Files
windows-itpro-docs/devices/surface-hub/manage-settings-with-mdm-for-surface-hub.md
jdeckerMS 323b29e556 Squashed commit of the following:
commit d6a8bce79e491a8a245a37a9e20e6a6bec4d325b
Merge: 0ab4e4e1 a7c70ad4
Author: jdeckerMS <jdecker@microsoft.com>
Date:   Thu Mar 23 10:35:16 2017 -0700

    Merge remote-tracking branch 'refs/remotes/origin/rs2' into jdrs2sh

commit 0ab4e4e119590e0e8cef691eee2b87180b07c5b3
Author: jdeckerMS <jdecker@microsoft.com>
Date:   Thu Mar 23 10:29:48 2017 -0700

    Jordan feedback

commit 4454eeadbebb5fccdbfb3b1d07e87d708fefbe87
Merge: 03444e15 ef670cb5
Author: jdeckerMS <jdecker@microsoft.com>
Date:   Thu Mar 23 09:26:54 2017 -0700

    Merge remote-tracking branch 'refs/remotes/origin/rs2' into jdrs2sh

commit 03444e15f5b51bd1bdf1e76745f62cbbed3b529d
Merge: 603408f3 660a6984
Author: jdeckerMS <jdecker@microsoft.com>
Date:   Wed Mar 22 11:00:46 2017 -0700

    Merge branch 'rs2' into jdrs2sh

commit 603408f38ecd99e6f7fce1f61a4f199918fd67c4
Merge: 6821f22f b96e1555
Author: jdeckerMS <jdecker@microsoft.com>
Date:   Tue Mar 21 13:54:33 2017 -0700

    Merge remote-tracking branch 'refs/remotes/origin/rs2' into jdrs2sh

commit 6821f22f07f1864bb0a5c8eda33f7daf4f9531bc
Author: jdeckerMS <jdecker@microsoft.com>
Date:   Tue Mar 21 13:41:44 2017 -0700

    change ICD references

commit 5804bc18db376fba16e8c863f5af8ffdd965359a
Author: jdeckerMS <jdecker@microsoft.com>
Date:   Tue Mar 21 13:39:55 2017 -0700

    rename file

commit 9268142c9b881b0e0ad4fc2a0d4dcfddc180a1b3
Author: jdeckerMS <jdecker@microsoft.com>
Date:   Tue Mar 21 13:32:31 2017 -0700

    update what's new

commit 503be68ec3a731434ca789df2da1f1c4783fdca7
Author: jdeckerMS <jdecker@microsoft.com>
Date:   Tue Mar 21 13:30:48 2017 -0700

    art

commit 93914a2cf2aef9622b172c8ea97a3c1d72544c6a
Author: jdeckerMS <jdecker@microsoft.com>
Date:   Tue Mar 21 13:30:43 2017 -0700

    Jordan updates

commit 27b1445ba4149fa78b7ec628870b19933307ba38
Merge: 9578dffe 6f0a1f7f
Author: jdeckerMS <jdecker@microsoft.com>
Date:   Tue Mar 21 08:19:27 2017 -0700

    Merge remote-tracking branch 'refs/remotes/origin/rs2' into jdrs2sh

commit 9578dffee198b0be16992368f571eed81f261818
Author: jdeckerMS <jdecker@microsoft.com>
Date:   Mon Mar 20 09:09:56 2017 -0700

    new oobe image

commit 616c10e4e404574ecce7726fc76d7582c56b318e
Author: jdeckerMS <jdecker@microsoft.com>
Date:   Mon Mar 20 08:23:53 2017 -0700

    get bulk token warning

commit 5600a6c7b320c4968686c07df90c62d8110764c9
Merge: cf29bb53 4b34636b
Author: jdeckerMS <jdecker@microsoft.com>
Date:   Mon Mar 20 08:22:02 2017 -0700

    Merge remote-tracking branch 'refs/remotes/origin/rs2' into jdrs2sh

commit cf29bb53ec1c6e45e068219a796b2a5b04347b15
Merge: 695ec39f a5ec4c4d
Author: jdeckerMS <jdecker@microsoft.com>
Date:   Fri Mar 17 09:42:51 2017 -0700

    Merge remote-tracking branch 'refs/remotes/origin/rs2' into jdrs2sh

commit 695ec39f81b6da46b442ce8e52c9d9b28d65434a
Author: jdeckerMS <jdecker@microsoft.com>
Date:   Thu Mar 16 12:25:06 2017 -0700

    delete

    # Conflicts:
    #	devices/surface-hub/TOC.md
    #	devices/surface-hub/intro-to-surface-hub.md
    #	devices/surface-hub/surface-hub-administrators-guide.md

commit cc123f7aa0718efaa7cd355df4e3693afb073b9c
Merge: 6b7ddf3e 3c12e864
Author: jdeckerMS <jdecker@microsoft.com>
Date:   Thu Mar 16 12:23:40 2017 -0700

    Merge remote-tracking branch 'refs/remotes/origin/rs2' into jdrs2sh

commit 6b7ddf3e498d541c2dbb531dd132e7ec0f45eb9d
Merge: 278d14c4 032c25d4
Author: jdeckerMS <jdecker@microsoft.com>
Date:   Thu Mar 16 11:34:53 2017 -0700

    Merge remote-tracking branch 'refs/remotes/origin/rs2' into jdrs2sh

commit 278d14c462fa386e8979c4e998c464f2cdbf6a6c
Author: jdeckerMS <jdecker@microsoft.com>
Date:   Wed Mar 15 10:26:22 2017 -0700

    get bulk token

commit 005f12e3939f8134143314e95e6bc9f76db8c3de
Merge: 410e7508 1bff6ddd
Author: jdeckerMS <jdecker@microsoft.com>
Date:   Wed Mar 15 10:25:19 2017 -0700

    Merge remote-tracking branch 'refs/remotes/origin/rs2' into jdrs2sh

commit 410e750850a5037d843fe9d9c64a477d252ff10e
Merge: d2f94c8f 8eed0956
Author: jdeckerMS <jdecker@microsoft.com>
Date:   Tue Mar 14 13:51:32 2017 -0700

    Merge remote-tracking branch 'refs/remotes/origin/rs2' into jdrs2sh

commit d2f94c8f9d73868dec86e472fe5ace87b7370ac3
Author: jdeckerMS <jdecker@microsoft.com>
Date:   Tue Mar 14 13:27:23 2017 -0700

    tweak

commit f629b4f1fd27fad24c258a7de903e6c18e85ec8c
Author: jdeckerMS <jdecker@microsoft.com>
Date:   Tue Mar 14 12:44:21 2017 -0700

    fix mdm enrollment

commit 1dd74f9e7e353ba9ce5e71c8797cfa8cd02342a7
Author: jdeckerMS <jdecker@microsoft.com>
Date:   Tue Mar 14 12:33:24 2017 -0700

    add proxy

commit c71e5af71bc866f1a5fe9abefb82b5124fb957fd
Author: jdeckerMS <jdecker@microsoft.com>
Date:   Tue Mar 14 12:03:09 2017 -0700

    add install link

commit 0344deee4c68ae3c81529dc9cb602eec2af0b5c3
Author: jdeckerMS <jdecker@microsoft.com>
Date:   Tue Mar 14 11:57:43 2017 -0700

    stick

commit be7ed51e1fb7b1a578c8e843b56e701bcf90be9d
Author: jdeckerMS <jdecker@microsoft.com>
Date:   Tue Mar 14 11:56:52 2017 -0700

    resize art

commit 857be3cdfca07da3c5dfb470b3a3a3aee290a07c
Author: jdeckerMS <jdecker@microsoft.com>
Date:   Tue Mar 14 11:55:09 2017 -0700

    moved note to correct cell

commit a91ca3943b8c0454549a1c0c5455b919ed46de8c
Author: jdeckerMS <jdecker@microsoft.com>
Date:   Tue Mar 14 11:52:21 2017 -0700

    sync

commit 5bcf3c1db3c97d87ca60bfd4d688b908d4d9e518
Author: jdeckerMS <jdecker@microsoft.com>
Date:   Tue Mar 14 11:43:25 2017 -0700

    fix link

commit de7d60524a2e1ba0d5e1bc1074da9bf887fa6457
Author: jdeckerMS <jdecker@microsoft.com>
Date:   Tue Mar 14 11:42:46 2017 -0700

    add apps to provisioning

commit 67e14be35b30f4bfa45fb79815c25ef2317a171c
Author: jdeckerMS <jdecker@microsoft.com>
Date:   Tue Mar 14 11:37:27 2017 -0700

    sync to switch branches

commit c6b9d8dae5d29f441ea262323baaad5e41b2bc9f
Merge: 3260248b 4b13310a
Author: jdeckerMS <jdecker@microsoft.com>
Date:   Tue Mar 14 08:35:04 2017 -0700

    Merge remote-tracking branch 'refs/remotes/origin/rs2' into jdrs2sh

commit 3260248b8a0511c081a5547419109f9380ea9b26
Author: jdeckerMS <jdecker@microsoft.com>
Date:   Mon Mar 13 08:56:25 2017 -0700

    fix table for non-IE browsers

    # Conflicts:
    #	windows/whats-new/images/wcd-options.png

commit a3ece5c8d4a6c37645f4aa5b39b582be855b98b9
Merge: 4ed80574 759b4a41
Author: jdeckerMS <jdecker@microsoft.com>
Date:   Mon Mar 13 08:53:34 2017 -0700

    Merge remote-tracking branch 'refs/remotes/origin/rs2' into jdrs2sh

commit 4ed80574020c1291ba4e853553330a7b84f21657
Author: jdeckerMS <jdecker@microsoft.com>
Date:   Wed Mar 8 12:00:27 2017 -0800

    fix typo

commit 7541a4507508822dcd51da773536b89a5a49f305
Author: jdeckerMS <jdecker@microsoft.com>
Date:   Wed Mar 8 11:53:38 2017 -0800

    fix table

commit 37254f098396342dd23115ea10885f121f5b9371
Author: jdeckerMS <jdecker@microsoft.com>
Date:   Wed Mar 8 11:51:48 2017 -0800

    resize art

commit a936a6c4768729fec66775528a31c64132fa4f8e
Merge: a217a9ae 9786c53a
Author: jdeckerMS <jdecker@microsoft.com>
Date:   Wed Mar 8 11:50:43 2017 -0800

    Merge remote-tracking branch 'refs/remotes/origin/rs2' into jdrs2sh

commit a217a9ae8e48af3b533eb421a716b5a580daecba
Author: jdeckerMS <jdecker@microsoft.com>
Date:   Wed Mar 8 11:45:55 2017 -0800

    sync

commit f09e8ae9e87db16b7ee6982864a1c4c2fc8ebcdc
Author: jdeckerMS <jdecker@microsoft.com>
Date:   Wed Mar 8 11:39:34 2017 -0800

    add image to index

commit 80a133370000b2b7ff8c9e1383aca7eb1769258a
Author: jdeckerMS <jdecker@microsoft.com>
Date:   Wed Mar 8 11:30:34 2017 -0800

    fix link

commit d8aa55211a62fecf56e6404146917b8e84b3c296
Author: jdeckerMS <jdecker@microsoft.com>
Date:   Wed Mar 8 11:25:33 2017 -0800

    tweak TOC, get rid of intro

commit 6415e3739e13f47f2d3a6355066015d0bcd4cc7a
Author: jdeckerMS <jdecker@microsoft.com>
Date:   Wed Mar 8 11:16:33 2017 -0800

    remove admin guide level from toc

commit 0d016720488e8aa1e3e0621b50596a66db8d232f
Author: jdeckerMS <jdecker@microsoft.com>
Date:   Wed Mar 8 07:53:03 2017 -0800

    release in change history

commit 67a8f585dd788db1a18247827b1f9d22378d5b9f
Author: jdeckerMS <jdecker@microsoft.com>
Date:   Wed Mar 8 07:50:20 2017 -0800

    add what's new

commit be5e195fc41d9ce94cd1b6189f0da25e9e50b9f2
Merge: e3e75663 8e80f0e1
Author: jdeckerMS <jdecker@microsoft.com>
Date:   Wed Mar 8 07:40:34 2017 -0800

    Merge remote-tracking branch 'refs/remotes/origin/rs2' into jdrs2sh

commit e3e756632b462d8a110b0538782bc22487e96d4b
Author: jdeckerMS <jdecker@microsoft.com>
Date:   Tue Feb 28 13:46:55 2017 -0800

    end session

    # Conflicts:
    #	windows/configure/windows-10-start-layout-options-and-policies.md

commit 0a9b86a2f6b69e5883fcdab48bb22f19cf1e6c32
Merge: 13e94977 4530d39f
Author: jdeckerMS <jdecker@microsoft.com>
Date:   Tue Feb 28 13:42:38 2017 -0800

    Merge remote-tracking branch 'refs/remotes/origin/rs2' into jdrs2sh

commit 13e9497711b34daab936735edcfa87f13c89d006
Author: jdeckerMS <jdecker@microsoft.com>
Date:   Mon Feb 27 11:29:01 2017 -0800

    resize art

commit 17d830dfde1174c95cb2bde7018fa1c85b8dcacc
Author: jdeckerMS <jdecker@microsoft.com>
Date:   Mon Feb 27 10:59:56 2017 -0800

    delete file from images

commit 395946c6c9b54516461e79a232525e965632686d
Author: jdeckerMS <jdecker@microsoft.com>
Date:   Mon Feb 27 10:50:39 2017 -0800

    fix link

commit c328942818f6e4b5d2bd2062724a90687b85926e
Author: jdeckerMS <jdecker@microsoft.com>
Date:   Mon Feb 27 10:40:29 2017 -0800

    set up wizard table

commit 942af3c56e6e6f7736e1ea03d6801633237a9311
Merge: 6ce5c31d 819ba842
Author: jdeckerMS <jdecker@microsoft.com>
Date:   Mon Feb 27 10:03:16 2017 -0800

    Merge remote-tracking branch 'refs/remotes/origin/rs2' into jdrs2sh

commit 6ce5c31d127662010841791aa6498cd1606ed31e
Author: jdeckerMS <jdecker@microsoft.com>
Date:   Mon Feb 27 09:55:32 2017 -0800

    change branches

commit a3c28ae9e83bde3c97dd2d9232ad430e08ae972b
Merge: b794a681 0a914cf9
Author: jdeckerMS <jdecker@microsoft.com>
Date:   Mon Feb 27 08:31:41 2017 -0800

    Merge remote-tracking branch 'refs/remotes/origin/jdrs2icd' into jdrs2sh

commit b794a6819b1a3ad9deb834986a184f6b488497fa
Merge: af38dabf 2d1267b5
Author: jdeckerMS <jdecker@microsoft.com>
Date:   Mon Feb 27 07:37:48 2017 -0800

    Merge remote-tracking branch 'refs/remotes/origin/rs2' into jdrs2sh

commit af38dabf79f6b51971fbf3891d72be73f0f9035a
Author: jdeckerMS <jdecker@microsoft.com>
Date:   Fri Feb 24 11:25:09 2017 -0800

    changed all to End Session

    # Conflicts:
    #	devices/surface-hub/index.md

commit 4e124566f0a01017232d6c2c6be95db15abf5db3
Merge: d07431ae 4b1663d8
Author: jdeckerMS <jdecker@microsoft.com>
Date:   Fri Feb 24 11:18:06 2017 -0800

    Merge remote-tracking branch 'refs/remotes/origin/rs2' into jdrs2sh

commit d07431ae706af0af4c6c44909c4e08b16b904ccc
Merge: 237cb29c 8bfa038e
Author: jdeckerMS <jdecker@microsoft.com>
Date:   Tue Feb 14 13:48:31 2017 -0800

    Merge remote-tracking branch 'refs/remotes/origin/rs2' into jdrs2sh

commit 237cb29ce337e73ab6d707c1c06eaa89f5b49f3b
Author: jdeckerMS <jdecker@microsoft.com>
Date:   Tue Feb 7 15:06:27 2017 -0800

    undo all

commit 5461ccb226a5ee079f07c59d719c52f3fefe2343
Author: jdeckerMS <jdecker@microsoft.com>
Date:   Tue Feb 7 07:53:02 2017 -0800

    sync

commit 1e56393ac1a33ff3d1b5eb2183e1ece4e776a9a6
Author: jdeckerMS <jdecker@microsoft.com>
Date:   Tue Feb 7 07:41:45 2017 -0800

    sync

commit 25ad8424a8f0dff551367cebedad18563e9d1081
Author: jdeckerMS <jdecker@microsoft.com>
Date:   Tue Feb 7 07:32:18 2017 -0800

    iframe

commit 114cccfb75b3f27f46b67b5577d05a5de55662c1
Author: jdeckerMS <jdecker@microsoft.com>
Date:   Tue Feb 7 07:22:49 2017 -0800

    try span

commit 03c4b1bb5aad5871b6808c2b7c48e0e71b6c10c7
Author: jdeckerMS <jdecker@microsoft.com>
Date:   Tue Feb 7 07:10:29 2017 -0800

    remove test

commit 8a55ced11b6e8d4117d940ec73e2b045a0d7cf24
Author: jdeckerMS <jdecker@microsoft.com>
Date:   Tue Feb 7 06:59:19 2017 -0800

    test compass video

commit f4ae742993fa9892f4d7c411fa87683697849cf7
Merge: dd9a3df0 94b855cd
Author: jdeckerMS <jdecker@microsoft.com>
Date:   Tue Feb 7 06:55:10 2017 -0800

    Merge remote-tracking branch 'refs/remotes/origin/rs2' into jdrs2sh
2017-03-23 10:36:02 -07:00

27 KiB
Raw Blame History

title, description, ms.assetid, keywords, ms.prod, ms.mktglfcycl, ms.sitesec, ms.pagetype, author, localizationpriority
title description ms.assetid keywords ms.prod ms.mktglfcycl ms.sitesec ms.pagetype author localizationpriority
Manage settings with an MDM provider (Surface Hub) Microsoft Surface Hub provides an enterprise management solution to help IT administrators manage policies and business applications on these devices using a mobile device management (MDM) solution. 18EB8464-6E22-479D-B0C3-21C4ADD168FE mobile device management, MDM, manage policies w10 manage library surfacehub, mobility jdeckerMS medium

Manage settings with an MDM provider (Surface Hub)

Surface Hub and other Windows 10 devices allow IT administrators to manage settings and policies using a mobile device management (MDM) provider. A built-in management component communicates with the management server, so there is no need to install additional clients on the device. For more information, see Windows 10 mobile device management.

Surface Hub has been validated with Microsofts first-party MDM providers:

  • On-premises MDM with System Center Configuration Manager (beginning in version 1602)
  • Hybrid MDM with System Center Configuration Manager and Microsoft Intune
  • Microsoft Intune standalone

You can also manage Surface Hubs using any third-party MDM provider that can communicate with Windows 10 using the MDM protocol.

Enroll a Surface Hub into MDM

You can enroll your Surface Hubs using bulk or manual enrollment.

Note

You can join your Surface Hub to Azure Active Directory (Azure AD) to manage admin groups on the device. However, Surface Hub does not currently support automatic enrollment to Microsoft Intune through Azure AD join. If your organization automatically enrolls Azure AD-joined devices into Intune, you must disable this policy for Surface Hub before joining the device to Azure AD.

To enable automatic enrollment for Microsoft Intune

  1. In the Azure classic portal, navigate to the Active Directory node and select your directory.
  2. Click the Applications tab, then click Microsoft Intune.
  3. Under Manage devices for these users, click Groups.
  4. Click Select Groups, then select the groups of users you want to automatically enroll into Intune. Do not include accounts that are used to enroll Surface Hubs into Intune.
  5. Click the checkmark button, then click Save.

Bulk enrollment

To configure bulk enrollment

Manual enrollment

To configure manual enrollment

  1. On your Surface Hub, open Settings.
  2. Type the device admin credentials when prompted.
  3. Select This device, and navigate to Device management.
  4. Under Device management, select + Device management.
  5. Follow the instructions in the dialog to connect to your MDM provider.

Manage Surface Hub settings with MDM

You can use MDM to manage some Surface Hub CSP settings, and some Windows 10 settings. Depending on the MDM provider that you use, you may set these settings using a built-in user interface, or by deploying custom SyncML. Microsoft Intune and System Center Configuration Manager provide built-in experiences to help create policy templates for Surface Hub. Refer to documentation from your MDM provider to learn how to create and deploy SyncML.

Supported Surface Hub CSP settings

You can configure the Surface Hub settings in the following table using MDM. The table identifies if the setting is supported with Microsoft Intune, System Center Configuration Manager, or SyncML.

For more information, see SurfaceHub configuration service provider.

Setting Node in the SurfaceHub CSP Supported with
Intune?
Supported with
Configuration Manager?
Supported with
SyncML*?
Maintenance hours MaintenanceHoursSimple/Hours/StartTime
MaintenanceHoursSimple/Hours/Duration
Yes Yes Yes
Automatically turn on the screen using motion sensors InBoxApps/Welcome/AutoWakeScreen Yes Yes Yes
Require a pin for wireless projection InBoxApps/WirelessProjection/PINRequired Yes Yes Yes
Enable wireless projection InBoxApps/WirelessProjection/Enabled Yes Yes.
Use a custom setting.
Yes
Miracast channel to use for wireless projection InBoxApps/WirelessProjection/Channel Yes Yes.
Use a custom setting.
Yes
Connect to your Operations Management Suite workspace MOMAgent/WorkspaceID
MOMAgent/WorkspaceKey
Yes Yes.
Use a custom setting.
Yes
Welcome screen background image InBoxApps/Welcome/CurrentBackgroundPath Yes Yes.
Use a custom setting.
Yes
Meeting information displayed on the welcome screen InBoxApps/Welcome/MeetingInfoOption Yes Yes.
Use a custom setting.
Yes
Friendly name for wireless projection Properties/FriendlyName Yes
Use a custom policy.)
Yes.
Use a custom setting.
Yes
Device account, including password rotation DeviceAccount/<name_of_policy>
See SurfaceHub CSP.
No No Yes
Specify Skype domain InBoxApps/SkypeForBusiness/DomainName Yes
Use a custom policy.)
Yes
[Use a custom setting.] Yes
Auto launch Connect App when projection is initiated InBoxApps/Connect/AutoLaunch Yes
Use a custom policy.)
Yes
[Use a custom setting.] Yes
Set default volume Properties/DefaultVolume Yes
Use a custom policy.)
Yes
[Use a custom setting.] Yes
Set screen timeout Properties/ScreenTimeout Yes
Use a custom policy.)
Yes
[Use a custom setting.] Yes
Set session timeout Properties/SessionTimeout Yes
Use a custom policy.)
Yes
[Use a custom setting.] Yes
Set sleep timeout Properties/SleepTimeout Yes
Use a custom policy.)
Yes
[Use a custom setting.] Yes
Allow session to resume after screen is idle Properties/AllowSessionResume Yes
Use a custom policy.)
Yes
[Use a custom setting.] Yes
Allow device account to be used for proxy authentication Properties/AllowAutoProxyAuth Yes
Use a custom policy.)
Yes
[Use a custom setting.] Yes
Disable auto-populating the sign-in dialog with invitees from scheduled meetings Properties/DisableSignInSuggestions Yes
Use a custom policy.)
Yes
[Use a custom setting.] Yes
Disable "My meetings and files" feature in Start menu Properties/DoNotShowMyMeetingsAndFiles Yes
Use a custom policy.)
Yes
[Use a custom setting.] Yes
*Settings supported with SyncML can also be configured in a Windows Configuration Designer provisioning package.

Supported Windows 10 settings

In addition to Surface Hub-specific settings, there are numerous settings common to all Windows 10 devices. These settings are defined in the Configuration service provider reference.

The following tables include info on Windows 10 settings that have been validated with Surface Hub. There is a table with settings for these areas: security, browser, Windows Updates, Windows Defender, remote reboot, certificates, and logs. Each table identifies if the setting is supported with Microsoft Intune, System Center Configuration Manager, or SyncML.

Security settings

Setting Details CSP reference Supported with
Intune?
Supported with
Configuration Manager?
Supported with
SyncML*?
Allow Bluetooth Keep this enabled to support Bluetooth peripherals. Connectivity/AllowBluetooth Yes.
Use a custom policy.
Yes.
Use a custom setting.
Yes
Bluetooth policies Use to set the Bluetooth device name, and block advertising, discovery, and automatic pairing. Bluetooth/<name of policy>
See Policy CSP
Yes.
Use a custom policy.
Yes.
Use a custom setting.
Yes
Allow camera Keep this enabled for Skype for Business. Camera/AllowCamera Yes.
Use a custom policy.
Yes.
Use a custom setting.
Yes
Allow location Keep this enabled to support apps such as Maps. System/AllowLocation Yes.
Use a custom policy.
Yes.
Use a custom setting.
Yes
Allow telemetry Keep this enabled to help Microsoft improve Surface Hub. System/AllowTelemetry Yes.
Use a custom policy.
Yes.
Use a custom setting.
Yes
*Settings supported with SyncML can also be configured in a Windows Configuration Designer provisioning package.

Browser settings

Setting Details CSP reference Supported with
Intune?
Supported with
Configuration Manager?
Supported with
SyncML*?
Homepages Use to configure the default homepages in Microsoft Edge. Browser/Homepages Yes.
Use a custom policy.
Yes.
Use a custom setting.
Yes
Allow cookies Surface Hub automatically deletes cookies at the end of a session. Use this to block cookies within a session. Browser/AllowCookies Yes.
Use a custom policy.
Yes.
Use a custom setting.
Yes
Allow developer tools Use to stop users from using F12 Developer Tools. Browser/AllowDeveloperTools Yes.
Use a custom policy.
Yes.
Use a custom setting.
Yes
Allow Do Not Track Use to enable Do Not Track headers. Browser/AllowDoNotTrack Yes.
Use a custom policy.
Yes.
Use a custom setting.
Yes
Allow pop-ups Use to block pop-up browser windows. Browser/AllowPopups Yes.
Use a custom policy.
Yes.
Use a custom setting.
Yes
Allow search suggestions Use to block search suggestions in the address bar. Browser/AllowSearchSuggestionsinAddressBar Yes.
Use a custom policy.
Yes.
Use a custom setting.
Yes
Allow SmartScreen Keep this enabled to turn on SmartScreen. Browser/AllowSmartScreen Yes.
Use a custom policy.
Yes.
Use a custom setting.
Yes
Prevent ignoring SmartScreen Filter warnings for websites For extra security, use to stop users from ignoring SmartScreen Filter warnings and block them from accessing potentially malicious websites. Browser/PreventSmartScreenPromptOverride Yes.
Use a custom policy.
Yes.
Use a custom setting.
Yes
Prevent ignoring SmartScreen Filter warnings for files For extra security, use to stop users from ignoring SmartScreen Filter warnings and block them from downloading unverified files from Microsoft Edge. Browser/PreventSmartScreenPromptOverrideForFiles Yes.
Use a custom policy.
Yes.
Use a custom setting.
Yes
*Settings supported with SyncML can also be configured in a Windows Configuration Designer provisioning package.

Windows Update settings

Setting Details CSP reference Supported with
Intune?
Supported with
Configuration Manager?
Supported with
SyncML*?
Use Current Branch or Current Branch for Business Use to configure Windows Update for Business see Windows updates. Update/BranchReadinessLevel Yes. Use a custom policy. Yes. Use a custom setting. Yes
Defer feature updates See above. Update/ DeferFeatureUpdatesPeriodInDays Yes.
Use a custom policy.
Yes.
Use a custom setting.
Yes
Defer quality updates See above. Update/DeferQualityUpdatesPeriodInDays Yes.
Use a custom policy.
Yes.
Use a custom setting.
Yes
Pause feature updates See above. Update/PauseFeatureUpdates Yes.
Use a custom policy.
Yes.
Use a custom setting.
Yes
Pause quality updates See above. Update/PauseQualityUpdates Yes.
Use a custom policy.
Yes.
Use a custom setting.
Yes
Configure device to use WSUS Use to connect your Surface Hub to WSUS instead of Windows Update see Windows updates. Update/UpdateServiceUrl Yes.
Use a custom policy.
Yes.
Use a custom setting.
Yes
Delivery optimization Use peer-to-peer content sharing to reduce bandwidth issues during updates. See Configure Delivery Optimization for Windows 10 for details. DeliveryOptimization/<name of policy>
See Policy CSP
Yes.
Use a custom policy.
Yes.
Use a custom setting.
Yes
*Settings supported with SyncML can also be configured in a Windows Configuration Designer provisioning package.

Windows Defender settings

Setting Details CSP reference Supported with
Intune?
Supported with
Configuration Manager?
Supported with
SyncML*?
Defender policies Use to configure various Defender settings, including a scheduled scan time. Defender/<name of policy>
See Policy CSP
Yes.
Use a custom policy.
Yes.
Use a custom setting.
Yes
Defender status Use to initiate a Defender scan, force a signature update, query any threats detected. Defender CSP No. No. Yes
*Settings supported with SyncML can also be configured in a Windows Configuration Designer provisioning package.

Remote reboot

Setting Details CSP reference Supported with
Intune?
Supported with
Configuration Manager?
Supported with
SyncML*?
Reboot the device immediately Use in conjunction with OMS to minimize support costs see Monitor your Microsoft Surface Hub. ./Vendor/MSFT/Reboot/RebootNow
See Reboot CSP
No No Yes
Reboot the device at a scheduled date and time See above. ./Vendor/MSFT/Reboot/Schedule/Single
See Reboot CSP
Yes.
Use a custom policy.
Yes.
Use a custom setting.
Yes
Reboot the device daily at a scheduled date and time See above. ./Vendor/MSFT/Reboot/Schedule/DailyRecurrent
See Reboot CSP
Yes.
Use a custom policy.
Yes.
Use a custom setting.
Yes
*Settings supported with SyncML can also be configured in a Windows Configuration Designer provisioning package.

Install certificates

Setting Details CSP reference Supported with
Intune?
Supported with
Configuration Manager?
Supported with
SyncML*?
Install trusted CA certificates Use to deploy trusted root and intermediate CA certificates. RootCATrustedCertificates CSP Yes.
See Configure Intune certificate profiles.
Yes.
See How to create certificate profiles in System Center Configuration Manager.
Yes

*Settings supported with SyncML can also be configured in a Windows Configuration Designer provisioning package.

Collect logs

Setting Details CSP reference Supported with
Intune?
Supported with
Configuration Manager?
Supported with
SyncML*?
Collect ETW logs Use to remotely collect ETW logs from Surface Hub. DiagnosticLog CSP No No Yes

*Settings supported with SyncML can also be configured in a Windows Configuration Designer provisioning package.

Generate OMA URIs for settings

You need to use a settings OMA URI to create a custom policy in Intune, or a custom setting in System Center Configuration Manager.

To generate the OMA URI for any setting in the CSP documentation

  1. In the CSP documentation, identify the root node of the CSP. Generally, this looks like ./Vendor/MSFT/<name of CSP>
    For example, the root node of the SurfaceHub CSP is ./Vendor/MSFT/SurfaceHub.
  2. Identify the node path for the setting you want to use.
    For example, the node path for the setting to enable wireless projection is InBoxApps/WirelessProjection/Enabled.
  3. Append the node path to the root node to generate the OMA URI.
    For example, the OMA URI for the setting to enable wireless projection is ./Vendor/MSFT/SurfaceHub/InBoxApps/WirelessProjection/Enabled.

The data type is also stated in the CSP documentation. The most common data types are:

  • char (String)
  • int (Integer)
  • bool (Boolean)
## Example: Manage Surface Hub settings with Microsoft Intune

You can use Microsoft Intune to manage Surface Hub settings.

To create a configuration policy from a template

You'll use the Windows 10 Team general configuration policy as the template.

  1. On the Intune management portal, sign in with your Intune administrator account.

  2. On the left-hand navigation menu, click Policy.

  3. In the Overview page, click Add Policy.

  4. On Select a template for the new policy, expand Windows, select General Configuration (Windows 10 Team and later), and then click Create Policy.

    template for Windows 10 Team

  5. Configure your policy, then click Save Policy

    save policy

  6. When prompted, click Yes to deploy your new policy to a user or device group. For more information, see Use groups to manage users and devices in Microsoft Intune.

To create a custom configuration policy

Youll need to create a custom policy using the Custom Configuration (Windows 10 Desktop and Mobile and later) template to manage settings that are not available in the Windows 10 Team general configuration policy template.

  1. On the Intune management portal, sign in with your Intune administrator account.

  2. On the left-hand navigation menu, click Policy.

  3. On the Overview page, click Add Policy.

  4. On Select a template for the new policy, expand Windows, select Custom Configuration (Windows 10 Desktop and Mobile and later), and then click Create Policy.

  5. Type a name and optional description for the policy.

  6. Under OMA-URI Settings, click Add.

  7. Complete the form to create a new setting, and then click OK.

    example of OMA URI form

  8. Repeat Steps 6 and 7 for each setting you want to configure with this policy.

  9. After you're done, click Save Policy and deploy it to a user or device group.

## Example: Manage Surface Hub settings with System Center Configuration Manager System Center Configuration Manager supports managing modern devices that do not require the Configuration Manager client to manage them, including Surface Hub. If you already use System Center Configuration Manager to manage other devices in your organization, you can continue to use the Configuration Manager console as your single location for managing Surface Hubs.

Note

These instructions are based on the current branch of System Center Configuration Manager.

To create a configuration item for Surface Hub settings

  1. On the Assets and Compliance workspace of the Configuration Manager console, click Overview > Compliance Settings > Configuration Items.

  2. On the Home tab, in the Create group, click Create Configuration Item.

  3. On the General page of the Create Configuration Item Wizard, specify a name and optional description for the configuration item.

  4. Under Settings for devices managed without the Configuration Manager client, select Windows 8.1 and Windows 10, and then click Next.

    example of UI

  5. On the Supported Platforms page, expand Windows 10 and select All Windows 10 Team and higher. Unselect the other Windows platforms, and then click Next.

    select platform

  6. On the Device Settings page, under Device settings groups, select Windows 10 Team.

  7. On the Windows 10 Team page, configure the settings you require.

    Windows 10 Team

  8. You'll need to create custom settings to manage settings that are not available in the Windows 10 Team page. On the Device Settings page, select the check box Configure additional settings that are not in the default setting groups.

    additional settings

  9. On the Additional Settings page, click Add.

  10. In the Browse Settings dialog, click Create Setting.

  11. In the Create Setting dialog, under the General tab, specify a name and optional description for the custom setting.

  12. Under Setting type, select OMA URI.

  13. Complete the form to create a new setting, and then click OK.

    OMA URI setting

  14. On the Browse Settings dialog, under Available settings, select the new setting you created, and then click Select.

  15. On the Create Rule dialog, complete the form to specify a rule for the setting, and then click OK.

  16. Repeat steps 9 to 15 for each custom setting you want to add to the configuration item.

  17. When you're done, on the Browse Settings dialog, click Close.

  18. Complete the wizard.
    You can view the new configuration item in the Configuration Items node of the Assets and Compliance workspace.

For more information, see Create configuration items for Windows 8.1 and Windows 10 devices managed without the System Center Configuration Manager client.

Manage Microsoft Surface Hub