Difference between revisions of "πŸ“˜ Core Management"

From Notes_Wiki
(Created page with "= πŸ“˜ Core Management = == πŸ”Ή How to create users in Microsoft Entra ID (Azure AD) == === Steps to Create a Cloud-Only User === # Go to: [https://entra.microsoft.com](https://entra.microsoft.com) # Navigate to '''Users > All users''' # Click '''+ New user''' # Choose '''Create user''' # Fill in: * User name (e.g., john.doe@yourtenant.onmicrosoft.com) * Name * Password (auto-generated or custom) # Assign roles (optional) # Click '''Create''' == πŸ”Ή How to crea...")
Β 
Β 
(One intermediate revision by the same user not shown)
Line 1: Line 1:
= πŸ“˜ Core Management =
= Core Management =


== πŸ”Ή [[How to create users in Microsoft Entra ID (Azure AD)]] ==
== [[How to create users in Microsoft Entra ID (Azure AD)]] ==
=== Steps to Create a Cloud-Only User ===
=== Steps to Create a Cloud-Only User ===
# Go to: [https://entra.microsoft.com](https://entra.microsoft.com)
# Go to: [https://entra.microsoft.com](https://entra.microsoft.com)
Line 14: Line 14:
# Click '''Create'''
# Click '''Create'''


== πŸ”Ή [[How to create groups in Microsoft Entra ID]] ==
== [[How to create groups in Microsoft Entra ID]] ==
=== Types of Groups ===
=== Types of Groups ===
* '''Security Group''' – Used to assign permissions to resources
* '''Security Group''' – Used to assign permissions to resources
Line 29: Line 29:
# Click '''Create'''
# Click '''Create'''


== πŸ”Ή [[Assigning Licenses to Users and Groups]] ==
== [[Assigning Licenses to Users and Groups]] ==
=== Steps to Assign Licenses to Individual User ===
=== Steps to Assign Licenses to Individual User ===
# Go to '''Users > Select User'''
# Go to '''Users > Select User'''
Line 43: Line 43:
# Click '''Save'''
# Click '''Save'''


== πŸ”Ή [[Device Registration and Azure AD Join]] ==
== [[Device Registration and Azure AD Join]] ==
* '''Azure AD Registered''' – Personal device, limited access
* '''Azure AD Registered''' – Personal device, limited access
* '''Azure AD Joined''' – Corporate-owned, full identity integration
* '''Azure AD Joined''' – Corporate-owned, full identity integration
Line 53: Line 53:
# Authenticate and the device gets Azure AD joined
# Authenticate and the device gets Azure AD joined


== πŸ”Ή [[How to deploy Intune and enroll devices]] ==
== [[How to deploy Intune and enroll devices]] ==
=== Step-by-Step: Deploy Intune ===
=== Step-by-Step: Deploy Intune ===
# Assign '''Microsoft Intune license''' to users
# Assign '''Microsoft Intune license''' to users
Line 67: Line 67:
# Device gets enrolled and appears in Intune
# Device gets enrolled and appears in Intune


== πŸ”Ή [[Create and deploy compliance policies in Intune]] ==
== [[Create and deploy compliance policies in Intune]] ==
=== What is a Compliance Policy? ===
=== What is a Compliance Policy? ===
Defines rules a device must meet to be considered secure and compliant (e.g., PIN required, encryption, OS version).
Defines rules a device must meet to be considered secure and compliant (e.g., PIN required, encryption, OS version).
Line 82: Line 82:
# Click '''Create'''
# Click '''Create'''


== πŸ”Ή [[How to set up Conditional Access policies]] ==
== [[How to set up Conditional Access policies]] ==
=== Conditional Access Overview ===
=== Conditional Access Overview ===
Policies that enforce access control based on conditions like location, device compliance, or user risk.
Policies that enforce access control based on conditions like location, device compliance, or user risk.
Line 97: Line 97:
# Enable the policy
# Enable the policy


== πŸ”Ή [[Enable and Configure Multi-Factor Authentication (MFA)]] ==
== [[Enable and Configure Multi-Factor Authentication (MFA)]] ==
=== Basic MFA (Per-user) ===
=== Basic MFA (Per-user) ===
# Go to: https://entra.microsoft.com
# Go to: https://entra.microsoft.com
Line 109: Line 109:
# Require MFA under defined conditions
# Require MFA under defined conditions


== πŸ”Ή [[Security Defaults vs Conditional Access]] ==
== [[Security Defaults vs Conditional Access]] ==
{| class="wikitable"
{| class="wikitable"
! Feature !! Security Defaults !! Conditional Access
! Feature !! Security Defaults !! Conditional Access
Line 115: Line 115:
| Target Audience || Small organizations || Medium to large organizations
| Target Audience || Small organizations || Medium to large organizations
|-
|-
| Customizable || ❌ || βœ…
| Customizable || No || Yes
|-
|-
| Granular control || ❌ || βœ…
| Granular control || No || Yes
|-
|-
| MFA enforcement || Always on || Conditional
| MFA enforcement || Always on || Conditional
|-
|-
| Easy to manage || βœ… || Requires planning
| Easy to manage || Yes || Requires planning
|}
|}


* Disable Security Defaults before enabling Conditional Access
* Disable Security Defaults before enabling Conditional Access

Latest revision as of 12:56, 29 August 2025

Core Management

How to create users in Microsoft Entra ID (Azure AD)

Steps to Create a Cloud-Only User

  1. Go to: [1](https://entra.microsoft.com)
  2. Navigate to Users > All users
  3. Click + New user
  4. Choose Create user
  5. Fill in:
  • User name (e.g., john.doe@yourtenant.onmicrosoft.com)
  • Name
  • Password (auto-generated or custom)
  1. Assign roles (optional)
  2. Click Create

How to create groups in Microsoft Entra ID

Types of Groups

  • Security Group – Used to assign permissions to resources
  • Microsoft 365 Group – Used for collaboration (Teams, Outlook)

Steps to Create

  1. Go to: Groups > All groups
  2. Click + New group
  3. Choose group type: Security or Microsoft 365
  4. Set name and description
  5. Choose Membership type:
  • Assigned – Manually added users
  • Dynamic – Based on rules
  1. Click Create

Assigning Licenses to Users and Groups

Steps to Assign Licenses to Individual User

  1. Go to Users > Select User
  2. Click Licenses > + Assignments
  3. Choose product (e.g., Microsoft 365 E5, EMS E3)
  4. Select service plan components (optional)
  5. Click Assign

Assigning to Groups (Recommended for Bulk)

  1. Create a group (or select existing one)
  2. Navigate to: Licenses > + Assignments
  3. Select the product
  4. Click Save

Device Registration and Azure AD Join

  • Azure AD Registered – Personal device, limited access
  • Azure AD Joined – Corporate-owned, full identity integration
  • Hybrid Azure AD Join – On-prem AD + Azure AD sync

How to Azure AD Join Windows 11

  1. During OOBE (Out of Box Experience), choose Set up for work or school
  2. Enter user’s Entra ID email (e.g., john@domain.com)
  3. Authenticate and the device gets Azure AD joined

How to deploy Intune and enroll devices

Step-by-Step: Deploy Intune

  1. Assign Microsoft Intune license to users
  2. Go to: Microsoft Endpoint Manager Admin Center β†’ https://intune.microsoft.com
  3. Navigate to Devices > Enroll devices > Automatic enrollment
  4. Set MDM user scope to All (or selected group)
  5. Save settings

Device Enrollment Steps

  1. Open Settings > Accounts > Access work or school
  2. Click + Connect
  3. Enter organization email and authenticate
  4. Device gets enrolled and appears in Intune

Create and deploy compliance policies in Intune

What is a Compliance Policy?

Defines rules a device must meet to be considered secure and compliant (e.g., PIN required, encryption, OS version).

Steps to Create

  1. Go to Intune portal > Devices > Compliance policies
  2. Click + Create policy
  3. Choose platform (e.g., Windows 10/11)
  4. Define settings:
  • Password requirements
  • Encryption
  • Device Health
  1. Assign policy to a group
  2. Click Create

How to set up Conditional Access policies

Conditional Access Overview

Policies that enforce access control based on conditions like location, device compliance, or user risk.

Example: Require MFA for all users

  1. Go to Entra ID > Protection > Conditional Access
  2. Click + New Policy
  3. Name: "Require MFA for all users"
  4. Assignments:
  • Users: All users
  • Cloud apps: All cloud apps
  1. Conditions (optional): e.g., Sign-in risk, Device platform
  2. Access controls: Grant access, Require MFA
  3. Enable the policy

Enable and Configure Multi-Factor Authentication (MFA)

Basic MFA (Per-user)

  1. Go to: https://entra.microsoft.com
  2. Users > Multi-Factor Authentication
  3. Select users β†’ Enable MFA
  4. Users will be prompted to set up MFA on next sign-in

Conditional MFA (Recommended)

  1. Use Conditional Access policy
  2. Apply to specific apps or users
  3. Require MFA under defined conditions

Security Defaults vs Conditional Access

Feature Security Defaults Conditional Access
Target Audience Small organizations Medium to large organizations
Customizable No Yes
Granular control No Yes
MFA enforcement Always on Conditional
Easy to manage Yes Requires planning
  • Disable Security Defaults before enabling Conditional Access