New Tenancy Setup

Introduction

These are the best practices that I follow when setting up a new tenant from scratch.

Admin Account Setup

We should be creating the following accounts:

Entra ID Group Setup

The following groups should also be created as a standard:

  • SG-LIC-{Licence Name} for each of the licences that are being deployed.

    • Use the full licence name, without spaces. E.g., SG-LIC-Microsoft 365 Business Premium

  • SG-DynDev-Windows 10 Devices

    • Dynamic Device Group with query (device.deviceOSType -eq "Windows") and (device.deviceOSVersion -startsWith "10.0.1")

  • SG-DynDev-Windows 11 Devices

    • Dynamic Device Group with query (device.deviceOSType -eq "Windows") and (device.deviceOSVersion -startsWith "10.0.2")

  • SG-DynDev-AutoPilot Devices

    • Dynamic Device Group with query (device.devicePhysicalIDs -any (_ -contains "[ZTDId]"))

Licence Setup

Microsoft 365 Business Premium

When the licence is assigned to the group, disable the following Services, as they are rarely used and this will help reduce noise:

  • Microsoft Kaizala Pro

  • Microsoft Invoicing (this has been retired)

  • Outlook Customer Manager (this has been retired)

Enable PIN Reset Service

Navigate to the following URLs using an account with App Admin or Global Admin:

Microsoft Pin Reset Service Production

Microsoft PIN Reset Client Production In Endpoint Manager:

Select Devices > Configuration profiles > Create profile.

Enter the following properties:

  • Platform: Select Windows 10 and later.

  • Profile type: Select Settings catalog.

Select Create.

In Basics, enter the following properties:

  • Name: Enter a descriptive name for the profile.

  • Description: Enter a description for the profile. This setting is optional but recommended.

Select Next.

In Configuration settings, select Add settings.

In the settings picker, select Windows Hello For Business > Enable Pin Recovery.

Configure Enable Pin Recovery to true.

Select Next.

In Scope tags, assign any applicable tags (optional).

Select Next.

In Assignments, select the security groups that will receive the policy.

Select Next.

In Review + create, review your settings and select Create.*

Enable MDM

Log into the Azure Portal

Go to Azure Active Directory

On the left-hand side, select Mobility (MDM and MAM)

Click on Microsoft Intune

Ensure that MDM user scope is set to All

Ensure that MAM user scope is set to None (unless you need MAM policies as well)

Configure Intune

AutoPilot Profile

TBA

Compliance Policies

Create a Compliance Policy for each Operating System that is in scope.

Configuration Profiles

Windows Health Monitoring

Update Policies

Update Rings

Last updated