Fixing the issue of remote sign-in though Remote Desktop Services using Local group membership setting in Intune
If you have a need for non-admin users to remote into Windows devices (Physical or VM), then in order to do so, they need to be a member of the Remote Desktop Users group. Now for Domain joined devices, this can be easily achieved by pushing down a policy using GPO. But how do you address this on devices joined to AAD? Read on to find out..
Back in March 2021, I had blogged on configuring local admins using LocalUsersandGroups CSP. Since then, Microsoft have recognized the need for managing the memebership of the built-in admin groups and introduced a new profile under Endpoint Security known as Local user group membership (At the time of writing this blog, the feature is still in preview). This template profile will allow IT admins to add, remove, or replace users and user groups to the built-in local groups on Windows devices. We are going to use this new template profile to configure the membership for the built-in Remote Desktop Users group.
Cuurently, the template setting allows you to perform the following actions:
Add (Update): Adds members to specified group while keeping the current group membership intact.
Remove (Update): Removes members of specified group while keeping the current group membership intact.
Add (Replace): Replaces current membership of specified group with newly specified group.
This is how you can go about creating the policy in Intune -
1. Navigate to the Microsoft Endpoint Manager admin center portal.
2. Head over to Endpoint security > Account protection > Create Policy > Platform. Select Windows 10 & later here and then select Local user group membership (Preview) from the drop down menu under Profile.
3. Fill in the name and other necessary details and click next.
4. Next up is to select the local group that you want to manage. Remote Desktop Users in my case.
5. Select the AAD users or groups that need remote sign-in access. (Note - These users and groups will get added\removed against all targeted devices so use them accordingly)
There are 2 ways of adding or removing users and groups:
a. Azure Active Directory (Azure AD) users and user groups (supported for Azure AD joined devices only).
b. Manually adding Azure AD and/or AD users and user groups (supported for Azure AD joined and hybrid joined devices).
We are going to be selecting option (a) for this particular use case, but if you do need to select option (b) then you can do so by adding SID, domain\username, or member’s username with SID being the most preferred method.
Option (a)
Once complete, you can verify the policy and its compliance in Intune. The added users will be able to remotely sign-in on the targeted devices again without any more fuss.
I am glad that Microsoft recognised the need and provided the template to manage built-in admin groups natively in Intune as it is obviously an easier and much pleasant admin experience when compared to dealing with CSPs. However, it goes without saying that the template profile is still in preview and there are some known issues associated with it. For example, when you create the policy under Account Protection, it also gets created under Disk Encryption automatically. But overall, it is a good addition to the existing template profiles and I am sure such issues will get rectified eventually.
Very good article! We will be linking to this particularly great post on our website. Keep up the good writing.
ReplyDeletesoftcrack.org
Remote Desktop Manager Enterprise Crack
Nuendo Crack
Waves Crack
VMWare Workstation Pro Crack
Zemana AntiMalware Premium Crack
First, Many thank you for your post.
ReplyDeleteI have one question.
Which license have this function?
If I want to use this function, I just need Intune or other plan?
Intune license will suffice.
Delete
ReplyDeleteAmazing blog! I really like the way you explained such information about this post with us. And blog is really helpful for us this website
xmanager-power-suite-crack
microsoft-office-crack
remote-desktop-manager-enterprise-crack
hdr-light-studio-crack
Thanks for this blog post! Just tried it, but the profile doesn't seem to apply during autopilot enrollment so I still can't sign in to the VM. I get the same error you got with "Pilot user 2" at the top of this blog post. Any ideas?
ReplyDeleteIs your assignment user based or device?
Delete