<?xml version="1.0" encoding="utf-8"?>
<rss xmlns:atom="https://www.w3.org/2005/Atom" xmlns:sy="https://purl.org/rss/1.0/modules/syndication/" xmlns:dc="https://purl.org/dc/elements/1.1/" xmlns:content="https://purl.org/rss/1.0/modules/content/" xmlns:wfw="https://wellformedweb.org/CommentAPI/" xmlns:slash="https://purl.org/rss/1.0/modules/slash/"
  version="2.0">
  <channel>
    <title>configmgrdogs</title>
    <atom:link
      href="https://docs.microsoft.com/archive/blogs/configmgrdogs/feed.xml"
      rel="self"
      type="application/rss+xml" />
    <link>https://docs.microsoft.com/archive/blogs/configmgrdogs/feed.xml</link>
    <description />
    <lastBuildDate>Mon, 29 Oct 2018 19:53:58 GMT</lastBuildDate>
    <language>en-US</language>
    <sy:updatePeriod>hourly</sy:updatePeriod>
    <sy:updateFrequency>1</sy:updateFrequency>
    <item>
      <title>ConfigMgrDogs Blog Shutting Down</title>
      <link>https://docs.microsoft.com/archive/blogs/configmgrdogs/configmgrdogs-blog-shutting-down</link>
      <pubDate>Mon, 29 Oct 2018 19:53:58 GMT</pubDate>
      <dc:creator><![CDATA[Matt Shadbolt [MSFT]]]></dc:creator>
      <guid
        isPermaLink="false">https://blogs.technet.microsoft.com/configmgrdogs/?p=5485</guid>
      <description><![CDATA[Hi ConfigMgrDogs readers,

We're sad to announce the ConfigMgrDogs blog will be shutting...]]></description>
      <content:encoded><![CDATA[Hi ConfigMgrDogs readers,

We're sad to announce the ConfigMgrDogs blog will be shutting down.

<img src="https://msdnshared.blob.core.windows.net/media/2018/10/shutdown.jpg" alt="" class="alignnone wp-image-5495 size-full" width="1024" height="516" />

With the move to Microsoft Tech Communities, we've decided to post on other platforms and blogs rather than have a dedicated ConfigMgrDogs blog.

We'll continue to engage deeply with the technical community for Intune, Configuration Manager and Azure and hope you'll follow us to our new platforms.

Please follow us on Twitter (<a target="_blank" href="https://twitter.com/ConfigMgrDogs" rel="noopener">@ConfigMgrDogs</a>) for the most frequent updates, the <a href="https://techcommunity.microsoft.com/t5/Intune-Customer-Success/Welcome-to-the-new-Intune-Customer-Success-Blog/ba-p/274901">Intune Tech Community</a> for formal Intune blog posts, and LinkedIn for informal posts (<a target="_blank" href="https://www.linkedin.com/in/mattshadbolt/" rel="noopener">Matt</a>, <a target="_blank" href="https://www.linkedin.com/in/georgesmpyrakis/" rel="noopener">George</a>, <a href="https://www.linkedin.com/in/bartlettian/">Ian</a>).

All of our posts have been archived at <a target="_blank" href="https://www.ConfigMgrDogsArchive.com" rel="noopener">https://www.ConfigMgrDogsArchive.com</a> and should be searchable via <a target="_blank" href="https://www.bing.com/search?q=ConfigMgrDogsArchive" rel="noopener">Bing</a> and <a href="https://www.google.com/search?q=ConfigMgrDogsArchive">Google</a>.

We've really loved posting technical content for the past six years, and we've appreciated all of the community engagement with the ConfigMgrDogs. We absolutely love running into ConfigMgr and Intune admins at conferences and events and hearing how a post or two have helped solve your problems.

We're sad the blog is going away, but plan to stay just as connected via Twitter.

So long.

Matt, George and Ian (AKA the ConfigMgrDogs)

&nbsp;]]></content:encoded>
    </item>
    <item>
      <title>Troubleshooting Windows 10 Intune Policy Failures</title>
      <link>https://docs.microsoft.com/archive/blogs/configmgrdogs/troubleshooting-windows-10-intune-policy-failures</link>
      <pubDate>Thu, 09 Aug 2018 16:35:41 GMT</pubDate>
      <dc:creator><![CDATA[Matt Shadbolt [MSFT]]]></dc:creator>
      <guid
        isPermaLink="false">https://blogs.technet.microsoft.com/configmgrdogs/?p=5475</guid>
      <description><![CDATA[Quick brain dump today. One of our customers recently reached out with an issue where a policy for...]]></description>
      <content:encoded><![CDATA[Quick brain dump today. One of our customers recently reached out with an issue where a policy for Windows 10 wasn’t applying correctly, and we were returning a very unhelpful error message “-2016281112 Remediation failed”.

Unfortunately, the Remediation failed error message is all that is returned by the client when we issue the SET command on the OMA-URI’s required to configure the target setting. We’re partnering with Windows to improve this experience, so watch this space. But for now, we have to settle for what we have.

So what are the next steps in troubleshooting this error?

Luckily, Windows has a pretty good diagnostics channel in everyone’s favorite Event Viewer (eventvwr).

So first, open up <strong>eventvwr.msc</strong> from Run.

<a href="https://msdnshared.blob.core.windows.net/media/2018/08/mmc_2018-08-09_08-51-48.png"><img title="mmc_2018-08-09_08-51-48" alt="mmc_2018-08-09_08-51-48" src="https://msdnshared.blob.core.windows.net/media/2018/08/mmc_2018-08-09_08-51-48_thumb.png" class="" width="238" height="212" border="0" /></a>

Next, browse to <strong>Application and Services Logs &gt; Microsoft &gt; Windows &gt; DeviceManagement-Enterprise-Diagnostics-Provider</strong>. You’ll see two logs, <strong>Admin</strong> and <strong>Operational</strong>

<a href="https://msdnshared.blob.core.windows.net/media/2018/08/mmc_2018-08-09_08-54-20.png"><img title="mmc_2018-08-09_08-54-20" alt="mmc_2018-08-09_08-54-20" src="https://msdnshared.blob.core.windows.net/media/2018/08/mmc_2018-08-09_08-54-20_thumb.png" class="" width="474" height="135" border="0" /></a>

Firstly, take a look in the Admin log. You should see some high level error messages which might point to an obvious issue. For example, here on my corp device I’ve got an error message for an app deployment via MDM.

<a href="https://msdnshared.blob.core.windows.net/media/2018/08/mmc_2018-08-09_08-56-31.png"><img title="mmc_2018-08-09_08-56-31" alt="mmc_2018-08-09_08-56-31" src="https://msdnshared.blob.core.windows.net/media/2018/08/mmc_2018-08-09_08-56-31_thumb.png" class="" width="924" height="186" border="0" /></a>

This error obviously indicates an app is not being discovered as expected. I recon if I gave this a couple more syncs, the app would reinstall and all would be well.If the error messages in the Admin log are still unhelpful, we have one other option and that’s to enable Debug logging on the DeviceManagement-Enterprise-Diagnostics-Provider.

To do this, from the <strong>View</strong> menu in eventvwr, enable the <strong>Show Analytic and Debug Logs</strong> option. This will likely make your eventvwr window flash like crazy for a minute or two, but it’s enabling a bunch of extra logs and the UI doesn’t like it much.

<a href="https://msdnshared.blob.core.windows.net/media/2018/08/mmc_2018-08-09_08-59-211.png"><img title="mmc_2018-08-09_08-59-21" alt="mmc_2018-08-09_08-59-21" src="https://msdnshared.blob.core.windows.net/media/2018/08/mmc_2018-08-09_08-59-21_thumb1.png" class="" width="349" height="192" border="0" /></a>

Once enabled, you’ll now see a Debug log option in the DeviceManagement-Enterprise-Diagnostics-Provider. Now enable the log by right-clicking on the log and selecting <strong>Enable Log.</strong>

<a href="https://msdnshared.blob.core.windows.net/media/2018/08/mmc_2018-08-09_09-02-571.png"><img title="mmc_2018-08-09_09-02-57" alt="mmc_2018-08-09_09-02-57" src="https://msdnshared.blob.core.windows.net/media/2018/08/mmc_2018-08-09_09-02-57_thumb1.png" class="" width="306" height="331" border="0" /></a>

Now run a repro of your issue by running a Sync (Control Panel &gt; Access work or school &gt; Connected to Azure AD &gt; Info)

<a href="https://msdnshared.blob.core.windows.net/media/2018/08/ApplicationFrameHost_2018-08-09_09-04-411.png"><img title="ApplicationFrameHost_2018-08-09_09-04-41" alt="ApplicationFrameHost_2018-08-09_09-04-41" src="https://msdnshared.blob.core.windows.net/media/2018/08/ApplicationFrameHost_2018-08-09_09-04-41_thumb1.png" class="" width="420" height="233" border="0" /></a>

In the debug log, you should see a bunch of verbose debug information about the sync and settings being applied.

<a href="https://msdnshared.blob.core.windows.net/media/2018/08/mmc_2018-08-09_09-22-061.png"><img title="mmc_2018-08-09_09-22-06" alt="mmc_2018-08-09_09-22-06" src="https://msdnshared.blob.core.windows.net/media/2018/08/mmc_2018-08-09_09-22-06_thumb1.png" class="" width="835" height="216" border="0" /></a>

And here you can see the Wifi URI being applied successfully. If there was an issue with the Wifi configuration, I’d get a much more helpful reason as to why the URI failed. I’m not seeing the error from the MDM MSI anymore, so it must have fixed itself on subsequent check-ins.

Hope you find this helpful!

Matt Shadbolt
Senior Program Manager for Microsoft Intune]]></content:encoded>
    </item>
    <item>
      <title>Microsoft Ignite Pre-Day Registrations Now Open!</title>
      <link>https://docs.microsoft.com/archive/blogs/configmgrdogs/microsoft-ignite-pre-day-registrations-now-open</link>
      <pubDate>Fri, 25 May 2018 06:00:18 GMT</pubDate>
      <dc:creator><![CDATA[Matt Shadbolt [MSFT]]]></dc:creator>
      <guid
        isPermaLink="false">https://blogs.technet.microsoft.com/configmgrdogs/?p=5215</guid>
      <description><![CDATA[The 2018 Microsoft Ignite Florida event is fast approaching, so now is the time to secure your spot...]]></description>
      <content:encoded><![CDATA[The <a href="https://www.microsoft.com/en-us/ignite">2018 Microsoft Ignite Florida </a>event is fast approaching, so now is the time to secure your spot at one of the pre-day sessions. For those wanting to go deep on Windows 10 Modern Management and Mobile Device Management through Microsoft Intune, I recommend you attend the pre-day session "<a href="https://www.microsoft.com/en-us/ignite/agenda#predayworkshops">Modern Management for a Modern World - a technical deep dive into modern device management made easy with Microsoft Intune" </a>This session will be delivered by technical program managers from Microsoft's Customer Acceleration Team (CAT) who work directly with large complex customers so understand many of the scenarios that you are going through. This will be a highly interactive session so bring your devices and your questions and leave with the technical knowledge to allow you to be successful. I look forward to seeing you there!!!

<a href="https://www.microsoft.com/en-us/ignite/agenda"><img width="698" height="212" class="alignnone wp-image-5235" alt="" src="https://msdnshared.blob.core.windows.net/media/2018/05/Ignitehome-1024x311.png" /></a>
<h3><a href="https://www.microsoft.com/en-us/ignite/agenda#predayworkshops">Modern Management for a Modern World - A technical deep dive into modern device management made easy with Microsoft Intune</a></h3>
<p class="c-paragraph-3 x-hidden-focus">Learn how to configure an end-to-end deployment of Microsoft Intune. This session will be delivered by technical Program Managers who will share real world scenarios learnt from customer deployments. In this session you will learn how to deploy, manage and secure your Windows 10, iOS, Android and OSX devices from the cloud; how to control access to you corporate resources using Azure Active Directory Conditional Access; How to implement a Data Loss Prevention strategy on these devices and secure your corporate data, and how Microsoft Graph is simplifying IT operations. This is a deep dive session and includes demos of the latest innovations. Please bring a Windows 10 and an iOS/Android device and follow the instructors as they step you through common user scenarios. Share your learnings during our Q/A session and have Microsoft Program Managers help you be successful.</p>
<p class="c-paragraph-3">We’ll be giving away a Surface Laptop to one lucky attendee, so be sure to sign-up!</p>
<p class="c-paragraph-3 x-hidden-focus">Add this Pre-Day Workshop to your registration for $500. Visit the Microsoft Ignite registration website and sign in to your registration record to select your Pre-Day Workshop!</p>
&nbsp;]]></content:encoded>
    </item>
    <item>
      <title>Apply Tags to Azure Resources based on Resource Group tags via PowerShell</title>
      <link>https://docs.microsoft.com/archive/blogs/configmgrdogs/apply-tags-to-azure-resources-based-on-resource-group-tags-via-powershell</link>
      <pubDate>Wed, 14 Feb 2018 03:26:39 GMT</pubDate>
      <dc:creator><![CDATA[George Smpyrakis]]></dc:creator>
      <guid
        isPermaLink="false">https://blogs.technet.microsoft.com/configmgrdogs/?p=5205</guid>
      <description><![CDATA[Hi everyone, its been a while since my last post and the main reason is that I now work on Azure...]]></description>
      <content:encoded><![CDATA[<p><br></p><p>Hi everyone, its been a while since my last post and the main reason is that I now work on Azure with customers these days. Boooo I hear all the ConfigMgr fans say. I know, I know I'm still a fan of CM myself.</p><p>Today’s blog is sharing with you a PowerShell script that I wrote for one of my customers that apply’s Tags to all the Resources in a Resource Group, based on the Tags’s applied to that Resource Group.</p><p>The scenario here is that in this particular case billing was being charged by the Tag’s applied to each resource. The issue my customer had was</p><p>1)Tags for Resources are not inherited by default from their Resource Group</p><p>2)Some of their processes at this point in time meant there was no way for them to ensure the correct Tag’s were applied to each resource.</p><p>3)They needed to ensure that if somebody has applied a Tag not for billing that it doesn’t disappear. As an example <strong><strong><strong>Environment : Development.</strong></strong></strong></p><p>So lets run through this scenario below</p><p>I have created two Resource Groups with Tags which we can see below</p><p><a href="https://msdnshared.blob.core.windows.net/media/2018/02/image215.png"><img width="879" height="189" title="image" alt="image" src="https://msdnshared.blob.core.windows.net/media/2018/02/image_thumb175.png" border="0"></a></p><p>In AzureDogs I have one Managed Disk with no Tags</p><p><a href="https://msdnshared.blob.core.windows.net/media/2018/02/image216.png"><img width="879" height="278" title="image" alt="image" src="https://msdnshared.blob.core.windows.net/media/2018/02/image_thumb176.png" border="0"></a></p><p>In ConfigMgrDogs I have two Managed Disks one with a single Tag&nbsp; Environment : Production, the other with no Tags</p><p><a href="https://msdnshared.blob.core.windows.net/media/2018/02/image217.png"><img width="879" height="353" title="image" alt="image" src="https://msdnshared.blob.core.windows.net/media/2018/02/image_thumb177.png" border="0"></a></p><p>The script should run through each resource and save the non billing tags and apply the Resource Group tags.</p><p>Here is a link to the script on <a href="https://github.com/sympa18/CheckandApplyTags">GitHub</a>. Feel free to clone this and make any improvements. This can easily be tweaked and uploaded to Azure Automation and run on a nightly schedule.</p><p>Once the script is run we can see in my output that it has applied the appropriate Tags to each Resource</p><p><a href="https://msdnshared.blob.core.windows.net/media/2018/02/image218.png"><img width="879" height="270" title="image" alt="image" src="https://msdnshared.blob.core.windows.net/media/2018/02/image_thumb178.png" border="0"></a></p><p>When we look back in the portal we can see that our resources now have the billing tags and the OSDisk3 resource has also kept its original custom environment Tag.</p><p><a href="https://msdnshared.blob.core.windows.net/media/2018/02/image219.png"><img width="879" height="346" title="image" alt="image" src="https://msdnshared.blob.core.windows.net/media/2018/02/image_thumb179.png" border="0"></a></p><p><a href="https://msdnshared.blob.core.windows.net/media/2018/02/image220.png"><img width="879" height="285" title="image" alt="image" src="https://msdnshared.blob.core.windows.net/media/2018/02/image_thumb180.png" border="0"></a></p><p>I hope this helps you out. </p>]]></content:encoded>
    </item>
    <item>
      <title>Support Tip: Intune App Protection Requires Modern Authentication Enabled for Skype for Business</title>
      <link>https://docs.microsoft.com/archive/blogs/configmgrdogs/support-tip-intune-app-protection-requires-modern-authentication-enabled-for-skype-for-business</link>
      <pubDate>Thu, 11 Jan 2018 22:42:56 GMT</pubDate>
      <dc:creator><![CDATA[Matt Shadbolt [MSFT]]]></dc:creator>
      <guid
        isPermaLink="false">https://blogs.technet.microsoft.com/configmgrdogs/?p=5095</guid>
      <description><![CDATA[Posted over at...]]></description>
      <content:encoded><![CDATA[<div class="entry-content single">

Posted over at <a target="_blank" href="https://blogs.technet.microsoft.com/intunesupport/2018/01/11/support-tip-intune-app-protection-requires-modern-authentication-enabled-for-skype-for-business/" rel="noopener">https://blogs.technet.microsoft.com/intunesupport/2018/01/11/support-tip-intune-app-protection-requires-modern-authentication-enabled-for-skype-for-business/</a>

In May 2017, a Skype for Business Server 2015 Cumulative Update was released, enabling "Hybrid Modern Authentication" for Hybrid and On-Premises Skype for Business customers.

Modern Authentication allows customers to enable many modern security features, such as Azure Active Directory Conditional Access or multi-factor authentication. It also enables the Intune App Protection features for the Skype for Business iOS and Android apps.

Intune App Protection allows organizations to control Data Loss Prevention (DLP) settings for their Skype for Business users.

<a target="_blank" href="https://docs.microsoft.com/en-us/intune/app-protection-policy" rel="noopener">https://docs.microsoft.com/en-us/intune/app-protection-policy</a>

If you target the Skype for Business app with App Protection policies and Modern Auth is not enabled, your App Protection policies will not apply successfully.

To enable Hybrid Modern Auth, use the steps outlined in the following guide:

<a target="_blank" href="https://techcommunity.microsoft.com/t5/Skype-for-Business-Blog/Hybrid-Modern-Authentication-for-Skype-for-Business/ba-p/134751" rel="noopener">https://techcommunity.microsoft.com/t5/Skype-for-Business-Blog/Hybrid-Modern-Authentication-for-Skype-for-Business/ba-p/134751</a>

Once all prerequisites have been met and all steps have been completed, your organization can target their Skype for Business DLP policies and provide another layer of security for your mobile users.

</div>]]></content:encoded>
    </item>
    <item>
      <title>Android 7 (Nougat) Removes Remote Password Reset</title>
      <link>https://docs.microsoft.com/archive/blogs/configmgrdogs/android-7-nougat-removes-remote-password-reset</link>
      <pubDate>Tue, 31 Oct 2017 23:27:45 GMT</pubDate>
      <dc:creator><![CDATA[Matt Shadbolt [MSFT]]]></dc:creator>
      <guid
        isPermaLink="false">https://blogs.technet.microsoft.com/configmgrdogs/?p=5086</guid>
      <description><![CDATA[It’s fairly well known across the mobile/MDM industry that Google removed support for resetting an...]]></description>
      <content:encoded><![CDATA[It’s fairly well known across the mobile/MDM industry that Google removed support for resetting an Android 7 devices passcode/password from within a Device Administrator granted app.

But for whatever reason, Google has not documented this change particularly clearly.

So here it is!

For any Android Nougat device, the only way to reset a device password/passcode is to be physically on the device and logged in. This means that any MDM vendor can not send a remote password reset request to a device if a user forgets the set password. For any Android 7 device with a forgotten password, the only option is a factory reset.

For Microsoft Intune customers, we documented this new limitation a while ago

<a href="https://docs.microsoft.com/en-us/intune/device-passcode-reset" title="https://docs.microsoft.com/en-us/intune/device-passcode-reset">https://docs.microsoft.com/en-us/intune/device-passcode-reset</a> and <a href="https://docs.microsoft.com/en-us/intune-user-help/reset-your-passcode-cpwebsite" title="https://docs.microsoft.com/en-us/intune-user-help/reset-your-passcode-cpwebsite">https://docs.microsoft.com/en-us/intune-user-help/reset-your-passcode-cpwebsite</a>

This limitation is true for both Intune on Azure and Configuration Manager Hybrid scenarios, and is a limitation enforced by Google <strong>not</strong> Microsoft (or any other MDM vendor). All down-level Android devices (&lt;7) should still have this function available.

And just for further reference, Google has documented this in the Android developer API docs.

<a href="https://developer.android.com/reference/android/app/admin/DevicePolicyManager.html" title="https://developer.android.com/reference/android/app/admin/DevicePolicyManager.html">https://developer.android.com/reference/android/app/admin/DevicePolicyManager.html</a>

The API is <strong>resetPassword</strong>, and the relevant note is<strong>:</strong>
<blockquote>Note: This API has been limited as of N for device admins that are not device owner and not profile owner. The password can now only be changed if there is currently no password set. Device owner and profile owner can still do this when user is unlocked and does not have a managed profile.</blockquote>
Matt Shadbolt

Senior Service Engineer
Enterprise Client and Mobility – Intune]]></content:encoded>
    </item>
    <item>
      <title>“Discovered apps” node in Microsoft Intune on Azure console</title>
      <link>https://docs.microsoft.com/archive/blogs/configmgrdogs/discovered-apps-node-in-microsoft-intune-on-azure-console</link>
      <pubDate>Mon, 17 Jul 2017 18:44:20 GMT</pubDate>
      <dc:creator><![CDATA[Matt Shadbolt [MSFT]]]></dc:creator>
      <guid
        isPermaLink="false">https://blogs.technet.microsoft.com/configmgrdogs/?p=5036</guid>
      <description><![CDATA[In the new Microsoft Intune on Azure administration console, there is a new “Discovered apps” node...]]></description>
      <content:encoded><![CDATA[In the new Microsoft Intune on Azure administration console, there is a new “Discovered apps” node available for each MDM enrolled device.

<img title="clip_image002" style="border: 0px currentcolor;padding-top: 0px;padding-right: 0px;padding-left: 0px" alt="clip_image002" src="https://msdnshared.blob.core.windows.net/media/2017/07/clip_image00222.jpg" class="" height="430" border="0" width="261" />

There’s been some recent confusion around what we should expect to see in here.

The <b>Discovered apps</b> node is a direct reflection of the devices discovered apps at the last Hardware Inventory time.

For devices with <b>Device Ownership</b> marked as <b>Corporate</b> this will be all apps installed on the device. For devices with <b>Device Ownership</b> marked as <b>Personal</b> this will be all apps installed via the Intune Company Portal or apps installed in a Required deployment.

The list of apps displayed here are only reflective of those apps installed at the last inventory scan. Please be aware that inventory is run every 7 days for mobile devices, so the Discovered apps list could potentially be up to seven days out of date.]]></content:encoded>
    </item>
    <item>
      <title>Intune on Azure Migration Blocker Guidance</title>
      <link>https://docs.microsoft.com/archive/blogs/configmgrdogs/intune-on-azure-migration-blocker-guidance</link>
      <pubDate>Thu, 18 May 2017 03:33:11 GMT</pubDate>
      <dc:creator><![CDATA[Matt Shadbolt [MSFT]]]></dc:creator>
      <guid
        isPermaLink="false">https://blogs.technet.microsoft.com/configmgrdogs/?p=5015</guid>
      <description><![CDATA[A couple of months back, the Intune Support team posted a list of technical blockers that may result...]]></description>
      <content:encoded><![CDATA[A couple of months back, the Intune Support team posted a list of technical blockers that may result in a delay for your Intune tenant to be migrated to the Intune on Azure portal.

<a href="https://blogs.technet.microsoft.com/intunesupport/2017/03/17/intune-migration-blockers-for-grouping-targeting/" title="https://blogs.technet.microsoft.com/intunesupport/2017/03/17/intune-migration-blockers-for-grouping-targeting/">https://blogs.technet.microsoft.com/intunesupport/2017/03/17/intune-migration-blockers-for-grouping-targeting/</a>

The blog post has been very popular, as many customers were not aware of configuration issues causing delays in migration.

We’ve also been notifying individual customers of configuration changes required to unblock their migration via the <a target="_blank" href="https://portal.office.com/adminportal/home#/MessageCenter">Office 365 Message Center</a>

<a href="https://msdnshared.blob.core.windows.net/media/2017/05/image297.png"><img title="image" alt="image" src="https://msdnshared.blob.core.windows.net/media/2017/05/image_thumb272.png" height="485" width="879" border="0" /></a>

To help customers resolve these issues and unblock their migration, I’ve posted seven technical guides for resolving migration blockers.

It’s important to note that these guides are intended to explain how a migration blocker occurs, and how to remove the blocking issue. The guides are not intended to provide guidance on how to redesign your grouping/targeting to achieve functionality caused by the blocking configuration.

I suggest you thoroughly review your grouping/targeting strategy before making any changes.

<a target="_blank" href="https://blogs.technet.microsoft.com/intunesupport/2017/05/18/deployments-to-ungrouped-users-and-devices-fix-your-intune-migration-configuration-issues/">1. Deployments to Ungrouped Users and Devices: Fix Your Intune Migration Configuration Issues</a>

<a target="_blank" href="https://blogs.technet.microsoft.com/intunesupport/2017/05/18/exclusion-clauses-in-groups-fix-your-intune-migration-configuration-issues/">2. Exclusion Clauses in Groups: Fix Your Intune Migration Configuration Issues</a>

<a target="_blank" href="https://blogs.technet.microsoft.com/intunesupport/2017/05/18/nested-groups-fix-your-intune-migration-configuration-issues/">3. Nested Groups: Fix Your Intune Migration Configuration Issues</a>

<a target="_blank" href="https://blogs.technet.microsoft.com/intunesupport/2017/05/18/the-is-manager-clause-fix-your-intune-migration-configuration-issues/">4. The Is Manager Clause: Fix Your Intune Migration Configuration Issues</a>

<a target="_blank" href="https://blogs.technet.microsoft.com/intunesupport/2017/05/18/conflicting-app-deployment-rules-fix-your-intune-migration-configuration-issues/">5. Conflicting App Deployment Rules: Fix Your Intune Migration Configuration Issues</a>

<a target="_blank" href="https://blogs.technet.microsoft.com/intunesupport/2017/05/18/upgrade-your-exchange-connector-for-intune-fix-your-intune-migration-configuration-issues/">6. Upgrade Your Exchange Connector For Intune: Fix Your Intune Migration Configuration Issues</a>

<a target="_blank" href="https://blogs.technet.microsoft.com/intunesupport/2017/05/18/enable-self-service-group-management-fix-your-intune-migration-configuration-issues/">7. Enable Self-Service Group Management: Fix Your Intune Migration Configuration Issues</a>

We hope you find these guides useful and enjoy the Intune on Azure experience once migrated.

Matt Shadbolt

Senior Service Engineer
Enterprise Client and Mobility – Intune]]></content:encoded>
    </item>
    <item>
      <title>Enabling BranchCache for Configuration Manager using Client Settings</title>
      <link>https://docs.microsoft.com/archive/blogs/configmgrdogs/enabling-branchcache-for-configuration-manager-using-client-settings</link>
      <pubDate>Sun, 14 May 2017 10:21:42 GMT</pubDate>
      <dc:creator><![CDATA[Scott Breen MSFT]]></dc:creator>
      <guid
        isPermaLink="false">https://blogs.technet.microsoft.com/configmgrdogs/?p=4966</guid>
      <description><![CDATA[Since Configuration Manager current branch, version 1606 it has been possible to enable BranchCache...]]></description>
      <content:encoded><![CDATA[Since Configuration Manager current branch, version 1606 it has been possible to enable BranchCache on clients using Client Settings. Previously, to enable BranchCache an administrator would need to configure BranchCache for clients using command line tools or Group Policy.

To use BranchCache with Configuration Manager, the following prerequisites must be met:
<ul>
 	<li>Distribution Point;
<ul>
 	<li>Cloud Distribution Point or Windows Server Distribution Point;</li>
 	<li>BranchCache enabled in properties (only required for Windows Server).</li>
</ul>
</li>
 	<li>Client
<ul>
 	<li>A <a href="https://docs.microsoft.com/en-us/windows-server/networking/branchcache/branchcache#a-namebkmkosaoperating-system-versions-for-branchcache">supported client Operating System</a> (yes, this includes Windows Professional SKUs);</li>
 	<li>BranchCache must be enabled in <strong>Distributed Mode</strong> on the client;</li>
 	<li>The appropriate firewall rules must be opened.</li>
</ul>
</li>
 	<li>Software Update, Application and Package Deployments must be configured with the option to <b>Allow clients to share content with other clients on the same subnet</b>.</li>
</ul>
This post explains how to enable BranchCache on the client using Client Settings, for any other information, see:
<ul>
 	<li><a href="https://docs.microsoft.com/en-us/sccm/core/plan-design/configs/support-for-windows-features-and-networks#a-namebkmkbranchcachea-branchcache">Support for Windows Features</a></li>
 	<li><a href="https://docs.microsoft.com/en-us/windows-server/networking/branchcache/branchcache#bkmk_what">What is BranchCache?</a></li>
</ul>
<h2>Enable BranchCache in Client Settings</h2>
To enable BranchCache on computers using Client Settings:
<ol>
 	<li>Open the<strong> Client Settings</strong> policy you want to apply to clients (it is recommended that a new policy be created to apply custom settings rather than editing the Default Client Settings policy)</li>
 	<li>Tick the box on the <strong>General</strong> tab to include <strong>Client Cache Settings</strong>

[caption id="attachment_4975" align="aligncenter" width="452"]<a href="https://msdnshared.blob.core.windows.net/media/2017/05/Create-Client-Settings.png"><img width="452" height="350" class="wp-image-4975 size-mediumlarge" alt="Create Custom Client Settings" src="https://msdnshared.blob.core.windows.net/media/2017/05/Create-Client-Settings-452x350.png" /></a> Create Custom Client Settings[/caption]</li>
 	<li>Select the <strong>Client Cache Settings</strong> tab
<ul>
 	<li>Change <b>Configure BranchCache</b> to <b>Yes</b></li>
 	<li>Change <b>Enable BranchCache</b> to <b>Yes</b></li>
</ul>
[caption id="attachment_4985" align="aligncenter" width="452"]<a href="https://msdnshared.blob.core.windows.net/media/2017/05/Edit-Client-Settings.png"><img width="452" height="350" class="wp-image-4985 size-mediumlarge" alt="Edit Client Cache Settings" src="https://msdnshared.blob.core.windows.net/media/2017/05/Edit-Client-Settings-452x350.png" /></a> Edit Client Cache Settings[/caption]</li>
 	<li>Deploy the settings (<a href="https://docs.microsoft.com/en-us/sccm/core/clients/deploy/configure-client-settings#create-and-deploy-custom-client-settings">See Create and Deploy Custom Client Settings</a> for more information).</li>
</ol>
<strong>NOTE</strong>

Unlike Group Policy, if you want to disable BranchCache you must explicitly disable it using Client Settings or an alternate method. Simply removing the client setting to enable it won't revert it to it's previous state. In addition, while the feature will add the firewall rules to Windows Firewall, it will not remove them when the feature is disabled.
<h2>Verify BranchCache is Enabled</h2>
After the new client settings are retrieved and updated on clients, you will notice BranchCache is enabled.
<h3>Netsh</h3>
From a command prompt, run netsh to confirm that BranchCache is now running in <strong>Distributed Caching</strong> mode and the cache size is configured as per the <strong>Client Settings</strong>.

[code]netsh branchcache show status all[/code]

[caption id="attachment_4995" align="aligncenter" width="479"]<a href="https://msdnshared.blob.core.windows.net/media/2017/05/Confirm-BranchCache-Enabled.png"><img width="479" height="350" class="wp-image-4995 size-mediumlarge" alt="Confirm BranchCache Enabled" src="https://msdnshared.blob.core.windows.net/media/2017/05/Confirm-BranchCache-Enabled-479x350.png" /></a> Confirm BranchCache Enabled[/caption]
<h3>CAS.log</h3>
You will see the following entries in CAS.log:

[code]
Enabling BranchCache.	ContentAccess	13/05/2017 6:45:30 PM	2600 (0x0A28)
EnablePeerDistribution: Successfully enabled PeerDistribution	ContentAccess	13/05/2017 6:45:32 PM	2600 (0x0A28)
Setting BranchCache size to 10 of disk	ContentAccess	13/05/2017 6:45:32 PM	2600 (0x0A28)
SetCacheSize: Successfully set cache size	ContentAccess	13/05/2017 6:45:32 PM	2600 (0x0A28)
[/code]

<h3>Firewall Rules</h3>
Windows Firewall rules will be configured as per the table below:
<table style="font-size: x-small">
<tbody>
<tr>
<th>Name</th>
<th>Group</th>
<th>Profile</th>
<th>Enabled</th>
<th>Action</th>
<th>Override</th>
<th>Program</th>
<th>Local Address</th>
<th>Remote Address</th>
<th>Protocol</th>
<th>Local Port</th>
<th>Remote Port</th>
</tr>
<tr>
<td>BranchCache Content Retrieval (HTTP-In)</td>
<td>BranchCache - Content Retrieval (Uses HTTP)</td>
<td>All</td>
<td>No</td>
<td>Allow</td>
<td>No</td>
<td>SYSTEM</td>
<td>Any</td>
<td>Any</td>
<td>TCP</td>
<td>80</td>
<td>Any</td>
</tr>
<tr>
<td>BranchCache Content Retrieval (HTTP-In)</td>
<td>BranchCache - Content Retrieval (Uses HTTP)</td>
<td>Domain,Private</td>
<td>Yes</td>
<td>Allow</td>
<td>No</td>
<td>SYSTEM</td>
<td>Any</td>
<td>Any</td>
<td>TCP</td>
<td>80</td>
<td>Any</td>
</tr>
<tr>
<td>BranchCache Hosted Cache Server (HTTP-In)</td>
<td>BranchCache - Hosted Cache Server (Uses HTTPS)</td>
<td>All</td>
<td>No</td>
<td>Allow</td>
<td>No</td>
<td>SYSTEM</td>
<td>Any</td>
<td>Any</td>
<td>TCP</td>
<td>80,443</td>
<td>Any</td>
</tr>
<tr>
<td>BranchCache Peer Discovery (WSD-In)</td>
<td>BranchCache - Peer Discovery (Uses WSD)</td>
<td>All</td>
<td>No</td>
<td>Allow</td>
<td>No</td>
<td>%SYSTEMROOT%\system32\svchost.exe</td>
<td>Any</td>
<td>Local subnet</td>
<td>UDP</td>
<td>3702</td>
<td>Any</td>
</tr>
<tr>
<td>BranchCache Peer Discovery (WSD-In)</td>
<td>BranchCache - Peer Discovery (Uses WSD)</td>
<td>Domain,Private</td>
<td>Yes</td>
<td>Allow</td>
<td>No</td>
<td>%SYSTEMROOT%\system32\svchost.exe</td>
<td>Any</td>
<td>Local subnet</td>
<td>UDP</td>
<td>3702</td>
<td>Any</td>
</tr>
</tbody>
</table>]]></content:encoded>
    </item>
    <item>
      <title>Getting Started with Microsoft Intune for Education</title>
      <link>https://docs.microsoft.com/archive/blogs/configmgrdogs/getting-started-with-microsoft-intune-for-education</link>
      <pubDate>Wed, 03 May 2017 20:22:50 GMT</pubDate>
      <dc:creator><![CDATA[Matt Shadbolt [MSFT]]]></dc:creator>
      <guid
        isPermaLink="false">https://blogs.technet.microsoft.com/configmgrdogs/?p=4955</guid>
      <description><![CDATA[HUGE announcements in the Education space yesterday, with the very exciting release of Microsoft...]]></description>
      <content:encoded><![CDATA[HUGE announcements in the Education space yesterday, with the very exciting release of Microsoft Intune for Education.

Intune for Education offers a streamlined management UI for IT Pros in Education, as well as integration with your schools <strong>Student Information System (SIS)</strong> to create/manage your groups.

Getting started is quick and easy.

First, browse to <a href="https://intuneeducation.portal.azure.com">https://intuneeducation.portal.azure.com</a> which is the custom portal endpoint for managing Intune for Education.

Once logged in, you’ll see a UI like this

<a href="https://msdnshared.blob.core.windows.net/media/2017/05/image41.png"><img title="image" alt="image" src="https://msdnshared.blob.core.windows.net/media/2017/05/image_thumb44.png" width="879" height="392" border="0" /></a>

Click the <strong>Launch Express Configuration</strong> to get started quickly. You’ll be prompted to <strong><strong>Get Started</strong></strong>

<a href="https://msdnshared.blob.core.windows.net/media/2017/05/image42.png"><img title="image" alt="image" src="https://msdnshared.blob.core.windows.net/media/2017/05/image_thumb45.png" width="645" height="592" border="0" /></a>

If you’ve previously setup your AAD tenant to use Windows Store for Business, Intune will look to pull in the apps you’ve assigned &amp; purchased previously.

If you have a Student Information System, you’ll now be prompted to configure the <strong>School Data Sync</strong>. To setup the School Data Sync service, visit <a href="https://sds.microsoft.com/" title="https://sds.microsoft.com/">https://sds.microsoft.com/</a>

Now select the group you’d like to first target with policies and apps.

<a href="https://msdnshared.blob.core.windows.net/media/2017/05/image43.png"><img title="image" alt="image" src="https://msdnshared.blob.core.windows.net/media/2017/05/image_thumb46.png" width="550" height="420" border="0" /></a>

Select some apps to deploy

<a href="https://msdnshared.blob.core.windows.net/media/2017/05/image44.png"><img title="image" alt="image" src="https://msdnshared.blob.core.windows.net/media/2017/05/image_thumb47.png" width="879" height="740" border="0" /></a>

Either leave the preconfigured settings, or customize them to your situation

<a href="https://msdnshared.blob.core.windows.net/media/2017/05/image45.png"><img title="image" alt="image" src="https://msdnshared.blob.core.windows.net/media/2017/05/image_thumb48.png" width="879" height="387" border="0" /></a>

And your done!

<a href="https://msdnshared.blob.core.windows.net/media/2017/05/image46.png"><img title="image" alt="image" src="https://msdnshared.blob.core.windows.net/media/2017/05/image_thumb49.png" width="879" height="198" border="0" /></a>

Now any user in the <strong>Grade 6 Students</strong> group who enrols their Windows 10 device will receive the policies and apps you’ve deployed.<strong> </strong>

From the Azure Portal view, we can see:

A <strong>Windows 10</strong> settings profile has been created and deployed

<a href="https://msdnshared.blob.core.windows.net/media/2017/05/image47.png"><img title="image" alt="image" src="https://msdnshared.blob.core.windows.net/media/2017/05/image_thumb50.png" width="877" height="107" border="0" /></a>

A <strong>Web App</strong> for Khan Academy and Mathletics has been created and deployed

<a href="https://msdnshared.blob.core.windows.net/media/2017/05/image48.png"><img title="image" alt="image" src="https://msdnshared.blob.core.windows.net/media/2017/05/image_thumb51.png" width="878" height="83" border="0" /></a>

So within 5 minutes you’ve created and deployed some policies and apps!

I hope you find the setup as quick and easy as I did. Until next time!

Matt Shadbolt

Senior Service Engineer
Enterprise Client and Mobility – Intune]]></content:encoded>
    </item>
  </channel>
</rss>