Any suggestions? Export (0) Print
Expand All

Introduction to VPN Profiles in Configuration Manager


Updated: June 26, 2015

Applies To: System Center 2012 Configuration Manager SP2, System Center 2012 R2 Configuration Manager, System Center 2012 R2 Configuration Manager SP1


The information in this topic applies to System Center 2012 R2 Configuration Manager and System Center 2012 R2 Configuration Manager SP1.

Use VPN profiles in System Center 2012 Configuration Manager to deploy VPN settings to users in your organization. By deploying these settings, you minimize the end-user effort required to connect to resources on the company network.

For example, you want to provision all devices that run the iOS operating system with the settings required to connect to a file share on the corporate network. You can create a VPN profile containing the settings necessary to connect to the corporate network and then deploy this profile to all users that have devices that run iOS in your hierarchy. Users of iOS devices see the VPN connection in the list of available networks and can connect to this network with the minimum of effort.

You can configure the following device types with VPN profiles:

  • Devices that run Windows 8.1 32-bit

  • Devices that run Windows 8.1 64-bit

  • Devices that run Windows RT 8.1

  • Devices that run Windows Phone 8.1


    To support Windows Phone 8.1, you must install the optional Windows Phone 8.1 extension. For information on how to install the extension, see Planning to Use Extensions in Configuration Manager.

  • Devices that run iOS 5, iOS 6, iOS 7 and iOS 8

  • For System Center 2012 R2 Configuration Manager SP1 only: Devices that run Android 4.0 and later


To deploy profiles to iOS, Android, Windows Phone, and enrolled Windows 8.1 devices, these devices must be enrolled into Microsoft Intune. For information about how to get your devices enrolled, see Manage mobile devices with Microsoft Intune.

When you create a VPN profile, you can include a wide range of security settings, including certificates for server validation and client authentication that have been provisioned by using Configuration Manager certificate profiles. For more information about certificate profiles, see Certificate Profiles in Configuration Manager.

© 2016 Microsoft