This is not a blogpost about the use of Surface Hub, but only the modern management capabilities and the Microsoft tools to support it.
There is 2 sections in this blogpost:
- Microsoft Active Directory or Azure Active Directory
- Settings management of the SurfaceHub – devided in 3 solutions
- Provisioning profiles
- MDM management with Intune standalone
- MDM management with SCCM
The first thing you need to know about the Surface Hub is running Windows 10 Team – not the same version as on your modern device, laptop or desktop – but Windows 10 Team is based on Windows 10 Enterprise. You can login to Edge, Windows Store and other apps – but credentials are deleted when users press I’m done.
Windows 10 teams does also have a lot of building security feature:
- UEFI Secure Boot
- User Mode Code Integrity (UMCI) with Device Guard
- Application restriction policies using AppLocker
- BitLocker Drive Encryption
- Trusted Platform Module (TPM)
- Windows Defender
- User Account Control (UAC) for access to the Settings app
Surface Hubs are not managed like traditional PCs. Use MDM or provision profiles to configure settings.
The first decision you need to make is do you what to join Surface Hub in Active Directory or in Azure Active Directory. What is the different?
Active Directory:
- Grant admin rights to members of a specified security group in AD.
- Backup the device’s BitLocker recovery key by storing it under the computer object in AD. See Save your BitLocker key for details.
- Synchronize the system clock with the domain controller for encrypted communication
Surface Hub does not support applying group policies or certificates from the domain controller.
Azure Active Directory:
- Grant admin rights to members of Azure AD Global Admin (AzureAD Basis)
- Grant admin rights to a specific user in Azure AD (AzureAD Premium) If you use this option – then all AzureAD joined devices gets the user as an local admin!
- Backup the device’s BitLocker recovery key by storing it under the account that was used to Azure AD join the device. See Save your BitLocker key for details.
- Automatic MDM enrollment in Microsoft Intune (AzureAD Premium)
Surface Hub does not support single sign-on for Windows Store for Business on a AzureAD joined device.
The second decision you need to make is do you what to use MDM or provision profiles to configure your Surface Hub. This is only examples of what you can configure with provision profiles and MDM management.
Provision profiles:
- Use the Windows Imaging and Configuration Designer (ICD) to crate a Provision profile – download the Windows ADK
- The manual process to apply a provision profile on the Surface Hub
- As part of the OOBE
- Full OS in the settings App
- Bulk enrollment works in System Center Configuration Manager (SCCM) + Intune hybrid environment where the ppkg is generated from the SCCM console.
Here is an example for setting a custom WSUS server and change the MaintenanceHours from the default 03 to 01.
Start the ICD
Select Advanced provisioning

Enter a name for your ICD project

Select “Common to Windows 10 Team edition”

Here is a list of the common settings on Windows 10 Team

Go to – WindowsTeamSettings – MaintenanceHours – StartTime
Enter the value to 01 – this change the default value in this case from 03

Go to Rumtime settings – Policies – Update – UpdateServiceUrl
Change the value to match your WSUS server – in my case http://wsus.isddeployment.dk:8530

Save the provision profile and you are ready to use it on your Sureface Hub.
Go to the Settings App – This Device – Device Management – Add or Remove Provisioning package

MDM Management:
- Intune Standalone
- Intune hybrid with System Center Configuration Manager (SCCM)
- On-premises Mobile Device Management in System Center Configuration Manager ( requires SCCM 1602 or newer)
Here is a couple of examples for setting a custom configuration policy with Intune standalone.
Go to : http://manage.microsoft.com
Create a “General Configuration (Windows 10 Team and later)” policy

Enter The settings you need, save and deploy it to your Surface Hub device group.
A new setting is the “Enable Azure Operational Insights” so that the Surface Hub will be monitored by the Surface Hub solutions in Microsoft Operations Management Suite.

And it will show up on the Surface Hub Device

Another example is a “Custom Configuration (Windows 10 Desktop and Mobile and Later)”
Here I will set a home page in the Edge browser and set a my own WSUS server in the Surface Hub.
Go to : http://manage.microsoft.com
Create a “Custom Configuration (Windows 10 Desktop and Mobile and Later)” policy

Enter a name for he policy
Under OMA-URI click add

Enter the value for the policy:
Setting Name:
./vendor/MSFT/Policy/Config/Browser/Homepages
Setting description:
./vendor/MSFT/Policy/Config/Browser/Homepages
Data type:
String
OMA-URI
./vendor/MSFT/Policy/Config/Browser/Homepages
Value:
http://osddeployment.dk

Then create another one to set your WSUS server

Enter the value for the policy:
Setting Name:
./vendor/MSFT/Policy/Config/Update/UpdateServiceUrl
Setting description:
./vendor/MSFT/Policy/Config/Update/UpdateServiceUrl
Data type:
String
OMA-URI
./vendor/MSFT/Policy/Config/Update/UpdateServiceUrl
Value:
http://wsus.osddeployment.dk:8530

Here is the Home pages on Edge changed from Intune

The settings with Intune standalone is the same as in SCCM.
SCCM with Intune hybrid and SCCM with on-premises MDM uses the same wizards, and settings no matter which solutions you choose.
This is a walk through of the same settings as I did on the settings with the Intune standalone.
Go into the SCCM Console – Asset and Compliance
Click Create Configuration Item

Enter a Name
Select “Settings for devices managed without the Configuration Manager Client” – Windows 8.1 and Windows 10
Click Next

Select Windows 10 – All Windows 10 Team and higher
Click Next

Click Next

Enter The settings you need, save and deploy it to your Surface Hub device group.
A new setting is the “Enable Azure Operational Insights” so that the Surface Hub will be monitored by the Surface Hub solutions in Microsoft Operations Management Suite.

Click Next

Click Next

Click Close

Now the CI can be deployed with a Configuration Baseline
Another example is a “Custom Configuration (Windows 10 Desktop and Mobile and Later)”
Here I will set a home page in the Edge browser and set a my own WSUS server in the Surface Hub.
Create a new Configuration Item
Enter a name
Select “Settings for devices managed without the Configuration Manager Client” – Windows 8.1 and Windows 10
Click Next

Here you need to select the Windows 10 section
Click Next

Select “Configure additional settings that are not in the default settings group”
Click Next

Click Add

Click Create Setting

Enter:
Name:
./vendor/MSFT/Policy/Config/Browser/Homepages
Description:
./vendor/MSFT/Policy/Config/Browser/Homepages
Settings type:
OMA-URI
Data type:
String
OMA-URI
./vendor/MSFT/Policy/Config/Browser/Homepages
Click Ok

Click Select

Enter:
Value:
http://osddeployment.dk
Click Ok

Click Select Setting

Enter:
Name:
./vendor/MSFT/Policy/Config/Update/UpdateServiceUrl
Description:
./vendor/MSFT/Policy/Config/Update/UpdateServiceUrl
Settings type:
OMA-URI
Data type:
String
OMA-URI
./vendor/MSFT/Policy/Config/Update/UpdateServiceUrl
Click Ok

Click Select

Enter:
Value:
http://wsus.osddeployment.dk:8530
Click ok

Click Close

Click Next

Click Next

Click Next

Click Close

Now the CI can be deployed with a Configuration Baseline
More settings for Surface Hub CSP https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/surfacehub-csp

Could you please send me the details of Surface hub enrollment to SCCM 1602 with certificate requirements.
Hi. I do not have a guide on who to enable MDM on SCCM – Please take a look at this : https://docs.microsoft.com/en-us/sccm/mdm/understand/manage-mobile-devices-with-on-premises-infrastructure
/Per