Co-Management

Ranjithkumar Duraisamy 226 Reputation points
2023-02-02T12:32:36.9033333+00:00

Hello Expertise,

Please advise if the path we're proceeding is correct or any changes required?

Current Infrastructure:

Laptops and AVD Devices (Hybrid Joined)

All workloads are with SCCM.

Endpoints are already enrolled in Intune/AD.

Future Infrastructure:

Devices provisioned through Intune/Autopilot (AAD Joined)

Windows Hello for Business for password less authentication using Cloud Trust

Windows Update for Business to manage MSFT & Driver updates.

Microsoft Intune
Microsoft Intune
A Microsoft cloud-based management solution that offers mobile device management, mobile application management, and PC management capabilities.
4,322 questions
Microsoft Configuration Manager
0 comments No comments
{count} votes

5 answers

Sort by: Most helpful
  1. Rahul Jindal [MVP] 9,141 Reputation points MVP
    2023-02-02T22:46:38.1233333+00:00

    Sorry, is there a question here?

    0 comments No comments

  2. Crystal-MSFT 42,956 Reputation points Microsoft Vendor
    2023-02-03T02:19:40.8+00:00

    @Ranjithkumar Duraisamy, Thanks for posting in Q&A.

    From your description, I know we are using co-management. And now the workloads are with SCCM. If you want to migrate to cloud in the future days, you can switch the workloads from SCCM to Intune.

    Meanwhile, for any new devices that only need to join into Azure AD, Autopilot is a good option to pre-configure new devices:

    https://learn.microsoft.com/en-us/mem/autopilot/windows-autopilot

    For windows Hello for business and windows update, here are links list what we can manage in Intune:

    https://learn.microsoft.com/en-us/mem/intune/protect/identity-protection-windows-settings

    https://learn.microsoft.com/en-us/mem/intune/protect/windows-10-update-rings

    https://learn.microsoft.com/en-us/mem/intune/protect/windows-10-feature-updates

    https://learn.microsoft.com/en-us/mem/intune/protect/windows-10-expedite-updates

    Hope it can help.


    If the answer is helpful, please click "Accept Answer" and kindly upvote it. If you have extra questions about this answer, please click "Comment".

    Note: Please follow the steps in our documentation to enable e-mail notifications if you want to receive the related email notification for this thread.


  3. Ranjithkumar Duraisamy 226 Reputation points
    2023-02-03T02:49:27.0466667+00:00

    @Rahul Jindal [MVP] @Crystal-MSFT
    It's more of a strategy/path check to ensure we're approaching on right path but here's the actual question.
    If my understanding is correct, all the cloud joined devices are applied with #WHFB policy by default i.e., during enrollment/tenant wide.

    Do we still need to apply dedicated policy for #WFHB?
    do we have any recommendations from MSFT to follow?
    If yes, which one is the appropriate one? I.e., Configuration policy or Baseline etc.

    Any idea how #WFHB enrollment policy and #WHFB configuration policy would work together?

    sorry about more questions but hope this should help lot of people in #WHFB.


  4. Rahul Jindal [MVP] 9,141 Reputation points MVP
    2023-02-09T21:44:42.59+00:00

    There are different methods to configure WHfB and each serve a different purpose. I personally like to have control over the configuration and do so by leveraging device identity protection profile. I disable everywhere else.

    0 comments No comments

  5. Ranjithkumar Duraisamy 226 Reputation points
    2023-02-09T23:49:22.05+00:00

    Thanks for your response @Rahul Jindal [MVP] . Btw, do you think the same would be an right option in my scenarios too?. I.e., Use configuration profile/identity protection for 1. Hybrid Joined pcs and 2. Cloud Native Pcs. thinking of adopting to cloud Kerberos trust deployment model. Thank you for your appropriate guidance in advance.

    0 comments No comments