You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/dev-box/how-to-elevate-privilege-dev-box.md
+44-30Lines changed: 44 additions & 30 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,6 @@ ms.topic: how-to
8
8
ms.date: 02/27/2024
9
9
10
10
#customer intent: As a platform engineer, I want to configure elevated privilege management for dev boxes so that dev box users do not need local administrative privileges.
11
-
12
11
---
13
12
14
13
# Configure Microsoft Intune Endpoint Privilege Management for dev boxes
@@ -23,19 +22,17 @@ Endpoint Privilege Management is built into Microsoft Intune, which means that a
23
22
24
23
-*Deploy an elevation settings policy* - An elevation settings policy activates EPM on the client device. This policy also allows you to configure settings that are specific to the client but aren't necessarily related to the elevation of individual applications or tasks.
25
24
26
-
-*Deploy elevation rule policies* - An elevation rule policy links an application or task to an elevation action. Use this policy to configure the elevation behavior for applications your organization allows when the applications run on the device.
27
-
28
25
## Prerequisites
29
26
30
27
- A dev center with a dev box project.
31
28
- Microsoft Intune subscription.
32
29
33
30
## License Endpoint Privilege Management
34
31
35
-
In this section, you configure EPM licensing and assign the EPM license to the target user.
36
-
37
32
Endpoint Privilege Management requires either a stand-alone license that adds only EPM, or license EPM as part of the Microsoft Intune Suite.
38
33
34
+
In this section, you configure EPM licensing and assign the EPM license to a user.
35
+
39
36
1. Configure the Azure tenant administrator for EPM purchasing:
40
37
41
38
1. Open the [Microsoft Intune admin center](https://intune.microsoft.com), and navigate to **Tenant admin** > **Intune add-ons**.
@@ -45,6 +42,8 @@ Endpoint Privilege Management requires either a stand-alone license that adds on
45
42
46
43
1. In the Intune admin center, go to **Users**, and select the user you want to assign the role to.
47
44
1. Select **Add assignments** and assign the **Global Administrator** role, and the **Intune Administrator** role.
45
+
46
+
:::image type="content" source="media/how-to-elevate-privilege-dev-box/tenant-admin.png" alt-text="Screenshot of the Microsoft Intune admin center, showing the available tenant admin roles." lightbox="media/how-to-elevate-privilege-dev-box/tenant-admin.png":::
48
47
49
48
1. Apply the EPM license in Microsoft 365:
50
49
@@ -54,32 +53,37 @@ Endpoint Privilege Management requires either a stand-alone license that adds on
54
53
55
54
1. In the Intune admin center, go to **Users**, and select the user you want to assign the E5 and EPM licenses to.
56
55
1. Select **Assignments** and assign the licenses.
56
+
57
+
:::image type="content" source="media/how-to-elevate-privilege-dev-box/assign-license.png" alt-text="Screenshot of the Microsoft Intune admin center, showing the available licenses." lightbox="media/how-to-elevate-privilege-dev-box/assign-license.png":::
57
58
58
-
## Create Intune group
59
+
## Deploy an elevation settings policy
59
60
60
-
In this section, you create a dev box and an Intune group that you use to test the EPM policy configuration.
61
+
A dev box must have an elevation settings policy that enables support for EPM to process an elevation rules policy or manage elevation requests. When support is enabled, the `C:\Program Files\Microsoft EPM Agent folder` is added to the dev box along with the EPM Microsoft Agent, which processes the EPM policies.
61
62
62
-
EPM supports the following operating systems:
63
-
- Windows 11 (versions 23H2, 22H2, and 21H2)
64
-
- Windows 10 (versions 22H2, 21H2, and 20H2)
63
+
In this section, you create a dev box and an Intune group that you use to test the EPM policy configuration. Then, you create an EPM elevation settings policy and assign the policy to the group.
65
64
66
-
1. Create a Dev Box Definition
65
+
1. Create a dev box definition
67
66
68
-
1. In the Azure portal, create a [Dev Box Definition](how-to-manage-dev-box-definitions.md). Specify a supported OS, like *Windows 11, version 22H2*.
67
+
1. In the Azure portal, create a [dev box definition](how-to-manage-dev-box-definitions.md). Specify a supported OS, like *Windows 11, version 22H2*.
68
+
69
+
> [!NOTE]
70
+
> EPM supports the following operating systems:
71
+
> - Windows 11 (versions 23H2, 22H2, and 21H2)
72
+
> - Windows 10 (versions 22H2, 21H2, and 20H2)
69
73
70
74
1. In your project, create a [dev box pool](how-to-manage-dev-box-pools.md) that uses the new dev box definition.
71
75
72
-
1. Assign [Dev Box User](how-to-dev-box-user.md) role to the target user.
76
+
1. Assign [Dev Box User](how-to-dev-box-user.md) role to the test user.
73
77
74
-
1. Create Dev Box for the target user
78
+
1. Create a dev box for testing the policy
75
79
76
80
1. Sign in to the [developer portal](https://aka.ms/devbox-portal).
77
81
78
82
1. Create a dev box using the dev box pool you created in the previous step.
79
83
80
84
1. Determine the dev box hostname. You'll use this hostname add the dev box to and Intune group in the next step.
81
85
82
-
1. Create an Intune group
86
+
1. Create an Intune group and add the dev box to the group
83
87
84
88
1. Open the [Microsoft Intune admin center](https://intune.microsoft.com), select **Groups** > **New group**.
85
89
@@ -93,32 +97,41 @@ EPM supports the following operating systems:
93
97
94
98
1. Under **Members**, select the dev box you created.
95
99
96
-
##Create EPM policy and assign policy to Dev Box
97
-
98
-
In this section, you create an EPM policy and assign the policy to the group you created earlier.
99
-
100
-
1. In the Microsoft Intune admin center, select **Endpoint security** > **Endpoint Privilege Management** > **Create Policy**.
100
+
1. Create an EPM elevation settings policy and assign it to the group.
101
+
102
+
1.In the Microsoft Intune admin center, select **Endpoint security** > **Endpoint Privilege Management** > **Policies** > **Create Policy**.
103
+
104
+
:::image type="content" source="media/how-to-elevate-privilege-dev-box/intune-endpoint-security.png" alt-text="Screenshot of Microsoft Intune admin center, showing the Endpoint security | Endpoint Privilege Management pane." lightbox="media/how-to-elevate-privilege-dev-box/intune-endpoint-security.png":::
101
105
102
-
1. In the **Create a profile** pane, select the following settings:
106
+
1. In the **Create a profile** pane, select the following settings:
103
107
-**Platform**: Windows 10 and later
104
108
-**Profile type**: Elevation settings policy
105
109
106
-
1. On the **Basics** tab, enter a name for the policy.
107
-
108
-
1. On the **Configuration settings** tab, in **Default elevation response**, select **Deny all elevation request**.
110
+
1. On the **Basics** tab, enter a name for the policy.
111
+
112
+
:::image type="content" source="media/how-to-elevate-privilege-dev-box/create-profile-name.png" alt-text="Screenshot showing the Create profile basics tab with Policy name highlighted." lightbox="media/how-to-elevate-privilege-dev-box/create-profile-name.png":::
109
113
110
-
1. On the **Assignments** tab, select **Add groups**, add the group you created earlier, and then select **Create**.
114
+
1. On the **Configuration settings** tab, in **Default elevation response**, select **Deny all elevation requests**.
115
+
116
+
:::image type="content" source="media/how-to-elevate-privilege-dev-box/deny-all-requests.png" alt-text="Screenshot showing the Create profile Configuration settings tab, with Endpoint Privilege Management enabled and Default elevation response set to Deny all requests." lightbox="media/how-to-elevate-privilege-dev-box/deny-all-requests.png":::
111
117
118
+
1. On the **Assignments** tab, select **Add groups**, add the group you created earlier, and then select **Create**.
119
+
120
+
:::image type="content" source="media/how-to-elevate-privilege-dev-box/assign-defined-group.png" alt-text="Screenshot showing the Create profile Assignments tab, with Add groups highlighted." lightbox="media/how-to-elevate-privilege-dev-box/assign-defined-group.png":::
112
121
113
-
## Validate Dev Box
122
+
## Verify the user can't run applications with administrative privileges
114
123
115
-
In this section, you validate that the policy is applied to the dev box and that the Microsoft EPM Agent is installed.
124
+
In this section, you validate that the Microsoft EPM Agent is installed and the policy is applied to the dev box.
116
125
117
126
1. Verify that the policy is applied to the dev box:
118
127
119
-
1. In the Microsoft Intune admin center, select **Devices**, locate the dev box you created earlier, and then select **Device configuration**.
120
-
1. Select the **Elevation settings** policy you created earlier.
128
+
1. In the Microsoft Intune admin center, select **Devices** > the dev box you created earlier > **Device configuration** > the policy you created earlier.
129
+
130
+
:::image type="content" source="media/how-to-elevate-privilege-dev-box/intune-device-configuration.png" alt-text="Screenshot showing the Microsoft Intune admin center, with the Devices pane and Device configuration highlighted." lightbox="media/how-to-elevate-privilege-dev-box/intune-device-configuration.png":::
131
+
121
132
1. Wait until all the settings report as **Succeeded**.
133
+
134
+
:::image type="content" source="media/how-to-elevate-privilege-dev-box/device-profile-settings.png" alt-text="Screenshot showing the Profile Settings, with Setting status highlighted." lightbox="media/how-to-elevate-privilege-dev-box/device-profile-settings.png":::
122
135
123
136
1. Verify that the Microsoft EPM Agent is installed on the dev box:
124
137
@@ -131,4 +144,5 @@ In this section, you validate that the policy is applied to the dev box and that
131
144
132
145
## Related content
133
146
134
-
* For more information, see [Use Intune Suite add-on capabilities](/em/intune/fundamentals/intune-add-ons).
147
+
*[Use Intune Suite add-on capabilities](/em/intune/fundamentals/intune-add-ons).
148
+
*[Use Endpoint Privilege Management with Microsoft Intune](/mem/intune/protect/epm-overview)
0 commit comments