Add Win32 deployment method to Intune guide
|
After Width: | Height: | Size: 160 KiB |
|
After Width: | Height: | Size: 126 KiB |
|
After Width: | Height: | Size: 197 KiB |
|
After Width: | Height: | Size: 186 KiB |
|
After Width: | Height: | Size: 169 KiB |
|
After Width: | Height: | Size: 136 KiB |
|
After Width: | Height: | Size: 186 KiB |
|
After Width: | Height: | Size: 310 KiB |
|
After Width: | Height: | Size: 134 KiB |
@@ -1,6 +1,6 @@
|
||||
# Deploying NetBird with Intune
|
||||
|
||||
Microsoft Intune is a cloud-based endpoint management solution that manages user access to organizational resources and simplifies app and device management across multiple platforms, including Android, iOS/iPadOS, Linux, macOS, and Windows client devices. Working alongside Microsoft Entra ID (formerly Azure Active Directory), Intune forms a powerful identity and access management framework that organizations rely on to secure their digital assets.
|
||||
Microsoft Intune is a cloud-based endpoint management solution that manages user access to organizational resources and simplifies app and device management across multiple platforms, including Android, iOS/iPadOS, Linux, macOS, and Windows client devices. Working alongside Microsoft Entra ID (formerly Azure Active Directory), Intune forms a powerful identity and access management framework that organizations rely on to secure digital assets.
|
||||
|
||||
When combined, Intune and Microsoft Entra ID ensure that only managed and compliant devices can access email, Microsoft 365 services, Software as a service (SaaS) apps, and on-premises applications. This integration combines multiple security signals, such as user identity, device health, and location, to enforce organizational policies using Conditional Access capabilities.
|
||||
|
||||
@@ -10,7 +10,7 @@ NetBird enhances this security ecosystem by providing a WireGuard-based overlay
|
||||
- **Entra ID** provides identity verification and conditional access decisions
|
||||
- **NetBird** establishes secure network pathways with granular access controls
|
||||
|
||||
This division of security responsibilities creates a comprehensive zero-trust implementation where devices are verified as compliant before they can even establish network connections to protected resources.
|
||||
This division of security responsibilities creates a comprehensive zero-trust implementation in which devices are verified as compliant before they can establish network connections to protected resources.
|
||||
|
||||
In this hands-on tutorial, you'll learn how to deploy NetBird with Intune to grant tailored access permissions for different teams.
|
||||
|
||||
@@ -26,9 +26,9 @@ Before beginning this tutorial, ensure you have the following prerequisites in p
|
||||
|
||||
## Setting Up NetBird Access Policies for Team-Specific Permissions
|
||||
|
||||
[NetBird's Access Control Policies](https://docs.netbird.io/how-to/manage-network-access) provide the foundation for implementing a zero-trust architecture with Intune, enabling you to define precise permissions based on user groups and resource categories. This ensures that team members can only access what they need for their specific roles.
|
||||
[NetBird's Access Control Policies](https://docs.netbird.io/how-to/manage-network-access) provide the foundation for implementing a zero-trust architecture with Intune. They enable you to define precise permissions based on user groups and resource categories. This ensures that team members can only access what they need for their specific roles.
|
||||
|
||||
These policies work in tandem with Intune's device compliance mechanisms, creating a powerful security layer where both identity and device posture determine access rights to the network.
|
||||
These policies work in tandem with Intune's device compliance mechanisms, creating a powerful security layer where identity and device posture determine access rights to the network.
|
||||
|
||||
Let's create a policy that enables the `Development` team to access the `Servers` group.
|
||||
|
||||
@@ -39,26 +39,126 @@ Let's create a policy that enables the `Development` team to access the `Servers
|
||||
|
||||

|
||||
|
||||
Provide a descriptive name for the policy, such as "Dev Team Server Access" that clearly indicates its purpose, and click `Save` to create and activate the policy.
|
||||
Provide a descriptive name for the policy, such as "Dev Team Server Access" that indicates its purpose, and click `Save` to create and activate the policy.
|
||||
|
||||

|
||||
|
||||
This access policy will automatically apply to all devices enrolled in Intune that belong to users in the `Development` group (as synchronized from **Entra ID**), providing them secure access to designated resources while preventing lateral movement to unauthorized systems.
|
||||
|
||||
Moreover, users will only gain this network access when using compliant devices that meet your organization's security standards, creating a true zero-trust environment where both user identity and device security status are verified before granting resource access.
|
||||
Moreover, users will only gain this network access when using compliant devices that meet your organization's security standards, creating a true zero-trust environment where user identity and device security status are verified before granting resource access.
|
||||
|
||||
> **Note**: For maximum security, create separate policies for each distinct access requirement rather than overly broad policies. This approach minimizes your attack surface by ensuring precise access controls aligned with job responsibilities.
|
||||
> **Note**: For maximum security, create separate policies rather than overly broad policies for each distinct access requirement. This approach minimizes your attack surface by ensuring precise access controls aligned with job responsibilities.
|
||||
|
||||
With these access policies in place, we can now proceed to configure the automated deployment of NetBird through Intune, ensuring that all team members have the required secure connectivity client installed on their devices.
|
||||
|
||||
## Adding NetBird Windows App to Intune
|
||||
## Deploying NetBird as a Win32 App
|
||||
|
||||
Microsoft Intune provides a straightforward way to deploy NetBird to your organization's devices. Here's how:
|
||||
Opt for Win32 app deployment over the Line-of-Business (LOB) method (described in the next section) when requiring advanced features such as specific detection rules, prerequisites, dependencies, or update supersedence.
|
||||
|
||||
### Adding NetBird as a Windows App
|
||||
### Preparing the `.intunewin` File
|
||||
|
||||
Using the Win32 method requires you to convert NetBird's `.exe` installer to the `.intunewin` format. Here's an overview of the procedure:
|
||||
|
||||
- Download the Microsoft Win32 Content Prep Tool from [GitHub](https://github.com/Microsoft/Microsoft-Win32-Content-Prep-Tool)
|
||||
- Download the NetBird Windows EXE installer from the [NetBird installation documentation](https://docs.netbird.io/how-to/installation#windows)
|
||||
- Run the Content Prep Tool and follow the instructions to convert the NetBird installer to `.intunewin` format.
|
||||
- For detailed information on using the Win32 Content Prep Tool, refer to [Microsoft's documentation](https://learn.microsoft.com/en-us/intune/intune-service/apps/apps-win32-prepare).
|
||||
|
||||
### Adding NetBird Win32 App to Intune Catalog
|
||||
|
||||
- Sign in to the [Microsoft Intune admin center](https://intune.microsoft.com), navigate to `Apps`, and click the `Windows` button.
|
||||
|
||||

|
||||
|
||||
- Click the `+ Create` button to add a new Windows application
|
||||
|
||||

|
||||
|
||||
- In the `App type` dropdown, select `Windows app (Win32)` and click `Select`
|
||||
|
||||

|
||||
|
||||
- On the `Add App` screen, click `Select app package file` and browse to the location of the NetBird `.intunewin` file you created earlier
|
||||
|
||||
- Select the `.intunewin` file and click `OK`
|
||||
|
||||

|
||||
|
||||
- On the `App information` tab, configure NetBird with the following values:
|
||||
|
||||
- **Name**: Leave the default file name
|
||||
- **Description**: Leave the default file name
|
||||
- **Publisher**: NetBird
|
||||
- **App Version**: Enter the current app version (optional)
|
||||
- **Category**: Select any category that fits your needs (optional)
|
||||
- **Show this as a featured app in the Company Portal**: Yes
|
||||
- **Information URL**: https://docs.netbird.io/
|
||||
- **Developer**: NetBird (optional)
|
||||
|
||||
You can leave the rest of the fields empty.
|
||||
|
||||

|
||||
|
||||
- Click `Next` to advance to the `Program` tab. Use the following commands in the install and uninstall fields:
|
||||
|
||||
- **Install command:** `netbird_installer_0.43.0_windows_amd64.exe /S`
|
||||
- **Uninstall command:** `"%ProgramFiles%\Netbird\netbird_uninstall.exe" /S`
|
||||
|
||||
>**Note:** The commands above assume a standard installation. Change them accordingly if you require NetBird installed on a different path.
|
||||
|
||||
For this example, leave the rest of the configuration unchanged. Note that you can change the install behavior and users' ability to uninstall NetBird if required.
|
||||
|
||||

|
||||
|
||||
- Click `Next` to advance to the `Requirements` tab. Here you can specify the architecture and minimum OS version required for installing NetBird. For instance:
|
||||
|
||||
- **Operating system architecture:** 64-bit
|
||||
- **Minimum operating system:** Windows 10 22H2
|
||||
|
||||

|
||||
|
||||
- Click `Next` to advance to the `Detection rules` tab. Intune lets you choose between **using a custom detection script** or **manually configuring detection rules**. Select the latter and configure it as follows:
|
||||
|
||||
- **Rule type:** File
|
||||
- **Path:** `%ProgramFiles%\Netbird`
|
||||
- **File or folder:** `netbird.exe`
|
||||
- **Detection method:** File or folder exists
|
||||
- **Associated with a 32-bit app on 64-bit clients:** No
|
||||
|
||||
Click `OK` when ready.
|
||||
|
||||

|
||||
|
||||
For examples on registry-based detection rules, refer to [Intune documentation](https://learn.microsoft.com/en-us/intune/intune-service/apps/apps-win32-add#step-4-detection-rules)
|
||||
|
||||
- Click `Next` to continue to the `Dependencies` tab. In this tab, you can add any applications that must be installed before NetBird. For this demonstration, click `Next` to continue.
|
||||
|
||||
- Intune's `Supersedence` tab lets you choose between updating or entirely replacing any other specific application listed. Click `Next` without adding any apps to skip the supersedence configuration for this deployment.
|
||||
|
||||
- On the `Assignments` tab, under `Required`, click `+ Add group`
|
||||
|
||||

|
||||
|
||||
- Select the appropriate group that contains your users (like the `Development` group synchronized from Entra ID) and click `Select`
|
||||
|
||||

|
||||
|
||||
- To continue, click `Next`. Review your configuration in the `Review + create` tab, then click `Create` to add NetBird to your Intune app catalog.
|
||||
|
||||

|
||||
|
||||
- To verify that NetBird was added to Intune, navigate to `Apps > All Apps` to see your Windows applications:
|
||||
|
||||

|
||||
|
||||
## Deploying NetBird as a Line-of-business (LOB) App
|
||||
|
||||
As a simpler alternative to the Win32 method described previously, you can deploy the NetBird MSI installer directly as a Line-of-Business (LOB) app. This approach is ideal for basic deployment scenarios that don't necessitate the advanced management features offered by Win32.
|
||||
|
||||
### Adding NetBird MSI Installer to Intune
|
||||
|
||||
- Download the NetBird Windows MSI installer from the [NetBird installation documentation](https://docs.netbird.io/how-to/installation#windows)
|
||||
- Sign in to the [Microsoft Intune admin center](https://intune.microsoft.com) and navigate to `Apps` and click on the `Windows` button.
|
||||
- Sign in to the [Microsoft Intune admin center](https://intune.microsoft.com), navigate to `Apps`, and click the `Windows` button.
|
||||
|
||||

|
||||
|
||||
@@ -113,6 +213,6 @@ To verify that NetBird was added to Intune, navigate to `Home > Apps | Windows`
|
||||
|
||||
### Deploying NetBird to Other Platforms
|
||||
|
||||
While each platform has slightly different configuration options, the process of adding NetBird and assigning it to groups follows the same pattern across Intune. For more information, refer to [Intune app management](https://learn.microsoft.com/en-us/intune/intune-service/apps/app-management).
|
||||
While each platform has slightly different configuration options, adding NetBird and assigning it to groups follows the same pattern across Intune. For more information, refer to [Intune app management](https://learn.microsoft.com/en-us/intune/intune-service/apps/app-management).
|
||||
|
||||
With NetBird successfully deployed through Intune, your organization now has the foundation for implementing a comprehensive zero-trust access model that verifies both user identity and device compliance before granting network access.
|
||||
With NetBird successfully deployed through Intune, your organization has the foundation for implementing a comprehensive zero-trust access model that verifies user identity and device compliance before granting network access.
|
||||