How to Add a Friendly Name to Configuration Manager Application Catalog Web Portal

In case if you need to hide your server name in Configuration Manager App Catalog or if the default name is too long to remember, you can simply follow the below steps to Add a friendly name to it.

Step- First you must Create a CNAME based on follow screen. You can use any Alias name you prefer for this.

clip_image001

Step 2- Once the CNAME creation completed, make sure to Restart the DNS service.

clip_image002

Step 3- Once the DNS Restart competed, Open the IIS Server in Configuration Manager server and Go to Binding under Default Web Site.

clip_image003

Step 4- Add a New Binding under the Host Name and Type the Same FQDN (Friendly Name) which you mentioned in your CNAME Record.

clip_image004

Step 5-Once the Binding settings done, Restart the IIS service and Open the Configuration Manager Server Console. Remove the existing Application Catalog Website and Change the Web Application Name the way you want and also Change the Netbios Name which going to use for the App Catalog URL.

clip_image005

Step 6- After that, Go to Configuration Manager Agent Settings and Under Computer Agent / Set Website/ Select the NetBios Name and Save the Client Settings. Once that is completed, manually push the Computer Policies to the device collections.

clip_image006

Step 7- After a while verify the URL works with new name.

clip_image007

Advertisements

How to Resolve Sync Error in Windows Store for Business in Configuration Manager

If you are experiencing the Sync Failed error in Windows Store For Business in Configuration Manager as shown in below, kindly verify with the WsfbSyncWorker.log. Based on that you can resolve the error.

For an example you can refer the below scenario.

 

image

Step- Check the Log file and filter the error you are seeing, In my example it is about permission,

image

Step- Verify the Windows App store local folder has the enough write or not, Once it is confirmed, Re-Sync and verify

image

image

Step- Once the Sync Completed, you must visible your apps as below.

 

image

How to Add Windows Store for Business Portal in to Configuration Manager

Hi Everyone,

This article describe you, how you do the integration of Windows Store For Business with your existing Configuration manager server.

Step 1- First make sure the Windows Store For Business Integration feature is Enabled. If not Kindly Enable it indicated in below screen shot.

clip_image002

Step 1- Login to Azure Portal and Select Applications Pillar and Select Add option.

clip_image003

Step 2- Select Add an Application my organization is developing.

clip_image004

Step 3- Then enter a Name and select Web Application and/or Web API. Click Next

clip_image005

Step 4- In the next b, Enter the same URL under the Sign-on URL and App ID URI sections. This can be any URL and does not need to actually resolve to an external address.

image

Step 5- Once the Sigviewn-On URL and APP ID URI have been verified, complete the wizard. Now we will need to create a client key in Azure Active Directory for the registered management tool. Choose the application that you just created in the previous steps, and click Configure.

image

Step 6- Then Under the Keys section, select a duration from the list and Save. This will create a new client key. Ensure that the configuration for the application is successfully updated with the key before moving on.

image

Step 7- On this step, we will need to add Configuration Manager as a management tool in the Windows Store for Business.

Browse to https://businessstore.microsoft.com/en-us/managementtools and sign in.

clip_image009

Step 8- Then, Under the Management Tools section, choose Add a Management Tool.

clip_image010

Step 9- Kindly Note that only one management tool can be active at a time. Therefore, if you already have another management tool activated, it will need to be deactivated before going through the next steps.

Once that is confirmed, You will see box which says Search for tool by name. Type in the name of the application you created in Azure Active Directory in the previous steps and click Add.

clip_image011

Step 10- After that Click Activate next to the application that was just imported.

clip_image012

Step 11- When you click activate, you will be prompted to Show offline-licensed apps. Click Yes in case if you plan to deploy Offline applications.

clip_image013

Step 12- Also Make sure to add any sample app to you Windows Business Store to test out the deployment of the app. For that You can use the Shop option and add the app which you want.

clip_image014

Step 13- Once that is added, to verify Click Manage / Inventory and verify the App is available.

clip_image015

Step 14- Once the above setting are done, next we need to configure the Configuration Manager settings for Business Store.

Go to Administration – Cloud Services – Windows Store for Business. Choose the option to Add Windows Store for Business Account.

clip_image016

Step 15- On the General Page Click Next to continue

clip_image017

Step 16- On the Configuration Page fill the required fields.

clip_image018

Step 17- Once you verify the settings, in Next menu Select the Language and Click Next

clip_image019

Step 18- On the Summary Click Next and Finish the Windows Store for Business adding.

image

image

Step 19- Once That is done, Create Package using the Software Library and Push to the Devices.

clip_image022

Data Classification Using Azure Information Protection

Hi Everyone,

I have done a Video, which talk about, How we enable the Azure Information Protection for Data Classification ? Also How the rights Management protect those data. In the video, I have demonstrated all the steps which you need to carry out in order to Classify the data and Protect the data. The Data Classification is Enabled for Automatic Method. Kindly Click the Below URL to watch the Video.

Link- https://youtu.be/dTnw8nLM_ew

 

Thanks for Watching.

How to Protect Documents and Emails Using Microsoft Azure Rights Management- Part 1

In this scenario, I am going to use Microsoft Rights Management feature which includes in the Enterprise Mobility & Security. (EMS+S). So in the article, I will show you how you enable the Rights Management in your Azure tenant and create the templates and also apply it to users.

Step 1- Login in to you Azure Tenant using https://portal.azure.com

clip_image001

Step 2- Go to More Services and on the Filter filed, Type Rights Management as shown below. Click Rights Management.

clip_image002

Step 3- On the Active Directory Section, Select Rights Management and Enable it if not yet enabled.

clip_image003

Step 4- Click the Rights Management Status Inactive and on the bottom of the page, you will see the Active Button. Click the Active Button and Press Yes to Activate the Rights Management for your Azure Tenant.

clip_image004

Step 5- Once you Activate the Right Management, Click the Name of your tenant name under Right Management view. This will take you to the page where you need to configure the Templates for the Rights Management.

clip_image005

Step 6- By default under Templates, there will be Two Default Templates Namely, “Confidential” and “Confidential View”. However, since we need to create a Custom Template, Click Add Tab on the Bottom to Start creation of New Custom Template for Rights Management.

clip_image006

Step 7- Select the Language and Type the Name for the Template and a Description.

clip_image007

Step 8- Once you Key in the details and Apply, You will see the New Template You Just created as below. In this example, the test template I am using Rights Management – Read Only.

clip_image008

Step 9- Next we need to configure the Template Rights, Scope and rest of the settings. Click the Template Name you just Created. Click Get Started to Complete the rest of the Configurations.

clip_image009

Step 10- In this example, I am going to assign only Read Only Rights to the Document. Basically it means View Only and the users can’t do any modification to the document your share.

clip_image010

Step 11- On the Select Users And Groups menu, you can Select a User Group or Individual/Multiple Users to this template. So In my case, I am going to select only 2 Users in to this template.

clip_image011

Step 12- Click the Arrow Icon to Go to the Next Configuration which is assigning the Rights. So here I am not going to use any Default Rights Containers available. Instead of that, I will select Custom and Assign the View Only Right.

clip_image012

Step 13- Click Arrow Key to Go to Configuration Stage 3 and Under Rights Menu, I Selected the “View Content” option only and Completed the Rights assigning Part and adding User to it.

clip_image013

clip_image014

Step 14- Keep in mind that the Author of the Document Always has Full Rights to the documents he initiated.

clip_image014[1]

Step 15- Click “Scope” Tab to make this Template Visible to which users you want and Click “Get Started Now” to do the configuration for Scope.

clip_image015

Step 16- In “Scope” also you can assign it to Users or Groups. So in my case I am going to apply it to the same 2 Users which I selected on the Right assigning part and Completed the Scope assigning part.

clip_image016

Step 17- Once it Completed, Enabled the Application Compatibility Mode to users because some applications cannot yet support user identity to determine whether to display a template. For these applications, use the check box to choose whether all users see the template or no users see the template.

clip_image017

Step 18- On the Configuration Part which is the Final part of the Template Completion, Set the Options as your preferred, such as Document Access Offline With/Without Internet and the Expiration Date of the Document Access., Re and Finally Published it, so Users will be able to see the New Template from their devices.

Once Everything is Finalized Make it Publish and Save.

clip_image018

clip_image019

On the Part Two of How to protect documents using Microsoft Azure Rights Management, I will show you how we access the apps using Windows Machine, Apple iPAD, MAC Book and Android Phone.

Thanks.