Deploying PhishID with Microsoft Intune
  • 14 Aug 2023
  • 2 Minutes to read
  • Dark
    Light

Deploying PhishID with Microsoft Intune

  • Dark
    Light

Article summary

Note
If you are using legacy Win32 applications please review Win32 App Management in Microsoft Intune


Navigate to https://endpoint.microsoft.com/ and go to Apps > Windows.


Click on + Add to add a new application.A white rectangular object with a black and blue line

Description automatically generated

Select Line-of-Business App and then click Select.

A screenshot of a computer

Description automatically generatedA screenshot of a application

Description automatically generated


Click Select App Package File and then click on the blue folder button to open File Explorer. Navigate to where the Pixminstaller.msi is located and select it and then click Open. Press OK when finish.


A screenshot of a computer

Description automatically generated


Review and fill in the following App details. (Lines marked with * are required)


  • Name*: Pixm Phishing Protection (Auto Generated)
  • Description*: Pixm Phishing Protection (Auto Generated)
  • Publisher*: Give a Publisher name.
  • Ignore App Version: No
  • Category: Select an appropriate category for your application
  • Information URL: Optional
  • Privacy Url: Optional
  • Command-line Argument: /qn
  • Developer: Optional
  • Owner: Optional
  • Notes: Optional
  • Logo: Optional


Click Next to start Assigning the Application to Users/Devices


Select the +Add Group in either the Required section or Available for enrolled devices section.

NOTE: Selecting Required will automatically initiate a sync with devices to perform the install.

NOTE: This application installs in the device context so selecting +Add All Users will not function correctly.

A screenshot of a computer

Description automatically generated

Click Next once you have made your assignments.


Review your configuration and click Create to add the application to Intune.


Progress of the Deployment can be reviewed in the Overview section of the specific application.

A screenshot of a computer screen

Description automatically generated


Intune Device Syncing

Once the PIXM Phishing Extension is deployed, Intune will automatically notify the device of its new configuration and request that the device check-in and sync up. This process normally occurs within the first 30 minutes of the deployment. If the device does not automatically sync up during the initial deployment or during the 3 attempts that Intune automatically performs to “force” a sync, the device will inherit its new configuration at its next scheduled check-in.

To perform a manual bulk sync of devices, do the following:

Within the Intune Admin Center (Endpoint Management) navigate to All DevicesA screenshot of a computer

Description automatically generated

Click on Bulk Device Actions

A screenshot of a computer

Description automatically generated



Within the Basics Tab, select the device OSDevice Type, and Device Action, and then Click Next.A screenshot of a computer

Description automatically generated


Select the devices to include in this bulk action and click Next.


Review your selections and click Create.


The PIXM Phishing Extension should be added to Browsers once a device has checked in with Intune and successfully synchronized the new application configuration. 


Uninstalling the PIXM Phishing Extension

Within the Intune Admin Center (Endpoint Management) navigate to Apps > Windows.


Select the PIXM Phishing Extension App.


Click on Properties and then Edit the Assignments.


Click +Add group within the Uninstall section and select the device group(s) you wish to remove the application from. Click Select when finished.


NOTE: Be sure to not have a device in both the Install and Uninstall Group, otherwise the application will remain on the device.A screenshot of a computer

Description automatically generatedA screenshot of a computer

Description automatically generated


Click Review + Save to initiate the uninstall process.

NOTE: This process may take some time and a few device syncs to complete.





Was this article helpful?

ESC

Eddy AI, facilitating knowledge discovery through conversational intelligence