• The new Windows app

    Microsoft announced a new app to consume your Windows 365 Cloud PC, Azure Virtual Desktops, published apps and other remote desktop sessions. This app is simply called “Windows app”.

    But we already have apps for this one might say, and that is true. But we need different apps for AVD and Windows 365 today. If you use the Microsoft Remote Desktop app you will be able to see and connect to both your Windows 365 Cloud PC, your Azure Virtual Desktops, and your published apps, but you will miss some key features to WIndows 365.

    To get all those nice features for our Windows 365 Cloud PCs, we today must use the Windows 365 app.

    If we look at how things are in many businesses, a lot of times we have a mix of Cloud PCs, AVDs and published apps. Today that means that we need to separate apps to get the full experience, which from a user perspective can be confusing since I will see my Cloud PCs in the Microsoft Remote Desktop app, but I won’t see my AVDs or published apps in the Windows 365 app.

    The announcement at Microsoft Ignite around the new app is to bridge that gap and get everything into one app, the Windows app.

    Before going forward, PLEASE be aware that this is still in preview. Things might change and be added/removed.

    What is the Windows app?

    Introducing the Windows app. This is your new place to consume all your remote desktop session!

    The new Windows app brings all the awesome new features in Windows 365 and combines them with the Microsoft Remote Desktop features like support for AVD and published apps.

    I think one of the killer features is also that now we will have the same app, across multiple platforms. Today you need to use one or two different apps on Windows, and a less full feature one on all the other platforms. But the new Windows app changes that!

    Borrowed from MS Learn

    Getting started!

    The first thing you need to do, if you haven’t done so already, is to download the Windows 365 app from the Microsoft Store (or have it provisioned to you from e.g. Intune).

    Once you are signed in, you will notice a small button in the top menu saying “Preview”. Click on that! If you cannot see the preview button, make sure your app is up to date!

    Once you have enabled this, the app will close and the new one will launch (might take a second or two), and you will be asked to sign in again. Once you have signed in, you will now be in the new app experience!

    Using the app

    This is the new landing screen, to which you can pin your Cloud PCs, AVDs and published apps. And if I want to pin something to my home screen, I head into “Devices” and select the three dots on the resource I want to pin, then select “Pin to” and select “Pin to home“.

    As you can see, all the other remote actions available in the Windows 365 app are also there so I can in the same menu do a restart, restore, inspect connection etc. And if I want to pin it to the task view or taskbar, I can do so from here.

    But there is also a Microsoft Remote Desktop feature in this app which I was missing in the Windows 365 app; the possibility to not start the session in full screen. You find this by going to Settings on the machine in question and setting “Use default settings” to off. If you then select “Single display” in the Display configuration section, you will be able to turn off “Start in full screen“. If you jump back and forth or have a large screen, this is a really good feature.

    You can of course also select your theme, if you want light mode or dark mode, or if you want the app to use whatever you are using in the operating system. Just click the settings icon in the lower left part of the app and select which mode!

    And the last thing… The app supports multiple accounts so you can jump back and forth between tenants. Crucial feature for a consultant!

    Other platform

    Like I said, the app is today available for Windows, macOS, iOS/iPadOS and Android is still not yet released but it’s coming.

    I’ve tested it on my iPhone, and to be honest the experience was way better than I anticipated.

    One feature I really like is that when just leaving the app and having the desktop open, the session will continue when I come back without the need to re-connect.

    The iOS app is a lot like the Microsoft Remote Desktop app in look and feel, but with a few improvements. I still can’t restart my Cloud PC from the app, but I can restore it if needed. However, it’s not a farfetched guess that it will come in a later release.

    All the apps are still in preview, and if you want the iOS/iPadOS or macOS app, you will have to head over to Microsoft Learn and fins the links.

    Bonus

    What I haven’t covered is that there is also a new web portal, which has the same look and feel as the new Windows app.

    The new address to the new web-app is https://windows.cloud.microsoft/. You can read more about it in the Microsoft Learn guide as well.

  • Microsoft Ignite 2023 recap

    Microsoft Ignite 2023 recap

    It’s that time of the year again. Not Christmas. Microsoft Ignite time!

    This year I decided not to go to Seattle, but instead follow it virtually from home. I can say now when Microsoft Ignite is over that I’ve had a severe case of FOMO the last couple of days, by just seeing all the pictures it looked like it was a really awesome event!

    But since MS Ignite is over, it means that it’s time for a recap. What did I find most interesting?

    For starters. There was a clear theme this year. AI, AI, Copilot, Copilot and Copilot. 😂

    Oh, and the picture in the top of this post is of course created using AI!

    Windows 365

    There was a bunch of new things released within Windows 365 at Ignite, and Windows 365 actually got time in the main keynotes!

    New Windows app – A preview of a new app to support not only Windows 365 and Cloud PC, but to also give you all your Azure Virtual Desktops, DevBox and published apps in the same place. The cool thing is that it’s also platform independed so we will see the same experiance on all major platforms going forward. You be able to have a “Windows” app on your iPad.

    Windows 365 GPU support – Microsoft announced that GPU support for graphic design work is coming to Windows 365, and this will really be great for a lot of customer scenarios! It will be really interesting to see the pricetag on the GPU SKU, I would kind of guess that you really need to have a good business case and not just have it’s because GPUs are cool…

    Windows 365 AI capabilities – It was also announced that you as an IT admin will be able to get AI based recommendation on sizing the Cloud PCs. This to help improving cost efficiency and user sattisfaction. Preview will be released soon.

    Single-sign on (SSO) and passwordless authentication – SSO and passwordless has for quite some time now been in preview in the Intune portal, but it’s not in general availability. This also applies to approved AVD providers!

    Watermarking, screen capture protection, and tamper protection – in order to increase security and prevent dataloss, these features which have been in public preview for a while are now in general availablity on both Windows 365 and AVD.

    Windows 365 Customer Lockbox – To ensure that Microsoft support engineers can’t access content to do service operations without explicit approval, you can use Customer Lockbox. This is similar to other Customer Lockbox within the Microsoft ecosystem. This is in public preview.

    Windows 365 Customer Managed Keys – I think this is a pretty cool update. You will soon be able to use your own encryption keys for encrypting the Windows 365 Cloud PC disk.

    Windows

    Eventhough Microsoft Build is usually where we see most Windows news, there were a couple during Ignite this year.

    Copilot in Windows – This was actually announced at the event earlier this fall and went in to public preview for selected markets on the 1st of November. During Ignite Microsot announced that it will go into general availablity in December, so let’s cross out fingers Europe is included!

    Windows Autopatch for frontline workers– Windows Autopatch is not new, but Windows Autopatch is now included in the Microsoft 365 F3 subscription to ensure frontline workers are kept up to date.

    Windows Autopilot and Windows Update for Business merging – Microsoft is streamlining the interface to handle updates

    Microsoft Intune

    There were a few big announcements for Microsoft Intune, and I would say the two biggest were around macOS management, Security Copilot in Intune and the Intune Suite.

    MacOS management – Microsoft has for a while now been very loud about their story around macOS and Intune, and we are now starting to see the outcome of this. I wouldn’t say that there were that much news related to Ignite around this, but they were pushing for that Intune is now in the forefront of device management for Mac, which means that you no longer need to have Jamf or such to have extensive macOS management.

    Security Copilot for Intune – As part of the Copilot and Ai journey we are on, Security Copilot will help you dentify annomolies or issues in your environment. It will help you analyze big chunks of data in no time to find security related events. But Security Copilot is more than that, it will also integrate in Microsoft Intune to help you create new policies or figure out how to solve issues that arrises. This will be such a great feature for many admins out there!

    Microsoft Intune suite updates – Microsoft Intune Suite was announced back in March this year and has so far mostly been focues on Endpoint Privilegde Management and Remote Help. Microsoft has now announced three more features that are coming; Enterprise App Management, Advanced Analytics and Cloud PKI. These three additional services will make the Intune Suite bundle even better and are expected to all be available in February of 2024.

    Summary

    To be honest, this years focus at Ignite was Copilot. The word “Copilot” is mentioned 289 times in the book of news. That kind of set the tone for Ignite. Don’t get me wrong, I’m super excited for Copilot but this year was crazy!

    Any how, lot of cool stuff coming out of Ignite this year and I think we will see things moving even faster now around AI since post-Ignite there has been some news around people from OpenAI joining Microsoft… What a time to be alive!

    One thing that I take with me is that next year, I want to go to Seattle and be there in person. My feeds has been filled with Ignite related pictures and the FOMO has been real!

  • Let’s move our Cloud PC!

    Let’s move our Cloud PC!

    I actually ran into this working with a customer. We had setup the Cloud PCs using an Azure Vnet in connected to the wrong landing zone (test environment) and we had 100+ Cloud PCs up and running and there was no possibility due to internal processes to move that network to the production environment.

    This could also be relevant if you want to move a provisioning policy from one Microsoft hosted network region to another.

    In this post we will cover how this looks when using Microsoft hosted networks, but they could just as well be Azure Network Connections. The beauty is that we don’t need to re-provision them, we can just update the provisioning policy!

    Update provisning profile

    Since we are moving from one Microsoft hosted network to another, we won’t need to do any updates outside the provisioning policy. If we are moving to another Azure Network Connection, we need to first create a new connector for our new network. This could be in the same subscription but be another subnet for example. Once you have created this, you can move on to updating the provisning policy.

    So, the first step is to head into our provisioning policy. In this example we are updating our policy which is currently set up to use US East as a the region, but we want to move this to Europe instead.

    What we need to do here is to update the geography and region in our policy, and of course also the name since I have the region in my policy.

    Once I’ve done my updates to the region, I simply click next to the bottom of the screen, and I end up on the summary page where I as always get an overview of my policy. When I’m done reviewing this, I click Update.

    But we are not done yet. We also need to apply this update to our machines, unless we do that this only applies to newly provisioned Cloud PCs, and we want to move all of them to the EU.

    When we are back on the overview blade for our policy, there is a action at the top called “Apply current configuration”.

    When we click on this text, we get prompted whit this pop-up asking us if we want to apply the region change or the SSO change. Since we didn’t make any SSO changes in this policy, things would happen, but this is a fantastic way to enable SSO for all your Cloud PCs without having to redeploy them. But let’s select the “Apply region change” and hit Apply.

    Once you have applied the change, your Cloud PCs will start updating.

    During the update, the Cloud PC will not be available since work is being done in the back end.

    Once the move has been completed, which took about 10-15 minutes for me, you can sign back into the Cloud PC and keep using it in the new region!

  • Windows 365 Switch – The best feature so far?

    Just after the summer, Microsoft announced that Windows 365 Switch was available for public preview. And to be honest, this is probably my favorite feature so far, and makes using the Cloud PC a lot easier!

    Back at Microsoft Ignite in 2022, the product team announced three major features coming to Windows 365:

    • Windows 365 Boot
    • Windows 365 Switch
    • Windows 365 in offline mode

    Back in May, Windows 365 Boot was available as public preview and since the beginning of August, Windows 365 Switch is also available to start testing!

    Today, to use Windows 365 Switch, there are some pre-requisites:

    • Windows 11 Insider (Dev or Beta is supported) on you local PC and your Cloud PC
    • The Windows 365 app
    • Windows 365 licenses

    You of course also need provisioning policies and so on to be able to provision your Cloud PC, if you want to learn how that is done you can check out this post.

    Setting up Windows Insider

    There are different ways to enable Windows Insider on you device depending on how your setup is. You can do it directly from the Settings app under Windows Update, but I will show you how to configure this through Microsoft Intune, since this is probably the more common scenario to onboard devices in to Windows Insider in a larger environment.

    What you need to do is to create a update policy for the Windows Insider program releases in Microsoft Intune to enable this feature. You can of course also update your current policies to allow Insider builds.

    Go to Microsoft Intune and navigate to the Device section and find Update rings for Windows 10 and later. Create a new profile by clicking “+ Create profile“.

    Give your new profile a name and click next.

    Configure the profile to match your needs when it comes to the generic settings, in this example I will leave it to default. The important setting is “Enabled pre-release builds“. Enable that and select either the Beta or Dev channel (both are supported for Windows 365 Switch).

    Add a group of devices you want to include for the Windows Insider Dev channel. Make sure to include both the local PC and the Cloud PC in this group. Click Next.

    Review your settings and create the policy by pressing Create.

    Note: You can also update any of your existing policies to allow pre-release builds. What I’ve done in my lab environment is to allow this in my test ring in Windows Autopatch and move any machine I want to enable this on into the test-ring.

    Opting in for Windows Insider builds

    The updates are not automatically enforced on the client, it enables the user to opt in to the program, the user needs a Windows Insider Program account. You can read all about it here: Getting started with the Windows Insider Program (microsoft.com).

    Easiest way to get started is to search the start menu for Windows Insider and open the “Windows Insider Programme settings”. This has to be done on both the local PC and the Cloud PC to opt in to Windows Insider.

    First time user opens the settings blade, they will need to press the “Get started” button inorder to link an account to the Windows Insider program.

    When the account has been linked, user will see what channel they have been added to. Since we are managing this setting from Intune, all the alternatives has been grayed out and the “Dev Channel” is selected, since that is the one we configured.

    One you have opted in for Windows Insider builds, head over to Windows Update and run the update. You will see Windows Insider build as an update which will start to download.

    IMPORTANT: Perform these steps on both your local PC and your Cloud PC.

    The Windows 365 app

    The next step is to make sure that we have the Windows 365 app installed on our local machine. This can be done either by deploying it from Microsoft Intune or downloading it from the store.

    Easier way is to simply download it from the store.

    Once you have installed the Windows 365 app, the wait begins. Things needs to be configured and happen in the background. This normally takes a few hours, so don’t give up if its not there right away!

    Once Windows 365 Switch has been configured for you, you will get a new option on your Cloud PC called “Add to taks view”.

    When you select this, you will see a ribbon on the Cloud PC you selected this on that it has been added to the task view.

    Now when you open the Task View, from either the task bar or win + tab, you will see your Cloud PC as a desktop.

    When you select the Cloud PC for the first time, the connection will be setup and you will have to wait while it’s connecting.

    Once this initial connection has been done, you will be able to switch back and forth as this would have been just another desktop from within your Cloud PC.

  • Back from vacation – what did we miss?

    Like the swede I am, I’ve been off work for the last 4 weeks to get my summer vacation. I’ve actually done my best to try to stay away from IT stuff this summer, to disconnect and focus on other things (like golf and getting our house in order).

    But the world of IT does not slow down just because of summer, so here is a summary of some of the highlights that I missed during my time off!

    I got renewed as MVP

    Okay, this I already knew before the summer. But I was awarded for my 2nd year as an MVP within Windows and Devices for IT. I’m truly honored to be awarded for yet another year and being part of such a cool community of awesome people!

    Ola Ström | Most Valuable Professionals (microsoft.com)

    I will be speaking at WPNinja Summit

    I was picked to do two session at the WPNinja Summit in Baden, Switzerland, the 27th to 29th of September.

    I will do one session about Windows 365 networks and one about how to do better deployments of Windows 365.

    I’m really looking forward to this and I hope to see you all there!

    Windows 365 Switch in public preview

    At Microsoft Ignite 2022, Microsoft introduced three big new features coming to Windows 365. In May, Windows 365 Boot reached public preview as the first of the three. Now in August, the second and maybe my favorite, Windows 365 Switch reached public preview!

    Windows 365 Switch lets you switch between your physical PC and your Cloud PC through the task viewer, just like the other desktops you can have. It’s a really cool feature and I will cover this in a blogpost the upcoming weeks!

    You can read more about it in the official Microsoft blogpost found here: Windows 365 Switch now available in public preview – Microsoft Community Hub

    Windows 365 Frontline released

    This was actually announced before I left for summer vacation, but Windows 365 Frontline finally reached general availability!

    For those of you not familiar with this concept, this is a different licensing modell designed for scenarios where the users are not using their device all the time, user who work in shift where you have users coming an going. The concept is that you buy one license, but you get three Cloud PCs but only one can be used at the time.

    It sounds a little bit tricky, I know, but I covered this in an earlier blog post which you can have a look at.

    Read more about it in the Microsoft blogpost: Windows 365 Frontline is now generally available | Windows IT Pro Blog (microsoft.com)

    What’s new in Windows 365?

    Windows 365 got some other great updates during the summer as well as Microsoft released a lot of new features in both July and August.

    Some of the new features released was:

    • Move Cloud PC is now generally available
    • New setting to allow users to reprovision their own Cloud PC
    • Azure network connection (ANC) least privilege update
    • Provide feedback button for admins is now generally available
    • Windows 365 web client camera support (preview)
    • Group-based license support for Cloud PC resizing
    • Windows 365 app update notifications for users

    You can read more in details here about the new features: What’s new in Windows 365 Enterprise | Microsoft Learn

    Windows 11 23h2 release update

    Microsoft released new information about the Windows 11 23h2 update coming later this year. It is currently scheduled to be released in Q4 and will be released as an enablement package. This means that there are no big changes coming to the code base of Windows 11, and you can keep doing you testing on Windows 11 22h2 if you are still transitioning over to Windows 11.

    Microsoft also mentions a Windows 11 LTSC version in this update, which means that if you are waiting for that release, you can start preparing.

    Windows client roadmap update: July 2023 – Microsoft Community Hub

    What’s new in Intune?

    As per usual, Microsoft Intune has gotten it’s weekly updates during the summer. I think the most impactful update was the fact that uninstalling applications as an end-user in Company Portal is FINNALLY available! I know this has been something a lot of IT Pros has been waiting for. There are also a lot of new stuff in the 2307 Service release.

    Some highlights:

    • Uninstall Win32 and Microsoft store apps using the Windows Company Portal
    • Use the Turn off the Store application setting to disable end user access to Store apps, and allow managed Intune Store apps
    • New BitLocker profile for Intune’s endpoint security Disk encryption policy
    • Intune supports new Google Play Android Management API
    • Change to default settings when adding Windows PowerShell scripts
    • New settings available for the iOS/iPadOS web clip app type
    • Settings insight within Intune Security Baselines is generally available
    • Tamper protection support for Windows on Azure Virtual Desktop
    • Endpoint Privilege Management support to manage elevation rules for child processes

    What’s new in Microsoft Intune | Microsoft Learn

    Screen capture protection and watermark

    During the summer Microsoft updated how you can enable screen captrue protection and watermarks for Windows 365 (and Azure Virtual Desktop).

    Previously, you had to upload a custom ADMX template to enable these settings (or GPO), but they have now been made available in the built-in ADMX profile in Intune, making this setting much more accessible.

    I will cover this more in a future blog post

    Azure Virtual Desktop Watermarking Support – Microsoft Community Hub

    Screen capture protection in Azure Virtual Desktop – Azure | Microsoft Learn

    Microsoft Inspire 2023

    During the summer, Microsoft also held their Inspire conference which is usually more targeted towards partners, but there was a lot of good stuff announced and shared during the conference.

    Check out the main keynote here: Microsoft Inspire Keynote

    Any also the rest of the sessions: Session catalog (microsoft.com)

  • Boot directly to your Cloud PC

    Boot directly to your Cloud PC

    Windows 365 Boot was first announced at Ignite in 2022, but no dates were announced at that point.

    But now it has finally happened! Windows 365 Boot is in public preview and ready for you to test! There is, however, at the time being a need to use Windows 11 Insider Preview for this to work.

    Windows 365 Boot is a concept which is exactly what it sounds like, the possibility to boot your physical PC straight into your Cloud PC. One could almost argue that this is a Windows take on a thin client concept but based on Windows 11 instead of some Linux distribution. We will see where this will take us in the future, but I can see a lot of cool scenarios for this combined with Windows 365 Frontline!

    A while back, I wrote a post about creating a shared Windows 365 kiosk setup for Windows 10 or Windows 11, a poor man’s Windows 365 boot for impatient administrators. But now we have the real thing, so let’s set it up!

    Setting up boot to cloud

    The simplest way to setup Windows 365 Boot is to use the Microsoft provided guided scenario, which can be found here.

    The guided scenario will help you create all policies and profiles you will need for this but do keep in mind that you still need to create your Windows 365 provisioning policy!

    The first step in the guided scenario will give you an overview of what will be done and what it’s used for. If you have ever used guided scenarios before, this will be a familiar experience!

    On the next step, we will add a prefix for our policies. This would typically be something you use in your naming convention. Please be aware that Microsoft only allows you to set the prefix of the names, not the whole policy name. If you want to change this to follow your naming convention, you will need to do that manually once everything has been created.

    Next step is to set how updates should be handled. I’ve just added 0 on all values for days and gone with the default active hours, but this would typically reflect your normal patching/upgrade cadence.

    On the next step, we can add some additional settings. I’ve just added a Wi-Fi profile, but you can add a VPN profile if needed as well. The last step on this tab is to select the language/region. I’ve selected to go with the operating system default that I have on the device I will deploy to.

    On the last step before the automated creation starts, we will take care of assignments. You can either create a new group or use an existing group (please give us this feature in the other assignment flows Microsoft!). I’ve selected to create a new one called All W365 BtC Devices.

    Once we have reviewed our settings, the deployment of policies, profiles and groups will start. You can follow and monitor the deployment (much like in Azure). For me, this was a fast process.

    Getting the client ready!

    As I mentioned, you need Windows 11 Insider Preview to be able to use Windows 365 Boot. You can either upgrade your machine manually or use Intune to upgrade your machine to the Insider Preview Dev channel.

    You can modify the update policy created to allow the Insider Preview Dev channel for your Windows 365 Boot machine (please keep in mind that this is a preview) or you can create a new policy for this. What you are looking to enable is the following.

    To upgrade your machine manually to Windows Insider Preview, go to Settings > Windows Update > Windows Insider Program and opt in for insider builds on the machine.

    ATTENTION!!

    Don’t forget to add your devices to the group you assigned your Windows 365 Boot policies to, otherwise nothing will happen!

    What I’ve also found is that you need to reset your device for this to work to 100%. At least my clients, if not reset, are not able to connect to the Cloud PCs. So hot tip!

    The experience

    When our computer is running Windows 11 Insider Preview and has gotten all out new Intune policies and profile, the magic will happen!

    When the computer boots, it will take you to the Windows 365 Boot sign in page instead of the regular Windows sign in. From here, you will sign straight into your Cloud PC instead of your local PC!

  • Session time limit for Windows 365 Frontline

    Session time limit for Windows 365 Frontline

    Since we now have successfully set up and provisioned Windows 365 Frontline in our environment, we need to add some additional layers of configuration to make operations as smooth as possible, and especially to make sure that we use the licenses in the best way possible.

    With Windows 365 Frontline, each license is reserved as long as the user has the session running. This means that users could potentially have active sessions but are idle which would result in them locking one license.

    Since users might forget to end the session, you can configure a policy that will end idle sessions for the end-user.

    Create the policy

    To create the policy, head over to Intune (https://intune.microsoft.com) and navigate to Devices > Windows > Configuration profiles and select “+ Create profile“.

    Select the profile type to be Settings catalog and press Create.

    Give your profile a name that makes sense to you and your organisation, I will go with something that follow my name standard for my environment that indicates it’s for Windows 365 Frontline and what the profiles does. When you have given the profile a name, press Next.

    Select “+ Add setting” to open the settings picker.

    In the settings picker, search for session time limits and select the category for Session Time Limits.

    In the settings name section, check the box for “End session when time limits are reached and “Set time limit for active but idle Remote Desktop Services sessions“, and your setting will appear in the policy. Once you have selected the setting name, close the fly-out settings picker.

    Enable the settings and choose the time limit that matches your needs and corporate policies. In this example I’ve selected 1 hour, which is good value to start with. Once you have enabled these settings, press Next.

    Unless you use Scope tags you can skip this section and move right to Assignments where we will deploy this towards all our Windows 365 Frontline devices. I’m doing this by assigning the policy to the built in All devices group and applying a filter I’ve created for Windows 365 Frontline.

    The rule syntax you want to use when creating a filter for Windows 365 Frontline machines is at least this one, but it can of course have additional lines depending on your needs:

    (device. Model -startsWith "Cloud PC Frontline")

    Once you have made the assignments as needed, press Next and then Create.

    Your policy will now assigned to all your Windows 365 Frontline Cloud PCs and you can track the progress in Intune by looking at the policy.

  • Windows 365 Frontline – Getting started!

    Windows 365 Frontline – Getting started!

    Windows 365 Frontline is still in public preview, but you can sign-up for the preview on this link! Since it’s still in preview, there is currently no information on pricing.

    When you have gotten yourself licenses it’s time to configure, and since this is Windows 365 you do everything from Microsoft Intune.

    One thing that differs the Frontline version from the Enterprise version is how licenses are assigned. For Enterprise you assign a license to a user to provision a Cloud PC, but for Frontline this works differently. You never assign the license to a user, and we will cover what you do instead further down in the post. It’s really clever!

    Setting up a frontline Cloud PC

    What you will need for this, except for the obvious Microsoft Intune and all its pre-requisites, is of course the Windows 365 Frontline license. This license gives you the right to provision 3 Cloud PCs per license. What you would typically also add to this is a Microsoft 365 F3 or E3/E5 license (or equivalent licensing) to gain all the features needed for managing and working with the digital workplace.

    You will also need a few groups (Azure AD groups or synced on-premises AD groups) with the users you are providing with a Cloud PC, this could e.g., be your IT Service Desk team.

    Once we have that in place, we can start configuring!

    Head over to https://intune.microsoft.com and navigate to Devices > Windows 365 and select the “Provisioning policies” tab.

    Click on the “+ Create policy” button to create your new Windows 365 Frontline provisioning policy.

    On the “General” step, give your profile a good name and make sure to select Frontline as license type. Then select the join type you would like to use, followed by the network settings. For this example, we will user Azure AD join and Microsoft Hosted network, and we will place the Cloud PCs in Sweden Central. When done, click Next.

    In the next step, we will select which image we will use. In this case, we will use the default value and just click Next.

    In the next step, we will apply a custom naming convention to differentiate these from our regular Cloud PCs, but this is mostly for my own convenience, and you can leave this to default. We will also add these computers to Windows Autopatch since I have that active in my environment. When done, click the Next button.

    In the next step, this is where the magic happens. Since you never assign licenses directly to a user you will need to add which groups should get Cloud PCs based on this policy, but also which license these groups should use. You can add multiple groups and have different machine sizes assigned to the separate groups. In this example, since I only have one license type, we will assign the same license to the same groups.

    You will also be able to see how many Cloud PCs you have left to assign.

    Once you have set up your groups and assigned the licenses to them, click on the Next button to review your settings before creating the policy. If everything is in order, click Create.

    Monitor Cloud PC provisioning

    Once you have created the provisioning policy and populated the assigned groups, your Windows 365 Frontline Cloud PCs will start to provision, and you can as always track this in the “All Cloud PCs” tab. What I’ve found is that I need to clear any filters applied before I can see the Frontline machines, so if you don’t see them just clear the filter.

    Once the Cloud PCs are provisioned, they will get name based on what we set in the naming template part of the provisioning policy and your Windows 365 Frontline Cloud PCs are ready to use!

    Connecting to Cloud PC Frontline

    As with all other Cloud PCs, there are a few different ways to connect to your Cloud PC Frontline, but the preferred way should always be using the Windows 365 app since this provides the best end-user experience.

    Once you sign in the to the Windows 365 application, you will see all your Cloud PCs listed. You will see both your assigned Enterprise and Frontline Cloud PCs. This will look similar in the Windows 365 web portal as well.

    As you can see in the picture, the Cloud PC Frontline machines are tagged with the word “Frontline” which provides me as an end-user a great way to differentiate the two different versions from each other. As you can also see, I can have several Cloud PC Frontlines assigned to me based on different profiles.

    When you click connect, the initial connection will take a little longer and you will see this ribbon on the Cloud PC.

    One the machine has booted; you will get a pop-up telling you to make sure to disconnect when you are done since the disconnection is what makes the license available for other users. The time-out time can also be set with policy on the Cloud PC using Intune.

    Once I confirm the connection, my Cloud PC will boot up and my session will start.

    From here, things are just as with my regular Cloud PC except that applications will be closed, and the Cloud PC will be turned off when I leave the session which results in that I will need to start my applications again. It is not that different from a physical PC which is turned off.

    Remote user actions

    In the Windows 365 app, as long as your Cloud PC Frontline is up and running, you can perform remote actions such as restart, troubleshoot or restore. But as soon as it’s powered down, you can only see system information and rename your Cloud PC.

  • Windows 365 Frontline – Let’s talk about it

    Updated on 20th of April 2023 based on feedback around license assignments.

    At Ignite 2022, Microsoft announced that they were working on something they called “Windows 365 for Shift Workers” and a couple of weeks ago this was released in public preview under the name “Windows 365 Frontline” on April 6, 2023.

    But what is Windows 365 Frontline and how is that different from the regular Windows 365?

    The biggest difference is the license model to be honest. There are technical differences as well for admins, but for the end-user the experience is the same to be honest. Users still get their personal machine, but when the user ends their session, the machine is shut down instead of kept in the state it was left.

    But going back to the license, which I think is the most interesting part here. The current setup is that there is a 3:1 ratio on the license, 3 users can be assigned to one license, but you can only use one license/machine at the time. And this is where the confusion begins since it’s positioned to be for shift workers BUT there are no integrations towards any scheduling system for license handling at this point. But this is only the beginning of the frontline user story for Windows 365!

    Let’s pretend you have a scenario where your users work shifts to cover the day. The number of shifts you have during the day doesn’t really matter in this sense. What is important is the number of concurrent users you have, you need to make sure that you can cover the number of users who are active at the same time, and the same license can be shared over different departments.

    The licens is, like Windows 365 and Microsoft 365 licenses, assigned on a tenant level. Which means; if you have as many licenses as you will have concurrent users you are good to go. You never assign a specific “third” of a license to a user, you don’t even assign the license. You just say that “this group is eligible to use the frontline worker setup” in your provisioning policy, which is a lot different from the Enterprise setup.

    This could however of course mean that you have “more” licenses than you need since it might not add up perfectly. But given that you have the license on a tenant level, this means you can share your licenses over several scenarios/teams. But as of right now, this is what it looks like and it’s still in preview.

    Image: Microsoft

    One important thing with Windows 365 Frontline workers though, we still don’t know what the license cost for this will as of writing this. As GA is set to around June 2023 according to the Microsoft public roadmap, this will be clearer in the coming months.

    The second thing around Windows 365 Frontline to remember is that this is not a “Windows 365 version of AVD Multisession”, this is pooled licenses where end-users get their own, personal Cloud PC, not a shared host like multisession. So, the end-users will get a full Cloud PC, it will just not be available for them 24/7 as with the Enterprise version.

    In an upcoming blog post, we will dig deeper into how you configure this in your environment, and what the user experience is like!

    In the meantime, you can read more about Windows 365 Frontline in the Microsoft release which you can find here.

  • Custom name for Cloud PC

    Giving computers custom names is something which is somewhat of a hot potato. We have been doing it for years, and I’ve even blogged about it previously (olastrom.com – Naming conventions). It’s something which is important for some, but from an asset perspective it has kind of played out its role since it is not persistent.

    However, one thing that has been a really important thing for some, has been the possibility to configure the naming convention for Windows 365 Cloud PCs which has not been possible. Until now!

    With the update in the end of March 2023, this is now doable. It follows the same pattern as the naming convention for Windows Autopilot enrolled devices. You can set a prefix followed by variables. For Cloud PCs, these are a bit different, but follow the same idea.

    As you can see by the picture, the name can be between 5 and 15 characters and can include some additional characters except for numbers and letters. The computer name MUST include at least 5 random characters using %RAND:y% where y is the number of random alphanumeric characters. I can however leave out the username and only use random characters.

    Configure Cloud PC naming

    To configure Cloud PC naming, you can either create a new provisioning policy or change an already existing one. In this example, I will change one of my existing policies. This new setting is by default off in all existing policies and you will need to actively set this for new policies.

    Head into Microsoft Intune (intune.microsoft.com) and navigate to Devices > Windows 365 and select the Provisioning Policies tab.

    Either select “+ Create policy” or modify an existing policy. I’ve chosen to update my existing policy for my Swedish users. When you get to the “Configuration” step in the policy, you can enable the Cloud PC naming by checking the check-box. It will then display the option to enter a custom name.

    As you can see by my example, I’ve chosen to set the policy to give my Cloud PC a name which is CPC followed by five random alphanumeric characters followed by SWE. So, the name could end up being CPC-ABC12-SWE.

    Conclusion

    “With great power comes great responsibility”. Use naming wisely. To be honest, for Cloud PC naming makes slightly more sense since we don’t have serial numbers or such as an identified. However, naming will change once re-deployed since we have a random part of the name if is enforced. But with this function we can adapt it to fit with the rest of our naming conventions a bit more. You could even just set the same as for all other PCs (except you will get alphanumeric and not numeric random characters).