Implementing and Supporting Windows Intune

Similar documents
Windows Intune Trial Guide Getting the most from your Windows Intune trial. Simplify PC management. Amplify productivity.

Integrate Sophos Enterprise Console. EventTracker v8.x and above

Integrate Bluecoat Content Analysis. EventTracker v9.x and above

Microsoft Office Communicator 2007 R2 Getting Started Guide. Published: December 2008

Integrate Palo Alto Traps. EventTracker v8.x and above

Enterprise 3.4 RC1. Managing Alfresco Content from within Microsoft Office

KwikTag v4.5.0 Release Notes

Integrate Microsoft Antimalware. EventTracker v8.x and above

Integrate Veeam Backup and Replication. EventTracker v9.x and above

Integrate Malwarebytes EventTracker Enterprise

Windows Server 2012: Manageability and Automation. Module 1: Multi-Machine Management Experience

FileWay User s Guide. Version 3

Integrate Dell FORCE10 Switch

Port Configuration. Configure Port of EventTracker Website

Integrate Viper business antivirus EventTracker Enterprise

Integrate Barracuda Spam Firewall

KwikTag v4.6.4 Release Notes

Integrate Microsoft Office 365. EventTracker v8.x and above

Using the Orchestration Console in System Center 2012 R2 Orchestrator

Installation Guide. EventTracker Enterprise. Install Guide Centre Park Drive Publication Date: Aug 03, U.S. Toll Free:

Speed Lab 2! System Center 2012 R2: Introduction to Automation, Service & Application Management

Receive and Forward syslog events through EventTracker Agent. EventTracker v9.0

KwikTag v4.5.1 Release Notes

Windows Server 2012 Immersion Experience Enabling Secure Remote Users with RemoteApp, DirectAccess, and Dynamic Access Control

Integrating Barracuda SSL VPN

Integrate Microsoft ATP. EventTracker v8.x and above

Widgets for SAP BusinessObjects Business Intelligence Platform User Guide SAP BusinessObjects Business Intelligence platform 4.1 Support Package 2

CHECK PROCESSING. A Select Product of Cougar Mountain Software

Getting Started with Tally.Developer 9 Alpha

RMH PRINT LABEL WIZARD

Integrate Symantec Messaging Gateway. EventTracker v9.x and above

6/29/ :38 AM 1

Installation guide. WebChick. Installation guide for use on local PC

How to Use DTM for Windows Vista System Logo Testing: A Step-by-Step Guide

Lab Answer Key for Module 1: Creating Databases and Database Files

TIBCO Managed File Transfer Internet Server Transfer and File Share Clients User's Guide

Server Installation Guide

Integrating Imperva SecureSphere

Microsoft Office Groove Server Groove Manager. Domain Administrator s Guide

Integrate TippingPoint EventTracker Enterprise

What s New in BID2WIN Service Pack 4

Pipeliner CRM Arithmetica Guide Importing Accounts & Contacts Pipelinersales Inc.

Client Portal Training Manual

Integrate IIS SMTP server. EventTracker v8.x and above

Integrate Trend Micro InterScan Web Security

RMH ADVANCED ITEM AND INVENTORY WIZARDS

Microsoft Dynamics GP. Extender User s Guide Release 9.0

Getting Started The Outlook Web Access Window

Integrate Sophos Appliance. EventTracker v8.x and above

x10data Smart Client 6.5 for Windows Mobile Installation Guide

Microsoft Exchange Server SMTPDiag

SharePoint 2010 Instructions for Users

Integrate Windows PowerShell

Microsoft Exchange 2000 Server Mailbox Folder Structure. Technical Paper

RMH RESOURCE EDITOR USER GUIDE

Integrating Cyberoam UTM

Installation Guide Install Guide Centre Park Drive Publication Date: Feb 11, 2010

SECURE FILE TRANSFER PROTOCOL. EventTracker v8.x and above

Integrating Microsoft Forefront Threat Management Gateway (TMG)

How To Embed EventTracker Widget to an External Site

Integrate Akamai Web Application Firewall EventTracker v8.x and above

Integrating Terminal Services Gateway EventTracker Enterprise

SecureTransport Version May Web Client User Guide

8815 Centre Park Drive Columbia MD Publication Date: Dec 04, 2014

Integrate NGINX. EventTracker v8.x and above

Integrate Microsoft Hyper-V Server

Integrate Salesforce. EventTracker v8.x and above

Mobile On the Go (OTG) Server

Outlook: Web Access. Outlook: Web Access AIS Vienna

Integrate Sophos UTM EventTracker v7.x

User Guide. BlackBerry Workspaces for Windows. Version 5.5

RMH LABEL DESIGNER. Retail Management Hero (RMH)

Integrate F5 BIG-IP LTM

Integrate Fortinet Firewall. EventTracker v8.x and above

Export Metadata. Learning Objectives. In this Job Aid, you will learn how to export metadata: 1 For a location 3 2 From search results 7

What s New in BUILD2WIN Version 3.2

Hands-On-Labs for. Microsoft Identity Integration Server Microsoft Identity Integration Server 2003 Hand-On-Labs

Sophos Anti-Virus standalone startup guide. For Windows and Mac OS X

HOTPin Software Instructions. Mac Client

Module 3-1: Building with DIRS and SOURCES

Business Intelligence Launch Pad User Guide SAP BusinessObjects Business Intelligence Platform 4.1 Support Package 1

SMB Live. Modernize with Hybrid Cloud. Lab 1: Exploring Windows Server 2012 R2 & Hyper-V

RMH GENERAL CONFIGURATION

Exclaimer Mail Archiver

Integrating LOGbinder SP EventTracker v7.x

Mission Control for the Microsoft Cloud. 5nine Cloud Security. Web Portal Version 12.o. Getting Started Guide

Deep Dive into Apps for Office in Outlook

Integrate pfsense EventTracker Enterprise

Microsoft Dynamics GP. Extender User s Guide

Microsoft Forefront Client Security

Integrate Cb Defense. EventTracker v8.x and above

Implementing and Supporting Windows Intune

My Publications Quick Start Guide

Configure Alerts. EventTracker v6.x. EventTracker 8815 Centre Park Drive Columbia MD Publication Date: Jun 12, 2009

Integrate Aventail SSL VPN

Monitoring SharePoint 2007/ 2010/ 2013 Server using EventTracker

Reporting Guide - V8.1

IT Essentials v6.0 Windows 10 Software Labs

Table of Contents MicroEdge, LLC. All rights reserved.

User Guide. Product: GreenFolders. Version: 3.8

Transcription:

Implementing and Supporting Windows Intune Lab 4: Managing System Services Lab Manual

Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the example companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted herein are fictitious, and no association with any real company, organization, product, domain name, e-mail address, logo, person, place or event is intended or should be inferred. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property. 2011 Microsoft Corporation. All rights reserved. Microsoft is either a registered trademark or trademark of Microsoft Corporation in the United States and/or other countries. The names of actual companies and products mentioned herein may be the trademarks of their respective owners.

Implementing and Supporting Windows Intune Lab Manual Table of Contents Lab 4: Managing System Services... 1 Lab Objectives... 1 Exercise 1: Generating Reports... 1 Task 1: Create an ad-hoc hardware report... 1 Task 2: Respond to a malware alert... 2 Task 3: Generate the predefined software report... 4 Exercise 2: Customizing Reports... 5 Task 1: Customize software reports... 5 Exercise 3: Configuring E-Mail Notifications... 6 Task 1: Configure a remote assistance alert notification... 6 Task 2: Test the alert notification rule... 7 Lab Summary... 7 i

Lab 4: Managing System Services Lab Objectives The objectives of this lab are to: Create and review ad-hoc and predefined reports in the Windows Intune administrator console. Customize a predefined report to meet the needs of your customers. Configure e-mail notifications. This lab will take approximately 45 minutes to complete. Exercise 1: Generating Reports In this exercise, you will create two ad-hoc hardware reports and export one of them as a.csv file. One of the reports is a hardware identity report and the other is a critical updates report. You will export the hardware identity report as a.csv file and the critical updates report as an HTML file. In the final task, you will generate a preconfigured software report, drill down into the report, and export the report to an HTML file. Task 1: Create an ad-hoc hardware report 1. Open a browser, log on to the Windows Intune multi-account console, and then select account 1. 2. In the workspace shortcuts pane, click Computers, and then click All Computers. 3. In the Filters list, click Hardware classification. If you sort this list by Model, you can use that information to help you determine which computers need hardware upgrades to support Windows 7. 4. In the Filters list, click Hardware identity. 5. In the list of computers, click the Operating System column heading. You can use such reports when working with your customers to help them upgrade computers running Windows XP and Windows Vista to Windows 7. 6. On the administrator console taskbar, click the Export List button. Page 1

Figure 1: The Export List button 7. In the Export Dialog dialog box, in the Export format list, click.csv File, and then click Export. 8. In the Save As dialog box, select a folder in which to store the.csv file, in the File name box, type a name for the ad-hoc report, and then click Save. 9. In the Export Dialog dialog box, click Close. 10. Click Start, click Computer, and then navigate to the folder where you stored the.csv file. 11. In the folder, right-click the.csv file that you created, and then click Open With. 12. In the Open With dialog box, double-click Notepad. If Microsoft Office Excel is installed on your computer and you double-click the.csv file, it will open in Office Excel. 13. Review the contents of the.csv file, and then close Notepad. Not only does the file display the list of hardware, but it also contains the filter that you used to generate the ad-hoc report. Task 2: Respond to a malware alert 1. Switch to the virtual machine (VM), and then on the taskbar, click the Internet Explorer icon. 2. In the address bar, type www.eicar.org and then press ENTER. 3. Click Anti-Malware Testfile. 4. On the The Anti-Virus or Anti-Malware test file page, scroll to the Download area using the standard protocol http table, and then click eicar_com.zip. Page 2

Immediately after a Windows Intune Endpoint Protection Attention dialog box appears, a File Download dialog box appears. 5. In the File Download dialog box, click Cancel. 6. In the Windows Intune Endpoint Protection dialog box, click Show details. 7. In the Windows Intune Endpoint Protection Alert dialog box, check whether the program has already automatically removed the potential threat. If it has not, click Clean computer, and then after the computer has been cleaned, click Close. 8. Switch to the Windows Intune administrator console. 9. In the workspace shortcuts pane, click Alerts, and then click Endpoint Protection. It may take a few minutes for the malware alerts to appear in the Alerts list and you may need to refresh your browser to see them. When they appear, there should be two malware alerts. The first is titled Some Computers Have Recently Resolved Malware and the second is titled Malware Seen For First Time. 10. Switch to the VM. 11. Close Windows Internet Explorer, and then switch to the Windows Intune administrator console. 12. Refresh the browser to review whether the alerts have changed. The Some Computers Have Follow-up Actions alert is replaced by the Some Computers Have Recently Resolved Malware alert. 13. Click the Some Computers Have Recently Resolved Malware alert, review the Status and Details sections, and then click All Alerts. 14. Click the Malware Seen For First Time alert, review the Status and Details sections, and then click All Alerts. 15. Click Export List to capture all of the alerts before you close them. 16. In the Export Dialog dialog box, in the Export format list, verify that.csv File is selected, and then click Export. 17. In the Save As dialog box, browse to a folder location. 18. In the File name box, type Malware Alert Report 1 and then click Save. 19. In the Export Dialog dialog box, click Close. 20. On the Alerts list, select all of the alerts by pressing CTRL and clicking each, and then click Close Alert. Page 3

Task 3: Generate the predefined software report 1. In the workspace shortcuts pane, click Reports, and then click Software reports. 2. In the lower-right corner of the Software Reports page, click View Report. 3. On the Software Details page, expand Microsoft Office Professional Plus 2010, and then expand Computers. This enables you to see all of the computers in the Windows Intune account that have Microsoft Office Professional Plus 2010 installed. 4. Collapse Microsoft Office Professional Plus 2010. 5. On the Software Details page, click the Category column heading to sort the software categories alphabetically. 6. In the Table of Contents pane, click Criteria. 7. Review the criteria that was used to generate the software report, and then click Software Details. 8. Right-click the report and note that the word Silverlight appears in the pop-up box. All reports are generated as Microsoft Silverlight pages. To obtain the data and store it, you must export the report as detailed in the following steps. 9. On the Report Viewer taskbar, click Export. 10. In the Export Dialog dialog box, in the Export format list, click.html File, clear the Export summary data only check box, and then click Export. 11. In the Save As dialog box, select a folder in which to store the.html file, in the File name box, type a name for the software report, and then click Save. 12. In the Export Dialog dialog box, click Close. 13. Click Start, click Computer, and then navigate to the folder where you stored the.html file. 14. In the folder, double-click the.html file that you created and review its contents. The file displays all of the data available from the software report, including all computer information associated with each piece of software. If you left the Export summary data only check box selected in step 10, Windows Intune exports the list of installed software without computer information. Page 4

Also, note that when you export a predefined report, Windows Intune does not use any column sorting that you may have performed on the live report. 15. Close the Internet Explorer tab. Exercise 2: Customizing Reports In this exercise, you will customize the software report to display information about computers in specified groups and in specified software categories. Task 1: Customize software reports 1. On the Software Reports page, in the Criteria section, under Select the computer groups, click Add. 2. In the Select Computer Groups dialog box, clear the All Computers check box, select the check boxes for several groups, and then click OK. 3. Under Select the categories, click Add. 4. In the Select Category dialog box, click Select from the following list, select the Operating Systems and Components and Office Suites and Productivity check boxes, and then click OK. 5. On the Software Reports page, click View Report. 6. On the Software Details page, expand a software name, and then expand Computers. 7. In the Table of Contents pane, click Criteria. 8. Review the criteria used to generate the software report, and then click Software Details. The report nodes that you expanded in step 6 remain expanded after you return to the Software Details page. 9. On the Software Details page, click the Category column heading to sort the software categories alphabetically. 10. On the Report Viewer taskbar, click Export. 11. In the Export Dialog dialog box, in the Export format list, click.csv File, verify that the Export summary data only check box is selected, and then click Export. 12. In the Save As dialog box, select a folder in which to store the.csv file, in the File name box, type a name for the software report, and then click Save. 13. In the Export Dialog dialog box, click Close. 14. Click Start, click Computer, and then navigate to the folder where you stored the.csv file. Page 5

15. In the folder, right-click the.csv file that you created, point to Open With, and then click Notepad. If Office Excel is installed on your computer and you double-click the.csv file, it will open in Office Excel. 16. Review the contents of the.csv file, and then close Notepad. Exercise 3: Configuring E-Mail Notifications In this exercise, you will configure an e-mail recipient and notification rule for remote assistance requests on the primary Windows Intune account that you have used throughout the labs. Configuring an e-mail recipient and associating the e-mail address with a notification rule does not grant the recipient any rights to access the Windows Intune administrator console. It simply configures when to send the recipient an e-mail message when an alert is generated. You configure e-mail notifications to go to individuals who are not Windows Intune system administrators. These can be employees of your customers or other individuals who should be notified when critical alerts are raised against a particular Windows Intune account. Task 1: Configure a remote assistance alert notification 1. In the workspace shortcuts pane, click Administration, expand Alerts and Notifications, and then click Recipients. 2. On the Recipients page, click Add. 3. In the Add E-Mail Recipient dialog box, in the Name box, type Windows Intune Manager 4. In the E-mail address and Confirm e-mail address boxes, type the e-mail address for the Windows Live ID that the instructor provided for this exercise, and then click OK. 5. In the Administration navigation pane, click Notification Rules. 6. On the Notification Rules page, click Remote Assistance Requests, and then click Select Recipients. 7. In the Select Recipients dialog box, select the Windows Intune Manager check box, and then click OK. Page 6

Task 2: Test the alert notification rule 1. Switch to the VM, and then on the desktop, double-click the Windows Intune Center shortcut. 2. In the Windows Intune Center window, click Request remote assistance from your system administrator. 3. Switch to Internet Explorer on the host computer, and then in the address bar, type www.msn.com 4. On the MSN home page, click Hotmail, and then click Sign out. 5. On the MSN home page, click Sign in. 6. On the sign in page, in the Windows Live ID box, type the e-mail address that you used in Task 1, in the Password box, type the password that the instructor gave you, clear the Remember me check box, and then click Sign in. You may need to click Sign in with a different Windows Live ID to enable you sign in with a different Windows Live ID. 7. On the Windows Live home page, click Hotmail. 8. In the Inbox, click the Critical Alert Remote Assistance Session Request e-mail message and review its contents. You may need to wait for a few minutes for the e-mail message to arrive. The message includes the account with which the alert is associated, the computer source that generated the alert, and the type of alert. It also provides a description of the alert that includes the user who generated the remote assistance request. 9. Click sign out. 10. Close all browser windows. 11. Switch to the VM and close all open windows. 12. In the Windows Intune Center dialog box, click Yes. Lab Summary In this lab, you performed the following exercises: Generating Reports Customizing Reports Configuring E-Mail Notifications Page 7