You don't need the source code to use the tool, but you do need signing credentials. For more about signing credentials, see the Intune blog. For the App Wrapping Tool documentation, see Android App Wrapping Tool and iOS App Wrapping Tool. The App Wrapping Tool does not support apps in the Apple App Store or Google Play Store. It also doesn't. Microsoft Win32 Content Prep Tool. The content prep tool allows Intune Administrators to wrap install files for Win32 Applications, and use silent install switches or custom install scripts to install the wrapped application. Solution Breakdown. Intune runs the the Configure.ps1 PowerShell Script (shown below).
- How To Use Intune App Wrapping Tool For Mac Pro
- How To Use Intune App Wrapping Tool For Mac Download
- How To Use Intune App Wrapping Tool For Mac Os
- How To Use Intune App Wrapping Tool For Macbook Pro
Last year I wrote a blog about how to deploy the Citrix Receiver (which is now replaced by the Citrix Workspace app) via Intune. Like described in that blog, the executable consists of 10 MSIs that need to be installed on a Windows 10 device when you are not able to use the store app of Citrix in the Microsoft app store.
The Workspace app download comes as an Installer package (inside an Apple Disk Image) that can be converted into suitable file format with the Microsoft Intune App Wrapping Tool, ready to deploy with Intune. The Citrix Workspace app disk image. Convert the Installer. Instructions for converting a.pkg file to a.intunemac file are outlined in. PKG files that are packaged using different packaging commands may not deploy successfully. DMG files containing more than one APP file are not supported. You will need the Microsoft Intune App Wrapping Tool for macOS to complete the steps in the next section. Follow these instructions to set up the App Wrapping Tool correctly.
With the new Windows app (Win32) app type you are able to deploy more complex Win32 apps via Microsoft Intune. So, the Citrix Receiver is a great app to test the new feature in Microsoft Intune with.
To be able to use this app format you need to wrap the file into a format that is supported by Microsoft Intune. The INTUNEWIN format is a format especially for Microsoft Intune and which allows you to wrap executables or multi file MSI installs, a great addition.
The Intune Win32 App Packaging Tool is the tool to be used to “wrap” the installation files into the INTUNEWIM format. The packaging tool can be downloaded here.
After downloading the packaging tool you need to follow the next steps to package the Citrix Receiver.
- Download the Citrix Receiver 4.12
- Extract the Intune Win32 App Packaging tool and execute the following command;
intunewinapputil -c . -s citrixreceiver.exe -o .
-c = source path with all setup files
-s = setup file for the Citrix Receiver
-o = output path
- After successfully creating the new package we need to add the package to Microsoft Intune, this can be done in the Intune console via https://portal.azure.com > Intune > Client Apps > Apps and click Add.
- First step is to add the App package file citrixreceiver.intunewin, click OK
- Click App information and supply the Name, Description and Publisher as mandatory fields and click OK
- Click Program and supply the following information and click OK:
- Install command: citrixreceiver.exe /silent
- Uninstall command: citrixreceiver.exe /uninstall
- Install behaviour: System
You need to add the command line that allows you to install and uninstall the Citrix Receiver unattended. Of course, this differs per application.
- Click Requirements and supply the Operation System Architecture, Minimum Operation System version, Disk space required (MB), Physical memory required (MB), Minimum number of logical processors required, Minimum CPU speed required (MHz) and click OK.
- Click Detection Rules and supply the way to check if an application is already installed on a device, this can be done via a manual rule by checking the existence of an MSI product code, if a file or folder exists or if a registry key exists. Also, a detection script can be used. After configuring the detection rules, click OK.
- Click Return codes and check if the default return codes are okay and click OK
- Next, click Add to add the app to Intune.
Next you can deploy the app to your Windows 10 devices and you will see that the Citrix Receiver is being installed using the new app you have just created. In the console you can see if the deployments are successful or not.
Comments
Microsoft Defender ATP (MDATP) for macOS hit finally the public preview status. We can now protect our macOS endpoints with cloud based power. I created a little guide about the onboarding process with Microsoft Intune and the user experience.
Prerequisites
From a macOS endpoint perspective:
- macOS version 10.12 (Sierra) or newer
- No third party endpoint protection installed
- At least 1GB of free disk space
- macOS client enrolled in your Intune tenant
If you want to enable macOS enrollment for your Intune tenant - I’ve written a post about the enrollment process.
From a Microsoft 365 perspective:
- Microsoft Defender ATP license (Windows 10 Enterprise E5)
- Intune tenant wit macOS enrollment enabled
- Access to the Microsoft Defender Security Center
- Appropriate user rights to create and assign an Intune device configuration, LOB App
This post assumes that you perform the tasks and file preparation on a macOS machine.
Preparing the onboarding package and files
Access the Microsoft Defender Security Center and gather the installation and onboarding package:
![Pro Pro](https://image.slidesharecdn.com/intune-august212016-160831183047/95/microsoft-intune-empowering-enterprise-mobility-presented-by-atidan-67-638.jpg?cb=1472668449)
To deploy the installation package with Microsoft Intune we need the Intune app wrapping tool for macOS which is available here.
Now you should have these three files:
Open a terminal and perform the following actions:
- Make the IntuneAppUtil executable:
chmod +x IntuneAppUtil
- Generate the Intune deployment package:
./IntuneAppUtil -c wdav.pkg -o . -i 'com.microsoft.wdav'
- Unzip the onboarding package:
unzip WindowsDefenderATPOnboardingPackage.zip
we’ll need the files in the unzipped intune folder later
When you have successfully completed the above steps, the file structure looks like this:
How To Use Intune App Wrapping Tool For Mac Pro
Intune portal configuration
In the Intune portal create a custom device configuration to deploy the Microsoft Defender ATP kext.xml (kernel extension). Upload the kext file from the previously extracted zip file which is located in the Intune folder. These kernel extensions will be loaded into the macOS operating system on boot for the Microsoft Defender ATP service.
For the actual onboarding of the macOS machine to your MDATP tenant we need the onboarding configuration “WindowsDefenderATPOnboarding.xml” which contains encrypted tenant info. You find the file also in the unzipped package in the Intune folder. To deploy this file create another custom device configuration and upload the xml file:
To deploy the Microsoft Defender ATP package create a new LOB (Line-of-business-app) and upload the wrapped *.intunemac file:
Provide the required app information and make sure to set the minimum operation system version to Sierra as mentioned in the prerequisites:
Furthermore make sure that you assign both device configurations and the LOB app to your targeted Azure AD group.
Resultant macOS experience
How To Use Intune App Wrapping Tool For Mac Download
After the device configurations were applied a new icon pops up on your macOS device:
And here’s a snippet of the main app:
How To Use Intune App Wrapping Tool For Mac Os
To end this post here’s the machine view from the MDATP security dashboard:
How To Use Intune App Wrapping Tool For Macbook Pro
Reference: