9.2 KiB
title, ms.reviewer, manager, description, ms.prod, author, ms.author, ms.localizationpriority, ms.collection, ms.topic, ms.date
title | ms.reviewer | manager | description | ms.prod | author | ms.author | ms.localizationpriority | ms.collection | ms.topic | ms.date |
---|---|---|---|---|---|---|---|---|---|---|
Configuring Microsoft Endpoint Manager devices for Update Compliance (preview) | dougeby | Configuring devices that are enrolled in Endpoint Manager for Update Compliance (preview) | w10 | mestew | mstewart | medium | M365-analytics | article | 08/24/2022 |
Configuring Microsoft Endpoint Manager devices for Update Compliance (preview)
(Applies to: Windows 11 & Windows 10 managed by Microsoft Endpoint Manager)
Important
- As of August 17, 2022, a new step needs to be taken to ensure access to the preview version of Update Compliance and the
CommercialID
is no longer required. For more information, see Configure Update Compliance settings through the Microsoft 365 admin center.- This information relates to a preview feature that's available for early testing and use in a production environment. This feature is fully supported but it's still in active development and may receive substantial changes until it becomes generally available.
This article is specifically targeted at configuring devices enrolled to Microsoft Endpoint Manager for Update Compliance, within Microsoft Endpoint Manager itself. Configuring devices for Update Compliance in Microsoft Endpoint Manager breaks down to the following steps:
- Create a configuration profile for devices you want to enroll. The configuration profile contains settings for all the Mobile Device Management (MDM) policies that must be configured.
- Deploy the configuration script as a Win32 app to those same devices, so additional checks can be performed to ensure devices are correctly configured.
- Wait for data to populate. The length of this process depends on the computer being on, connected to the internet, and correctly configured. Some data types take longer to appear than others. For more information, see Use Update Compliance.
Create a configuration profile
Create a configuration profile that will set the required policies for Update Compliance. There are two profile types that can be used to create a configuration profile for Update Compliance:
- The settings catalog
- Template for a custom OMA URI based profile
Settings catalog
-
Go to the Admin portal in Endpoint Manager and navigate to Devices > Windows > Configuration profiles.
-
On the Configuration profiles view, select Create profile.
-
Select Platform="Windows 10 and later" and Profile type="Settings Catalog", and then select Create.
-
You're now on the Configuration profile creation screen. On the Basics tab, give a Name and Description.
-
On the Configuration settings page, you'll be adding multiple settings from the System category. Using the Settings picker, select the System category, then add the following settings and values:
- Required settings for Update Compliance:
- Setting: Allow Commercial Data Pipeline
- Value: Enabled
- Setting: Allow Telemetry
- Value: Basic (Basic is the minimum value, but it can be safely set to a higher value)
- Setting: Allow Update Compliance Processing
- Value: Enabled
- (Recommended, but not required) Add settings for disabling devices' Diagnostic Data opt-in settings interface. If these aren't disabled, users of each device can potentially override the diagnostic data level of devices such that data won't be available for those devices in Update Compliance:
- Setting: Configure Telemetry Opt In Change Notification
- Value: Disable telemetry change notifications
- Setting: Configure Telemetry Opt In Settings Ux
- Value: Disable Telemetry opt-in Settings
- (Recommended, but not required) Allow device name to be sent in Windows Diagnostic Data. If this policy is disabled, the device name won't be sent and won't be visible in Update Compliance:
- Setting: Allow device name to be sent in Windows diagnostic data
- Value: Allowed
- Required settings for Update Compliance:
-
Proceed through the next set of tabs Scope tags, Assignments, and Applicability Rules to assign the configuration profile to devices you wish to enroll.
-
Review the settings and then select Create.
Custom OMA URI based profile
-
Go to the Admin portal in Endpoint Manager and navigate to Devices > Windows > Configuration profiles.
-
On the Configuration profiles view, select Create profile.
-
Select Platform="Windows 10 and later" and Profile type="Templates".
-
For Template name, select Custom, and then select Create.
-
You're now on the Configuration profile creation screen. On the Basics tab, give a Name and Description.
-
On the Configuration settings page, you'll be adding multiple OMA-URI Settings that correspond to the policies described in Manually configuring devices for Update Compliance.
- Add a setting to Allow commercial data pipeline; this policy is required for Update Compliance:
- Name: Allow commercial data pipeline
- Description: Configures Microsoft to be the processor of the Windows diagnostic data collected from an Azure Active Directory-joined device.
- OMA-URI:
./Vendor/MSFT/Policy/Config/System/AllowCommercialDataPipeline
- Data type: Integer
- Value: 1
- Add a setting configuring the Windows Diagnostic Data level for devices:
- Name: Allow Telemetry
- Description: Sets the maximum allowed diagnostic data to be sent to Microsoft, required for Update Compliance.
- OMA-URI:
./Vendor/MSFT/Policy/Config/System/AllowTelemetry
- Data type: Integer
- Value: 1 (1 is the minimum value meaning basic, but it can be safely set to a higher value).
- Add a setting to Allow Update Compliance processing; this policy is required for Update Compliance:
- Name: Allow Update Compliance Processing
- Description: Opts device data into Update Compliance processing. Required to see data.
- OMA-URI:
./Vendor/MSFT/Policy/Config/System/AllowUpdateComplianceProcessing
- Data type: Integer
- Value: 16
- (Recommended, but not required) Add settings for disabling devices' Diagnostic Data opt-in settings interface. If these aren't disabled, users of each device can potentially override the diagnostic data level of devices such that data won't be available for those devices in Update Compliance:
- Name: Disable Telemetry opt-in interface
- Description: Disables the ability for end-users of devices can adjust diagnostic data to levels lower than defined by the Allow Telemetry setting.
- OMA-URI:
./Vendor/MSFT/Policy/Config/System/ConfigureTelemetryOptInSettingsUx
- Data type: Integer
- Value: 1
- (Recommended, but not required) Add a setting to Allow device name in diagnostic data; otherwise, the device name won't be in Update Compliance:
- Name: Allow device name in Diagnostic Data
- Description: Allows device name in Diagnostic Data.
- OMA-URI:
./Vendor/MSFT/Policy/Config/System/AllowDeviceNameInDiagnosticData
- Data type: Integer
- Value: 1
- Add a setting to Allow commercial data pipeline; this policy is required for Update Compliance:
-
Proceed through the next set of tabs Scope tags, Assignments, and Applicability Rules to assign the configuration profile to devices you wish to enroll.
-
Review the settings and then select Create.
Deploy the configuration script
The Update Compliance Configuration Script is an important component of properly enrolling devices in Update Compliance, though it isn't strictly necessary. It checks to ensure that devices have the required services running and checks connectivity to the endpoints detailed in the section on Manually configuring devices for Update Compliance. You can deploy the script as a Win32 app. For more information, see Win32 app management in Microsoft Intune.
When you deploy the configuration script as a Win32 app, you won't be able to retrieve the results of logs on the device without having access to the device, or saving results of the logs to a shared filesystem. We recommend deploying the script in pilot mode to a set of devices that you do have access to, or have a way to access the resultant log output the script provides, with as similar of a configuration profile as other devices which will be enrolled to Update Compliance, and analyzing the logs for any potential issues. Following this, you can deploy the configuration script in deployment mode as a Win32 app to all Update Compliance devices.