|**[Windows Defender System Guard](/windows/security/hardware-security/how-hardware-based-root-of-trust-helps-protect-windows)**|Yes|Yes|Yes|Yes|
|
||||
|**[Windows Firewall](/windows/security/operating-system-security/network-security/windows-firewall/windows-firewall-with-advanced-security)**|Yes|Yes|Yes|Yes|
|
||||
|**[Windows Firewall](/windows/security/operating-system-security/network-security/windows-firewall)**|Yes|Yes|Yes|Yes|
|
||||
|**[Windows Hello for Business](/windows/security/identity-protection/hello-for-business/)**|Yes|Yes|Yes|Yes|
|
||||
|**[Windows Hello for Business Enhanced Security Sign-in (ESS)](/windows-hardware/design/device-experiences/windows-hello-enhanced-sign-in-security)**|Yes|Yes|Yes|Yes|
|
||||
|**[Windows LAPS](/windows-server/identity/laps/laps-overview)**|Yes|Yes|Yes|Yes|
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
author: paolomatarazzo
|
||||
ms.author: paoloma
|
||||
ms.date: 09/18/2023
|
||||
ms.date: 11/02/2023
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
@ -9,7 +9,7 @@ ms.topic: include
|
||||
|:---|:---:|:---:|:---:|:---:|:---:|
|
||||
|**[Access Control (ACL/SACL)](/windows/security/identity-protection/access-control/access-control)**|Yes|Yes|Yes|Yes|Yes|
|
||||
|**[Account Lockout Policy](/windows/security/threat-protection/security-policy-settings/account-lockout-policy)**|Yes|Yes|Yes|Yes|Yes|
|
||||
|**[Active Directory domain join, Microsoft Entra join, and Microsoft Entra Hybrid join with single sign-on (SSO)](/azure/active-directory/devices/concept-directory-join)**|Yes|Yes|Yes|Yes|Yes|
|
||||
|**[Active Directory domain join, Microsoft Entra join, and Microsoft Entra hybrid join with single sign-on (SSO)](/azure/active-directory/devices/concept-directory-join)**|Yes|Yes|Yes|Yes|Yes|
|
||||
|**[Always On VPN (device tunnel)](/Windows-server/remote/remote-access/overview-always-on-vpn)**|❌|Yes|Yes|Yes|Yes|
|
||||
|**[App containers](/virtualization/windowscontainers/about/)**|Yes|Yes|Yes|Yes|Yes|
|
||||
|**[AppLocker](/windows/security/application-security/application-control/windows-defender-application-control/applocker/applocker-overview)**|❌|Yes|Yes|Yes|Yes|
|
||||
@ -30,7 +30,7 @@ ms.topic: include
|
||||
|**[Enhanced phishing protection with SmartScreen](/windows/security/operating-system-security/virus-and-threat-protection/microsoft-defender-smartscreen/enhanced-phishing-protection)**|Yes|Yes|Yes|Yes|Yes|
|
||||
|**[Exploit protection](/microsoft-365/security/defender-endpoint/exploit-protection)**|Yes|Yes|Yes|Yes|Yes|
|
||||
|**[Federal Information Processing Standard (FIPS) 140 validation](/windows/security/security-foundations/certification/fips-140-validation)**|Yes|Yes|Yes|Yes|Yes|
|
||||
|**[Federated sign-in](/education/windows/federated-sign-in)**|❌|Yes|Yes|❌|❌|
|
||||
|**[Federated sign-in](/education/windows/federated-sign-in)**|❌|❌|❌|Yes|Yes|
|
||||
|**[FIDO2 security key](/azure/active-directory/authentication/howto-authentication-passwordless-security-key)**|Yes|Yes|Yes|Yes|Yes|
|
||||
|**[Hardware-enforced stack protection](https://techcommunity.microsoft.com/t5/windows-os-platform-blog/understanding-hardware-enforced-stack-protection/ba-p/1247815)**|Yes|Yes|Yes|Yes|Yes|
|
||||
|**[Hypervisor-protected Code Integrity (HVCI)](/windows/security/hardware-security/enable-virtualization-based-protection-of-code-integrity)**|Yes|Yes|Yes|Yes|Yes|
|
||||
@ -81,7 +81,7 @@ ms.topic: include
|
||||
|**[Windows Autopilot](/autopilot/)**|Yes|Yes|Yes|Yes|Yes|
|
||||
|**[Windows Defender Application Control (WDAC)](/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control)**|Yes|Yes|Yes|Yes|Yes|
|
||||
|**[Windows Defender System Guard](/windows/security/hardware-security/how-hardware-based-root-of-trust-helps-protect-windows)**|Yes|Yes|Yes|Yes|Yes|
|
||||
|**[Windows Firewall](/windows/security/operating-system-security/network-security/windows-firewall/windows-firewall-with-advanced-security)**|Yes|Yes|Yes|Yes|Yes|
|
||||
|**[Windows Firewall](/windows/security/operating-system-security/network-security/windows-firewall)**|Yes|Yes|Yes|Yes|Yes|
|
||||
|**[Windows Hello for Business](/windows/security/identity-protection/hello-for-business/)**|Yes|Yes|Yes|Yes|Yes|
|
||||
|**[Windows Hello for Business Enhanced Security Sign-in (ESS)](/windows-hardware/design/device-experiences/windows-hello-enhanced-sign-in-security)**|Yes|Yes|Yes|Yes|Yes|
|
||||
|**[Windows LAPS](/windows-server/identity/laps/laps-overview)**|Yes|Yes|Yes|Yes|Yes|
|
||||
|
@ -7,13 +7,13 @@ ms.topic: include
|
||||
|
||||
## Windows edition and licensing requirements
|
||||
|
||||
The following table lists the Windows editions that support Active Directory domain join, Microsoft Entra join, and Microsoft Entra Hybrid join with single sign-on (SSO):
|
||||
The following table lists the Windows editions that support Active Directory domain join, Microsoft Entra join, and Microsoft Entra hybrid join with single sign-on (SSO):
|
||||
|
||||
|Windows Pro|Windows Enterprise|Windows Pro Education/SE|Windows Education|
|
||||
|:---:|:---:|:---:|:---:|
|
||||
|Yes|Yes|Yes|Yes|
|
||||
|
||||
Active Directory domain join, Microsoft Entra join, and Microsoft Entra Hybrid join with single sign-on (SSO) license entitlements are granted by the following licenses:
|
||||
Active Directory domain join, Microsoft Entra join, and Microsoft Entra hybrid join with single sign-on (SSO) license entitlements are granted by the following licenses:
|
||||
|
||||
|Windows Pro/Pro Education/SE|Windows Enterprise E3|Windows Enterprise E5|Windows Education A3|Windows Education A5|
|
||||
|:---:|:---:|:---:|:---:|:---:|
|
||||
|
@ -17,6 +17,6 @@ Federated sign-in license entitlements are granted by the following licenses:
|
||||
|
||||
|Windows Pro Education/SE|Windows Enterprise E3|Windows Enterprise E5|Windows Education A3|Windows Education A5|
|
||||
|:---:|:---:|:---:|:---:|:---:|
|
||||
|Yes|Yes|Yes|No|No|
|
||||
|Yes|No|No|Yes|Yes|
|
||||
|
||||
For more information about Windows licensing, see [Windows licensing overview](/windows/whats-new/windows-licensing).
|
||||
|
@ -106,7 +106,7 @@ Employees can claim apps that admins added to the private store by doing the fol
|
||||
### Get and remove private store apps
|
||||
**To claim an app from the private store**
|
||||
|
||||
1. Sign in to your computer with your Azure Active Directory (AD) credentials, and start the Microsoft Store app.
|
||||
1. Sign in to your computer with your Microsoft Entra credentials, and start the Microsoft Store app.
|
||||
2. Click the private store tab.
|
||||
3. Click the app you want to install, and then click **Install**.
|
||||
|
||||
|
@ -62,7 +62,7 @@ If an employee makes an in-app purchase, they'll make it with their personal Mic
|
||||
Microsoft Store supports two options to license apps: online and offline.
|
||||
|
||||
### Online licensing
|
||||
Online licensing is the default licensing model and is similar to the model used by Microsoft Store. Online licensed apps require customers and devices to connect to Microsoft Store service to acquire an app and its license. License management is enforced based on the user's Azure AD identity and maintained by Microsoft Store as well as the management tool. By default app updates are handled by Windows Update.
|
||||
Online licensing is the default licensing model and is similar to the model used by Microsoft Store. Online licensed apps require customers and devices to connect to Microsoft Store service to acquire an app and its license. License management is enforced based on the user's Microsoft Entra identity and maintained by Microsoft Store as well as the management tool. By default app updates are handled by Windows Update.
|
||||
|
||||
Distribution options for online-licensed apps include the ability to:
|
||||
|
||||
|
@ -27,16 +27,16 @@ ms.date: 05/24/2023
|
||||
|
||||
For companies or organizations using mobile device management (MDM) tools, those tools can synchronize with Microsoft Store for Business inventory to manage apps with offline licenses. Store for Business management tool services work with your third-party management tool to manage content.
|
||||
|
||||
Your management tool needs to be installed and configured with Azure AD, in the same directory that you are using for Store for Business. Once that's done, you can configure it to work with Store for Business
|
||||
Your management tool needs to be installed and configured with Microsoft Entra ID, in the same directory that you are using for Store for Business. Once that's done, you can configure it to work with Store for Business
|
||||
|
||||
**To configure a management tool in Azure AD**
|
||||
**To configure a management tool in Microsoft Entra ID**
|
||||
|
||||
1. Sign in to the Azure Portal as an Administrator.
|
||||
2. Click **Azure Active Directory**, and then choose your directory.
|
||||
2. Click **Microsoft Entra ID**, and then choose your directory.
|
||||
4. Click **Mobility (MDM and MAM)**.
|
||||
3. Click **+Add Applications**, find the application, and add it to your directory.
|
||||
|
||||
After your management tool is added to your Azure AD directory, you can configure it to work with Microsoft Store. You can configure multiple management tools - just repeat the following procedure.
|
||||
After your management tool is added to your Microsoft Entra directory, you can configure it to work with Microsoft Store. You can configure multiple management tools - just repeat the following procedure.
|
||||
|
||||
**To configure a management tool in Microsoft Store for Business**
|
||||
|
||||
|
@ -61,7 +61,7 @@ Employees can claim apps that admins added to the private store by doing the fol
|
||||
|
||||
**To claim an app from the private store**
|
||||
|
||||
1. Sign in to your computer with your Azure Active Directory (AD) credentials, and start Microsoft Store app.
|
||||
1. Sign in to your computer with your Microsoft Entra credentials, and start Microsoft Store app.
|
||||
2. Click the **private store** tab.
|
||||
3. Click the app you want to install, and then click **Install**.
|
||||
|
||||
|
@ -27,9 +27,9 @@ ms.date: 05/24/2023
|
||||
|
||||
You can configure a mobile device management (MDM) tool to synchronize your Microsoft Store for Business or Microsoft Store for Education inventory. Microsoft Store management tool services work with MDM tools to manage content.
|
||||
|
||||
Your MDM tool needs to be installed and configured in Azure AD, in the same Azure AD directory used with Microsoft Store.
|
||||
Your MDM tool needs to be installed and configured in Microsoft Entra ID, in the same Microsoft Entra directory used with Microsoft Store.
|
||||
|
||||
In Azure AD management portal, find the MDM application, and then add it to your directory. Once the MDM has been configured in Azure AD, you can authorize the tool to work with the Microsoft Store for Business or Microsoft Store for Education. This allows the MDM tool to call Microsoft Store management tool services. For more information, see [Configure MDM provider](configure-mdm-provider-microsoft-store-for-business.md) and [Manage apps you purchased from the Microsoft Store for Business with Microsoft Intune](/mem/intune/apps/windows-store-for-business).
|
||||
In Microsoft Entra management portal, find the MDM application, and then add it to your directory. Once the MDM has been configured in Microsoft Entra ID, you can authorize the tool to work with the Microsoft Store for Business or Microsoft Store for Education. This allows the MDM tool to call Microsoft Store management tool services. For more information, see [Configure MDM provider](configure-mdm-provider-microsoft-store-for-business.md) and [Manage apps you purchased from the Microsoft Store for Business with Microsoft Intune](/mem/intune/apps/windows-store-for-business).
|
||||
|
||||
Microsoft Store services provide:
|
||||
|
||||
@ -40,9 +40,9 @@ Microsoft Store services provide:
|
||||
|
||||
MDM tool requirements:
|
||||
|
||||
- Must be an Azure Active Directory (AD) application to authenticate against the Store for Business services.
|
||||
- Must be configured in Azure AD, and Microsoft Store.
|
||||
- Azure AD identity is required to authorize Microsoft Store services.
|
||||
- Must be a Microsoft Entra application to authenticate against the Store for Business services.
|
||||
- Must be configured in Microsoft Entra ID, and Microsoft Store.
|
||||
- Microsoft Entra identity is required to authorize Microsoft Store services.
|
||||
|
||||
## Distribute offline-licensed apps
|
||||
|
||||
|
@ -35,7 +35,7 @@ Offline-licensed apps offer an alternative to online apps, and provide additiona
|
||||
|
||||
- **You use imaging to manage devices in your organization** - Offline-licensed apps can be added to images and deployed with Deployment Image Servicing and Management (DISM), or Windows Imaging and Configuration Designer (ICD).
|
||||
|
||||
- **Your employees do not have Azure Active Directory (AD) accounts** - Azure AD accounts are required for employees that install apps assigned to them from Microsoft Store or that claim apps from a private store.
|
||||
- **Your employees do not have Microsoft Entra accounts** - Microsoft Entra accounts are required for employees that install apps assigned to them from Microsoft Store or that claim apps from a private store.
|
||||
|
||||
## Distribution options for offline-licensed apps
|
||||
|
||||
|
@ -67,7 +67,9 @@
|
||||
"v-dihans",
|
||||
"garycentric",
|
||||
"v-stsavell",
|
||||
"beccarobins"
|
||||
"beccarobins",
|
||||
"Stacyrch140",
|
||||
"American-Dipper"
|
||||
]
|
||||
},
|
||||
"fileMetadata": {},
|
||||
|
@ -30,7 +30,7 @@ Welcome to the Microsoft Store for Business and Education! You can use Microsoft
|
||||
>
|
||||
> - As of April 14, 2021, all apps that charge a base price above free are no longer available to buy in the Microsoft Store for Business and Education. If you've already bought a paid app, you can still use it, but no new purchases are possible from businessstore.microsoft.com or educationstore.microsoft.com. Also, you can't buy additional licenses for apps you already bought. You can still assign and reassign licenses for apps that you already own and use from the private store. Apps with a base price of "free" are still available. This change doesn't impact apps in the Microsoft Store on Windows 10.
|
||||
>
|
||||
> - Also as of April 14, 2021, you must sign in with your Azure Active Directory (Azure AD) account before you browse Microsoft Store for Business and Education.
|
||||
> - Also as of April 14, 2021, you must sign in with your Microsoft Entra account before you browse Microsoft Store for Business and Education.
|
||||
|
||||
## In this section
|
||||
|
||||
@ -40,5 +40,5 @@ Welcome to the Microsoft Store for Business and Education! You can use Microsoft
|
||||
| [Find and acquire apps](find-and-acquire-apps-overview.md) | Use the Microsoft Store for Business and Education to find apps for your organization. You can also work with developers to create line-of-business apps that are only available to your organization. |
|
||||
| [Manage apps](manage-apps-microsoft-store-for-business-overview.md) | Manage settings and access to apps in Microsoft Store for Business and Education. |
|
||||
| [Device Guard signing portal](device-guard-signing-portal.md) | Device Guard signing is a Device Guard feature that is available in the Microsoft Store for Business and Education. It gives admins a single place to sign catalog files and code integrity policies. After admins have created catalog files for unsigned apps and signed the catalog files, they can add the signers to a code integrity policy. You can merge the code integrity policy with your existing policy to include your custom signing certificate. This allows you to trust the catalog files. |
|
||||
| [Manage settings in the Microsoft Store for Business and Education](manage-settings-microsoft-store-for-business.md) | You can add users and groups, as well as update some of the settings associated with the Azure Active Directory (AD) tenant |
|
||||
| [Manage settings in the Microsoft Store for Business and Education](manage-settings-microsoft-store-for-business.md) | You can add users and groups, as well as update some of the settings associated with the Microsoft Entra tenant |
|
||||
| [Troubleshoot Microsoft Store for Business and Education](troubleshoot-microsoft-store-for-business.md) | Troubleshooting topics for Microsoft Store for Business and Education. |
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Manage settings for Microsoft Store for Business and Microsoft Store for Education (Windows 10)
|
||||
description: You can add users and groups, as well as update some of the settings associated with the Azure Active Directory (AD) tenant.
|
||||
description: You can add users and groups, as well as update some of the settings associated with the Microsoft Entra tenant.
|
||||
ms.assetid: E3283D77-4DB2-40A9-9479-DDBC33D5A895
|
||||
ms.reviewer:
|
||||
ms.mktglfcycl: manage
|
||||
@ -25,7 +25,7 @@ ms.date: 05/24/2023
|
||||
> - The retirement of Microsoft Store for Business and Microsoft Store for Education has been postponed. We will update this notice when a new retirement date is announced. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Update to Intune integration with the Microsoft Store on Windows](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/update-to-endpoint-manager-integration-with-the-microsoft-store/ba-p/3585077) and [FAQ: Supporting Microsoft Store experiences on managed devices](https://techcommunity.microsoft.com/t5/windows-management/faq-supporting-microsoft-store-experiences-on-managed-devices/m-p/3585286).
|
||||
> - In April 2023 the Microsoft Store for Business tab was removed from Microsoft Store apps on Windows 10 and Windows 11 PCs. An interaction with existing MDM and GPO policies may lead to customers seeing errors when accessing the Microsoft Store app. For more information see [Microsoft Store for Business tab removed](manage-access-to-private-store.md#microsoft-store-for-business-tab-removed).
|
||||
|
||||
You can add users and groups, as well as update some of the settings associated with the Azure Active Directory (AD) tenant.
|
||||
You can add users and groups, as well as update some of the settings associated with the Microsoft Entra tenant.
|
||||
|
||||
## In this section
|
||||
|
||||
@ -34,5 +34,3 @@ You can add users and groups, as well as update some of the settings associated
|
||||
| [Update Microsoft Store for Business and Education account settings](update-microsoft-store-for-business-account-settings.md) | **Billing - Account profile** in Microsoft Store for Business shows information about your organization that you can update. Payment options can be managed on **Billing - Payment methods**, and offline license settings can be managed on **Settings - Shop**. |
|
||||
| [Manage user accounts in Microsoft Store for Business and Education](manage-users-and-groups-microsoft-store-for-business.md) | Microsoft Store for Business manages permissions with a set of roles. You can [assign these roles to individuals in your organization](roles-and-permissions-microsoft-store-for-business.md) and to groups.|
|
||||
| [Understand your invoice](billing-understand-your-invoice-msfb.md) | Information on invoices for products and services bought under the Microsoft Customer Agreement.|
|
||||
|
||||
|
||||
|
@ -27,21 +27,25 @@ ms.date: 05/24/2023
|
||||
|
||||
Microsoft Store for Business and Education manages permissions with a set of roles. Currently, you can [assign these roles to individuals in your organization](roles-and-permissions-microsoft-store-for-business.md), but not to groups.
|
||||
|
||||
## Why Azure AD accounts?
|
||||
<a name='why-azure-ad-accounts'></a>
|
||||
|
||||
## Why Microsoft Entra accounts?
|
||||
For organizations planning to use the private store feature with Store for Business, we recommend that you also configure cloud domain join. This provides a seamless integration between the identity your admin and employees will use to sign in to Windows and Microsoft Store for Business.
|
||||
|
||||
Azure AD is an Azure service that provides identity and access management capabilities using the cloud. It is primarily designed to provide this service for cloud- or web-based applications that need to access your local Active Directory information. Azure AD identity and access management includes:
|
||||
Microsoft Entra ID is an Azure service that provides identity and access management capabilities using the cloud. It is primarily designed to provide this service for cloud- or web-based applications that need to access your local Active Directory information. Microsoft Entra identity and access management includes:
|
||||
|
||||
- Single sign-on to any cloud and on-premises web app.
|
||||
- Works with multiple platforms and devices.
|
||||
- Integrate with on-premises Active Directory.
|
||||
|
||||
For more information on Azure AD, see [About Office 365 and Azure Active Directory](/previous-versions//dn509517(v=technet.10)), and [Intro to Azure: identity and access](https://go.microsoft.com/fwlink/p/?LinkId=708611).
|
||||
For more information on Microsoft Entra ID, see [About Office 365 and Microsoft Entra ID](/previous-versions//dn509517(v=technet.10)), and [Intro to Azure: identity and access](https://go.microsoft.com/fwlink/p/?LinkId=708611).
|
||||
|
||||
## Add user accounts to your Azure AD directory
|
||||
If you created a new Azure AD directory when you signed up for Store for Business, you'll have a directory set up with one user account - the global administrator. That global administrator can add user accounts to your Azure AD directory. However, adding user accounts to your Azure AD directory will not give those employees access to Store for Business. You'll need to assign Store for Business roles to your employees. For more information, see [Roles and permissions in the Store for Business.](roles-and-permissions-microsoft-store-for-business.md)
|
||||
<a name='add-user-accounts-to-your-azure-ad-directory'></a>
|
||||
|
||||
You can use the [Office 365 admin dashboard](https://portal.office.com/adminportal) or [Azure management portal](https://portal.azure.com/) to add user accounts to your Azure AD directory. If you'll be using Azure management portal, you'll need an active subscription to [Azure management portal](https://go.microsoft.com/fwlink/p/?LinkId=708617).
|
||||
## Add user accounts to your Microsoft Entra directory
|
||||
If you created a new Microsoft Entra directory when you signed up for Store for Business, you'll have a directory set up with one user account - the global administrator. That global administrator can add user accounts to your Microsoft Entra directory. However, adding user accounts to your Microsoft Entra directory will not give those employees access to Store for Business. You'll need to assign Store for Business roles to your employees. For more information, see [Roles and permissions in the Store for Business.](roles-and-permissions-microsoft-store-for-business.md)
|
||||
|
||||
You can use the [Office 365 admin dashboard](https://portal.office.com/adminportal) or [Azure management portal](https://portal.azure.com/) to add user accounts to your Microsoft Entra directory. If you'll be using Azure management portal, you'll need an active subscription to [Azure management portal](https://go.microsoft.com/fwlink/p/?LinkId=708617).
|
||||
|
||||
For more information, see:
|
||||
- [Add user accounts using Office 365 admin dashboard](/microsoft-365/admin/add-users)
|
||||
|