diff --git a/.github/workflows/BuildValidation.yml b/.github/workflows/BuildValidation.yml new file mode 100644 index 00000000000..e57844b453a --- /dev/null +++ b/.github/workflows/BuildValidation.yml @@ -0,0 +1,21 @@ +name: PR has no warnings or errors + +permissions: + pull-requests: write + statuses: write + +on: + issue_comment: + types: [created] + +jobs: + + build-status: + uses: MicrosoftDocs/microsoft-365-docs/.github/workflows/Shared-BuildValidation.yml@workflows-prod + with: + PayloadJson: ${{ toJSON(github) }} + secrets: + AccessToken: ${{ secrets.GITHUB_TOKEN }} + + + diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index 548791d9752..7d9834094cd 100644 --- a/.openpublishing.redirection.json +++ b/.openpublishing.redirection.json @@ -4,7 +4,7 @@ "source_path": "memdocs/intune/enrollment/chrome-enterprise-device-details.md", "redirect_url": "/mem/intune/remote-actions/chrome-enterprise-device-details", "redirect_document_id": true - }, + }, { "source_path": "memdocs/intune/enrollment/chrome-enterprise-remote-actions.md", "redirect_url": "/mem/intune/remote-actions/chrome-enterprise-remote-actions", @@ -14,27 +14,27 @@ "source_path": "memdocs/intune/user-help/sso-dialog-faqs.yml", "redirect_url": "https://support.microsoft.com/topic/a6505ceb-1a20-4b15-889c-250175481506", "redirect_document_id": false - }, + }, { "source_path": "memdocs/intune/user-help/you-need-to-resolve-a-threat-found-by-zips-android.md", "redirect_url": "/mem/intune/user-help/set-up-mobile-threat-defense", "redirect_document_id": false - }, + }, { "source_path": "memdocs/intune/user-help/you-need-to-resolve-a-threat-found-by-checkpoint-android.md", "redirect_url": "/mem/intune/user-help/set-up-mobile-threat-defense", "redirect_document_id": false - }, + }, { "source_path": "memdocs/intune/user-help/you-need-to-resolve-a-threat-found-by-skycure-android.md", "redirect_url": "/mem/intune/user-help/set-up-mobile-threat-defense", "redirect_document_id": false - }, + }, { "source_path": "memdocs/intune/user-help/you-need-to-resolve-a-threat-found-by-lookout-for-work-android.md", "redirect_url": "/mem/intune/user-help/set-up-mobile-threat-defense", "redirect_document_id": false - }, + }, { "source_path": "memdocs/intune/user-help/you-need-to-resolve-a-threat-found-by-zips-ios.md", "redirect_url": "/mem/intune/user-help/set-up-mobile-threat-defense", @@ -2735,7 +2735,7 @@ "redirect_url": "/windows-365/enterprise/requirements-omnissa-horizon", "redirect_document_id": false }, - { + { "source_path": "memdocs/configmgr/core/clients/manage/monitor-windows-analytics.md", "redirect_url": "/mem/configmgr/core/clients/manage/upgrade-readiness#bkmk_remove", "redirect_document_id": false @@ -2774,6 +2774,71 @@ "source_path": "memdocs/intune/protect/endpoint-security-firewall-rule-tool.md", "redirect_url": "/mem/intune/protect/endpoint-security-firewall-policy", "redirect_document_id": false + }, + { + "source_path": "windows-365/link/conditional-access-policies-synchronize.md", + "redirect_url": "/windows-365/link/conditional-access-policies", + "redirect_document_id": false + }, + { + "source_path": "windows-365/business/troubleshoot-windows-365-business.md", + "redirect_url": "/troubleshoot/windows-365/troubleshoot-windows-365-business", + "redirect_document_id": false + }, + { + "source_path": "windows-365/business/known-issues.md", + "redirect_url": "/troubleshoot/windows-365/known-issues", + "redirect_document_id": false + }, + { + "source_path": "windows-365/enterprise/known-issues-enterprise.md", + "redirect_url": "/troubleshoot/windows-365/known-issues-enterprise", + "redirect_document_id": false + }, + { + "source_path": "windows-365/enterprise/troubleshoot-azure-network-connection.md", + "redirect_url": "/troubleshoot/windows-365/troubleshoot-azure-network-connection", + "redirect_document_id": false + }, + { + "source_path": "windows-365/enterprise/health-checks.md", + "redirect_url": "/troubleshoot/windows-365/health-checks", + "redirect_document_id": false + }, + { + "source_path": "windows-365/enterprise/connection-errors.md", + "redirect_url": "/troubleshoot/windows-365/connection-errors", + "redirect_document_id": false + }, + { + "source_path": "windows-365/enterprise/provisioning-errors.md", + "redirect_url": "/troubleshoot/windows-365/provisioning-errors", + "redirect_document_id": false + }, + { + "source_path": "windows-365/enterprise/troubleshoot-partner-connector.md", + "redirect_url": "/troubleshoot/windows-365/troubleshoot-partner-connector", + "redirect_document_id": false + }, + { + "source_path": "windows-365/enterprise/troubleshoot-windows-365-app.md", + "redirect_url": "/troubleshoot/windows-365/troubleshoot-windows-365-app", + "redirect_document_id": false + }, + { + "source_path": "windows-365/enterprise/troubleshoot-windows-365-boot.md", + "redirect_url": "/troubleshoot/windows-365/troubleshoot-windows-365-boot", + "redirect_document_id": false + }, + { + "source_path": "windows-365/enterprise/windows-365-boot-known-issues.md", + "redirect_url": "/troubleshoot/windows-365/windows-365-boot-known-issues", + "redirect_document_id": false + }, + { + "source_path": "windows-365/enterprise/windows-365-switch-known-issues.md", + "redirect_url": "/troubleshoot/windows-365/windows-365-switch-known-issues", + "redirect_document_id": false } ] } \ No newline at end of file diff --git a/README.md b/README.md index 969615f66db..1731ae3740e 100644 --- a/README.md +++ b/README.md @@ -6,7 +6,7 @@ Anyone who is interested can contribute to the topics. When you contribute, your ### Quickly update an article using GitHub.com -Contributors who only make infrequent or small updates can edit the file directly on GitHub.com without having to install any additional software. This article shows you how. [This two-minute video](https://www.microsoft.com/videoplayer/embed/RE1XQTG) also covers how to contribute. +Contributors who only make infrequent or small updates can edit the file directly on GitHub.com without having to install any additional software. This article shows you how. [This two-minute video](https://learn-video.azurefd.net/vod/player?id=b5167c5a-9c69-499b-99ac-e5467882bc92) also covers how to contribute. 1. Make sure you're signed in to GitHub.com with your GitHub account. 2. Browse to the page you want to edit on Microsoft Learn. diff --git a/autopilot/device-preparation/faq.yml b/autopilot/device-preparation/faq.yml index 2fa2b7d4887..3f0c7a2b7ce 100644 --- a/autopilot/device-preparation/faq.yml +++ b/autopilot/device-preparation/faq.yml @@ -9,7 +9,7 @@ metadata: ms.author: frankroj ms.reviewer: jubaptis manager: aaroncz - ms.date: 07/29/2024 + ms.date: 11/25/2024 ms.collection: - M365-modern-desktop - highpri @@ -74,7 +74,7 @@ sections: - question: | How do users know when the required setup is complete? answer: | - Many users aren't sure when the provisioning process is complete. To help mitigate confusion and calls to support, we added a completion page in OOBE. Administrators can configure the page to require a user to manually select **Continue** or set the page to auto-continue. This message lets the user know that OOBE setup is complete. However, additional installations that were assigned to the device group but not specified in the Windows Autopilot device preparation policy might still be occurring in the background. + Many users aren't sure when the provisioning process is complete. To help mitigate confusion and calls to support, we added a completion page in OOBE. The completion page lets the user know that OOBE setup is complete. However, additional installations that were assigned to the device group but not specified in the Windows Autopilot device preparation policy might still be occurring in the background. - question: | Can Windows Autopilot Device preparation be used by non-Microsoft mobile device management (MDM) providers? diff --git a/autopilot/device-preparation/known-issues.md b/autopilot/device-preparation/known-issues.md index 0b8f77b53bb..301dfe99936 100644 --- a/autopilot/device-preparation/known-issues.md +++ b/autopilot/device-preparation/known-issues.md @@ -8,7 +8,7 @@ author: frankroj ms.author: frankroj ms.reviewer: jubaptis manager: aaroncz -ms.date: 10/18/2024 +ms.date: 01/06/2025 ms.collection: - M365-modern-desktop - highpri @@ -40,14 +40,26 @@ This article describes known issues that can often be resolved with: ## Known issues -## Deployments fail when Managed installer policy is enabled for the tenant +## Exporting logs during the out-of-box experience (OOBE) doesn't show result -Date added: *October 10, 2024*
-Date updated: *October 18, 2024* +Date added: *January 6, 2025* + +When a failure occurs during the provisioning process, an **Export logs** option is displayed to the user. When selected, it saves the file to the first USB drive on the device without displaying the browse dialog. The browse dialog isn't displayed for security reasons. Currently, users don't see failure or success messages to indicate the logs were saved. This issue will be fixed in the future. + +## Apps and scripts tabs don't display properly when editing the Windows Autopilot device preparation profile + +Date added: *December 18, 2024* -When the [Managed installer policy](/mem/intune/protect/endpoint-security-app-control-policy#managed-installer) is **Active** for a tenant and Win32 apps are selected in the Windows Autopilot device preparation policy, Windows Autopilot device preparation deployments fails. The issue is being investigated. +During the editing flow of the Windows Autopilot device preparation policy, there's a known issue when displaying the **Applications** and **Scripts** tabs where the tabs might display incorrect information. For example, under the **Scripts** tab, a list of applications might be shown instead of a list of scripts. The issue is impacting only the view in Microsoft Intune and not the configuration being applied to the device. The issue is being investigated. + +As a workaround, select the table header **Allowed Applications** or **Allowed Scripts** to reload the table's contents. + +## Win32 and WinGet applications are skipped when Managed installer policy is enabled for the tenant + +Date added: *October 10, 2024*
+Date updated: *November 15, 2024* -As a workaround, remove Win32 applications from the list of selected apps in all device preparation policies. +When the [Managed installer policy](/mem/intune/protect/endpoint-security-app-control-policy#managed-installer) is **Active** for a tenant, Win32 apps and Microsoft Store apps aren't delivered during OOBE. The apps are instead installed after the device gets to the Desktop and the Managed installer policy is delivered. The [Windows Autopilot device preparation deployment status report](whats-new.md#windows-autopilot-device-preparation-deployment-status-report-available-in-the-monitor-tab-under-enrollment) reports the apps as **Skipped.** For more information, see [Known issue: Windows Autopilot device preparation with Win32 apps and managed installer policy](https://techcommunity.microsoft.com/t5/intune-customer-success/known-issue-windows-autopilot-device-preparation-with-win32-apps/ba-p/4273286). diff --git a/autopilot/device-preparation/overview.md b/autopilot/device-preparation/overview.md index 387220a75ff..c2b9974a453 100644 --- a/autopilot/device-preparation/overview.md +++ b/autopilot/device-preparation/overview.md @@ -8,7 +8,7 @@ author: frankroj ms.author: frankroj ms.reviewer: jubaptis manager: aaroncz -ms.date: 06/03/2024 +ms.date: 01/14/2025 ms.topic: overview ms.collection: - M365-modern-desktop @@ -134,7 +134,9 @@ For more information, see [Enrollment time grouping in Microsoft Intune](/mem/in ### Corporate identifiers for Windows -Windows Autopilot device preparation supports the Intune corporate identifier enrollment feature. Corporate identifiers in Intune allows pre-uploading of Windows device identifiers (serial number, manufacturer, model) and ensures only trusted devices go through Windows Autopilot device preparation. Corporate identifiers for Windows is optional for Windows Autopilot device preparation. Corporate identifiers for Windows isn't required for a Windows Autopilot device preparation deployment to work. For more information, see: +Windows Autopilot device preparation supports the Intune corporate identifier enrollment feature. Corporate identifiers in Intune allows pre-uploading of Windows device identifiers (serial number, manufacturer, model) and ensures only trusted devices go through Windows Autopilot device preparation. + +Windows Autopilot device preparation only requires corporate identifiers for Windows if Intune enrollment restrictions are being used to block personal device enrollments. For more information, see: - [Identify devices as corporate-owned](/mem/intune/enrollment/corporate-identifiers-add). - [What are enrollment restrictions?](/mem/intune/enrollment/enrollment-restrictions-set). diff --git a/autopilot/device-preparation/requirements.md b/autopilot/device-preparation/requirements.md index 5c8ed256946..122711eb4ce 100644 --- a/autopilot/device-preparation/requirements.md +++ b/autopilot/device-preparation/requirements.md @@ -6,9 +6,9 @@ ms.subservice: autopilot ms.localizationpriority: medium author: frankroj ms.author: frankroj -ms.reviewer: jubaptis +ms.reviewer: madakeva manager: aaroncz -ms.date: 09/05/2024 +ms.date: 01/24/2025 ms.collection: - M365-modern-desktop - highpri @@ -54,6 +54,7 @@ Windows Autopilot device preparation depends on specific features available in W #### Windows 11 +- Windows 11, version 24H2 or later - Windows 11, version 23H2 with [KB5035942](https://support.microsoft.com/topic/march-26-2024-kb5035942-os-builds-22621-3374-and-22631-3374-preview-3ad9affc-1a91-4fcb-8f98-1fe3be91d8df) or later - Windows installation media dated April 2024 or later has [KB5035942](https://support.microsoft.com/topic/march-26-2024-kb5035942-os-builds-22621-3374-and-22631-3374-preview-3ad9affc-1a91-4fcb-8f98-1fe3be91d8df) included. - Windows 11, version 22H2 with [KB5035942](https://support.microsoft.com/topic/march-26-2024-kb5035942-os-builds-22621-3374-and-22631-3374-preview-3ad9affc-1a91-4fcb-8f98-1fe3be91d8df) or later - Windows installation media dated April 2024 or later has [KB5035942](https://support.microsoft.com/topic/march-26-2024-kb5035942-os-builds-22621-3374-and-22631-3374-preview-3ad9affc-1a91-4fcb-8f98-1fe3be91d8df) included. @@ -69,6 +70,7 @@ The following editions are supported: - Windows 11 Pro for Workstations. - Windows 11 Enterprise. - Windows 11 Education. +- [Windows 11 Enterprise LTSC](/windows/whats-new/ltsc/overview). ## [:::image type="icon" source="../images/icons/wifi-ethernet-18.svg"::: **Networking**](#tab/networking) diff --git a/autopilot/device-preparation/tutorial/user-driven/entra-join-allow-users-to-join.md b/autopilot/device-preparation/tutorial/user-driven/entra-join-allow-users-to-join.md index 05b23e1c343..6dc54bd8cbf 100644 --- a/autopilot/device-preparation/tutorial/user-driven/entra-join-allow-users-to-join.md +++ b/autopilot/device-preparation/tutorial/user-driven/entra-join-allow-users-to-join.md @@ -7,7 +7,7 @@ author: frankroj ms.author: frankroj ms.reviewer: jubaptis manager: aaroncz -ms.date: 06/03/2024 +ms.date: 01/14/2025 ms.topic: tutorial ms.collection: - tier1 @@ -31,7 +31,7 @@ Windows Autopilot device preparation user-driven Microsoft Entra join steps: - Step 4: [Create a user group](entra-join-user-group.md) - Step 5: [Assign applications and PowerShell scripts to device group](entra-join-assign-apps-scripts.md) - Step 6: [Create Windows Autopilot device preparation policy](entra-join-autopilot-policy.md) -- Step 7: [Add Windows corporate identifier to device (optional)](entra-join-corporate-identifier.md) +- Step 7: [Add Windows corporate identifier to device](entra-join-corporate-identifier.md) For an overview of the Windows Autopilot device preparation user-driven Microsoft Entra join workflow, see [Windows Autopilot device preparation user-driven Microsoft Entra join overview](entra-join-workflow.md#workflow). diff --git a/autopilot/device-preparation/tutorial/user-driven/entra-join-assign-apps-scripts.md b/autopilot/device-preparation/tutorial/user-driven/entra-join-assign-apps-scripts.md index 311d3de1724..cbb39fc1082 100644 --- a/autopilot/device-preparation/tutorial/user-driven/entra-join-assign-apps-scripts.md +++ b/autopilot/device-preparation/tutorial/user-driven/entra-join-assign-apps-scripts.md @@ -7,7 +7,7 @@ author: frankroj ms.author: frankroj ms.reviewer: jubaptis manager: aaroncz -ms.date: 06/03/2024 +ms.date: 01/14/2025 ms.topic: tutorial ms.collection: - tier1 @@ -31,7 +31,7 @@ Windows Autopilot device preparation user-driven Microsoft Entra join steps: > - **Step 5: Assign applications and PowerShell scripts to device group** - Step 6: [Create Windows Autopilot device preparation policy](entra-join-autopilot-policy.md) -- Step 7: [Add Windows corporate identifier to device (optional)](entra-join-corporate-identifier.md) +- Step 7: [Add Windows corporate identifier to device](entra-join-corporate-identifier.md) For an overview of the Windows Autopilot device preparation user-driven Microsoft Entra join workflow, see [Windows Autopilot device preparation user-driven Microsoft Entra join overview](entra-join-workflow.md#workflow). diff --git a/autopilot/device-preparation/tutorial/user-driven/entra-join-automatic-enrollment.md b/autopilot/device-preparation/tutorial/user-driven/entra-join-automatic-enrollment.md index 25c5aaa1004..3706e673c3e 100644 --- a/autopilot/device-preparation/tutorial/user-driven/entra-join-automatic-enrollment.md +++ b/autopilot/device-preparation/tutorial/user-driven/entra-join-automatic-enrollment.md @@ -7,7 +7,7 @@ author: frankroj ms.author: frankroj ms.reviewer: jubaptis manager: aaroncz -ms.date: 06/03/2024 +ms.date: 01/14/2025 ms.topic: tutorial ms.collection: - tier1 @@ -30,7 +30,7 @@ Windows Autopilot device preparation user-driven Microsoft Entra join steps: - Step 4: [Create a user group](entra-join-user-group.md) - Step 5: [Assign applications and PowerShell scripts to device group](entra-join-assign-apps-scripts.md) - Step 6: [Create Windows Autopilot device preparation policy](entra-join-autopilot-policy.md) -- Step 7: [Add Windows corporate identifier to device (optional)](entra-join-corporate-identifier.md) +- Step 7: [Add Windows corporate identifier to device](entra-join-corporate-identifier.md) For an overview of the Windows Autopilot device preparation user-driven Microsoft Entra join workflow, see [Windows Autopilot device preparation user-driven Microsoft Entra join overview](entra-join-workflow.md#workflow). diff --git a/autopilot/device-preparation/tutorial/user-driven/entra-join-autopilot-policy.md b/autopilot/device-preparation/tutorial/user-driven/entra-join-autopilot-policy.md index 8f6d1e4393f..6f555aecceb 100644 --- a/autopilot/device-preparation/tutorial/user-driven/entra-join-autopilot-policy.md +++ b/autopilot/device-preparation/tutorial/user-driven/entra-join-autopilot-policy.md @@ -7,7 +7,7 @@ author: frankroj ms.author: frankroj ms.reviewer: jubaptis manager: aaroncz -ms.date: 06/28/2024 +ms.date: 01/14/2025 ms.topic: tutorial ms.collection: - tier1 @@ -31,7 +31,7 @@ Windows Autopilot device preparation user-driven Microsoft Entra join steps: > > - **Step 6: Create Windows Autopilot device preparation policy** -- Step 7: [Add Windows corporate identifier to device (optional)](entra-join-corporate-identifier.md) +- Step 7: [Add Windows corporate identifier to device](entra-join-corporate-identifier.md) For an overview of the Windows Autopilot device preparation user-driven Microsoft Entra join workflow, see [Windows Autopilot device preparation user-driven Microsoft Entra join overview](entra-join-workflow.md#workflow). @@ -172,11 +172,11 @@ In the **Configuration settings** page: If multiple Windows Autopilot device preparation polices are deployed to a user, the policy with the highest priority as displayed in the **Home** > **Enroll devices | Windows enrollment** > **Device preparation policies** screen gets priority. The policy with the highest priority is higher in the list and has the smallest number under the **Priority** column. To change a policy's priority, move it in the list by dragging the policy within the list. -## Next step: Add Windows corporate identifier to device (optional) +## Next step: Add Windows corporate identifier to device > [!div class="nextstepaction"] -> [Step 7: Add Windows corporate identifier to device (optional)](entra-join-corporate-identifier.md) +> [Step 7: Add Windows corporate identifier to device](entra-join-corporate-identifier.md) > [!NOTE] > -> Adding a [corporate identifier](../../overview.md#corporate-identifiers-for-windows) to the device is an optional step. If corporate identifiers aren't being used, then the next step is to deploy the device. +> Windows Autopilot device preparation only requires [corporate identifiers for Windows](../../overview.md#corporate-identifiers-for-windows) if Intune enrollment restrictions are being used to block personal device enrollments. If Intune enrollment restrictions aren't being used to block personal device enrollments, then the next step is to deploy the device. diff --git a/autopilot/device-preparation/tutorial/user-driven/entra-join-corporate-identifier.md b/autopilot/device-preparation/tutorial/user-driven/entra-join-corporate-identifier.md index de805257695..825908511f9 100644 --- a/autopilot/device-preparation/tutorial/user-driven/entra-join-corporate-identifier.md +++ b/autopilot/device-preparation/tutorial/user-driven/entra-join-corporate-identifier.md @@ -1,13 +1,13 @@ --- -title: Windows Autopilot device preparation user-driven Microsoft Entra join - Step 7 of 7 - Add Windows corporate identifier to device (optional) -description: How to - Windows Autopilot device preparation user-driven Microsoft Entra join - Step 7 of 7 - Add optional Windows corporate identifier to device. +title: Windows Autopilot device preparation user-driven Microsoft Entra join - Step 7 of 7 - Add Windows corporate identifier to device +description: How to - Windows Autopilot device preparation user-driven Microsoft Entra join - Step 7 of 7 - Add Windows corporate identifier to device. ms.service: windows-client ms.localizationpriority: medium author: frankroj ms.author: frankroj ms.reviewer: jubaptis manager: aaroncz -ms.date: 06/03/2024 +ms.date: 01/14/2025 ms.topic: tutorial ms.collection: - tier1 @@ -17,7 +17,7 @@ appliesto: - ✅ Windows 11 --- -# Windows Autopilot device preparation user-driven Microsoft Entra join: Add Windows corporate identifier to device (optional) +# Windows Autopilot device preparation user-driven Microsoft Entra join: Add Windows corporate identifier to device Windows Autopilot device preparation user-driven Microsoft Entra join steps: @@ -30,15 +30,17 @@ Windows Autopilot device preparation user-driven Microsoft Entra join steps: > [!div class="checklist"] > -> - **Step 7: Add Windows corporate identifier to device (optional)** +> - **Step 7: Add Windows corporate identifier to device** For an overview of the Windows Autopilot device preparation user-driven Microsoft Entra join workflow, see [Windows Autopilot device preparation user-driven Microsoft Entra join overview](entra-join-workflow.md#workflow). -## Add Windows corporate identifier to device +## Add Windows corporate identifier for devices -Corporate identifiers in Intune allows pre-uploading of Windows device identifiers (serial number, manufacturer, model) and ensures only trusted devices go through Windows Autopilot device preparation. This feature is optional for Windows Autopilot device preparation and isn't required for a Windows Autopilot device preparation deployment to work. +Corporate identifiers in Intune allows pre-uploading of Windows device identifiers (serial number, manufacturer, model) and ensures only trusted Windows devices can be enrolled in Intune. If Intune enrollment restrictions are being used to block personal device enrollments, corporate identifiers need to be uploaded for all devices that are enrolled through Windows Autopilot device preparation before deployment. To add corporate identifier for devices in Intune, see [Add Windows corporate identifiers](/mem/intune/enrollment/corporate-identifiers-add#add-windows-corporate-identifiers). -If corporate identifiers aren't being used, then proceed with deploying the device. Otherwise, to add a corporate identifier to the device in Intune, see [Add Windows corporate identifiers](/mem/intune/enrollment/corporate-identifiers-add#add-windows-corporate-identifiers). +> [!IMPORTANT] +> +> This step of adding Windows corporate identifiers for devices is specific to Intune enrollments and isn't required if personal devices aren't being blocked in the environment. If personal devices aren't being blocked in the environment, this step can be skipped. The next step would instead be to deploy the device. For more information, see: @@ -46,4 +48,4 @@ For more information, see: - [What are enrollment restrictions?](/mem/intune/enrollment/enrollment-restrictions-set). - [Create device platform restrictions](/mem/intune/enrollment/create-device-platform-restrictions). -Once the corporate identifier is added to the device, then proceed with deploying the device. +Once the corporate identifier is added for the device, then proceed with deploying the device. diff --git a/autopilot/device-preparation/tutorial/user-driven/entra-join-device-group.md b/autopilot/device-preparation/tutorial/user-driven/entra-join-device-group.md index 11a8c61fa98..6cb3d4883c8 100644 --- a/autopilot/device-preparation/tutorial/user-driven/entra-join-device-group.md +++ b/autopilot/device-preparation/tutorial/user-driven/entra-join-device-group.md @@ -7,7 +7,7 @@ author: frankroj ms.author: frankroj ms.reviewer: jubaptis manager: aaroncz -ms.date: 06/03/2024 +ms.date: 01/14/2025 ms.topic: tutorial ms.collection: - tier1 @@ -31,7 +31,7 @@ Windows Autopilot device preparation user-driven Microsoft Entra join steps: - Step 4: [Create a user group](entra-join-user-group.md) - Step 5: [Assign applications and PowerShell scripts to device group](entra-join-assign-apps-scripts.md) - Step 6: [Create Windows Autopilot device preparation policy](entra-join-autopilot-policy.md) -- Step 7: [Add Windows corporate identifier to device (optional)](entra-join-corporate-identifier.md) +- Step 7: [Add Windows corporate identifier to device](entra-join-corporate-identifier.md) For an overview of the Windows Autopilot device preparation user-driven Microsoft Entra join workflow, see [Windows Autopilot device preparation user-driven Microsoft Entra join overview](entra-join-workflow.md#workflow). diff --git a/autopilot/device-preparation/tutorial/user-driven/entra-join-user-group.md b/autopilot/device-preparation/tutorial/user-driven/entra-join-user-group.md index 8471217c2d7..c252a0062e4 100644 --- a/autopilot/device-preparation/tutorial/user-driven/entra-join-user-group.md +++ b/autopilot/device-preparation/tutorial/user-driven/entra-join-user-group.md @@ -7,7 +7,7 @@ author: frankroj ms.author: frankroj ms.reviewer: jubaptis manager: aaroncz -ms.date: 06/03/2024 +ms.date: 01/14/2025 ms.topic: tutorial ms.collection: - tier1 @@ -31,7 +31,7 @@ Windows Autopilot device preparation user-driven Microsoft Entra join steps: - Step 5: [Assign applications and PowerShell scripts to device group](entra-join-assign-apps-scripts.md) - Step 6: [Create Windows Autopilot device preparation policy](entra-join-autopilot-policy.md) -- Step 7: [Add Windows corporate identifier to device (optional)](entra-join-corporate-identifier.md) +- Step 7: [Add Windows corporate identifier to device](entra-join-corporate-identifier.md) For an overview of the Windows Autopilot device preparation user-driven Microsoft Entra join workflow, see [Windows Autopilot device preparation user-driven Microsoft Entra join overview](entra-join-workflow.md#workflow). diff --git a/autopilot/device-preparation/tutorial/user-driven/entra-join-workflow.md b/autopilot/device-preparation/tutorial/user-driven/entra-join-workflow.md index 5a895179283..5c3b275fe76 100644 --- a/autopilot/device-preparation/tutorial/user-driven/entra-join-workflow.md +++ b/autopilot/device-preparation/tutorial/user-driven/entra-join-workflow.md @@ -7,7 +7,7 @@ author: frankroj ms.author: frankroj ms.reviewer: jubaptis manager: aaroncz -ms.date: 09/13/2024 +ms.date: 01/14/2025 ms.topic: tutorial ms.collection: - tier1 @@ -83,7 +83,7 @@ The following steps are needed to configure and then perform a Windows Autopilot > - Step 4: [Create a user group](entra-join-user-group.md) > - Step 5: [Assign applications and PowerShell scripts to device group](entra-join-assign-apps-scripts.md) > - Step 6: [Create Windows Autopilot device preparation policy](entra-join-autopilot-policy.md) -> - Step 7: [Add Windows corporate identifier to device (optional)](entra-join-corporate-identifier.md) +> - Step 7: [Add Windows corporate identifier to device](entra-join-corporate-identifier.md) > [!NOTE] > diff --git a/autopilot/dfci-management.md b/autopilot/dfci-management.md index 361abc4aa14..ce0e2f4c3aa 100644 --- a/autopilot/dfci-management.md +++ b/autopilot/dfci-management.md @@ -56,7 +56,7 @@ See the following figure: - A currently supported version of Windows and a supported UEFI is required. - The device manufacturer must have DFCI added to their UEFI firmware in the manufacturing process, or as a firmware update that can be installed. Work with the device vendors to determine the [manufacturers that support DFCI](#oems-that-support-dfci), or the firmware version needed to use DFCI. - The device must be managed with Microsoft Intune. For more information, see [Enroll Windows devices in Intune using Windows Autopilot](/mem/intune/enrollment/enrollment-autopilot). -- The device must be registered for Windows Autopilot by a [Microsoft Cloud Solution Provider (CSP) partner](https://partner.microsoft.com/membership/cloud-solution-provider), or registered directly by the OEM. For Surface devices, Microsoft registration support is available at [Microsoft Devices Autopilot Support](https://prod.support.services.microsoft.com/supportrequestform/0d8bf192-cab7-6d39-143d-5a17840b9f5f). +- The device must be registered for Windows Autopilot by a [Microsoft Cloud Solution Provider (CSP) partner](https://partner.microsoft.com/membership/cloud-solution-provider), or registered directly by the OEM. For Surface devices, Microsoft registration support is available at [Microsoft Devices Autopilot Support](https://support.microsoft.com/supportrequestform/0d8bf192-cab7-6d39-143d-5a17840b9f5f). > [!IMPORTANT] > @@ -90,6 +90,7 @@ For more information, see [Intune devices and apps API overview](/graph/intune-c - [Microsoft Surface](/surface/surface-manage-dfci-guide). - Panasonic. - VAIO. +- Samsung. Other OEMs are pending. diff --git a/autopilot/includes/create-assigned-device-group.md b/autopilot/includes/create-assigned-device-group.md index 2b4edc32041..f2cdadefcd4 100644 --- a/autopilot/includes/create-assigned-device-group.md +++ b/autopilot/includes/create-assigned-device-group.md @@ -5,7 +5,7 @@ manager: aaroncz ms.subservice: autopilot ms.service: windows-client ms.topic: include -ms.date: 06/27/2024 +ms.date: 11/20/2024 ms.localizationpriority: medium --- @@ -51,34 +51,79 @@ Headings are driven by article context. --> > [!IMPORTANT] > - > Don't manually add any devices to the device group created in this step by selecting the **No members selected** link under **Members**. Devices are automatically added to this device group during the Windows Autopilot device preparation deployment. + > Devices are automatically added to this device group during the Windows Autopilot device preparation deployment. Manually adding devices as members of the device group created in this step isn't necessary, but doing so has no impact on the Windows Autopilot device preparation process. ### Adding the Intune Provisioning Client service principal If the **Intune Provisioning Client** service principal with AppId **f1346770-5b25-470b-88bd-d5744ab7952c** isn't available when selecting the owner of the device group, then follow these steps to add the service principal: -1. On a device where Microsoft Intune or Microsoft Entra ID is normally administered, open a **Windows PowerShell** command prompt. +1. On a device where Microsoft Intune or Microsoft Entra ID is normally administered, open an elevated **Windows PowerShell** command prompt. 1. In the **Windows PowerShell** command prompt window: - 1. Install the **azuread** module by entering the following command: + 1. Install the **Microsoft.Graph.Authentication** module by entering the following command: - ```powershell - Install-Module azuread - ``` + ```powershell + Install-Module Microsoft.Graph.Authentication + ``` - If prompted to do so, agree to install **NuGet** and the **azuread** module from the **PSGallery**. + If prompted to do so: - 1. Once the **azuread** module is installed, connect to Microsoft Entra ID by entering the following command: + - Agree to install **NuGet** by entering **Y** or **Yes**, or selecting the **Yes** button. + - Agree to install from the **PSGallery** untrusted repository by entering **Y** or **Yes**, or selecting the **Yes** button. - ```powershell - Connect-AzureAD - ``` + For more information, see [Microsoft.Graph.Authentication](/powershell/module/microsoft.graph.authentication/) and [Set-PSRepository -InstallationPolicy](/powershell/module/powershellget/set-psrepository#-installationpolicy). + + 1. Install the **Microsoft.Graph.Applications** module by entering the following command: + + ```powershell + Install-Module Microsoft.Graph.Applications + ``` + + If prompted to do so, agree to install from the **PSGallery** untrusted repository by entering **Y** or **Yes**, or selecting the **Yes** button. - 1. If not already authenticated to Microsoft Entra ID, the **Sign in to your account** window appears. Enter the credentials of a Microsoft Entra ID administrator that has permissions to add service principals. + For more information, see [Microsoft.Graph.Applications](/powershell/module/microsoft.graph.applications/) and [Set-PSRepository -InstallationPolicy](/powershell/module/powershellget/set-psrepository#-installationpolicy). - 1. Once authenticated to Microsoft Entra ID, add the **Intune Provisioning Client** service principal by entering the following command: + 1. Once the **Microsoft.Graph.Authentication** and **Microsoft.Graph.Applications** modules are installed, connect to Microsoft Entra ID by entering the following command: + + ```powershell + Connect-MgGraph -Scopes "Application.ReadWrite.All" + ``` + + For more information, see [Connect-MgGraph](/powershell/module/microsoft.graph.authentication/connect-mggraph). + + 1. If not already authenticated to Microsoft Entra ID, the **Sign in to your account** window appears. Enter the credentials of a Microsoft Entra ID administrator that has permissions to add service principals. + + 1. If the **Permissions requested** window appears, select the **Consent on behalf of your organization** checkbox, and then select the **Accept** button. + + 1. Once authenticated to Microsoft Entra ID and proper permissions are granted, add the **Intune Provisioning Client** service principal by entering the following command: ```powershell - New-AzureADServicePrincipal -AppId f1346770-5b25-470b-88bd-d5744ab7952c + New-MgServicePrincipal -AppID f1346770-5b25-470b-88bd-d5744ab7952c ``` + + For more information, see [New-MgServicePrincipal -BodyParameter](/powershell/module/microsoft.graph.applications/new-mgserviceprincipal#-bodyparameter). + + > [!NOTE] + > + > - The following error message is displayed if the **Intune Provisioning Client service principal** already exists in the tenant: + > + > ```powershell + > New-MgServicePrincipal : The service principal cannot be created, updated, or restored because the service principal name + > f1346770-5b25-470b-88bd-d5744ab7952c is already in use. + > Status: 409 (Conflict) + > ErrorCode: Request_MultipleObjectsWithSameKeyValue + > ``` + > + > - The following error message is displayed if one of the following conditions is true: + > + > - The account used to sign in with the `Connect-MgGraph` command doesn't have permissions to add a service principal to the tenant. + > - The `-Scopes "Application.ReadWrite.All"` argument isn't added to the `Connect-MgGraph` command. + > - The **Permissions requested** window isn't accepted. + > - The **Consent on behalf of your organization** checkbox isn't selected in the **Permissions requested** window. + > + > ```powershell + > New-MgServicePrincipal : Insufficient privileges to complete the operation. + > Status: 403 (Forbidden) + > ErrorCode: Authorization_RequestDenied + > ``` diff --git a/autopilot/known-issues.md b/autopilot/known-issues.md index 1729c254487..b5690588683 100644 --- a/autopilot/known-issues.md +++ b/autopilot/known-issues.md @@ -8,7 +8,7 @@ author: frankroj ms.author: frankroj ms.reviewer: jubaptis manager: aaroncz -ms.date: 10/09/2024 +ms.date: 01/15/2025 ms.collection: - M365-modern-desktop - highpri @@ -41,11 +41,35 @@ This article describes known issues that can often be resolved with configuratio ## Known issues +### Local Administrator Password Solution (LAPS) policy isn't being applied during the Technician Flow + +Date added: *December 9, 2024* + +During Windows Autopilot pre-provisioning technical flow, if a LAPS policy is targeted to the device or user, it isn't applied until the user phase begins. + +### Windows Autopilot deployment report and AutopilotEvents Graph API only returns 50 records at a time + +Date added: *December 4, 2024* + +In Intune's 2411 release, we've updated the backend infrastructure of the Windows Autopilot deployment report for consistency with other Intune reports. With this change, the Windows Autopilot deployment report and the [AutopilotEvents Microsoft Graph API](/graph/api/resources/intune-troubleshooting-devicemanagementautopilotevent) now return 50 records at a time. To show more than 50 records at a time: + +- Use the `skipToken` parameter to get additional pages of data with the AutopilotEvents Graph API. +- Use the [export API](/mem/intune/fundamentals/reports-export-graph-apis) with `reportName` **AutopilotV1DeploymentStatus** to get all records. + ### DFCI enrollment fails for Professional editions of Windows 11, version 24H2 -Date added: *October 9, 2024* +Date added: *October 9, 2024*
+Date updated: *January 15, 2025* + +DFCI can't currently be configured during the out-of-box experience (OOBE) on devices with Professional editions of Windows 11, version 24H2 + +For devices that have already been provisioned and have Professional editions of Windows 11, version 24H2, install [KB5046740](https://support.microsoft.com/topic/november-21-2024-kb5046740-os-build-26100-2454-preview-2040f716-b719-482a-8aff-f7f02c79b147) or later to enroll in DFCI. Devices with Professional editions of Windows 11, version 24H2 that have KB5046740 or later installed are automatically enrolled in DFCI after a reboot. + +If DFCI needs to be configured during OOBE provisioning on 24H2 devices, follow these steps: -DFCI can't currently be used on devices with Professional editions of Windows 11, version 24H2. The issue is being investigated. As a workaround, ensure the device is upgraded to the Enterprise edition of Windows 11, version 24H2 during or after OOBE onboarding. After upgrading to the Enterprise edition of Windows 11, version 24H2, sync the device. Once the device is synced, reboot it to get it enrolled in DFCI. +1. During OOBE onboarding, ensure the device is upgraded to the Enterprise edition of Windows 11, version 24H2. +2. After upgrading to the Enterprise edition of Windows 11, version 24H2, sync the device. +3. Once the device is synced, reboot it to get it enrolled in DFCI. ### Autopilot deployment report doesn't support sorting @@ -68,7 +92,7 @@ The following workarounds are available until the issue is resolved: 1. Apply the autologon registry entries either manually or via a script. For example: ```cmd - reg.exe add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v "AutoAdminLogon" /t REG_DWORD /d 1 /f + reg.exe add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v "AutoAdminLogon" /t REG_SZ /d 1 /f reg.exe add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v "DefaultDomainName" /t REG_SZ /d "." /f diff --git a/autopilot/overview.md b/autopilot/overview.md index 5b056827606..6e73de77982 100644 --- a/autopilot/overview.md +++ b/autopilot/overview.md @@ -35,7 +35,7 @@ Windows Autopilot simplifies the Windows device lifecycle, for both IT and end u See the following video: -> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE4C7G9?autoplay=false] +> [!VIDEO https://learn-video.azurefd.net/vod/player?id=af8941a0-1b9c-4bbd-8b75-9754d8badf56] > [!NOTE] > diff --git a/autopilot/requirements.md b/autopilot/requirements.md index 3e3e435c697..790fc8e9e57 100644 --- a/autopilot/requirements.md +++ b/autopilot/requirements.md @@ -8,7 +8,7 @@ author: frankroj ms.author: frankroj ms.reviewer: jubaptis manager: aaroncz -ms.date: 09/06/2024 +ms.date: 11/25/2024 ms.collection: - M365-modern-desktop - highpri @@ -67,6 +67,7 @@ The following editions of Windows 11 are supported: - Windows 11 Pro for Workstations. - Windows 11 Enterprise. - Windows 11 Education. +- [Windows 11 Enterprise LTSC](/windows/whats-new/ltsc/overview). #### Windows 10 diff --git a/autopilot/self-deploying.md b/autopilot/self-deploying.md index 669dc63fb1f..45b05cbf77f 100644 --- a/autopilot/self-deploying.md +++ b/autopilot/self-deploying.md @@ -61,7 +61,7 @@ Optionally, a [device-only subscription](https://techcommunity.microsoft.com/t5/ > [!NOTE] > -> Intune doesn't automatically configure a primary user when using self-deploying mode in Autopilot to provision a Windows device. Some Intune capabilities rely on a primary user being set on a device. These features include user self-service BitLocker recovery key retrieval and using the Company Portal to install software. Using self-provisioning mode for Autopilot doesn't preclude a licensed user from logging into the device and using features entitled to that user such as conditional access. For more information, see [Windows Autopilot scenarios and capabilities](windows-autopilot-scenarios.md). +> Intune doesn't automatically configure a primary user when using self-deploying mode in Autopilot to provision a Windows device. Some Intune capabilities rely on a primary user being set on a device. These features include user self-service BitLocker recovery key retrieval and using the Company Portal to install software. Using self-provisioning mode for Autopilot doesn't preclude a licensed user from logging into the device and using features entitled to that user such as Conditional Access. For more information, see [Windows Autopilot scenarios and capabilities](windows-autopilot-scenarios.md). > > If desired, a primary user can be manually set after device provisioning via the Intune admin center. For more information, see [Change a devices primary user](/mem/intune/remote-actions/find-primary-user#change-a-devices-primary-user). diff --git a/autopilot/toc.yml b/autopilot/toc.yml index 9769e0f9cfd..2c652f8e16b 100644 --- a/autopilot/toc.yml +++ b/autopilot/toc.yml @@ -43,7 +43,7 @@ items: href: device-preparation/tutorial/user-driven/entra-join-assign-apps-scripts.md - name: Step 6 - Create Windows Autopilot device preparation policy href: device-preparation/tutorial/user-driven/entra-join-autopilot-policy.md - - name: Step 7 - Add Windows corporate identifier to device (optional) + - name: Step 7 - Add Windows corporate identifier to device href: device-preparation/tutorial/user-driven/entra-join-corporate-identifier.md - name: Windows Autopilot diff --git a/autopilot/troubleshooting-faq.yml b/autopilot/troubleshooting-faq.yml index 4498640d149..0fcdda126ad 100644 --- a/autopilot/troubleshooting-faq.yml +++ b/autopilot/troubleshooting-faq.yml @@ -9,7 +9,7 @@ metadata: ms.author: frankroj ms.reviewer: jubaptis manager: aaroncz - ms.date: 08/08/2024 + ms.date: 11/26/2024 ms.collection: - M365-modern-desktop - highpri @@ -180,8 +180,23 @@ sections: To resolve and fix the issue in this scenario and redeploy the device using Windows Autopilot, follow these steps: - 1. Delete the device record in Intune. For the specific steps, see [Delete devices from the Intune admin center](/mem/intune/remote-actions/devices-wipe#delete-devices-from-the-intune-admin-center). + 1. Sign into the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431). + + 1. In the **Home** screen, select **Devices** in the left hand pane. + + 1. In the **Devices | Overview** screen, under **By platform**, select **Windows**. + + 1. In the **Windows | Windows devices** screen, under **Device onboarding**, select **Enrollment**. + + 1. In the **Windows | Enrollment** screen, under **Windows Autopilot**, select **Devices**. + + 1. Select the device that is experiencing the error, and then in the toolbar select **Unblock device**. + 1. Redeploy the Windows Autopilot deployment profile. + + > [!NOTE] + > + > A success message might not display after selecting **Unblock device**, but the device is ready to be used again. 1. Windows MDM enrollment is disabled in the Intune tenant. @@ -367,6 +382,12 @@ sections: - name: Troubleshooting policy conflicts with Windows Autopilot questions: + + - question: | + Why is the web sign-in option missing at the Windows sign-in screen after Windows Autopilot pre-provisioning completes? + answer: | + The [Device password policies](/mem/intune/protect/security-baseline-settings-mdm-all#device-lock) in the Security Baseline causes issues after pre-provisioning. To resolve, change the password settings in Security Baseline to **Not Configured** or assign the baseline to a user group. + - question: | Can policies conflict with Windows Autopilot working correctly? answer: | diff --git a/autopilot/tutorial/user-driven/azure-ad-join-deploy-device.md b/autopilot/tutorial/user-driven/azure-ad-join-deploy-device.md index ea26a9706bf..146bcedcc3e 100644 --- a/autopilot/tutorial/user-driven/azure-ad-join-deploy-device.md +++ b/autopilot/tutorial/user-driven/azure-ad-join-deploy-device.md @@ -38,7 +38,7 @@ For an overview of the Windows Autopilot user-driven Microsoft Entra join workfl ## Deploy the device -> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RW15DG8] +> [!VIDEO https://learn-video.azurefd.net/vod/player?id=eee1be56-784d-48f2-932a-2274774d6263] Once all of the configurations for the Windows Autopilot user-driven Microsoft Entra join deployment are completed in Intune and in Microsoft Entra ID, the next step is to start the Autopilot deployment process on the device. If desired, deploy any additional applications and policies that should run during the Autopilot deployment to a device group that the device is a member of. diff --git a/autopilot/whats-new.md b/autopilot/whats-new.md index ca690e1231a..786fce408c7 100644 --- a/autopilot/whats-new.md +++ b/autopilot/whats-new.md @@ -8,7 +8,7 @@ author: frankroj ms.author: frankroj manager: aaroncz ms.reviewer: jubaptis -ms.date: 06/28/2024 +ms.date: 01/06/2024 ms.collection: - M365-modern-desktop - tier2 @@ -85,7 +85,7 @@ The 2310 release of Intune adds more clarity to the manual hardware hash upload Date added: *October 10, 2023* -Starting in 2310, we're making an update to the self-deployment and pre-provisioning modes for manufacturers that have not opted-in to attesting to removal of Autopilot refurbished devices. Customers using these manufacturers were still subjected to the one-time device-based enrollment block in the self-deployment and pre-provisioning modes. This block means that the device could go through self-deployment or pre-provisioning mode once and then get blocked from doing it again. This behavior could cause problems if the device needed to be reset or redeployed. This change in 2310 enables a button in the Autopilot devices section in Intune to manually unblock those devices. This update only works for OEMs that aren't within the [OEM list](https://techcommunity.microsoft.com/t5/intune-customer-success/return-of-key-functionality-for-windows-autopilot-sign-in-and/ba-p/3583130) and doesn't work on the **Fix pending** status. +Starting in 2310, we're making an update to the self-deployment and pre-provisioning modes for manufacturers that have not opted-in to attesting to removal of Autopilot refurbished devices. Customers using these manufacturers were still subjected to the one-time device-based enrollment block in the self-deployment and pre-provisioning modes. This block means that the device could go through self-deployment or pre-provisioning mode once and then get blocked from doing it again. This behavior could cause problems if the device needed to be reset or redeployed. This change in 2310 enables a button in the Autopilot devices section in Intune to manually unblock those devices. This update only works for certain OEMs and doesn't work on the **Fix pending** status. Reach out to your respective OEM to confirm whether this functionality is enabled for your device. ### How to unblock devices diff --git a/autopilot/windows-autopilot-scenarios.md b/autopilot/windows-autopilot-scenarios.md index 6846ae50ec3..57ee32d441a 100644 --- a/autopilot/windows-autopilot-scenarios.md +++ b/autopilot/windows-autopilot-scenarios.md @@ -41,7 +41,7 @@ The following Windows Autopilot scenarios are described in this guide: These scenarios are summarized in the following video: -> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE4Ci1b?autoplay=false] +> [!VIDEO https://learn-video.azurefd.net/vod/player?id=7e47e04e-7f51-4eba-9a23-d65f3411b425] ## Windows Autopilot capabilities diff --git a/memdocs/analytics/data-platform-schema.md b/memdocs/analytics/data-platform-schema.md index 86e4d6a2da9..d4c8540107b 100644 --- a/memdocs/analytics/data-platform-schema.md +++ b/memdocs/analytics/data-platform-schema.md @@ -7,7 +7,7 @@ keywords: ms.author: smbhardwaj author: smritib17 manager: dougeby -ms.date: 02/01/2024 +ms.date: 11/14/2024 ms.topic: conceptual ms.service: microsoft-intune ms.subservice: fundamentals @@ -33,9 +33,7 @@ ms.collection: *Applies to: Microsoft Intune* -This article goes over the properties supported in the Intune Data Platform. - -Device query allows you to quickly assess the state of devices in your environment and take action. When you enter a query on a selected device, Device query runs a query in real time. The data returned can then be filtered, grouped, and refined to answer business questions, troubleshoot issues in your environment, or respond to security threats. +This article goes over the properties supported in the Intune Data Platform. The Intune Data Platform can be accessed via Device query for single devices, Inventory, and Device query for Multiple Devices. Each table (entity) in this page lists the types of queries that are supported. @@ -43,7 +41,9 @@ Each table (entity) in this page lists the types of queries that are supported. **Description**: Provides basic BIOS Information. -**Supported for**: Device query, single device on-demand. +**Supported platforms**: Windows + +**Supported for**: single device query on-demand, Inventory. | **Property** | **Type** | **Description** | | --- | --- | --- | @@ -55,7 +55,10 @@ Each table (entity) in this page lists the types of queries that are supported. ## Certificate **Description**: Certificate Authorities installed in Keychains/ca-bundles. Only certificates for computers are returned. - **Supported for**: Device query, single device on-demand. + +**Supported platforms**: Windows + +**Supported for**: single device query on-demand. | **Property** | **Type** | **Description** | | --- | --- | --- | @@ -78,7 +81,9 @@ Each table (entity) in this page lists the types of queries that are supported. **Description**: Retrieves CPU hardware info on the machine. -**Supported for**: Device query, single device on-demand. +**Supported platforms**: Windows + +**Supported for**: single device query on-demand, Inventory. | **Property** | **Type** | **Description** | | --- | --- | --- | @@ -100,7 +105,9 @@ Each table (entity) in this page lists the types of queries that are supported. **Description**: Retrieves basic information about the physical disks of a system. -**Supported for**: Device query, single device on-demand. +**Supported platforms**: Windows + +**Supported for**: single device query on-demand, Inventory. | **Property** | **Type** | **Description** | | --- | --- | --- | @@ -120,7 +127,9 @@ Each table (entity) in this page lists the types of queries that are supported. **Description**: Retrieves encryptable volume status of the machine. -**Supported for**: Device query, single device on-demand +**Supported platforms**: Windows + +**Supported for**: single device query on-demand, Inventory. | **Property** | **Type** | **Description** | | --- | --- | --- | @@ -136,7 +145,9 @@ Each table (entity) in this page lists the types of queries that are supported. **Description**: Lists all file info of the passed file or files under the passed directory. -**Supported for**: Device query, single device on-demand. +**Supported platforms**: Windows + +**Supported for**: single device query on-demand. > [!NOTE] > This is a parameterized entity where you must pass in the path of the File you want to query. For example, pass in `FileInfo('c:\windows\system32\drivers\etc\hosts') | take 10`. If a directory is passed, it will return info on the files in the directory and sub-directories. @@ -161,7 +172,9 @@ Each table (entity) in this page lists the types of queries that are supported. **Description**: Lists local user groups. -**Supported for**: Device query, single device on-demand. +**Supported platforms**: Windows + +**Supported for**: single device query on-demand. | **Property** | **Type** | **Description** | | --- | --- | --- | @@ -173,7 +186,9 @@ Each table (entity) in this page lists the types of queries that are supported. **Description**: Lists local user accounts. -**Supported for**: Device query, single device on-demand. +**Supported platforms**: Windows + +**Supported for**: single device query on-demand. | **Property** | **Type** | **Description** | | --- | --- | --- | @@ -187,7 +202,9 @@ Each table (entity) in this page lists the types of queries that are supported. **Description**: Details for logical drives on the system. A logical drive generally represents a single partition. -**Supported for**: Device query, single device on-demand. +**Supported platforms**: Windows + +**Supported for**: single device query on-demand, Inventory. | **Property** | **Type** | **Description** | | --- | --- | --- | @@ -202,7 +219,10 @@ Each table (entity) in this page lists the types of queries that are supported. **Description**: Memory Information. -**Supported for**: Device query, single device on-demand. +**Supported platforms**: Windows + +**Supported for**: single device query on-demand, Inventory. +Note that PhysicalMemoryFreeBytes and VirtualMemoryFreeBytes properties are only supported for single device query on-demand. | **Property** | **Type** | **Description** | | --- | --- | --- | @@ -215,7 +235,9 @@ Each table (entity) in this page lists the types of queries that are supported. **Description**: A single row containing the operating system name and version. -**Supported for**: Device query, single device on-demand, +**Supported platforms**: Windows + +**Supported for**: single device query on-demand, Inventory. | **Property** | **Type** | **Description** | | --- | --- | --- | @@ -232,7 +254,9 @@ Each table (entity) in this page lists the types of queries that are supported. **Description**: All running processes on the host system. -**Supported for**: Device query, single device on-demand. +**Supported platforms**: Windows + +**Supported for**: single device query on-demand. | **Property** | **Type** | **Description** | | --- | --- | --- | @@ -261,7 +285,9 @@ Each table (entity) in this page lists the types of queries that are supported. **Description**: Displays information pertaining to the chassis and its security status. -**Supported for**: Device query, single device on-demand. +**Supported platforms**: Windows + +**Supported for**: single device query on-demand, Inventory. | **Property** | **Type** | **Description** | | --- | --- | --- | @@ -283,7 +309,9 @@ Each table (entity) in this page lists the types of queries that are supported. **Description**: System information of the device. -**Supported for**: Device query, single device on-demand. +**Supported platforms**: Windows + +**Supported for**: single device query on-demand. | **Property** | **Type** | **Description** | | --- | --- | --- | @@ -299,7 +327,9 @@ Each table (entity) in this page lists the types of queries that are supported. **Description**: Provides TPM related information of the device. -**Supported for**: Device query, single device on-demand. +**Supported platforms**: Windows + +**Supported for**: single device query on-demand, Inventory. | **Property** | **Type** | **Description** | | --- | --- | --- | @@ -317,7 +347,9 @@ Each table (entity) in this page lists the types of queries that are supported. **Description**: Provides App Crash info in Windows event log file Application in look back time. -**Supported for**: Device query, single device on-demand. +**Supported platforms**: Windows + +**Supported for**: single device query on-demand. | ReportId(Key) | string (max 256 characters) | Report ID of the App crash | | --- | --- | --- | @@ -331,7 +363,9 @@ Each table (entity) in this page lists the types of queries that are supported. **Description**: Details for in-use Windows device drivers. This doesn't display installed but unused drivers. -**Supported for**: Device query, single device on-demand. +**Supported platforms**: Windows + +**Supported for**: single device query on-demand. | **Property** | **Type** | **Description** | | --- | --- | --- | @@ -350,7 +384,9 @@ Each table (entity) in this page lists the types of queries that are supported. **Description**: Get Windows Event logs in the specified log name and look back in time. -**Supported for**: Device query, single device on-demand. +**Supported platforms**: Windows + +**Supported for**: single device query on-demand. > [!NOTE] > When constructing the query, you must specify the log name and look back time, for example: `WindowsEvent(Application, 1d) | take 1`. @@ -369,7 +405,10 @@ possible value:CRITICAL\_ERROR,ERROR,WARNING,INFORMATION,VERBOSE | ## WindowsQfe **Description**: Information about security patches on the device. -**Supported for**: Device query, single device on-demand. + +**Supported platforms**: Windows + +**Supported for**: single device query on-demand, Inventory. | Property | Type | Description | | --- | --- | --- | @@ -385,7 +424,9 @@ possible value:CRITICAL\_ERROR,ERROR,WARNING,INFORMATION,VERBOSE | **Description**: Lists registry under the passed registry key. -**Supported for**: Device query, single device on-demand. +**Supported platforms**: Windows + +**Supported for**: single device query on-demand. > [!NOTE] > You must pass in the registry key you are trying to query. For example, `WindowsRegistry('HKEY_LOCAL_MACHINE\\ServiceLastKnownStatus')`. @@ -401,7 +442,9 @@ possible value:CRITICAL\_ERROR,ERROR,WARNING,INFORMATION,VERBOSE | **Description**: Lists all installed Windows services and their relevant data. -**Supported for**: Device query, single device on-demand. +**Supported platforms**: Windows + +**Supported for**: single device query on-demand. | **Property** | **Type** | **Description** | | --- | --- | --- | @@ -418,4 +461,66 @@ possible value:CRITICAL\_ERROR,ERROR,WARNING,INFORMATION,VERBOSE | | ServiceDescription | string (max 256 characters) | Service Description | | WindowsUserAccount | string (max 256 characters) | The name of the account that the service process is logged on as when it runs. This name can be of the form Domain\UserName | +## Battery + +**Description**: Provides details about battery and battery health. + +**Supported Features**: Inventory +**Supported Platforms**: Windows + +| **Property** | **Type** | **Description** | +| --- | --- | --- | +| CycleCount | Long | The number of times a battery has gone through a full charge and discharge. Can be used to assess the battery state| +| DesignCapacity | Long (milliwatt hours) | The theoretical capacity of the battery when new.| +| FullChargedCapacity | Long (milliwatt hours) | Full charge capacity of the battery.| +| InstanceName| String | Name used to identify the battery instance.| +| Manufacturer| String | Manufacturer of the battery.| +| Model| String | Display name of the battery.| +| SerialNumber| String | Battery serial number that is assigned by the manufacturer.| + +## NetworkAdapter + +**Description**: Provides basic network adapter information. + +**Supported Features**: Inventory + +**Supported Platforms**: Windows + +| **Property** | **Type** | **Description** | +| --- | --- | --- | +| Identifier | String | Unique identifier of the adapter from other devices on the system. | +| Manufacturer | String | Name of the network adapter's manufacturer. | +| Type | String | Network medium in use. | + +> [!NOTE] +> Inventory will only report up to 20 network adapters per device. + +## Time + +**Description**: Provides basic time information. + +**Supported Features**: Inventory + +**Supported Platforms**: Windows + +| **Property** | **Type** | **Description** | +| --- | --- | --- | +| TimeZone | String | Describes the device's time zone. | + +## VideoController + +**Description**: Provides video controller and graphics information. + +**Supported Features**: Inventory + +**Supported Platforms**: Windows + +| **Property** | **Type** | **Description** | +| --- | --- | --- | +| AdapterDacType | String | Name or identifier of the digital-to-analog converter (DAC) chip. The character set of this property is alphanumeric. | +| AdapterRam | Long | Memory size of the video adapter. | +| CurrentScanMode | String | Current scan mode. | +| GraphicsModel | String | Provides manufacturer and model information of graphics card. | +| Identifier | String | Identifier (unique to the computer system) for this video controller. | +| VideoModeDescription | String | Current resolution, color, and scan mode settings of the video controller. | diff --git a/memdocs/analytics/device-query.md b/memdocs/analytics/device-query.md index c288c73daef..f69305a9f9a 100644 --- a/memdocs/analytics/device-query.md +++ b/memdocs/analytics/device-query.md @@ -35,19 +35,22 @@ Device query allows you to quickly gain on-demand information about the state of ## Prerequisites -To use Device query in your tenant, you must have a license that includes Microsoft Intune Advanced Analytics. Advanced Analytics features are available with: +- To use Device query in your tenant, you must have a license that includes Microsoft Intune Advanced Analytics. Advanced Analytics features are available with: -- The Intune Advanced Analytics Add-on -- Microsoft Intune Suite + - The Intune Advanced Analytics Add-on + - Microsoft Intune Suite -To use Device query on a device, the device must be enrolled in Endpoint Analytics. Learn [how to enroll a device in Endpoint Analytics](enroll-intune.md). +- To use Device query on a device, the device must be enrolled in Endpoint Analytics. Learn [how to enroll a device in Endpoint Analytics](enroll-intune.md). -You cannot opt out of cloud notifications (WNS) +- You cannot opt out of cloud notifications (WNS) -For a user to use Device query, you must assign the **Managed Devices** - **Query** permission to them. +- For a user to use Device query, you must assign the **Managed Devices** - **Query** permission to them. -To use Device query, devices must be Intune managed and corporate owned. +- To use Device query, devices must be Intune managed and corporate owned. +- To run remote actions, at a minimum, sign into the [Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) with an account that has the **Help Desk Operator** role. For more information on the different roles, go to [Role-based access control (RBAC) with Microsoft Intune](../intune/fundamentals/role-based-access-control.md). + +- To receive the remote action, the device must be connected to the internet and powered on. ## Supported platforms @@ -64,6 +67,39 @@ For more information on Kusto Query Language, see [Learn more about Kusto Query > [!TIP] > You can now use Copilot in Intune (public preview) to generate KQL queries for device query using natural language requests. To learn more, go to [Query with Copilot in device query](../intune/copilot/copilot-intune-overview.md#query-with-copilot-in-device-query). +## Remote device actions + +Use the Intune remote device actions in Single device query to help you manage your devices remotely. From the device query interface, you can now run device actions based on query results for faster and more efficient troubleshooting. + +### Available remote actions + +The available device actions depend on the device configuration. Not all actions are available for all devices. + +For a complete list of what can be done on your devices, in the Intune admin center, select Devices > All devices, and select a specific device. The available device actions are shown at the top. + +The following list includes supported device actions: + +|Action|Description| +|---|---| +|[Autopilot reset](/windows/deployment/windows-autopilot/windows-autopilot-reset#reset-devices-with-remote-windows-autopilot-reset)|Restores a device to its original settings and removes personal files, apps, and settings.| +|[BitLocker key rotation](../intune/protect/encrypt-devices.md#rotate-bitlocker-recovery-keys)|Changes the BitLocker recovery key for a device and uploads the new key to Intune.| +|[Collect diagnostics](../intune/remote-actions/collect-diagnostics.md)|Collects diagnostic logs from a device and uploads the logs to Intune.| +|[Delete](../intune/remote-actions/devices-wipe.md)|Removes a device from Intune management, any company data is removed, and the device is retired.| +|[Fresh start](../intune/remote-actions/device-fresh-start.md)|Reinstalls the latest version of Windows on a device and removes apps that the manufacturer installed.| +|[Full scan](../intune/configuration/device-restrictions-windows-10.md#microsoft-defender-antivirus)|Initiates a full scan of the device by Microsoft Defender Antivirus.| +|[Locate device](../intune/remote-actions/device-locate.md)|Shows the approximate location of a device on a map.| +|[Pause ConfigRefresh](../intune/remote-actions/pause-config-refresh.md)|Pause ConfigRefresh to run remediation on a device for troubleshooting or maintenance or to make changes.| +|[Quick scan](../intune/configuration/device-restrictions-windows-10.md#microsoft-defender-antivirus)|Initiates a quick scan of the device by Microsoft Defender Antivirus.| +|[Remote control with Team Viewer](../intune/remote-actions/teamviewer-support.md)|Allows you to remotely control a device using TeamViewer.| +|[Rename device](../intune/remote-actions/device-rename.md)|Changes the device name in Intune.| +|[Restart](../intune/remote-actions/device-rename.md)|Restarts a device.| +|[Retire](../intune/remote-actions/devices-wipe.md#retire)|Removes company data and settings from a device, and leaves personal data intact.| +|[Rotate Local admin password](../intune/protect/windows-laps-policy.md#manually-rotate-passwords)|Changes the local administrator password for a device and stores the password in Intune.| +|[Synchronize device](../intune/remote-actions/device-sync.md)|Syncs a device with Intune to apply the latest policies and configurations.| +|[Update Windows Defender Security Intelligence](/windows/security/threat-protection/windows-defender-antivirus/manage-protection-updates-windows-defender-antivirus)|Updates the security intelligence files for Microsoft Defender Antivirus.| +|[Windows 10 PIN reset](../intune/remote-actions/device-windows-pin-reset.md)|Resets the PIN of a device that uses Microsoft Entra authentication.| +|[Wipe](../intune/remote-actions/devices-wipe.md#wipe)|This action restores a device to its factory settings and removes all data and settings.| + ## Supported Operators  Device query supports only a subset of the operators supported in the Kusto Query Language (KQL). The following operators are currently supported: diff --git a/memdocs/analytics/device-scopes.md b/memdocs/analytics/device-scopes.md index ceb0b8b2029..8e08b801d93 100644 --- a/memdocs/analytics/device-scopes.md +++ b/memdocs/analytics/device-scopes.md @@ -61,7 +61,7 @@ To create custom device scopes: The new custom device scope appears in your list of saved device scopes. By default, custom devices scopes are in the *Off* state. To activate custom device scopes, toggle the **State** setting to *On*. Data processing starts for the selected device scope. > [!NOTE] -> Once activated, custom device scopes can take up to 24 hours to process. During this period, custom device scopes that are still processing will not be usable. +> Once activated, custom device scopes can take up to 24 hours to process. During this period, custom device scopes that are still processing will not be usable. Additionally, custom device scopes require 10 devices at minimum to populate supported reports, otherwise **Insufficient Data** may show when trying to select a custom scope. Only the user who created the custom device scopes or a Global administrator can delete the custom device scopes. @@ -103,4 +103,4 @@ For more information, go to: - [Anomaly detection](anomaly-detection.md) - [What is Intune Advanced Analytics](advanced-endpoint-analytics.md) - [Battery health](battery-health.md) -- [Resource Performance report](resource-performance-report.md) \ No newline at end of file +- [Resource Performance report](resource-performance-report.md) diff --git a/memdocs/analytics/toc.yml b/memdocs/analytics/tocyml.old similarity index 98% rename from memdocs/analytics/toc.yml rename to memdocs/analytics/tocyml.old index 682e35732ed..91ec406e33a 100644 --- a/memdocs/analytics/toc.yml +++ b/memdocs/analytics/tocyml.old @@ -54,4 +54,4 @@ items: - name: Data collection href: data-collection.md - name: Get support - href: get-support.md \ No newline at end of file + href: get-support.md diff --git a/memdocs/analytics/work-from-anywhere.md b/memdocs/analytics/work-from-anywhere.md index 333976f1a32..a95e01fac55 100644 --- a/memdocs/analytics/work-from-anywhere.md +++ b/memdocs/analytics/work-from-anywhere.md @@ -60,7 +60,7 @@ Benefits of each cloud management type: | Manage your clients anywhere | :::image type="content" source="media/green-check.png" border="false" alt-text="Yes."::: | :::image type="content" source="media/green-check.png" border="false" alt-text="Yes."::: | :::image type="content" source="media/green-check.png" border="false" alt-text="Yes."::: | :::image type="content" source="media/green-check.png" border="false" alt-text="Yes."::: | | View and take action on all Windows PCs from Microsoft Intune admin center| |:::image type="content" source="media/green-check.png" border="false" alt-text="Yes.":::| :::image type="content" source="media/green-check.png" border="false" alt-text="Yes.":::| :::image type="content" source="media/green-check.png" border="false" alt-text="Yes."::: | | Modernize your directory approach with Microsoft Entra ID | |:::image type="content" source="media/green-check.png" border="false" alt-text="Yes.":::| :::image type="content" source="media/green-check.png" border="false" alt-text="Yes.":::| :::image type="content" source="media/green-check.png" border="false" alt-text="Yes."::: | -|Enhance Zero Trust with conditional access| | |:::image type="content" source="media/green-check.png" border="false" alt-text="Yes.":::| :::image type="content" source="media/green-check.png" border="false" alt-text="Yes."::: | +|Enhance Zero Trust with Conditional Access| | |:::image type="content" source="media/green-check.png" border="false" alt-text="Yes.":::| :::image type="content" source="media/green-check.png" border="false" alt-text="Yes."::: | | Make device provisioning easier by enabling Windows Autopilot | | |:::image type="content" source="media/green-check.png" border="false" alt-text="Yes.":::| :::image type="content" source="media/green-check.png" border="false" alt-text="Yes."::: | | Gain more remote access with Intune | | |:::image type="content" source="media/green-check.png" border="false" alt-text="Yes.":::| :::image type="content" source="media/green-check.png" border="false" alt-text="Yes."::: | | Split PC management workloads between cloud and on-premises | | |:::image type="content" source="media/green-check.png" border="false" alt-text="Yes.":::| | diff --git a/memdocs/configmgr/apps/deploy-use/create-deploy-scripts.md b/memdocs/configmgr/apps/deploy-use/create-deploy-scripts.md index 01ce4255599..2b3aa94a863 100644 --- a/memdocs/configmgr/apps/deploy-use/create-deploy-scripts.md +++ b/memdocs/configmgr/apps/deploy-use/create-deploy-scripts.md @@ -2,7 +2,7 @@ title: Create and run scripts titleSuffix: Configuration Manager description: Create and run PowerShell scripts on client devices. -ms.date: 09/18/2023 +ms.date: 12/16/2024 ms.subservice: app-mgt ms.service: configuration-manager ms.topic: conceptual diff --git a/memdocs/configmgr/apps/deploy-use/deploy-applications.md b/memdocs/configmgr/apps/deploy-use/deploy-applications.md index aebaecfdae4..da767025b7a 100644 --- a/memdocs/configmgr/apps/deploy-use/deploy-applications.md +++ b/memdocs/configmgr/apps/deploy-use/deploy-applications.md @@ -2,7 +2,7 @@ title: Deploy applications titleSuffix: Configuration Manager description: Create or simulate a deployment of an application to a device or user collection -ms.date: 08/02/2021 +ms.date: 12/16/2024 ms.subservice: app-mgt ms.service: configuration-manager ms.topic: how-to diff --git a/memdocs/configmgr/apps/plan-design/plan-for-software-center.md b/memdocs/configmgr/apps/plan-design/plan-for-software-center.md index 75a6ef38505..50141b4c8e6 100644 --- a/memdocs/configmgr/apps/plan-design/plan-for-software-center.md +++ b/memdocs/configmgr/apps/plan-design/plan-for-software-center.md @@ -31,7 +31,7 @@ Use client settings to configure the appearance and behaviors of Software Center - Configure which default tabs are visible, and add up to five custom tabs to Software Center. - In Configuration Manager 2103 and earlier, when single sign on with multifactor authentication is used, you may not be able to sign into custom tabs that load a website that's subject to conditional access policies. + In Configuration Manager 2103 and earlier, when single sign on with multifactor authentication is used, you may not be able to sign into custom tabs that load a website that's subject to Conditional Access policies. - You can configure co-managed devices to use the Company Portal for both Intune and Configuration Manager apps. For more information, see [Use the Company Portal app on co-managed devices](../../comanage/company-portal.md). diff --git a/memdocs/configmgr/cloud-attach/toc.yml b/memdocs/configmgr/cloud-attach/toc.yml index 0154d1c8454..fef559d1aca 100644 --- a/memdocs/configmgr/cloud-attach/toc.yml +++ b/memdocs/configmgr/cloud-attach/toc.yml @@ -137,7 +137,7 @@ items: href: ../comanage/workloads.md?toc=/mem/configmgr/cloud-attach/toc.json&bc=/mem/configmgr/cloud-attach/breadcrumb/toc.json - name: Switch workloads to Intune href: ../comanage/how-to-switch-workloads.md?toc=/mem/configmgr/cloud-attach/toc.json&bc=/mem/configmgr/cloud-attach/breadcrumb/toc.json - - name: Conditional access + - name: Conditional Access href: ../comanage/quickstart-conditional-access.md?toc=/mem/configmgr/cloud-attach/toc.json&bc=/mem/configmgr/cloud-attach/breadcrumb/toc.json - name: Remote actions from Intune href: ../comanage/quickstart-remote-actions.md?toc=/mem/configmgr/cloud-attach/toc.json&bc=/mem/configmgr/cloud-attach/breadcrumb/toc.json diff --git a/memdocs/configmgr/comanage/coexistence.md b/memdocs/configmgr/comanage/coexistence.md index 3fde5474db4..97c3b985918 100644 --- a/memdocs/configmgr/comanage/coexistence.md +++ b/memdocs/configmgr/comanage/coexistence.md @@ -33,7 +33,7 @@ When the Configuration Manager client detects that a third-party MDM service is - Application management, including legacy packages - Software update scanning and installation - Endpoint protection, the Windows Defender suite of antimalware protection features -- Compliance policy for conditional access +- Compliance policy for Conditional Access - Device configuration - Office Click-to-Run management diff --git a/memdocs/configmgr/comanage/faq.yml b/memdocs/configmgr/comanage/faq.yml index d93173d7c48..baa4bfaaea1 100644 --- a/memdocs/configmgr/comanage/faq.yml +++ b/memdocs/configmgr/comanage/faq.yml @@ -104,7 +104,7 @@ sections: - question: | I've enabled co-management, which workload should I switch first? answer: | - **Compliance** is the workload that most customers switch first. If you switch this workload to Intune, you can still require devices to evaluate settings from Configuration Manager. When you configure a compliance policy in Intune, enable it to require device [compliance from Configuration Manager](../../intune/protect/compliance-policy-create-windows.md#configuration-manager-compliance). Then you can use device compliance state to control [conditional access](../../intune/protect/conditional-access.md) to cloud-based resources. This configuration lets you start using the cloud services without changing the compliance checks you already have in Configuration Manager. + **Compliance** is the workload that most customers switch first. If you switch this workload to Intune, you can still require devices to evaluate settings from Configuration Manager. When you configure a compliance policy in Intune, enable it to require device [compliance from Configuration Manager](../../intune/protect/compliance-policy-create-windows.md#configuration-manager-compliance). Then you can use device compliance state to control [Conditional Access](../../intune/protect/conditional-access.md) to cloud-based resources. This configuration lets you start using the cloud services without changing the compliance checks you already have in Configuration Manager. After compliance, the most common workloads are **Office Click-to-Run apps**, **Client apps**, and **Windows Update policies**. @@ -140,7 +140,7 @@ sections: - question: | With co-management, can I use compliance policies in Intune and compliance settings in Configuration Manager to assess overall device compliance? answer: | - Yes. Once you have your environment co-managed, and switch the compliance workload to Intune, you can use your existing Configuration Manager compliance settings and integrate them with [conditional access](../../intune/protect/conditional-access.md). For more information, see the following articles: + Yes. Once you have your environment co-managed, and switch the compliance workload to Intune, you can use your existing Configuration Manager compliance settings and integrate them with [Conditional Access](../../intune/protect/conditional-access.md). For more information, see the following articles: - [Include custom configuration baselines as part of compliance policy assessment](../compliance/deploy-use/create-configuration-baselines.md#bkmk_CAbaselines) diff --git a/memdocs/configmgr/comanage/how-to-enable.md b/memdocs/configmgr/comanage/how-to-enable.md index ba5b3ecf9b5..785c6a1fa21 100644 --- a/memdocs/configmgr/comanage/how-to-enable.md +++ b/memdocs/configmgr/comanage/how-to-enable.md @@ -38,7 +38,7 @@ Make sure the co-management prerequisites are set up before you start this proce Now that you've enabled co-management, look at the following articles for immediate value you can gain in your environment: -- [Conditional access](quickstart-conditional-access.md) +- [Conditional Access](quickstart-conditional-access.md) - [Remote actions from Intune](quickstart-remote-actions.md) diff --git a/memdocs/configmgr/comanage/how-to-prepare-Win10.md b/memdocs/configmgr/comanage/how-to-prepare-Win10.md index e04036e018d..2c2a7357d75 100644 --- a/memdocs/configmgr/comanage/how-to-prepare-Win10.md +++ b/memdocs/configmgr/comanage/how-to-prepare-Win10.md @@ -2,10 +2,10 @@ title: Co-manage internet-based devices titleSuffix: Configuration Manager description: Learn how to prepare your Windows internet-based devices for co-management. -author: gowdhamankarthikeyan -ms.author: gokarthi +author: baladelli +ms.author: Baladell manager: apoorvseth -ms.date: 05/19/2022 +ms.date: 12/16/2024 ms.topic: how-to ms.subservice: co-management ms.service: configuration-manager diff --git a/memdocs/configmgr/comanage/overview.md b/memdocs/configmgr/comanage/overview.md index 4b8d3914807..4661622877f 100644 --- a/memdocs/configmgr/comanage/overview.md +++ b/memdocs/configmgr/comanage/overview.md @@ -2,10 +2,10 @@ title: Co-management for Windows devices titleSuffix: Configuration Manager description: Learn how to concurrently manage Windows 10 or later devices by using both Configuration Manager and Microsoft Intune. -author: gowdhamankarthikeyan -ms.author: gokarthi +author: Baladelli +ms.author: baladell manager: apoorvseth -ms.date: 03/21/2022 +ms.date: 12/04/2024 ms.topic: overview ms.subservice: co-management ms.service: configuration-manager @@ -18,7 +18,7 @@ ms.reviewer: mstewart,aaroncz # What is co-management? -Co-management is one of the primary ways to attach your existing Configuration Manager deployment to the Microsoft 365 cloud. It helps you unlock more cloud-powered capabilities like conditional access. +Co-management is one of the primary ways to attach your existing Configuration Manager deployment to the Microsoft 365 cloud. It helps you unlock more cloud-powered capabilities like Conditional Access. Co-management enables you to concurrently manage Windows 10 or later devices by using both Configuration Manager and Microsoft Intune. It lets you cloud-attach your existing investment in Configuration Manager by adding new functionality. By using co-management, you have the flexibility to use the technology solution that works best for your organization. @@ -45,7 +45,7 @@ For more information on the paths, see [Paths to co-management](quickstart-paths When you enroll existing Configuration Manager clients in co-management, you gain the following immediate value: -- Conditional access with device compliance +- Conditional Access with device compliance - Intune-based remote actions, for example: restart, remote control, or factory reset @@ -121,7 +121,7 @@ Enabling co-management itself doesn't require that you onboard your site with Mi ### Windows -Update your devices to a supported version of Windows 11 or Windows 10. For more information, see [Adopting Windows as a service](../core/understand/configuration-manager-and-windows-as-service.md#windows-as-a-service). +Update your devices to an [Intune supported version of Windows 11 or Windows 10](../../intune/fundamentals/supported-devices-browsers.md). For more information, see [Adopting Windows as a service](../core/understand/configuration-manager-and-windows-as-service.md#windows-as-a-service). ### Permissions and roles diff --git a/memdocs/configmgr/comanage/quickstart-hybrid-aad.md b/memdocs/configmgr/comanage/quickstart-hybrid-aad.md index 244766593df..47d49e7b391 100644 --- a/memdocs/configmgr/comanage/quickstart-hybrid-aad.md +++ b/memdocs/configmgr/comanage/quickstart-hybrid-aad.md @@ -16,9 +16,9 @@ ms.reviewer: mstewart,aaroncz # Use Microsoft Entra ID for co-management -In the cloud, identity is the new control plane. Microsoft Entra ID allows you to link your users, devices, and applications across both cloud and on-premises environments. Registering your devices to Microsoft Entra ID enables you to improve productivity for your users and security for your resources. Having devices in Microsoft Entra ID is the foundation for both co-management and device-based conditional access. +In the cloud, identity is the new control plane. Microsoft Entra ID allows you to link your users, devices, and applications across both cloud and on-premises environments. Registering your devices to Microsoft Entra ID enables you to improve productivity for your users and security for your resources. Having devices in Microsoft Entra ID is the foundation for both co-management and device-based Conditional Access. -For more information on device-based conditional access, see [How To: Require managed devices for cloud app access with conditional access](/azure/active-directory/conditional-access/require-managed-devices). +For more information on device-based Conditional Access, see [How To: Require managed devices for cloud app access with Conditional Access](/azure/active-directory/conditional-access/require-managed-devices). In the following video, senior program manager Sandeep Deo and product marketing manager Adam Harbour discuss and demo Microsoft Entra ID for co-management: @@ -66,11 +66,11 @@ Windows Hello for Business brings strong password-less authentication to Windows For more information, see [Windows Hello for Business](/windows/security/identity-protection/hello-for-business/hello-identity-verification). -### Device-based conditional access +### Device-based Conditional Access -Enable conditional access based on the device state to better protect your organization's data. Device-based conditional access requires a managed device. This device must be a compliant device or a Microsoft Entra hybrid joined device. For Microsoft Entra joined devices, you need Intune to mark the device as compliant. But for Microsoft Entra hybrid joined devices, the device state itself is used to evaluate conditional access. Co-management provides you the additional advantage of evaluating compliance through Intune for Microsoft Entra hybrid joined devices. This feature makes sure the device configuration is intact. +Enable Conditional Access based on the device state to better protect your organization's data. Device-based Conditional Access requires a managed device. This device must be a compliant device or a Microsoft Entra hybrid joined device. For Microsoft Entra joined devices, you need Intune to mark the device as compliant. But for Microsoft Entra hybrid joined devices, the device state itself is used to evaluate Conditional Access. Co-management provides you the additional advantage of evaluating compliance through Intune for Microsoft Entra hybrid joined devices. This feature makes sure the device configuration is intact. -For more information on device-based conditional access, see [How To: Require managed devices for cloud app access with conditional access](/azure/active-directory/conditional-access/require-managed-devices). +For more information on device-based Conditional Access, see [How To: Require managed devices for cloud app access with Conditional Access](/azure/active-directory/conditional-access/require-managed-devices). ### Automatic device licensing diff --git a/memdocs/configmgr/comanage/quickstarts.md b/memdocs/configmgr/comanage/quickstarts.md index f42ccdda0a9..5f7573ae183 100644 --- a/memdocs/configmgr/comanage/quickstarts.md +++ b/memdocs/configmgr/comanage/quickstarts.md @@ -28,13 +28,13 @@ In the following video, Microsoft corporate vice president Brad Anderson introdu | Immediate value | Getting started | |-----------------|-----------------| -| - [Conditional access](#bkmk_ca)
- [Remote actions from Intune](#bkmk_remote)
- [Client health](#bkmk_client-health)
- [Hybrid Microsoft Entra ID](#bkmk_hybrid-aad)
- [Windows Autopilot](#bkmk_autopilot) | - [Paths to co-management](#bkmk_paths)
- [Set up hybrid Microsoft Entra ID](#bkmk_setup-hybrid-aad)
- [Upgrade Windows](#bkmk_upgrade-win10)
- [Get help from FastTrack](#bkmk_fasttrack) | +| - [Conditional Access](#bkmk_ca)
- [Remote actions from Intune](#bkmk_remote)
- [Client health](#bkmk_client-health)
- [Hybrid Microsoft Entra ID](#bkmk_hybrid-aad)
- [Windows Autopilot](#bkmk_autopilot) | - [Paths to co-management](#bkmk_paths)
- [Set up hybrid Microsoft Entra ID](#bkmk_setup-hybrid-aad)
- [Upgrade Windows](#bkmk_upgrade-win10)
- [Get help from FastTrack](#bkmk_fasttrack) | ## Immediate value |Title |Description |Link | |-|-|-| -| **Conditional access with device compliance** | Control user access to corporate resources based on compliance rules from Intune. | [![Thumbnail of conditional access video.](media/thumbnail-conditional-access.png)](quickstart-conditional-access.md) | +| **Conditional Access with device compliance** | Control user access to corporate resources based on compliance rules from Intune. | [![Thumbnail of Conditional Access video.](media/thumbnail-conditional-access.png)](quickstart-conditional-access.md) | | **Remote actions from Intune** | Run remote actions from Intune for co-managed devices. For example, wipe and reset a device and maintain enrollment and account. | [![Thumbnail of remote actions video.](media/thumbnail-remote-action.png)](quickstart-remote-actions.md) | | **Configuration Manager client health** | Maintain visibility of Configuration Manager client health from the Microsoft Intune admin center. | [![Thumbnail of client health video.](media/thumbnail-client-health.png)](quickstart-client-health.md) | | **Microsoft Entra ID** | With Microsoft Entra ID you can take advantage of improved productivity for your users and security for your resources, across both cloud and on-prem environments. | [![Thumbnail of hybrid Microsoft Entra video.](media/thumbnail-azure-ad.png)](quickstart-hybrid-aad.md) | diff --git a/memdocs/configmgr/comanage/toc.yml b/memdocs/configmgr/comanage/toc.yml index cc370733ad6..d2d35509d2f 100644 --- a/memdocs/configmgr/comanage/toc.yml +++ b/memdocs/configmgr/comanage/toc.yml @@ -13,7 +13,7 @@ items: href: quickstarts.md - name: Immediate value items: - - name: Conditional access + - name: Conditional Access href: quickstart-conditional-access.md - name: Remote actions from Intune href: quickstart-remote-actions.md diff --git a/memdocs/configmgr/comanage/tutorial-co-manage-clients.md b/memdocs/configmgr/comanage/tutorial-co-manage-clients.md index bfc44265277..3337d988cca 100644 --- a/memdocs/configmgr/comanage/tutorial-co-manage-clients.md +++ b/memdocs/configmgr/comanage/tutorial-co-manage-clients.md @@ -183,4 +183,4 @@ When you enable co-management, you'll assign a collection as a *Pilot group*. Th - Review the status of co-managed devices with the [Co-management dashboard](how-to-monitor.md) - Start getting [immediate value](quickstarts.md#immediate-value) from co-management -- Use [conditional access](quickstart-conditional-access.md) and Intune compliance rules to manage user access to corporate resources +- Use [Conditional Access](quickstart-conditional-access.md) and Intune compliance rules to manage user access to corporate resources diff --git a/memdocs/configmgr/comanage/workloads.md b/memdocs/configmgr/comanage/workloads.md index 8560bd95d88..7ea466bc388 100644 --- a/memdocs/configmgr/comanage/workloads.md +++ b/memdocs/configmgr/comanage/workloads.md @@ -2,10 +2,10 @@ title: Co-management workloads titleSuffix: Configuration Manager description: Learn about the workloads that you can switch from Configuration Manager to Microsoft Intune. -author: gowdhamankarthikeyan -ms.author: gokarthi +author: Baladelli +ms.author: baladell manager: apoorvseth -ms.date: 03/24/2023 +ms.date: 12/04/2024 ms.topic: conceptual ms.subservice: co-management ms.service: configuration-manager @@ -38,7 +38,7 @@ Co-management supports the following workloads: ## Compliance policies -Compliance policies define the rules and settings that a device must comply with to be considered compliant by conditional access policies. Also use compliance policies to monitor and remediate compliance issues with devices independently of conditional access. You can add evaluation of custom configuration baselines as a compliance policy assessment rule. For more information, see [Include custom configuration baselines as part of compliance policy assessment](../compliance/deploy-use/create-configuration-baselines.md#bkmk_CAbaselines). +Compliance policies define the rules and settings that a device must comply with to be considered compliant by Conditional Access policies. Also use compliance policies to monitor and remediate compliance issues with devices independently of Conditional Access. You can add evaluation of custom configuration baselines as a compliance policy assessment rule. For more information, see [Include custom configuration baselines as part of compliance policy assessment](../compliance/deploy-use/create-configuration-baselines.md#bkmk_CAbaselines). For more information on the Intune feature, see [Use compliance policies to set rules for devices you manage with Intune](../../intune/protect/device-compliance-get-started.md). @@ -62,6 +62,7 @@ For more information on the Intune feature, see [Deploy resource access profiles > [!NOTE] > The resource access workload is also part of device configuration. These policies are managed by Intune when you switch the [Device Configuration](#device-configuration) workload. +> Starting in version 2403, The resource access policies node is removed from console. Slider is mandated to Intune and upgrade is blocked if old policieis are still available. ## Endpoint Protection @@ -152,6 +153,8 @@ For more information on the Intune feature, see [What is Microsoft Intune app ma When you enable Microsoft Connected Cache on your Configuration Manager distribution points, they can serve Microsoft Intune Win32 apps to co-managed clients. For more information, see [Microsoft Connected Cache with Configuration Manager](../core/plan-design/hierarchy/microsoft-connected-cache.md#support-for-intune-win32-apps). +For example, if you wish to deploy the new Store applications (winget) via Microsoft Intune, you need to switch this workload. + ## Diagram for app workloads :::image type="content" source="media/co-management-apps.svg" alt-text="Diagram of co-management app workloads." lightbox="media/co-management-apps.svg"::: diff --git a/memdocs/configmgr/compliance/TOC.yml b/memdocs/configmgr/compliance/TOC.yml index 8abbcd105eb..5c3a3741e61 100644 --- a/memdocs/configmgr/compliance/TOC.yml +++ b/memdocs/configmgr/compliance/TOC.yml @@ -3,6 +3,8 @@ items: href: index.yml - name: Understand and explore items: + - name: Understand compliance + href: understand/fundamentals-of-compliance.md - name: Ensure device compliance href: understand/ensure-device-compliance.md - name: Get started diff --git a/memdocs/configmgr/compliance/deploy-use/create-configuration-baselines.md b/memdocs/configmgr/compliance/deploy-use/create-configuration-baselines.md index e7eb3ae1dd2..44a7e658137 100644 --- a/memdocs/configmgr/compliance/deploy-use/create-configuration-baselines.md +++ b/memdocs/configmgr/compliance/deploy-use/create-configuration-baselines.md @@ -79,7 +79,7 @@ To create a configuration baseline by using the **Create Configuration Baseline* ## Include custom configuration baselines as part of compliance policy assessment -You can add evaluation of custom configuration baselines as a compliance policy assessment rule. When you create or edit a configuration baseline, you have an option to **Evaluate this baseline as part of compliance policy assessment**. When adding or editing a compliance policy rule, you have a condition called **Include configured baselines in compliance policy assessment**. For co-managed devices, and when you configure Intune to take Configuration Manager compliance assessment results as part of the overall compliance status, this information is sent to Microsoft Entra ID. You can then use it for conditional access to your Microsoft 365 Apps resources. For more information, see [Conditional access with co-management](../../comanage/quickstart-conditional-access.md). +You can add evaluation of custom configuration baselines as a compliance policy assessment rule. When you create or edit a configuration baseline, you have an option to **Evaluate this baseline as part of compliance policy assessment**. When adding or editing a compliance policy rule, you have a condition called **Include configured baselines in compliance policy assessment**. For co-managed devices, and when you configure Intune to take Configuration Manager compliance assessment results as part of the overall compliance status, this information is sent to Microsoft Entra ID. You can then use it for Conditional Access to your Microsoft 365 Apps resources. For more information, see [Conditional Access with co-management](../../comanage/quickstart-conditional-access.md). To include custom configuration baselines as part of compliance policy assessment, do the following: diff --git a/memdocs/configmgr/compliance/understand/fundamentals-of-compliance.md b/memdocs/configmgr/compliance/understand/fundamentals-of-compliance.md new file mode 100644 index 00000000000..b88d4cf1121 --- /dev/null +++ b/memdocs/configmgr/compliance/understand/fundamentals-of-compliance.md @@ -0,0 +1,55 @@ +--- +title: Understand compliance in Configuration Manager +author: dougeby +ms.author: dougeby +manager: dougeby +audience: ITPro +ms.topic: conceptual +ms.service: configuration-manager +ms.collection: + - tier1 + - essentials-compliance +description: Learn about compliance certifications, dependencies, and features in Configuration Manager supporting data protection and regulatory requirements. +ms.date: 12/3/2024 +--- + +# Understand compliance in Configuration Manager + +Configuration Manager supports compliance features to help organizations meet national, regional, and industry-specific regulations. Configuration Manager aligns with Microsoft's commitment to data protection, privacy, and compliance, by offering tools to help secure and manage data effectively. + +## Shared responsibility model + +Microsoft ensures that Configuration Manager complies with various industry standards and regulatory frameworks. However, customers are responsible for implementing their data protection and compliance strategies to align with their specific organizational requirements. + +## Compliance dependencies + +Configuration Manager leverages other Microsoft services for compliance, including: + +- [Microsoft Entra ID](/entra/fundamentals/whatis): Identity and access management. +- [Microsoft Intune](/mem/intune): Enforces device compliance and conditional access policies. + +## Microsoft Intune capabilities for compliance + +Microsoft Intune helps enforce compliance policies and protect organizational data specifically for Intune: + +- **Conditional Access**: Ensures only compliant devices and apps managed by Intune can access sensitive data. See [Conditional Access](/mem/intune/protect/conditional-access). +- **Device Compliance Enforcement**: Enforces device compliance policies to meet organizational security requirements. See [Device Compliance Policies](/mem/intune/protect/device-compliance-get-started). + +For more information about Intune compliance capabilities, visit the [Microsoft Intune documentation](/mem/intune). +> [!NOTE] +> For more information about how to concurrently manage Windows 10 or later devices by using both Configuration Manager and Microsoft Intune, see [What is co-management?](/mem/configmgr/comanage/overview). + +## Data encryption + +Use Configuration Manager to manage BitLocker Drive Encryption (BDE) for on-premises Windows clients, which are joined to Active Directory. It provides full BitLocker lifecycle management that can replace the use of Microsoft BitLocker Administration and Monitoring. For more information, see [Plan for BitLocker management](/mem/configmgr/protect/plan-design/bitlocker-management). + +## Compliance features + +Configuration Manager includes several compliance features that help organizations manage device compliance. For more information, see [Ensure device compliance with Configuration Manager](/mem/configmgr/compliance/understand/ensure-device-compliance). + +## Related articles + +- [Microsoft Privacy Statement](https://privacy.microsoft.com/privacystatement) +- [Microsoft Trust Center](https://www.microsoft.com/trust-center) +- [Additional privacy information](/mem/configmgr/core/plan-design/security/additional-privacy) +- [Fundamentals of security](/mem/configmgr/core/understand/fundamentals-of-security) diff --git a/memdocs/configmgr/core/TOC.yml b/memdocs/configmgr/core/TOC.yml index 685bfb6d8ac..4ee07544c9c 100644 --- a/memdocs/configmgr/core/TOC.yml +++ b/memdocs/configmgr/core/TOC.yml @@ -85,14 +85,12 @@ items: href: plan-design/changes/features-and-capabilities.md - name: What's new in incremental versions href: plan-design/changes/whats-new-incremental-versions.md + - name: What's new in version 2409 + href: plan-design/changes/whats-new-in-version-2409.md - name: What's new in version 2403 href: plan-design/changes/whats-new-in-version-2403.md - name: What's new in version 2309 href: plan-design/changes/whats-new-in-version-2309.md - - name: What's new in version 2303 - href: plan-design/changes/whats-new-in-version-2303.md - - name: What's new in version 2211 - href: plan-design/changes/whats-new-in-version-2211.md - name: What's changed from Configuration Manager 2012 href: plan-design/changes/what-has-changed-from-configuration-manager-2012.md - name: Removed and deprecated @@ -221,14 +219,12 @@ items: items: - name: Overview of levels href: plan-design/diagnostics/levels-overview.md + - name: Data for version 2409 + href: plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-2409.md - name: Data for version 2403 href: plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-2403.md - name: Data for version 2309 - href: plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-2309.md - - name: Data for version 2303 - href: plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-2303.md - - name: Data for version 2211 - href: plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-2211.md + href: plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-2309.md - name: Configuration Manager tools href: plan-design/diagnostics/tools.md - name: Frequently asked questions (FAQ) @@ -279,14 +275,15 @@ items: items: - name: Technical Preview overview href: get-started/technical-preview.md + - name: 2411 features + href: get-started/2024/technical-preview-2411.md - name: 2405 features href: get-started/2024/technical-preview-2405.md - name: 2401 features href: get-started/2024/technical-preview-2401.md - name: 2311 features href: get-started/2023/technical-preview-2311.md - - name: 2307 features - href: get-started/2023/technical-preview-2307.md + - name: Migrate data between hierarchies @@ -567,14 +564,12 @@ items: href: servers/manage/use-the-update-registration-tool-to-import-hotfixes.md - name: Use the hotfix installer href: servers/manage/use-the-hotfix-installer-to-install-updates.md + - name: Checklist for installing update 2409 + href: servers/manage/checklist-for-installing-update-2409.md - name: Checklist for installing update 2403 href: servers/manage/checklist-for-installing-update-2403.md - name: Checklist for installing update 2309 href: servers/manage/checklist-for-installing-update-2309.md - - name: Checklist for installing update 2303 - href: servers/manage/checklist-for-installing-update-2303.md - - name: Checklist for installing update 2211 - href: servers/manage/checklist-for-installing-update-2211.md - name: Support for current branch versions href: servers/manage/current-branch-versions-supported.md - name: Backup and recovery diff --git a/memdocs/configmgr/core/clients/deploy/deploy-clients-to-windows-computers.md b/memdocs/configmgr/core/clients/deploy/deploy-clients-to-windows-computers.md index 21a1d4527b4..b1ef624d945 100644 --- a/memdocs/configmgr/core/clients/deploy/deploy-clients-to-windows-computers.md +++ b/memdocs/configmgr/core/clients/deploy/deploy-clients-to-windows-computers.md @@ -2,12 +2,12 @@ title: Deploy clients to Windows titleSuffix: Configuration Manager description: Learn how to deploy the Configuration Manager client to Windows computers. -ms.date: 09/18/2023 +ms.date: 12/04/2024 ms.subservice: client-mgt ms.service: configuration-manager ms.topic: how-to -author: sheetg09 -ms.author: sheetg +author: Baladelli +ms.author: Baladell manager: apoorvseth ms.localizationpriority: medium ms.collection: tier3 diff --git a/memdocs/configmgr/core/clients/manage/client-notification.md b/memdocs/configmgr/core/clients/manage/client-notification.md index f720ab4ec5c..d5955f26072 100644 --- a/memdocs/configmgr/core/clients/manage/client-notification.md +++ b/memdocs/configmgr/core/clients/manage/client-notification.md @@ -121,9 +121,9 @@ Trigger clients to switch to the next available software update point. For more Trigger Windows 10 or later clients to check and send their latest device health state. For more information, see [Health attestation](../../servers/manage/health-attestation.md). -### Check conditional access compliance +### Check Conditional Access compliance -Trigger clients to check compliance for conditional access policies. For more information, see [Conditional access](../../../comanage/quickstart-conditional-access.md). +Trigger clients to check compliance for Conditional Access policies. For more information, see [Conditional Access](../../../comanage/quickstart-conditional-access.md). ### Wake Up diff --git a/memdocs/configmgr/core/clients/manage/cmg/cloud-management-gateway-faq.yml b/memdocs/configmgr/core/clients/manage/cmg/cloud-management-gateway-faq.yml index 32bd83a3829..7f5639751aa 100644 --- a/memdocs/configmgr/core/clients/manage/cmg/cloud-management-gateway-faq.yml +++ b/memdocs/configmgr/core/clients/manage/cmg/cloud-management-gateway-faq.yml @@ -6,7 +6,7 @@ metadata: author: baladelli ms.author: baladell manager: apoorvseth - ms.date: 20/04/2024 + ms.date: 12/04/2024 ms.topic: faq ms.subservice: client-mgt ms.service: configuration-manager @@ -151,3 +151,5 @@ sections: No. You may have seen the following blog post and are wondering how it applies to Configuration Manager: [Update your applications to use Microsoft Authentication Library and Microsoft Graph API](https://techcommunity.microsoft.com/t5/azure-active-directory-identity/update-your-applications-to-use-microsoft-authentication-library/ba-p/1257363). This post is referring to any developed code that uses these authentication libraries. Configuration Manager has been using the Microsoft Graph API and Microsoft Authentication Library (MSAL) in some places for several years. All other components are updated in Configuration Manager version 2107 with the [update rollup](../../../../hotfix/2107/11121541.md). If you stay current with Configuration Manager versions, there's nothing else you need to do. Some people confuse the information in this blog post with the application registrations in Microsoft Entra ID that Configuration Manager uses for various cloud-attached services. These app registrations are cloud-based service principals that don't directly use these authentication libraries. If an Azure global administrator manually created the Configuration Manager app registrations in Microsoft Entra ID, they can double-check that those registrations have permissions for the **Microsoft Graph** API. They don't need permissions for the _Azure AD Graph_ API. For more information, see [Manually register Microsoft Entra apps](manually-register-azure-ad-apps.md). + + For more information : [Migrate your apps from Azure AD Graph to Microsoft Graph](https://learn.microsoft.com/en-us/graph/migrate-azure-ad-graph-overview). diff --git a/memdocs/configmgr/core/clients/manage/cmg/overview.md b/memdocs/configmgr/core/clients/manage/cmg/overview.md index abe60342a58..3ce3599e9cf 100644 --- a/memdocs/configmgr/core/clients/manage/cmg/overview.md +++ b/memdocs/configmgr/core/clients/manage/cmg/overview.md @@ -2,7 +2,7 @@ title: Cloud management gateway overview titleSuffix: Configuration Manager description: Learn about managing internet-based clients with Configuration Manager by using the cloud management gateway (CMG) service in Azure. -ms.date: 08/02/2021 +ms.date: 12/16/2024 ms.subservice: client-mgt ms.service: configuration-manager ms.topic: overview diff --git a/memdocs/configmgr/core/clients/manage/collections/use-maintenance-windows.md b/memdocs/configmgr/core/clients/manage/collections/use-maintenance-windows.md index 10d90abb752..208706540d9 100644 --- a/memdocs/configmgr/core/clients/manage/collections/use-maintenance-windows.md +++ b/memdocs/configmgr/core/clients/manage/collections/use-maintenance-windows.md @@ -103,3 +103,25 @@ You can use PowerShell to configure maintenance windows. For more information, s - [New-CMMaintenanceWindow](/powershell/module/configurationmanager/new-cmmaintenancewindow) - [Remove-CMMaintenanceWindow](/powershell/module/configurationmanager/remove-cmmaintenancewindow) - [Set-CMMaintenanceWindow](/powershell/module/configurationmanager/set-cmmaintenancewindow) + + +## Known Issues + +### Using Offset Maintenance Windows in the last week of the month + + + + +Offset Maintenance Windows scheduled in the last week of the month may encounter the following scheduling discrepancies: + +- If the offset value causes the start date to fall in the following month, it will be adjusted to the end of the current month. +- If the offset value causes the start date to fall on the last day of the current month, no Maintenance Window will be scheduled for that month. + +### UTC Maintenance Windows and Daylight Saving Time + + + +When calculating the difference from UTC to local time, the client will use the active [bias](/exchange/client-developer/web-service-reference/bias) from the "Effective date" of the maintenance window to calculate the local time from the UTC time: + +- If Daylight Saving Time (DST) is active on the effective date, then this bias from UTC will always be used, causing the Maintenance Window to open an hour earlier than expected when DST ends. +- If Daylight Saving Time (DST) is not active on the effective date, then this bias from UTC will always be used, causing the Maintenance Window to open an hour later than expected when DST starts. diff --git a/memdocs/configmgr/core/clients/manage/configure-client-cache.md b/memdocs/configmgr/core/clients/manage/configure-client-cache.md index 9f792ce4095..5a06cbfa24e 100644 --- a/memdocs/configmgr/core/clients/manage/configure-client-cache.md +++ b/memdocs/configmgr/core/clients/manage/configure-client-cache.md @@ -2,7 +2,7 @@ title: Configure the client cache titleSuffix: Configuration Manager description: Configure the client content cache during or after client install. -ms.date: 06/16/2021 +ms.date: 12/16/2024 ms.subservice: client-mgt ms.service: configuration-manager ms.topic: how-to diff --git a/memdocs/configmgr/core/get-started/2024/includes/2411/17419432.md b/memdocs/configmgr/core/get-started/2024/includes/2411/17419432.md new file mode 100644 index 00000000000..36e604e1770 --- /dev/null +++ b/memdocs/configmgr/core/get-started/2024/includes/2411/17419432.md @@ -0,0 +1,17 @@ +--- +author: Palikasingh +ms.author: palsi +manager: apoorvseth +ms.subservice: core-infra +ms.service: configuration-manager +ms.topic: include +ms.date: 11/28/2024 +ms.localizationpriority: medium +--- + +## Software metering support in Arm64 devices + +The Configuration Manager now supports Software metering for Arm64 devices. Software metering is used to monitor Windows PC desktop apps with a filename ending in .exe. +For more information, see [Software metering in Configuration Manager](../../../../../apps/deploy-use/monitor-app-usage-with-software-metering.md). + + diff --git a/memdocs/configmgr/core/get-started/2024/includes/2411/26942563.md b/memdocs/configmgr/core/get-started/2024/includes/2411/26942563.md new file mode 100644 index 00000000000..cbb4787c5f0 --- /dev/null +++ b/memdocs/configmgr/core/get-started/2024/includes/2411/26942563.md @@ -0,0 +1,26 @@ +--- +author: Palikasingh +ms.author: palsi +manager: apoorvseth +ms.subservice: core-infra +ms.service: configuration-manager +ms.topic: include +ms.date: 11/28/2024 +ms.localizationpriority: medium +--- + +## Operating System support added for Windows 11 24H2 and Windows Server 2025 + + +With this version of Configuration Manager, support is added for Windows 11 24H2 and Windows Server 2025. + + - Windows 11 24H2 & Windows Server 2025 are added to the product lifecycle dashboard and supported platform. + - Windows 11 24H2 & Windows Server 2025 client support is added. + - Boot image creation in CM on Windows Server 2025 now supports latest Windows ADK. + - Windows upgrade readiness dashboard now supports Windows 11 24H2 for upgrading clients. + + > [!NOTE] +> Windows Server and Windows 11 24H2 do not support Firewall rules. This will result in a non-compliant status in the Configuration Manager applet. + + + diff --git a/memdocs/configmgr/core/get-started/2024/includes/2411/27212884.md b/memdocs/configmgr/core/get-started/2024/includes/2411/27212884.md new file mode 100644 index 00000000000..ff2cb966605 --- /dev/null +++ b/memdocs/configmgr/core/get-started/2024/includes/2411/27212884.md @@ -0,0 +1,14 @@ +--- +author: Palikasingh +ms.author: palsi +manager: apoorvseth +ms.subservice: core-infra +ms.service: configuration-manager +ms.topic: include +ms.date: 11/28/2024 +ms.localizationpriority: medium +--- + +## SQL 2012 and 2014 support are deprecated + +Starting with this version, Configuration Manager no longer supports SQL Server 2012 and 2014. Upgrade to the latest SQL Server version or at least SQL Server 2016. If you don’t upgrade, CM upgrades are blocked, and you see an error during the prereq check. diff --git a/memdocs/configmgr/core/get-started/2024/includes/2411/27297018.md b/memdocs/configmgr/core/get-started/2024/includes/2411/27297018.md new file mode 100644 index 00000000000..b62745e7c0c --- /dev/null +++ b/memdocs/configmgr/core/get-started/2024/includes/2411/27297018.md @@ -0,0 +1,36 @@ +--- +author: Palikasingh +ms.author: palsi +manager: apoorvseth +ms.subservice: core-infra +ms.service: configuration-manager +ms.topic: include +ms.date: 11/28/2024 +ms.localizationpriority: medium +--- + + +## Enhanced Security for CMG + + +CMG Setup now uses managed identities and third party **Server App** to interact with CMG's Azure storage account, instead of storage account keys. + - Hence storage account key access is disabled for new CMG setup. + + - For sessions upgrading from earlier versions to 2411 tp, the **CMG Enhance Security** button is shown as enabled. + + :::image type="content" alt-text="Screenshot of cm enhanced window in the console." source="../../media/27297018-Cmg-Enhanced.png" lightbox="../../media/27297018-Cmg-Enhanced.png"::: + + - When the enhanced security option is selected, the VMSS OS Auto Upgrade feature is also activated. An extra panel appears, prompting the admin to provide maintenance window details. Azure uses this information to schedule upgrades whenever new OS images become available. + + :::image type="content" alt-text="Screenshot of service window in the console." source="../../media/27297018-service-window.png" lightbox="../../media/27297018-service-window.png"::: + + +### CMG Entra Application secret key renewal + +The 'Renew Secret Key' feature now opens a dialog with four options for the validity period. This update also prevents applications older than 800 days (approximately two years) from renewing their secret keys. The same options are available when creating a new app. + + :::image type="content" alt-text="Screenshot of service window in the console." source="../../media/27297018-secret-window.png" lightbox="../../media/27297018-secret-window.png"::: + +>[!NOTE] +>The admin must sign in using tenant global administrator credentials and then click on the renew button. + diff --git a/memdocs/configmgr/core/get-started/2024/media/27297018-Cmg-Enhanced.png b/memdocs/configmgr/core/get-started/2024/media/27297018-Cmg-Enhanced.png new file mode 100644 index 00000000000..fae940ae910 Binary files /dev/null and b/memdocs/configmgr/core/get-started/2024/media/27297018-Cmg-Enhanced.png differ diff --git a/memdocs/configmgr/core/get-started/2024/media/27297018-secret-window.png b/memdocs/configmgr/core/get-started/2024/media/27297018-secret-window.png new file mode 100644 index 00000000000..9d957539351 Binary files /dev/null and b/memdocs/configmgr/core/get-started/2024/media/27297018-secret-window.png differ diff --git a/memdocs/configmgr/core/get-started/2024/media/27297018-service-window.png b/memdocs/configmgr/core/get-started/2024/media/27297018-service-window.png new file mode 100644 index 00000000000..d39a2324cdd Binary files /dev/null and b/memdocs/configmgr/core/get-started/2024/media/27297018-service-window.png differ diff --git a/memdocs/configmgr/core/get-started/2024/technical-preview-2411.md b/memdocs/configmgr/core/get-started/2024/technical-preview-2411.md new file mode 100644 index 00000000000..017a9083891 --- /dev/null +++ b/memdocs/configmgr/core/get-started/2024/technical-preview-2411.md @@ -0,0 +1,37 @@ +--- +title: Technical preview 2411 +titleSuffix: Configuration Manager +description: Learn about new features available in the Configuration Manager technical preview branch version 2411. +ms.date: 11/28/2024 +ms.service: configuration-manager +ms.topic: conceptual +author: PalikaSingh +ms.author: palsi +manager: apoorvseth +ROBOTS: NOINDEX, NOFOLLOW +ms.localizationpriority: medium +ms.collection: tier3 +ms.reviewer: mstewart,aaroncz +--- +# Features in Configuration Manager technical preview version 2411 + +*Applies to: Configuration Manager (technical preview branch)* + +This article introduces the features that are available in the technical preview for Configuration Manager, version 2411. Install this version to update and add new features to your technical preview site. When you install a new technical preview site, this release is also available as a baseline version. + +Review the [technical preview](../technical-preview.md) article before installing this update. That article familiarizes you with the general requirements and limitations for using a technical preview, how to update between versions, and how to provide feedback. + +The following sections describe the new features to try out in this version: + +[!INCLUDE [Operating System support added for Windows 11 24H2 and Windows Server 2025](includes/2411/26942563.md)] +[!INCLUDE [Enhanced Security for CMG](includes/2411/27297018.md)] +[!INCLUDE [SQL 2012 and 2014 support are deprecated](includes/2411/27212884.md)] +[!INCLUDE [Software metering support in Arm64 devices](includes/2411/17419432.md)] + + +## Next steps + +For more information about installing or updating the technical preview branch, see [Technical preview](../technical-preview.md). + +For more information about the different branches of Configuration Manager, see [Which branch of Configuration Manager should I use?](../../understand/which-branch-should-i-use.md). + diff --git a/memdocs/configmgr/core/get-started/capabilities-in-technical-preview-1601.md b/memdocs/configmgr/core/get-started/capabilities-in-technical-preview-1601.md index dd6550bf6a7..9edfe904457 100644 --- a/memdocs/configmgr/core/get-started/capabilities-in-technical-preview-1601.md +++ b/memdocs/configmgr/core/get-started/capabilities-in-technical-preview-1601.md @@ -58,9 +58,9 @@ In the 1601 Technical Preview, we have added support for the following features: ### Improvements to Conditional Access -- **Conditional access support for PCs that are managed by Configuration Manager** +- **Conditional Access support for PCs that are managed by Configuration Manager** - You can now set conditional access policies for PCs managed by Configuration Manager, which will require that the PCs be compliant with the compliance policy in order to access Exchange Online and SharePoint Online services. With this new functionality, you can also register PCs with Microsoft Entra ID through the compliance policy, and to monitor and report on Microsoft Entra registration. + You can now set Conditional Access policies for PCs managed by Configuration Manager, which will require that the PCs be compliant with the compliance policy in order to access Exchange Online and SharePoint Online services. With this new functionality, you can also register PCs with Microsoft Entra ID through the compliance policy, and to monitor and report on Microsoft Entra registration. > [!NOTE] > Conditional Access is not yet supported on Windows 10. @@ -73,7 +73,7 @@ In the 1601 Technical Preview, we have added support for the following features: - [Prerequisites for Microsoft Entra auto-registration](/azure/active-directory/devices/hybrid-azuread-join-plan?rnd=1). - To use the option, you must create a compliance policy in Configuration Manager with specific rules described below, and set a conditional access policy in the Intune console. Also, to make sure only compliant PCs are allowed access, you must set the Windows PC requirement to **Devices must be compliant** option. Following are the compliant policy rules that are applicable to PCs managed by Configuration Manager. + To use the option, you must create a compliance policy in Configuration Manager with specific rules described below, and set a Conditional Access policy in the Intune console. Also, to make sure only compliant PCs are allowed access, you must set the Windows PC requirement to **Devices must be compliant** option. Following are the compliant policy rules that are applicable to PCs managed by Configuration Manager. - **Require registration in Microsoft Entra ID:** This rule checks if the user's device is work place joined to Microsoft Entra ID, and if not, the device is automatically registered in Microsoft Entra ID. Automatic registration is only supported on Windows 8.1. For Windows 7 PCs, deploy an MSI to perform the auto registration. For more information, see [here](/azure/active-directory/devices/hybrid-azuread-join-plan?rnd=1). @@ -86,7 +86,7 @@ In the 1601 Technical Preview, we have added support for the following features: End-users who are blocked due to noncompliance will view compliance information in the Software Center and will initiate a new policy evaluation when compliance issues are remediated. -- **Conditional access with Health Attestation Service** You can now restrict access to email and 0365 services based on the health of the devices as reported by the Health Attestation Service. Additionally, devices that are managed by Intune are included in the device health reports. +- **Conditional Access with Health Attestation Service** You can now restrict access to email and 0365 services based on the health of the devices as reported by the Health Attestation Service. Additionally, devices that are managed by Intune are included in the device health reports. A new compliance rule has been added to the configuration manager console that allows you to specify if the devices should be allowed or blocked access based on their health status. To create this rule, open the **Create Compliance Policy Wizard**, and add a new rule. Select the **Reported as health by Health Attestation Service** for the condition, and set the value to **True**. This will make sure that only devices that are reported as healthy will have access to your company resources. For details about Health Attestation Service and how the health of the devices is reported in Intune, see [Device Health Attestation](capabilities-in-technical-preview-1512.md#bkmk_devicehealth). diff --git a/memdocs/configmgr/core/get-started/capabilities-in-technical-preview-1610.md b/memdocs/configmgr/core/get-started/capabilities-in-technical-preview-1610.md index 46a5ad49347..137355f7da8 100644 --- a/memdocs/configmgr/core/get-started/capabilities-in-technical-preview-1610.md +++ b/memdocs/configmgr/core/get-started/capabilities-in-technical-preview-1610.md @@ -153,9 +153,9 @@ In addition to Full Administrator, the following built-in security roles now hav Read-only access to these areas of the Configuration Manager console is still granted to the **Read-only Analyst** role. -## Conditional access for Windows 10 VPN profiles +## Conditional Access for Windows 10 VPN profiles -You can now require Windows 10 devices enrolled in Microsoft Entra ID to be compliant in order to have VPN access through Windows 10 VPN profiles created in the Configuration Manager console. This is possible through the new **Enable conditional access for this VPN connection** checkbox on the **Authentication Method** page in the VPN profile wizard and VPN profile properties for Windows 10 VPN profiles. You can also specify a separate certificate for single sign-on authentication if you enable conditional access for the profile. +You can now require Windows 10 devices enrolled in Microsoft Entra ID to be compliant in order to have VPN access through Windows 10 VPN profiles created in the Configuration Manager console. This is possible through the new **Enable Conditional Access for this VPN connection** checkbox on the **Authentication Method** page in the VPN profile wizard and VPN profile properties for Windows 10 VPN profiles. You can also specify a separate certificate for single sign-on authentication if you enable Conditional Access for the profile. ## See Also [Technical Preview for Configuration Manager](../../core/get-started/technical-preview.md) diff --git a/memdocs/configmgr/core/get-started/capabilities-in-technical-preview-1702.md b/memdocs/configmgr/core/get-started/capabilities-in-technical-preview-1702.md index 6e012644332..c1a08655f63 100644 --- a/memdocs/configmgr/core/get-started/capabilities-in-technical-preview-1702.md +++ b/memdocs/configmgr/core/get-started/capabilities-in-technical-preview-1702.md @@ -105,15 +105,15 @@ See the following for more information about Microsoft Entra ID: - [Microsoft Entra Domain Services product information](https://azure.microsoft.com/services/active-directory-ds) - [Active Directory Domain Services documentation](/azure/active-directory-domain-services/) -## Conditional access device compliance policy improvements +## Conditional Access device compliance policy improvements -A new device compliance policy rule is available to help you block access to corporate resources that support conditional access, when users are using apps that are part of a non-compliant list of apps. The non-compliant list of apps can be defined by the admin when adding the new compliant rule **Apps that cannot be installed**. This rule requires the admin to enter the **App Name**, the **App ID**, and the **App Publisher** (optional) when adding an app to the non-compliant list. This setting only applies to iOS and Android devices. +A new device compliance policy rule is available to help you block access to corporate resources that support Conditional Access, when users are using apps that are part of a non-compliant list of apps. The non-compliant list of apps can be defined by the admin when adding the new compliant rule **Apps that cannot be installed**. This rule requires the admin to enter the **App Name**, the **App ID**, and the **App Publisher** (optional) when adding an app to the non-compliant list. This setting only applies to iOS and Android devices. Additionally, this helps organizations to mitigate data leakage through unsecured apps, and prevent excessive data consumption through certain apps. ### Try it out -**Scenario:** Identify apps that might be causing data leakage by sending corporate data outside your company, or that are causing excessive data consumption, then [create a conditional access device compliance policy](../../mdm/understand/what-happened-to-hybrid.md) that adds these apps into the non-compliant list of apps. This will block access to corporate resources that support conditional access until the user can remove the blocked app. +**Scenario:** Identify apps that might be causing data leakage by sending corporate data outside your company, or that are causing excessive data consumption, then [create a Conditional Access device compliance policy](../../mdm/understand/what-happened-to-hybrid.md) that adds these apps into the non-compliant list of apps. This will block access to corporate resources that support Conditional Access until the user can remove the blocked app. ## Antimalware client version alert Beginning with this preview version, Configuration Manager Endpoint Protection provides an alert if more than 20% (default) of managed clients are using an expired version of the antimalware client (i.e. Windows Defender or Endpoint Protection client). @@ -124,7 +124,7 @@ Ensure Endpoint Protection is enabled on all desktop and server clients using cl To configure the percentage at which the alert is generated, expand **Monitoring** > **Alerts** > **All Alerts**, double-click **Antimalware clients out of date** and modify the **Raise alert if percentage of managed clients with an outdated version of the antimalware client is more than** option. ## Compliance assessment for Windows Update for Business updates -You can now configure a compliance policy update rule to include a Windows Update for Business assessment result as part of the conditional access evaluation. +You can now configure a compliance policy update rule to include a Windows Update for Business assessment result as part of the Conditional Access evaluation. > [!IMPORTANT] > You must have Windows 10 Insider Preview Build 15019 or later to use compliance assessment for Windows Update for Business updates. diff --git a/memdocs/configmgr/core/get-started/capabilities-in-technical-preview-1706.md b/memdocs/configmgr/core/get-started/capabilities-in-technical-preview-1706.md index 32ab1a016db..541d9fc7380 100644 --- a/memdocs/configmgr/core/get-started/capabilities-in-technical-preview-1706.md +++ b/memdocs/configmgr/core/get-started/capabilities-in-technical-preview-1706.md @@ -566,9 +566,9 @@ Setting DisallowCrossProfileCopyPaste to true prevents copy-paste behavior betwe 3. In the device setting groups to configure, select **Work Profile**, and choose **Next**. 4. Select the value for **Allow data sharing between work and personal profiles**, and then complete the wizard. -## Device Health Attestation assessment for compliance policies for conditional access +## Device Health Attestation assessment for compliance policies for Conditional Access -Starting with this release you can use Device Health Attestation status as a compliance policy rule for conditional access to company resources. +Starting with this release you can use Device Health Attestation status as a compliance policy rule for Conditional Access to company resources. ### Try it out Select a Device Health Attestation rule as part of a compliance policy assessment. diff --git a/memdocs/configmgr/core/get-started/capabilities-in-technical-preview-1709.md b/memdocs/configmgr/core/get-started/capabilities-in-technical-preview-1709.md index 73875c80b30..c681e4c87dc 100644 --- a/memdocs/configmgr/core/get-started/capabilities-in-technical-preview-1709.md +++ b/memdocs/configmgr/core/get-started/capabilities-in-technical-preview-1709.md @@ -106,7 +106,7 @@ The following are general prerequisites for you to enable co-management: After you enable co-management, Configuration Manager continues to manage all workloads. When you decide that you are ready, you can have Intune start managing available workloads. In this release, you can have Intune manage the following workloads. #### Compliance policies -Compliance policies define the rules and settings that a device must comply with to be considered compliant by conditional access policies. You can also use compliance policies to monitor and remediate compliance issues with devices independently of conditional access. +Compliance policies define the rules and settings that a device must comply with to be considered compliant by Conditional Access policies. You can also use compliance policies to monitor and remediate compliance issues with devices independently of Conditional Access. #### Windows Update for Business policies Windows Update for Business policies let you configure deferral policies for Windows 10 feature updates or quality updates for Windows 10 devices managed directly by Windows Update for Business. For details, see [Configure Windows Update for Business deferral policies](/sccm/sum/deploy-use/integrate-windows-update-for-business-windows-10#configure-windows-update-for-business-deferral-policies). diff --git a/memdocs/configmgr/core/get-started/capabilities-in-technical-preview-1710.md b/memdocs/configmgr/core/get-started/capabilities-in-technical-preview-1710.md index 856059d44a2..757806d1d1a 100644 --- a/memdocs/configmgr/core/get-started/capabilities-in-technical-preview-1710.md +++ b/memdocs/configmgr/core/get-started/capabilities-in-technical-preview-1710.md @@ -81,7 +81,7 @@ Add an icon for your app in Software Center. To try it out see [Create applicati ## Check compliance from Software Center for co-managed devices -In this release, users can use Software Center to check the compliance of their co-managed Windows 10 devices even when conditional access is managed by Intune. For details, see [Co-management for Windows 10 devices](./capabilities-in-technical-preview-1709.md#co-management-for-windows-10-devices). +In this release, users can use Software Center to check the compliance of their co-managed Windows 10 devices even when Conditional Access is managed by Intune. For details, see [Co-management for Windows 10 devices](./capabilities-in-technical-preview-1709.md#co-management-for-windows-10-devices). ## Support for Exploit Guard diff --git a/memdocs/configmgr/core/get-started/includes/1810/1358333.md b/memdocs/configmgr/core/get-started/includes/1810/1358333.md index 9ea057678af..ed904b983fd 100644 --- a/memdocs/configmgr/core/get-started/includes/1810/1358333.md +++ b/memdocs/configmgr/core/get-started/includes/1810/1358333.md @@ -18,13 +18,12 @@ This Configuration Manager technical preview version adds native support for cre ### Prerequisites -- [Windows 10 Insider Preview version 17758 or later](#bkmk_autopilot-image) -- [A Windows Autopilot for existing devices configuration file](#bkmk_autopilot-json) +- Windows 10 Insider Preview version 17758 or later +- A Windows Autopilot for existing devices configuration file - A device not already registered with the Windows Autopilot service. If the device is already registered the assigned profile will take precedence. The Autopilot for existing devices profile will only apply in the event that the online profile times out. - #### Windows 10 Insider Preview OS image -Acquire the installation media for Windows 10 Insider Preview version 17758 or later. For more information, see [Windows Insider Preview Downloads](https://www.microsoft.com/software-download/windowsinsiderpreviewadvanced). +Acquire the installation media for Windows 10 Insider Preview version 17758 or later. For more information, see [Windows Insider Preview Downloads](https://www.microsoft.com/software-download/windowsinsiderpreviewiso). Then create a Configuration Manager OS image. For more information, see [Manage OS images](../../../../osd/get-started/manage-operating-system-images.md). diff --git a/memdocs/configmgr/core/get-started/technical-preview.md b/memdocs/configmgr/core/get-started/technical-preview.md index 7fdbffd109d..104f7754c10 100644 --- a/memdocs/configmgr/core/get-started/technical-preview.md +++ b/memdocs/configmgr/core/get-started/technical-preview.md @@ -2,7 +2,7 @@ title: Technical preview releases titleSuffix: Configuration Manager description: Learn about the technical preview branch to test-drive new functionality and capabilities in Configuration Manager. -ms.date: 05/28/2024 +ms.date: 11/29/2024 ms.subservice: core-infra ms.service: configuration-manager ms.topic: conceptual @@ -38,7 +38,7 @@ For information about what's new in the *current branch* of Configuration Manage For most product prerequisites, use the information in the [Supported configurations](../plan-design/configs/supported-configurations.md). The following exceptions apply to the technical preview branch: -- Each install is active for 180 days before it becomes inactive. +- Each install is active for 360 days before it becomes inactive. - English is the only language supported. @@ -95,7 +95,7 @@ Microsoft supports each technical preview version up until three successive vers Install a baseline version for up to one year after its release. When you install a new technical preview site, use the latest baseline version: -- **Technical preview version 2405** +- **Technical preview version 2411** Download a baseline version from the [Evaluation Center](https://www.microsoft.com/en-in/evalcenter/evaluate-microsoft-endpoint-configuration-manager-technical-preview). @@ -128,13 +128,13 @@ bullet format: The following features are available with the most recent Configuration Manager technical preview version: -### Technical preview version 2405 - -- [Introducing Centralized Search - Desired Workspace Selection](2024/technical-preview-2405.md) -- [BitLocker support in Arm devices](2024/technical-preview-2405.md) -- [Configuration Manager now support SQL Extended Protection for Authentication](2024/technical-preview-2405.md) -- [Performance Enhancement of policy processing and collection evaluation](2024/technical-preview-2405.md) +### Technical preview version 2411 +- [Operating System support added for Windows 11 24H2 and Windows Server 2025](2024/technical-preview-2411.md) +- [Enhanced Security for CMG](2024/technical-preview-2411.md) +- [SQL 2012 and 2014 support is deprecated](2024/technical-preview-2411.md) +- [Software metering support in Arm64 devices](2024/technical-preview-2411.md) + > [!NOTE] > Features that were available in a previous version of the technical preview remain available in later versions. Similarly, features that are added to the Configuration Manager current branch remain available in the technical preview branch. @@ -151,6 +151,18 @@ The following features were released with previous versions of the Configuration > [!TIP] > When a new current branch version is available, features that are available in that version are listed in the latest *What's new* article. For more information, see [What's new in incremental versions](../plan-design/changes/whats-new-incremental-versions.md#supported-versions). + +### Technical preview version 2405 + +- [Introducing Centralized Search - Desired Workspace Selection](2024/technical-preview-2405.md) +- [BitLocker support in Arm devices](2024/technical-preview-2405.md) +- [Configuration Manager now support SQL Extended Protection for Authentication](2024/technical-preview-2405.md) +- [Performance Enhancement of policy processing and collection evaluation](2024/technical-preview-2405.md) + +> [!NOTE] +> Features that were available in a previous version of the technical preview remain available in later versions. Similarly, features that are added to the Configuration Manager current branch remain available in the technical preview branch. + + ### Technical preview version 2401 - [Automated diagnostic Dashboard for Software Update Issues](2024/technical-preview-2401.md) diff --git a/memdocs/configmgr/core/misc/in-console-documentation.md b/memdocs/configmgr/core/misc/in-console-documentation.md index 2bfa4f8a99a..354648a3566 100644 --- a/memdocs/configmgr/core/misc/in-console-documentation.md +++ b/memdocs/configmgr/core/misc/in-console-documentation.md @@ -37,8 +37,8 @@ For more information, see the following articles: -- [What's new in current branch](https://learn.microsoft.com/mem/configmgr/core/plan-design/changes/whats-new-incremental-versions#whats-new-in-configuration-manager-incremental-versions?WT.mc_id=configmgr-console) -- [Technical preview releases](https://learn.microsoft.com/mem/configmgr/core/get-started/technical-preview?WT.mc_id=configmgr-console) +- [What's new in current branch](/mem/configmgr/core/plan-design/changes/whats-new-incremental-versions#whats-new-in-configuration-manager-incremental-versions?WT.mc_id=configmgr-console) +- [Technical preview releases](/mem/configmgr/core/get-started/technical-preview?WT.mc_id=configmgr-console) ## Recommended @@ -49,7 +49,7 @@ A curated list of important articles. - [Co-management for Windows devices](https://learn.microsoft.com/mem/configmgr/comanage/?WT.mc_id=configmgr-console) - [CMPivot](https://learn.microsoft.com/mem/configmgr/core/servers/manage/cmpivot?WT.mc_id=configmgr-console) - [Plan for BitLocker management](https://learn.microsoft.com/mem/configmgr/protect/plan-design/bitlocker-management?WT.mc_id=configmgr-console) -- [Microsoft Edge management](https://learn.microsoft.com/mem/configmgr/apps/deploy-use/deploy-edge?WT.mc_id=configmgr-console) +- [Microsoft Edge management](/mem/configmgr/apps/deploy-use/deploy-edge?WT.mc_id=configmgr-console) - [Manage Microsoft 365 Apps updates](https://learn.microsoft.com/mem/configmgr/sum/deploy-use/manage-office-365-proplus-updates?WT.mc_id=configmgr-console) - [Fundamentals of Configuration Manager current branch and Windows as a service](https://learn.microsoft.com/mem/configmgr/core/understand/configuration-manager-and-windows-as-service?WT.mc_id=configmgr-console) - [Optimize Windows update delivery with Configuration Manager](https://learn.microsoft.com/mem/configmgr/sum/deploy-use/optimize-windows-10-update-delivery?WT.mc_id=configmgr-console) diff --git a/memdocs/configmgr/core/plan-design/changes/deprecated/removed-and-deprecated-cmfeatures.md b/memdocs/configmgr/core/plan-design/changes/deprecated/removed-and-deprecated-cmfeatures.md index f8dc2a53ac7..cd415e91da3 100644 --- a/memdocs/configmgr/core/plan-design/changes/deprecated/removed-and-deprecated-cmfeatures.md +++ b/memdocs/configmgr/core/plan-design/changes/deprecated/removed-and-deprecated-cmfeatures.md @@ -5,7 +5,7 @@ description: Learn about the features that Configuration Manager no longer suppo ms.subservice: core-infra ms.service: configuration-manager ms.topic: conceptual -ms.date: 04/05/2024 +ms.date: 12/04/2024 author: baladelli ms.author: baladell manager: apoorvseth @@ -33,6 +33,7 @@ The following features are deprecated. You can still use them now, but Microsoft |Feature|Deprecation first announced|Planned end of support| |-------|---------------------------|----------------------| +| The **MDT Integration with CM and Standalone** is no longer supported with Configuration Manager. Customers should remove MDT TS steps, followed by removing MDT integration, to avoid TS corruption and modification failures. | Dec 2024 | The first release after Oct 10, 2025 | | **Office 365 Client Management dashboard add-in support statement**. For more information, see [Office 365 Client Management dashboard](../../../../sum/deploy-use/office-365-dashboard.md). | April 2024 | The first release after April 1, 2025 | | [Windows Information Protection](../../../../compliance/deploy-use/create-configuration-items-for-windows-10-devices-managed-with-the-client.md#windows-information-protection) | July 2022 | TBD | | The site system roles for on-premises MDM and macOS clients: **enrollment proxy point and enrollment point**. | January 2022 | Mar 31, 2024 | @@ -73,12 +74,12 @@ The following features are no longer supported. In some cases, they're no longer | Desktop Analytics tile and page for **Security Updates** | December 2020 | March 2021 | | Desktop Analytics option to **View recent data** for device enrollment and security updates. For more information, see [Data latency](../../../../desktop-analytics/troubleshooting.md#data-latency).|May 2020|July 2020| | Windows Analytics and Upgrade Readiness integration. For more information, see [KB 4521815: Windows Analytics retirement on January 31, 2020](https://support.microsoft.com/help/4521815/windows-analytics-retirement). | October 14, 2019 | January 31, 2020 | -| Device health attestation assessment for conditional access compliance policies For more information, see [What happened to hybrid MDM](../../../../mdm/understand/what-happened-to-hybrid.md).| July 3, 2019 | Version 1910 | +| Device health attestation assessment for Conditional Access compliance policies For more information, see [What happened to hybrid MDM](../../../../mdm/understand/what-happened-to-hybrid.md).| July 3, 2019 | Version 1910 | | The Configuration Manager Company Portal app | May 21, 2019 | Version 1910 | | The application catalog, including both site system roles: the application catalog website point and web service point. For more information, see [Remove the application catalog](../../../../apps/plan-design/plan-for-and-configure-application-management.md#remove-the-application-catalog). | May 21, 2019 | Version 1910 | |Certificate-based authentication with Windows Hello for Business settings in Configuration Manager
For more information, see [Windows Hello for Business settings](../../../../protect/deploy-use/windows-hello-for-business-settings.md).|December 2017|Version 1910| |System Center Endpoint Protection for Mac and Linux
For more information, see [End of support blog post](https://techcommunity.microsoft.com/t5/configuration-manager-blog/end-of-support-for-scep-for-mac-and-scep-for-linux-on-december/ba-p/286257).|October 2018|December 31, 2018| -|On-premises conditional access
For more information, see [What happened to hybrid MDM](../../../../mdm/understand/what-happened-to-hybrid.md).|January 30, 2019|September 1, 2019| +|On-premises Conditional Access
For more information, see [What happened to hybrid MDM](../../../../mdm/understand/what-happened-to-hybrid.md).|January 30, 2019|September 1, 2019| |Hybrid mobile device management (MDM)
For more information, see [What happened to hybrid MDM](../../../../mdm/understand/what-happened-to-hybrid.md).

Starting with the 1902 Intune service release, expected at the end of February 2019, new customers can't create a new hybrid connection.|August 14, 2018|September 1, 2019| |Security Content Automation Protocol (SCAP) extensions.
|September 2018|Version 1810| |The **Silverlight user experience** for the application catalog website point is no longer supported. Users should use the new Software Center. For more information, see [Configure Software Center](../../../../apps/plan-design/plan-for-software-center.md#configure-software-center).|August 11, 2017| Version 1806| diff --git a/memdocs/configmgr/core/plan-design/changes/deprecated/removed-and-deprecated-server.md b/memdocs/configmgr/core/plan-design/changes/deprecated/removed-and-deprecated-server.md index 85fea53f344..5e4c056465a 100644 --- a/memdocs/configmgr/core/plan-design/changes/deprecated/removed-and-deprecated-server.md +++ b/memdocs/configmgr/core/plan-design/changes/deprecated/removed-and-deprecated-server.md @@ -2,12 +2,12 @@ title: Deprecated for site servers titleSuffix: Configuration Manager description: Learn about the products and operating systems that Configuration Manager no longer supports for site servers and database servers. -ms.date: 08/02/2021 +ms.date: 12/04/2024 ms.subservice: core-infra ms.service: configuration-manager ms.topic: conceptual -author: Banreet -ms.author: banreetkaur +author: Baladelli +ms.author: Baladell manager: apoorvseth ms.localizationpriority: medium ms.collection: tier3 @@ -22,6 +22,12 @@ This article describes products and operating systems that are removed from supp This information may change in the future. It might not include each deprecated feature, product, or OS. +## Client OS + +| Operating systems | Deprecation first announced | Support removed | +|---------------------------------|-----------------------------|-----------------| +| Windows 10 22H2 | Oct 2021 | Version 2509 | + ## Server OS | Operating systems | Deprecation first announced | Support removed | @@ -33,6 +39,7 @@ This information may change in the future. It might not include each deprecated | SQL Server versions | Deprecation first announced | Support removed | |---------------------|-----------------------------|-----------------| +| Sql Server 2014 | Oct 2024 | Version 2409 | | SQL Server 2012 | July 2021 | The first release after July 1, 2022 | | SQL Server 2008 R2 | July 2015 | Version 1702 | | SQL Server 2008 | July 2015 | Version 1511 | diff --git a/memdocs/configmgr/core/plan-design/changes/deprecated/removed-and-deprecated.md b/memdocs/configmgr/core/plan-design/changes/deprecated/removed-and-deprecated.md index ba0e806d73e..bd9c6ac6326 100644 --- a/memdocs/configmgr/core/plan-design/changes/deprecated/removed-and-deprecated.md +++ b/memdocs/configmgr/core/plan-design/changes/deprecated/removed-and-deprecated.md @@ -2,12 +2,12 @@ title: Deprecated items titleSuffix: Configuration Manager description: Learn about the features, products, and operating systems that Configuration Manager no longer supports. -ms.date: 11/03/2021 +ms.date: 12/04/2024 ms.subservice: core-infra ms.service: configuration-manager ms.topic: conceptual -author: Banreet -ms.author: banreetkaur +author: Baladelli +ms.author: Baladell manager: apoorvseth ms.localizationpriority: medium ms.collection: tier3 diff --git a/memdocs/configmgr/core/plan-design/changes/features-and-capabilities.md b/memdocs/configmgr/core/plan-design/changes/features-and-capabilities.md index 9437ec5fe04..e3bdcf14e4f 100644 --- a/memdocs/configmgr/core/plan-design/changes/features-and-capabilities.md +++ b/memdocs/configmgr/core/plan-design/changes/features-and-capabilities.md @@ -22,7 +22,7 @@ This article summarizes the primary management features of Configuration Manager ## Co-management -Co-management is one of the primary ways to attach your existing Configuration Manager deployment to the Microsoft 365 cloud. It enables you to concurrently manage Windows devices by using both Configuration Manager and Microsoft Intune. Co-management lets you cloud-attach your existing investment in Configuration Manager by adding new functionality like conditional access. For more information, see [What is co-management](../../../comanage/overview.md)? +Co-management is one of the primary ways to attach your existing Configuration Manager deployment to the Microsoft 365 cloud. It enables you to concurrently manage Windows devices by using both Configuration Manager and Microsoft Intune. Co-management lets you cloud-attach your existing investment in Configuration Manager by adding new functionality like Conditional Access. For more information, see [What is co-management](../../../comanage/overview.md)? ## Cloud-attached management diff --git a/memdocs/configmgr/core/plan-design/changes/media/27297018-cmg-enhanced.png b/memdocs/configmgr/core/plan-design/changes/media/27297018-cmg-enhanced.png new file mode 100644 index 00000000000..fae940ae910 Binary files /dev/null and b/memdocs/configmgr/core/plan-design/changes/media/27297018-cmg-enhanced.png differ diff --git a/memdocs/configmgr/core/plan-design/changes/media/27297018-secret-window.png b/memdocs/configmgr/core/plan-design/changes/media/27297018-secret-window.png new file mode 100644 index 00000000000..9d957539351 Binary files /dev/null and b/memdocs/configmgr/core/plan-design/changes/media/27297018-secret-window.png differ diff --git a/memdocs/configmgr/core/plan-design/changes/media/27297018-service-window.png b/memdocs/configmgr/core/plan-design/changes/media/27297018-service-window.png new file mode 100644 index 00000000000..d39a2324cdd Binary files /dev/null and b/memdocs/configmgr/core/plan-design/changes/media/27297018-service-window.png differ diff --git a/memdocs/configmgr/core/plan-design/changes/media/27679763-search-workspace.png b/memdocs/configmgr/core/plan-design/changes/media/27679763-search-workspace.png new file mode 100644 index 00000000000..d89438824e2 Binary files /dev/null and b/memdocs/configmgr/core/plan-design/changes/media/27679763-search-workspace.png differ diff --git a/memdocs/configmgr/core/plan-design/changes/whats-new-in-version-1602.md b/memdocs/configmgr/core/plan-design/changes/whats-new-in-version-1602.md index 499978e72b8..b98020eafd6 100644 --- a/memdocs/configmgr/core/plan-design/changes/whats-new-in-version-1602.md +++ b/memdocs/configmgr/core/plan-design/changes/whats-new-in-version-1602.md @@ -108,10 +108,10 @@ You will find these apps in the **Applications** node of the Configuration Manag Kiosk mode allows you to lock a device so that only certain features work. For example, you can allow a device to run only one managed app that you specify, or you can disable the volume buttons on a device. These settings might be used for a demonstration model of a device, or a device that is dedicated to performing only one function, such as a point-of-sale device. In Configuration Manager, you can now specify kiosk mode settings for Samsung KNOX Standard devices. -## Conditional access +## Conditional Access -### Conditional access for PCs managed by Configuration Manager - Previous to this release, to set up conditional access for a PC, the PC either had to be enrolled in Intune or had to be a domain-joined PC. Beginning with the 1602 update, conditional access for PCs managed by Configuration Manager is supported. For your PCs that are managed by Configuration Manager, you can restrict access to Exchange Online and SharePoint Online only to devices that are compliant with the compliance policies you set. +### Conditional Access for PCs managed by Configuration Manager + Previous to this release, to set up Conditional Access for a PC, the PC either had to be enrolled in Intune or had to be a domain-joined PC. Beginning with the 1602 update, Conditional Access for PCs managed by Configuration Manager is supported. For your PCs that are managed by Configuration Manager, you can restrict access to Exchange Online and SharePoint Online only to devices that are compliant with the compliance policies you set. ### Restricting access based on the health of devices diff --git a/memdocs/configmgr/core/plan-design/changes/whats-new-in-version-1610.md b/memdocs/configmgr/core/plan-design/changes/whats-new-in-version-1610.md index d5a4ec6ee29..d482a89e6c2 100644 --- a/memdocs/configmgr/core/plan-design/changes/whats-new-in-version-1610.md +++ b/memdocs/configmgr/core/plan-design/changes/whats-new-in-version-1610.md @@ -196,7 +196,7 @@ You can now get a quick view of overall compliance for devices, and the top reas ## Lookout integration for hybrid implementations to protect iOS and Android devices -Microsoft is integrating with Lookout's mobile threat protection solution to protect iOS and Android mobile devices by detecting malware, risky apps, and more, on devices. Lookout's solution helps you determine the threat level, which is configurable. You can create a compliance policy rule in Configuration Manager to determine device compliance based on the risk assessment by Lookout. Using conditional access policies, you can allow or block access to company resources based on the device compliance status. +Microsoft is integrating with Lookout's mobile threat protection solution to protect iOS and Android mobile devices by detecting malware, risky apps, and more, on devices. Lookout's solution helps you determine the threat level, which is configurable. You can create a compliance policy rule in Configuration Manager to determine device compliance based on the risk assessment by Lookout. Using Conditional Access policies, you can allow or block access to company resources based on the device compliance status. Users of noncompliant iOS devices will be prompted to enroll. They'll be required to install the Lookout for Work app on their devices, activate the app, and remediate threats reported in the Lookout for Work application to gain access to company data. diff --git a/memdocs/configmgr/core/plan-design/changes/whats-new-in-version-1702.md b/memdocs/configmgr/core/plan-design/changes/whats-new-in-version-1702.md index 519aee212c3..4bc2bcbc228 100644 --- a/memdocs/configmgr/core/plan-design/changes/whats-new-in-version-1702.md +++ b/memdocs/configmgr/core/plan-design/changes/whats-new-in-version-1702.md @@ -291,9 +291,9 @@ You can now associate multiple Apple volume-purchase program tokens with Configu You can now sync custom line of business apps from the Windows Store for Business. -### Conditional access device compliance policy improvements +### Conditional Access device compliance policy improvements -A new device compliance policy rule is available to help you block access to corporate resources that support conditional access, when users are using apps that are part of a noncompliant list of apps. The noncompliant list of apps can be defined by the admin when adding the new compliant rule **Apps that cannot be installed**. This rule requires the admin to enter the **App Name**, the **App ID**, and the **App Publisher** (optional) when adding an app to the noncompliant list. This setting only applies to iOS and Android devices. +A new device compliance policy rule is available to help you block access to corporate resources that support Conditional Access, when users are using apps that are part of a noncompliant list of apps. The noncompliant list of apps can be defined by the admin when adding the new compliant rule **Apps that cannot be installed**. This rule requires the admin to enter the **App Name**, the **App ID**, and the **App Publisher** (optional) when adding an app to the noncompliant list. This setting only applies to iOS and Android devices. Additionally, this helps organizations to mitigate data leakage through unsecured apps, and prevent excessive data consumption through certain apps. diff --git a/memdocs/configmgr/core/plan-design/changes/whats-new-in-version-1802.md b/memdocs/configmgr/core/plan-design/changes/whats-new-in-version-1802.md index cbc36d8ecdb..7e847b1ad58 100644 --- a/memdocs/configmgr/core/plan-design/changes/whats-new-in-version-1802.md +++ b/memdocs/configmgr/core/plan-design/changes/whats-new-in-version-1802.md @@ -243,7 +243,7 @@ When this client setting option is enabled, user available applications that req ### Software Center shows user additional compliance information - When using Device Health Attestation status as a compliance policy rule for conditional access to company resources, Software Center now shows the user the Device Health Attestation setting that is not compliant. + When using Device Health Attestation status as a compliance policy rule for Conditional Access to company resources, Software Center now shows the user the Device Health Attestation setting that is not compliant. ## Software updates diff --git a/memdocs/configmgr/core/plan-design/changes/whats-new-in-version-1910.md b/memdocs/configmgr/core/plan-design/changes/whats-new-in-version-1910.md index 8428390d250..bf1808cd544 100644 --- a/memdocs/configmgr/core/plan-design/changes/whats-new-in-version-1910.md +++ b/memdocs/configmgr/core/plan-design/changes/whats-new-in-version-1910.md @@ -129,7 +129,7 @@ For more information, see [Microsoft Connected Cache with Configuration Manager] You can now add evaluation of custom configuration baselines as a compliance policy assessment rule. When you create or edit a configuration baseline, you can now use the **Evaluate this baseline as part of compliance policy assessment** option. When you add or edit a compliance policy rule, you have a condition called **Include configured baselines in compliance policy assessment**. -For co-managed devices, and when you configure Intune to take Configuration Manager compliance assessment results as part of the overall compliance status, this information is sent to Azure Active Directory. You can then use it for conditional access to your Microsoft 365 resources. +For co-managed devices, and when you configure Intune to take Configuration Manager compliance assessment results as part of the overall compliance status, this information is sent to Azure Active Directory. You can then use it for Conditional Access to your Microsoft 365 resources. For more information, see [Include custom configuration baselines as part of compliance policy assessment](../../../compliance/deploy-use/create-configuration-baselines.md#bkmk_CAbaselines). diff --git a/memdocs/configmgr/core/plan-design/changes/whats-new-in-version-2409.md b/memdocs/configmgr/core/plan-design/changes/whats-new-in-version-2409.md new file mode 100644 index 00000000000..4b691e54206 --- /dev/null +++ b/memdocs/configmgr/core/plan-design/changes/whats-new-in-version-2409.md @@ -0,0 +1,132 @@ +--- +title: What's new in version 2409 +titleSuffix: Configuration Manager +description: Get details about changes and new capabilities introduced in version 2409 of Configuration Manager current branch. +ms.date: 12/03/2024 +ms.subservice: core-infra +ms.service: configuration-manager +ms.topic: conceptual +author: PalikaSingh +ms.author: palsi +manager: apoorvseth +ms.localizationpriority: medium +ms.collection: tier3 +ms.reviewer: mstewart,aaroncz +--- + +# What's new in version 2409 of Configuration Manager current branch + +*Applies to: Configuration Manager (current branch)* + +Update 2409 for Configuration Manager current branch is available as an in-console update. Apply this update on sites that run version 2309 or later. This article summarizes the changes and new features in Configuration Manager, version 2409. + +Always review the latest checklist for installing this update. For more information, see [Checklist for installing update 2409](../../servers/manage/checklist-for-installing-update-2409.md). After you update a site, also review the [Post-update checklist](../../servers/manage/checklist-for-installing-update-2409.md#post-update-checklist). + +To take full advantage of new Configuration Manager features, after you update the site, also update clients to the latest version. While new functionality appears in the Configuration Manager console when you update the site and console, the complete scenario isn't functional until the client version is also the latest. + +## Site infrastructure + +### Configuration Manager now supports SQL Extended Protection for Authentication + +Configuration Manager now supports SQL extended protection for authentication. It's a security feature that enhances protection against MITM attacks, making SQL server more secure when connections are made using extended protection. These enhancements collectively reduce the risk of unauthorized access and protect sensitive data managed by the SQL Server database engine. + +For more information, see [Connect to the Database Engine Using Extended Protection](/sql/database-engine/configure-windows/connect-to-the-database-engine-using-extended-protection). + +### Introducing Centralized Search - Desired Workspace Selection + +The centralized search box now enables the option to select the desired workspace for searching. Users can easily refine their search results by selecting the desired workspace from the dropdown menu. + +:::image type="content" source="media/27679763-search-workspace.png" alt-text="Screenshot of centralized search workspace selection in console." lightbox="media/27679763-search-workspace.png"::: + +### Configuration Manager does not support SQL Server 2012 and 2014 + +Starting with version 2409, Configuration Manager no longer supports SQL Server 2012 and 2014. Upgrade to the latest SQL Server version or at least SQL Server 2016. If you don’t upgrade, CM upgrades are blocked, and you see an error during the prereq check. For more information, see [Supported SQL Server versions for Configuration Manager](../configs/support-for-sql-server-versions.md). + + + +### Operating System support added for Windows 11 24H2 and Windows Server 2025 + +With this version of Configuration Manager, support is added for Windows 11 24H2 and Windows Server 2025. + - Windows 11 24H2 & Windows Server 2025 are added to the Product lifecycle dashboard and supported platform. + - Windows 11 24H2 & Windows Server 2025 client support is added. + - Boot image creation in CM on Windows Server 2025 now supports latest Windows ADK. + - Windows upgrade readiness dashboard now supports Windows 11 24H2 for upgrading clients. + +>[!NOTE] +>Windows Server and Windows 11 24H2 do not support Firewall Rules. This will result in a non-compliant status in the Configuration Manager applet. + + +### Software metering support in Arm64 devices + +The Configuration Manager now supports Software metering for Arm64 devices. Software metering is used to monitor Windows PC desktop apps with a filename ending in .exe. For more information, see [Software metering in Configuration Manager](../../../apps/deploy-use/monitor-app-usage-with-software-metering.md). + + +## OS deployment + +### BitLocker support in Arm64 devices + +Configuration Manager now supports BitLocker task sequence steps for Arm64 devices. In BitLocker Management, policies that include OS drive encryption with a TPM protector and fixed drive encryption with the Auto-Unlock option are supported on Arm64 devices. + +For more information, see [Bitlocker Supported configurations](../../../protect/plan-design/bitlocker-management.md#supported-configurations). + +## Cloud-attached management + +### CMG Entra Application secret key renewal  + +The 'Renew Secret Key' feature now opens a dialog with four options for the validity period. This update also prevents applications older than 800 days (approximately two years) from renewing their secret keys. The same options are available when creating a new app. + +:::image type="content" source="media/27297018-secret-window.png" alt-text="Screenshot of secret window selection in console."::: + +>[!NOTE] +>The admin must sign in using tenant global administrator credentials and then click on the Renew button. + +### CMG Enhanced security option + +CMG Setup now uses managed Identities and third-party **Server App** to interact with CMG's Azure Storage account, instead of storage account keys. + + - Hence storage account key access is disabled for new CMG setup. + - For sessions upgrading from earlier versions to 2409, the 'CMG enhanced security' button is shown as enabled. + + :::image type="content" source="media/27297018-Cmg-Enhanced.png" alt-text="Screenshot of Cmg enhanced window selection in console." lightbox="media/27297018-cmg-enhanced.png"::: + +## Known Issues + + - Upgrade SQL 2012 or 2014 Express, Standard, Enterprise edition to SQl 2016 or latest version. **VC++ Redistributable Version** need to be upgraded to latest version on **Secondary sites**. [Download Latest Microsoft Visual C++ Redistributable Version](https://aka.ms/vs/17/release/vc_redist.x64.exe). + +## Other Updates + +### Performance Enhancement of policy processing and collection evaluation + +The performance of policy processing and collection evaluation has been enhanced. Previously, blocking chains from sp_ProcessPolicyChanges, called by PolicyPv, would run for hours, disrupting multiple workloads including collection management and policy processing. + +## Deprecated features + +Learn about support changes before they're implemented in [removed and deprecated items](deprecated/removed-and-deprecated.md). + + - MDT Integration with CM and Standalone is no longer supported with Configuration Manager deprecation first announced in December 2024 and planned end of support the first release after Oct 10, 2025. Customers should remove MDT Task sequence steps, followed by removing MDT integration, to avoid TS corruption and modification failures. + +For more information, see [Removed and deprecated features for Configuration Manager.](deprecated/removed-and-deprecated-cmfeatures.md). + + + +## Next steps + + +As of December 16, 2024, version 2409 is globally available for all customers to install. + +>[!NOTE] +>For exisiting Fast ring current branch 2409 customers, you will see Slow ring upgrade package in console. Install 2409 Slow ring package to be in production current branch. + +When you're ready to install this version, see [Installing updates for Configuration Manager](../../servers/manage/updates.md) and [Checklist for installing update 2409](../../servers/manage/checklist-for-installing-update-2409.md). + +> [!TIP] +> To install a new site, use a baseline version of Configuration Manager. +> +> Learn more about: +> +> - [Installing new sites](../../servers/deploy/install/installing-sites.md) +> - [Baseline and update versions](../../servers/manage/updates.md#bkmk_Baselines) + +For known significant issues, see the [Release notes](../../servers/deploy/install/release-notes.md). + +After you update a site, also review the [Post-update checklist](../../servers/manage/checklist-for-installing-update-2409.md#post-update-checklist). diff --git a/memdocs/configmgr/core/plan-design/changes/whats-new-incremental-versions.md b/memdocs/configmgr/core/plan-design/changes/whats-new-incremental-versions.md index 552c866f8d5..d736098ebbe 100644 --- a/memdocs/configmgr/core/plan-design/changes/whats-new-incremental-versions.md +++ b/memdocs/configmgr/core/plan-design/changes/whats-new-incremental-versions.md @@ -2,7 +2,7 @@ title: Incremental versions titleSuffix: Configuration Manager description: Learn about what's new in the latest update for Configuration Manager. -ms.date: 12/05/2022 +ms.date: 12/04/2024 ms.subservice: core-infra ms.service: configuration-manager ms.topic: conceptual @@ -28,10 +28,9 @@ Different update versions are identified by year and month. For example, version Use the following links to discover what's new with each supported version: +- [What's new in version 2409](whats-new-in-version-2409.md) - [What's new in version 2403](whats-new-in-version-2403.md) - [What's new in version 2309](whats-new-in-version-2309.md) -- [What's new in version 2303](whats-new-in-version-2303.md) -- [What's new in version 2211](whats-new-in-version-2211.md) Each update version remains in support for 18 months from its initial availability date. Stay current with the most recent update version. For more information, see [Support for Configuration Manager current branch versions](../../servers/manage/current-branch-versions-supported.md). diff --git a/memdocs/configmgr/core/plan-design/configs/support-for-sql-server-versions.md b/memdocs/configmgr/core/plan-design/configs/support-for-sql-server-versions.md index 5f48f4c15b2..eb2fbba8604 100644 --- a/memdocs/configmgr/core/plan-design/configs/support-for-sql-server-versions.md +++ b/memdocs/configmgr/core/plan-design/configs/support-for-sql-server-versions.md @@ -2,12 +2,12 @@ title: Supported SQL Server versions titleSuffix: Configuration Manager description: Get SQL Server version and configuration requirements for hosting a Configuration Manager site database. -ms.date: 03/28/2023 +ms.date: 12/04/2024 ms.subservice: core-infra ms.service: configuration-manager ms.topic: conceptual -author: Banreet -ms.author: banreetkaur +author: Baladelli +ms.author: Baladell manager: apoorvseth ms.localizationpriority: medium ms.collection: tier3 @@ -47,6 +47,9 @@ The site database can use the default instance of a full installation of SQL Ser SQL Server must be located on the site server computer. +> [!IMPORTANT] +> Upgrade SQL 2012 or 2014 Express, Standard, Enterprise edition to SQl 2016 or latest version. VC++ need to be upgraded to latest version on Secondary site [Download Latest Microsoft Visual C++ Redistributable Version](https://aka.ms/vs/17/release/vc_redist.x64.exe). + ### Limitations to support The following configurations aren't supported: @@ -112,7 +115,7 @@ You can use this version with the minimum service pack and cumulative update sup - A primary site - A secondary site -### SQL Server 2014: Standard, Enterprise + | ![Supported](media/green-check.png) | ![Supported](media/green-check.png) | ![Supported](media/green-check.png) |![Supported](media/green-check.png) | -| **21H2**
(10.0.19044) | ![Supported](media/green-check.png) | ![Supported](media/green-check.png) | ![Supported](media/green-check.png) |![Supported](media/green-check.png) | -| **Enterprise LTSC 2021**
(10.0.19044) | ![Supported](media/green-check.png) | ![Supported](media/green-check.png) | ![Supported](media/green-check.png) | ![Supported](media/green-check.png) | +| Windows 10 version | ConfigMgr 2309 | ConfigMgr 2403 | Configmgr 2409 +|--------------------------------------------|----------------|----------------|----------------| +| **22H2**
(10.0.19045) | ![Supported](media/green-check.png) | ![Supported](media/green-check.png) |![Supported](media/green-check.png) | +| **21H2**
(10.0.19044) | ![Supported](media/green-check.png) | ![Supported](media/green-check.png) |![Supported](media/green-check.png) | +| **Enterprise LTSC 2021**
(10.0.19044) | ![Supported](media/green-check.png) | ![Supported](media/green-check.png) | ![Supported](media/green-check.png) | All currently supported versions of Configuration Manager current branch support the following Windows 10 LTSB/LTSC editions: diff --git a/memdocs/configmgr/core/plan-design/configs/support-for-windows-11.md b/memdocs/configmgr/core/plan-design/configs/support-for-windows-11.md index 2a14e8e790f..72fe73da7b9 100644 --- a/memdocs/configmgr/core/plan-design/configs/support-for-windows-11.md +++ b/memdocs/configmgr/core/plan-design/configs/support-for-windows-11.md @@ -2,12 +2,12 @@ title: Support for Windows 11 titleSuffix: Configuration Manager description: Learn about the Windows 11 versions that are supported as clients with Configuration Manager. -ms.date: 03/28/2024 +ms.date: 12/04/2024 ms.subservice: core-infra ms.service: configuration-manager ms.topic: conceptual -author: PalikaSingh -ms.author: palsi +author: Baladelli +ms.author: Baladell manager: apoorvseth ms.collection: tier3 ms.reviewer: mstewart,aaroncz @@ -46,11 +46,12 @@ A Configuration Manager version drops from the matrix after [support for that ve The following table lists the versions of Windows 11 that you can use as a client with different versions of Configuration Manager. -| Windows 11 version | ConfigMgr 2211 | ConfigMgr 2303 | ConfigMgr 2309 | ConfigMgr 2403 | -|--------------------------------------------|----------------|----------------|----------------|----------------| -| **23H2**
(10.0.22631) | ![Supported](media/green-check.png) | ![Supported](media/green-check.png) | ![Supported](media/green-check.png) | ![Supported](media/green-check.png) | -| **22H2**
(10.0.22621) | ![Supported](media/green-check.png) | ![Supported](media/green-check.png) | ![Supported](media/green-check.png) | ![Supported](media/green-check.png) | -| **21H2**
(10.0.22000) | ![Supported](media/green-check.png)| ![Supported](media/green-check.png) | ![Supported](media/green-check.png) | ![Supported](media/green-check.png) | +| Windows 11 version | ConfigMgr 2309 | ConfigMgr 2403 | ConfigMgr 2409 | +|--------------------------------------------|----------------|----------------|----------------| +| **24H2**
(10.0.26100) | ![Supported](media/red-x.png) | ![Supported](media/red-x.png) | ![Supported](media/green-check.png) | +| **23H2**
(10.0.22631) | ![Supported](media/green-check.png) | ![Supported](media/green-check.png) | ![Supported](media/green-check.png) | +| **22H2**
(10.0.22621) | ![Supported](media/green-check.png) | ![Supported](media/green-check.png) | ![Supported](media/green-check.png) | + + - **Windows Server 2022**: Standard, Datacenter (_starting in version 2107_) - **Windows Server 2019**: Standard, Datacenter diff --git a/memdocs/configmgr/core/plan-design/configs/supported-operating-systems-for-clients-and-devices.md b/memdocs/configmgr/core/plan-design/configs/supported-operating-systems-for-clients-and-devices.md index c6e78ae9769..2de4131414e 100644 --- a/memdocs/configmgr/core/plan-design/configs/supported-operating-systems-for-clients-and-devices.md +++ b/memdocs/configmgr/core/plan-design/configs/supported-operating-systems-for-clients-and-devices.md @@ -2,7 +2,7 @@ title: Supported clients and devices titleSuffix: Configuration Manager description: Learn which OS versions Configuration Manager supports for clients and devices. -ms.date: 05/01/2024 +ms.date: 12/19/2024 ms.subservice: core-infra ms.service: configuration-manager ms.topic: conceptual @@ -18,7 +18,7 @@ ms.reviewer: mstewart,aaroncz *Applies to: Configuration Manager (current branch)* -Configuration Manager supports installing client software on Windows and macOS computers. +Configuration Manager supports installing client software on Windows computers. ## General requirements and limitations @@ -66,9 +66,13 @@ For more information, see the following articles: ### Supported server OS versions +- **Windows Server 2025**: IoT, Standard, Datacenter (_starting in Configuration Manager version 2409_) + - **Windows Server 2022**: IoT, Standard, Datacenter (_starting in Configuration Manager version 2107_) + - *Windows Server IoT 2022 for Storage* is not supported -- **Windows Server 2019**: IoT, Standard, Datacenter +- **Windows Server 2019**: IoT, Standard, Datacenter + - *Windows Server IoT 2019 for Storage* is not supported - **Windows Server 2016**: Standard, Datacenter @@ -88,6 +92,8 @@ The following versions specifically refer to the Server Core installation of the Windows Server semi-annual channel versions are Server Core installations, such as Windows Server, version 1809. As a Configuration Manager client, they're supported the same as the associated Windows 11 or Windows 10 semi-annual channel version. For more information, see [Support for Windows 11](support-for-windows-11.md) or [Support for Windows 10](support-for-windows-10.md). +- **Windows Server 2025** (x64) [Note 1](#bkmk_note1) (_starting in version 2409_) + - **Windows Server 2022** (x64) [Note 1](#bkmk_note1) (_starting in version 2107_) - **Windows Server 2019** (x64) [Note 1](#bkmk_note1) diff --git a/memdocs/configmgr/core/plan-design/configs/supported-operating-systems-for-site-system-servers.md b/memdocs/configmgr/core/plan-design/configs/supported-operating-systems-for-site-system-servers.md index f402f899d16..e0c262dd03b 100644 --- a/memdocs/configmgr/core/plan-design/configs/supported-operating-systems-for-site-system-servers.md +++ b/memdocs/configmgr/core/plan-design/configs/supported-operating-systems-for-site-system-servers.md @@ -2,12 +2,12 @@ title: Supported site system servers titleSuffix: Configuration Manager description: Learn which Windows versions you can use to host a Configuration Manager site or site system role. -ms.date: 12/01/2023 +ms.date: 12/19/2024 ms.subservice: core-infra ms.service: configuration-manager ms.topic: conceptual -author: Banreet -ms.author: banreetkaur +author: Baladelli +ms.author: baladell manager: apoorvseth ms.localizationpriority: medium ms.collection: tier3 @@ -20,6 +20,32 @@ ms.reviewer: mstewart,aaroncz This article details the Windows versions that you can use to host a Configuration Manager site or site system role. +## Windows Server 2025 + +_Applies to Datacenter: Azure Edition, Standard and Datacenter editions_ + +Site servers: + +- Central administration site +- Primary site +- Secondary site + +Site system servers: + +- Certificate registration point +- Cloud management gateway connection point +- Data warehouse service point +- Distribution point [Note 1](#bkmk_note1) +- Endpoint Protection point +- Fallback status point +- Management point +- Reporting services point +- Service connection point +- Site database server [Note 2](#bkmk_note2) +- SMS Provider +- Software update point +- State migration point + ## Windows Server 2022 _Applies to Datacenter: Azure Edition, Standard and Datacenter editions_ @@ -145,6 +171,7 @@ This support has the following limitation: The server core installation of the following server OS versions is supported for use as a **distribution point**: +- Windows Server 2025 - Windows Server 2022 - Windows Server 2019 - Windows Server, version 1809 diff --git a/memdocs/configmgr/core/plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-1802.md b/memdocs/configmgr/core/plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-1802.md index cf07d802fba..fc610ae9088 100644 --- a/memdocs/configmgr/core/plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-1802.md +++ b/memdocs/configmgr/core/plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-1802.md @@ -498,6 +498,6 @@ For Configuration Manager version 1802, this level includes the following data: - Top 50 CPUs in the environment -- Type of Exchange Active Sync (EAS) conditional access policies (block or quarantine) for devices that Microsoft Intune manages +- Type of Exchange Active Sync (EAS) Conditional Access policies (block or quarantine) for devices that Microsoft Intune manages - Microsoft Store for Business application details: non-aggregate list of synced applications including AppID, online state or offline state, and total purchased license counts diff --git a/memdocs/configmgr/core/plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-1806.md b/memdocs/configmgr/core/plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-1806.md index a2c23674cb3..5f55fab4502 100644 --- a/memdocs/configmgr/core/plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-1806.md +++ b/memdocs/configmgr/core/plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-1806.md @@ -533,6 +533,6 @@ For Configuration Manager version 1806, this level includes the following data: - Top 50 CPUs in the environment -- Type of Exchange Active Sync (EAS) conditional access policies (block or quarantine) for devices that Microsoft Intune manages +- Type of Exchange Active Sync (EAS) Conditional Access policies (block or quarantine) for devices that Microsoft Intune manages - Microsoft Store for Business application details: non-aggregate list of synced applications including AppID, online state or offline state, and total purchased license counts diff --git a/memdocs/configmgr/core/plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-1810.md b/memdocs/configmgr/core/plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-1810.md index a5f919d28c5..63e2acef27b 100644 --- a/memdocs/configmgr/core/plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-1810.md +++ b/memdocs/configmgr/core/plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-1810.md @@ -563,7 +563,7 @@ For Configuration Manager version 1810, this level includes the following data: - Top 50 CPUs in the environment -- Type of Exchange Active Sync (EAS) conditional access policies (block or quarantine) for devices that Microsoft Intune manages +- Type of Exchange Active Sync (EAS) Conditional Access policies (block or quarantine) for devices that Microsoft Intune manages - Microsoft Store for Business application details: non-aggregate list of synced applications including AppID, online state or offline state, and total purchased license counts diff --git a/memdocs/configmgr/core/plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-1902.md b/memdocs/configmgr/core/plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-1902.md index 5b320b9be23..3cafdcc611d 100644 --- a/memdocs/configmgr/core/plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-1902.md +++ b/memdocs/configmgr/core/plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-1902.md @@ -579,7 +579,7 @@ For Configuration Manager version 1902, this level includes the following data: - Top 50 CPUs in the environment -- Type of Exchange Active Sync (EAS) conditional access policies (block or quarantine) for devices that Microsoft Intune manages +- Type of Exchange Active Sync (EAS) Conditional Access policies (block or quarantine) for devices that Microsoft Intune manages - Microsoft Store for Business application details: non-aggregate list of synced applications including AppID, online state or offline state, and total purchased license counts diff --git a/memdocs/configmgr/core/plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-1906.md b/memdocs/configmgr/core/plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-1906.md index d123ffc7e05..02d4d2aeab5 100644 --- a/memdocs/configmgr/core/plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-1906.md +++ b/memdocs/configmgr/core/plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-1906.md @@ -584,7 +584,7 @@ For Configuration Manager version 1906, this level includes the following data: - Top 50 CPUs in the environment -- Type of Exchange Active Sync (EAS) conditional access policies (block or quarantine) for devices that Microsoft Intune manages +- Type of Exchange Active Sync (EAS) Conditional Access policies (block or quarantine) for devices that Microsoft Intune manages - Microsoft Store for Business application details: non-aggregate list of synced applications including AppID, online state or offline state, and total purchased license counts diff --git a/memdocs/configmgr/core/plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-1910.md b/memdocs/configmgr/core/plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-1910.md index 65dc846d03c..16c98dadd24 100644 --- a/memdocs/configmgr/core/plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-1910.md +++ b/memdocs/configmgr/core/plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-1910.md @@ -594,7 +594,7 @@ For Configuration Manager version 1910, this level includes the following data: - Top 50 CPUs in the environment -- Type of Exchange Active Sync (EAS) conditional access policies (block or quarantine) for devices that Microsoft Intune manages +- Type of Exchange Active Sync (EAS) Conditional Access policies (block or quarantine) for devices that Microsoft Intune manages - Microsoft Store for Business application details: non-aggregate list of synced applications including AppID, online state or offline state, and total purchased license counts diff --git a/memdocs/configmgr/core/plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-2002.md b/memdocs/configmgr/core/plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-2002.md index 2ba1d862e81..01c88a56520 100644 --- a/memdocs/configmgr/core/plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-2002.md +++ b/memdocs/configmgr/core/plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-2002.md @@ -632,7 +632,7 @@ For Configuration Manager version 2002, this level includes the following data: - Top 50 CPUs in the environment -- Type of Exchange Active Sync (EAS) conditional access policies (block or quarantine) for devices that Microsoft Intune manages +- Type of Exchange Active Sync (EAS) Conditional Access policies (block or quarantine) for devices that Microsoft Intune manages - Microsoft Store for Business application details: non-aggregate list of synced applications including AppID, online state or offline state, and total purchased license counts diff --git a/memdocs/configmgr/core/plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-2006.md b/memdocs/configmgr/core/plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-2006.md index a07ffe2e719..efca0bed8d6 100644 --- a/memdocs/configmgr/core/plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-2006.md +++ b/memdocs/configmgr/core/plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-2006.md @@ -638,7 +638,7 @@ For Configuration Manager version 2006, this level includes the following data: - Top 50 CPUs in the environment -- Type of Exchange Active Sync (EAS) conditional access policies (block or quarantine) for devices that Microsoft Intune manages +- Type of Exchange Active Sync (EAS) Conditional Access policies (block or quarantine) for devices that Microsoft Intune manages - Microsoft Store for Business application details: non-aggregate list of synced applications including AppID, online state or offline state, and total purchased license counts diff --git a/memdocs/configmgr/core/plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-2010.md b/memdocs/configmgr/core/plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-2010.md index ad79d5eb5b0..bd3fa12ec5c 100644 --- a/memdocs/configmgr/core/plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-2010.md +++ b/memdocs/configmgr/core/plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-2010.md @@ -678,7 +678,7 @@ For Configuration Manager version 2010, this level includes the following data: - Top 50 CPUs in the environment -- Type of Exchange Active Sync (EAS) conditional access policies (block or quarantine) for devices that Microsoft Intune manages +- Type of Exchange Active Sync (EAS) Conditional Access policies (block or quarantine) for devices that Microsoft Intune manages - Microsoft Store for Business application details: non-aggregate list of synced applications including AppID, online state or offline state, and total purchased license counts diff --git a/memdocs/configmgr/core/plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-2103.md b/memdocs/configmgr/core/plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-2103.md index 2d46131ab45..0e078fcd15e 100644 --- a/memdocs/configmgr/core/plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-2103.md +++ b/memdocs/configmgr/core/plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-2103.md @@ -675,7 +675,7 @@ For Configuration Manager version 2103, this level includes the following data: - Top 50 CPUs in the environment -- Type of Exchange Active Sync (EAS) conditional access policies (block or quarantine) for devices that Microsoft Intune manages +- Type of Exchange Active Sync (EAS) Conditional Access policies (block or quarantine) for devices that Microsoft Intune manages - Microsoft Store for Business application details: non-aggregate list of synced applications including AppID, online state or offline state, and total purchased license counts diff --git a/memdocs/configmgr/core/plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-2107.md b/memdocs/configmgr/core/plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-2107.md index 330a26d0e89..b42190371f2 100644 --- a/memdocs/configmgr/core/plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-2107.md +++ b/memdocs/configmgr/core/plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-2107.md @@ -683,7 +683,7 @@ For Configuration Manager version 2107, this level includes the following data: - Top 50 CPUs in the environment -- Type of Exchange Active Sync (EAS) conditional access policies (block or quarantine) for devices that Microsoft Intune manages +- Type of Exchange Active Sync (EAS) Conditional Access policies (block or quarantine) for devices that Microsoft Intune manages - Microsoft Store for Business application details: non-aggregate list of synced applications including AppID, online state or offline state, and total purchased license counts diff --git a/memdocs/configmgr/core/plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-2111.md b/memdocs/configmgr/core/plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-2111.md index c339b60573f..2f01aba3840 100644 --- a/memdocs/configmgr/core/plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-2111.md +++ b/memdocs/configmgr/core/plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-2111.md @@ -693,7 +693,7 @@ For Configuration Manager version 2111, this level includes the following data: - Top 50 CPUs in the environment -- Type of Exchange Active Sync (EAS) conditional access policies (block or quarantine) for devices that Microsoft Intune manages +- Type of Exchange Active Sync (EAS) Conditional Access policies (block or quarantine) for devices that Microsoft Intune manages - Microsoft Store for Business application details: non-aggregate list of synced applications including AppID, online state or offline state, and total purchased license counts diff --git a/memdocs/configmgr/core/plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-2203.md b/memdocs/configmgr/core/plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-2203.md index 0b25cd240ef..b4d7b890cf2 100644 --- a/memdocs/configmgr/core/plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-2203.md +++ b/memdocs/configmgr/core/plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-2203.md @@ -703,7 +703,7 @@ For Configuration Manager version 2203, this level includes the following data: - Top 50 CPUs in the environment -- Type of Exchange Active Sync (EAS) conditional access policies (block or quarantine) for devices that Microsoft Intune manages +- Type of Exchange Active Sync (EAS) Conditional Access policies (block or quarantine) for devices that Microsoft Intune manages - Microsoft Store for Business application details: non-aggregate list of synced applications including AppID, online state or offline state, and total purchased license counts diff --git a/memdocs/configmgr/core/plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-2207.md b/memdocs/configmgr/core/plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-2207.md index 0b4294cf7f9..07337bd56e1 100644 --- a/memdocs/configmgr/core/plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-2207.md +++ b/memdocs/configmgr/core/plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-2207.md @@ -723,7 +723,7 @@ For Configuration Manager version 2207, this level includes the following data: - Top 50 CPUs in the environment -- Type of Exchange Active Sync (EAS) conditional access policies (block or quarantine) for devices that Microsoft Intune manages +- Type of Exchange Active Sync (EAS) Conditional Access policies (block or quarantine) for devices that Microsoft Intune manages - Microsoft Store for Business application details: non-aggregate list of synced applications including AppID, online state or offline state, and total purchased license counts diff --git a/memdocs/configmgr/core/plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-2211.md b/memdocs/configmgr/core/plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-2211.md index bb0fec2044c..04739f2c63a 100644 --- a/memdocs/configmgr/core/plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-2211.md +++ b/memdocs/configmgr/core/plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-2211.md @@ -727,7 +727,7 @@ For Configuration Manager version 2211, this level includes the following data: - Top 50 CPUs in the environment -- Type of Exchange Active Sync (EAS) conditional access policies (block or quarantine) for devices that Microsoft Intune manages +- Type of Exchange Active Sync (EAS) Conditional Access policies (block or quarantine) for devices that Microsoft Intune manages - Microsoft Store for Business application details: non-aggregate list of synced applications including AppID, online state or offline state, and total purchased license counts diff --git a/memdocs/configmgr/core/plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-2303.md b/memdocs/configmgr/core/plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-2303.md index 48319c11466..1b170ac637b 100644 --- a/memdocs/configmgr/core/plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-2303.md +++ b/memdocs/configmgr/core/plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-2303.md @@ -731,7 +731,7 @@ For Configuration Manager version 2303, this level includes the following data: - Top 50 CPUs in the environment -- Type of Exchange Active Sync (EAS) conditional access policies (block or quarantine) for devices that Microsoft Intune manages +- Type of Exchange Active Sync (EAS) Conditional Access policies (block or quarantine) for devices that Microsoft Intune manages - Microsoft Store for Business application details: non-aggregate list of synced applications including AppID, online state or offline state, and total purchased license counts diff --git a/memdocs/configmgr/core/plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-2309.md b/memdocs/configmgr/core/plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-2309.md index 5697ebf534d..eae41323de0 100644 --- a/memdocs/configmgr/core/plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-2309.md +++ b/memdocs/configmgr/core/plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-2309.md @@ -735,7 +735,7 @@ For Configuration Manager version 2309, this level includes the following data: - Top 50 CPUs in the environment -- Type of Exchange Active Sync (EAS) conditional access policies (block or quarantine) for devices that Microsoft Intune manages +- Type of Exchange Active Sync (EAS) Conditional Access policies (block or quarantine) for devices that Microsoft Intune manages - Microsoft Store for Business application details: non-aggregate list of synced applications including AppID, online state or offline state, and total purchased license counts diff --git a/memdocs/configmgr/core/plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-2403.md b/memdocs/configmgr/core/plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-2403.md index 87aed31f442..9869a53f34f 100644 --- a/memdocs/configmgr/core/plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-2403.md +++ b/memdocs/configmgr/core/plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-2403.md @@ -735,7 +735,7 @@ For Configuration Manager version 2403, this level includes the following data: - Top 50 CPUs in the environment -- Type of Exchange Active Sync (EAS) conditional access policies (block or quarantine) for devices that Microsoft Intune manages +- Type of Exchange Active Sync (EAS) Conditional Access policies (block or quarantine) for devices that Microsoft Intune manages - Microsoft Store for Business application details: non-aggregate list of synced applications including AppID, online state or offline state, and total purchased license counts diff --git a/memdocs/configmgr/core/plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-2409.md b/memdocs/configmgr/core/plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-2409.md new file mode 100644 index 00000000000..6b88ad44163 --- /dev/null +++ b/memdocs/configmgr/core/plan-design/diagnostics/levels-of-diagnostic-usage-data-collection-2409.md @@ -0,0 +1,745 @@ +--- +title: Diagnostic and usage data for 2409 +titleSuffix: Configuration Manager +description: Learn about the specific data that Configuration Manager collects at each level in version 2409. +ms.date: 12/04/2024 +ms.subservice: core-infra +ms.service: configuration-manager +ms.topic: reference +author: Baladelli +ms.author: Baladell +manager: apoorvseth +ms.localizationpriority: medium +ms.collection: tier3 +ms.reviewer: mstewart,aaroncz +--- + +# Diagnostic and usage data for version 2409 + +*Applies to: Configuration Manager (current branch)* + +The following sections provide additional detail about data collected at each level. For more information on the levels and how to change them, see [Levels of diagnostic usage data](levels-overview.md). + +Changes from previous versions are noted with ***[New]***, ***[Updated]***, ***[Removed]***, or ***[Moved]***. + +> [!IMPORTANT] +> Configuration Manager doesn't collect IP addresses, user names, computer names, physical addresses, or email addresses on the Basic or Enhanced levels. Any collection of this information on the Full level is not purposeful. It is potentially included in advanced diagnostic information like log files or memory snapshots. Microsoft doesn't use this information to identify you, contact you, or develop advertising. + +## Level 1 - Basic + +For Configuration Manager version 2409, this level includes the following data: + +### Application management (Level 1) + +- Basic application and deployment type counts: total apps, total apps with multiple deployment types, total apps with dependencies, total superseded apps, and count of deployment technologies in use + +- Count of Microsoft Edge installations + +- Count of clients by default and preferred browser + +### Client (Level 1) + +- Count of client languages and locales + +- Count of Configuration Manager client versions, OS versions, and Office versions + +- Count of Windows 10 and later devices by branch, build, and unique Active Directory forest + +- Count of clients joined to Microsoft Entra ID + +- Count of extended interoperability clients + +- Count of clients by Windows OS age, to the nearest three-month interval + +- Top 10 processor names used on clients and servers + +- Use of the bulk registration token + +- Count of clients by identity source and registration method. For example, Active Directory, Microsoft Entra ID, or PKI client authentication certificate. + +- Count of clients by OS type and version that are joined to Microsoft Entra ID or hybrid-joined + +- Count of clients by OS and system processor type + +- Statistics for the number of collections and machines with power configuration management settings assigned + +### Cloud services (Level 1) + +- Count of existing and new devices that are cloud attached since the last data collection + +- Count of clients by co-management enrollment method + +- Error statistics for co-management enrollment + +- Aggregated usage statistics of co-management: number of clients ever enrolled, number of enrolled clients, number of clients pending enrollment, clients receiving policy, workload states, pilot/exclusion collection sizes, and enrollment errors + +- Count of clients piloting or using each co-management workload + +- Count of Microsoft Entra applications and services connected to Configuration Manager + +- Cloud attach and detach actions + +- Status of last sync with Intune cloud service + +- Configuration and usage statistics of cloud management gateway: counts of regions and environments, and authentication/authorization statistics + +- Summarized count of Endpoint Analytics event + +- Aggregated statistics on Desktop Analytics enrollment errors and usage + +- Count of clients by OS type and version that are co-managed, cloud-attached, or use a cloud management gateway (CMG) + +### Configuration Manager console (Level 1) + +- Statistics about Configuration Manager console connections: OS version, language, SKU and architecture, system memory, logical processor count, connect site ID, installed .NET versions, console language packs, and capable authentication level + +- Hashed list of extensions to Configuration Manager console property pages and wizards + +- Configuration Manager console crash locations + +- Configuration Manager console usage statistics + +- Configuration Manager console notification configuration and status + +### Protection (Level 1) + +- Basic Endpoint Protection information about antimalware client versions + +- Existence of Microsoft BitLocker Administration and Monitoring (MBAM) server-side extensions + +- BitLocker management client counts summarized by enrollment and TPM state + +### Setup (Level 1) + +- Build, install type, language packs, features that you enabled + +- Pre-release use, setup media type, branch type + +- Software Assurance expiration date + +- Update pack deployment status and errors, download progress, and prerequisite errors + +- Use of early update ring + +- Version of post-upgrade script + +- Central administration site removal status + +### Site database (Level 1) + +- Basic database configuration: processors, memory size, memory settings, Configuration Manager database configuration, Configuration Manager database size, cluster configuration, configuration of distributed views, and change tracking version + +- Database performance metrics: replication processing information, top SQL Server stored procedures by processor, and disk usage + +- SQL Server version, service pack level, edition, collation ID, and character set + +- Hashed list of top SQL queries by memory usage and lock count + +- SQL Server Always On availability group replica information, usage, and health status + +### Site infrastructure (Level 1) + +- Count of Microsoft Entra users and Windows users requesting in Admin Service + +- Basic Configuration Manager site hierarchy data: site list, type, version, status, client count, time zone, and health status + +- Basic discovery statistics: discovery count, minimum/maximum/average group sizes, and when the site is running entirely with Microsoft Entra services + +- Basic site system server information: site system roles used, internet and SSL status, OS, processors, physical or virtual machine, and usage of site server high availability + +- Configured level for diagnostics and usage data, online or offline mode, and fast update configuration + +- Distribution point and management point types and basic configuration information: protected, prestaged, PXE, multicast, SSL state, pull/peer distribution points, MDM-enabled, and SSL-enabled + +- Diagnostics and usage data statistics: when run, runtime, errors + +- Hashed list of hardware inventory properties longer than 255 characters + +- Count and processing rates of key Configuration Manager objects: data discovery records (DDR), state messages, status messages, hardware inventory, software inventory, and overall count of files in inboxes + +- Site server disk and processor performance information + +- Uptime and memory usage information for Configuration Manager site server processes + +- Count of crashes for Configuration Manager site server processes, and Watson signature ID, if available + +- Hash of key site attributes (site ID, site codes, sites names, SQL Server broker ID, and site exchange key) + +- Status and health of the administration service + +- Counts of errors from administration service + +- Site health information + +- Site health check configuration and status + +- Version of Visual Studio redistributable and .NET Framework installed on clients and site system servers + +- Summarized hierarchy health and activity status + +### Miscellaneous (Level 1) + +- Basic OS deployment counts of images + +- Count of Windows clients that use Windows Update for Business + +- Count of operating systems for managed devices and policies set by the Exchange Connector + +- Count of phased deployments created by type + +- Count of categorized and uncategorized applications for asset intelligence + +- Aggregated count of upgrade readiness assessments + +- Number of software updates referenced by task sequence + +- Count of scripts scheduled and run statistics + +- External Service Notification usage statistics + +## Level 2 - Enhanced + +For Configuration Manager version 2409, this level includes the following data: + +### Application management (Level 2) + +- App requirements: count of built-in conditions referenced by deployment technology + +- App supersedence, maximum depth of chain + +- Application approval statistics and usage frequency + +- Application content size statistics + +- Application deployment information: use of install versus uninstall, requires approval, user interaction enabled/disabled, dependency, supersedence, and usage count of install behavior feature + +- Application policy size and complexity statistics + +- Available application request statistics + +- Basic configuration information for packages and programs: deployment options and program flags + +- Basic usage/targeting information for deployment types: user versus device targeted, required versus available, and universal apps + +- Count of application applicability by OS + +- Count of applications referenced in a task sequence + +- Count of distinct branding for application catalog + +- Count of Microsoft 365 Apps applications created using dashboard + +- Count of packages by type + +- Count of package/program deployments + +- Count of Windows 10 and later licensed application licenses + +- Count of Windows Installer deployment types by uninstall content settings + +- Count of Microsoft Store for Business apps and sync statistics: summarized types of apps, licensed app status, and number of online and offline licensed apps + +- Maintenance window type and duration + +- Minimum/maximum/average number of application deployments per user/device per time period + +- Most common application installation error codes by deployment technology + +- MSI configuration options and counts + +- Statistics on end-user interaction with notification for required software deployments + +- Universal Data Access usage, how created + +- Aggregated user device affinity statistics + +- Max and average primary users per device + +- Application global condition usage by type + +- Software Center customization configuration, including use of settings to configure Software Center and notification branding + +- Package Conversion Manager readiness and counts + +- Count of application detection methods by type + +- Count of application enforcement errors + +- MSI installer properties + +- Statistics of user install requests + +- Aggregated statistics on the use of the email approval feature + +- File count, content size, services count, and custom action count of MSIs in application catalog + +- Count of devices by Office ProPlus readiness state + +- Aggregated statistics on the use of application groups + +- Aggregated statistics on Office add-ins, usage of the Office Readiness Toolkit, and counts of clients with Microsoft 365 Apps + +- Aggregated statistics on Office add-in health + +- Count and size of Office Pro Plus pilot collections + +- Number of Office Pro Plus devices sending Office health data + +- Count of the type of actions used on apps over time + +### Client (Level 2) + +- Active Management Technology (AMT) client version + +- BIOS age in years, and distribution of ages in months + +- Count of devices with Secure Boot enabled + +- Count of devices by TPM state + +- Client auto-upgrade: deployment configuration including client piloting and exclusion usage (extended interoperability client) + +- Client deployment download errors + +- Client health statistics and top issue summary by client version, component, OS, and workload + +- Client notification operation action status: how many times each is run, max number of targeted clients, and average success rate + +- Count of client installations from each source location type + +- Count of client installation failures + +- Count of devices virtualized by Hyper-V or Azure + +- Count of Software Center actions + +- Count of UEFI-enabled devices + +- Deployment methods used for client and count of clients per deployment method + +- List/count of enabled client agents + +- OS age in months + +- Number of hardware inventory classes, software inventory rules, file collection rules, and overall health status + +- Statistics for device health attestation: most common error codes, number of on-premises servers, and counts of devices in various states + +- Count of devices by default browser + +- Count of Configuration Manager-generated server authentication certificates + +- Count of Microsoft Surface devices by model + +- Count of client health check failures by issue type + +- Count of status (total/approved/blocked) for client certificate types + +- Client counts for different user/device relationship types + +- Count of clients in VPN boundaries + +- Power plans with their peak and non-peak usage statistics + +- Power plan peak usage statistics + +- Power plan setting options usage statistics + +### Cloud services (Level 2) + +- Microsoft Entra discovery statistics + +- Count of collections synced to Azure Log Analytics + +- Count of Upgrade Analytics Connectors + +- Whether the Azure Log Analytics cloud connector is enabled + +- Count of pull-distribution points with a cloud distribution point as a source location + +- Usage of the cloud services onboarding wizard + +- Cloud services configuration onboarding properties + +- Cloud services endpoint connectivity and component health + +- Usage of the cloud-attach wizard + +- Cloud Distribution Point usage statistics + +### CMPivot (Level 2) + +- CMPivot usage statistics + +- Count of saved CMPivot queries + +- Count of queries by entity type + +### Co-management (Level 2) + +- Enrollment schedule and historical statistics + +- Count of clients eligible for co-management + +- Associated Microsoft Intune tenant + +### Collections (Level 2) + +- Collection ID usage (not running out of IDs) + +- Collection evaluation statistics: query time, assigned versus unassigned counts, counts by type, ID rollover, and rule usage + +- Collections without a deployment + +- Count of collections synchronized to Microsoft Entra ID, including type and size + +- Statistics for collection member counts and collection rule counts + +- Statistics about the collection rule WMI class query dependencies + +### Compliance settings (Level 2) + +- Basic configuration baseline information: count, number of deployments, number of references, and frequency of changes + +- Compliance policy error statistics + +- Count of configuration items by type + +- Count of deployments that reference built-in settings, including remediate setting + +- Count of rules and deployments created for custom settings, including remediate setting + +- Count of deployed Simple Certificate Enrollment Protocol (SCEP), VPN, Wi-Fi, certificate (.pfx), and compliance policy templates + +- Count of SCEP certificate, VPN, Wi-Fi, certificate (.pfx), and compliance policy deployments by platform + +- Windows Hello for Business policy (created, deployed) + +- Count of deployed Microsoft Edge Legacy browser policies + +- Count of OneDrive policies (created, deployed) + +- Count of compliance settings deployed by category, OS, and source (cloud vs on-premises) + +- Company resource access profile settings usage + +### Configuration Manager console (Level 2) + +- Counts of active and viewed console notification messages by type + +- Count of folders by object type + +- Console performance information + +- 25 most common actions, wizards, property sheets, and tree nodes accessed in the console + +- List of installed console extensions, and whether they're enabled, required, or approved + +- Summary of size and count of admin persisted settings + +- Selected console usage information + +- Unsigned extension policy + +- Console dark mode usage + +### Content (Level 2) + +- Boundary group statistics: how many fast, how many slow, count per group, and fallback relationships + +- Boundary group information: count of boundaries and site systems that are assigned to each boundary group + +- Boundary group relationships and fallback configuration + +- Client content download statistics + +- Count of boundaries by type + +- Count of peer cache clients, usage statistic, and partial download statistics + +- Distribution Manager configuration information: threads, retry delay, number of retries, and pull distribution point settings + +- Distribution point configuration information: use of branch cache and distribution point monitoring + +- Distribution point group information: count of packages and distribution points that are assigned to each distribution point group + +- Content library type, whether local or remote + +- Count of boundary groups by configuration + +- Count of subnets excluded from peer cache + +- Count and type of operations on the `SMSDPProvider` service for distribution points + +### Protection (Level 2) + +- Microsoft Defender for Endpoint policies (formerly known as Windows Defender for Endpoint): count of policies, and whether policies are deployed. + +- Count of alerts that are configured for Endpoint Protection feature + +- Count of collections that are selected to appear in Endpoint Protection dashboard + +- Count of Windows Defender Exploit Guard policies, deployments, and targeted clients + +- Endpoint Protection deployment errors, count of Endpoint Protection policy deployment error codes + +- Endpoint Protection antimalware and Windows Firewall policy usage (number of unique policies assigned to group). This data doesn't include any information about the settings included in the policy. + +- Aggregated statistics for Microsoft Defender for Endpoint policies + +- Count of Microsoft Defender Application Guard policies, deployments, and targeted clients + +- Count of Microsoft Defender Application Control policies, deployments, and targeted clients + +### Migration (Level 2) + +- Count of migrated objects (use of migration wizard) + +### Mobile device management (MDM) (Level 2) + +- Count of issued mobile device actions: lock, pin rest, wipe, retire, and sync now commands + +- Count of mobile device policies + +- Count of mobile devices Configuration Manager manages, and how you enrolled them (bulk, user-based) + +- Count of users who have multiple enrolled mobile devices + +- Mobile device polling schedule and statistics for mobile device check-in duration + +### On-premises mobile device management (MDM) (Level 2) + +- Count of Windows bulk enrollment packages and profiles + +- Deployment success/failure statistics for on-premises MDM application deployments + +### OS deployment (Level 2) + +- Count of boot images, drivers, driver packages, multicast-enabled distribution points, PXE-enabled distribution points, and task sequences + +- Count of boot images by Configuration Manager client version + +- Count of boot images by Windows PE version + +- Count of edition upgrade policies + +- Count of hardware identifiers excluded from PXE + +- Count of OS deployment by OS version + +- Count of OS upgrades over time + +- Count of task sequence deployments using option to pre-download content + +- Counts of task sequence step usage + +- Version of Windows ADK installed + +- Count of image servicing tasks + +- Count of imported machines + +- Count of duplicate hardware identifiers (MAC address and SMBIOS GUID) excluded from PXE and client registration + +- Count of task sequences by type (OS deployment or generic task sequence) + +- Count of packages with pre-cache content settings + +- Grouped sizes of task sequence policies + +- Count of error codes from feature upgrades for Windows clients + +- Count of supported and unsupported OS versions + +- Count of task sequences and legacy packages with custom icons + +### Site updates (Level 2) + +- Versions of installed Configuration Manager hotfixes + +### Software updates (Level 2) + +- Available and deadline deltas that are used in automatic deployment rules + +- Average and maximum number of assignments per update + +- Client update evaluation and scan schedules + +- Classifications synced by the software update point + +- Cluster patching statistics + +- Configuration of Windows express updates + +- Configurations that are used for active Windows servicing plans + +- Count of deployed Microsoft 365 Apps updates + +- Count of Microsoft Surface drivers synced + +- Count of update groups and assignments + +- Count of update packages and the maximum/minimum/average number of distribution points that are targeted with packages + +- Count of updates that are created and deployed with System Center Update Publisher + +- Count of Windows Update for Business policies created and deployed + +- Aggregated statistics of Windows Update for Business configurations + +- Number of automatic deployment rules that are tied to synchronization + +- Number of automatic deployment rules that create new or add updates to an existing group + +- Number of automatic deployment rules that have multiple deployments + +- Number of update groups and minimum/maximum/average number of updates per group + +- Number of updates and percentage of updates that are deployed, expired, superseded, downloaded, and contain EULAs + +- Software update point load-balancing statistics + +- Software update point synchronization schedule + +- Total/average number of collections that have software update deployments and the maximum/average number of deployed updates + +- Update scan error codes and machine count + +- Windows servicing dashboard content versions + +- Count of third-party software update catalog subscriptions and usage + +- Count of software updates deployed with and without content + +- Aggregated statistics on the number of UUP updates that are required, deployed, expired, superseded, and downloaded + +- Use of UUP product categories + +- Count of clients that have deployed at least one UUP quality update or UUP feature update + +- Top UUP error codes and count of affected devices + +- List of subscriptions to third-party software update catalogs + +- Use of WSUS maintenance settings + +- Orchestration group usage + +- Windows Update fallback configuration settings + +- Type, size, and timeout settings of orchestration group scripts + +- Software Update Point setting options statistics + +### SQL/performance data (Level 2) + +- Configuration and duration of site summarization + +- Count of largest database tables + +- Discovery operational statistics (count of objects found) + +- Discovery types, enabled, and schedule (full, incremental) + +- SQL Server change tracking performance issues, retention period, and autocleanup state + +- SQL Server change tracking retention period + +- State and status message performance statistics including most common and most expensive message types + +- Management point traffic statistics (total bytes sent and received by endpoint) + +- Management point performance counter measurements + +- Aggregated performance statistics of calls made to Software Center endpoints on the management point + +- SQL Server maintenance task configuration and status + +- Status of recent re-initialization requests + +### Miscellaneous (Level 2) + +- Configuration of data warehouse service point including synchronization schedule, average time, and use of customized tables feature + +- Count of scripts and run/edit statistics + +- Count of sites with Wake On LAN (WOL) + +- Reporting usage and performance statistics + +- Phased deployment usage statistics + +- Management insights item counts and progress + +- Count of crashes for unique non-Configuration Manager processes on the site server, and Watson signature ID, if available + +- Aggregated system boot time statistics by OS, form-factor, and drive type + +- Usage of the Azure migration tool + +- Count of clients with browser usage + +- Summary of how many site systems have the proxy enabled and how many are authenticated proxy, including configuration, usage patterns, and traffic patterns + +- Usage information for the last seven days of in-console product feedback + +- Count of site-to-site accounts by type + +- Usage statistics for user and device custom properties + +- Count and type of edits to asset intelligence categories + +## Level 3 - Full + +For Configuration Manager version 2409, this level includes the following data: + +- Automatic deployment rule evaluation schedule information + +- ATP health summary + +- Collection evaluation and refresh statistics + +- Compliance policy statistics on compliance and errors + +- Compliance settings: SCEP, VPN, Wi-Fi, and compliance policy template configuration details + +- DCM config pack for Configuration Manager usage + +- Detailed client deployment installation errors + +- Endpoint Protection health summary: including count of protected, at risk, unknown, and unsupported clients + +- Endpoint Protection policy configuration + +- List of processes configured with installation behavior for applications + +- Minimum/maximum/average number of hours since last software update scan + +- Minimum/maximum/average number of inactive clients in software update deployment collections + +- Minimum/maximum/average number of software updates per package + +- MSI product code deployment statistics + +- Overall compliance of software update deployments + +- Count of groups that have expired software updates + +- Software update deployment error codes and counts + +- Software update deployment information: percentage of deployments that are targeted with client versus UTC time, required versus optional versus silent, and reboot suppression + +- Software update products synced by software update point + +- Software update scan success percentages + +- Top 50 CPUs in the environment + +- Type of Exchange Active Sync (EAS) Conditional Access policies (block or quarantine) for devices that Microsoft Intune manages + +- Microsoft Store for Business application details: non-aggregate list of synced applications including AppID, online state or offline state, and total purchased license counts + +- Count of clients pushed with option to not allow fallback to NTLM + +- List of Configuration Manager console extensions + diff --git a/memdocs/configmgr/core/plan-design/diagnostics/levels-overview.md b/memdocs/configmgr/core/plan-design/diagnostics/levels-overview.md index f0b08ca7e9b..4f6d539693e 100644 --- a/memdocs/configmgr/core/plan-design/diagnostics/levels-overview.md +++ b/memdocs/configmgr/core/plan-design/diagnostics/levels-overview.md @@ -2,12 +2,12 @@ title: Levels of diagnostic usage data titleSuffix: Configuration Manager description: Learn about the levels of diagnostics and usage data that Configuration Manager collects -ms.date: 04/01/2024 +ms.date: 12/04/2024 ms.subservice: core-infra ms.service: configuration-manager ms.topic: conceptual -author: gowdhamankarthikeyan -ms.author: gokarthi +author: Baladelli +ms.author: Baladell manager: apoorvseth ms.localizationpriority: medium ms.collection: tier3 @@ -61,17 +61,13 @@ To change the data collection level, you need **Modify** permissions on the **Si The following articles detail the specific data that Configuration Manager collects at each level with each supported version: +- [Diagnostic and usage data for 2409](levels-of-diagnostic-usage-data-collection-2409.md) - [Diagnostic and usage data for 2403](levels-of-diagnostic-usage-data-collection-2403.md) - [Diagnostic and usage data for 2309](levels-of-diagnostic-usage-data-collection-2309.md) -- [Diagnostic and usage data for 2303](levels-of-diagnostic-usage-data-collection-2303.md) -- [Diagnostic and usage data for 2211](levels-of-diagnostic-usage-data-collection-2211.md) -- [Diagnostic and usage data for 2207](levels-of-diagnostic-usage-data-collection-2207.md) - - ## Next steps Next, learn about the diagnostics and usage data that Configuration Manager collects for its tools: > [!div class="nextstepaction"] -> [Diagnostic usage data for tools](tools.md) \ No newline at end of file +> [Diagnostic usage data for tools](tools.md) diff --git a/memdocs/configmgr/core/plan-design/hierarchy/accounts.md b/memdocs/configmgr/core/plan-design/hierarchy/accounts.md index f04f3119a8e..9262ede7440 100644 --- a/memdocs/configmgr/core/plan-design/hierarchy/accounts.md +++ b/memdocs/configmgr/core/plan-design/hierarchy/accounts.md @@ -364,7 +364,7 @@ The site server uses the **Exchange Server connection account** to connect to th ### Management point connection account -The management point uses the **Management point connection account** to connect to the Configuration Manager site database. It uses this connection to send and retrieve information for clients. The management point uses its computer account by default, but you can configure an alternate service account instead. When the management point is in an untrusted domain from the site server, you must specify a alternate service account. +The management point uses the **Management point connection account** to connect to the Configuration Manager site database. It uses this connection to send and retrieve information for clients. The management point uses its computer account by default, but you can configure an alternate service account instead. When the management point is in an untrusted domain from the site server, you must specify an alternate service account. > [!NOTE] > For enhanced security posture it is recommended to leverage alternate service account rather than Computer account for ‘Management point connection account’. @@ -391,7 +391,11 @@ For more information, see [Use multicast to deploy Windows over the network](../ ### Network access account -Client computers use the **network access account** when they can't use their local computer account to access content on distribution points. It mostly applies to workgroup clients and computers from untrusted domains. This account is also used during OS deployment, when the computer that's installing the OS doesn't yet have a computer account on the domain. +Client computers use the **network access account** when they can't use their local computer account to access content on distribution points. It mostly applies to workgroup clients and computers from untrusted domains. +This account is also used during OS deployment, when the computer that's installing the OS doesn't yet have a computer account on the domain. + +> [!NOTE] +> Managing clients in untrusted domains and cross-forest scenarios allows for multiple network access accounts. > [!IMPORTANT] > The network access account is never used as the security context to run programs, install software updates, or run task sequences. It's used only for accessing resources on the network. @@ -441,7 +445,6 @@ The network access account is still required for the following actions (includin - Task Sequence properties setting to **Run another program first**. This setting runs a package and program from a network share before the task sequence starts. For more information, see [Task sequences properties: Advanced tab](../../../osd/deploy-use/manage-task-sequences-to-automate-tasks.md#advanced-tab). -- Managing clients in untrusted domains and cross-forest scenarios allows for multiple network access accounts. ### Package access account @@ -746,7 +749,7 @@ Configuration Manager grants access to the account used for the reporting servic ## Elevated permissions -Configuration Manager requires some accounts to have elevated permissions for on-going operations. For example, see [Prerequisites for installing a primary site](../../servers/deploy/install/prerequisites-for-installing-sites.md#bkmk_PrereqPri). The following list summarizes these permissions and the reasons why they're needed. +Configuration Manager requires some accounts to have elevated permissions for ongoing operations. For example, see [Prerequisites for installing a primary site](../../servers/deploy/install/prerequisites-for-installing-sites.md#bkmk_PrereqPri). The following list summarizes these permissions and the reasons why they're needed. - The computer account of the primary site server and central administration site server requires: diff --git a/memdocs/configmgr/core/plan-design/network/internet-endpoints.md b/memdocs/configmgr/core/plan-design/network/internet-endpoints.md index 18c020c93f2..3ac54a3a1d1 100644 --- a/memdocs/configmgr/core/plan-design/network/internet-endpoints.md +++ b/memdocs/configmgr/core/plan-design/network/internet-endpoints.md @@ -188,6 +188,8 @@ If you use Configuration Manager to deploy and update Microsoft 365 Apps for ent - `contentstorage.osi.office.net` to support the evaluation of Office add-in readiness +- `clients.config.office.net` to retrieve the names of the files needed for a particular Microsoft 365 Apps update. For more information, see [Using the Microsoft 365 Apps file list API](/office/client-developer/shared/manageability-applications-with-the-office-365-click-to-run-installer#using-the-microsoft-365-apps-file-list-api). + Your top-level site server needs access to the following endpoint to download the Microsoft Apps 365 readiness file: - Starting March 2, 2021: `https://omex.cdn.office.net/mirrored/sccmreadiness/SOT_SCCM_AddinReadiness.CAB` diff --git a/memdocs/configmgr/core/servers/deploy/install/install-consoles.md b/memdocs/configmgr/core/servers/deploy/install/install-consoles.md index 5dbdbf22f68..f3aac4eab86 100644 --- a/memdocs/configmgr/core/servers/deploy/install/install-consoles.md +++ b/memdocs/configmgr/core/servers/deploy/install/install-consoles.md @@ -2,12 +2,12 @@ title: Install console titleSuffix: Configuration Manager description: Install the Configuration Manager console to connect to a central administration site or primary site. -ms.date: 10/18/2022 +ms.date: 12/04/2024 ms.subservice: core-infra ms.service: configuration-manager ms.topic: how-to -author: sheetg09 -ms.author: sheetg +author: baladelli +ms.author: Baladell manager: apoorvseth ms.localizationpriority: medium ms.collection: tier3 @@ -34,6 +34,8 @@ The Configuration Manager console is always installed on the site server for the +Starting in version 2403, the console requires Microsoft .NET Framework version 4.8. If you install the console on other devices, make sure to update .NET. If the device doesn't already have it, the console setup doesn't install this prerequisite. + Starting in version 2107, the console requires Microsoft .NET Framework version 4.6.2, but version 4.8 is recommended. If you install the console on other devices, make sure to update .NET. If the device doesn't already have it, the console setup doesn't install this prerequisite. Starting in version 2103, the ConfigurationManager PowerShell module requires Microsoft .NET version 4.7.2 or later. @@ -127,7 +129,7 @@ Specifies the FQDN of the site server to which the console connects when it open ## Postinstallation information -The Configuration Manager console requires installation of the built-in WebView2 extension for certain features such as Community hub and dashboards. A notification to install the extension is given to the console user when they open the console. For more information see,the [WebView2 console extension](../../manage/admin-console-extensions.md#bkmk_notification). +The Configuration Manager console requires installation of the built-in WebView2 extension for certain features such as Community hub and dashboards. A notification to install the extension is given to the console user when they open the console. For more information see, the [WebView2 console extension](../../manage/admin-console-extensions.md#bkmk_notification). ## Next steps diff --git a/memdocs/configmgr/core/servers/deploy/install/release-notes.md b/memdocs/configmgr/core/servers/deploy/install/release-notes.md index b368139d173..89cb4e82d9e 100644 --- a/memdocs/configmgr/core/servers/deploy/install/release-notes.md +++ b/memdocs/configmgr/core/servers/deploy/install/release-notes.md @@ -27,10 +27,10 @@ This article contains release notes for the current branch of Configuration Mana For information about the new features introduced with different versions, see the following articles: +- [What's new in version 2409](../../../plan-design/changes/whats-new-in-version-2409.md) - [What's new in version 2403](../../../plan-design/changes/whats-new-in-version-2403.md) - [What's new in version 2309](../../../plan-design/changes/whats-new-in-version-2309.md) -- [What's new in version 2303](../../../plan-design/changes/whats-new-in-version-2303.md) -- [What's new in version 2211](../../../plan-design/changes/whats-new-in-version-2211.md) + > [!TIP] diff --git a/memdocs/configmgr/core/servers/deploy/install/use-the-setup-wizard-to-install-sites.md b/memdocs/configmgr/core/servers/deploy/install/use-the-setup-wizard-to-install-sites.md index 989b895ea4d..b462ec5c888 100644 --- a/memdocs/configmgr/core/servers/deploy/install/use-the-setup-wizard-to-install-sites.md +++ b/memdocs/configmgr/core/servers/deploy/install/use-the-setup-wizard-to-install-sites.md @@ -2,12 +2,12 @@ title: Setup wizard titleSuffix: Configuration Manager description: Use the Configuration Manager setup wizard to install a new site. -ms.date: 04/08/2022 +ms.date: 12/16/2024 ms.subservice: core-infra ms.service: configuration-manager ms.topic: overview -author: sheetg09 -ms.author: sheetg +author: Baladelli +ms.author: Baladell manager: apoorvseth ms.localizationpriority: medium ms.collection: tier3 diff --git a/memdocs/configmgr/core/servers/manage/admin-console.md b/memdocs/configmgr/core/servers/manage/admin-console.md index b6efdd894e6..3d1eb8fd178 100644 --- a/memdocs/configmgr/core/servers/manage/admin-console.md +++ b/memdocs/configmgr/core/servers/manage/admin-console.md @@ -2,12 +2,12 @@ title: Configuration Manager console titleSuffix: Configuration Manager description: Learn about navigating through the Configuration Manager console. -ms.date: 04/08/2022 +ms.date: 12/04/2024 ms.subservice: core-infra ms.service: configuration-manager ms.topic: conceptual -author: banreet -ms.author: banreetkaur +author: Baladelli +ms.author: Baladell manager: apoorvseth ms.localizationpriority: medium ms.collection: tier3 @@ -40,7 +40,7 @@ To connect to a different site server, use the following steps: :::image type="content" source="media/connect-to-a-new-site.png" alt-text="Connect the console to a new site."::: -1. Type in the FQDN of the site server. If you've previously connected to site server, select the server from the drop-down list. +1. Type in the FQDN of the site server. If you've previous session to site server, select the server from the drop-down list. :::image type="content" source="media/site-server-fqdn.PNG" alt-text="Site Connection window, enter the FQDN of the site server."::: @@ -209,7 +209,7 @@ Starting in version 2203, the Configuration Manager console offers a dark theme. ### Known issue - Console restart is required on doing the theme switch, as the node navigation pane might not properly render when you move to a new workspace. -- Currently, there are locations in the console that may not display the dark theme correctly. We are continuosly working to improve the dark theme. +- Currently, there are locations in the console that may not display the dark theme correctly. We are continuously working to improve the dark theme. ## Connect via Windows PowerShell diff --git a/memdocs/configmgr/core/servers/manage/checklist-for-installing-update-2409.md b/memdocs/configmgr/core/servers/manage/checklist-for-installing-update-2409.md new file mode 100644 index 00000000000..a1c6c5c520b --- /dev/null +++ b/memdocs/configmgr/core/servers/manage/checklist-for-installing-update-2409.md @@ -0,0 +1,360 @@ +--- +title: Checklist for 2409 +titleSuffix: Configuration Manager +description: Learn about actions to take before updating to Configuration Manager version 2409. +ms.date: 12/03/2024 +ms.subservice: core-infra +ms.service: configuration-manager +ms.topic: conceptual +author: PalikaSingh +ms.author: palsi +manager: apoorvseth +ms.localizationpriority: medium +ms.collection: tier3 +ms.reviewer: mstewart,aaroncz +--- + +# Checklist for installing update 2409 for Configuration Manager + +*Applies to: Configuration Manager (current branch)* + +When you use the current branch of Configuration Manager, you can install the in-console update for version 2409 to update your hierarchy from a previous version. + +To get the update for version 2409, you must use a service connection point at the top-level site of your hierarchy. This site system role can be in online or offline mode. To download the update when your service connection point is offline, [use the service connection tool](use-the-service-connection-tool.md). + +After your hierarchy downloads the update package from Microsoft, find it in the console. In the **Administration** workspace, select the **Updates and Servicing** node. + +- When the update is listed as **Available**, the update is ready to install. Before installing version 2409, review the following information [about installing update 2409](#about-installing-update-2409) and the [pre-update checklist](#pre-update-checklist) for configurations to make before starting the update. + +- If the update displays as **Downloading** and doesn't change, review the **hman.log** and **dmpdownloader.log** for errors. + + - The dmpdownloader.log may indicate that the dmpdownloader process is waiting for an interval before checking for updates. To restart the download of the update's redistribution files, restart the **SMS_Executive** service on the site server. + + - Another common download issue occurs when proxy server settings prevent downloads from [required internet endpoints](../../plan-design/network/internet-endpoints.md#updates-and-servicing). + +For more information about installing updates, see [In-console updates and servicing](updates.md#bkmk_inconsole). + +For more information about current branch versions, see [Baseline and update versions](updates.md#bkmk_Baselines). + +## About installing update 2409 + +### Sites + +Install update 2409 at the top-level site of your hierarchy. Start the installation from your central administration site (CAS) or from your stand-alone primary site. After the update is installed at the top-level site, child sites have the following update behavior: + +- Child primary sites install the update automatically after the CAS finishes the installation of the update. You can use service windows to control when a site installs the update. For more information, see [Service windows for site servers](service-windows.md). + +- Manually update each secondary site from within the Configuration Manager console after the primary parent site finishes the update installation. Automatic update of secondary site servers isn't supported. + +### Site system roles + +When a site server installs the update, it automatically updates all of the site system roles. These roles are on the site server or installed on remote servers. Before installing the update, make sure that each site system server meets the current prerequisites for the new update version. + +### Configuration Manager consoles + +The first time you use a Configuration Manager console after the update has finished, you're prompted to update that console. You can also run the Configuration Manager setup on the computer that hosts the console, and choose the option to update the console. Install the update to the console as soon as possible. For more information, see [Install the Configuration Manager console](../deploy/install/install-consoles.md). + +> [!IMPORTANT] +> When you install an update at the CAS, be aware of the following limitations and delays that exist until all child primary sites also complete the update installation: +> +> - **Client upgrades** don't start. This includes automatic updates of clients and pre-production clients. Additionally, you can't promote pre-production clients to production until the last site completes the update installation. After the last site completes the update installation, client updates begin based on your configuration choices. +> - **New features** you enable with the update aren't available. This behavior is to prevent the CAS replicating data related to that feature to a site that hasn't yet installed support for that feature. After all primary sites install the update, the feature is available for use. +> - **Replication links** between the CAS and child primary sites display as not upgraded. This state displays in the update installation status as *Completed with warning* for monitoring replication initialization. In the **Monitoring** workspace of the console, this state displays as *Link is being configured*. + +### Early update ring + + + + + + + +As of December 16 , 2024, version 2409 is globally available for all customers to install. If you previously opted in to the early update ring, watch for an update to this current branch version. + +## Pre-update checklist + +### All sites run a supported version of Configuration Manager + +Each site server in the hierarchy must run the same version of Configuration Manager before you can start the installation. To update to version 2409, use version 2303 or later. + +### Review the status of your product licensing + +You need an active Software Assurance (SA) agreement or equivalent subscription rights to install this update. When you update the site, the **Licensing** page presents the option to confirm your **Software Assurance expiration date**. + +This value is optional. You can specify as a convenient reminder of your license expiration date. This date is visible when you install future updates. You might have previously specified this value during setup or installation of an update. You can also specify this value in the Configuration Manager console. In the **Administration** workspace, expand **Site Configuration**, and select **Sites**. Select **Hierarchy Settings** in the ribbon, and switch to the **Licensing** tab. + +For more information, see [Licensing and branches](../../understand/learn-more-editions.md). + +### Review Microsoft .NET versions + +Configuration Manager now requires Microsoft .NET Framework version 4.6.2 for site servers, specific site systems, clients, and the console. Before you run setup to install or update the site, first update .NET and restart the system. If possible in your environment, install the latest version of .NET version 4.8. + +This installation can put the site system server into a reboot pending state and report errors to the Configuration Manager component status viewer. .NET applications on the server might experience random failures until you restart the server. + +For more information including how to manage restarts, see [Site and site system prerequisites](../../plan-design/configs/site-and-site-system-prerequisites.md#net-version-requirements). + +### Review the version of the Windows ADK + +The version of the Windows Assessment and Deployment Kit (ADK) should be supported for Configuration Manager version 2409. For more information, see [Support for the Windows ADK](../../plan-design/configs/support-for-windows-adk.md). If you need to update the Windows ADK, do so before you begin the update of Configuration Manager. This order makes sure the default boot images are automatically updated to the latest version of Windows PE. Manually update any custom boot images after updating the site. + +If you update the site before you update the Windows ADK, see [Update distribution points with the boot image](../../../osd/get-started/manage-boot-images.md#update-distribution-points-with-the-boot-image). + +### Review SQL Server Native Client version + +Install a minimum version of SQL Server 2012 Native Client, which includes support for TLS 1.2. For more information, see the [List of prerequisite checks](../deploy/install/list-of-prerequisite-checks.md#sql-server-native-client). + +### Review SQL ODBC driver for CM + +Starting with version 2309 and later, Configuration Manager requires the installation of the ODBC driver for SQL server as a prerequisite. This prerequisite is required when you create a new site or update an existing one. + +### Review the site and hierarchy status for unresolved issues + +A site update can fail because of existing operational problems. Before you update a site, resolve all operational issues for the following systems: + +- The site server +- The site database server +- Remote site system roles on other servers + +For more information, see [Use the status system](use-status-system.md). + +### Review file and data replication between sites + +Make sure that file and database replication between sites is operational and current. Delays or backlogs in either can prevent a successful update. + +#### Database replication + +For [database replication](../../plan-design/hierarchy/database-replication.md), to help resolve issues before you start the update, use the **Replication Link Analyzer** (RLA). For more information, see [Monitor database replication](monitor-replication.md). + +Use RLA to answer the following questions: + +- Is replication per group in a good state? +- Are any links degraded? +- Are there any errors? + +If there's a backlog, wait until it clears out. If the backlog is large, such as millions of records, then the link is in a bad state. Before updating the site, solve the replication issue. If you need further assistance, contact Microsoft Support. + +#### File-based replication + +For [file-based replication](../../plan-design/hierarchy/file-based-replication.md), check all inboxes for a backlog on both sending and receiving sites. If there are lots of stuck or pending replication jobs, wait until they clear out. + +- On the sending site, review **sender.log**. +- On the receiving site, review **despooler log**. + +### Install all applicable critical Windows updates + +Before you install an update for Configuration Manager, install any critical OS updates for each applicable site system. These servers include the site server, site database server, and remote site system roles. If an update that you install requires a restart, restart the applicable servers before you start the upgrade. + +### Disable database replicas for management points at primary sites + +Configuration Manager can't successfully update a primary site that has a database replica for management points enabled. Before you install an update for Configuration Manager, disable database replication. + +For more information, see [Database replicas for management points](../deploy/configure/database-replicas-for-management-points.md). + +### Set SQL Server Always On availability groups to manual failover + +If you use an availability group, make sure that the availability group is set to manual failover before you start the update installation. After the site has updated, you can restore failover to be automatic. For more information, see [Prepare to use an availability group](../deploy/configure/sql-server-alwayson-for-a-highly-available-site-database.md). + +### Disable site maintenance tasks at each site + +Before you install the update, disable any site maintenance task that might run during the time the update process is active. For example, but not limited to: + +- Backup Site Server +- Delete Aged Client Operations +- Delete Aged Discovery Data + +When a site database maintenance task runs during the update installation, the update installation can fail. Before you disable a task, record the schedule of the task so you can restore its configuration after the update has been installed. + +For more information, see [Maintenance tasks](maintenance-tasks.md) and [Reference for maintenance tasks](reference-for-maintenance-tasks.md). + +### Temporarily stop any antivirus software + +Before you update a site, stop antivirus software on the Configuration Manager servers. The antivirus software can lock some files that need to be updated which causes our update to fail. + +### Create a backup of the site database + +Before you update a site, back up the site database at the CAS and primary sites. This backup makes sure you have a successful backup to use for disaster recovery. + +For more information, see [Backup and recovery](backup-and-recovery.md). + +### Back up customized files + +If you or a third-party product customizes any Configuration Manager configuration files, save a copy of your customizations. + +For example, you add custom entries to the **osdinjection.xml** file in the `bin\X64` folder of your Configuration Manager installation directory. After you update Configuration Manager, these customizations don't persist. Reapply your customizations. + +### Review hardware inventory customizations + + + +If you changed the state of [hardware inventory classes in client settings](../../clients/manage/inventory/configure-hardware-inventory.md), when you update the site, some classes may revert to a default state. For example, if you disable the `SMS_Windows8Application` or `SMS_Windows8ApplicationUserInfo` classes, they're enabled after installing a Configuration Manager update. + +When you customize hardware inventory classes, note their configuration before you install the update. + +### Plan for client piloting + +When you install a site update that also updates the client, test that new client update in pre-production before you update all production clients. To use this option, configure your site to support automatic upgrades for pre-production before beginning installation of the update. + +For more information, see [Upgrade clients](../../clients/manage/upgrade/upgrade-clients.md) and [How to test client upgrades in a pre-production collection](../../clients/manage/upgrade/test-client-upgrades.md). + +> [!NOTE] +> When you update to version 2107 or later, clients with PKI certificates will recreate self-signed certificates, but don't reregister with the site. Clients without a PKI certificate will reregister with the site, which can cause extra processing at the site. Make sure that your process to update clients allows for randomization. If you simultaneously update lots of clients, it may cause a backlog on the site server. + +### Plan to use service windows + +To define a period during which updates to a site server can be installed, use service windows. They can help you control when sites in your hierarchy install the update. For more information, see [Service windows for site servers](service-windows.md). + +### Review supported extensions + + +If you extend Configuration Manager with other products from Microsoft, Microsoft partners, or third-party vendors, confirm that those products support and are compatible with version 2409. Check with the product vendor for this information. + +> [!TIP] +> If you develop a third-party add-on to Configuration Manager, you should test your add-on with every monthly [technical preview branch release](../../get-started/technical-preview.md). Regular testing helps confirm compatibility, and allows for early reporting of any issues with standard interfaces. + +### Disable any custom solutions + +If your site has any custom solutions based on the Configuration Manager SDK or PowerShell, disable this code before you update the site. Make sure to test this custom code in a lab environment to make sure it's compatible with the new version. + +> [!NOTE] +> Starting in version 2111, third-party add-ons that use Microsoft .NET Framework and rely on Configuration Manager libraries also need to use .NET 4.6.2 or later. For more information, see [External dependencies require .NET 4.6.2](../../../develop/core/changes/whats-new-sdk.md#external-dependencies-require-net-462). + +### Read the release notes + +Before you start the update, review the current release notes. With Configuration Manager, product release notes are limited to urgent issues. These issues aren't yet fixed in the product, or detailed in a Microsoft Support article. + +Feature-specific documentation may include information about known issues that affect core scenarios. + +For more information, see the [Release notes](../deploy/install/release-notes.md). + +## Install the update + +### Run the setup prerequisite checker + +When the console lists the update as **Available**, you can run the prerequisite checker before installing the update. (When you install the update on the site, prerequisite checker runs again.) + +To run a prerequisite check from the console, go to the **Administration** workspace, and select **Updates and Servicing**. Select the **Configuration Manager 2409** update package, and select **Run prerequisite check** in the ribbon. + +For more information, see the section to **Run the prerequisite checker before installing an update** in [Before you install an in-console update](prepare-in-console-updates.md#before-you-install-an-in-console-update). + +> [!IMPORTANT] +> When the prerequisite checker runs, the process updates some product source files that are used for site maintenance tasks. After running the prerequisite checker, but before installing the update, if you need to do a site maintenance task, run **Setupwpf.exe** (Configuration Manager Setup) from the CD.Latest folder on the site server. + +### Update sites + +You're now ready to start the update installation for your hierarchy. For more information about installing the update, see [Install in-console updates](install-in-console-updates.md). + +You may plan to install the update outside of normal business hours. Determine when the process will have the least effect on your business operations. Installing the update and its actions reinstall site components and site system roles. + +For more information, see [Updates for Configuration Manager](updates.md). + +## Post-update checklist + +After the site updates, use the following checklist to complete common tasks and configurations. + +### Confirm version and restart (if necessary) + +Make sure each site server and site system role is updated to version 2409. In the console, add the **Version** column to the **Sites** and **Distribution Points** nodes in the **Administration** workspace. When necessary, a site system role automatically reinstalls to update to the new version. + +Consider restarting remote site systems that don't successfully update at first. Review your site infrastructure and make sure that applicable site servers and remote site system servers successfully restarted. Typically, site servers restart only when Configuration Manager installs .NET as a prerequisite for a site system role. + +### Confirm site-to-site replication is active + +In the Configuration Manager console, go to the following locations to view the status, and make sure that replication is active: + +- **Monitoring** workspace, **Site Hierarchy** node + +- **Monitoring** workspace, **Database Replication** node + +For more information, see the following articles: + +- [Monitor hierarchy and replication infrastructure](monitor-hierarchy.md) +- [About the Replication Link Analyzer](monitor-replication.md#BKMK_RLA) + +### Update Configuration Manager consoles + +Update all remote Configuration Manager consoles to the same version. You're prompted to update the console when: + +- You open the console. + +- You go to a new node in the console. + +### Reconfigure database replicas for management points + +After you update a primary site, reconfigure the database replica for management points that you uninstalled before you updated the site. For more information, see [Database replicas for management points](../deploy/configure/database-replicas-for-management-points.md). + +### Reconfigure availability groups + +If you use an availability group, reset the failover configuration to automatic. For more information, see [Prepare to use an availability group](../deploy/configure/sql-server-alwayson-for-a-highly-available-site-database.md). + +### Reconfigure any disabled maintenance tasks + +If you disabled database [maintenance tasks](maintenance-tasks.md) at a site before installing the update, reconfigure those tasks. Use the same settings that were in place before the update. + +### Restore hardware inventory customizations + + + +If you changed the state of [hardware inventory classes in client settings](../../clients/manage/inventory/configure-hardware-inventory.md), when you update the site, some classes may revert to a default state. For example, if you disable the `SMS_Windows8Application` or `SMS_Windows8ApplicationUserInfo` classes, they're enabled after installing a Configuration Manager update. + +When you customize hardware inventory classes, review their configuration after you install the update to make sure they are configured as you intend. + + + + + + + +### Update clients + +Update clients per the plan you created, especially if you configured client piloting before installing the update. For more information, see [How to upgrade clients for Windows computers](../../clients/manage/upgrade/upgrade-clients-for-windows-computers.md). + +### Third-party extensions + +If you use any extensions to Configuration Manager, update them to the latest version to support Configuration Manager version 2409. + +### Update boot images and media + + + +Use the **Update Distribution Points** action for any boot image that you use, whether it's a default or custom boot image. This action makes sure that clients can use the latest version. Even if there isn't a new version of the Windows ADK, the Configuration Manager client components may change with an update. If you don't update boot images and media, task sequence deployments may fail on devices. + +When you update the site, Configuration Manager automatically updates the *default* boot images. It doesn't automatically distribute the updated content to distribution points. Use the **Update Distribution Points** action on specific boot images when you're ready to distribute this content across your network. + +> [!NOTE] +> For default boot images, the site always uses the current version of the Configuration Manager client that matches the site's version. Even if you configure automatic client upgrades to use a [pre-production collection](../../clients/manage/upgrade/test-client-upgrades.md), that feature doesn't apply to boot images. + +After updating the site, manually update any *custom* boot images. This action updates the boot image with the latest client components if necessary, optionally reloads it with the current Windows PE version, and redistributes the content to the distribution points. + +For more information, see [Update distribution points with the boot image](../../../osd/get-started/manage-boot-images.md#update-distribution-points-with-the-boot-image). + +### Update PowerShell help content + +To get the latest information for the Configuration Manager PowerShell module, use the [Update-Help](/powershell/module/microsoft.powershell.core/update-help) cmdlet. Run this cmdlet on all computers with the Configuration Manager console. This help content is the same as what's published for the [ConfigurationManager module](/powershell/module/configurationmanager/). + +For more information, see [Configuration Manager PowerShell cmdlets: Update help](/powershell/sccm/overview#update-help). + +## Next steps + +Review the [release notes](../deploy/install/release-notes.md). This article can be updated regularly, especially right after a new current branch release. You can use RSS to be notified when this page is updated. For more information, see [How to use the docs](../../../../use-docs.md#notifications). diff --git a/memdocs/configmgr/core/servers/manage/community-hub.md b/memdocs/configmgr/core/servers/manage/community-hub.md index 5770ebea921..20558ebfd10 100644 --- a/memdocs/configmgr/core/servers/manage/community-hub.md +++ b/memdocs/configmgr/core/servers/manage/community-hub.md @@ -190,7 +190,7 @@ If you delete a downloaded report from the **Monitoring** > **Reports** node, th When single sign on with multifactor authentication is used, you may not be able to sign in for the following features when using Configuration Manager 2103 and earlier: - Community hub - Community hub from CMPivot -- Custom tabs in Software Center that load a website that's subject to conditional access policies +- Custom tabs in Software Center that load a website that's subject to Conditional Access policies ## Next steps diff --git a/memdocs/configmgr/core/servers/manage/install-in-console-updates.md b/memdocs/configmgr/core/servers/manage/install-in-console-updates.md index 45eeac9f70d..989e3b617dd 100644 --- a/memdocs/configmgr/core/servers/manage/install-in-console-updates.md +++ b/memdocs/configmgr/core/servers/manage/install-in-console-updates.md @@ -2,12 +2,12 @@ title: In-console updates titleSuffix: Configuration Manager description: Install updates to Configuration Manager from the Microsoft cloud. -ms.date: 08/08/2021 +ms.date: 12/04/2024 ms.subservice: core-infra ms.service: configuration-manager ms.topic: how-to -author: banreet -ms.author: banreetkaur +author: Baladelli +ms.author: Baladell manager: apoorvseth ms.localizationpriority: medium ms.collection: tier3 @@ -143,7 +143,7 @@ Update the console right away after the site updates. After the console update completes, verify the console and site versions are correct. Go to **About Configuration Manager** at the top-left corner of the console. > [!NOTE] -> The console version is slightly different from the site version. The minor version of the console corresponds to the Configuration Manager release version. For example, in Configuration Manager version 1802 the initial site version is 5.0.8634.1000, and the initial console version is 5.**1802**.1082.1700. The build (1082) and revision (1700) numbers may change with future hotfixes. +> The console version is slightly different from the site version. The minor version of the console corresponds to the Configuration Manager release version. For example, in Configuration Manager version 2303 the initial site version is 5.0.9122.1000, and the initial console version is 5.**9122**.1082.1700. The build (1082) and revision (1700) numbers may change with future hotfixes. ## Next steps diff --git a/memdocs/configmgr/core/servers/manage/modify-your-infrastructure.md b/memdocs/configmgr/core/servers/manage/modify-your-infrastructure.md index 28fdf953346..1237771cac7 100644 --- a/memdocs/configmgr/core/servers/manage/modify-your-infrastructure.md +++ b/memdocs/configmgr/core/servers/manage/modify-your-infrastructure.md @@ -79,7 +79,7 @@ For example, you install the Configuration Manager console from a site server th Each time the Configuration Manager console opens: -- Tt determines the configured language settings for the computer +- It determines the configured language settings for the computer - Verifies whether an associated language pack is available for the Configuration Manager console - Opens the console by using the appropriate language pack @@ -381,4 +381,4 @@ You can modify these values or disable alerts for each site: You may need to uninstall a Configuration Manager site system role, site, or hierarchy. For more information, see [Uninstall roles, sites, and hierarchies](../deploy/install/uninstall-sites-and-hierarchies.md). -Starting in version 2002, you can also remove the CAS from a hierarchy, but keep the primary site. For more information, see [Remove the CAS](../deploy/install/remove-central-administration-site.md). \ No newline at end of file +Starting in version 2002, you can also remove the CAS from a hierarchy, but keep the primary site. For more information, see [Remove the CAS](../deploy/install/remove-central-administration-site.md). diff --git a/memdocs/configmgr/core/servers/manage/optional-features.md b/memdocs/configmgr/core/servers/manage/optional-features.md index ce325dea775..4a3466eaa9c 100644 --- a/memdocs/configmgr/core/servers/manage/optional-features.md +++ b/memdocs/configmgr/core/servers/manage/optional-features.md @@ -2,7 +2,7 @@ title: Optional features titleSuffix: Configuration Manager description: Updates to Configuration Manager include optional features, which you have to enable before use. -ms.date: 03/28/2024 +ms.date: 12/04/2024 ms.subservice: core-infra ms.service: configuration-manager ms.topic: conceptual diff --git a/memdocs/configmgr/core/servers/manage/post-in-console-updates.md b/memdocs/configmgr/core/servers/manage/post-in-console-updates.md index f6e71bc8ee1..a878f59ed46 100644 --- a/memdocs/configmgr/core/servers/manage/post-in-console-updates.md +++ b/memdocs/configmgr/core/servers/manage/post-in-console-updates.md @@ -2,13 +2,13 @@ title: After the site updates titleSuffix: Configuration Manager description: Learn what to do after the Configuration Manager site installs an in-console update. -ms.date: 03/28/2023 +ms.date: 12/04/2024 ms.subservice: core-infra ms.service: configuration-manager ms.topic: how-to -author: banreet -ms.author: banreetkaur -manager: sunitashaw +author: Baladelli +ms.author: Baladell +manager: apoorvseth ms.localizationpriority: medium ms.collection: tier3 @@ -158,16 +158,13 @@ To report upgrade failures to Microsoft: After the site updates, review the post-update checklist for the applicable version: -- [Post-update checklist for version 2309](checklist-for-installing-update-2309.md#post-update-checklist) - -- [Post-update checklist for version 2303](checklist-for-installing-update-2303.md#post-update-checklist) +- [Post-update checklist for version 2409](checklist-for-installing-update-2409.md#post-update-checklist) -- [Post-update checklist for version 2211](checklist-for-installing-update-2211.md#post-update-checklist) +- [Post-update checklist for version 2403](checklist-for-installing-update-2403.md#post-update-checklist) -- [Post-update checklist for version 2207](checklist-for-installing-update-2207.md#post-update-checklist) - -- [Post-update checklist for version 2203](checklist-for-installing-update-2203.md#post-update-checklist) +- [Post-update checklist for version 2309](checklist-for-installing-update-2309.md#post-update-checklist) +- [Post-update checklist for version 2303](checklist-for-installing-update-2303.md#post-update-checklist) ## Next steps diff --git a/memdocs/configmgr/core/servers/manage/prepare-in-console-updates.md b/memdocs/configmgr/core/servers/manage/prepare-in-console-updates.md index 0803098e0bf..5a1d3f593a3 100644 --- a/memdocs/configmgr/core/servers/manage/prepare-in-console-updates.md +++ b/memdocs/configmgr/core/servers/manage/prepare-in-console-updates.md @@ -2,12 +2,12 @@ title: Prepare for in-console updates titleSuffix: Configuration Manager description: Prepare to install updates to Configuration Manager from the Microsoft cloud -ms.date: 04/01/2024 +ms.date: 12/04/2024 ms.subservice: core-infra ms.service: configuration-manager ms.topic: how-to -author: gowdhamankarthikeyan -ms.author: gokarthi +author: Baladelli +ms.author: Baladell manager: apoorvseth ms.localizationpriority: medium ms.collection: tier3 @@ -93,16 +93,14 @@ Review the following steps before you install an update from within the Configur Review the applicable update checklist for actions to take before you start the update: +- [Checklist for installing update 2409](checklist-for-installing-update-2409.md) + - [Checklist for installing update 2403](checklist-for-installing-update-2403.md) - [Checklist for installing update 2309](checklist-for-installing-update-2309.md) - [Checklist for installing update 2303](checklist-for-installing-update-2303.md) -- [Checklist for installing update 2211](checklist-for-installing-update-2211.md) - -- [Checklist for installing update 2207](checklist-for-installing-update-2207.md) - ### Step 2: Run the prerequisite checker before installing an update Before you install an update, run the prerequisite checks for that update. If you run the checks before installing an update: diff --git a/memdocs/configmgr/core/servers/manage/updates.md b/memdocs/configmgr/core/servers/manage/updates.md index 1c1dd2d2e12..d6129c74980 100644 --- a/memdocs/configmgr/core/servers/manage/updates.md +++ b/memdocs/configmgr/core/servers/manage/updates.md @@ -2,12 +2,12 @@ title: Updates and servicing titleSuffix: Configuration Manager description: Learn about the in-console service method called Updates and Servicing that makes it easy to locate and install recommended updates. -ms.date: 04/22/2024 +ms.date: 12/04/2024 ms.subservice: core-infra ms.service: configuration-manager ms.topic: conceptual -author: PalikaSingh -ms.author: Palsi +author: Baladelli +ms.author: Baladell manager: apoorvseth ms.localizationpriority: medium ms.collection: tier3 @@ -27,8 +27,6 @@ Configuration Manager uses an in-console service method called **Updates and Ser Use the latest baseline version when you install a new site in a new hierarchy. -- Also use a baseline version to upgrade from System Center 2012 Configuration Manager. - - After upgrading to Configuration Manager current branch, don't use baseline versions to stay current. Instead, only use [in-console updates](install-in-console-updates.md) to update to the newest version. - Periodically, another baseline version is released. When you use the latest baseline version to install a new hierarchy, you avoid installing an outdated or unsupported version of Configuration Manager, followed by another update to your infrastructure. @@ -45,7 +43,7 @@ When you install an update, the update stores installation files for that versio - Use the files in the CD. Latest folder during site recovery. Also, when your hierarchy no longer runs a baseline version, use these files to install other sites. -- You can't use installation files from CD. Latest to install the first site of a new hierarchy, or to upgrade a site from System Center 2012 Configuration Manager. +- You can't use installation files from CD. Latest to install the first site of a new hierarchy. ### Version details @@ -57,11 +55,12 @@ The following supported versions`*`, of Configuration Manager are cur | Version | Availability date | [Support end date](current-branch-versions-supported.md) | Baseline | In-console update | |-------------|-----------|------------|--------------|------------------------| +| [**2409**](../../plan-design/changes/whats-new-in-version-2409.md)
(5.00.9132) | December 4, 2024 | June 4, 2026 | No | Yes | | [**2403**](../../plan-design/changes/whats-new-in-version-2403.md)
(5.00.9128) | April 22, 2024 | October 22, 2025 | Yes[Note 1](#bkmk_note1) | Yes | | [**2309**](../../plan-design/changes/whats-new-in-version-2309.md)
(5.00.9122) | October 9, 2023 | April 9, 2025 | No | Yes | > [!NOTE] -> The **Availability date** in this table is when the [early update ring](checklist-for-installing-update-2403.md#early-update-ring) was released. Baseline media will be available on the VLSC soon after the update is globally available. +> The **Availability date** in this table is when the [early update ring](checklist-for-installing-update-2409.md#early-update-ring) was released. Baseline media will be available on the VLSC soon after the update is globally available. ##### Note 1: How to get baseline media @@ -86,8 +85,11 @@ The following table lists historical versions of Configuration Manager current b | Version | Availability date | Support end date | Baseline | In-console update | |----------------------------------|-------------------|--------------------|----------|-------------------| +| **2409**
(5.00.9132) | December 4, 2024 | June 4, 2026 | No | Yes | +| **2403**
(5.00.9128) | April 22, 2024 | October 22, 2025 | Yes | Yes | +| **2309**
(5.00.9122) | October 9, 2023 | April 9, 2025 | No | Yes | | **2303**
(5.00.9106) | April 10, 2023 | October 10, 2024 | Yes | Yes | -| **2211**
(5.00.9096) | December 5, 2022 | June 5, 2024 | No | Yes | +| **2211**
(5.00.9096) | December 5, 2022 | June 5, 2024 | No | Yes | | **2207**
(5.00.9088) | August 12, 2022 | February 12, 2024 | No | Yes | | **2203**
(5.00.9078) | April 6, 2022 | October 6, 2023 | Yes | Yes | | **2111**
(5.00.9068) | December 1, 2021 | June 1, 2023 | No | Yes | @@ -116,7 +118,7 @@ The following table lists historical versions of Configuration Manager current b To check the version of your Configuration Manager site, in the console go to **About Configuration Manager** at the top-left corner of the console. This dialog displays the site and console versions. > [!NOTE] -> The console version is slightly different from the site version. The minor version of the console corresponds to the Configuration Manager release version. For example, in Configuration Manager version 1802 the initial site version is 5.0.8634.1000, and the initial console version is 5.**1802**.1082.1700. The build (1082) and revision (1700) numbers may change with future hotfixes. +> The console version is slightly different from the site version. The minor version of the console corresponds to the Configuration Manager release version. For example, in Configuration Manager version 2303 the initial site version is 5.0.9122.1000, and the initial console version is 5.**9122**.1082.1700. The build (1082) and revision (1700) numbers may change with future hotfixes. ## In-console updates and servicing @@ -124,7 +126,7 @@ When you use a production-ready installation of Configuration Manager current br These updates include: -- New versions, like version 2207, 2211, or 2303. +- New versions, like version 2303, 2309, or 2403. - Updates that include new features for your current version. diff --git a/memdocs/configmgr/core/servers/manage/upgrade-on-premises-infrastructure.md b/memdocs/configmgr/core/servers/manage/upgrade-on-premises-infrastructure.md index 7fe4cd60d91..23b5a7f973d 100644 --- a/memdocs/configmgr/core/servers/manage/upgrade-on-premises-infrastructure.md +++ b/memdocs/configmgr/core/servers/manage/upgrade-on-premises-infrastructure.md @@ -2,7 +2,7 @@ title: Upgrade on-premises infrastructure titleSuffix: Configuration Manager description: Learn how to upgrade infrastructure, such as SQL Server and the OS of site systems. -ms.date: 04/04/2024 +ms.date: 12/19/2024 ms.subservice: core-infra ms.service: configuration-manager ms.topic: conceptual @@ -32,6 +32,8 @@ Configuration Manager supports the in-place upgrade of the server OS that hosts - In-place upgrade from: + - Windows Server 2022 to Windows Server 2025 + - Windows Server 2019 to Windows Server 2022 - Windows Server 2016 to Windows Server 2022 @@ -50,10 +52,12 @@ To upgrade a server, use the upgrade procedures provided by the OS you're upgrad - [Upgrade and conversion options for Windows Server 2016](/windows-server/get-started/supported-upgrade-paths) -### Upgrade to Windows Server 2016, 2019, or 2022 +### Upgrade to Windows Server 2016, 2019, 2022 or 2025 Use the steps in this section for any of the following upgrade scenarios: +- Upgrade either Windows Server 2019 or Windows Server 2022 to Windows Server 2025 + - Upgrade either Windows Server 2016 or Windows Server 2019 to Windows Server 2022 - Upgrade either Windows Server 2012 R2 or Windows Server 2016 to Windows Server 2019 diff --git a/memdocs/configmgr/core/support/cmtrace.md b/memdocs/configmgr/core/support/cmtrace.md index d22ec174ca8..c69dba3d3ad 100644 --- a/memdocs/configmgr/core/support/cmtrace.md +++ b/memdocs/configmgr/core/support/cmtrace.md @@ -2,12 +2,12 @@ title: CMTrace titleSuffix: Configuration Manager description: Learn about how to use the CMTrace tool to view log files for Configuration Manager. -ms.date: 08/02/2021 +ms.date: 12/04/2024 ms.subservice: core-infra ms.service: configuration-manager ms.topic: how-to -author: banreet -ms.author: banreetkaur +author: Baladelli +ms.author: Baladell manager: apoorvseth ms.localizationpriority: medium ms.collection: tier3 diff --git a/memdocs/configmgr/core/support/tools.md b/memdocs/configmgr/core/support/tools.md index 20dbf9c1c9f..d6d97100a1a 100644 --- a/memdocs/configmgr/core/support/tools.md +++ b/memdocs/configmgr/core/support/tools.md @@ -2,12 +2,12 @@ title: Configuration Manager Tools titleSuffix: Configuration Manager description: Learn about the tools to help you manage and troubleshoot your Configuration Manager infrastructure. -ms.date: 04/05/2021 +ms.date: 12/04/2024 ms.subservice: core-infra ms.service: configuration-manager ms.topic: overview -author: banreet -ms.author: banreetkaur +author: Baladelli +ms.author: baladell manager: apoorvseth ms.localizationpriority: medium ms.collection: diff --git a/memdocs/configmgr/core/understand/fundamentals-of-security.md b/memdocs/configmgr/core/understand/fundamentals-of-security.md index 17e78bb96a2..aff3337f7eb 100644 --- a/memdocs/configmgr/core/understand/fundamentals-of-security.md +++ b/memdocs/configmgr/core/understand/fundamentals-of-security.md @@ -10,7 +10,9 @@ author: banreet ms.author: banreetkaur manager: apoorvseth ms.localizationpriority: medium -ms.collection: tier3 +ms.collection: +- essentials-security +- tier3 ms.reviewer: mstewart,aaroncz --- diff --git a/memdocs/configmgr/core/understand/product-and-licensing-faq.yml b/memdocs/configmgr/core/understand/product-and-licensing-faq.yml index 9219524e8bc..34d14787d1f 100644 --- a/memdocs/configmgr/core/understand/product-and-licensing-faq.yml +++ b/memdocs/configmgr/core/understand/product-and-licensing-faq.yml @@ -3,12 +3,12 @@ metadata: title: Product and licensing FAQ titleSuffix: Configuration Manager description: Find answers for common product and license questions for Configuration Manager. - ms.date: 05/12/2022 + ms.date: 12/16/2024 ms.subservice: core-infra ms.service: configuration-manager ms.topic: faq - author: banreet - ms.author: banreetkaur + author: Baladelli + ms.author: baladell manager: apoorvseth ms.collection: highpri @@ -101,7 +101,7 @@ sections: |iOS, Android, macOS enrollment|No|Yes| |Autopilot|No|Yes| |Mobile Application Management (MAM)|No|Yes| - |Conditional access
(additional AADP1 required)|Yes|Yes| + |Conditional Access
(additional AADP1 required)|Yes|Yes| |Device profiles|Yes|Yes| |Software update management|Yes|Yes| |Inventory|Yes|Yes| @@ -117,7 +117,7 @@ sections: - [Windows Autopilot requirements](/windows/deployment/windows-autopilot/windows-autopilot-requirements) - [Tenant attach prerequisites](../../tenant-attach/prerequisites.md) - [Endpoint analytics licensing prerequisites](../../../analytics/overview.md#licensing-prerequisites) - - [Use conditional access with Intune](../../../intune/protect/conditional-access.md#ways-to-use-conditional-access-with-intune) + - [Use Conditional Access with Intune](../../../intune/protect/conditional-access.md#ways-to-use-conditional-access-with-intune) - [TeamViewer prerequisites](../../../intune/remote-actions/teamviewer-support.md#prerequisites) - question: | diff --git a/memdocs/configmgr/develop/adminservice/faq.yml b/memdocs/configmgr/develop/adminservice/faq.yml index 6eaf17ec33f..aeb39817816 100644 --- a/memdocs/configmgr/develop/adminservice/faq.yml +++ b/memdocs/configmgr/develop/adminservice/faq.yml @@ -55,7 +55,7 @@ sections: - Add additional security layers. For example, [Azure App Proxy](/azure/active-directory/manage-apps/application-proxy). - question: | - Can I use it with conditional access? + Can I use it with Conditional Access? answer: | Yes, and that configuration is easiest if you use [Azure App Proxy](/azure/active-directory/manage-apps/application-proxy). diff --git a/memdocs/configmgr/hotfix/2409/30195272.md b/memdocs/configmgr/hotfix/2409/30195272.md new file mode 100644 index 00000000000..79b34f153cd --- /dev/null +++ b/memdocs/configmgr/hotfix/2409/30195272.md @@ -0,0 +1,74 @@ +--- +title: Summary of changes in Configuration Manager current branch, version 2409 +titleSuffix: Configuration Manager +description: Article listing changes in Configuration Manager current branch, version 2409 +ms.date: 12/06/2024 +ms.subservice: core-infra +ms.service: configuration-manager +ms.topic: reference +ms.assetid: 99172ed9-86d3-40e5-be24-941fe2a538b1 +author: Baladelli +ms.author: baladell +manager: apoorvseth +ms.reviewer: mstewart,aaroncz +ms.collection: tier3 +--- + +# Summary of changes in Configuration Manager current branch, version 2409 + +*Applies to: Configuration Manager (current branch, version 2409)* + +## Summary of KB26186448 +Release version 2409 of Configuration Manager current branch contains fixes and feature improvements. +The "Issues that are fixed" list isn't inclusive of all changes. Instead, it highlights changes the product development team believes are most relevant to the broad Configuration Manager customer base. These changes were made in response to direct customer feedback about product issues and improvements. + +##### Notes +- Version 2409 is available as an in-console update that can be installed at the top-tier site in a hierarchy. +- The globally available version of 2409, released on November 18, 2024, also applies to environments that have the early update ring or Technology Adoption Program (TAP) builds. +- For installation information, see [Checklist for installing update 2409 for Configuration Manager](../../core/servers/manage/checklist-for-installing-update-2409.md). +- For more information about the changes that are included in version 2409, see [What's new in version 2409 of Configuration Manager current branch](../../core/plan-design/changes/whats-new-in-version-2409.md). +- This release contains all of the fixes summarized in the following article. + + KB [28204160](../../hotfix/2403/28204160.md): Update rollup for Microsoft Endpoint Configuration Manager current branch, version 2403 + + +## Issues that are fixed + +- Software metering doesn't run on Arm64 client devices. The client.msi.log file contains entries similar to the following. + ```text + Warning 25702. Failed to uninstall PrepDrvr.Sys for Software Metering Agent. + Component SMS Software Metering Agent is not running + Software Metering Manager Shutdown + ``` + + +- The Microsoft Entra app secret key renewal process is updated to keep expiration dates in line with recommended standards. + + +- The Cloud Services Manager component is updated to correctly log information about deployment instance status. + + +- Windows 10, version 22H2 displays incorrect information for the end of the support lifecycle. + + +- Content download fails when the client is using a cloud management gateway with boundary groups, and BranchCache is enabled. The DataTransferService.log contains the following error: + ```text + GetDirectoryList_HTTP Error sending DAV request. HTTP code 500, status 'Internal Server Error' + ``` + + +- The PXE Boot process fails after updating to Configuration Manager version 2403 in an untrusted domain. + + +- The CleanIISLogs task is updated on cloud management gateways to prevent virtual drives from running out of space. + + +## Hotfixes that are included in this update +- KB [28204160](../../hotfix/2403/28204160.md): Update rollup for Microsoft Endpoint Configuration Manager current branch, version 2403 +- KB [28290310](../../hotfix/2403/28290310.md): Cloud management gateway update for Configuration Manager 2403 +- KB [28458746](../../hotfix/2403/28458746.md): Software update management client fix for Microsoft Configuration Manager version 2403 +- KB [29166583](../../hotfix/2403/29166583.md): Management point security update for Configuration Manager 2403 + + + + diff --git a/memdocs/configmgr/hotfix/2409/30833053.md b/memdocs/configmgr/hotfix/2409/30833053.md new file mode 100644 index 00000000000..5512d1fff6c --- /dev/null +++ b/memdocs/configmgr/hotfix/2409/30833053.md @@ -0,0 +1,62 @@ +--- +title: CMG installation update for Microsoft Configuration Manager version 2409 +titleSuffix: Configuration Manager +description: Cloud management gateway installation update for Configuration Manager 2409 +ms.date: 01/24/2025 +ms.subservice: core-infra +ms.service: configuration-manager +ms.topic: reference +ms.assetid: dc2a2ea6-c742-41ed-a481-842b9f049b7f +author: bhuney +ms.author: brianhun +manager: dougeby +--- + +# Cloud management gateway installation update for Configuration Manager 2409 + +*Applies to: Configuration Manager (current branch, version 2409)* + +## Summary of KB30833053 + +New cloud management gateways (CMGs) fail to install after updating to Configuration Manager version 2409. The following error is recorded in the CloudMgr.log file: + ```text + ERROR: Exception occured for service : System.AggregateException: One or more errors occurred. + ---> Azure.RequestFailedException: At least one resource deployment operation failed. Please list deployment operations for details. Please see https://aka.ms/arm-deployment-operations for usage details.~~Status: 200 (OK)~~ErrorCode: DeploymentFailed~~~~Service request succeeded. Response content and headers are not included to avoid logging sensitive data. + ``` + +The Azure activity logs for Virtual Machine Scale Sets or the Resource group have more detail. + ```text + "statusMessage": "{\"status\":\"Failed\",\"error\":{\"code\":\"ResourceOperationFailure\",\"message\":\"The resource operation completed with terminal provisioning state 'Failed'.\",\"details\":[{\"code\":\"VMExtensionProvisioningError\",\"target\":\"0\",\"message\":\"VM has reported a failure when processing extension 'InstallCMG' (publisher 'Microsoft.Compute' and type 'CustomScriptExtension'). Error message: 'Command execution finished, but failed because it returned a non-zero exit code of: '1''. More information on troubleshooting is available at https://aka.ms/VMExtensionCSEWindowsTroubleshoot. \"}]}}" + ``` + +### Update information for Microsoft Configuration Manager current branch, version 2409 + +This update is available in the Updates and Servicing node of the Configuration Manager console for version 2409 environments. + +### Restart information + +This update doesn't require a computer restart or a [site reset](../../core/servers/manage/modify-your-infrastructure.md#bkmk_reset) after installation. + +### Additional installation information + +After you install this update on a primary site, preexisting secondary sites must be manually updated. To update a secondary site in the Configuration Manager console, select **Administration** > **Site Configuration** > **Sites** > **Recover Secondary Site**, and then select the secondary site. The primary site then reinstalls that secondary site by using the updated files. This reinstallation doesn't affect configurations and settings for the secondary site. The new, upgraded, and reinstalled secondary sites under that primary site automatically receive this update. + +Run the following SQL Server command on the site database to check whether the update version of a secondary site matches that of its parent primary site: + ```sql + select dbo.fnGetSecondarySiteCMUpdateStatus ('SiteCode_of_secondary_site') + ``` +If the value 1 is returned, the site is up to date, with all the hotfixes applied on its parent primary site. + +If the value 0 is returned, all the fixes that are applied to the primary site aren't installed for the secondary site. You should use the **Recover Secondary Site** option to update the secondary site. + +## Version information +- No versioned files are updated in this hotfix. + +## File information +File information is available in the downloadable [KB30833053_FileList.txt](https://aka.ms/KB30833053_FileList) text file. + +## Release history +- January 24, 2025: Initial hotfix release + +## References +[Updates and servicing for Configuration Manager](../../core/servers/manage/updates.md) \ No newline at end of file diff --git a/memdocs/configmgr/hotfix/TOC.yml b/memdocs/configmgr/hotfix/TOC.yml index d336c37b9b8..70c81bee1ae 100644 --- a/memdocs/configmgr/hotfix/TOC.yml +++ b/memdocs/configmgr/hotfix/TOC.yml @@ -1,6 +1,12 @@ items: - name: Hotfix documentation href: index.yml +- name: Version 2409 + items: + - name: KB 30195272 Summary of changes in 2409 + href: 2409/30195272.md + - name: KB 30833053 CMG installation update for 2409 + href: 2409/30833053.md - name: Version 2403 items: - name: KB 26186448 Summary of changes in 2403 diff --git a/memdocs/configmgr/hotfix/index.yml b/memdocs/configmgr/hotfix/index.yml index 83c8cec84d8..effe87c4d6a 100644 --- a/memdocs/configmgr/hotfix/index.yml +++ b/memdocs/configmgr/hotfix/index.yml @@ -17,6 +17,14 @@ metadata: ms.localizationpriority: high landingContent: + - title: Configuration Manager 2409 + linkLists: + - linkListType: overview + links: + - text: KB 30195272 Summary of changes in 2409 + url: 2409/30195272.md + - text: KB 30833053 CMG installation update for 2409 + url: 2409/30833053.md - title: Configuration Manager 2403 linkLists: - linkListType: overview diff --git a/memdocs/configmgr/mdm/understand/what-happened-to-hybrid.md b/memdocs/configmgr/mdm/understand/what-happened-to-hybrid.md index 11f5aaf8d30..c4b137f6edf 100644 --- a/memdocs/configmgr/mdm/understand/what-happened-to-hybrid.md +++ b/memdocs/configmgr/mdm/understand/what-happened-to-hybrid.md @@ -56,14 +56,14 @@ The following note is the original deprecation announcement: > > - The on-premises MDM feature in Configuration Manager isn't deprecated. Starting in Configuration Manager version 1810, you can use on-premises MDM without an Intune connection. For more information, see [An Intune connection is no longer required for new on-premises MDM deployments](../../core/plan-design/changes/whats-new-in-version-1810.md#bkmk_opmdm). > -> - The on-premises conditional access feature of Configuration Manager is also deprecated with hybrid MDM. If you use conditional access on devices managed with the Configuration Manager client, make sure they are protected before you migrate. -> 1. Set up conditional access policies in Azure +> - The on-premises Conditional Access feature of Configuration Manager is also deprecated with hybrid MDM. If you use Conditional Access on devices managed with the Configuration Manager client, make sure they are protected before you migrate. +> 1. Set up Conditional Access policies in Azure > 2. Set up compliance policies in Intune portal > 3. Finish hybrid migration, and set the MDM authority to Intune > 4. Enable co-management > 5. Move the compliance policies co-management workload to Intune > -> For more information, see [Conditional access with co-management](../../comanage/quickstart-conditional-access.md). +> For more information, see [Conditional Access with co-management](../../comanage/quickstart-conditional-access.md). > > **What do I need to do to prepare for this change?** > diff --git a/memdocs/configmgr/mdt/release-notes.md b/memdocs/configmgr/mdt/release-notes.md index 1ea785b76f5..39a75ca3f18 100644 --- a/memdocs/configmgr/mdt/release-notes.md +++ b/memdocs/configmgr/mdt/release-notes.md @@ -58,17 +58,12 @@ The following OS versions are supported for deployment with this build of MDT: - Windows 10, version 1803 - Windows 10, version 1709 - Other [supported versions](/windows/release-information/) of Windows 10 -- Windows 8.1 -- Windows 7 - Windows Server 2019 - Windows Server 2016 -- Windows Server 2012 R2 -- Windows Server 2012 -- Windows Server 2008 R2 > [!NOTE] > -> MDT doesn't support Windows 10 ARM64 devices, Windows 11 and Windows Server 2022 operating systems. +> MDT doesn't support Windows 10 ARM64 devices or any Windows versions released after those listed above. FAQ: [Is this release only supported with Windows 10, Windows ADK, or Configuration Manager version *X*?](./faq.yml#what-s-the-mdt-support-life-cycle-) diff --git a/memdocs/configmgr/osd/deploy-use/upgrade-windows-to-the-latest-version.md b/memdocs/configmgr/osd/deploy-use/upgrade-windows-to-the-latest-version.md index efa9d535a43..eba9339f946 100644 --- a/memdocs/configmgr/osd/deploy-use/upgrade-windows-to-the-latest-version.md +++ b/memdocs/configmgr/osd/deploy-use/upgrade-windows-to-the-latest-version.md @@ -2,7 +2,7 @@ title: Windows in-place upgrade titleSuffix: Configuration Manager description: Learn how to use Configuration Manager to upgrade Windows to a later version. -ms.date: 06/14/2024 +ms.date: 12/19/2024 ms.service: configuration-manager ms.subservice: osd ms.topic: conceptual @@ -44,6 +44,7 @@ Only create OS upgrade packages to upgrade to the following OS versions: - Windows Server 2016 - Windows Server 2019 - Windows Server 2022 +- - Windows Server 2025 ### Original version @@ -67,6 +68,7 @@ For more information, see [Windows client upgrade paths](/windows/deployment/upg - An earlier version of Windows Server 2016 - An earlier version of Windows Server 2019 - An earlier version of Windows Server 2022 +- An earlier version of Windows Server 2025 For more information about Windows Server supported upgrade paths, see [Windows Server 2016 supported upgrade paths](/windows-server/get-started/supported-upgrade-paths#upgrading-previous-retail-versions-of-windows-server-to-windows-server-2016) and [Windows Server Upgrade Center](/windows-server/upgrade/upgrade-overview). diff --git a/memdocs/configmgr/osd/deploy-use/use-pxe-to-deploy-windows-over-the-network.md b/memdocs/configmgr/osd/deploy-use/use-pxe-to-deploy-windows-over-the-network.md index f72506c658e..53985ba52c7 100644 --- a/memdocs/configmgr/osd/deploy-use/use-pxe-to-deploy-windows-over-the-network.md +++ b/memdocs/configmgr/osd/deploy-use/use-pxe-to-deploy-windows-over-the-network.md @@ -43,7 +43,7 @@ To deploy operating systems to Configuration Manager clients that make PXE boot > [!NOTE] > When you configure a single PXE-enabled distribution point to support multiple subnets, it's not supported to use DHCP options. To allow the network to forward client PXE requests to PXE-enabled distribution points, configure IP helpers on the routers. -When you enable a PXE responder on a distribution point without Windows Deployment Service, it can be on the same server as the DHCP service. Add the following settings to support this configuration: +When you enable a PXE responder on a distribution point without Windows Deployment Service, it can be on the same server as the DHCP service. When the PXE responder and DHCP are on the same server, add the following settings to support this configuration: - Set the DWord value **DoNotListenOnDhcpPort** to `1` in the following registry key: `HKLM\Software\Microsoft\SMS\DP`. - Set DHCP option 60 to `PXEClient`. diff --git a/memdocs/configmgr/protect/deploy-use/defender-advanced-threat-protection.md b/memdocs/configmgr/protect/deploy-use/defender-advanced-threat-protection.md index d5f7d55d351..d33e3a47445 100644 --- a/memdocs/configmgr/protect/deploy-use/defender-advanced-threat-protection.md +++ b/memdocs/configmgr/protect/deploy-use/defender-advanced-threat-protection.md @@ -2,7 +2,7 @@ title: Microsoft Defender for Endpoint titleSuffix: Configuration Manager description: Learn how to manage and monitor Microsoft Defender for Endpoint, a new service that helps enterprises respond to advanced attacks. -ms.date: 08/01/2023 +ms.date: 12/16/2024 ms.service: configuration-manager ms.subservice: protect ms.topic: conceptual @@ -35,12 +35,12 @@ You can onboard the following operating systems using Configuration Manager: - Windows 11 - Windows 10, version 1709 or newer -- Windows 8.1 +- Windows Server 2025 - Windows Server 2022 - Windows Server 2019 - Windows Server Semi-Annual Channel (SAC), version 1803 or newer - Windows Server 2016 -- Windows Server 2012 R2 + > [!IMPORTANT] > Operating systems that have reached the end of their [product lifecycle](/lifecycle/faq/general-lifecycle) aren't typically supported for onboarding unless they have been enrolled into the [Extended Security Updates (ESU program)](/lifecycle/faq/extended-security-updates). For more information about supported operating systems and capabilities with Microsoft Defender for Endpoint, see [Minimum requirements for Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/minimum-requirements#supported-windows-versions). @@ -63,14 +63,11 @@ Up-level operating systems include: - Windows Server Semi-Annual Channel (SAC), version 1803 or later - Windows Server 2019 - Windows Server 2022 +- Windows Server 2025 Down-level operating systems that support MDE Client include: -- Windows Server 2012 R2 - Windows Server 2016 -Down-level operating systems that require MMA Agent: -- Windows 8.1 - > [!NOTE] > Currently, the [modern, unified Microsoft Defender for Endpoint for Windows Server 2012 R2 & 2016](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/defending-windows-server-2012-r2-and-2016/bc-p/2904464) is generally available. Configuration Manager version 2107 with the update rollup supports configuration using Endpoint Protection policies, including those policies created in the Microsoft Intune admin center using tenant attach. Configuration Manager version 2207 now supports automatic deployment of MDE Client, if you choose to use through Client Settings. For older supported versions, see [Server migration scenarios](/microsoft-365/security/defender-endpoint/server-migration). @@ -91,9 +88,9 @@ Up-level clients require an onboarding configuration file for onboarding to Micr - Windows Server Semi-Annual Channel (SAC), version 1803 and later - Windows Server 2019 - Windows Server 2022 +- Windows Server 2025 Down-level operating systems that support MDE Client include: -- Windows Server 2012 R2 - Windows Server 2016 #### Prerequisites diff --git a/memdocs/configmgr/protect/deploy-use/endpoint-protection-client-faq.yml b/memdocs/configmgr/protect/deploy-use/endpoint-protection-client-faq.yml index 4d7bab8ed49..090f03a43d9 100644 --- a/memdocs/configmgr/protect/deploy-use/endpoint-protection-client-faq.yml +++ b/memdocs/configmgr/protect/deploy-use/endpoint-protection-client-faq.yml @@ -24,26 +24,26 @@ sections: - question: | Why do I need antivirus and antispyware software? answer: | - It is critical to make sure that your computer is running software that protects against malicious software. Malicious software, which includes viruses, spyware, or other potentially unwanted software can try to install itself on your computer any time you connect to the Internet. It can also infect your computer when you install a program using a CD, DVD, or other removable media. Malicious software, can also be programmed to run at unexpected times, not just when it is installed. + It's critical to make sure that your computer is running software that protects against malicious software. Malicious software, which includes viruses, spyware, or other potentially unwanted software can try to install itself on your computer anytime you connect to the Internet. It can also infect your computer when you install a program using a CD, DVD, or other removable media. Malicious software can also be programmed to run at unexpected times, not just when it's installed. Windows Defender or Endpoint Protection offers three ways to help keep malicious software from infecting your computer: - - **Using real-time protection** - Real-time protection enables Windows Defender to monitor your computer all the time and alert you when malicious software, including viruses, spyware, or other potentially unwanted software attempts to install itself or run on your computer. Windows Defender then suspends the software and enables you to you to follow its recommendation on the software or take an alternative action. + - **Using real-time protection** - Real-time protection enables Windows Defender to monitor your computer all the time and alert you when malicious software, including viruses, spyware, or other potentially unwanted software attempts to install itself or run on your computer. Windows Defender then suspends the software and enables you to follow its recommendation on the software or take an alternative action. - **Scanning options** - You can use Windows Defender to scan for potential threats, such as viruses, spyware, and other malicious software that might put your computer at risk. You can also use it to schedule scans on a regular basis and to remove malicious software that is detected during a scan. - - **Microsoft Active Protection Service community** - The online Microsoft Active Protection Service community helps you see how other people respond to software that has not yet been classified for risks. You can use this information to help you choose whether to allow this software on your computer. In turn, if you participate, your choices are added to the community ratings to help other people decide what to do. + - **Microsoft Active Protection Service community** - The online Microsoft Active Protection Service community helps you see how other people respond to software that hasn't yet been classified for risks. You can use this information to help you choose whether to allow this software on your computer. In turn, if you participate, your choices are added to the community ratings to help other people decide what to do. - question: | How can I tell if my computer is infected with malicious software? answer: | You might have some form of malicious software, including viruses, spyware, or other potentially unwanted software, on your computer if: - - You notice new toolbars, links, or favorites that you did not intentionally add to your Web browser. + - You notice new toolbars, links, or favorites that you didn't intentionally add to your Web browser. - Your home page, mouse pointer, or search program changes unexpectedly. - - You type the address for a specific site, such as a search engine, but you are taken to a different Web site without notice. + - You type the address for a specific site, such as a search engine, but you're taken to a different Web site without notice. - Files are automatically deleted from your computer. @@ -65,7 +65,7 @@ sections: answer: | If Windows Defender detects malicious software or potentially unwanted software on your computer (either when monitoring your computer using real-time protection or after running a scan), it notifies you about the detected item by displaying a notification message in the bottom right-hand corner of your screen. - The notification message includes a **Clean computer** button and a **Show details** link that lets you view additional information about the detected item. Click the **Show details** link to open the **Potential threat details** window to get additional information about the detected item. You can now choose which action to apply to the item, or click **Clean computer**. If you need help determining which action to apply to the detected item, use the alert level that Windows Defender assigned to the item as your guide (for more information see, Understanding alert levels). + The notification message includes a **Clean computer** button and a **Show details** link that lets you view additional information about the detected item. Click the **Show details** link to open the **Potential threat details** window to get additional information about the detected item. You can now choose which action to apply to the item, or click **Clean computer**. If you need help with determining which action to apply to the detected item, use the alert level that Windows Defender assigned to the item as your guide (for more information see, Understanding alert levels). Alert levels help you choose how to respond to viruses, spyware, and other potentially unwanted software. While Windows Defender will recommend that you remove all viruses and spyware, not all software that is flagged is malicious or unwanted. The following information can help you decide what to do if Windows Defender detects potentially unwanted software on your computer. @@ -110,7 +110,7 @@ sections: answer: | Both viruses and spyware are installed on your computer without your knowledge and both have the potential to be intrusive and destructive. They also have the ability to capture information on your computer and damage or delete that information. They both can negatively affect your computer's performance. - The main differences between viruses and spyware is how they behave on your computer. Viruses, like living organisms, want to infect a computer, replicate, and then spread to as many other computers as possible. Spyware, however, is more like a mole - it wants to "move into" your computer and stay there as long as possible, sending valuable information about your computer to an outside source while it is there. + The main difference between viruses and spyware is how they behave on your computer. Viruses, like living organisms, want to infect a computer, replicate, and then spread to as many other computers as possible. Spyware, however, is more like a mole - it wants to "move into" your computer and stay there as long as possible, sending valuable information about your computer to an outside source while it's there. - question: | Where do viruses, spyware, and other potentially unwanted software come from? @@ -125,7 +125,7 @@ sections: - question: | Why is it important to review license agreements before installing software? answer: | - When you visit websites, do not automatically agree to download anything the site offers. If you download free software, such as file sharing programs or screen savers, read the license agreement carefully. Look for clauses that say that you must accept advertising and pop-ups from the company, or that the software will send certain information back to the software publisher. + When you visit websites, don't automatically agree to download anything the site offers. If you download free software, such as file sharing programs or screen savers, read the license agreement carefully. Look for clauses that say that you must accept advertising and pop-ups from the company, or that the software will send certain information back to the software publisher. - question: | Why doesn't Windows Defender detect cookies? @@ -145,12 +145,12 @@ sections: - If you receive an e-mail with an attachment and you're unsure of the source, then you should delete it immediately. Don't download any applications or files from unknown sources, and be careful when trading files with other users. - - Install and use a firewall. It is recommended that you enable Windows Firewall. + - Install and use a firewall. It's recommended that you enable Windows Firewall. - question: | What are virus and spyware definitions? answer: | - When you use Windows Defender or Endpoint Protection, it is important to have up-to-date virus and spyware definitions. Definitions are files that act like an ever-growing encyclopedia of potential software threats. Windows Defender or Endpoint Protection uses definitions to determine if software that it detects is a virus, spyware, or other potentially unwanted software, and then to alert you to potential risks. To help keep your definitions up to date, Windows Defender or Endpoint Protection works with Microsoft Update to install new definitions automatically as they are released. You can also set Windows Defender or Endpoint Protection to check online for updated definitions before scanning. + When you use Windows Defender or Endpoint Protection, it's important to have up-to-date virus and spyware definitions. Definitions are files that act like an ever-growing encyclopedia of potential software threats. Windows Defender or Endpoint Protection uses definitions to determine if software that it detects is a virus, spyware, or other potentially unwanted software, and then to alert you to potential risks. To help keep your definitions up to date, Windows Defender or Endpoint Protection works with Microsoft Update to install new definitions automatically as they're released. You can also set Windows Defender or Endpoint Protection to check online for updated definitions before scanning. - question: | How do I keep virus and spyware definitions up to date? @@ -236,12 +236,23 @@ sections: - Yellow indicates that your computer's status is "potentially unprotected." - Red indicates that your computer's status is "at risk." - + - question: | + Can you describe a little bit what protected, potentially protected or at risk means? + answer: | + + Depending whether Defender or another antivirus product is being used as primary provider, the general states above represented by a color show the overall assessment of the security state of the device. + In case of security level being satisfactory, a green label will be provided. + + The "potentially unprotected" state is mostly due to settings - not directly impacting detection - not being set to the recommended security level. For example, in Defender case, a quick scan didn't run in a while, or cloud protection is turned off. + In the case of another antivirus, those states are reported via Security Center and could be in basically the following categories - a scan is recommended, settings change is recommended or an update is recommended. + + The "at risk" status represents serious security issues, such as a malware detection, software out of date or antivirus not running at all. In the case of another Antivirus that could mean license has expired. + - question: | How to set up Windows Defender or Endpoint Protection alerts? answer: | - When Windows Defender is running on your computer, it automatically alerts you if it detects viruses, spyware, or other potentially unwanted software. You can also set Windows Defender to alert you if you run software that has not yet been analyzed, and you can choose to be alerted when software makes changes to your computer. + When Windows Defender is running on your computer, it automatically alerts you if it detects viruses, spyware, or other potentially unwanted software. You can also set Windows Defender to alert you if you run software that hasn't yet been analyzed, and you can choose to be alerted when software makes changes to your computer. ### To set up alerts diff --git a/memdocs/configmgr/protect/deploy-use/use-device-guard-with-configuration-manager.md b/memdocs/configmgr/protect/deploy-use/use-device-guard-with-configuration-manager.md index f3c4ce07522..c0754754156 100644 --- a/memdocs/configmgr/protect/deploy-use/use-device-guard-with-configuration-manager.md +++ b/memdocs/configmgr/protect/deploy-use/use-device-guard-with-configuration-manager.md @@ -2,7 +2,7 @@ title: Manage Windows Defender Application Control titleSuffix: Configuration Manager description: Learn how to use Configuration Manager to manage Windows Defender Application Control. -ms.date: 04/11/2022 +ms.date: 12/16/2024 ms.service: configuration-manager ms.subservice: protect ms.topic: how-to diff --git a/memdocs/configmgr/protect/plan-design/bitlocker-management.md b/memdocs/configmgr/protect/plan-design/bitlocker-management.md index ce6d16ddee9..295eec3bf9f 100644 --- a/memdocs/configmgr/protect/plan-design/bitlocker-management.md +++ b/memdocs/configmgr/protect/plan-design/bitlocker-management.md @@ -2,7 +2,7 @@ title: Plan for BitLocker management titleSuffix: Configuration Manager description: Plan for managing BitLocker Drive Encryption with Configuration Manager. -ms.date: 04/08/2022 +ms.date: 12/04/2024 ms.service: configuration-manager ms.subservice: protect ms.topic: conceptual @@ -132,6 +132,8 @@ BitLocker management doesn't support all client types that are supported by Conf - BitLocker management isn't supported on virtual machines (VMs) or on server editions. For example, BitLocker management won't start the encryption on fixed drives of virtual machines. Additionally fixed drives in virtual machines may show as compliant even though they aren't encrypted. +- Starting in version 2409, Configuration Manager now supports BitLocker task sequence steps for ARM devices. In BitLocker Management, policies that include OS drive encryption with a TPM protector and Fixed drive encryption with the Auto-Unlock option are now compatible with ARM devices. + - In version 2010 and earlier, Microsoft Entra joined, workgroup clients, or clients in untrusted domains aren't supported. In these earlier versions of Configuration Manager, BitLocker management only supports devices that are joined to on-premises Active Directory including Microsoft Entra hybrid joined devices. This configuration is to authenticate with the recovery service to escrow keys. Starting in version 2103, Configuration Manager supports all client join types for BitLocker management. However, the client-side BitLocker user interface component is still only supported on Active Directory-joined and Microsoft Entra hybrid joined devices. diff --git a/memdocs/configmgr/sum/deploy-use/integrate-windows-update-for-business-windows-10.md b/memdocs/configmgr/sum/deploy-use/integrate-windows-update-for-business-windows-10.md index 7322ad9ed64..1fe4bbee870 100644 --- a/memdocs/configmgr/sum/deploy-use/integrate-windows-update-for-business-windows-10.md +++ b/memdocs/configmgr/sum/deploy-use/integrate-windows-update-for-business-windows-10.md @@ -35,7 +35,7 @@ Windows Update for Business (WUfB) allows you to keep Windows 10 or later device - Overall Endpoint Protection reporting for Defender based on update compliance status won't return accurate results because of the missing scan data. -- Configuration Manager won't be able to deploy Microsoft updates, such as Microsoft 365 Apps, IE, and Visual Studio to clients that are connected to WUfB to receive updates. +- Configuration Manager won't be able to deploy or report compliance on Microsoft app updates for clients configured to use WUfB to receive updates. This includes updates for Microsoft 365 Apps, Internet Explorer, Edge, and Visual Studio. - Configuration Manager can still deploy 3rd party updates that are published to WSUS and managed through Configuration Manager to clients that are connected to WUfB to receive updates. If you don't want any 3rd party updates to be installed on clients connecting to WUfB, then disable the client setting named [Enable software updates on clients](../../core/clients/deploy/about-client-settings.md#software-updates). diff --git a/memdocs/configmgr/sum/deploy-use/monitor-software-updates.md b/memdocs/configmgr/sum/deploy-use/monitor-software-updates.md index ca0b437137d..c389547d8e7 100644 --- a/memdocs/configmgr/sum/deploy-use/monitor-software-updates.md +++ b/memdocs/configmgr/sum/deploy-use/monitor-software-updates.md @@ -138,4 +138,4 @@ This report returns the deployment errors at the site and a count of computers t - [Log files for Software Updates](../../core/plan-design/hierarchy/log-files.md#BKMK_SU_NAPLog) -- [Software Updates management whitepaper](https://www.microsoft.com/download/confirmation.aspx?id=44578) +- [Software Updates management whitepaper](https://www.microsoft.com/download/details.aspx?id=44578) diff --git a/memdocs/configmgr/sum/deploy-use/third-party-software-updates.md b/memdocs/configmgr/sum/deploy-use/third-party-software-updates.md index a3a68244a22..14a7e2fd713 100644 --- a/memdocs/configmgr/sum/deploy-use/third-party-software-updates.md +++ b/memdocs/configmgr/sum/deploy-use/third-party-software-updates.md @@ -21,10 +21,6 @@ ms.collection: tier3 The **Third-Party Software Update Catalogs** node in the Configuration Manager console allows you to subscribe to third-party catalogs, publish their updates to your software update point (SUP), and then deploy them to clients. -> [!Note] -> - Microsoft does not test or verify third party update catalogs or their contents in any way. Before deploying you should verify that any updates downloaded from third party update catalogs are free from malicious software and verify them in a testing environment prior to deploying them in your environment. -> - In version 2006 and earlier, Configuration Manager doesn't enable this feature by default. Before using it, enable the optional feature **Enable third party update support on clients**. For more information, see [Enable optional features from updates](../../core/servers/manage/optional-features.md). - ## Prerequisites - Sufficient disk space on the top-level software update point's `WSUSContent` directory to store the source binary content for third-party software updates. @@ -193,7 +189,7 @@ You can edit an existing subscription by selecting **Properties** from the ribbo > Some options are only available for v3 third-party update catalogs, which support categories for updates. These options are disabled for catalogs that aren't published in the v3 format. 1. In the **Third-Party Software Update Catalogs** node, right-click on the catalog and select **Properties** or select **Properties** from the ribbon. -1. You can view the following information from the **General tab**, but not edit the information.: +1. You can view the following information from the **General tab**, but not edit the information: > [!NOTE] > If you need to change any of the information here, you have to add a new custom catalog. > Provided the download URL is unchanged, the existing catalog must be removed before one with the same download URL can be added. diff --git a/memdocs/configmgr/tenant-attach/device-sync-actions.md b/memdocs/configmgr/tenant-attach/device-sync-actions.md index 753eab26eaf..72c51cb4830 100644 --- a/memdocs/configmgr/tenant-attach/device-sync-actions.md +++ b/memdocs/configmgr/tenant-attach/device-sync-actions.md @@ -2,13 +2,13 @@ title: Enable Microsoft Intune tenant attach titleSuffix: Configuration Manager description: Upload your Configuration Manager devices to the cloud service and take actions from the admin center. -ms.date: 08/12/2022 +ms.date: 12/16/2024 ms.topic: conceptual ms.subservice: core-infra ms.service: configuration-manager manager: apoorvseth -author: gowdhamankarthikeyan -ms.author: gokarthi +author: Baladelli +ms.author: Baladell ms.localizationpriority: high ms.collection: tier3 --- diff --git a/memdocs/configmgr/tenant-attach/troubleshoot.md b/memdocs/configmgr/tenant-attach/troubleshoot.md index dbf29c88150..9b6bd2073b2 100644 --- a/memdocs/configmgr/tenant-attach/troubleshoot.md +++ b/memdocs/configmgr/tenant-attach/troubleshoot.md @@ -193,4 +193,4 @@ If a device is a distribution point that uses the same PKI certificate for both ## Next steps - [Troubleshoot ConfigMgr client details](troubleshoot-client-details.md) -- [Enable co-management](../comanage/overview.md) to get additional cloud-powered capabilities like conditional access. +- [Enable co-management](../comanage/overview.md) to get additional cloud-powered capabilities like Conditional Access. diff --git a/memdocs/get-support.md b/memdocs/get-support.md index ecf25b55895..f7bc382c67c 100644 --- a/memdocs/get-support.md +++ b/memdocs/get-support.md @@ -58,6 +58,13 @@ To access help and support in the admin center, you have some options: When you open **Help and support** this way, it's pinned at the side. You can select any other option and it stays pinned. +### Use Support Assistant to resolve issues + +The Support Assistant leverages AI to enhance your help and support experience, ensuring more efficient issue resolution. The Support Assistant is available in the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) by selecting **Troubleshoot + support** > **Help and Support**, or by selecting the question mark near your profile pic. + +> [!NOTE] +> You can enable and disable the Support Assistant by choosing to opt-in and opt-out at any time. + ### Choose the right support scenario In **Help and support**, select any available option to focus support on your scenario. You can only see tiles for the services that you have subscriptions to use. diff --git a/memdocs/intune/apps/android-deployment-scenarios-app-protection-work-profiles.md b/memdocs/intune/apps/android-deployment-scenarios-app-protection-work-profiles.md index 8e61348e8fe..0dafa9df2f2 100644 --- a/memdocs/intune/apps/android-deployment-scenarios-app-protection-work-profiles.md +++ b/memdocs/intune/apps/android-deployment-scenarios-app-protection-work-profiles.md @@ -8,7 +8,7 @@ keywords: author: Erikre ms.author: erikre manager: dougeby -ms.date: 12/12/2023 +ms.date: 11/21/2024 ms.topic: conceptual ms.service: microsoft-intune ms.subservice: apps diff --git a/memdocs/intune/apps/app-configuration-managed-home-screen-app.md b/memdocs/intune/apps/app-configuration-managed-home-screen-app.md index 9339cde7335..38e0c6850d6 100644 --- a/memdocs/intune/apps/app-configuration-managed-home-screen-app.md +++ b/memdocs/intune/apps/app-configuration-managed-home-screen-app.md @@ -8,7 +8,7 @@ keywords: author: Erikre ms.author: erikre manager: dougeby -ms.date: 08/12/2024 +ms.date: 01/08/2025 ms.topic: how-to ms.service: microsoft-intune ms.subservice: apps @@ -37,9 +37,11 @@ The Managed Home Screen is the application used for corporate-owned Android Ente ## When to configure the Microsoft Managed Home Screen app -First, ensure that your devices are supported. Intune supports the enrollment of Android Enterprise dedicated devices and fully managed devices running OS version 8.0 and above that reliably connect to Google Mobile Services. Similarly, Managed Home Screen supports Android devices running OS version 8.0 and above. + [!INCLUDE [android_device_administrator_support](../includes/android-device-administrator-support.md)] -Typically, if settings are available to you through device configuration profiles (**Devices** > **Manage devices** > **Configuration**), configure the settings there. Doing so will save you time, minimize errors, and will give you a better Intune-support experience. However, some of the Managed Home Screen settings are currently only available via the **App configuration policies** pane in the Intune admin center. Use this document to learn how to configure the different settings either using the configuration designer or a JSON script. Additionally, use this document to learn what Managed Home Screen settings are available using device configuration profiles. You may also see [Device settings](../configuration/device-restrictions-android-for-work.md#device-experience) for a full list of settings available in **Devices** > **Manage devices** > **Configuration** that impact the Managed Home Screen. +First, ensure that your devices are supported. Intune supports the enrollment of Android Enterprise dedicated devices and fully managed devices running OS version 8.0 and above. Similarly, Managed Home Screen supports Android devices running OS version 8.0 and above. + +Typically, if settings are available to you through device configuration profiles (**Devices** > **Manage devices** > **Configuration**), configure the settings there. Doing so saves you time, minimize errors, and gives you a better Intune-support experience. However, some of the Managed Home Screen settings are currently only available via the **App configuration policies** pane in the Intune admin center. Use this document to learn how to configure the different settings either using the configuration designer or a JSON script. Additionally, use this document to learn what Managed Home Screen settings are available using device configuration profiles. You may also see [Device settings](../configuration/device-restrictions-android-for-work.md#device-experience) for a full list of settings available in **Devices** > **Manage devices** > **Configuration** that impact the Managed Home Screen. If using App configuration, navigate to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) and select **Apps** > **App configuration policies**. Add a configuration policy for **Managed devices** running **Android** and choose **Managed Home Screen** as the associated app. Select **Configuration settings** to configure the different available Managed Home Screen settings. @@ -56,7 +58,7 @@ If you add properties with Configuration Designer, you can automatically convert ## Using Configuration Designer -Configuration designer allows you to select pre-populated settings and their associated values. +Configuration designer allows you to select prepopulated settings and their associated values. :::image type="content" alt-text="Screenshot of added configuration settings" source="./media/app-configuration-managed-home-screen-app/app-configuration-managed-home-screen-app_02.png"::: @@ -66,21 +68,21 @@ The following table lists the Managed Home Screen available configuration keys, | Configuration Key | Value Type | Default Value | Description | Available in device configuration profile | |-|-|-|-|-| -| Set allow-listed applications | bundleArray | See **Enter JSON Data** section of this document. | Allows you to define the set of apps visible on the home screen from amongst the apps installed on the device. You can define the apps by entering the app package name of the apps that you want visible. For example, `com.microsoft.emmx` would make settings accessible on the home screen. The apps that you allow-list in this section should already be installed on the device to be visible on the home screen. | ✔️ | +| Set allow-listed applications | bundleArray | See **Enter JSON Data** section of this document. | Allows you to define the set of apps visible on the home screen from among the apps installed on the device. You can define the apps by entering the app package name of the apps that you want visible. For example, `com.microsoft.emmx` would make settings accessible on the home screen. The apps that you allow-list in this section should already be installed on the device to be visible on the home screen. | ✔️ | | Set pinned web links | bundleArray | See **Enter JSON Data** section of this document. | Allows you to pin websites as quick launch icons on the home screen. With this configuration, you can define the URL and add it to the home screen for the end user to launch in the browser with a single tap. Note: We recommend that you create, assign, and approve Managed Google Play web links to your devices. When you do, they're treated like allow-listed applications. | ✔️ | -| Create Managed Folder for grouping apps | bundleArray | See **Enter JSON Data** section of this document. | Allows you to create and name folders and group apps within these folders. End users can't move folders, rename the folders, or move the apps within the folders. Folders will appear in the order created, and apps within the folders will appear alphabetically. Note: all apps that you want to group into folders must be assigned as required to the device and must have been added to the Managed Home Screen. | ✔️ | +| Create Managed Folder for grouping apps | bundleArray | See **Enter JSON Data** section of this document. | Allows you to create and name folders and group apps within these folders. End users can't move folders, rename the folders, or move the apps within the folders. Folders appear in the order created, and apps within the folders appear alphabetically. Note: all apps that you want to group into folders must be assigned as required to the device and must have been added to the Managed Home Screen. | ✔️ | | Set Grid Size | string | Auto | Allows you to set the grid size for apps to be positioned on the managed home screen. You can set the number of app rows and columns to define grid size in the following format: `columns;rows`. If you define the grid size, then the maximum number of apps that shown in a row on the home screen is the number of rows you set. The maximum number of apps shown in a column in the home screen is the number of columns you set. | ✔️ | | Lock Home Screen | bool | TRUE | Removes the ability of the end user to move around app icons on the home screen. If you enable this configuration key, the app icons on the home screen are locked. End users can't drag and drop to different grid positions on the home screen. If turned to false, end users can move around application and weblink icons on the Managed Home Screen. | ✔️ | | Application order enabled | bool | FALSE | Turning this setting to True enables the ability to set the order of applications, weblinks, and folders on the Managed Home Screen. Once enabled, set the ordering with app_order. | ✔️ | | Application order | bundleArray | See **Enter JSON Data** section of this document. | Allows you to specify the order of applications, weblinks, and folders on the Managed Home Screen. To use this setting, Lock Home Screen must be enabled, Set grid size must be defined, and Application order enabled must be set to True. | ✔️ | -| Applications in folder are ordered by name | bool | TRUE | False allows items in a folder to appear in the order they're specified. Otherwise, they'll appear in the folder alphabetically. | ❌ | +| Applications in folder are ordered by name | bool | TRUE | False allows items in a folder to appear in the order they're specified. Otherwise, they appear in the folder alphabetically. | ❌ | | Set app icon size | integer | 2 | Allows you to set the icon size for apps displayed on the home screen. You can choose the following values in this configuration for different sizes - 0 (Smallest), 1 (Small), 2 (Regular), 3 (Large) and 4 (Largest). | ✔️ | | Set app folder icon | integer | 0 | Allows you to define the appearance of app folders on the home screen. You can choose the appearance from following values: Dark Square(0); Dark Circle(1); Light Square(2); Light Circle(3). | ✔️ | | Set screen orientation | integer | 1 | Allows you to set the orientation of the home screen to portrait mode, landscape mode or allow auto rotate. You can set the orientation by entering values 1 (for portrait mode), 2 (for Landscape mode), 3 (for Autorotate). | ✔️ | | Set device wall paper | string | Default | Allows you to set a wallpaper of your choice. Enter the URL of the image that you want to set as a wallpaper. | ✔️ | | Define theme color | string | light | Specify if you want Managed Home Screen to run in "light" or "dark" mode. | ❌ | | Block pinning browser web pages to MHS | bool | FALSE | Set this restriction to `true` to block users from pinning web pages from any browser onto Managed Home Screen. | ❌ | -| Top Bar Primary Element | choice | | Use this key to select whether the primary element of the top bar will be the device Serial Number, Device Name, or Tenant Name. This setting can only be used if **Enable sign in** key is set to **false**. If the **Enable sign in** key is set to **true**, the user's name will be shown as the primary element. If you select serial number, **Show serial number for all supported OS versions on MHS** must be set to `{{SerialNumber}}`. If you select device name, **Show device name for all supported OS version on MHS** must be set to `{{DeviceName}}`. | ❌ | +| Top Bar Primary Element | choice | | Use this key to select whether the primary element of the top bar will be the device Serial Number, Device Name, or Tenant Name. This setting can only be used if **Enable sign in** key is set to **false**. If the **Enable sign in** key is set to **true**, the user's name is shown as the primary element. If you select serial number, **Show serial number for all supported OS versions on MHS** must be set to `{{SerialNumber}}`. If you select device name, **Show device name for all supported OS version on MHS** must be set to `{{DeviceName}}`. | ❌ | | Top Bar Secondary Element | choice | | Use this key to select whether the secondary element of the top bar will be the device Serial Number, Device Name, or Tenant Name. If you select serial number, **Show serial number for all supported OS versions on MHS** must be set to `{{SerialNumber}}`. If you select device name, **Show device name for all supported OS version on MHS** must be set to `{{DeviceName}}`. | ❌ | | Top Bar User Name Style | choice | | Use this setting to select the style of the user's name in the top bar based on the following list:
This setting can only be used if the **Enable sign in** key is set to **true**. | ❌ | @@ -88,7 +90,7 @@ The following table lists the Managed Home Screen available configuration keys, | Configuration Key | Value Type | Default Value | Description | Available in device configuration | |-|-|-|-|-| -| Show Managed Setting | bool | TRUE | The **Managed Settings** menu is specific to the Managed Home Screen app. It is visible on the top bar of the app. Specific settings appear in this menu only if you've configured these settings for quick access. These settings can include the **Show Wi-Fi setting**, **Show Bluetooth setting**, **Show volume setting**, and **Show flashlight setting**. Set this key to FALSE to hide the **Managed Settings** menu from the top bar. If required permissions are missing or the device is configured with sign-in enabled, the settings menu will be visible to allow users access to required permissions and profile information. Note that even if **Show Managed settings** is set to FALSE, you can choose to configure other settings to appear, which will allow the **Managed Settings** menu to be visible.

**NOTE**: Access to the settings menu has changed with the Managed Home Screen updated user experience. To learn more about the changes, see [Updates to the Managed Home Screen experience](https://techcommunity.microsoft.com/t5/intune-customer-success/updates-to-the-managed-home-screen-experience/ba-p/3974412). | ✔️ | +| Show Managed Setting | bool | TRUE | The **Managed Settings** menu is specific to the Managed Home Screen app. It's visible on the top bar of the app. Specific settings appear in this menu only if you've configured these settings for quick access. These settings can include the **Show Wi-Fi setting**, **Show Bluetooth setting**, **Show volume setting**, and **Show flashlight setting**. Set this key to FALSE to hide the **Managed Settings** menu from the top bar. If required permissions are missing or the device is configured with sign-in enabled, the settings menu is visible to allow users access to required permissions and profile information. Note that even if **Show Managed settings** is set to FALSE, you can choose to configure other settings to appear, which will allow the **Managed Settings** menu to be visible.

**NOTE**: Access to the settings menu has changed with the Managed Home Screen updated user experience. To learn more about the changes, see [Updates to the Managed Home Screen experience](https://techcommunity.microsoft.com/t5/intune-customer-success/updates-to-the-managed-home-screen-experience/ba-p/3974412). | ✔️ | | Show Wi-Fi setting | bool | FALSE | Turning this setting to True allows the end user to connect to different Wi-Fi networks. | ✔️ | | Enable Wi-Fi allow-list | bool | FALSE | True fills out the Wi-Fi allow-list key to restrict what Wi-Fi networks are shown within Managed Home Screen. Set to False to show all possible available Wi-Fi networks the device has discovered. This setting is only relevant if show Wi-Fi setting has been set to True and the Wi-Fi allow-list has been filled out. | ✔️ | | Wi-Fi allow-list | bundleArray | See **Enter JSON Data** section of this document. | Allows you to list all the SSIDs of what Wi-Fi networks you want the device to show within Managed Home Screen. This list is only relevant if show Wi-Fi setting and Enable Wi-Fi allow-list have been set to True. If either setting has been set to False, then you don't need to modify this configuration. | ✔️ | @@ -110,12 +112,12 @@ The following table lists the Managed Home Screen available configuration keys, > [!IMPORTANT] > The Managed Home Screen app has been updated at the API level to better adhere with the Google Play Store's requirements. In doing so, there were some changes to how Wi-Fi configuration works from Managed Home Screen. The changes include the following: -> - Being unable to change (enable or disable) the Wi-Fi connection for the device. Users will be able to switch between networks, but will not be able to turn on/off Wi-Fi. +> - Being unable to change (enable or disable) the Wi-Fi connection for the device. Users will be able to switch between networks, but won't be able to turn on/off Wi-Fi. > - Being unable to automatically connect to a configured Wi-Fi network that requires a password for the first time. The configured network will automatically connect after you enter the password the first time. > -> On Android devices running OS 11, when an end-user tries to connect to a network via the Managed Home Screen app, they will get prompted with a consent pop-up. This pop-up comes from the Android platform, and is not specific to the Managed Home Screen app. Additionally, when an end-user tries to connect to a password protected network via the Managed Home Screen app, they will be asked to input the password. Even if the password is correct, the network will only change if the device is not connected to a network. Devices that are already connected to a stable network will not be able connect to a password protected network via the Managed Home Screen app. +> On Android devices running OS 11, when an end-user tries to connect to a network via the Managed Home Screen app, they'll get prompted with a consent pop-up. This pop-up comes from the Android platform, and isn't specific to the Managed Home Screen app. Additionally, when an end-user tries to connect to a password protected network via the Managed Home Screen app, they'll be asked to input the password. Even if the password is correct, the network will only change if the device isn't connected to a network. Devices that are already connected to a stable network won't be able connect to a password protected network via the Managed Home Screen app. > -> On Android devices running OS 10, when an end-user tries to connect to a network via the Managed Home Screen app, they will get prompted with a consent via notifications. Because of this prompt, users on OS 10 will need to have access to the status bar and notifications in order to complete the consent step. Use the [General settings for fully managed and dedicated devices](../configuration/device-restrictions-android-for-work.md#dedicated-devices) to make status bar and notifications available to your end-users, if appropriate. Additionally, when an end-user tries to connect to a password protected network via the Managed Home Screen app, they will be asked to input the password. Even if the password is correct, the network will only change if the device is not already connected to a stable network. +> On Android devices running OS 10, when an end-user tries to connect to a network via the Managed Home Screen app, they'll get prompted with a consent via notifications. Because of this prompt, users on OS 10 will need to have access to the status bar and notifications in order to complete the consent step. Use the [General settings for fully managed and dedicated devices](../configuration/device-restrictions-android-for-work.md#dedicated-devices) to make status bar and notifications available to your end-users, if appropriate. Additionally, when an end-user tries to connect to a password protected network via the Managed Home Screen app, they'll be asked to input the password. Even if the password is correct, the network will only change if the device isn't already connected to a stable network. > [!IMPORTANT] > End users cannot automatically connect to Enterprise Wi-Fi networks they select from the MHS settings menu, even if that network has been pre-configured using either Intune or another external source. While managed devices can still reliably utilize these networks, end users cannot initialize a connection from within MHS to the preconfigured networks. @@ -129,25 +131,29 @@ The following table lists the Managed Home Screen available configuration keys, > For more information on how to enable Android system apps, go to: [Manage Android Enterprise system apps](apps-ae-system.md#enable-a-system-app-in-intune) > [!NOTE] -> The virtual home button requires granting overlay permission to MHS. The notification badge functionality requires granting notification permission to MHS.The brightness slider, adaptive brightness toggle, and autorotate toggle require granting write settings permission to MHS. Users will be prompted for permission upon startup of MHS, which requires the use of the Settings application. When possible, it is recommended to use OEMconfig to auto-grant these permissions to prevent possible breakout scenarios from the Settings application. +> The virtual home button requires granting overlay permission to MHS. The notification badge functionality requires granting notification permission to MHS.The brightness slider, adaptive brightness toggle, and autorotate toggle require granting write settings permission to MHS. Users will be prompted for permission upon startup of MHS, which requires the use of the Settings application. When possible, it's recommended to use OEMconfig to auto-grant these permissions to prevent possible breakout scenarios from the Settings application. +> +> Based on the OS version of the device, a notification may be presented to the user alerting them that the permission has been granted, even if the permissions were auto-granted. This notification will bring the user to the permission-granting screen which may allow the user access to the settings app. It's recommended to only configure access to notifications and features which require permissions when necessary. **Configurations for a custom screensaver**: | Configuration Key | Value Type | Default Value | Description | Available in device configuration profile | |-|-|-|-|-| | Enable screen saver | bool | FALSE | To enable screen saver mode or not. If set to true, you can configure screen_saver_image, screen_saver_show_time, inactive_time_to_show_screen_saver, and media_detect_screen_saver. | ✔️ | -| Screen saver image | string | | Set the URL of the screen saver image. If no URL is set, devices will show the default screen saver image when screen saver is activated. The default image shows the Managed Home Screen app icon. | ✔️ | -| Screen saver show time | integer | 0 | Gives option to set the amount of time in seconds the device will display the screen saver during screen saver mode. If set to 0, the screen saver will show on screen saver mode indefinitely until the device becomes active. | ✔️ | +| Screen saver image | string | | Set the URL of the screen saver image. If no URL is set, devices show the default screen saver image when screen saver is activated. The default image shows the Managed Home Screen app icon. | ✔️ | +| Screen saver show time | integer | 0 | Gives option to set the amount of time in seconds the device displays the screen saver during screen saver mode. If set to 0, the screen saver shows on screen saver mode indefinitely until the device becomes active. | ✔️ | | Inactive time to enable screen saver | integer | 30 | The number of seconds the device is inactive before triggering the screen saver. If set to 0, the device will never go into screen saver mode. | ✔️ | -| Media detect before showing screen saver | bool | TRUE | Choose whether the device screen should show screen saver if audio/video is playing on device. If set to true, the device won't play audio/video, regardless of the value in inactive_time_to_show_scree_saver. If set to false, device screen will show screen saver according to value set in inactive_time_to_show_screen_saver. | ✔️ | +| Media detect before showing screen saver | bool | TRUE | Choose whether the device screen should show screen saver if audio/video is playing on device. If set to true, the device won't play audio/video, regardless of the value in inactive_time_to_show_scree_saver. If set to false, device screen shows screen saver according to value set in inactive_time_to_show_screen_saver. | ✔️ | > [!NOTE] -> Managed Home Screen will start the screensaver whenever the lock screen appears. If the system's lock screen timeout is longer than **Screensaver show time** then the -> screen saver will show until the lock screen appears. If the system's lock screen timeout is shorter than **inactive time to enable screen saver** the screensaver will appear +> Managed Home Screen starts the screensaver whenever the lock screen appears. If the system's lock screen timeout is longer than **Screensaver show time** then the +> screen saver shows until the lock screen appears. If the system's lock screen timeout is shorter than **inactive time to enable screen saver** the screensaver appears > as soon as the device's lock screen appears. > [!NOTE] -> The screensaver requires granting overlay permission and exact alarm permission (OS 14+) to MHS. Users will be prompted for permission upon startup of MHS, which requires the use of the Settings application. When possible, it is recommended to use OEMconfig to auto-grant overlay and exact alarm permission to prevent possible breakout scenarios from the Settings application. +> The screensaver requires granting overlay permission and exact alarm permission (OS 14+) to MHS. Users will be prompted for permission upon startup of MHS, which requires the use of the Settings application. When possible, it's recommended to use OEMconfig to auto-grant overlay and exact alarm permission to prevent possible breakout scenarios from the Settings application. +> +> Based on the OS version of the device, a notification may be presented to the user alerting them that the permission has been granted, even if the permissions were auto-granted. This notification will bring the user to the permission-granting screen which may allow the user access to the settings app. It's recommended to only configure access to notifications and features which require permissions when necessary. **Configurations to help with troubleshooting issues on the device**: @@ -156,12 +162,14 @@ The following table lists the Managed Home Screen available configuration keys, | Exit lock task mode password | string | | Enter a 4-6-digit code to use to temporarily drop out of lock-task mode for troubleshooting. | ✔️ | | Enable easy access debug menu | bool | FALSE | Turn this setting to True to access the debug menu from the Managed Settings menu while in Managed Home Screen. The debug menu is currently where the capability to exit kiosk mode lives, and is accessed by clicking the back button about 15 times. Keep this setting set to False to keep the entry point to debug menu only accessible via the back button. | ✔️ | | Enable MAX inactive time outside of MHS | bool | FALSE | Turn this setting to True to automatically re-launch Managed Home Screen after a set period of inactivity. The timer will only count inactive time and, when configured, will reset each time the user interacts with the device while outside of Managed Home Screen. Use **MAX inactive time outside MHS** to set the inactivity timer. By default, this setting is off. This setting can only be used if **Exit lock task mode password** has been configured. | ❌ | -| MAX inactive time outside MHS | integer | 180 | Set the maximum amount of inactive time, in seconds, that a user can spend outside of Managed Home Screen before it is automatically re-launched. By default, this configuration is set to 180 seconds. **Enable MAX inactive time outside of MHS** must be set to true to use this setting. | ❌ | +| MAX inactive time outside MHS | integer | 180 | Set the maximum amount of inactive time, in seconds, that a user can spend outside of Managed Home Screen before it's automatically re-launched. By default, this configuration is set to 180 seconds. **Enable MAX inactive time outside of MHS** must be set to true to use this setting. | ❌ | | Enable MAX time outside MHS | bool | FALSE | Turn this setting to True to automatically re-launch Managed Home Screen after a set period of time has passed. The timer will factor in both inactive and active time spent outside of Managed Home Screen. Use **MAX time outside MHS** to set the inactivity timer. By default, this setting is off. This setting can only be used if **Exit lock task mode password** has been configured. | ❌ | -| MAX time outside MHS | integer | 600 | Set the maximum amount of absolute time, in seconds, that a user can spend outside of Managed Home Screen before it is automatically re-launched. By default, this configuration is set to 600 seconds. **Enable MAX time outside of MHS** must be set to true to use this setting. | ❌ | +| MAX time outside MHS | integer | 600 | Set the maximum amount of absolute time, in seconds, that a user can spend outside of Managed Home Screen before it's automatically re-launched. By default, this configuration is set to 600 seconds. **Enable MAX time outside of MHS** must be set to true to use this setting. | ❌ | >[!NOTE] -> The automatic relaunch functionality requires granting exact alarm permission to MHS. Users will be prompted for permission upon startup of MHS, which requires the use of the Settings application. When possible, it is recommended to use OEMconfig to auto-grant exact alarm permission to prevent possible breakout scenarios from the Settings application. +> The automatic relaunch functionality requires granting exact alarm permission to MHS. Users will be prompted for permission upon startup of MHS, which requires the use of the Settings application. When possible, it's recommended to use OEMconfig to auto-grant exact alarm permission to prevent possible breakout scenarios from the Settings application. +> +> Based on the OS version of the device, a notification may be presented to the user alerting them that the permission has been granted, even if the permissions were auto-granted. This notification will bring the user to the permission-granting screen which may allow the user access to the settings app. It's recommended to only configure access to notifications and features which require permissions when necessary. **Configurations to customize Managed Home Screen experience when device is set up with Microsoft Entra shared device mode**: @@ -169,13 +177,13 @@ The following table lists the Managed Home Screen available configuration keys, |-|-|-|-|-| | Enable sign in | bool | FALSE | Turn this setting to True to enable end-users to sign into Managed Home Screen. When used with Microsoft Entra shared device mode, users who sign in to Managed Home Screen will get automatically signed in to all other apps on the device that have participated with Microsoft Entra shared device mode. By default this setting is off.

NOTE: After rebooting the device, end users must reauthenticate by signing in to Managed Home Screen. | ✔️

NOTE: On devices that have a device configuration profile with the [**Enabled System Navigation Features** setting](../configuration/device-restrictions-android-for-work.md#dedicated-devices) set to **Home and Overview buttons**, end users can ignore and skip the sign in screen. | | Sign in type | string | Microsoft Entra ID | Set this configuration to "AAD" to sign in with a Microsoft Entra account. Otherwise, set this configuration to "Other". Users who sign in with a non-AAD account won't get single sign-on to all apps that have integrated with Microsoft Entra shared device mode, but will still get signed in to Managed Home Screen. By default, this setting uses "AAD" user accounts. This setting can only be used if **Enable sign in** has been set to True. | ✔️ | -| Domain name | string | | Set a domain name to be appended to usernames for sign in. If this is not set, users will need to enter the domain name. To allow users to select between multiple domain name options, add semicolon delimited strings. Enable sign in must be set to TRUE to use this configuration.

**NOTE**: This setting does not prevent users from inputting alternative domain names. | ❌ | +| Domain name | string | | Set a domain name to be appended to usernames for sign in. If this isn't set, users will need to enter the domain name. To allow users to select between multiple domain name options, add semicolon delimited strings. Enable sign in must be set to TRUE to use this configuration.

**NOTE**: This setting does not prevent users from inputting alternative domain names. | ❌ | | Login hint text | string | | Set a custom login hint string by entering a string. If no string is set, the default string "Enter email or phone number" will be displayed. Enable sign in must be set to TRUE to use this configuration. | ❌ | | Set to the url of wallpaper | string | | Allows you to set a wallpaper of your choice for the sign in screen. To use this setting, enter the URL of the image that you want set for the sign-in screen wallpaper. This image can be different than the Managed Home Screen wallpaper that is configured with **Set device wallpaper**. This setting can only be used if **Enable sign in** has been set to True. | ✔️ | | Enable show organization logo on sign in page | bool | TRUE | Turn this setting to True to use a company logo that will appear on the sign-in screen. This setting is used with **Organization logo on sign in page** and can only be used if **Enable sign in** has been set to TRUE. | ✔️ | | Organization logo on sign in page | string | | Allows you to brand your device with a logo of your choice on the Managed Home Screen sign-in screen. To use this setting, enter the URL of the image that you want set for the logo. This setting can only be used if **Enable show organization logo on sign in page** and **Enable sign in** have been set to True. | ✔️ | | Enable session PIN | bool | FALSE | Turn this setting to True if you want end-users to get prompted to create a local Session PIN after they've successfully signed in to Managed Home Screen. The Session PIN prompt will appear before end-user gets access to the home screen, and can be used in conjunction with other features. The Session PIN lasts for the duration of a user's sign-in, and is cleared upon sign-out. By default, this setting is off. This setting can only be used if **Enable sign in** has been set to True. | ✔️

NOTE: On devices that have a device configuration profile with the [**Enabled System Navigation Features** setting](../configuration/device-restrictions-android-for-work.md#dedicated-devices) set to **Home and Overview buttons**, end users can ignore and skip the session PIN screen. | -| Complexity of session PIN | string | | Choose whether the local session PIN should be **simple**, **complex**, or **alphanumeric complex**. If you choose **simple**, users will only be required to enter a numeric PIN. If you choose **complex**, users will get prompted to create a PIN with alphanumeric characters and no repeating (444) or ordered sequences (123, 432, 246) are allowed. Evaluation of repeating and sequential patterns begins at three (3) digits/characters. If you choose **alphanumeric complex**, then users will get prompted to create a PIN with alphanumeric characters, and at least one symbol or letter is required. No repeating (444) or ordered sequences (123, 432, 246) are allowed. Evaluation of repeating and sequential patterns begins at three (3) characters. The default value for this setting is one (1), where one (1) means that the user must have at least one character in their Session PIN. This setting can only be used if **Enable session PIN** and **Enable sign in** have been set to True. | ✔️

NOTE: The **alphanumeric complex** option is only available in app config today. | +| Complexity of session PIN | string | | Choose whether the local session PIN should be **simple**, **complex**, **complex numeric only**, or **alphanumeric complex**. If you choose **simple**, users will only be required to enter a numeric PIN. If you choose **complex**, users will get prompted to create a PIN with alphanumeric characters and no repeating (444) or ordered sequences (123, 432, 246) are allowed. Evaluation of repeating and sequential patterns begins at three (3) digits/characters. If you choose **complex numeric only**, users will get prompted to create a PIN with numerals only and no repeating (444) or ordered sequences (123, 432, 246) are allowed. Evaluation of repeating and sequential patterns begins at three (3) digits/characters. If you choose **alphanumeric complex**, then users will get prompted to create a PIN with alphanumeric characters, and at least one symbol or letter is required. No repeating (444) or ordered sequences (123, 432, 246) are allowed. Evaluation of repeating and sequential patterns begins at three (3) characters. The default value for this setting is one (1), where one (1) means that the user must have at least one character in their Session PIN. This setting can only be used if **Enable session PIN** and **Enable sign in** have been set to True. | ✔️

NOTE: The **complex numeric only** and **alphanumeric complex** options are only available in app config today. | | Minimum length for session PIN | string | | Define the minimum length a user's session PIN must adhere to. This can be used with any of the complexity values for session PIN. This setting can only be used if **Enable session PIN** and **Enable sign in** have been set to True. | ❌ | | Maximum number of attempts for session PIN | string | | Define the maximum number of times a user can attempt to enter their session PIN before getting automatically logged out from Managed Home Screen. The default value is zero (0), where zero (0) means the user gets infinite tries. This can be used with any of the complexity values for session PIN. This setting can only be used if **Enable session PIN** and **Enable sign in** have been set to True. | ❌ | | Customer facing folder | Bool | FALSE | Use this specification with **Create Managed Folder for grouping apps** to create a folder that can't be exited without a user entering their Session PIN. This setting can only be used if **Enable session PIN** and **Enable sign in** have been set to True. | ❌ | @@ -193,10 +201,12 @@ The following table lists the Managed Home Screen available configuration keys, > - Launch a screen saver after a set period of inactivity > - Automatically relaunch MHS after a certain period of time when a user exits kiosk mode > -> For devices running Android 14 and higher, by default, the exact alarm permission will be denied. To make sure critical user functionality is not impacted, end-users will be prompted to grant exact alarm permission upon first launch of Managed Home Screen. +> For devices running Android 14 and higher, by default, the exact alarm permission will be denied. To make sure critical user functionality isn't impacted, end-users will be prompted to grant exact alarm permission upon first launch of Managed Home Screen. > [!NOTE] -> The automatic sign out feature requires granting overlay permission and exact alarm permission (OS 14+) to MHS. Users will be prompted for permission upon startup of MHS, which requires the use of the Settings application. When possible, it is recommended to use OEMconfig to auto-grant overlay and exact alarm permission to prevent possible breakout scenarios from the Settings application. +> The automatic sign out feature requires granting overlay permission and exact alarm permission (OS 14+) to MHS. Users will be prompted for permission upon startup of MHS, which requires the use of the Settings application. When possible, it's recommended to use OEMconfig to auto-grant overlay and exact alarm permission to prevent possible breakout scenarios from the Settings application. +> +> Based on the OS version of the device, a notification may be presented to the user alerting them that the permission has been granted, even if the permissions were auto-granted. This notification will bring the user to the permission-granting screen which may allow the user access to the settings app. It's recommended to only configure access to notifications and features which require permissions when necessary. ## Enter JSON Data @@ -206,11 +216,14 @@ Enter JSON data to configure all available settings for Managed Home Screen, and In addition to the list of configurable settings listed in the **Configuration Designer** table (above), the following table provides the configuration keys you can only configure via JSON data. -| Configuration Key | Value Type | Default Value | Description | +| Configuration Key | Value Type | Details | Description | |-|-|-|-| -| Set allow-listed applications | bundleArray | JSON - Example 1 | Allows you to define the set of apps visible on the home screen from all the apps installed on the device. You can define the apps by entering the app package name of the apps that you want to make visible. For example, `com.android.settings` would make settings accessible on the home screen. The apps that you allow-list in this section should already be installed on the device to be visible on the home screen. | -| Set pinned web links | bundleArray | JSON - Example 2 | Allows you to pin websites as quick launch icons on the home screen. With this configuration, you can define the URL and add it to the home screen for the end user to launch in the browser with a single tap. Note: We recommend that you create, assign, and approve [Managed Google Play web links](./apps-add-android-for-work.md#managed-google-play-web-links) to your devices. When you do, they're treated like allow-listed applications. | -| Create Managed Folder for grouping apps | bundleArray | JSON - Example 3 | Allows you to create and name folders and group apps within these folders. End users can't move folders, rename the folders, or move the apps within the folders. Folders will appear in the order created, and apps within the folders will appear alphabetically. Note: all apps that you want to group into folders must be assigned as required to the device and must have been added to the Managed Home Screen. | +| Set allow-listed applications | bundleArray | See [JSON Data Examples](#json-data-examples). | Allows you to define the set of apps visible on the home screen from all the apps installed on the device. You can define the apps by entering the app package name of the apps that you want to make visible. For example, `com.android.settings` would make settings accessible on the home screen. The apps that you allow-list in this section should already be installed on the device to be visible on the home screen. | +| Set pinned web links | bundleArray | See [JSON Data Examples](#json-data-examples). | Allows you to pin websites as quick launch icons on the home screen. With this configuration, you can define the URL and add it to the home screen for the end user to launch in the browser with a single tap. Note: We recommend that you create, assign, and approve [Managed Google Play web links](./apps-add-android-for-work.md#managed-google-play-web-links) to your devices. When you do, they're treated like allow-listed applications. | +| Create Managed Folder for grouping apps | bundleArray | See [JSON Data Examples](#json-data-examples). | Allows you to create and name folders and group apps within these folders. End users can't move folders, rename the folders, or move the apps within the folders. Folders will appear in the order created, and apps within the folders will appear alphabetically.

**NOTE:** all apps that you want to group into folders must be assigned as required to the device and must have been added to the Managed Home Screen. | +| Widget | bundleArray | See [JSON Data Examples](#json-data-examples). | Allows you to add widgets to the home screen. Managed Home Screen provides and maintains a **Time** and **Weather** widget. You can also add a custom LOB widget or a third-party widget using JSON data. You can define the widget to be exposed by entering the app package name and widget class name. For example, to expose the **Time** widget, define the package name as `com.microsoft.launcher.enterprise` and widget class as **Time**. | + +### JSON Data Examples The following syntax is an example JSON script with all the available configuration keys included: diff --git a/memdocs/intune/apps/app-configuration-policies-outlook.md b/memdocs/intune/apps/app-configuration-policies-outlook.md index f3e011e3d4f..a4616b34af8 100644 --- a/memdocs/intune/apps/app-configuration-policies-outlook.md +++ b/memdocs/intune/apps/app-configuration-policies-outlook.md @@ -7,7 +7,7 @@ keywords: author: Erikre ms.author: erikre manager: dougeby -ms.date: 12/12/2023 +ms.date: 11/21/2024 ms.topic: how-to ms.service: microsoft-intune ms.subservice: apps @@ -32,10 +32,10 @@ ms.custom: intune-azure The Outlook for iOS and Android app is designed to enable users in your organization to do more from their mobile devices, by bringing together email, calendar, contacts, and other files. -The richest and broadest protection capabilities for Microsoft 365 data are available when you subscribe to the Enterprise Mobility + Security suite, which includes Microsoft Intune and Microsoft Entra ID P1 or P2 features, such as conditional access. At a minimum, you will want to deploy a conditional access policy that allows connectivity to Outlook for iOS and Android from mobile devices and an Intune app protection policy that ensures the collaboration experience is protected. +The richest and broadest protection capabilities for Microsoft 365 data are available when you subscribe to the Enterprise Mobility + Security suite, which includes Microsoft Intune and Microsoft Entra ID P1 or P2 features, such as Conditional Access. At a minimum, you will want to deploy a Conditional Access policy that allows connectivity to Outlook for iOS and Android from mobile devices and an Intune app protection policy that ensures the collaboration experience is protected. ## Apply Conditional Access -Organizations can use Microsoft Entra Conditional Access policies to ensure that users can only access work or school content using Outlook for iOS and Android. To do this, you will need a conditional access policy that targets all potential users. These policies are described in [Conditional Access: Require approved client apps or app protection policy](/azure/active-directory/conditional-access/howto-policy-approved-app-or-app-protection). +Organizations can use Microsoft Entra Conditional Access policies to ensure that users can only access work or school content using Outlook for iOS and Android. To do this, you will need a Conditional Access policy that targets all potential users. These policies are described in [Conditional Access: Require approved client apps or app protection policy](/azure/active-directory/conditional-access/howto-policy-approved-app-or-app-protection). 1. Follow the steps in [Require approved client apps or app protection policy with mobile devices](/azure/active-directory/conditional-access/howto-policy-approved-app-or-app-protection#require-approved-client-apps-or-app-protection-policy-with-mobile-devices). This policy allows Outlook for iOS and Android, but blocks OAuth and basic authentication capable Exchange ActiveSync mobile clients from connecting to Exchange Online. @@ -49,7 +49,7 @@ Organizations can use Microsoft Entra Conditional Access policies to ensure that 3. Follow the steps in [How to: Block legacy authentication to Microsoft Entra ID with Conditional Access](/azure/active-directory/conditional-access/block-legacy-authentication) to block legacy authentication for other Exchange protocols on iOS and Android devices; this policy should target only Microsoft Exchange Online cloud app and iOS and Android device platforms. This ensures mobile apps using Exchange Web Services, IMAP4, or POP3 protocols with basic authentication cannot connect to Exchange Online. > [!NOTE] -> To leverage app-based conditional access policies, the Microsoft Authenticator app must be installed on iOS devices. For Android devices, the Intune Company Portal app is required. For more information, see [App-based Conditional Access with Intune](../protect/app-based-conditional-access-intune.md). +> To leverage app-based Conditional Access policies, the Microsoft Authenticator app must be installed on iOS devices. For Android devices, the Intune Company Portal app is required. For more information, see [App-based Conditional Access with Intune](../protect/app-based-conditional-access-intune.md). ## Create Intune app protection policies diff --git a/memdocs/intune/apps/app-configuration-policies-overview.md b/memdocs/intune/apps/app-configuration-policies-overview.md index 9f7b637b3e5..65a25ee8ad2 100644 --- a/memdocs/intune/apps/app-configuration-policies-overview.md +++ b/memdocs/intune/apps/app-configuration-policies-overview.md @@ -8,7 +8,7 @@ keywords: author: Erikre ms.author: erikre manager: dougeby -ms.date: 12/12/2023 +ms.date: 11/21/2024 ms.topic: how-to ms.service: microsoft-intune ms.subservice: apps @@ -69,7 +69,7 @@ App configuration can be delivered either through the mobile device management ( Intune represents these different app configuration policy channels as: - **Managed devices** - The device is managed by Intune as the unified endpoint management provider. The app must be pinned to the management profile on iOS/iPadOS or deployed through Managed Google Play on Android devices. In addition, the app supports the desired app configuration. -- **Managed apps** - An app that has either integrated the Intune App SDK or have been wrapped using the Intune Wrapping Tool and supports App Protection Policies (APP). In this configuration, neither the device's enrollment state or how the app is delivered to the device matter. The app supports the desired app configuration. +- **Managed apps** - An app that has either integrated the Intune App SDK or has been wrapped using the Intune Wrapping Tool and supports App Protection Policies (APP). In this configuration, neither the device's enrollment state or how the app is delivered to the device matter. The app supports the desired app configuration. ![Device enrollment type](./media/app-configuration-policies-overview/device-enrollment-type.png) @@ -101,7 +101,7 @@ Delivery of app configuration through the MAM channel does not require the devic - Advanced APP data protection settings which extend the capabilities offered by App Protection Policies > [!NOTE] -> Intune managed apps will check-in with an interval of 30 minutes for Intune App Configuration Policy status, when deployed in conjunction with an Intune App Protection Policy. If an Intune App Protection Policy isn't assigned to the user, then the Intune App Configuration Policy check-in interval is set to 720 minutes. +> Intune managed apps will check in with an interval of 30 minutes for Intune App Configuration Policy status, when deployed in conjunction with an Intune App Protection Policy. If an Intune App Protection Policy isn't assigned to the user, then the Intune App Configuration Policy check-in interval is set to 720 minutes. For information on which apps support app configuration through the MAM channel, see [Microsoft Intune protected apps](apps-supported-intune-apps.md). @@ -133,7 +133,7 @@ You can validate the app configuration policy using the following three methods: Device Install Status Report monitors the latest check-in's for all the devices the configuration policy has been targeted to. ![First screenshot of device install status](./media/app-configuration-policies-overview/device-install-status-1.png) - Additionally,in the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), select **Devices** > **All Devices** > *select a device* > **App configuration**. The app configuration** pane will display all the assigned policies and their state: + Additionally, in the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), select **Devices** > **All Devices** > *select a device* > **App configuration**. The **app configuration** pane will display all the assigned policies and their state: ![Screenshot of app configuration](./media/app-configuration-policies-overview/app-configuration.png) diff --git a/memdocs/intune/apps/app-configuration-policies-use-ios.md b/memdocs/intune/apps/app-configuration-policies-use-ios.md index 31612c8d0f0..eac7121cbfe 100644 --- a/memdocs/intune/apps/app-configuration-policies-use-ios.md +++ b/memdocs/intune/apps/app-configuration-policies-use-ios.md @@ -8,7 +8,7 @@ keywords: author: Erikre ms.author: erikre manager: dougeby -ms.date: 05/08/2024 +ms.date: 11/20/2024 ms.topic: how-to ms.service: microsoft-intune ms.subservice: apps @@ -123,6 +123,10 @@ As the Microsoft Intune administrator, you can control which work or school acco |----|----| | IntuneMAMAllowedAccountsOnly |

| | IntuneMAMUPN | | +| IntuneMAMOID | | + +> [!NOTE] +> The **IntuneMAMUPN** and **IntuneMAMOID** configuration keys are automatically configured for some MAM enabled apps, see [Device Management types](../apps/app-protection-policies.md#device-management-types) for more information. > [!NOTE] > The following apps process the above app configuration and only allow organization accounts: diff --git a/memdocs/intune/apps/app-configuration-vpn-ae.md b/memdocs/intune/apps/app-configuration-vpn-ae.md index 83f31f1536c..653591d5d08 100644 --- a/memdocs/intune/apps/app-configuration-vpn-ae.md +++ b/memdocs/intune/apps/app-configuration-vpn-ae.md @@ -8,7 +8,7 @@ keywords: author: Erikre ms.author: erikre manager: dougeby -ms.date: 12/12/2023 +ms.date: 11/21/2024 ms.topic: how-to ms.service: microsoft-intune ms.subservice: apps diff --git a/memdocs/intune/apps/app-lifecycle.md b/memdocs/intune/apps/app-lifecycle.md index 7bfa42f10c1..c6e3636998b 100644 --- a/memdocs/intune/apps/app-lifecycle.md +++ b/memdocs/intune/apps/app-lifecycle.md @@ -7,7 +7,7 @@ keywords: author: Erikre ms.author: erikre manager: dougeby -ms.date: 12/12/2023 +ms.date: 11/18/2024 ms.topic: conceptual ms.service: microsoft-intune ms.subservice: apps diff --git a/memdocs/intune/apps/app-management.md b/memdocs/intune/apps/app-management.md index 1131da1b39e..e22b801dc0e 100644 --- a/memdocs/intune/apps/app-management.md +++ b/memdocs/intune/apps/app-management.md @@ -8,7 +8,7 @@ keywords: author: Erikre ms.author: erikre manager: dougeby -ms.date: 08/09/2024 +ms.date: 12/02/2024 ms.topic: overview ms.service: microsoft-intune ms.subservice: apps @@ -47,10 +47,10 @@ The benefits of app management in Microsoft Intune include: Examples of using app management with Microsoft Intune include: - Deploying, protecting, and managing apps for specific groups of users within your organization - Configuring app settings, such as data sharing restrictions, to ensure compliance with corporate policies -- Implementing conditional access policies to control access to apps based on factors like device compliance, location, and user risk +- Implementing Conditional Access policies to control access to apps based on factors like device compliance, location, and user risk - Automating app updates to keep employees up-to-date with the latest features and security patches -> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE4MRyj] +> [!VIDEO https://learn-video.azurefd.net/vod/player?id=54058b9c-868c-441e-aa55-09131997eaeb] ## Mobile Application Management (MAM) basics diff --git a/memdocs/intune/apps/app-protection-framework.md b/memdocs/intune/apps/app-protection-framework.md index 8b029770123..a58c680d75e 100644 --- a/memdocs/intune/apps/app-protection-framework.md +++ b/memdocs/intune/apps/app-protection-framework.md @@ -8,7 +8,7 @@ keywords: author: Erikre ms.author: erikre manager: dougeby -ms.date: 01/12/2024 +ms.date: 12/09/2024 ms.topic: conceptual ms.service: microsoft-intune ms.subservice: apps @@ -34,7 +34,7 @@ ms.collection: As more organizations implement mobile device strategies for accessing work or school data, protecting against data leakage becomes paramount. Intune's mobile application management solution for protecting against data leakage is App Protection Policies (APP). APP are rules that ensure an organization's data remains safe or contained in a managed app, regardless of whether the device is enrolled. For more information, see [App protection policies overview](app-protection-policy.md). -When configuring App Protection Policies, the number of various settings and options enable organizations to tailor the protection to their specific needs. Due to this flexibility, it may not be obvious which permutation of policy settings are required to implement a complete scenario. To help organizations prioritize client endpoint hardening endeavors, Microsoft has introduced a new taxonomy for [security configurations in Windows 10](https://aka.ms/secconframework), and Intune is leveraging a similar taxonomy for its APP data protection framework for mobile app management. +When you configure App Protection Policies, the number of various settings and options enable organizations to tailor the protection to their specific needs. Due to this flexibility, it may not be obvious which permutation of policy settings are required to implement a complete scenario. To help organizations prioritize client endpoint hardening endeavors, Microsoft has introduced a new taxonomy for [security configurations in Windows 10](https://aka.ms/secconframework), and Intune is leveraging a similar taxonomy for its APP data protection framework for mobile app management. The APP data protection configuration framework is organized into three distinct configuration scenarios: @@ -46,7 +46,7 @@ The APP data protection configuration framework is organized into three distinct ## APP Data Protection Framework deployment methodology -As with any deployment of new software, features or settings, Microsoft recommends investing in a ring methodology for testing validation prior to deploying the APP data protection framework. Defining deployment rings is generally a one-time event (or at least infrequent), but IT should revisit these groups to ensure that the sequencing is still correct. +As with any deployment of new software, features, or settings, Microsoft recommends investing in a ring methodology for testing validation prior to deploying the APP data protection framework. Defining deployment rings is generally a one-time event (or at least infrequent), but IT should revisit these groups to ensure that the sequencing is still correct. Microsoft recommends the following deployment ring approach for the APP data protection framework: @@ -75,7 +75,7 @@ Administrators can incorporate the below configuration levels within their ring ### Conditional Access Policies -To ensure that only apps supporting App Protection Poliies access work or school account data, Microsoft Entra Conditional Access policies are required. These policies are described in [Conditional Access: Require approved client apps or app protection policy](/azure/active-directory/conditional-access/howto-policy-approved-app-or-app-protection). +To ensure that only apps supporting App Protection Policies access work or school account data, Microsoft Entra Conditional Access policies are required. These policies are described in [Conditional Access: Require approved client apps or app protection policy](/azure/active-directory/conditional-access/howto-policy-approved-app-or-app-protection). See **Require approved client apps or app protection policy with mobile devices** in [Conditional Access: Require approved client apps or app protection policy](/azure/active-directory/conditional-access/howto-policy-approved-app-or-app-protection) for steps to implement the specific policies. Finally, implement the steps in [Block legacy authentication](/azure/active-directory/conditional-access/block-legacy-authentication) to block legacy authentication capable iOS and Android apps. diff --git a/memdocs/intune/apps/app-protection-policies-access-actions.md b/memdocs/intune/apps/app-protection-policies-access-actions.md index 50b78c4df43..507364357d8 100644 --- a/memdocs/intune/apps/app-protection-policies-access-actions.md +++ b/memdocs/intune/apps/app-protection-policies-access-actions.md @@ -8,7 +8,7 @@ keywords: author: Erikre ms.author: erikre manager: dougeby -ms.date: 02/27/2024 +ms.date: 01/06/2025 ms.topic: how-to ms.service: microsoft-intune ms.subservice: apps @@ -85,7 +85,7 @@ Set one of the following actions: - Allow specified (Wipe nonspecified) **What happens if the IT admin inputs a different list of iOS/iPadOS model identifier(s) between policies targeted to the same apps for the same Intune user?**
-When conflicts arise between two app protection policies for configured values, Intune typically takes the most restrictive approach. Thus, the resultant policy sent down to the targeted app opened by the targeted Intune user would be an intersection of the listed iOS/iPadOS model identifiers in *Policy A* and *Policy B* targeted to the same app/user combination. For example, *Policy A* specifies "iPhone5,2;iPhone5,3", while *Policy B* specifies "iPhone5,3", the resultant policy that the Intune user targeted by both *Policy A* and *Policy B* is "iPhone5,3". +When conflicts arise between two app protection policies for configured values, Intune typically takes the most restrictive approach. The resultant policy sent down to the targeted app opened by the targeted Intune user would be an intersection of the listed iOS/iPadOS model identifiers in *Policy A* and *Policy B* targeted to the same app/user combination. For example, *Policy A* specifies `iPhone5,2;iPhone5,3`, while *Policy B* specifies `iPhone5,3`, the resultant policy that the Intune user targeted by both *Policy A* and *Policy B* is `iPhone5,3`. ### Android policy settings @@ -111,7 +111,7 @@ To use the **Device manufacturer(s)** setting, input a semi-colon separated list Example input: *Manufacturer A;Manufacturer B* >[!NOTE] -> These are some common manufacturers reported from devices using Intune, and can be used as input: Asus;Blackberry;Bq;Gionee;Google;Hmd global;Htc;Huawei;Infinix;Kyocera;Lemobile;Lenovo;Lge;Motorola;Oneplus;Oppo;Samsung;Sharp;Sony;Tecno;Vivo;Vodafone;Xiaomi;Zte;Zuk +> The following list are some common manufacturers reported from devices using Intune, and can be used as input: Asus;Blackberry;Bq;Gionee;Google;Hmd global;Htc;Huawei;Infinix;Kyocera;Lemobile;Lenovo;Lge;Motorola;Oneplus;Oppo;Samsung;Sharp;Sony;Tecno;Vivo;Vodafone;Xiaomi;Zte;Zuk On end-user devices, the Intune client would take action based on a simple matching of device model strings specified in Intune for Application Protection Policies. Matching depends entirely on what the device reports. You (the IT administrator) are encouraged to ensure that the intended behavior occurs by testing this setting based on various device manufacturers and models, and targeted to a small user group. The default value is **Not configured**.
Set one of the following actions: @@ -119,7 +119,7 @@ Set one of the following actions: - Allow specified (Wipe on nonspecified) **What happens if the IT admin inputs a different list of Android manufacturer(s) between policies targeted to the same apps for the same Intune user?**
-When conflicts arise between two app protection policies for configured values, Intune typically takes the most restrictive approach. Thus, the resultant policy sent down to the targeted app being opened by the targeted Intune user would be an intersection of the listed Android manufacturers in *Policy A* and *Policy B* targeted to the same app/user combination. For example, *Policy A* specifies "Google;Samsung", while *Policy B* specifies "Google", the resultant policy that the Intune user targeted by both *Policy A* and *Policy B* is "Google." +When conflicts arise between two app protection policies for configured values, Intune typically takes the most restrictive approach. The resultant policy sent down to the targeted app being opened by the targeted Intune user would be an intersection of the listed Android manufacturers in *Policy A* and *Policy B* targeted to the same app/user combination. For example, *Policy A* specifies `Google;Samsung`, while *Policy B* specifies `Google`, the resultant policy that the Intune user targeted by both *Policy A* and *Policy B* is `Google`. ### Additional settings and actions diff --git a/memdocs/intune/apps/app-protection-policies-configure-windows-10.md b/memdocs/intune/apps/app-protection-policies-configure-windows-10.md index ece8a778217..559365135c9 100644 --- a/memdocs/intune/apps/app-protection-policies-configure-windows-10.md +++ b/memdocs/intune/apps/app-protection-policies-configure-windows-10.md @@ -8,7 +8,7 @@ keywords: author: Erikre ms.author: erikre manager: dougeby -ms.date: 02/27/2024 +ms.date: 01/06/2025 ms.topic: how-to ms.service: microsoft-intune ms.subservice: apps diff --git a/memdocs/intune/apps/app-protection-policies-exception.md b/memdocs/intune/apps/app-protection-policies-exception.md index 33a3a17a123..b7516e4b217 100644 --- a/memdocs/intune/apps/app-protection-policies-exception.md +++ b/memdocs/intune/apps/app-protection-policies-exception.md @@ -8,7 +8,7 @@ keywords: author: Erikre ms.author: erikre manager: dougeby -ms.date: 02/27/2024 +ms.date: 01/06/2025 ms.topic: conceptual ms.service: microsoft-intune ms.subservice: apps @@ -36,7 +36,7 @@ ms.collection: As an administrator, you can create exceptions to the Intune App Protection Policy (APP) data transfer policy. An exception allows you to specifically choose which unmanaged apps can transfer data to and from managed apps. Your IT must trust the unmanaged apps that you include in the exception list. >[!WARNING] -> You are responsible for making changes to the data transfer exception policy. Additions to this policy allow unmanaged apps (apps that are not managed by Intune) to access data protected by managed apps. This access to protected data may result in data security leaks. Only add data transfer exceptions for apps that your organization must use, but that do not support Intune APP (Application Protection Policies). Additionally, only add exceptions for apps that you do not consider to be data leak risks. +> You're responsible for making changes to the data transfer exception policy. Additions to this policy allow unmanaged apps (apps that aren't managed by Intune) to access data protected by managed apps. This access to protected data may result in data security leaks. Only add data transfer exceptions for apps that your organization must use, but that don't support Intune APP (Application Protection Policies). Additionally, only add exceptions for apps that you don't consider to be data leak risks. Within an Intune Application Protection Policy, setting **Allow app to transfer data to other apps** to **Policy managed apps** means that the app can transfer data only to apps managed by Intune. If you need to allow data to be transferred to specific apps that don't support Intune APP, you can create exceptions to this policy by using **Select apps to exempt**. Exemptions allow applications managed by Intune to invoke unmanaged applications based on URL protocol (iOS/iPadOS) or package name (Android). By default, Intune adds vital native applications to this list of exceptions. @@ -47,7 +47,7 @@ Within an Intune Application Protection Policy, setting **Allow app to transfer For a policy targeting iOS/iPadOS, you can configure data transfer exceptions by URL protocol. To add an exception, check the documentation provided by the developer of the app to find information about supported URL protocols. For more information about iOS/iPadOS data transfer exceptions, see [iOS/iPadOS app protection policy settings - Data transfer exemptions](app-protection-policy-settings-ios.md#data-transfer-exemptions). > [!NOTE] -> Microsoft does not have a method to manually find the URL protocol for creating app exceptions for third-party applications. +> Microsoft doesn't have a method to manually find the URL protocol for creating app exceptions for third-party applications. ## Android data transfer exceptions For a policy targeting Android, you can configure data transfer exceptions by app package name. You can check the **Google Play** store page for the app you would like to add an exception for to find the app package name. For more information about Android data transfer exceptions, see [Android app protection policy settings - Data transfer exemptions](app-protection-policy-settings-android.md#data-transfer-exemptions). diff --git a/memdocs/intune/apps/app-protection-policies-validate.md b/memdocs/intune/apps/app-protection-policies-validate.md index cacc72026ed..acef31ac7c5 100644 --- a/memdocs/intune/apps/app-protection-policies-validate.md +++ b/memdocs/intune/apps/app-protection-policies-validate.md @@ -8,7 +8,7 @@ keywords: author: Erikre ms.author: erikre manager: dougeby -ms.date: 02/27/2024 +ms.date: 01/06/2025 ms.service: microsoft-intune ms.subservice: apps ms.localizationpriority: medium diff --git a/memdocs/intune/apps/app-protection-policies.md b/memdocs/intune/apps/app-protection-policies.md index 11db27a5ad0..aa8fa6749ce 100644 --- a/memdocs/intune/apps/app-protection-policies.md +++ b/memdocs/intune/apps/app-protection-policies.md @@ -8,7 +8,7 @@ keywords: author: Erikre ms.author: erikre manager: dougeby -ms.date: 07/24/2024 +ms.date: 08/20/2024 ms.topic: how-to ms.service: microsoft-intune ms.subservice: apps @@ -190,7 +190,6 @@ To use these filters when assigning policies, browse to **Apps** > **App protect ### Device Management types - [!INCLUDE [android_device_administrator_support](../includes/android-device-administrator-support.md)] - **Unmanaged**: For iOS/iPadOS devices, unmanaged devices are any devices where either Intune MDM management or a 3rd party MDM/EMM solution doesn't pass the `IntuneMAMUPN` key. For Android devices, unmanaged devices are devices where Intune MDM management hasn't been detected. This includes devices managed by third-party MDM vendors. @@ -209,6 +208,11 @@ For iOS/iPadOS, for the Device Management type to be enforced to Intune managed - **IntuneMAMDeviceID** must be configured for all third-party and line-of-business MDM managed applications. The **IntuneMAMDeviceID** should be configured to the device ID token. For example, `key=IntuneMAMDeviceID, value={{deviceID}}`. For more information, see [Add app configuration policies for managed iOS/iPadOS devices](app-configuration-policies-use-ios.md). - If only the **IntuneMAMDeviceID** is configured, the Intune APP will consider the device as unmanaged. +> [!IMPORTANT] +> Starting with Intune's September (2409) service release, the **IntuneMAMUPN**, **IntuneMAMOID**, and **IntuneMAMDeviceID** app configuration values will be automatically sent to managed applications on Intune enrolled iOS devices for the following apps: Microsoft Excel, Microsoft Outlook, Microsoft PowerPoint, Microsoft Teams and Microsoft Word. Intune will continue to expand this list to include additional managed apps. +> +> If these values aren't configured correctly for iOS devices, there is a possibility of either the policy not getting delivered to the app or the wrong policy is delivered. For more information, see [Support tip: Intune MAM users on iOS/iPadOS userless devices may be blocked in rare cases](https://techcommunity.microsoft.com/blog/intunecustomersuccess/support-tip-intune-mam-users-on-iosipados-userless-devices-may-be-blocked-in-rar/4254335). + ## Policy settings To see a full list of the policy settings for iOS/iPadOS and Android, select one of the following links: diff --git a/memdocs/intune/apps/app-protection-policy-extensions.md b/memdocs/intune/apps/app-protection-policy-extensions.md index 1deccf0b21a..255e8174028 100644 --- a/memdocs/intune/apps/app-protection-policy-extensions.md +++ b/memdocs/intune/apps/app-protection-policy-extensions.md @@ -8,7 +8,7 @@ keywords: author: Erikre ms.author: erikre manager: dougeby -ms.date: 02/27/2024 +ms.date: 01/06/2025 ms.topic: conceptual ms.service: microsoft-intune ms.subservice: apps diff --git a/memdocs/intune/apps/app-protection-policy-settings-android.md b/memdocs/intune/apps/app-protection-policy-settings-android.md index 64d73ce8164..4f1626b965c 100644 --- a/memdocs/intune/apps/app-protection-policy-settings-android.md +++ b/memdocs/intune/apps/app-protection-policy-settings-android.md @@ -8,7 +8,7 @@ keywords: author: Erikre ms.author: erikre manager: dougeby -ms.date: 09/23/2024 +ms.date: 01/09/2025 ms.topic: conceptual ms.service: microsoft-intune ms.subservice: apps @@ -101,6 +101,8 @@ There are some exempt apps and platform services that Intune app protection poli |com.azure.authenticator |Azure Authenticator app, which is required for successful authentication in many scenarios. | |com.microsoft.windowsintune.companyportal |Intune Company Portal| |com.android.providers.contacts |Native contacts app | + |com.samsung.android.providers.contacts | Samsung contacts provider. Allowed for Samsung devices. | + |com.android.providers.blockednumber | Android Block number provider. Allowed for Android devices. | ### Conditional exemptions These apps and services are only allowed for data transfer to and from Intune-managed apps under certain conditions. @@ -115,6 +117,8 @@ There are some exempt apps and platform services that Intune app protection poli |com.android.documentsui|Android Document Picker|Allowed when opening or creating a file.| |com.google.android.documentsui |Android Document Picker (Android 10+)|Allowed when opening or creating a file.| + + For more information, see [Data transfer policy exceptions for apps](app-protection-policies-exception.md). ## Access requirements diff --git a/memdocs/intune/apps/app-protection-policy-settings-ios.md b/memdocs/intune/apps/app-protection-policy-settings-ios.md index b7ef9f6a44c..0c00c8c2b58 100644 --- a/memdocs/intune/apps/app-protection-policy-settings-ios.md +++ b/memdocs/intune/apps/app-protection-policy-settings-ios.md @@ -8,7 +8,7 @@ keywords: author: Erikre ms.author: erikre manager: dougeby -ms.date: 09/23/2024 +ms.date: 12/05/2024 ms.topic: conceptual ms.service: microsoft-intune ms.subservice: apps @@ -43,6 +43,9 @@ There are three categories of policy settings: *Data relocation*, *Access requir ## Data protection +> [!IMPORTANT] +> For apps that have updated to v19.7.6 or later for Xcode 15 and v20.2.1 or later for Xcode 16 of the SDK, screen capture block will be applied if you have configured **Send Org data to other apps** setting to a value other than "All apps". You can configure app configuration policy setting `com.microsoft.intune.mam.screencapturecontrol` = `Disabled` (**Apps** > **App configuration policies** > **Create** > **Managed apps** > under the **Settings** step, select **General configuration settings**) if you need to allow screen capture for your iOS devices. + ### Data Transfer | Setting | How to use | Default value | |------|----------|-------| @@ -184,7 +187,7 @@ By default, several settings are provided with pre-configured values and actions | **Min SDK version** | Specify a minimum value for the Intune SDK version.

*Actions* include:

To learn more about the Intune app protection policy SDK, see [Intune App SDK overview](../developer/app-sdk.md). As apps often have distinct Intune SDK version between them, create a policy with one min Intune SDK version targeting one app (for example, *Intune SDK version policy for Outlook*).

This entry can appear multiple times, with each instance supporting a different action.| | **Device model(s)** | Specify a semi-colon separated list of model identifier(s). These values aren't case sensitive.

*Actions* include:

For more information on using this setting, see [Conditional Launch actions](app-protection-policies-access-actions.md#ios-policy-settings). | | **Max allowed device threat level** | App protection policies can take advantage of the Intune-MTD connector. Specify a maximum threat level acceptable to use this app. Threats are determined by your chosen Mobile Threat Defense (MTD) vendor app on the end user device. Specify either *Secured*, *Low*, *Medium*, or *High*. *Secured* requires no threats on the device and is the most restrictive configurable value, while *High* essentially requires an active Intune-to-MTD connection.

*Actions* include:

**Note:** *Requires app to have Intune SDK version 12.0.15 or above.*

For more information on using this setting, see [Enable MTD for unenrolled devices](../protect/mtd-enable-unenrolled-devices.md). | -|**Primary MTD service** |If you have configured multiple Intune-MTD connectors, specify the primary MTD vendor app that should be used on the end user device.

**Values** include:

You must configure the setting “Max allowed device threat level” to use this setting.

There are no **Actions** for this setting.| +|**Primary MTD service** |If you have configured multiple Intune-MTD connectors, specify the primary MTD vendor app that should be used on the end user device.

**Values** include:

You must configure the setting "Max allowed device threat level" to use this setting.

There are no **Actions** for this setting.| |**Non-working time** |There is no value to set for this setting.

*Actions* include:

**Note**: This setting must only be configured if the tenant has been integrated with the **Working Time API**. For more information about integrating this setting with the **Working Time API**, see [Limit access to Microsoft Teams when frontline workers are off shift](/microsoft-365/frontline/flw-working-time). Configuring this setting without integrating with the Working Time API could result in accounts getting blocked due to missing working time status for the managed account associated with the application.

The following apps support this feature:

| diff --git a/memdocs/intune/apps/app-protection-policy-settings-log.md b/memdocs/intune/apps/app-protection-policy-settings-log.md index 30cd06847b8..491ed9ce281 100644 --- a/memdocs/intune/apps/app-protection-policy-settings-log.md +++ b/memdocs/intune/apps/app-protection-policy-settings-log.md @@ -8,7 +8,7 @@ keywords: author: Erikre ms.author: erikre manager: dougeby -ms.date: 02/27/2024 +ms.date: 01/06/2025 ms.topic: troubleshooting ms.service: microsoft-intune ms.subservice: apps diff --git a/memdocs/intune/apps/app-provisioning-profile-ios.md b/memdocs/intune/apps/app-provisioning-profile-ios.md index c7690d7a31e..bc8f0a9af8b 100644 --- a/memdocs/intune/apps/app-provisioning-profile-ios.md +++ b/memdocs/intune/apps/app-provisioning-profile-ios.md @@ -8,7 +8,7 @@ keywords: author: Erikre ms.author: erikre manager: dougeby -ms.date: 02/27/2024 +ms.date: 01/06/2025 ms.topic: how-to ms.service: microsoft-intune ms.subservice: apps diff --git a/memdocs/intune/apps/apps-add-android-for-work.md b/memdocs/intune/apps/apps-add-android-for-work.md index 09dcb113e07..6ba0fc567e2 100644 --- a/memdocs/intune/apps/apps-add-android-for-work.md +++ b/memdocs/intune/apps/apps-add-android-for-work.md @@ -8,7 +8,7 @@ keywords: author: Erikre ms.author: erikre manager: dougeby -ms.date: 07/23/2024 +ms.date: 01/15/2025 ms.topic: how-to ms.service: microsoft-intune ms.subservice: apps @@ -40,14 +40,15 @@ Managed Google Play is Google's enterprise app store and sole source of applicat To make it easier for you to configure and use Android Enterprise management, upon connecting your Intune tenant to Managed Google Play, Intune automatically adds five common Android Enterprise related apps to the Intune admin center. The five apps are follow: - **[Microsoft Intune](https://play.google.com/store/apps/details?id=com.microsoft.intune)** - Used for Android Enterprise fully managed scenarios. This app is automatically installed to fully managed devices during the device enrollment process. -- **[Microsoft Authenticator](https://play.google.com/store/apps/details?id=com.azure.authenticator)** - Helps you sign-in to your accounts if you use two-factor verification. This app is automatically installed to fully managed devices during the device enrollment process. +- **[Microsoft Authenticator](https://play.google.com/store/apps/details?id=com.azure.authenticator)** - Helps you sign-in to your accounts if you use two-factor verification. This app is automatically installed to fully managed and corporate-owned work profile devices during the device enrollment process. + - **[Intune Company Portal](https://play.google.com/store/apps/details?id=com.microsoft.windowsintune.companyportal)** - Used for App Protection Policies (APP) and Android Enterprise personally owned work profile scenarios. This app is automatically installed to fully managed devices during the device enrollment process. -- **[Managed Home Screen](https://play.google.com/store/apps/details?id=com.microsoft.launcher.enterprise)** - Used for Android Enterprise dedicated multi-app kiosk scenarios. IT admins should create an assignment to install this app on dedicated devices that are going to be used in multi-app kiosk scenarios. +- **[Managed Home Screen](https://play.google.com/store/apps/details?id=com.microsoft.launcher.enterprise)** - Used for both Android Enterprise dedicated multi-app kiosk and fully managed user affiliated device scenarios. IT admins should create an assignment to install this app on dedicated devices that are going to be used in multi-app kiosk scenarios. - **[Microsoft Launcher](https://play.google.com/store/apps/details?id=com.microsoft.launcher)** - Used for Android Enterprise fully managed scenarios. IT admins can create a policy to make the Microsoft Launcher the default launcher on fully managed devices and customize the home screen. For more information, see [Configure Microsoft Launcher](./configure-microsoft-launcher.md) >[!NOTE] ->When an end user enrolls their Android Enterprise fully managed device, the Intune Company Portal app is automatically installed and the application icon may be visible to the end user. If the end user attempts to launch the Intune Company Portal app, the end user will be redirected to the Microsoft Intune app and the Company Portal app icon will be subsequently hidden. ->Additionally, the Microsoft Intune and Authenticator apps will not be able to have an uninstall issued to them as they are crucial applications for multiple Android Enterprise enrollment scenarios. +>When an end user enrolls their Android Enterprise fully managed device, the Intune Company Portal app automatically installs on the device. The app icon might be visible to the end user. If the end user attempts to launch the Intune Company Portal app, the end user is redirected to the Microsoft Intune app, and the Company Portal app icon is subsequently hidden. +>Additionally, the Microsoft Intune and Authenticator apps won't be able to have an uninstall issued to them as they're crucial applications for multiple Android Enterprise enrollment scenarios. ## Before you start @@ -68,7 +69,7 @@ There are three types of apps that are available with Managed Google Play: ## Managed Google Play store apps > [!NOTE] -> Most newly-created items in Intune take on the scope tags of the creator. This is not the case for Managed Google Play Store apps. Admins can assign a scope tag to apply to all newly-synced Managed Google Play apps on the Managed Google Play connector pane. For more information, see [Connect your Intune Account to your Managed Google Play account](../enrollment/connect-intune-android-enterprise.md). +> Most newly created items in Intune take on the scope tags of the creator. This isn't the case for Managed Google Play Store apps. Admins can assign a scope tag to apply to all newly synced Managed Google Play apps on the Managed Google Play connector pane. For more information, see [Connect your Intune Account to your Managed Google Play account](../enrollment/connect-intune-android-enterprise.md). Browse and approve store apps in a view hosted within Intune. This view opens directly in the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) and doesn't require you to reauthenticate with a different account. ### Add a Managed Google Play store app directly in the Microsoft Intune admin center @@ -96,7 +97,7 @@ Browse and approve store apps in a view hosted within Intune. This view opens di There are two ways to add LOB apps to Managed Google Play: -1. Directly in the Microsoft Intune admin center - This allows you to add LOB apps by submitting just the app APK and a title, directly within Intune. This method does not require you to have a Google developer account and does not require you to pay the fee to register with Google as a developer. This method is simpler and has a significantly reduced number of steps, and makes LOB apps available for management in as little as ten minutes. +1. Directly in the Microsoft Intune admin center - This allows you to add LOB apps by submitting just the app APK and a title, directly within Intune. This method doesn't require you to have a Google developer account and doesn't require you to pay the fee to register with Google as a developer. This method is simpler and has a significantly reduced number of steps, and makes LOB apps available for management in as little as ten minutes. 1. In the Google Play Developer Console - If you have a Google developer account or want to configure advanced distribution features that are only available in the Google Play Developer Console (like adding additional app screenshots), you can use the [Google Play Developer Console](https://play.google.com/apps/publish). ### Managed Google Play private (LOB) app publishing directly in the Microsoft Intune admin center @@ -109,20 +110,20 @@ There are two ways to add LOB apps to Managed Google Play: 6. Click the **"+"** button at the lower right to add a new app. 7. Add an app **Title** and click **Upload APK** add the APK app package. > [!NOTE] - > - Your app's package name must be globally unique in Google Play (not just unique within your enterprise or Google Play Developer account). Otherwise, you will receive the **Upload a new APK file with a different package name** error. - > - Your app's APK must not be marked as debuggable. Otherwise, you will receive the **APK is marked as debuggable** error. + > - Your app's package name must be globally unique in Google Play (not just unique within your enterprise or Google Play Developer account). Otherwise, you'll receive the **Upload a new APK file with a different package name** error. + > - Your app's APK must not be marked as debuggable. Otherwise, you'll receive the **APK is marked as debuggable** error. 8. Click **Create**. 1. Click **Select** for the private app you want to sync.  1. Click **Sync** on the **App** pane to sync with the Managed Google Play service. > [!NOTE] - > Private apps may take several minutes to become available to sync. If the app does not appear the first time you perform a sync, wait a couple minutes, click the **Select** button for the private app you want to sync, and then initiate a new sync. + > Private apps may take several minutes to become available to sync. If the app doesn't appear the first time you perform a sync, wait a couple minutes, click the **Select** button for the private app you want to sync, and then initiate a new sync. -For more information about Managed Google Play private apps including a FAQ, see Google's support article: [https://support.google.com/googleplay/work/answer/9146439](https://support.google.com/googleplay/work/answer/9146439) +For more information about Managed Google Play private apps including an FAQ, see Google's support article: [https://support.google.com/googleplay/work/answer/9146439](https://support.google.com/googleplay/work/answer/9146439) >[!IMPORTANT] ->Private apps added using this method can never be made public. Only use this publishing option if you are sure that this app will always be private to your organization. +>Private apps added using this method can never be made public. Only use this publishing option if you're sure that this app will always be private to your organization. ### Managed Google Play private (LOB) app publishing using the Google Developer Console @@ -130,7 +131,7 @@ For more information about Managed Google Play private apps including a FAQ, see > Although this method is still supported, it’s recommended to publish apps directly in the Intune admin console. Apps published using the Google Developer Console will need to be selected and synced from the Intune admin console.  1. Sign in to the [Google Play Developer Console](https://play.google.com/apps/publish) with the same account you used to configure the connection between Intune and Android Enterprise. > [!NOTE] - > If you are signing in for the first time, you must register and pay a fee to become a member of the Google Developer program. + > If you're signing in for the first time, you must register and pay a fee to become a member of the Google Developer program. 1. In the console, add new application. For details, see Google's support doc: [Publish Private apps](https://support.google.com/googleplay/android-developer/answer/9874937). 1. You upload and provide information about your app in the same way as you publish any app to the Google Play store. However, you must specifically add your organization using the Google Play Console. For details, see Google's support doc [Publish to your own organization](https://support.google.com/googleplay/android-developer/answer/9874937#zippy=%2Cpublish-to-your-own-organization). > [!NOTE] @@ -149,7 +150,7 @@ For more information about Managed Google Play private apps including a FAQ, see Managed Google Play web links are installable and manageable just like other Android apps. When installed on a device, they will appear in the user's app list alongside the other apps they have installed. When selected, they will launch in the device's browser. > [!NOTE] -> Web links pushed down from Managed Google Play will not open in the corporate context of Microsoft Edge if you have configured your Intune application protection policy setting **Receive data from other apps** to be **Policy managed apps**. When a web link is pushed down through Managed Google Play, it’s not recognized as a MAM-managed app, which is why Microsoft Edge will open in the personal context or InPrivate mode if the user is not signed in with a personal account. For related information, see [Android app protection policy settings in Microsoft Intune](../apps/app-protection-policy-settings-android.md). +> Web links pushed down from Managed Google Play won't open in the corporate context of Microsoft Edge if you have configured your Intune application protection policy setting **Receive data from other apps** to be **Policy managed apps**. When a web link is pushed down through Managed Google Play, it’s not recognized as a MAM-managed app, which is why Microsoft Edge will open in the personal context or InPrivate mode if the user isn't signed in with a personal account. For related information, see [Android app protection policy settings in Microsoft Intune](../apps/app-protection-policy-settings-android.md). Web links will open with Microsoft Edge or any other browser app you choose to deploy. Be sure to deploy at least one browser app to devices in order for web links to be able to open properly. However, all of the **Display** options available for web links (full screen, standalone, and minimal UI) will only work with the Chrome browser. @@ -163,11 +164,11 @@ To create a Managed Google Play web link: 6. Click the **"+"** button at the lower right to add a new app. 7. Add an app **Title**, the web app **URL**, select how the app should be displayed, and select an app icon. 8. Click **Create**. -9. Close the Managed Google Play pane if you are done adding apps. +9. Close the Managed Google Play pane if you're done adding apps. 1. Click **Select** and **Sync** on the **App app** pane to sync with the Managed Google Play service. > [!NOTE] - > Web apps may take several minutes to become available to sync. If the app does not appear the first time you perform a sync, wait a couple minutes, click the **Select** button for the web app you want to sync, and then initiate a new sync. + > Web apps may take several minutes to become available to sync. If the app doesn't appear the first time you perform a sync, wait a couple minutes, click the **Select** button for the web app you want to sync, and then initiate a new sync. ## Use collections in Managed Google Play @@ -186,9 +187,9 @@ To create a Managed Google Play collection: 8. When you're done editing, click **save**. A popup box will appear asking you to confirm. 9. Click **save** on the popup box. -It may take some time after editing for the end user to see the changes made to their collections. If the changes haven't finished syncing yet, the end user may see an empty screen with **no results** text if they open the Play Store app. End users can still use the search bar to search for and download apps, even if the screen appears. Once at least one collection is created, all existing approved Managed Google Play apps that are not in any other collection will appear in a default **My work app** collection. Apps approved after initial collection creation will have no collection assignment and will not be automatically added to the **My work app** collection. +It may take some time after editing for the end user to see the changes made to their collections. If the changes haven't finished syncing yet, the end user may see an empty screen with **no results** text if they open the Play Store app. End users can still use the search bar to search for and download apps, even if the screen appears. Once at least one collection is created, all existing approved Managed Google Play apps that aren't in any other collection will appear in a default **My work app** collection. Apps approved after initial collection creation will have no collection assignment and won't be automatically added to the **My work app** collection. -Apps that are not part of any collection will not appear on the end users' Play Store front page. However, the end user can still search for them and install in the Play Store. You can add the same Managed Google Play app to multiple collections. Each collection can contain up to 100 apps. For more information on collections, see [Google's documentation](https://support.google.com/googleplay/work/answer/9146438). +Apps that aren't part of any collection won't appear on the end users' Play Store front page. However, the end user can still search for them and install in the Play Store. You can add the same Managed Google Play app to multiple collections. Each collection can contain up to 100 apps. For more information on collections, see [Google's documentation](https://support.google.com/googleplay/work/answer/9146438). ## Sync a Managed Google Play app with Intune @@ -204,7 +205,7 @@ If you have approved an app from the store and don't see it in the **Apps** work When the app is displayed in the **App licenses** node of the **Apps** workload pane, you can [assign it just as you would assign any other app](./apps-deploy.md) by assigning the app to groups of users. -After you assign the app, it is installed (or available for install) on the devices of the users that you've targeted. The user of the device is not asked to approve the installation. For more information about Android Enterprise personally owned work profile devices, see [Set up enrollment of Android Enterprise personally owned work profile devices](../enrollment/android-work-profile-enroll.md). +After you assign the app, it is installed (or available for install) on the devices of the users that you've targeted. The user of the device isn't asked to approve the installation. For more information about Android Enterprise personally owned work profile devices, see [Set up enrollment of Android Enterprise personally owned work profile devices](../enrollment/android-work-profile-enroll.md). On both work profile devices and corporate-owned devices, you can use Intune to make apps available for device groups through the Managed Google Play store. Previously, apps could only be made available to user groups. Additionally, you can use Intune to configure the app update priority on devices with a work profile. Also, you can use Intune to make required apps available for users through the Managed Google Play store. @@ -215,29 +216,29 @@ On both work profile devices and corporate-owned devices, you can use Intune to [Android Enterprise fully managed devices](../enrollment/android-fully-managed-enroll.md) are corporate-owned devices associated with a single user and used exclusively for work and not personal use. Users on fully managed devices can get their available company apps from the Managed Google Play app on their device. -By default, an Android Enterprise fully managed device will not allow employees to install any apps that are not approved by the organization. Also, employees will not be able to remove any installed apps against policy. If you wish to allow users to access the full Google Play store to install apps rather than only having access to the approved apps in Managed Google Play store, you can set the **Allow access to all apps in Google Play store** to **Allow**. With this setting, the user can access all the apps in the Google Play store using their corporate account, however purchases may be limited. You can remove the limited purchases restriction by allowing users to add new accounts to the device. Doing so will enable end users to have the ability to purchase apps from the Google Play store using personal accounts, as well as conduct in-app purchases. For more information, see [Android Enterprise device settings to allow or restrict features using Intune](../configuration/device-restrictions-android-for-work.md). +By default, an Android Enterprise fully managed device won't allow employees to install any apps that aren't approved by the organization. Also, employees won't be able to remove any installed apps against policy. If you wish to allow users to access the full Google Play store to install apps rather than only having access to the approved apps in Managed Google Play store, you can set the **Allow access to all apps in Google Play store** to **Allow**. With this setting, the user can access all the apps in the Google Play store using their corporate account, however purchases may be limited. You can remove the limited purchases restriction by allowing users to add new accounts to the device. Doing so will enable end users to have the ability to purchase apps from the Google Play store using personal accounts, as well as conduct in-app purchases. For more information, see [Android Enterprise device settings to allow or restrict features using Intune](../configuration/device-restrictions-android-for-work.md). > [!NOTE] -> The Microsoft Intune app, the Microsoft Authenticator app, and the Company Portal app will be installed as required apps onto all fully managed devices during onboarding. Having these apps automatically installed provides Conditional Access support, and Microsoft Intune app users can see and resolve compliance issues. +> The Microsoft Intune app, Microsoft Authenticator app, and the Company Portal app are installed as required apps on all fully managed and corporate-owned work profile devices during onboarding. Having these apps automatically installed provides Conditional Access support, and Microsoft Intune app users can see and resolve compliance issues. ## Update a Managed Google Play app -By default, Managed Google Play apps will not update unless the following conditions are met: +By default, Managed Google Play apps won't update unless the following conditions are met: - The device is connected to Wi-Fi - The device is charging -- The device is not actively being used -- The app to be updated is not running on the foreground +- The device isn't actively being used +- The app to be updated isn't running on the foreground For more information, see the [Manage App Updates](https://support.google.com/googleplay/work/answer/9350374?hl=en) documentation from Google. You can choose to configure the Wi-Fi requirement for dedicated, fully managed and corporate-owned work profile devices by configuring app auto-updates in [device configurations policies](../configuration/device-restrictions-android-for-work.md). -For dedicated, fully managed, corporate-owned, and personally-owned work profile devices, you can choose an app update mode when an app is assigned to groups. The update modes available are: +For dedicated, fully managed, corporate-owned, and personally owned work profile devices, you can choose an app update mode when an app is assigned to groups. The update modes available are: - **Default**: The app's updates are subject to default conditions (described above). - **High Priority**: The app will update as soon as possible from when a new update is released, disregarding all of the default conditions. This may be disruptive for some users since the update can occur while the device is being used. -- **Postponed**: When the app receives a new update, a 90-day waiting period is triggered. After 90 days, the app is updated to the newest version available, even if that version was not the update that triggered the waiting period. Note that the 90-day window is not configurable. To terminate the waiting period early, change the update mode to either **Default** or **High Priority**. +- **Postponed**: When the app receives a new update, a 90-day waiting period is triggered. After 90 days, the app is updated to the newest version available, even if that version wasn't the update that triggered the waiting period. Note that the 90-day window isn't configurable. To terminate the waiting period early, change the update mode to either **Default** or **High Priority**. To edit the app update mode: @@ -253,7 +254,7 @@ To edit the app update mode: Android Enterprise requires you to approve apps in the Managed Google Play web console before you sync them with Intune and assign them to your users. Because Android Enterprise allows you to silently and automatically push the apps to users' devices, you must accept the app permissions on behalf of all your users. Users don't see any app permissions when they install the apps, so it's important that you understand the permissions. -When an app developer updates permissions with a new version of the app, the permissions are not automatically accepted even if you approved the previous permissions. Devices that run the previous version of the app can still use it. However, the app is not upgraded until the new permissions are approved. Devices without the app installed do not install the app until you approve the app's new permissions. +When an app developer updates permissions with a new version of the app, the permissions aren't automatically accepted even if you approved the previous permissions. Devices that run the previous version of the app can still use it. However, the app isn't upgraded until the new permissions are approved. Devices without the app installed don't install the app until you approve the app's new permissions. ### Update app permissions @@ -262,7 +263,7 @@ Periodically visit the Managed Google Play console to check for new permissions. 1. Go to [Google Play](https://play.google.com/work). 2. Sign in with the Google account that you used to publish and approve the apps. 3. Select the **Updates** tab, and check to see whether any apps require an update. - Any listed apps require new permissions and are not assigned until they are applied. + Any listed apps require new permissions and aren't assigned until they're applied. Alternatively, you can configure Google Play to automatically reapprove app permissions on a per-app basis. @@ -293,7 +294,7 @@ You can enable an Android Enterprise system app for [Android Enterprise dedicate ## MAM policies with AE dedicated devices enrolled with Microsoft Entra shared mode -Intune-managed Android Enterprise dedicated devices enrolled with Microsoft Entra shared mode can receive MAM policies and can be targeted separately from other Android enterprise devices. Intune-managed Android Enterprise dedicated devices that are not in Shared Device Mode will continue to be blocked from getting MAM. For more information about Intune-managed Android Enterprise dedicated devices enrolled with Microsoft Entra shared mode, see [Android Enterprise dedicated devices](../fundamentals/deployment-guide-enrollment-android.md#android-enterprise-dedicated-devices). +Intune-managed Android Enterprise dedicated devices enrolled with Microsoft Entra shared mode can receive MAM policies and can be targeted separately from other Android enterprise devices. Intune-managed Android Enterprise dedicated devices that aren't in Shared Device Mode will continue to be blocked from getting MAM. For more information about Intune-managed Android Enterprise dedicated devices enrolled with Microsoft Entra shared mode, see [Android Enterprise dedicated devices](../fundamentals/deployment-guide-enrollment-android.md#android-enterprise-dedicated-devices). ## Next steps diff --git a/memdocs/intune/apps/apps-add-built-in.md b/memdocs/intune/apps/apps-add-built-in.md index 7ec044d3a68..829d748e931 100644 --- a/memdocs/intune/apps/apps-add-built-in.md +++ b/memdocs/intune/apps/apps-add-built-in.md @@ -8,7 +8,7 @@ keywords: author: Erikre ms.author: erikre manager: dougeby -ms.date: 12/01/2023 +ms.date: 11/21/2024 ms.topic: how-to ms.service: microsoft-intune ms.subservice: apps diff --git a/memdocs/intune/apps/apps-add.md b/memdocs/intune/apps/apps-add.md index 93aabf04b49..c896007612a 100644 --- a/memdocs/intune/apps/apps-add.md +++ b/memdocs/intune/apps/apps-add.md @@ -202,6 +202,9 @@ When you add an app to Intune, you're given the option to select the category yo - To edit a category, select the ellipsis (**...**) next to the category, and then select **Pin to dashboard** or **Delete**. 4. Select **Create**. +> [!NOTE] +> The maximum number of App Categories you can create is 200. + ## Apps that are added automatically by Intune Previously, Intune contained a number of built-in apps that you could quickly assign. Based on Intune customer feedback, we removed this list, and the built-in apps are no longer displayed. However, if you have already assigned any built-in apps, the apps remain visible in the list of apps. You can continue to assign the apps as required. diff --git a/memdocs/intune/apps/apps-company-portal-macos.md b/memdocs/intune/apps/apps-company-portal-macos.md index 3740e1a6167..d43df4b79c1 100644 --- a/memdocs/intune/apps/apps-company-portal-macos.md +++ b/memdocs/intune/apps/apps-company-portal-macos.md @@ -8,7 +8,7 @@ keywords: author: Erikre ms.author: erikre manager: dougeby -ms.date: 12/01/2023 +ms.date: 11/21/2024 ms.topic: how-to ms.service: microsoft-intune ms.subservice: apps diff --git a/memdocs/intune/apps/apps-configure-chrome-android.md b/memdocs/intune/apps/apps-configure-chrome-android.md index 20c0c1e5271..9034d157981 100644 --- a/memdocs/intune/apps/apps-configure-chrome-android.md +++ b/memdocs/intune/apps/apps-configure-chrome-android.md @@ -8,7 +8,7 @@ keywords: author: Erikre ms.author: erikre manager: dougeby -ms.date: 12/01/2023 +ms.date: 11/21/2024 ms.topic: how-to ms.service: microsoft-intune ms.subservice: apps diff --git a/memdocs/intune/apps/apps-deploy-gcc-dod.md b/memdocs/intune/apps/apps-deploy-gcc-dod.md index c244cc4e2e1..d32e6c9ef93 100644 --- a/memdocs/intune/apps/apps-deploy-gcc-dod.md +++ b/memdocs/intune/apps/apps-deploy-gcc-dod.md @@ -6,7 +6,7 @@ keywords: author: Erikre ms.author: erikre manager: dougeby -ms.date: 12/01/2023 +ms.date: 11/18/2024 ms.topic: how-to ms.service: microsoft-intune ms.subservice: apps diff --git a/memdocs/intune/apps/apps-deploy.md b/memdocs/intune/apps/apps-deploy.md index c28f632a85d..38ef14ef911 100644 --- a/memdocs/intune/apps/apps-deploy.md +++ b/memdocs/intune/apps/apps-deploy.md @@ -8,7 +8,7 @@ keywords: author: Erikre ms.author: erikre manager: dougeby -ms.date: 06/27/2024 +ms.date: 01/09/2025 ms.topic: how-to ms.service: microsoft-intune ms.subservice: apps @@ -39,7 +39,7 @@ ms.collection: After you've [added an app](apps-add.md) to Microsoft Intune, you can assign the app to users and devices. It's important to note that you can deploy an app to a device whether or not the device is managed by Intune. > [!NOTE] -> The **Available for enrolled devices** deployment intent is supported for **user groups** and **device groups** when targeting Android Enterprise fully managed devices (COBO) and Android Enterprise corporate-owned personally-enabled (COPE) devices. +> The **Available for enrolled devices** deployment intent is supported for **user groups** and **device groups** when targeting Android Enterprise fully managed devices (COBO) and Android Enterprise corporate-owned personally enabled (COPE) devices. ## Options when assigning managed apps @@ -64,7 +64,7 @@ The following table lists the various options when *assigning* apps to users and > > For almost all app types and platforms, *Available assignments* are only valid when assigning to user groups, not device groups. Win32 apps can be assigned to either user or device groups. > -> If managed Google Play pre-production track apps are assigned as required on Android Enterprise personally-owned work profile devices, they will not install on the device. To work around this, create two identical user groups and assign the pre-production track as "available" to one and "required" to the other. The result will be that the pre-production track successfully deploys to the device. +> If managed Google Play preproduction track apps are assigned as required on Android Enterprise personally owned work profile devices, they won't install on the device. To work around this, create two identical user groups and assign the preproduction track as "available" to one and "required" to the other. The result will be that the preproduction track successfully deploys to the device. ## Assign an app @@ -85,10 +85,10 @@ The following table lists the various options when *assigning* apps to users and > - To configure what happens to managed apps when devices are no longer managed, you can select the intended setting under **Uninstall on device removal**. For more information, see [App uninstall setting for iOS/iPadOS managed apps](apps-deploy.md#app-uninstall-setting-for-ios-managed-apps). > - If you have created an iOS/iPadOS VPN profile that contains per-app VPN settings, you can select the VPN profile under **VPN**. When the app is run, the VPN connection is opened. For more information, see [VPN settings for iOS/iPadOS devices](../configuration/vpn-settings-ios.md). > - To configure whether a required iOS/iPadOS app is installed as a removable app by end users, you can select the setting under **Install as removable**. - > - To configure a way to prevent the iCloud backup of the managed iOS/iPadOS app, you can click on one of the following settings after adding a group assignment - VPN, or Uninstall on device removal, or Install as removable. Then, configure the setting called Prevent iCloud app backup. For more information, see [Prevent iCloud app backup setting for iOS/iPadOS and macOS apps](#prevent-icloud-app-backup-setting-for-iosipados-and-macos-apps). + > - To configure a way to prevent the iCloud backup of the managed iOS/iPadOS app, you can select on one of the following settings after adding a group assignment - VPN, or Uninstall on device removal, or Install as removable. Then, configure the setting called Prevent iCloud app backup. For more information, see [Prevent iCloud app backup setting for iOS/iPadOS and macOS apps](#prevent-icloud-app-backup-setting-for-iosipados-and-macos-apps). > > **For macOS apps only**: - > - To configure a way to prevent the iCloud backup of the managed macOS app, you can click on one of the following settings after adding a group assignment - VPN, or Uninstall on device removal, or Install as removable. Then, configure the setting called Prevent iCloud app backup. For more information, see [Prevent iCloud app backup setting for iOS/iPadOS and macOS apps](#prevent-icloud-app-backup-setting-for-iosipados-and-macos-apps). + > - To configure a way to prevent the iCloud backup of the managed macOS app, you can select on one of the following settings after adding a group assignment - VPN, or Uninstall on device removal, or Install as removable. Then, configure the setting called Prevent iCloud app backup. For more information, see [Prevent iCloud app backup setting for iOS/iPadOS and macOS apps](#prevent-icloud-app-backup-setting-for-iosipados-and-macos-apps). > > **For Android apps only**: > - If you deploy an Android app as **Available with or without enrollment**, reporting status will only be available on enrolled devices. @@ -135,6 +135,8 @@ The information in the following table can help you understand the resulting int |User Uninstall|Device Required|Both exist, Intune resolves Required| |User Uninstall|Device Uninstall|Both exist, Intune resolves Uninstall| |Device Required|Device Uninstall|Required| +|Device Required|Device Available|Required and Available| +|Device Available|Device Uninstall|Uninstall| |User Required and Available|User Available|Required and Available| |User Required and Available|User Uninstall|Required and Available| |User Required and Available|Device Required|Both exist, Required and Available @@ -148,10 +150,10 @@ The information in the following table can help you understand the resulting int > [!NOTE] > For managed iOS store apps only, when you add these apps to Microsoft Intune and assign them as **Required**, the apps are automatically created with both **Required** and **Available** intents.

> iOS Store apps (not iOS/iPadOS VPP apps) that are targeted with required intent will be enforced on the device at the time of the device check-in and will also show in the Company Portal app.

-> When conflicts occur in **Uninstall on device removal** setting, the app is not removed from the device when the device is no longer managed. +> When conflicts occur in **Uninstall on device removal** setting, the app isn't removed from the device when the device is no longer managed. > [!NOTE] -> Apps deployed as Required to corporate-owned work profile and corporate-owned fully managed devices cannot be uninstalled manually by the user. +> Apps deployed as Required to corporate-owned work profile and corporate-owned fully managed devices can't be uninstalled manually by the user. ## Managed Google Play app deployment to unmanaged devices diff --git a/memdocs/intune/apps/apps-monitor.md b/memdocs/intune/apps/apps-monitor.md index 89ea6267ae6..3e53853364e 100644 --- a/memdocs/intune/apps/apps-monitor.md +++ b/memdocs/intune/apps/apps-monitor.md @@ -8,7 +8,7 @@ keywords: author: Erikre ms.author: erikre manager: dougeby -ms.date: 09/17/2024 +ms.date: 11/18/2024 ms.topic: how-to ms.service: microsoft-intune ms.subservice: apps @@ -60,7 +60,7 @@ The **Essentials** section provides the following information about the app if a | **Operating system** | The app operating system (Windows, iOS/iPadOS, Android, and so on) | | **Version** | If applicable, the version number of the app | | **MAM SDK enabled** | If applicable, whether the app uses the Intune MAM SDK (**Yes** or **No**) | -| **Created** | The date and time when this revision was created **Note**: This date value is updated when an IT admin changes app metadata, such as changing the app category or app description. | +| **Created** | The date and time when this revision was created **Note**: This date value is updated when an admin changes app metadata, such as changing the app category or app description. | | **Assigned** | Whether the app has been assigned (**Yes** or **No**) | **App package file** | If applicable, the app package file name | @@ -74,7 +74,7 @@ The graphs show the number of apps for the following status: | **Not Installed** | The number of apps not installed | | **Failed** | The number of failed installations | | **Install Pending** | The number of apps that are in the process of being installed | -| **Not Applicable** | The number of apps for which status is not applicable | +| **Not Applicable** | The number of apps for which status isn't applicable | > [!NOTE] > Be aware that Android LOB apps (.APK) deployed as **Available with or without enrollment** only report app installation status for enrolled devices. App installation status is not available for devices that are not enrolled in Intune. @@ -108,6 +108,54 @@ A user status list is shown when you select **User install status** in the **Mon | **Failures** | The number of failed app installations for the user | | **Not installed** | The number of apps not installed by the user | +## App installation error reporting + +Additional error details are available for Line of Business (LOB) apps on Android Open Source Project (AOSP) devices. You can view installation error codes for LOB apps in Intune. + +### LOB apps on AOSP devices + +The following table provides addition installation error code details for LOB apps on AOSP devices: + +| Error code | Error string | Retry automatically | Additional information | +|---|---|---|---| +| 0x87D54FB0 | Couldn't install the app because the user didn't allow it or accept permissions. | Yes | Ask the end user to accept any installation request when prompted. | +| 0x87D54FB1 | The operating system couldn't install the app. | No | The Android system failed to install the app. | +| 0x87D54FB2 | The operating system blocked installation. | Yes | A device policy or the Android package verifier may have blocked the operation. | +| 0x87D54FB3 | Either the user or the system stopped the installation. | Yes | The end user may have declined a permission request or is missing permissions. The OS might also block the APK for security reasons. For example, the APK could have been marked as "dangerous" by Google Play Protect. | +| 0x87D54FB4 | Couldn't install the app because it's corrupt or not valid. | No | The Android system detected the APK as being invalid. This error could have occurred for several reasons. For example, the APK isn't signed, or the package manifest is missing or is malformed. Upload a new APK. Check that the APK wasn't corrupted before upload. | +| 0x87D54FB5 | Installation failed. | No | | +| 0x87D54FB6 | Couldn't install the app because it conflicts with the version of the app already on the device. Remove the existing app first. | Yes | The conflict could be for a variety of reasons. For example, the package on the device could have a different signature than the one being installed. If the policy is intended to upgrade an existing application, sign the upgraded version with the same certificate used for the original app. If not, uninstall the existing app before deploying the new one. Or, there could be an existing package that defines a permission that the installing app also defines. In that case, the OS rejects the installation because certain permissions can only be owned by one app. Uninstall the existing application for the policy to succeed. | +| 0x87D54FB7 | Install failed. Insufficient storage space on device. | Yes | Free up space on the device. | +| 0x87D54FB8 | Installation failed because this app won't work with the device. | No | Upload a new APK that is compatible with the device architecture and SDK version running on the device, or upgrade the device. | +| 0x87D54FB9 | Installation failed because it took too long. | Yes | | +| 0x87D54FBA | Installation failed because it took too long. | No | | +| 0x87D54FBB | Couldn't uninstall the app. | No | | +| 0x87D55014 | Couldn't download the app. | Yes | A generic download failure occurred. | +| 0x87D55015 | Couldn't download the app because there's not enough room on the device. | Yes | Free up space on the device. | +| 0x87D55016 | Couldn't download the app because the service gave a bad response. | Yes | | +| 0x87D55017 | Couldn't download the app because it was too large. | No | The admin uploaded an APK that exceeded the allowable download size of 2GB. Upload a smaller APK. | +| 0x87D55018 | Couldn't download the app because there was no network connection. | Yes | The download resumes when the network resumes. | +| 0x87D55019 | Couldn't download the app because of a network error. | Yes | The download failed due to an unspecified network error. The admin may have a firewall restriction, or something else is blocking the network. The admin could temporarily enroll the device using a different Wi-Fi network, which may allow enrollment SCEP certificates to be installed and more secure firewall rules to take effect. | +| 0x87D5501A | Couldn't download the app. | No | Confirm the network connection and sufficient bandwidth. Additionally, confirm nothing is interfering with network traffic. | +| 0x87D5501B | Couldn't download the app. Contact Microsoft Intune support and include the error code. | No | The app couldn't be downloaded. Contact Microsoft Intune support and include the error code. | +| 0x87D5501C | Couldn't download the app because the downloaded file couldn't be found. | No | The downloaded content was corrupted or deleted before it was installed. The downloaded app files were removed before the app could install. Make sure the app is installed immediately after downloading. Ask the end user to accept the installation request when prompted. | +| 0x87D5501D | Couldn't download the app because of an input/output error. | Yes | | +| 0x87D5501E | Couldn't download the app because it took too long. | Yes | If a download takes more than 8 hours, Intune cancels and retries the download. | +| 0x87D5501F | The downloaded app couldn't be validated. | Yes | The hash code of the downloaded content doesn't equal the hash code of the content from the policy. There are multiple reasons this could occur. The OS may not support encryption/decryption. In this case, you should try updating the OS to latest version. Alternatively, an intermittent issue occurred which may have corrupted the download. Lastly, a less likely scenario where this error occurs is due to a machine in the middle (MITM) attack. | +| 0x87D55078 | Couldn't download the app because Intune had an error. | Yes | | +| 0x87D55079 | Couldn't download the app because of a network error. | Yes | A generic HTTP failure occurred. | +| 0x87D5507A | Couldn't download the app because it doesn't seem to exist or it isn't assigned to this device. | No | While the policy was being applied, the policy was removed by the admin. | +| 0x87D5507B | Couldn't download the app because Intune had an error. | Yes | | +| 0x87D5507C | Couldn't download the app because Intune had an error. | Yes | | +| 0x87D5507D | Couldn't download the app because Intune had an error. | Yes | | +| 0x87D550DC | The uploaded app is missing the versionCode property. | No | The versionCode is missing from the uploaded APK. For more information on versionCode, see Android documentation. | +| 0x87D550DD | The uploaded app is missing the minSdkVersion value. | No | Ensure the android:minSdkVersion parameter is specified in the APK manifest. | +| 0x87D550DE | The policy is missing the minSdkVersion value. | No | If the admin creates the policy in the admin portal, there's a requirement that the admin specifies what the minimum SDK version the policy supports. If the admin creates the policy by Graph, this property isn't always required. If this parameter is missing, this exception is thrown. | +| 0x87D550DF | Couldn't uninstall this app because there's another policy to install the same app. | No | If you have two policies that target the same package and version, but one is an install and one is an uninstall, the install is applied and the uninstall is marked as a conflict. | +| 0x87D550E0 | Couldn't install this app because there's another policy to install a newer version of the same app. | No | If there is more than one install policy for the same package but with different versions, the policy with the highest package version takes priority. Remove the conflicting policy. | +| 0x87D550E1 | Couldn't find the app on the device. Intune will try to reinstall it. | Yes | Data indicates that the install policy was previously applied successfully (package was installed), but the package isn't found on the device anymore. The end user shouldn't be able to uninstall any required apps, so this scenario is less likely. | +| 0x87D550E2 | Intune will try to uninstall the app. | Yes | This error may happen if the end user manually reinstalled an app that was supposed to be uninstalled. This error is unlikely to persist. | + ## Next steps - To learn more about working with your Intune data, see [Use the Intune Data Warehouse](../developer/reports-nav-create-intune-reports.md). diff --git a/memdocs/intune/apps/apps-supported-intune-apps.md b/memdocs/intune/apps/apps-supported-intune-apps.md index 551001ff9a1..a6194468ccc 100644 --- a/memdocs/intune/apps/apps-supported-intune-apps.md +++ b/memdocs/intune/apps/apps-supported-intune-apps.md @@ -6,7 +6,7 @@ keywords: author: Erikre ms.author: erikre manager: dougeby -ms.date: 10/31/2024 +ms.date: 11/05/2024 ms.topic: conceptual ms.service: microsoft-intune ms.subservice: apps @@ -66,6 +66,8 @@ The below apps support the Core Intune App Protection Policy settings and are al |Microsoft Azure|[iOS](https://apps.apple.com/app/microsoft-azure/id1219013620)|✔|No settings|✖|N/A|✖|✖|N/A|✖| |Microsoft Copilot|[Android](https://play.google.com/store/apps/details?id=com.microsoft.copilot)|✔|No settings|✖|N/A|✖|✖|N/A|✖| |Microsoft Copilot|[iOS](https://apps.apple.com/us/app/microsoft-copilot/id6472538445)|✔|No settings|✔ Supported for v28.1.420324001 or later|N/A|✖|✖|N/A|✖| +|Microsoft Designer|[Android](https://play.google.com/store/apps/details?id=com.microsoft.designer&hl=en_IN)|✔|No settings|✔|N/A|✔|✔|✔|✖| +|Microsoft Designer|[iOS](https://apps.apple.com/us/app/microsoft-designer/id6448308247)|✔|No settings|✔|N/A|✔|✔|✔|✖| |Microsoft Edge|[Android](https://play.google.com/store/apps/details?id=com.microsoft.emmx)|✔|✔ see [Edge app config](manage-microsoft-edge.md)|✔|N/A|N/A|N/A|✔|✔ Supported for v125.0.2535.96 or later| |Microsoft Edge|[iOS](https://apps.apple.com/us/app/microsoft-edge/id1288723196)|✔|✔ see [Edge app config](manage-microsoft-edge.md)|✔|N/A|N/A|N/A|✔|✔ Supported for v126.2592.56 or later| |Microsoft Excel|[Android](https://play.google.com/store/apps/details?id=com.microsoft.office.excel)|✔|No settings|✔|N/A|✖|✖|✔|✖| @@ -193,7 +195,6 @@ The following apps support the core Intune App Protection Policy settings. Apps | :::no-loc text="Fuze Mobile for Intune":::

Partner app - Fuze Mobile for Intune icon | Fuze Mobile for Intune allows end users to communicate using voice calling, video meetings, contact center, chat messaging, and content sharing. Admins can deploy Fuze Mobile securely and at scale in a BYOD context. Fuze Mobile for Intune requires both a Fuze account and a Microsoft managed environment. | [Google Play link (Android)](https://play.google.com/store/apps/details?id=com.fuze.fuzeapp),
[App Store link (iOS)](https://apps.apple.com/app/fuze-mobile/id1160444971) | | :::no-loc text="Global Relay":::

Partner app - Global Relay icon | Put compliance at the heart of your communication with one powerful app. Global Relay is an enterprise unified communication platform purpose-built for financial and other regulated industries to meet collaboration, compliance, privacy, and security requirements.

Global Relay supports BYOD and corporate programs, ensuring compliant communication with customers, colleagues, and industry peers via text, voice, WhatsApp, and other preferred channels.

The Global Relay App is available for mobile, desktop, and web. And, Global Relay is fully integrated with Microsoft Intune SDK to provide MDM/MAM policy control for IT Administrators.

NOTE: You must be a Global Relay customer or partner to use this app. | [Google Play link (Android)](https://play.google.com/store/apps/details?id=com.globalrelay.message.intune),
[App Store link (iOS)](https://apps.apple.com/app/global-relay/id576031737) | | :::no-loc text="Goodnotes 6":::

Partner app - Goodnotes 6 icon | Goodnotes 6 is a powerful note-taking app designed to provide a seamless and natural handwriting experience on digital paper. This comprehensive solution combines the simplicity of handwriting, the power of digital tools, and advanced AI features to enhance productivity and organization. Whether you're in a meeting, on a call, or brainstorming, Goodnotes keeps your ideas organized and accessible. | [App Store link (iOS)](https://apps.apple.com/us/app/goodnotes-6/id1444383602) | -| :::no-loc text="Groupdolists":::

Partner app - Groupdolists icon | Groupdolists helps to coordinates incident response teams, whether corporate or public sector, in a single organization or across multiple organizations. Groupdolists creates a common operating picture between all responders, wherever they are, and synchronizes their efforts in real time.

Benefits include the following:

  • Groupdolists brings emergency (and everyday) operating procedures to interactive life.
  • Groupdolists pushes task lists to response teams, regardless of their location or device, instantly synchronizing what needs to be done and by whom, as well as confirming completed tasks in chronological order.
  • Groupdolists increases transparency, provides greater accountability, and offers a "leadership view" for those who need to see but not touch.
  • Groupdolists instantly synchronizes not just tasks, but photos, videos, links, comments, and documents to all team members. Everything you use is available for reference and action.
  • Groupdolists provides complete after-action documentation in both PDF and Excel formats.
| [Google Play link (Android)](https://play.google.com/store/apps/details?id=com.groupdolists.android&hl=en_CA&gl=US) | | :::no-loc text="HCSS Field: Time, cost, safety":::

Partner app - HCSS Field: Time, cost, safety icon | HCSS Field is a mobile app for heavy civil construction. It is designed to replace paper-based processes with digital solutions. It integrates with the HCSS software suite to streamline field operations, project management, safety, and team communication. | [App Store link (iOS)](https://apps.apple.com/app/hcss-field-time-cost-safety/id720784422) | | :::no-loc text="HCSS Plans: Revision control":::

Partner app - HCSS Plans: Revision control icon | HCSS Plans is a collaborative app for heavy civil construction. It allows teams to work with the latest project plans and documents, enabling seamless teamwork, smart revision control, and instant document access. | [App Store link (iOS)](https://apps.apple.com/app/hcss-plans-revision-control/id1319971186) | | :::no-loc text="Hearsay for Intune":::

Partner app - Hearsay for Intune icon | Hearsay for Intune enables advisors to manage and nurture their book of business in a protected BYOD environment with mobile application management (MAM). This version of Hearsay allows IT administrators to protect corporate data while keeping advisors in touch with their book of business.

Hearsay, a mobile application that enables financial services professionals to move business forward. Leverage compliant texting and seamless voice calling to connect with your entire book of business. Stay productive with calendar integration to set appointments, and schedule reminder messages for upcoming meetings, birthday greetings, and more.
Hearsay for Intune gives enterprise users all the features they expect from Hearsay, while providing IT administrators the MAM functionality they need to keep corporate data safe. In the event of a lost or stolen device, IT can remove Hearsay for Intune from the device along with any sensitive data associated with it. | [Google Play link (Android)](https://play.google.com/store/apps/details?id=com.hearsaysocial.messages.intune),
[App Store link (iOS)](https://apps.apple.com/app/hearsay-for-intune/id1501771956) | diff --git a/memdocs/intune/apps/apps-win32-add.md b/memdocs/intune/apps/apps-win32-add.md index e2cb2c9d59c..3f45c9688dc 100644 --- a/memdocs/intune/apps/apps-win32-add.md +++ b/memdocs/intune/apps/apps-win32-add.md @@ -6,7 +6,7 @@ keywords: author: Erikre ms.author: erikre manager: dougeby -ms.date: 09/11/2024 +ms.date: 01/23/2025 ms.topic: how-to ms.service: microsoft-intune ms.subservice: apps @@ -74,7 +74,10 @@ The following steps help you add a Windows app to Intune: On the **App information** page, add the details for your app. Depending on the app that you chose, some of the values on this page might be automatically filled in. - **Name**: Enter the name of the app as it appears in the company portal. Make sure all app names that you use are unique. If the same app name exists twice, only one of the apps appears in the company portal. -- **Description**: Enter the description of the app. The description appears in the company portal. +- **Description**: Enter the description of the app. The description appears in the Company Portal. You can select the **Edit Description** option to display the **Edit description** pane. Within this pane, you can optionally use Markdown to create an app description with rich text formatting.​​ However, only the Markdown styles shown in this section are supported. HTML isn't supported. + + ![Screenshot of the 'Edit description' pane.](./media/apps-win32-app-management/apps-win32-app-11.png) + - **Publisher**: Enter the name of the publisher of the app. - **Category**: Select one or more of the built-in app categories, or select a category that you created. Categories make it easier for users to find the app when they browse through the company portal. - **Show this as a featured app in the Company Portal**: Display the app prominently on the main page of the company portal when users browse for apps. @@ -125,6 +128,9 @@ On the **Program** page, configure the app installation and removal commands for - **Allow available uninstall**: Select **Yes** to provide the uninstall option for this app for users from the Company Portal. Select **No** to prevent users from uninstalling the app from the Company Portal. + > [!NOTE] + > If a Win32 app has dependencies or is a dependent app itself, the Company Portal will not show the uninstall option for the app, even when **Allow available uninstall** is set to **Yes**. + - **Install behavior**: Set the install behavior to either **System** or **User**. > [!NOTE] @@ -257,7 +263,7 @@ After you've added your rules, select **Next** to display the **Dependencies** p App dependencies define a relationship between apps where one app requires one or more dependent apps to be installed. If Intune has not yet installed an app on a device, any apps configured as dependent apps must be installed first. If an app is already installed on a device, Intune will install any newly configured dependent apps, that are configured for automatic installation, the next time Intune evaluates app policy on the device. -You can add Win32 app dependencies only after your Win32 app has been added and uploaded to Intune. After your Win32 app has been added, you'll see the **Dependencies** option on the pane for your Win32 app. There's a maximum of 100 dependencies, which includes the dependencies of any included dependencies, as well as the app itself. +You can add Win32 app dependencies only after your Win32 app has been added and uploaded to Intune. After your Win32 app has been added, you'll see the **Dependencies** option on the pane for your Win32 app. There's a maximum of 100 dependencies, which include the dependencies of any included dependencies, as well as the app itself. Any Win32 app dependency needs to also be a Win32 app. It doesn't support depending on other app types, such as single MSI LOB apps or Microsoft Store apps. diff --git a/memdocs/intune/apps/apps-win32-deploy-update-package.md b/memdocs/intune/apps/apps-win32-deploy-update-package.md index 16012980b37..9fa7300e33f 100644 --- a/memdocs/intune/apps/apps-win32-deploy-update-package.md +++ b/memdocs/intune/apps/apps-win32-deploy-update-package.md @@ -6,7 +6,7 @@ keywords: author: Erikre ms.author: erikre manager: dougeby -ms.date: 12/01/2023 +ms.date: 11/21/2024 ms.topic: how-to ms.service: microsoft-intune ms.subservice: apps diff --git a/memdocs/intune/apps/apps-win32-prepare.md b/memdocs/intune/apps/apps-win32-prepare.md index 843967c5346..4888108dd83 100644 --- a/memdocs/intune/apps/apps-win32-prepare.md +++ b/memdocs/intune/apps/apps-win32-prepare.md @@ -6,7 +6,7 @@ keywords: author: Erikre ms.author: erikre manager: dougeby -ms.date: 12/01/2023 +ms.date: 11/21/2024 ms.topic: how-to ms.service: microsoft-intune ms.subservice: apps diff --git a/memdocs/intune/apps/apps-win32-s-mode.md b/memdocs/intune/apps/apps-win32-s-mode.md index 4912126a02a..910b0a7f2ca 100644 --- a/memdocs/intune/apps/apps-win32-s-mode.md +++ b/memdocs/intune/apps/apps-win32-s-mode.md @@ -6,7 +6,7 @@ keywords: author: Erikre ms.author: erikre manager: dougeby -ms.date: 12/01/2023 +ms.date: 11/21/2024 ms.topic: how-to ms.service: microsoft-intune ms.subservice: apps diff --git a/memdocs/intune/apps/apps-win32-supersedence.md b/memdocs/intune/apps/apps-win32-supersedence.md index 6ab0665921e..491fce28dab 100644 --- a/memdocs/intune/apps/apps-win32-supersedence.md +++ b/memdocs/intune/apps/apps-win32-supersedence.md @@ -6,7 +6,7 @@ keywords: author: Erikre ms.author: erikre manager: dougeby -ms.date: 04/08/2024 +ms.date: 01/06/2025 ms.topic: how-to ms.service: microsoft-intune ms.subservice: apps @@ -38,9 +38,9 @@ Supersedence relationships can be created when adding or modifying a Win32 app w App supersedence can only be applied to Win32 apps. For more information, see [Add a Win32 app](apps-win32-add.md) to Intune. -A Microsoft Intune permission is required to create and edit Win32 app supersedence and dependency relationships with other apps. The permission is available under the **Mobile apps** category by selecting **Relate**. Starting in the **2202** service release, Intune admins need this permission to add supersedence and dependency apps when creating or editing a Win32 app in Microsoft Intune admin center. To find this permission in [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), choose **Tenant administration** > **Roles** > **All roles** > **Create**. +A Microsoft Intune permission is required to create and edit Win32 app supersedence and dependency relationships with other apps. The permission is available under the **Mobile apps** category by selecting **Relate**. Starting in the **2202** service release, Intune administrators need this permission to add supersedence and dependency apps when creating or editing a Win32 app in Microsoft Intune admin center. To find this permission in [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), choose **Tenant administration** > **Roles** > **All roles** > **Create**. -This Win32 app supersedence permission has been added to the following built-in roles: +This Win32 app supersedence permission is added to the following built-in roles: - Application Manager - School administrator @@ -53,7 +53,7 @@ This Win32 app supersedence permission has been added to the following built-in The following steps help you create a supersedence relationship between apps: 1. Sign in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431). -2. Select **Apps** > **All apps**, and then select a Win32 app from the list. If you haven't added a Win32 app, you can follow the steps to [add a Win32 app to Intune](apps-win32-add.md). +2. Select **Apps** > **All apps**, and then select a Win32 app from the list. To add a Win32 app, see [add a Win32 app to Intune](apps-win32-add.md). 3. After you select the existing Win32 app, select **Properties**. 4. In the **Supersedence** section, select **Edit** > **Add** to choose apps that should be superseded. @@ -61,11 +61,11 @@ The following steps help you create a supersedence relationship between apps: > There can be a maximum of 10 nodes in a supersedence relationship in Intune. 5. Find and select the apps to apply the supersedence relationship in the **Add Apps** pane. Click **Select** to add the apps to your supersedence list. -6. In the list of superseded apps, modify the **Uninstall previous version** option for each selected app to specify whether an uninstall command is sent by Intune to each selected app. If the installer of the current app updates the selected app automatically, then it isn't necessary to send an uninstall command. When replacing a selected app with a different app, it may be necessary to turn on the **Uninstall previous version** option to remove and replace the older app. +6. In the list of superseded apps, modify the **Uninstall previous version** option for each selected app to specify whether an uninstall command is sent by Intune to each selected app. If the installer of the current app updates the selected app automatically, then it isn't necessary to send an uninstall command. When replacing a selected app with a different app, it might be necessary to turn on the **Uninstall previous version** option to remove and replace the older app. 7. Once this step is finalized, select **Review + save** > **Save**. > [!IMPORTANT] - > Superseding apps do not get automatic targeting. Each app must have explicit targeting to take effect. Superseding apps that aren't targeted will be ignored by the agent. If the superseding app is targeted to a device with a superseded app, then the supersedence will take place regardless of whether the superseded app has targeting or not. For more information on Supersedence behavior, please refer to the matrix below. This behavior is in direct contrast to dependencies, which doesn't require targeting. Additionally, only apps that are targeted will show install statuses in Microsoft Intune admin center. + > Superseding apps don't get automatic targeting. Each app must have explicit targeting to take effect. Superseding apps that aren't targeted are ignored by the agent. If the superseding app is targeted to a device with a superseded app, then the supersedence takes place regardless of whether the superseded app has targeting or not. For more information on Supersedence behavior, see the matrix below. This behavior is in direct contrast to dependencies, which doesn't require targeting. Additionally, only apps that are targeted show install statuses in Microsoft Intune admin center. ## Supersedence behavior @@ -73,8 +73,8 @@ A *superseding app* is an app that updates or replaces other apps. A *superseded | Scenarios | Targeting for required intent | Targeting for available intent | |-|-|-| -| **Scenario 1:**
The superseded app exists on the device and **Uninstall previous version** is set to **Yes**. | The superseded app is uninstalled, and the superseding app will be installed on the device.

**NOTE:** Even if the superseded app isn't targeted, it is uninstalled. | Only superseding apps are shown in the company portal and can be installed. | -| **Scenario 2:**
The superseded app exists on the device and **Uninstall previous version** is set to **No**. | The superseding app will be installed on the device. Whether the superseded app will be uninstalled or not is dependent on the superseding app’s installer. | Only superseding apps are shown in the company portal and can be installed. | +| **Scenario 1:**
The superseded app exists on the device and **Uninstall previous version** is set to **Yes**. | The superseded app is uninstalled, and the superseding app are installed on the device.

**NOTE:** Even if the superseded app isn't targeted, it's uninstalled. | Only superseding apps are shown in the company portal and can be installed. | +| **Scenario 2:**
The superseded app exists on the device and **Uninstall previous version** is set to **No**. | The superseding app will be installed on the device. Whether the superseded app will be uninstalled or not is dependent on the superseding app's installer. | Only superseding apps are shown in the company portal and can be installed. | | **Scenario 3:**
The superseded app doesn't exist on the device. | The superseding app is installed. | The new app appears in the Company Portal. | ### Understand app update versus app replacement within supersedence @@ -82,14 +82,14 @@ A *superseding app* is an app that updates or replaces other apps. A *superseded Given that an app could have multiple superseded apps, it's possible for an app to update a set of apps while replacing another set of apps at the same time. > [!NOTE] -> End-users won't be able to check whether a specific Win32 app supersedence operation is an update or replacement in the Company Portal. In addition, when multiple apps supersede an app with available targeting in the Company Portal, the superseded app's details page will navigate to the app page of the first superseding app that was set up. For example, if app A is superseded by apps B and C, and app B supersedes app A first, then app A's detail page in the Company Portal will navigate to App B. +> End-users won't be able to check whether a specific Win32 app supersedence operation is an update or replacement in the Company Portal. In addition, when multiple apps supersede an app with available targeting in the Company Portal, the superseded app's details page navigates to the app page of the first superseding app that was set up. For example, if app A is superseded by apps B and C, and app B supersedes app A first, then app A's detail page in the Company Portal will navigate to App B. Understanding how supersedence is applied when updating an app versus replacing an app can be illustrated based on the following scenario. | Customer scenario | Description | Expected behavior | Additional information | |-|-|-|-| | App update | IT admin wants to update an app with a newer version of the same app. | The installer of the newer version of the app (the superseding app) will automatically update the older version of the app to the newer version. | Since the installer completes the updating, it isn't necessary to send down an uninstall command to the older version. Hence, the Uninstall previous version is toggled off. | -| App replacement | IT admin wants to replace an app with an entirely different app. | The superseded app is uninstalled and the superseding app will be installed. Both install and uninstall will be based on IT Pro’s defined install/uninstall command line. | Since the two apps are different, the admin can turn the Uninstall previous version toggle on to uninstall the older app from the device. | +| App replacement | IT admin wants to replace an app with an entirely different app. | The superseded app is uninstalled and the superseding app will be installed. Both install and uninstall will be based on IT Pro's defined install/uninstall command line. | Since the two apps are different, the admin can turn the Uninstall previous version toggle on to uninstall the older app from the device. | ### Understand in-place app update versus supersedence app update @@ -129,12 +129,12 @@ For the purposes of this document, we assume that all apps are targeted (either | Case | Resolution | Notes | |-|-|-| | ![Case supersedence example scenario 1](./media/apps-win32-supersedence/apps-win32-supersedence-03a.png) | **Scenario:** Neither app is detected on the device. A is superseded by B via app update.

**Result:** Install B. | App update means that admin chose not to uninstall the superseded app during the configuration stage. See above in the Supersedence Step in App Deployment. | -| ![Case supersedence example scenario 2](./media/apps-win32-supersedence/apps-win32-supersedence-03b.png) | **Scenario:** Only A is detected on the device. A is superseded by B via app update.

**Result:** Install B. | Since admin chose not to uninstall the previous version during configuration, A isn't explicitly uninstalled by Intune. A may be uninstalled based on the behavior of B’s installer. | +| ![Case supersedence example scenario 2](./media/apps-win32-supersedence/apps-win32-supersedence-03b.png) | **Scenario:** Only A is detected on the device. A is superseded by B via app update.

**Result:** Install B. | Since admin chose not to uninstall the previous version during configuration, A isn't explicitly uninstalled by Intune. A may be uninstalled based on the behavior of B's installer. | | ![Case supersedence example scenario 3](./media/apps-win32-supersedence/apps-win32-supersedence-03c.png) | **Scenario:** Only B is detected on the device. A is superseded by B via app update.

**Result:** Nothing. | Since B is already detected on the device, no action is taken. | | ![Case supersedence example scenario 4](./media/apps-win32-supersedence/apps-win32-supersedence-03d.png) | **Scenario:** Both apps are detected on the device. A is superseded by B via app update.

**Result:** Nothing. | Since B is already detected on the device, no action is taken. Admin chose not to uninstall the previous version when configuring, hence A isn't uninstalled. | | ![Case supersedence example scenario 5](./media/apps-win32-supersedence/apps-win32-supersedence-03e.png) | **Scenario:** Neither apps are detected on the device. A is superseded by B via app replacement.

**Result:** Install B. | App replacement means that admin chose to uninstall the superseded app during the configuration stage. See above in the Supersedence Step in App Deployment. | -| ![Case supersedence example scenario 6](./media/apps-win32-supersedence/apps-win32-supersedence-03f.png) | **Scenario:** Only A is detected on the device. A is superseded by B via app replacement.

**Result:** Uninstall A, then install B. | A will be uninstalled and once the agent detects that A is no longer present on the device, it installs B. If the detection continues to detect A as present, then the agent won’t install B. Whether B is installed on the device is predicated on whether A is detected on the device. | -| ![Case supersedence example scenario 7](./media/apps-win32-supersedence/apps-win32-supersedence-03g.png) | **Scenario:** Only B is detected on the device. A is superseded by B via app replacement.

**Result:** None | No actions are taken because B is already installed and A doesn’t exist on the device. | +| ![Case supersedence example scenario 6](./media/apps-win32-supersedence/apps-win32-supersedence-03f.png) | **Scenario:** Only A is detected on the device. A is superseded by B via app replacement.

**Result:** Uninstall A, then install B. | A will be uninstalled and once the agent detects that A is no longer present on the device, it installs B. If the detection continues to detect A as present, then the agent won't install B. Whether B is installed on the device is predicated on whether A is detected on the device. | +| ![Case supersedence example scenario 7](./media/apps-win32-supersedence/apps-win32-supersedence-03g.png) | **Scenario:** Only B is detected on the device. A is superseded by B via app replacement.

**Result:** None | No actions are taken because B is already installed and A doesn't exist on the device. | | ![Case supersedence example scenario 8](./media/apps-win32-supersedence/apps-win32-supersedence-03h.png) | **Scenario:** Both apps are detected on the device. A is superseded by B via app replacement.

**Result:** Uninstall A. | A is uninstalled as part of the app replacement process. Detection of a replaced app after the replacing app is already installed will incur a remediation enforcement. | ## Behavior for Chained Supersedence Scenarios @@ -151,11 +151,11 @@ To better understand the behavior of a supersedence chain, the following table p |-|-|-| | ![Case supersedence scenario 1](./media/apps-win32-supersedence/apps-win32-supersedence-04a.png) | **Scenario:** None of the apps exist on the device. The relationship between apps is one of app update.

**Result:** Install C. | Since none of the apps exist on the device, we install the superseding app: App C. The superseding app refers to the app that supersedes all other apps in the chain. | | ![Case supersedence scenario 2](./media/apps-win32-supersedence/apps-win32-supersedence-04b.png) | **Scenario:** Only Apps A and C exist on the device. The relationship between apps is one of app update.

**Result:** None. | Since App C already exists on the device and this is an app update scenario, App A isn't uninstalled. | -| ![Case supersedence scenario 3](./media/apps-win32-supersedence/apps-win32-supersedence-04c.png) | **Scenario:** Only App A exists on the device. The relationship between apps is one of app update.

**Result:** Install C. | Simply install App C. App A isn't uninstalled because it's an app update scenario. C’s installer may or may not have behavior to remove A, where "remove" means A is no longer detected via its detection rules (usually due to version detection). | -| ![Case supersedence scenario 4](./media/apps-win32-supersedence/apps-win32-supersedence-04d.png) | **Scenario:** Only App C exists on the device. The relationship between apps is one of app update.

**Result:** None. | Since App C, the superseding app, already exists on the device, and this is an app update scenario, no action is taken. | -| ![Case supersedence scenario 5](./media/apps-win32-supersedence/apps-win32-supersedence-04e.png) | **Scenario:** None of the apps exist on the device. The relationship between apps is one of app replacement.

**Result:** Install C. | Since none of the apps exist on the device, simply install the superseding app, App C. | -| ![Case supersedence scenario 6](./media/apps-win32-supersedence/apps-win32-supersedence-04f.png) | **Scenario:** Apps A and C exist on the device. The relationship between apps is one of app replacement.

**Result:** Uninstall A. | Since App C exists on the device and this is an app replacement scenario, simply uninstall App A. | -| ![Case supersedence scenario 7](./media/apps-win32-supersedence/apps-win32-supersedence-04g.png) | **Scenario:** Only App A exists on the device. The relationship between apps is one of app replacement.

**Result:** Uninstall A, then install C. | Since this is an app replacement scenario, App A is uninstalled and App C, the superseding app, is installed. | +| ![Case supersedence scenario 3](./media/apps-win32-supersedence/apps-win32-supersedence-04c.png) | **Scenario:** Only App A exists on the device. The relationship between apps is one of app update.

**Result:** Install C. | Install App C. App A isn't uninstalled because it's an app update scenario. C's installer may or may not have behavior to remove A, where "remove" means A is no longer detected via its detection rules (due to version detection). | +| ![Case supersedence scenario 4](./media/apps-win32-supersedence/apps-win32-supersedence-04d.png) | **Scenario:** Only App C exists on the device. The relationship between apps is one of app update.

**Result:** None. | Since App C, the superseding app, already exists on the device, and this case is an app update scenario, no action is taken. | +| ![Case supersedence scenario 5](./media/apps-win32-supersedence/apps-win32-supersedence-04e.png) | **Scenario:** None of the apps exist on the device. The relationship between apps is one of app replacement.

**Result:** Install C. | Since none of the apps exist on the device, install the superseding app, App C. | +| ![Case supersedence scenario 6](./media/apps-win32-supersedence/apps-win32-supersedence-04f.png) | **Scenario:** Apps A and C exist on the device. The relationship between apps is one of app replacement.

**Result:** Uninstall A. | Since App C exists on the device and this case is an app replacement scenario, uninstall App A. | +| ![Case supersedence scenario 7](./media/apps-win32-supersedence/apps-win32-supersedence-04g.png) | **Scenario:** Only App A exists on the device. The relationship between apps is one of app replacement.

**Result:** Uninstall A, then install C. | Since this case is an app replacement scenario, App A is uninstalled and App C, the superseding app, is installed. | | ![Case supersedence scenario 8](./media/apps-win32-supersedence/apps-win32-supersedence-04h.png) | **Scenario:** Only App C exists on the device. The relationship between apps is one of app replacement.

**Result:** None. | Since the superseding app, App C, exists on the device and none of the other superseded apps exist, no action is taken. | ## Supersedence Limitations @@ -200,7 +200,18 @@ The first available check-in will commonly happen between 1-8 hours after the as ### Auto-update limitations -The maximum number of superseding apps a Win32 app can have is 10. User must be logged in to the device to receive the superseding app. +A Win32 app can have a maximum of 10 superseding apps. User must be logged in to the device to receive the superseding app. + +When an app is targeted with available intent to a group that contains the user, and the user requested the app install from the Company Portal, Intune creates a device based assignment to track both the user consent and internal targeting to process the app during check-in. This device based assignment is used to install the app on the devices. However, in situations where the targeting changes during the lifecycle of the app, a few scenarios can occur. If you take any of the following actions once the app is already installed on the device, Intune will remove user consent and the app will no longer be targeted with available intent: + +1. You remove the user from the Group membership of the targeted group in the Microsoft Entra admin center. +2. You removed the assignment to the targeted group. +3. You changed the intent of the app from **Available** to something else. For example, you could change the intent to **Unintall** or **Exclude**. + +It’s important to note that even if you re-target the app with **Available** intent later, the auto-update supersedence won't occur because user consent has been removed. + +> [!NOTE] +> The **Uninstall** intent takes precedence over **Available** intent. ### Auto-update retry behavior @@ -214,9 +225,9 @@ Below are specific cases where app B has been created to supersede app A. |---|---|---| | App A is still present on the device. | The upgrade is already triggered after first available check-in, but before app B gets installed on the device, the admin removes the relationship between app A and app B, making them independent apps. | During the second available check-in, both apps are sent down to the device and app B will be installed as an independent app. | | Auto update setting changes | The upgrade is already triggered after first available check-in, but before app B gets installed on the device, the admin changes the auto-update setting for app B to false. | During the second available check-in, app B is sent down to the device and app A will be upgraded with app B on the device. | -| Uninstall superseded app after superseding app entities created | The upgrade is already triggered after first available check-in, but before app B gets installed on the device, the user requests an uninstall of app A and app A is removed from the device. | During the second available check-in, app B will be sent down to the device and app A will be upgraded with app B on the device. | +| Uninstall superseded app after superseding app entities created | The upgrade is already triggered after first available check-in, but before app B gets installed on the device, the user requests an uninstall of app A and app A is removed from the device. | During the second available check-in, app B is sent down to the device and app A will be upgraded with app B on the device. | | Uninstall after supersedence update | App A was auto-updated to app B, but app A wasn't removed from the device. Later, the user requests an uninstall of app B from the device and app B is uninstalled successfully. | App A is still present on the device. | -| Upgrade failure | Intune attempts to auto-update app A to app B but the installation of app B failed and app A was already removed from the device. | Users won't be able to reinstall app A from the Company Portal as it’s superseded by app B, but are able to try to reinstall app B from the Company Portal. | +| Upgrade failure | Intune attempts to auto-update app A to app B but the installation of app B failed and app A was already removed from the device. | Users won't be able to reinstall app A from the Company Portal as it's superseded by app B, but are able to try to reinstall app B from the Company Portal. | ## Next steps diff --git a/memdocs/intune/apps/company-portal-app.md b/memdocs/intune/apps/company-portal-app.md index 85c0d5c8b38..a48a34c6099 100644 --- a/memdocs/intune/apps/company-portal-app.md +++ b/memdocs/intune/apps/company-portal-app.md @@ -8,7 +8,7 @@ keywords: author: Erikre ms.author: erikre manager: dougeby -ms.date: 06/07/2024 +ms.date: 12/20/2024 ms.topic: how-to ms.service: microsoft-intune ms.subservice: apps @@ -43,7 +43,7 @@ The Company Portal apps, Company Portal website, and Intune app on Android are w ## Customizing the user experience -By customizing the end-user experience, you will help to provide a familiar and helpful experience for your end users. To do this, sign in as an [Intune administrator](../fundamentals/users-add.md#types-of-administrators). Navigate to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) and select **Tenant Administration** > **Customization** where you can either edit the default policy or create up to 10 user group targeted policies. Note that targeting policies to device groups is not supported. These settings will apply to the Company Portal apps, Company Portal website, and Intune app on Android. +By customizing the end-user experience, you will help to provide a familiar and helpful experience for your end users. To do this, sign in as an [Intune administrator](../fundamentals/users-add.md#types-of-administrators). Navigate to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) and select **Tenant Administration** > **Customization** where you can either edit the default policy or create up to 25 user group targeted policies. Note that targeting policies to device groups is not supported. These settings will apply to the Company Portal apps, Company Portal website, and Intune app on Android. ## Branding diff --git a/memdocs/intune/apps/data-transfer-between-apps-manage-ios.md b/memdocs/intune/apps/data-transfer-between-apps-manage-ios.md index c3315c79a4a..76cc80051dd 100644 --- a/memdocs/intune/apps/data-transfer-between-apps-manage-ios.md +++ b/memdocs/intune/apps/data-transfer-between-apps-manage-ios.md @@ -8,7 +8,7 @@ keywords: author: Erikre ms.author: erikre manager: dougeby -ms.date: 02/27/2024 +ms.date: 11/20/2024 ms.topic: how-to ms.service: microsoft-intune ms.subservice: apps @@ -49,7 +49,9 @@ Use App protection policies with the iOS **Open-in management** feature to prote - **Devices managed by MDM solutions**: For devices enrolled in Intune or third-party MDM solutions, data sharing between apps with app protection policies and other managed iOS apps deployed through MDM is controlled by Intune APP policies and the iOS **Open-in management** feature. To make sure that apps you deploy using a MDM solution are also associated with your Intune app protection policies, configure the user UPN setting as described in the following section, [Configure user UPN setting](data-transfer-between-apps-manage-ios.md#configure-user-upn-setting-for-microsoft-intune-or-third-party-emm). To specify how you want to allow data transfer to other *policy managed apps* and iOS managed apps, configure **Send org data to other apps** setting to **Policy managed apps with OS sharing**. To specify how you want to allow an app to receive data from other apps, enable **Receive data from other apps** and then choose your preferred level of receiving data. For more information about receiving and sharing app data, see [Data relocation settings](app-protection-policy-settings-ios.md#data-protection). ## Configure user UPN setting for Microsoft Intune or third-party EMM -Configuring the user UPN setting is **required** for devices that are managed by Intune or a third-party EMM solution to identify the enrolled user account for the sending *policy managed app* when transferring data to an iOS managed app. The UPN configuration works with the app protection policies you deploy from Intune. The following procedure is a general flow on how to configure the UPN setting and the resulting user experience: +Configuring the user UPN setting is **required** for devices that are managed by Intune or a third-party EMM solution to identify the enrolled user account for the sending *policy managed app* when transferring data to an iOS managed app. For more information about required app configuration settings, see [Device Management types](../apps/app-protection-policies.md#device-management-types). The UPN configuration works with the app protection policies you deploy from Intune. + +The following procedure is a general flow on how to configure the UPN setting and the resulting user experience: 1. In the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), [create and assign an app protection policy](app-protection-policies.md) for iOS/iPadOS. Configure policy settings per your company requirements and select the iOS apps that should have this policy. @@ -77,7 +79,7 @@ Configuring the user UPN setting is **required** for devices that are managed by 1. Go to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) or your third-party MDM provider. Go to the section of the admin center in which you deploy application configuration settings to enrolled iOS devices. -2. In the Application Configuration section, enter the following setting for each *policy managed app* that will transfer data to iOS managed apps: +2. In the Application Configuration section, enter the following setting for each *policy managed app* that will transfer data to iOS managed apps, except for apps that are automatically configured based on [device management type](../apps/app-protection-policies.md#device-management-types): **key** = IntuneMAMUPN, **value** = diff --git a/memdocs/intune/apps/intune-management-extension.md b/memdocs/intune/apps/intune-management-extension.md index 26e0818fe4d..895ee79455e 100644 --- a/memdocs/intune/apps/intune-management-extension.md +++ b/memdocs/intune/apps/intune-management-extension.md @@ -63,7 +63,7 @@ The Intune management extension supplements the in-box Windows 10 MDM features. - The Intune management extension agent checks after every reboot for any new scripts or changes. After you assign the policy to the Microsoft Entra groups, the PowerShell script runs, and the run results are reported. Once the script executes, it doesn't execute again unless there's a change in the script or policy. If the script fails, the Intune management extension agent retries the script three times for the next three consecutive Intune management extension agent check-ins. -- For shared devices, the PowerShell script will run for every new user that signs in. +- A PowerShell script assigned to the device will run for every new user that signs in, except on multi-session SKUs where user check-in is disabled. - PowerShell scripts are executed before Win32 apps run. In other words, PowerShell scripts execute first. Then, Win32 apps execute. diff --git a/memdocs/intune/apps/macos-shell-scripts.md b/memdocs/intune/apps/macos-shell-scripts.md index 96f664b9fbf..531d2e7b4d8 100644 --- a/memdocs/intune/apps/macos-shell-scripts.md +++ b/memdocs/intune/apps/macos-shell-scripts.md @@ -64,7 +64,7 @@ Ensure that the following prerequisites are met when composing shell scripts and - **Name**: Enter a name for the shell script. - **Description**: Enter a description for the shell script. This setting is optional, but recommended. 4. In **Script settings**, enter the following properties, and select **Next**: - - **Upload script**: Browse to the shell script. The script file must be less than 200 KB in size. + - **Upload script**: Browse to the shell script. The script file must be less than 1 MB in size. - **Run script as signed-in user**: Select **Yes** to run the script with the user's credentials on the device. Choose **No** (default) to run the script as the root user. - **Hide script notifications on devices:** By default, script notifications are shown for each script that is run. End users see a *IT is configuring your computer* notification from Intune on macOS devices. - **Script frequency:** Select how often the script is to be run. Choose **Not configured** (default) to run a script only once. Scripts with a frequency set will also run after a device restart. diff --git a/memdocs/intune/apps/mamedge-1-mamca.md b/memdocs/intune/apps/mamedge-1-mamca.md index 084bbfad370..2a47cbc8c27 100644 --- a/memdocs/intune/apps/mamedge-1-mamca.md +++ b/memdocs/intune/apps/mamedge-1-mamca.md @@ -1,9 +1,9 @@ --- # required metadata -title: Step 1. Create Microsoft Entra conditional access with Microsoft Edge for Business +title: Step 1. Create Microsoft Entra Conditional Access with Microsoft Edge for Business titleSuffix: -description: Step 1. Create Microsoft Entra conditional access with Microsoft Edge for Business. +description: Step 1. Create Microsoft Entra Conditional Access with Microsoft Edge for Business. keywords: author: Erikre ms.author: erikre @@ -30,11 +30,11 @@ ms.collection: - FocusArea_Apps_AppManagement --- -# Step 1. Create Microsoft Entra conditional access with Microsoft Edge for Business +# Step 1. Create Microsoft Entra Conditional Access with Microsoft Edge for Business -The modern security perimeter extends beyond an organization's network perimeter to include user and device identity. Organizations now use identity-driven signals as part of their access control decisions. Microsoft Entra conditional access brings signals together to help enforce organizational policies. It's Microsoft's Zero Trust policy engine that takes signals from various sources into account when enforcing policy decisions. +The modern security perimeter extends beyond an organization's network perimeter to include user and device identity. Organizations now use identity-driven signals as part of their access control decisions. Microsoft Entra Conditional Access brings signals together to help enforce organizational policies. It's Microsoft's Zero Trust policy engine that takes signals from various sources into account when enforcing policy decisions. -Conditional access policies at their simplest include *if-then* statements. If a user wants to access a resource, then they must complete an action. For example, if a user wants to access an application or service such as Microsoft 365, then they must perform multifactor authentication to gain access. +Conditional Access policies at their simplest include *if-then* statements. If a user wants to access a resource, then they must complete an action. For example, if a user wants to access an application or service such as Microsoft 365, then they must perform multifactor authentication to gain access. Identity-driven signals may include: @@ -46,19 +46,19 @@ Identity-driven signals may include: :::image type="content" alt-text="Conditional Access Policy Decision Making.." source="./media/securing-data-edge-for-business/securing-data-edge-for-businessCA.png" lightbox="./media/securing-data-edge-for-business/securing-data-edge-for-businessCA.png"::: -Conditional access is enforced after initial authentication is completed. It isn't intended to be an organization's frontline of defense for scenarios like denial-of-service (DoS) attacks, but it can use signals from these events to determine access. +Conditional Access is enforced after initial authentication is completed. It isn't intended to be an organization's frontline of defense for scenarios like denial-of-service (DoS) attacks, but it can use signals from these events to determine access. -## Conditional access compliance +## Conditional Access compliance -Protecting your organizational data involves preventing data loss. Data Loss Prevention (DLP) is effective only when your organizational data can’t be accessed from any unprotected system or device. App protection policies can be used with conditional access (CA) to ensure that these policies aren’t only supported but also enforced in a client application before granting access to protected resources, such as organizational data. This approach allows end-users with personal devices, including Windows, Android, and iOS, to use APP-managed applications, including Microsoft Edge for Business, to access Microsoft Entra resources without the need for full management of their personal device. +Protecting your organizational data involves preventing data loss. Data Loss Prevention (DLP) is effective only when your organizational data can’t be accessed from any unprotected system or device. App protection policies can be used with Conditional Access (CA) to ensure that these policies aren’t only supported but also enforced in a client application before granting access to protected resources, such as organizational data. This approach allows end-users with personal devices, including Windows, Android, and iOS, to use APP-managed applications, including Microsoft Edge for Business, to access Microsoft Entra resources without the need for full management of their personal device. -Secure your Microsoft Edge for Business with Microsoft Entra conditional access policies by using the following steps. +Secure your Microsoft Edge for Business with Microsoft Entra Conditional Access policies by using the following steps. -In this scenario, you'll create a conditional access policy using Microsoft Intune. To create the policy, you must perform the following steps: +In this scenario, you'll create a Conditional Access policy using Microsoft Intune. To create the policy, you must perform the following steps: 1. Navigate to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431). -2. Select **Endpoint security** > **Conditional access** > **New policy**. +2. Select **Endpoint security** > **Conditional Access** > **New policy**. 3. On the **Conditional Access policy** pane, set the following details: @@ -79,13 +79,13 @@ In this scenario, you'll create a conditional access policy using Microsoft Intu ## Browser only access for Windows BYOD -In an era where Bring Your Own Device (BYOD) has become the norm, implementing conditional access policies specifically for browser-only access is critical towards securing your digital boundaries and ensuring seamless user experience. +In an era where Bring Your Own Device (BYOD) has become the norm, implementing Conditional Access policies specifically for browser-only access is critical towards securing your digital boundaries and ensuring seamless user experience. -In the previous steps, you implemented conditional access as a required app protection policy. In the following steps, you'll configure a policy to ensure that same resources (O365 in this example) are not accessed from desktop apps. A similar approach could be taken for mobile apps. However, mobile apps also support app protection policies, so it is important look at the scenario rather than block access from mobile apps and allow browser access only. +In the previous steps, you implemented Conditional Access as a required app protection policy. In the following steps, you'll configure a policy to ensure that same resources (O365 in this example) are not accessed from desktop apps. A similar approach could be taken for mobile apps. However, mobile apps also support app protection policies, so it is important look at the scenario rather than block access from mobile apps and allow browser access only. 1. Navigate to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431). -2. Select **Endpoint security** > **Conditional access** > **New policy**. +2. Select **Endpoint security** > **Conditional Access** > **New policy**. 4. On this new policy, you'll restrict access from desktop apps to managed devices only. You'll select target resources and select apps once they select **Office 365** to follow the example in this page. @@ -110,7 +110,7 @@ In the previous steps, you implemented conditional access as a required app prot > Probably to this last control, customers should add also MFA or other options as well.* -8. Select **Done** \> select **Create** and complete the conditional access policy creation as you performed on the previous step. +8. Select **Done** \> select **Create** and complete the Conditional Access policy creation as you performed on the previous step. ## Next step diff --git a/memdocs/intune/apps/mamedge-2-app.md b/memdocs/intune/apps/mamedge-2-app.md index fbec5db404c..fda5b21c166 100644 --- a/memdocs/intune/apps/mamedge-2-app.md +++ b/memdocs/intune/apps/mamedge-2-app.md @@ -123,7 +123,7 @@ Incorporate Microsoft Edge for Business into your existing data security and man Microsoft Edge for Business provide benefits for both management and security: - **Management**: Microsoft Edge for Business is the only mobile browser natively supported by Microsoft Intune with seamless integration. To secure productivity for your organization, App level management allows IT to configure the right balance between data protection and access. -- **Security**: Data protection and leakage prevention are based on conditional access and user identities. Microsoft 365 security features extend to Microsoft Edge for Business mobile including Microsoft Entra Conditional Access, and Data Loss Prevention. For organizations utilizing VPN solutions, Microsoft Edge mobile offers support for identity-enlightened per-app VPN. This includes the integration of Microsoft Tunnel with Intune for a seamless and secure connection. Additionally, solutions that don't require a VPN are also available. +- **Security**: Data protection and leakage prevention are based on Conditional Access and user identities. Microsoft 365 security features extend to Microsoft Edge for Business mobile including Microsoft Entra Conditional Access, and Data Loss Prevention. For organizations utilizing VPN solutions, Microsoft Edge mobile offers support for identity-enlightened per-app VPN. This includes the integration of Microsoft Tunnel with Intune for a seamless and secure connection. Additionally, solutions that don't require a VPN are also available. ### App protection policies for mobile diff --git a/memdocs/intune/apps/mamedge-3-scc.md b/memdocs/intune/apps/mamedge-3-scc.md index 4f9b5184dc4..e824bc9a912 100644 --- a/memdocs/intune/apps/mamedge-3-scc.md +++ b/memdocs/intune/apps/mamedge-3-scc.md @@ -3,7 +3,7 @@ title: Step 3. Integrate Mobile Threat Defense for App Protection Policy titleSuffix: -description: Step 3. Integrate Microsoft Entra conditional access with Microsoft Edge for Business. +description: Step 3. Integrate Microsoft Entra Conditional Access with Microsoft Edge for Business. keywords: author: Erikre ms.author: erikre @@ -33,7 +33,7 @@ ms.collection: # Step 3. Integrate Mobile Threat Defense -The Microsoft Mobile Threat Defense (MTD) connector is a feature in Microsoft Intune that creates a channel of communication between Intune and your chosen MTD vendor, regardless of the device’s operating system. There are various supported MTD partners for both Windows and mobile devices. Intune integrates data from an MTD vendor as an information source for device compliance policies and device conditional access rules. The information provided by this communication channel can help protect corporate resources, such as Exchange and SharePoint data, by blocking access from compromised devices. +The Microsoft Mobile Threat Defense (MTD) connector is a feature in Microsoft Intune that creates a channel of communication between Intune and your chosen MTD vendor, regardless of the device’s operating system. There are various supported MTD partners for both Windows and mobile devices. Intune integrates data from an MTD vendor as an information source for device compliance policies and device Conditional Access rules. The information provided by this communication channel can help protect corporate resources, such as Exchange and SharePoint data, by blocking access from compromised devices. Mobile Application Management (MAM) threat detection can be integrated with various MTD partners, including Windows Security Center. This integration provides a client device health assessment to Intune application protection policies (APP) via a service-to-service connector. This assessment supports gating the flow and access to organizational data on personal unmanaged devices. diff --git a/memdocs/intune/apps/mamedge-5-end-user-experience.md b/memdocs/intune/apps/mamedge-5-end-user-experience.md index 6aa05cd9abe..7f98dc2cac7 100644 --- a/memdocs/intune/apps/mamedge-5-end-user-experience.md +++ b/memdocs/intune/apps/mamedge-5-end-user-experience.md @@ -32,7 +32,7 @@ ms.collection: # Step 5. Understand Microsoft Edge for Business end user experience for Windows -Now that you've configured your Microsoft Entra conditional access policy and created your first app protection policy for Windows, you can launch **Microsoft Edge for Business** using a managed or unmanaged device. +Now that you've configured your Microsoft Entra Conditional Access policy and created your first app protection policy for Windows, you can launch **Microsoft Edge for Business** using a managed or unmanaged device. The end user experience in Microsoft Edge for Business is designed to be productive, secure, and user-friendly. This secure enterprise browser experience includes the following features: diff --git a/memdocs/intune/apps/mamedge-overview.md b/memdocs/intune/apps/mamedge-overview.md index 4cd4f1df5e1..36697a9ddf5 100644 --- a/memdocs/intune/apps/mamedge-overview.md +++ b/memdocs/intune/apps/mamedge-overview.md @@ -43,7 +43,7 @@ This content helps you implement and secure enterprise browser configuration for The target audience for this content includes: - **Intune Administrators:** This content provides detailed guidance about configuring and managing Microsoft Edge for Business in Microsoft Intune. -- **Security Professionals:** This content includes security related areas, such as the [data protection framework using app protection policies](../apps/app-protection-framework.md), [app configuration policies](../apps/app-configuration-policies-overview.md), data encryption, and [conditional access policies](../apps/app-protection-framework.md#conditional-access-policies). You can use this content to enhance your organization's security posture. +- **Security Professionals:** This content includes security related areas, such as the [data protection framework using app protection policies](../apps/app-protection-framework.md), [app configuration policies](../apps/app-configuration-policies-overview.md), data encryption, and [Conditional Access policies](../apps/app-protection-framework.md#conditional-access-policies). You can use this content to enhance your organization's security posture. - **Decision Makers:** This content can help decision makers understand the security, productivity, and manageability benefits of Microsoft Edge for Business. In addition, this content helps decision makers make informed decisions about their browser choice for their organization. > [!NOTE] @@ -53,7 +53,7 @@ The target audience for this content includes: This guide provides the following content: -1. **Microsoft Entra conditional access with Microsoft Edge for Business** - Create an Entra conditional access policy and Intune app protection policy for browsing on Android, iOS and Windows. +1. **Microsoft Entra Conditional Access with Microsoft Edge for Business** - Create an Entra Conditional Access policy and Intune app protection policy for browsing on Android, iOS and Windows. 2. **App protection policies for Microsoft Edge for Business** - Ensure secure access and usage of enterprise applications when implementing app protection policies. 3. **Integrate Mobile Threat Defense** - Enhance the overall security posture of your organization by using the secure enterprise browser to integrate with the Windows Security Center, Microsoft Defender or any MTD Partners. 4. **App configuration policies for Microsoft Edge for Business** - Understand Microsoft Edge for Business and Microsoft Application Management can be used to protect your organization from various cyber threats. @@ -90,7 +90,7 @@ In addition to the above benefits, you can enable protected Mobile Application M - Intune application configuration policies (ACP) with Microsoft Edge for Business. Using ACP allows you to leverage Edge’s settings to better enable a secure browsing experience. - Intune application protection policies (APP) to secure organization data and ensure the client device is healthy. - Mobile Threat Protection (MTP) integrated with Intune APP to detect local health threats on personal Windows and all mobile devices. -- Microsoft Entra conditional access to ensure the device is protected and healthy before granting protected services access via Microsoft Entra. +- Microsoft Entra Conditional Access to ensure the device is protected and healthy before granting protected services access via Microsoft Entra. ## Zero Trust Methodology @@ -128,4 +128,4 @@ This solution provides insights into securing your enterprise browser configurat [![Steps to secure your corporate data in Intune with Microsoft Edge for Business.](./media/securing-data-edge-for-business/securing-data-edge-for-business-steps.png)](mamedge-1-mamca.md) -Continue with [Step 1](mamedge-1-mamca.md) to create Microsoft Entra conditional access. +Continue with [Step 1](mamedge-1-mamca.md) to create Microsoft Entra Conditional Access. diff --git a/memdocs/intune/apps/manage-microsoft-edge.md b/memdocs/intune/apps/manage-microsoft-edge.md index e1477d4fce6..25f4f3e9bb4 100644 --- a/memdocs/intune/apps/manage-microsoft-edge.md +++ b/memdocs/intune/apps/manage-microsoft-edge.md @@ -44,7 +44,7 @@ This feature applies to: > [!NOTE] > Edge for iOS and Android doesn't consume settings that users set for the native browser on their devices, because Edge for iOS and Android can't access these settings. -The richest and broadest protection capabilities for Microsoft 365 data are available when you subscribe to the Enterprise Mobility + Security suite, which includes Microsoft Intune and Microsoft Entra ID P1 or P2 features, such as conditional access. At a minimum, you'll want to deploy a conditional access policy that only allows connectivity to Edge for iOS and Android from mobile devices and an Intune app protection policy that ensures the browsing experience is protected. +The richest and broadest protection capabilities for Microsoft 365 data are available when you subscribe to the Enterprise Mobility + Security suite, which includes Microsoft Intune and Microsoft Entra ID P1 or P2 features, such as Conditional Access. At a minimum, you'll want to deploy a Conditional Access policy that only allows connectivity to Edge for iOS and Android from mobile devices and an Intune app protection policy that ensures the browsing experience is protected. > [!NOTE] > New web clips (pinned web apps) on iOS devices will open in Edge for iOS and Android instead of the Intune Managed Browser when required to open in a protected browser. For older iOS web clips, you must re-target these web clips to ensure they open in Edge for iOS and Android rather than the Managed Browser. @@ -82,7 +82,7 @@ Regardless of whether the device is enrolled in a unified endpoint management (U ## Apply Conditional Access While it's important to protect Microsoft Edge with App Protection Policies (APP), it's also crucial to ensure Microsoft Edge is the mandatory browser for opening corporate applications. Users might otherwise use other unprotected browsers to access corporate applications, potentially leading to data leaks. -Organizations can use Microsoft Entra Conditional Access policies to ensure that users can only access work or school content using Edge for iOS and Android. To do this, you'll need a conditional access policy that targets all potential users. These policies are described in [Conditional Access: Require approved client apps or app protection policy](/azure/active-directory/conditional-access/howto-policy-approved-app-or-app-protection). +Organizations can use Microsoft Entra Conditional Access policies to ensure that users can only access work or school content using Edge for iOS and Android. To do this, you'll need a Conditional Access policy that targets all potential users. These policies are described in [Conditional Access: Require approved client apps or app protection policy](/azure/active-directory/conditional-access/howto-policy-approved-app-or-app-protection). Follow the steps in [Require approved client apps or app protection policy with mobile devices](/azure/active-directory/conditional-access/howto-policy-approved-app-or-app-protection#require-approved-client-apps-or-app-protection-policy-with-mobile-devices), which allows Edge for iOS and Android, but blocks other mobile device web browsers from connecting to Microsoft 365 endpoints. @@ -92,7 +92,7 @@ Follow the steps in [Require approved client apps or app protection policy with With Conditional Access, you can also target on-premises sites that you have exposed to external users via the [Microsoft Entra application proxy](/azure/active-directory/active-directory-application-proxy-get-started). > [!NOTE] -> To leverage app-based conditional access policies, the Microsoft Authenticator app must be installed on iOS devices. For Android devices, the Intune Company Portal app is required. For more information, see [App-based Conditional Access with Intune](../protect/app-based-conditional-access-intune.md). +> To leverage app-based Conditional Access policies, the Microsoft Authenticator app must be installed on iOS devices. For Android devices, the Intune Company Portal app is required. For more information, see [App-based Conditional Access with Intune](../protect/app-based-conditional-access-intune.md). ## Single sign-on to Microsoft Entra connected web apps in policy-protected browsers @@ -282,7 +282,7 @@ Edge for iOS and Android allows organizations to disable certain features that a |Key |Value | |:-----------|:-------------| -|com.microsoft.intune.mam.managedbrowser.disabledFeatures|**password** disables prompts that offer to save passwords for the end user
**inprivate** disables InPrivate browsing
**autofill** disables "Save and Fill Addresses" and "Save and Fill Payment info". Autofill will be disabled even for previously saved information
**translator** disables translator
**readaloud** disables read aloud
**drop** disables drop
**coupons** disables coupons
**extensions** disables extensions (Edge for Android only)
**developertools** grays out the build version numbers to prevent users from accessing Developer options (Edge for Android only)
**UIRAlert** suppress re-verify account popups in new tab page screen
**share** disables Share under menu
**sendtodevices** disables Send to devices under menu
**weather** disables weather in NTP (New Tab Page)

To disable multiple features, separate values with `|`. For example, `inprivate|password` disables both InPrivate and password storage. | +|com.microsoft.intune.mam.managedbrowser.disabledFeatures|**password** disables prompts that offer to save passwords for the end user
**inprivate** disables InPrivate browsing
**autofill** disables "Save and Fill Addresses" and "Save and Fill Payment info". Autofill will be disabled even for previously saved information
**translator** disables translator
**readaloud** disables read aloud
**drop** disables drop
**coupons** disables coupons
**extensions** disables extensions (Edge for Android only)
**developertools** grays out the build version numbers to prevent users from accessing Developer options (Edge for Android only)
**UIRAlert** suppress re-verify account popups in new tab page screen
**share** disables Share under menu
**sendtodevices** disables Send to devices under menu
**weather** disables weather in NTP (New Tab Page)
**webinspector** disables Web Inspector setting (Edge for iOS only)

To disable multiple features, separate values with `|`. For example, `inprivate|password` disables both InPrivate and password storage. | #### Disable import passwords feature @@ -561,8 +561,8 @@ Use the following key/value pairs to configure either an allowed or blocked site |:--|:----| |com.microsoft.intune.mam.managedbrowser.AllowListURLs

This policy name has been replaced by the UI of **Allowed URLs** under Edge Configuration settings|The corresponding value for the key is a list of URLs. You enter all the URLs you want to allow as a single value, separated by a pipe `|` character.

**Examples:**
`URL1|URL2|URL3`
`http://www.contoso.com/|https://www.bing.com/|https://expenses.contoso.com` | |com.microsoft.intune.mam.managedbrowser.BlockListURLs

This policy name has been replaced by the UI of **Blocked URLs** under Edge Configuration settings|The corresponding value for the key is a list of URLs. You enter all the URLs you want to block as a single value, separated by a pipe `|` character.

**Examples:**
`URL1|URL2|URL3`
`http://www.contoso.com/|https://www.bing.com/|https://expenses.contoso.com` | -|com.microsoft.intune.mam.managedbrowser.AllowTransitionOnBlock |**true** (default) allows Edge for iOS and Android to transition restricted sites. When personal accounts aren't disabled, users are prompted to either switch to the personal context to open the restricted site, or to add a personal account. If com.microsoft.intune.mam.managedbrowser.openInPrivateIfBlocked is set to true, users have the capability of opening the restricted site in the InPrivate context.
**false** prevents Edge for iOS and Android from transitioning users. Users are simply shown a message stating that the site they are trying to access is blocked. | -|com.microsoft.intune.mam.managedbrowser.openInPrivateIfBlocked

This policy name has been replaced by the UI of **Redirect restricted sites to personal context** under Edge Configuration settings |**true** allows restricted sites to be opened in the Microsoft Entra account's InPrivate context. If the Microsoft Entra account is the only account configured in Edge for iOS and Android, the restricted site is opened automatically in the InPrivate context. If the user has a personal account configured, the user is prompted to choose between opening InPrivate or switch to the personal account.
**false** (default) requires the restricted site to be opened in the user's personal account. If personal accounts are disabled, then the site is blocked.
In order for this setting to take effect, com.microsoft.intune.mam.managedbrowser.AllowTransitionOnBlock must be set to true. | +|com.microsoft.intune.mam.managedbrowser.AllowTransitionOnBlock

This policy name has been replaced by the UI of **Redirect restricted sites to personal context** under Edge Configuration settings|**true** (default) allows Edge for iOS and Android to transition restricted sites. When personal accounts aren't disabled, users are prompted to either switch to the personal context to open the restricted site, or to add a personal account. If com.microsoft.intune.mam.managedbrowser.openInPrivateIfBlocked is set to true, users have the capability of opening the restricted site in the InPrivate context.
**false** prevents Edge for iOS and Android from transitioning users. Users are simply shown a message stating that the site they are trying to access is blocked. | +|com.microsoft.intune.mam.managedbrowser.openInPrivateIfBlocked |**true** allows restricted sites to be opened in the Microsoft Entra account's InPrivate context. If the Microsoft Entra account is the only account configured in Edge for iOS and Android, the restricted site is opened automatically in the InPrivate context. If the user has a personal account configured, the user is prompted to choose between opening InPrivate or switch to the personal account.
**false** (default) requires the restricted site to be opened in the user's personal account. If personal accounts are disabled, then the site is blocked.
In order for this setting to take effect, com.microsoft.intune.mam.managedbrowser.AllowTransitionOnBlock must be set to true. | |com.microsoft.intune.mam.managedbrowser.durationOfOpenInPrivateSnackBar | Enter the number of seconds that users will see the snack bar notification "Access to this site is blocked by your organization. We’ve opened it in InPrivate mode for you to access the site." By default, the snack bar notification is shown for 7 seconds.| The following sites except copilot.microsoft.com are always allowed regardless of the defined allow list or block list settings: @@ -590,6 +590,18 @@ You can configure a policy to enhance users' experience. This policy is recommen |:--|:----| |com.microsoft.intune.mam.managedbrowser.ProfileAutoSwitchToWork |**1**: (Default) Switch to work profile even if the URL is blocked by Edge policy.
**2**: The blocked URLs will open under personal profile if personal profile is signed in. If personal profile is not signed in, the blocked URL will opened in InPrivate mode. | +#### Manage Sub Resource Blocking +By default, AllowListURLs and BlockListURLs apply only at the navigation level. When you embed blocked URLs (either URLs configured in BlockListURLs or URLs not configured in AllowListURLs) as sub resources within a web page, those sub resource URLs are not blocked. + +To further restrict these sub resources, you can configure a policy to block the sub resource URLs. + +|Key |Value | +|:--|:----| +|com.microsoft.intune.mam.managedbrowser.ManageRestrictedSubresourceEnabled |**false**: (Default) Sub resource URLs will not be blocked even if the sub resource URLs are blocked.
**true**: Sub resource URLs will be blocked if they are listed as blocked. | + +> [!NOTE] +> It is recommended to use this policy in conjunction with BlockListURLs. If used with AllowListURLs, ensure that all sub resource URLs are included in the AllowListURLs. Otherwise, some sub resources may fail to load + #### URL formats for allowed and blocked site list You can use various URL formats to build your allowed/blocked sites lists. These permitted patterns are detailed in the following table. @@ -600,7 +612,8 @@ You can use various URL formats to build your allowed/blocked sites lists. These - You can specify port numbers in the address. If you do not specify a port number, the values used are: - Port 80 for http - Port 443 for https -- Using wildcards for the port number is **not** supported. For example, `http://www.contoso.com:*` and `http://www.contoso.com:*/` aren't supported. +- Using wildcards for the port number is supported in Edge for iOS only. For example, you can specify `http://www.contoso.com:*` and `http://www.contoso.com:*/`. +- Specifying IPv4 addresses with CIDR notation is supported. For example, you can specify 127.0.0.1/24 (a range of IP addresses). |URL |Details |Matches |Does not match | |:----|:-------|:----------|:----------------| @@ -613,17 +626,17 @@ You can use various URL formats to build your allowed/blocked sites lists. These |`http://www.contoso.com:80`|Matches a single page, by using a port number |`www.contoso.com:80`| | |`https://www.contoso.com`|Matches a single, secure page|`www.contoso.com`|`www.contoso.com/images`| |`http://www.contoso.com/images/*` |Matches a single folder and all subfolders |`www.contoso.com/images/dogs`
`www.contoso.com/images/cats` | `www.contoso.com/videos`| - -- The following are examples of some of the inputs that you can't specify: + |`http://contoso.com:*` |Matches any port number for a single page |`contoso.com:80`
`contoso.com:8080` | | + |`10.0.0.0/24` |Matches a range of IP addresses from 10.0.0.0 to 10.0.0.255 |`10.0.0.0`
`10.0.0.100`| `192.168.1.1`| + + - The following are examples of some of the inputs that you can't specify: - `*.com` - `*.contoso/*` - `www.contoso.com/*images` - `www.contoso.com/*images*pigs` - `www.contoso.com/page*` - - IP addresses - `https://*` - `http://*` - - `http://www.contoso.com:*` - `http://www.contoso.com: /*` ### Disable Edge internal pages @@ -792,15 +805,27 @@ For a list of the settings stored in the app logs, see [Review client app protec ## Diagnostic logs -Besides Intune logs from `edge://intunehelp/`, you may be asked by Microsoft Support to provide diagnostic logs of Microsoft Edge for iOS and Android. You can download the logs to local devices and share them to Microsoft Support. To download the logs to local devices: +In additional to Intune logs from `edge://intunehelp/`, you may be asked by Microsoft Support to provide diagnostic logs of Microsoft Edge for iOS and Android. You can either upload the logs to Microsoft server or save them locally and share them directly with Microsoft Support. -1.Open **Help and feedback** from overflow menu +### Upload logs to Microsoft server +Follow these steps to upload logs to Microsoft server: +1. Reproduce the issue. +2. Open the overflow menu by selecting the hamburger icon at the bottom-right corner. +3. Swipe left and select **Help and feedback**. +4. In the **Describe what's happening section**, provide details about the issue so the support team can identify the relevant logs. +5. Upload the logs to Microsoft server by selecting the button at the top-right corner. -2.Click **diagnostic data** -3.For Microsoft Edge for iOS, click the **Share** icon on the top right. The OS sharing dialog will be displayed. You can choose to save the logs to local or share with other apps. For Microsoft Edge for Android, click sub menu on the top right corner to save logs. The logs will be stored to folder **Download** -> **Edge**. +### Save logs locally and share directly with Microsoft Support +Follow these steps to save logs locally and share them: +1. Reproduce the issue. +2. Open overflow menu by selecting on the hamburger menu on the bottom-right corner. +3. Swipe left and select **Help and feedback**. +4. Select **diagnostic data**. +6. For Microsoft Edge for iOS, tap the **Share** icon at the top-right corner. The OS sharing dialog will appear, allowing you to save the logs locally or share them via other apps. +For Microsoft Edge for Android, open the submenu in the top-right corner and select the option to save logs. The logs will be saved in the **Download** > **Edge** folder. -You may also want to click the **Clear** icon to clear logs first in order to get refresh logs. +If you want to clear the old logs, select the **Clear** icon at the top-right when selecting **diagnostic data**. Then, reproduce the issue again to ensure that only fresh logs are captured. > [!NOTE] > Saving logs also respects the Intune App Protection Policy. Therefore, you may not be allowed to save diagnostic data to local devices. diff --git a/memdocs/intune/apps/manage-microsoft-office.md b/memdocs/intune/apps/manage-microsoft-office.md index 757629b2953..cb60445832d 100644 --- a/memdocs/intune/apps/manage-microsoft-office.md +++ b/memdocs/intune/apps/manage-microsoft-office.md @@ -40,10 +40,10 @@ Microsoft 365 (Office) for iOS and Android delivers several key benefits includi - Integrating Microsoft Lens technology to unlock the power of the camera with capabilities like converting images into editable Word and Excel documents, scanning PDFs, and capturing whiteboards with automatic digital enhancements to make the content easier to read. - Adding new functionality for common tasks people often encounter when working on a phone—things like making quick notes, signing PDFs, scanning QR codes, and transferring files between devices. -The richest and broadest protection capabilities for Microsoft 365 data are available when you subscribe to the Enterprise Mobility + Security suite, which includes Microsoft Intune and Microsoft Entra ID P1 or P2 features, such as conditional access. At a minimum, you will want to deploy a conditional access policy that allows connectivity to Microsoft 365 (Office) for iOS and Android from mobile devices and an Intune app protection policy that ensures the collaboration experience is protected. +The richest and broadest protection capabilities for Microsoft 365 data are available when you subscribe to the Enterprise Mobility + Security suite, which includes Microsoft Intune and Microsoft Entra ID P1 or P2 features, such as Conditional Access. At a minimum, you will want to deploy a Conditional Access policy that allows connectivity to Microsoft 365 (Office) for iOS and Android from mobile devices and an Intune app protection policy that ensures the collaboration experience is protected. ## Apply Conditional Access -Organizations can use Microsoft Entra Conditional Access policies to ensure that users can only access work or school content using Microsoft 365 (Office) for iOS and Android. To do this, you will need a conditional access policy that targets all potential users. These policies are described in [Conditional Access: Require approved client apps or app protection policy](/azure/active-directory/conditional-access/howto-policy-approved-app-or-app-protection). +Organizations can use Microsoft Entra Conditional Access policies to ensure that users can only access work or school content using Microsoft 365 (Office) for iOS and Android. To do this, you will need a Conditional Access policy that targets all potential users. These policies are described in [Conditional Access: Require approved client apps or app protection policy](/azure/active-directory/conditional-access/howto-policy-approved-app-or-app-protection). 1. Follow the steps in [Require approved client apps or app protection policy with mobile devices](/azure/active-directory/conditional-access/howto-policy-approved-app-or-app-protection#require-approved-client-apps-or-app-protection-policy-with-mobile-devices), which allows Microsoft 365 (Office) for iOS and Android, but blocks third-party OAuth capable mobile device clients from connecting to Microsoft 365 endpoints. @@ -51,7 +51,7 @@ Organizations can use Microsoft Entra Conditional Access policies to ensure that > This policy ensures mobile users can access all Microsoft 365 endpoints using the applicable apps. > [!NOTE] -> To leverage app-based conditional access policies, the Microsoft Authenticator app must be installed on iOS devices. For Android devices, the Intune Company Portal app is required. For more information, see [App-based Conditional Access with Intune](../protect/app-based-conditional-access-intune.md). +> To leverage app-based Conditional Access policies, the Microsoft Authenticator app must be installed on iOS devices. For Android devices, the Intune Company Portal app is required. For more information, see [App-based Conditional Access with Intune](../protect/app-based-conditional-access-intune.md). ## Create Intune app protection policies diff --git a/memdocs/intune/apps/manage-microsoft-teams.md b/memdocs/intune/apps/manage-microsoft-teams.md index 665a5fb776d..f5d9fa40091 100644 --- a/memdocs/intune/apps/manage-microsoft-teams.md +++ b/memdocs/intune/apps/manage-microsoft-teams.md @@ -36,14 +36,14 @@ ms.collection: Microsoft Teams is the hub for team collaboration in Microsoft 365 that integrates the people, content, and tools your team needs to be more engaged and effective. -The richest and broadest protection capabilities for Microsoft 365 data are available when you subscribe to the Enterprise Mobility + Security suite, which includes Microsoft Intune and Microsoft Entra ID P1 or P2 features, such as conditional access. At a minimum, you'll want to deploy a conditional access policy that allows connectivity to Teams for iOS and Android from mobile devices and an Intune app protection policy that ensures the collaboration experience is protected. +The richest and broadest protection capabilities for Microsoft 365 data are available when you subscribe to the Enterprise Mobility + Security suite, which includes Microsoft Intune and Microsoft Entra ID P1 or P2 features, such as Conditional Access. At a minimum, you'll want to deploy a Conditional Access policy that allows connectivity to Teams for iOS and Android from mobile devices and an Intune app protection policy that ensures the collaboration experience is protected. ## Apply Conditional Access -Organizations can use Microsoft Entra Conditional Access policies to ensure that users can only access work or school content using Teams for iOS and Android. To do this, you will need a conditional access policy that targets all potential users. These policies are described in [Conditional Access: Require approved client apps or app protection policy](/azure/active-directory/conditional-access/howto-policy-approved-app-or-app-protection). +Organizations can use Microsoft Entra Conditional Access policies to ensure that users can only access work or school content using Teams for iOS and Android. To do this, you will need a Conditional Access policy that targets all potential users. These policies are described in [Conditional Access: Require approved client apps or app protection policy](/azure/active-directory/conditional-access/howto-policy-approved-app-or-app-protection). > [!NOTE] -> To leverage app-based conditional access policies, the Microsoft Authenticator app must be installed on iOS devices. For Android devices, the Intune Company Portal app is required. For more information, see [App-based Conditional Access with Intune](../protect/app-based-conditional-access-intune.md). +> To leverage app-based Conditional Access policies, the Microsoft Authenticator app must be installed on iOS devices. For Android devices, the Intune Company Portal app is required. For more information, see [App-based Conditional Access with Intune](../protect/app-based-conditional-access-intune.md). Follow the steps in [Require approved client apps or app protection policy with mobile devices](/azure/active-directory/conditional-access/howto-policy-approved-app-or-app-protection#require-approved-client-apps-or-app-protection-policy-with-mobile-devices), which allows Teams for iOS and Android, but blocks third-party OAuth capable mobile device clients from connecting to Microsoft 365 endpoints. diff --git a/memdocs/intune/apps/manage-without-gms.md b/memdocs/intune/apps/manage-without-gms.md index bfea7580abe..4b92cde69ef 100644 --- a/memdocs/intune/apps/manage-without-gms.md +++ b/memdocs/intune/apps/manage-without-gms.md @@ -37,10 +37,8 @@ Microsoft Intune uses Google Mobile Services (GMS) to communicate with the Micro > [!NOTE] > These GMS related limitations also apply to Device Administrator management and Android (AOSP) Management. -> [!NOTE] -> Microsoft Intune is ending support for [Android device administrator management](../enrollment/android-enroll-device-administrator.md) on devices with access to Google Mobile Services (GMS) on December 31, 2024. After that date, device enrollment, technical support, bug fixes, and security fixes will be unavailable. -> For devices running Android 15 or earlier that don't have access GMS (excluding Microsoft Teams certified Android devices), Intune will continue allowing device administrator enrollment and will maintain limited support, since Android Enterprise management is unavailable to these devices. However, device administrator use on these devices is still not recommended, since Google's device administrator deprecation means there could be future functionality impact outside Intune's ability to mitigate. -> For more information, and to learn about alternatives to device administrator, see [Ending support for Android device administrator on GMS devices](https://techcommunity.microsoft.com/t5/intune-customer-success/microsoft-intune-ending-support-for-android-device-administrator/ba-p/3915443). +[!INCLUDE [android_device_administrator_support](../includes/android-device-administrator-support.md)] + ## Install the Intune Company Portal app without access to the Google Play Store ### For users outside of People's Republic of China diff --git a/memdocs/intune/apps/media/apps-win32-app-management/apps-win32-app-11.png b/memdocs/intune/apps/media/apps-win32-app-management/apps-win32-app-11.png new file mode 100644 index 00000000000..3b2b59fca6f Binary files /dev/null and b/memdocs/intune/apps/media/apps-win32-app-management/apps-win32-app-11.png differ diff --git a/memdocs/intune/apps/protect-mam-windows.md b/memdocs/intune/apps/protect-mam-windows.md index 667771bb9c6..1e2c3612388 100644 --- a/memdocs/intune/apps/protect-mam-windows.md +++ b/memdocs/intune/apps/protect-mam-windows.md @@ -42,7 +42,7 @@ You can enable protected Mobile Application Management (MAM) access to org data - Application Protection Conditional Access to ensure the device is protected and healthy before granting protected service access via Microsoft Entra ID > [!NOTE] -> Intune Mobile Application Management (MAM) for Windows is available for Windows 10, build 19045.3636, KB5031445 or later and Windows 11, build 10.0.22621.2506, KB5031455 (22H2) or later. This includes the supporting changes for Microsoft Intune (2309 release), Microsoft Edge (v117 stable branch and later for Windows 11 and v118.0.2088.71 and later for Windows 11) and Windows Security Center (v 1.0.2310.2002 and later). App Protection Conditional Access is generally available. +> Intune Mobile Application Management (MAM) for Windows is available for Windows 10, build 19045.3636, KB5031445 or later and Windows 11, build 10.0.22621.2506, KB5031455 (22H2) or later. This includes the supporting changes for Microsoft Intune (2309 release), Microsoft Edge (v117 stable branch and later for Windows 11 and v118.0.2088.71 and later for Windows 10) and Windows Security Center (v 1.0.2310.2002 and later). App Protection Conditional Access is generally available. > > Windows MAM is supported in government cloud environments. For related information, see [Deploying apps using Intune on the GCC High and DoD Environments](../apps/apps-deploy-gcc-dod.md). > @@ -78,7 +78,7 @@ Preventing data loss is a part of protecting your organizational data. Data loss This MAM service syncs compliance state per user, per app, and per device to the Microsoft Entra CA service. This includes the threat information received from the Mobile Threat Defense (MTD) vendors starting with Windows Security Center. > [!NOTE] -> This MAM service uses the same conditional access compliance workflow that is used to [manage Microsoft Edge on iOS and Android devices](../apps/manage-microsoft-edge.md). +> This MAM service uses the same Conditional Access compliance workflow that is used to [manage Microsoft Edge on iOS and Android devices](../apps/manage-microsoft-edge.md). When a change is detected, the MAM service updates the device compliance state immediately. The service also includes MTD health state as part of the compliance state. @@ -88,7 +88,7 @@ When a change is detected, the MAM service updates the device compliance state i The MAM Client communicates the client heath state (or health metadata) to the MAM Service upon check-in. The health state includes any failure of APP Health Checks for **Block** or **Wipe** conditions. In addition, Microsoft Entra ID guides end-users through remediation steps when they attempt to access a blocked CA resource. ### Conditional Access Compliance -Organizations can use Microsoft Entra Conditional Access policies to ensure that users can only access work or school content using policy managed applications on Windows. To do this, you'll need a conditional access policy that targets all potential users. Follow the steps in [Require an app protection policy on Windows devices](/azure/active-directory/conditional-access/how-to-app-protection-policy-windows), which allows Microsoft Edge for Windows, but blocks other web browsers from connecting to Microsoft 365 endpoints. +Organizations can use Microsoft Entra Conditional Access policies to ensure that users can only access work or school content using policy managed applications on Windows. To do this, you'll need a Conditional Access policy that targets all potential users. Follow the steps in [Require an app protection policy on Windows devices](/azure/active-directory/conditional-access/how-to-app-protection-policy-windows), which allows Microsoft Edge for Windows, but blocks other web browsers from connecting to Microsoft 365 endpoints. With Conditional Access, you can also target on-premises sites that you have exposed to external users via the [Microsoft Entra application proxy](/azure/active-directory/active-directory-application-proxy-get-started). diff --git a/memdocs/intune/apps/store-apps-android.md b/memdocs/intune/apps/store-apps-android.md index f56f48667b8..39178a1d183 100644 --- a/memdocs/intune/apps/store-apps-android.md +++ b/memdocs/intune/apps/store-apps-android.md @@ -8,7 +8,7 @@ keywords: author: Erikre ms.author: erikre manager: dougeby -ms.date: 02/27/2024 +ms.date: 01/06/2025 ms.topic: how-to ms.service: microsoft-intune ms.subservice: apps diff --git a/memdocs/intune/apps/store-apps-company-portal-autopilot.md b/memdocs/intune/apps/store-apps-company-portal-autopilot.md index e928750a11b..fa136aae575 100644 --- a/memdocs/intune/apps/store-apps-company-portal-autopilot.md +++ b/memdocs/intune/apps/store-apps-company-portal-autopilot.md @@ -8,7 +8,7 @@ keywords: author: Erikre ms.author: erikre manager: dougeby -ms.date: 02/27/2024 +ms.date: 01/06/2025 ms.topic: how-to ms.service: microsoft-intune ms.subservice: apps diff --git a/memdocs/intune/apps/store-apps-ios.md b/memdocs/intune/apps/store-apps-ios.md index 739c88e02a6..83ade21213a 100644 --- a/memdocs/intune/apps/store-apps-ios.md +++ b/memdocs/intune/apps/store-apps-ios.md @@ -7,7 +7,7 @@ keywords: Intune author: Erikre ms.author: erikre manager: dougeby -ms.date: 02/27/2024 +ms.date: 01/06/2025 ms.topic: how-to ms.service: microsoft-intune ms.subservice: apps diff --git a/memdocs/intune/configuration/administrative-templates-windows.md b/memdocs/intune/configuration/administrative-templates-windows.md index 5dfe87fcf18..4e1d690e371 100644 --- a/memdocs/intune/configuration/administrative-templates-windows.md +++ b/memdocs/intune/configuration/administrative-templates-windows.md @@ -7,7 +7,7 @@ keywords: author: MandiOhlinger ms.author: mandia manager: dougeby -ms.date: 11/04/2024 +ms.date: 12/11/2024 ms.topic: how-to ms.service: microsoft-intune ms.subservice: configuration @@ -34,6 +34,9 @@ ms.collection: > [!IMPORTANT] > Starting with the December 2412 release, you can't create new Administrative Templates policies from the **Templates** > **Administrative Templates** profile type in the Intune admin center. To create ADMX template profiles, use the **[settings catalog](settings-catalog.md)**. For more information on this change, see [Windows device configuration policies migrating to unified settings platform in Intune](https://techcommunity.microsoft.com/t5/intune-customer-success/support-tip-windows-device-configuration-policies-migrating-to/ba-p/4189665). +> +> There will be no changes to the following UI experiences: +> - ‘Imported Administrative templates (Preview)’ template which is used for Custom ADMX templates. **Administrative Templates** in Microsoft Intune include thousands of settings that control features in Microsoft Edge version 77 and later, Internet Explorer, Google Chrome, Microsoft Office programs, remote desktop, OneDrive, passwords, PINs, and more. These settings enable administrators to create group policies using the cloud. diff --git a/memdocs/intune/configuration/apple-settings-catalog-configurations.md b/memdocs/intune/configuration/apple-settings-catalog-configurations.md new file mode 100644 index 00000000000..b45122d526b --- /dev/null +++ b/memdocs/intune/configuration/apple-settings-catalog-configurations.md @@ -0,0 +1,250 @@ +--- +# Required metadata +title: Apple configuration list for Intune settings catalog +description: Use the Microsoft Intune settings catalog to add, configure, or restrict features on Apple devices. This article lists and describes the settings you can configure. +author: beflamm +ms.author: beflamm +manager: dougeby +ms.topic: reference +ms.date: 11/13/2024 +ms.service: microsoft-intune +ms.subservice: configuration +ms.localizationpriority: medium + +# optional metadata +#ROBOTS: +#audience: +ms.reviewer: beflamm, mandia +ms.suite: ems +search.appverid: MET150 +#ms.tgt_pltfrm: +ms.custom: intune-azure +ms.collection: +- tier2 +- M365-identity-device-management +--- + +# Apple device configuration list in the Intune settings catalog + +This article lists and describes the Apple configurations you can manage using a settings catalog policy in Microsoft Intune. + +This article applies to: + +- iOS/iPadOS +- macOS + +## Before you begin + +- At a minimum, sign into the Intune admin center as a member of the **Policy and Profile Manager** role. For more information on the built-in Intune roles, go to [Role-based access control (RBAC) with Microsoft Intune](../fundamentals/role-based-access-control.md). +- Create a [settings catalog policy](settings-catalog.md). + +### How to use this article + +This article covers the two types of configurations from Apple's mobile device management (MDM) protocol: + +- Apple declarative configurations +- Apple MDM payloads + +Each section can have links to other documents: + +- **Apple platform guides**: The Apple Platform Deployment and Security guides that cover deployment and security features of Apple technology +- **Apple developer**: The developer documentation outlines the device management API that gets updated with every OS release +- **Apple YAML**: Apple GitHub repository that contains setting definitions that are ingested into the settings catalog. Use this information to see requirements like applicable OS version, enrollment types, and if supervision is required +- **Intune documentation**: Intune guides for scenario-based configuration like setting up Platform Single Sign On or deploying declarative software updates +- **Known issues**: Updated list of known issues related to each configuration + +Some settings are available in device configuration templates and in the settings catalog. To help with a manual policy migration, this article lists the template settings that maps to their equivalent setting in the settings catalog. + +> [!IMPORTANT] +> It's recommended to create all new policies using the settings catalog where possible. Some of the existing device configuration templates are no longer being updated. In a future Intune release, they will be migrated to use the settings catalog policy type and the ability to create new templates will be deprecated. These templates include: +> +> - Device features +> - Device restrictions +> - Endpoint protection (Deprecated) +> - Extensions (Deprecated) +> +> Policies that should still be created using templates include: +> +> - Derived credential +> - Email +> - PKCS certificate +> - PKCS imported certificate +> - SCEP certificate +> - Trusted certificate +> - VPN +> - Wi-Fi +> - Wired network + +## Apple declarative configurations + +This section is specific to the configurations that are under the Declarative Device Management (DDM) category in the settings catalog. You can learn more about DDM at [Intro to declarative device management and Apple devices](https://support.apple.com/guide/deployment/depb1bab77f8/1/web/1.0) on Apple's website. + +### Disk Management + +Use Disk Management setting to install disk management settings on devices. This configuration is located in the **Declarative Device Management (DDM)** category of the settings catalog. You can learn more about Disk Management using the following documentation: + +|Apple Platform Guides|Apple Developer|Apple YAML|Intune documentation| +| -------- | -------- | -------- | -------- | +|[Storage management declarative configuration](https://support.apple.com/en-tm/guide/deployment/dep2b9f009ed/web)|[Disk Management Settings](https://developer.apple.com/documentation/devicemanagement/diskmanagementsettings)|[Disk Management Settings](https://github.com/apple/device-management/blob/release/declarative/declarations/configurations/diskmanagement.settings.yaml)|| + +**Known issues** + +- None + +### Math Settings + +Use Math Settings to configure the Math and Calculator apps on devices. This configuration is located in the **Declarative Device Management (DDM)** category of the settings catalog. You can learn more about Math Settings using the following documentation: + +|Apple Platform Guides|Apple Developer|Apple YAML|Intune documentation| +| -------- | -------- | -------- | -------- | +|[Math and Calculator app declarative configuration](https://support.apple.com/en-tm/guide/deployment/dep7881be3bb/web)|[Math Settings](https://developer.apple.com/documentation/devicemanagement/mathsettings)|[Math Settings](https://github.com/apple/device-management/blob/release/declarative/declarations/configurations/math.settings.yaml)|| + +**Known issues** + +- None + +### Passcode +Use the passcode configuration to require that devices have a password or passcode that meet your organization's requirements. This configuration is located in the **Declarative Device Management (DDM)** category of the settings catalog. You can learn more about Passcode using the following documentation: + +| Apple Platform Guides | Apple Developer | Apple YAML | Intune documentation| +| ------- | ------- | ------- | ------- | +|

  • [Passcodes and passwords](https://support.apple.com/guide/security/sec20230a10d/web)
  • [Passcode declarative configuration](https://support.apple.com/guide/deployment/depf72b010a8/1/web/1.0)
| [Passcode](https://developer.apple.com/documentation/devicemanagement/passcode)| [Passcode](https://github.com/apple/device-management/blob/release/declarative/declarations/configurations/passcode.settings.yaml)|| + +**Known issues** + +- None + +### Safari Extension Settings + +Use the Safari extensions settings to manage extensions in the Safari browser. This configuration is located in the **Declarative Device Management (DDM)** category of the settings catalog. You can learn more about Safari Extension Settings using the following documentation: + +|Apple Platform Guides|Apple Developer|Apple YAML|Intune documentation| +| -------- | -------- | -------- | -------- | +|[Safari extensions management declarative configuration](https://support.apple.com/en-tm/guide/deployment/depff7fad9d8/web)|[Safari Extension Settings](https://developer.apple.com/documentation/devicemanagement/safariextensionsettings)|[Safari Extension Settings](https://github.com/apple/device-management/blob/release/declarative/declarations/configurations/safari.extensions.settings.yaml)|| + +**Known issues** + +- None + +### Software Update +Use the Software Update configuration to enforce an update to install at a specific time. This configuration is located in the **Declarative Device Management (DDM)** category of the settings catalog. You can learn more about this configuration using the following documentation: + +| Apple Platform Guides | Apple Developer | Apple YAML | Intune documentation +| ------- | ------- | ------- | ------- | +|
  • [Software Update declarative configuration](https://support.apple.com/guide/deployment/depca14ecd4d/1/web/1.0)
  • [Installing and enforcing software updates](https://support.apple.com/guide/deployment/depd30715cbb/web)
| [Software Update Enforcement Specific](https://developer.apple.com/documentation/devicemanagement/softwareupdateenforcementspecific)| [Software Update Enforcement Specific](https://github.com/apple/device-management/blob/release/declarative/declarations/configurations/softwareupdate.enforcement.specific.yaml)| [Use the settings catalog to configure managed software updates](../protect/managed-software-updates-ios-macos.md) | + +**Known issues** + +- None + +### Software Update Settings + +Use the Software Update Settings configuration to defer OS updates and control how users can manually interact with software updates in System Settings. This configuration is located in the **Declarative Device Management (DDM)** category of the settings catalog. You can learn more about Passcode using the following documentation: + +|Apple Platform Guides|Apple Developer|Apple YAML|Intune documentation| +| -------- | -------- | -------- | -------- | +|[Software Update Settings declarative configuration](https://support.apple.com/en-tm/guide/deployment/dep0578d8b8a/web)|[Software Update Settings](https://developer.apple.com/documentation/devicemanagement/softwareupdatesettings)|[Software Update Settings](https://github.com/apple/device-management/blob/release/declarative/declarations/configurations/softwareupdate.settings.yaml)|[Use the settings catalog to configure managed software updates](../protect/managed-software-updates-ios-macos.md)| + +**Known issues** + +- None + +## Apple MDM payload settings + +This section is specific to Apple payloads that use the standard MDM channel. A list of these payloads is available at [Review MDM payloads for Apple devices](https://support.apple.com/guide/deployment/dep5370d089/web) on Apple's website. + +### FileVault + +Use FileVault configurations to manage disk encryption on macOS devices. These configurations are located in the **Full Disk Encryption** category of the settings catalog. You can learn more about FileVault using the following documentation: + +| Apple Platform Guides | Apple Developer | Apple YAML | Intune documentation +| ------- | ------- | ------- | ------- | +|
  • [Introduction to FileVault](https://support.apple.com/guide/deployment/dep82064ec40/web)
  • [FileVault payload for Apple devices](https://support.apple.com/guide/deployment/dep32bf53500/web)|
    • [FDEFileVault](https://developer.apple.com/documentation/devicemanagement/fdefilevault)
    • [FDEFileVaultOptions](https://developer.apple.com/documentation/devicemanagement/fdefilevaultoptions)
    • [FDERecoveryKeyEscrow](https://developer.apple.com/documentation/devicemanagement/fderecoverykeyescrow)
    |
    • [FileVault](https://github.com/apple/device-management/blob/release/mdm/profiles/com.apple.MCX.FileVault2.yaml)
    • [FileVault Options](https://github.com/apple/device-management/blob/release/mdm/profiles/com.apple.MCX(FileVault2).yaml)
    • [FileVault Recovery Key Escrow](https://github.com/apple/device-management/blob/release/mdm/profiles/com.apple.security.FDERecoveryKeyEscrow.yaml)
    | [Encrypt macOS devices (Microsoft Learn)](../protect/encrypt-devices-filevault.md)| + +**Known issues** + +- [FileVault failing to enable on macOS devices during Setup Assistant](https://techcommunity.microsoft.com/t5/intune-customer-success/known-issue-filevault-failing-to-enable-on-macos-devices-during/ba-p/4180523) + +#### Intune device configuration template to settings catalog mapping + +| Endpoint protection template | Settings catalog category| Settings catalog setting | +| -------- | ------- | ------- | +| Enable FileVault | Full Disk Encryption > FileVault | Enable | +| Escrow location description of personal recovery key | Full Disk Encryption > FileVault Recovery Key Escrow | Location +| Personal recovery key rotation | Full Disk Encryption > FileVault | Recovery Key Rotation In Months | +| Hide recovery key | Full Disk Encryption > FileVault | Show Recovery Key | +| Disable prompt at sign out | Full Disk Encryption > FileVault | Defer Don't Ask At User Logout | +| Number of times allowed to bypass | Full Disk Encryption > FileVault | Defer Force At User Login Max Bypass Attempts | + +### Firewall + +Use the Firewall configuration to manage the native macOS application firewall. This configuration is located in the **Security** category of the settings catalog. You can learn more about Firewall using the following documentation: + +| Apple Platform Guides | Apple Developer | Apple YAML | +| -------- | ------- | ------- | +|
    • [Firewall security in macOS](https://support.apple.com/guide/security/seca0e83763f/web)
    • [Firewall payload](https://support.apple.com/guide/deployment/dep8d306275f/web)
    | [Firewall](https://developer.apple.com/documentation/devicemanagement/firewall) | [Firewall (YAML)](https://github.com/apple/device-management/blob/release/mdm/profiles/com.apple.security.firewall.yaml) | + +**Known issues** + +- [macOS devices using stealth mode turn noncompliant after upgrading to macOS 15](https://techcommunity.microsoft.com/t5/intune-customer-success/known-issue-macos-devices-using-stealth-mode-turn-non-compliant/ba-p/4250583) + +#### Intune device configuration template to settings catalog mapping + +| Endpoint protection template | Settings catalog category| Settings catalog setting | +| -------- | ------- | ------- | +| Enable Firewall | Networking > Firewall | Enable Firewall | +| Block all incoming connections | Networking > Firewall | Block All Incoming +| Apps allowed | Networking > Firewall | Applications (Allowed = True) | +| Apps blocked | Networking > Firewall | Applications (Allowed = False) | +| Enable stealth mode | Networking > Firewall | Enable Stealth Mode | + +### Font + +> [!NOTE] +> Font files being uploaded to Intune must be less than 2MB in size. + +Use the Font payload to configure fonts on devices. This configuration is located in the **System Configuration** category of the settings catalog. You can learn more about Font using the following documentation: + +|Apple Platform Guides|Apple Developer|Apple YAML|Intune documentation| +| -------- | -------- | -------- | -------- | +|[Fonts MDM payload settings](https://support.apple.com/en-tm/guide/deployment/depeba084b8/web)|[Font](https://developer.apple.com/documentation/devicemanagement/font)|[Font](https://github.com/apple/device-management/blob/release/mdm/profiles/com.apple.font.yaml)|| + +**Known issues** + +- None + +### System Policy Control (Gatekeeper) +Use the System Policy Control payload to configure Gatekeeper settings. This configuration is located in the **System Policy Control** category of the settings catalog. You can learn more about System Policy Control using the following documentation: + +| Apple Platform Guides | Apple Developer | Apple YAML | +| -------- | ------- | ------- | +|
    • [Gatekeeper and runtime protection](https://support.apple.com/guide/security/sec5599b66df/web)
    • [Security MDM payload](https://support.apple.com/guide/deployment/dep61dc030/web)
    | [SystemPolicyControl](https://developer.apple.com/documentation/devicemanagement/systempolicycontrol) | [System Policy Control](https://github.com/apple/device-management/blob/release/mdm/profiles/com.apple.systempolicy.control.yaml) | + +**Known issues** + +- None + +#### Intune device configuration template to settings catalog mapping + +| Endpoint protection template | Settings catalog category| Settings catalog setting | +| -------- | ------- | ------- | +| Do not allow user to override Gatekeeper | System Policy Control > System Policy Control | Enable Assessment | +| Allow apps downloaded from these locations | System Policy Control > System Policy Control | Allow Identified Developers | +### System Extensions +Use the System Extensions payload to configure system extensions to be automatically loaded or prevent users from approving specific extensions. This configuration is located in the **System Configuration** category of the settings catalog. You can learn more about System Extensions using the following documentation: + +| Apple Platform Guides | Apple Developer | Apple YAML | +| -------- | ------- | ------- | +|
    • [System and kernel extensions](https://support.apple.com/guide/deployment/system-and-kernel-extensions-in-macos-depa5fb8376f/web)
    • [System Extensions](https://support.apple.com/guide/deployment/dep5d1584ca4/web)
    | [System Extensions](https://developer.apple.com/documentation/devicemanagement/systemextensions) | [System Extensions](https://github.com/apple/device-management/blob/release/mdm/profiles/com.apple.system-extension-policy.yaml)| + +**Known issues** + +- None + +#### Intune device configuration template to settings catalog mapping +| Extensions template | Settings catalog category| Settings catalog setting | +| -------- | ------- | ------- | +| Block User Overrides | System Configuration > System Extensions | Allow User Overrides | +| Allowed team identifiers | System Configuration > System Extensions | Allowed Team Identifiers +| Allowed system extensions | System Configuration > System Extensions | Allowed System Extensions +| Allowed system extension types | System Configuration > System Extensions | Allowed System Extension Types | diff --git a/memdocs/intune/configuration/custom-settings-linux.md b/memdocs/intune/configuration/custom-settings-linux.md index e9edec7477b..3c09718c7c1 100644 --- a/memdocs/intune/configuration/custom-settings-linux.md +++ b/memdocs/intune/configuration/custom-settings-linux.md @@ -8,7 +8,7 @@ keywords: author: MandiOhlinger ms.author: mandia manager: dougeby -ms.date: 05/15/2024 +ms.date: 01/09/2025 ms.topic: conceptual ms.service: microsoft-intune ms.subservice: configuration @@ -17,7 +17,7 @@ ms.localizationpriority: medium #ROBOTS: #audience: -ms.reviewer: ilwu +ms.reviewer: arnab ms.suite: ems search.appverid: MET150 #ms.tgt_pltfrm: @@ -61,7 +61,7 @@ This article lists the steps to add an existing script and has a GitHub repo wit - **Execution context**: Select the context the script is executed in. Your options: - **User** (default): When a user signs in to the device, the script runs. If a user never signs into the device, or there isn't any user affinity, then the script doesn't run. - - **Root**: The script always runs (with or without users logged in) at the device level. + - **Root**: The script always runs (with or without users logged in) at the device level. The first time the script executes, the end user might have to consent. After they consent, it should continue to execute on its schedule. - **Execution frequency**: Select how frequently the script is executed. The default is **Every 15 minutes**. diff --git a/memdocs/intune/configuration/device-profile-assign.md b/memdocs/intune/configuration/device-profile-assign.md index 84a8e9d7e68..5aa7f42b36d 100644 --- a/memdocs/intune/configuration/device-profile-assign.md +++ b/memdocs/intune/configuration/device-profile-assign.md @@ -40,7 +40,7 @@ In Intune, you can create and assign the following policies: - App protection policies - App configuration policies - Compliance policies -- Conditional access policies +- Conditional Access policies - Device configuration profiles - Enrollment policies diff --git a/memdocs/intune/configuration/device-profile-monitor.md b/memdocs/intune/configuration/device-profile-monitor.md index baf7fda7978..1f363a71eca 100644 --- a/memdocs/intune/configuration/device-profile-monitor.md +++ b/memdocs/intune/configuration/device-profile-monitor.md @@ -32,7 +32,7 @@ ms.collection: # Monitor device configuration policies in Microsoft Intune -Intune includes some features to help monitor and manage your device configuration policies. For example, you can check the status of a policy, view the devices assigned to the policy, and update the properties of an existing policy. +Intune includes some features to help monitor and manage your device configuration policies. For example, you can check the status of a policy, view the devices assigned to the policy, and update the properties of an existing policy. These capabilities extend to the profiles for your [endpoint security policies](../protect/endpoint-security-manage-devices.md#review-your-profiles-for-endpoint-security-policies) for macOS and Windows devices. You can also use [Microsoft Copilot in Intune](../copilot/copilot-intune-overview.md) to get more information about your policies and the settings configured in your policies. @@ -62,7 +62,7 @@ After you create your device configuration policy, Intune provides reporting dat # [By policy](#tab/policy) 1. In **Devices** > **Manage devices** > **Configuration** > **Policies** tab, select an existing policy. - + 2. **Device and user check-in status** shows the number of all users or devices that checked-in with the policy. If one device has multiple users, this report shows the status for each user. When the user or device checks in with Intune, they receive the settings in your policy. The following statuses are shown: diff --git a/memdocs/intune/configuration/device-profile-troubleshoot.md b/memdocs/intune/configuration/device-profile-troubleshoot.md index 6cd6514893f..51028584a4d 100644 --- a/memdocs/intune/configuration/device-profile-troubleshoot.md +++ b/memdocs/intune/configuration/device-profile-troubleshoot.md @@ -7,7 +7,7 @@ keywords: author: MandiOhlinger ms.author: mandia manager: dougeby -ms.date: 05/13/2024 +ms.date: 11/25/2024 ms.topic: troubleshooting ms.service: microsoft-intune ms.subservice: configuration @@ -40,49 +40,61 @@ This article applies to the following policies: - App protection policies - App configuration policies - Compliance policies -- Conditional access policies +- Conditional Access policies - Device configuration profiles - Enrollment policies ## Policy refresh intervals -Intune notifies the device to check in with the Intune service. The notification times vary, including immediately up to a few hours. These notification times also vary between platforms. On Android devices, [Google Mobile Services (GMS) can affect policy refresh intervals](../apps/manage-without-gms.md#some-tasks-can-be-delayed). +When a device checks-in, it immediately checks for compliance, non-compliance and configuration for the current user/device context, receiving any pending actions, policies and apps assigned to it. -If a device doesn't check in to get the policy or profile after the first notification, Intune makes three more attempts. An offline device, such as turned off, or not connected to a network, might not receive the notifications. In this case, the device gets the policy or profile on its next scheduled check-in with the Intune service. The same applies to checks for noncompliance, including devices that move from a compliant to a noncompliant state. +There are 4 main types of check-ins: -**Estimated** frequencies: +**Scheduled check-ins** - These check-ins happen at predetermined intervals and can be initiated by the client or service depending on the platform. The check-ins are estimated as follows: -| Platform | Refresh cycle| +| Platform | Estimated refresh cycle| | --- | --- | | Android, AOSP | About every 8 hours | | iOS/iPadOS | About every 8 hours | | macOS | About every 8 hours | | Windows 10/11 PCs enrolled as devices | About every 8 hours | -| Windows 8.1 | About every 8 hours | -If devices recently enroll, then the compliance, noncompliance, and configuration check-in runs more frequently. The check-ins are **estimated** at: +**End user driven check-ins** – These check-ins are driven by end users when they perform certain actions in the Company Portal app like going into  **Devices** > **Check Status** or **Settings** > **Sync** to check for policy or profile updates or selecting an app for download. -| Platform | Frequency | +**Admin check-ins** - These check-ins are driven by admins when they perform certain actions on a single device from the Intune portal, like [device sync](../remote-actions/device-sync.md), [remote lock](../remote-actions/device-remote-lock.md) or [reset passcode](../remote-actions/device-passcode-reset.md). Other actions like [remotely assist users](../fundamentals/remote-help.md) do not cause a device check-in. + +**Notification-based check-ins** - These check-ins happen through different actions that trigger a notification. For example, when a policy, profile, or app is assigned (or unassigned), updated, deleted, or when certain behind the scenes changes like Microsoft Entra group membership updates are made. Other changes don't cause an immediate notification to devices, like adding an app as available to your users. + +Intune notifies online devices to check-in with the Intune service. The notification times vary from immediately up to a few hours. +These notification times also vary between platforms. + +- On Android devices, [Google Mobile Services (GMS) can affect policy refresh intervals](../apps/manage-without-gms.md#some-tasks-can-be-delayed). + +- On iOS devices, [Specific conditions can affect policy refresh intervals](/troubleshoot/mem/intune/device-configuration/2016341112-ios-device-is-currently-busy). + +An offline device, such as a powered off, or a disconnected device, might not receive the notifications. In this case, the device gets the policy or profile on its next scheduled check-in with Intune. + +> [!NOTE] +> It might take additional time for Intune reports to reflect the latest status of the policy on the device in the Intune portal. + +Additionally, when devices first enroll, configuration check-ins run more frequently to perform configuration, compliance and non-compliance checks. The check-ins are estimated as follows: + +| Platform | Estimated refresh cycle| | --- | --- | | Android, AOSP | Every 3 minutes for 15 minutes, then every 15 minutes for 2 hours, and then around every 8 hours | | iOS/iPadOS | Every 15 minutes for 1 hour, and then around every 8 hours | | macOS | Every 15 minutes for 1 hour, and then around every 8 hours | | Windows 10/11 PCs enrolled as devices | Every 3 minutes for 15 minutes, then every 15 minutes for 2 hours, and then around every 8 hours | -| Windows 8.1 | Every 5 minutes for 15 minutes, then every 15 minutes for 2 hours, and then around every 8 hours | - -For app protection policy refresh intervals, go to [App Protection Policy delivery timing](../apps/app-protection-policy-delivery.md). - -At any time, users can open the Company Portal app, **Devices** > **Check Status** or **Settings** > **Sync** to immediately check for policy or profile updates. For related information about the Intune Management Extension agent or Win32 apps, see [Win32 app management in Microsoft Intune](../apps/apps-win32-app-management.md). -## Intune actions that immediately send a notification to a device +For app protection policy refresh intervals, go to [App Protection Policy delivery timing](../apps/app-protection-policy-delivery.md). -There are different actions that trigger a notification. For example, when a policy, profile, or app is assigned (or unassigned), updated, deleted, and so on. These action times vary between platforms. +## Company portal -Devices check in with Intune when they receive a notification to check in, or during the scheduled check-in. When you target a device or user with an action, then Intune immediately notifies the device to check in to receive these updates. For example, a notification happens when a lock, passcode reset, app, or policy assignment action runs. +At any time, users can open the Company Portal app and navigate to **Devices** > **Check Status** to evaluate your device's settings and verify access to work or school resources or navigate to **Settings** > **Sync** to get the latest updates, requirements, and communications from your organization. -Other changes don't cause an immediate notification to devices, including revising the contact information in the Company Portal app or updates to an `.ipa` file. +For related information about the Intune Management Extension agent or Win32 apps, see [Win32 app management in Microsoft Intune](../apps/apps-win32-app-management.md). -The settings in the policy or profile are applied at every check-in. A [Windows 10 MDM policy refresh customer blog post](https://www.petervanderwoude.nl/post/windows-10-mdm-policy-refresh/) might be a good resource. +For related information, see [Sync enrolled device for Windows](../user-help/sync-your-device-manually-windows.md) and [Check device access in Company Portal for Windows](../user-help/check-device-access-windows-cpapp.md). ## Conflicts @@ -172,6 +184,12 @@ For more information on dynamic groups, go to: - [Performance recommendations when using Intune to group, target, and filter](../fundamentals/filters-performance-recommendations.md) - [Dynamic membership rules for groups in Microsoft Entra ID](/azure/active-directory/enterprise-users/groups-dynamic-membership) +## "The sync could not be initiated (0x80072f9a)" error + +On Windows devices, when trying to sync in the **Settings** app > **Accounts** > **Access work or school**, you might see a `The sync could not be initiated (0x80072f9a)` error. + +If the Trusted Platform Module (TPM) was reset to factory settings, then the device must reenrolled to resume syncing. The device's Microsoft Entra identity is stored in the TPM. So, if the ID is removed, then reenrollment is the only way to reestablish the Microsoft Entra identity. + ## Related articles - [Troubleshoot policies and profiles](/troubleshoot/mem/intune/troubleshoot-policies-in-microsoft-intune). diff --git a/memdocs/intune/configuration/device-profiles.md b/memdocs/intune/configuration/device-profiles.md index ace0952e590..75b48eb82ec 100644 --- a/memdocs/intune/configuration/device-profiles.md +++ b/memdocs/intune/configuration/device-profiles.md @@ -265,7 +265,7 @@ This feature supports: ## Microsoft Defender for Endpoint -[Microsoft Defender for Endpoint](../protect/advanced-threat-protection.md) integrates with Intune to monitor and help protect devices. You set risk levels, and determine what happens if devices exceed that level. When combined with conditional access, you can help prevent malicious activity in your organization. +[Microsoft Defender for Endpoint](../protect/advanced-threat-protection.md) integrates with Intune to monitor and help protect devices. You set risk levels, and determine what happens if devices exceed that level. When combined with Conditional Access, you can help prevent malicious activity in your organization. This feature supports: diff --git a/memdocs/intune/configuration/device-restrictions-android-enterprise-personal.md b/memdocs/intune/configuration/device-restrictions-android-enterprise-personal.md index 2159afa9e83..e4351628178 100644 --- a/memdocs/intune/configuration/device-restrictions-android-enterprise-personal.md +++ b/memdocs/intune/configuration/device-restrictions-android-enterprise-personal.md @@ -18,7 +18,7 @@ ms.localizationpriority: medium #audience: params: siblings_only: true -ms.reviewer: andreibiswas, anuragjain +ms.reviewer: arnab, anuragjain ms.suite: ems search.appverid: MET150 #ms.tgt_pltfrm: diff --git a/memdocs/intune/configuration/device-restrictions-android-for-work.md b/memdocs/intune/configuration/device-restrictions-android-for-work.md index 17ce9a929b3..f7fd491beb2 100644 --- a/memdocs/intune/configuration/device-restrictions-android-for-work.md +++ b/memdocs/intune/configuration/device-restrictions-android-for-work.md @@ -18,7 +18,7 @@ ms.localizationpriority: medium #audience: params: siblings_only: true -ms.reviewer: andreibiswas, anuragjain +ms.reviewer: arnab, anuragjain ms.suite: ems search.appverid: MET150 #ms.tgt_pltfrm: diff --git a/memdocs/intune/configuration/device-restrictions-ios.md b/memdocs/intune/configuration/device-restrictions-ios.md index 6074512f15a..cfaf7aa8ae8 100644 --- a/memdocs/intune/configuration/device-restrictions-ios.md +++ b/memdocs/intune/configuration/device-restrictions-ios.md @@ -6,7 +6,7 @@ keywords: author: MandiOhlinger ms.author: mandia manager: dougeby -ms.date: 04/30/2024 +ms.date: 01/21/2025 ms.topic: reference ms.service: microsoft-intune ms.subservice: configuration @@ -47,7 +47,7 @@ These settings are added to a device configuration profile in Intune, and then a ## Before you begin -When configuring device restriction policies, the broad range of settings enable you to tailor protection to your specific needs. +When you configure device restriction policies, the broad range of settings enable you to tailor protection to your specific needs. @@ -100,7 +100,7 @@ When you're ready to proceed, create an [iOS/iPadOS device restrictions configur Starting with iOS/iPadOS 13.0, this setting requires supervised devices. - - **Block installing apps using App Store**: **Yes** doesn't show the app store on the device home screen. Users can continue to use iTunes or the Apple Configurator to install apps. When set to **Not configured** (default), Intune doesn't change or update this setting. By default, the OS might allow the app store on the home screen. + - **Block installing apps using App Store**: When set to **Yes**, the app store isn't shown on the device home screen. Users can continue to use iTunes or the Apple Configurator to install apps. When set to **Not configured** (default), Intune doesn't change or update this setting. By default, the OS might allow the app store on the home screen. - **Block automatic app downloads**: **Yes** prevents automatic downloading of apps bought on other devices and automatic updates to new apps. It doesn't affect updates to existing apps. When set to **Not configured** (default), Intune doesn't change or update this setting. By default, the OS might allow apps bought on other iOS/iPadOS devices to download and update on the device. - **Block playback of explicit music, podcast, and iTunes U**: **Yes** prevents explicit iTunes music, podcast, or news content. When set to **Not configured** (default), Intune doesn't change or update this setting. By default, the OS might allow the device to access content rated as adult from the store. @@ -128,7 +128,7 @@ Use these settings to configure iOS/iPadOS devices to run specific apps in auton For the ASAM configuration to apply, users must manually open the specific app. This task also applies to the Company Portal app. -- For example, in a school or university environment, add an app that lets users take a test on the device. Or, lock the device into the Company Portal app until the user authenticates. When the apps actions are completed by users, or you remove this policy, the device returns to its normal state. +- For example, in a school or university environment, add an app that lets users take a test on the device. Or, lock the device into the Company Portal app until the user authenticates. When the users complete the app's actions, or you remove this policy, the device returns to its normal state. - Not all apps support autonomous single app mode. To put an app in ASAM, a bundle ID or a key value pair delivered by an app config policy are typically required. For more information, see the [`autonomousSingleAppModePermittedAppIDs` restriction](https://developer.apple.com/documentation/devicemanagement/restrictions) in Apple's MDM documentation. For more information on the specific settings required for the app you're configuring, see the vendor documentation. @@ -172,9 +172,9 @@ You can also **Import** a CSV file with the list of app names and their bundle I - **Safari cookies**: By default, Apple allows all cookies, and blocks cross site tracking. Use this setting to allow users to enable or disable these features. Your options: - **Not configured** (default): Intune doesn't change or update this setting. By default, the OS allows all cookies and blocks cross site tracking, and might allow users to enable and disable these features. - - **Allow all cookies, and allow cross site tracking**: Cookies are allowed, and can be disabled by users. By default, cross site tracking is blocked, and can be enabled by users. + - **Allow all cookies, and allow cross site tracking**: Cookies are allowed, and users can disable the cookies. By default, cross site tracking is blocked, and users can enable cross site tracking. - **Block all cookies, and block cross site tracking**: Cookies and cross site tracking are both blocked. Users can't enable or disable either setting. - - **Allow all cookies, and block cross site tracking**: Cookies are allowed, and can be disabled by users. By default, cross site tracking is blocked, and can't be enabled or disabled by users. + - **Allow all cookies, and block cross site tracking**: Cookies are allowed, and users can disable the cookies. By default, cross site tracking is blocked, and users can't enable or disable cross site tracking. - **Block Safari JavaScript**: **Yes** prevents Java scripts in the browser from running on devices. When set to **Not configured** (default), Intune doesn't change or update this setting. By default, the OS might allow Java scripts. @@ -798,18 +798,23 @@ You can also: - On iOS/iPadOS 14.5 and newer devices, use this setting. Don't use the **Require joining Wi-Fi networks only using configuration profiles** setting. - - When set to **Yes**, be sure the device has a Wi-Fi profile. If you don't assign a Wi-Fi profile, then this setting can prevent devices from connecting to the internet. For example, if this device restrictions profile is assigned before a Wi-Fi profile, then the device might be blocked from connecting to the internet. + - When set to **Yes**: + + - Make sure you configure a Wi-Fi device configuration profile using the [built-in Wi-Fi template](wi-fi-settings-configure.md) (not the settings catalog). Don't assign Wi-Fi profiles created using [custom profiles](custom-settings-ios.md), as this setting doesn't support custom Wi-Fi profiles. + + If you don't use the built-in Wi-Fi device configuration template, then the policy shows an error state for this settiing (**Require devices to use Wi-Fi networks set up via configuration profiles**). + + - Make sure that the Wi-Fi device configuration profile is already on the devices **before** you assign this setting (**Require devices to use Wi-Fi networks set up via configuration profiles**). + + If you don't assign a Wi-Fi profile, then this setting can prevent devices from connecting to the internet. For example, if this device restrictions profile is assigned before a Wi-Fi profile, then the device might be blocked from connecting to the internet. - If the device can't connect, then unenroll the device, and re-enroll with a Wi-Fi profile. Then, set this setting to **Yes** in a device restrictions profile, and assign the profile to the device. - - > [!NOTE] - > **Require devices to use Wi-Fi networks set up via configuration profiles** does not support Wi-Fi profiles deployed using [custom profiles](custom-settings-ios.md). This feature applies to: - - iOS/iPadOS 14.5 and newer -## Next steps + - iOS/iPadOS 14.5 and newer -[Assign the profile](device-profile-assign.md) and [monitor its status](device-profile-monitor.md). +## Related articles -You can also restrict device features and settings on [macOS](device-restrictions-macos.md) devices. +- [Assign the profile](device-profile-assign.md) and [monitor its status](device-profile-monitor.md). +- Restrict device features and settings on [macOS](device-restrictions-macos.md) devices. diff --git a/memdocs/intune/configuration/kernel-extensions-settings-macos.md b/memdocs/intune/configuration/kernel-extensions-settings-macos.md index bce329bdc46..f9f99d26d75 100644 --- a/memdocs/intune/configuration/kernel-extensions-settings-macos.md +++ b/memdocs/intune/configuration/kernel-extensions-settings-macos.md @@ -7,7 +7,7 @@ keywords: author: MandiOhlinger ms.author: mandia manager: dougeby -ms.date: 04/15/2024 +ms.date: 09/23/2024 ms.topic: reference ms.service: microsoft-intune ms.subservice: configuration @@ -28,6 +28,11 @@ ms.collection: # macOS device settings to configure and use kernel and system extensions in Intune +> [!IMPORTANT] +> This template is deprecated in the August 2024 service release (2408). Existing policies continue to work. But, you can't create new policies using this template. +> +> Instead, use the settings catalog to create new policies that configure the System Extension payload. To learn more about the settings catalog, go to the [macOS settings catalog](settings-catalog.md). + > [!NOTE] > > - [!INCLUDE [not-all-settings-are-documented](../includes/not-all-settings-are-documented.md)] diff --git a/memdocs/intune/configuration/platform-sso-macos.md b/memdocs/intune/configuration/platform-sso-macos.md index 0ded4892380..f33ec228292 100644 --- a/memdocs/intune/configuration/platform-sso-macos.md +++ b/memdocs/intune/configuration/platform-sso-macos.md @@ -7,7 +7,7 @@ keywords: author: MandiOhlinger ms.author: mandia manager: dougeby -ms.date: 09/03/2024 +ms.date: 01/08/2025 ms.topic: how-to ms.service: microsoft-intune ms.subservice: configuration @@ -249,6 +249,12 @@ To configure the Platform SSO policy, use the following steps to create an [Intu 11. In **Assignments**, select the user or device groups that receive your profile. For devices with user affinity, assign to users or user groups. For devices with multiple users that are enrolled without user affinity, assign to devices or device groups. + > [!IMPORTANT] + > For Platform SSO settings on devices with user affinity, it's not supported to assign to device groups or filters. When using device group assignment or user group assignment with filters on devices with user affinity, the user might be unable to access resources protected by Conditional Access. This issue can happen: + > + > - If the Platform SSO settings are applied incorrectly. Or, + > - If the Company Portal app bypasses Microsoft Entra device registration when Platform SSO isn't enabled. + For more information on assigning profiles, go to [Assign user and device profiles](device-profile-assign.md). Select **Next**. diff --git a/memdocs/intune/configuration/properties-catalog.md b/memdocs/intune/configuration/properties-catalog.md new file mode 100644 index 00000000000..820692ff2a0 --- /dev/null +++ b/memdocs/intune/configuration/properties-catalog.md @@ -0,0 +1,168 @@ +--- +# required metadata + +title: Properties catalog in Microsoft Intune +description: Configure Properties catalog policy to manage Device Inventory settings on Windows devices you manage with Intune. +keywords: +author: smbhardwaj +ms.author: smbhardwaj +manager: dougeby +ms.date: 11/14/2024 +ms.topic: how-to +ms.service: microsoft-intune +ms.subservice: configuration +ms.localizationpriority: high +# optional metadata + +#ROBOTS: +#audience: + +ms.suite: ems +#ms.tgt_pltfrm: +ms.custom: intune-azure +ms.collection: +- tier2 +- M365-identity-device-management +ms.reviewer: abbystarr +--- +# Properties catalog in Microsoft Intune + +## Device inventory + +With Intune, you can use Device inventory to collect and view more hardware properties from your managed devices to help you better understand the state of your devices and make business decisions. + +This article describes how to configure Device Inventory settings as part of an Intune device configuration profile. After you create a profile, you then assign or deploy that profile to your Windows devices. + +This feature applies to: + +Windows 11 + +Windows 10 + +## Prerequisites + +- To use Inventory, devices must be corporate owned, Intune managed (includes co-managed), and Microsoft Entra joined. + +- For a user to configure a policy to start collecting inventory data from devices, they must have the Device Configurations **Create** permission and the Organization **Read** permission. + +- For a user to view collected data about devices, they must have the Managed Devices **Read** permission. + +## Supported platforms + +Inventory is currently only supported on devices running Windows 10 and later. Inventory is only supported on the following minimum Windows versions: + +- Windows 11, version 23H2 (22631.2506 or later) with KB5031455 +- Windows 11, version 22H2 (22621.2215 or later) with KB5029351 +- Windows 11, version 21H2 (22000.2713 or later) with KB5034121 +- Windows 10, version 22H2 (19045.3393 or later) with KB5030211 +- Windows 10, version 21H2 (19044.3393 or later) with KB5030211 + +## How to use + +To configure Inventory collection, create a new **Properties Catalog** profile in the Intune admin center. This profile allows you to select which properties you would like to collect from your devices. + +After the profile is created, you can apply the profile to specific devices in the selected groups. + +### Create the profile + +1. Sign in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431). + +2. Select **Devices** > **Manage devices** > **Configuration** > **Create** > **New Policy**. + +3. Enter the following properties: + + - **Platform**: Select **Windows 10 and later**. + - **Profile type**: Select **Properties catalog**. + +4. Select **Create**. + +5. In **Basics**, enter the following properties: + + - **Name**: Enter a descriptive name for the new profile. + - **Description**: Enter a description for the profile. This setting is optional, but recommended. + +6. Select **Next**. + +7. Select **Add properties**.Expand out categories to view individual properties and then select which properties you would like to collect from the Properties Picker. + + When you're done, select **Next**. + +8. On the **Scope (Tags)** page, select **Select scope tags** to open the *Select tags* pane to assign scope tags to the profile. + + Select **Next** to continue. + +9. On the **Assignments** page, select the groups that receive this profile. For more information on assigning profiles, see [Assign user and device profiles](../configuration/device-profile-assign.md). + + Select **Next**. + +10. On the **Applicability Rules** page, use the **Rule**, **Property**, and **Value** options to define how this profile applies within assigned groups. + +11. On the **Review + create** page, when you're done, choose **Create**. The profile is created and is shown in the list. + +The next time each device checks in, the policy is applied. + +### View collected data + +To view collected inventory information, navigate to **Devices** > **Windows Devices** and select a device. + +Under **Monitor** select **Resource Explorer**. Choose a category to view hardware information. + +After a device syncs with Intune, it can take up to 24 hours for initial harvesting of inventory data. + +### Required Properties + +Certain **required** properties are automatically collected when you collect any properties in that category. + +The following properties are required: + +- **Battery**: Instance Name +- **Bios Info**: Bios Name, Software Element ID, Software Element State, Target Operating System +- **Cpu**: Processor ID +- **Disk Drive**: Drive ID +- **Encryptable Volume**: Volume ID +- **Logical Drive**: Drive Identifier +- **Network Adapter**: Identifier +- **System Enclosure**: Serial Number +- **Video Controller**: Identifier +- **Windows Qfe**: Hot Fix ID + +## Known Limitations + +Collection of properties can only be stopped (deleted) at the category level. + +To stop collecting properties, navigate to the **Properties catalog** profile, and remove collection for every property in a particular category. + +Even if a properties policy is deleted, you will still be able to see the last-collected data in Resource Explorer for up to 28 days. + +## Supported Properties + +Inventory supports the following entities. To learn more about what properties are supported for each entity, see [Intune Data Platform Schema](../../analytics/data-platform-schema.md). + +- Battery +- Bios Info +- Cpu +- Disk Drive +- Encryptable Volume +- Logical Drive +- Memory Info +- Network Adapter +- Os Version +- System Enclosure +- Time +- Tpm +- Video Controller +- Windows Qfe + +## Frequently Asked Questions + +### Is Resource Explorer different than the Hardware tab for a device? + +Yes, the **Hardware** tab data and **Resource Explorer** data come from different places. We recommend using Inventory and Resource Explorer for the most up-to-date and comprehensive data about your devices. In the future, the data source for **Hardware** tab and the Resource Explorer will be the same. + +### I'm using Co-management with Tenant Attach and I see two Resource Explorer nodes. Which one should I use? + +You'll see a **Resource Explorer** tab for Intune collected data and a **Resource Explorer** tab for Configuration Manager collected data. Feel free to use the source that best fits your use case. In the future, we recommend using the Intune-based Resource Explorer. + +### How can I troubleshoot this feature? + +Client logs are available at `C:\Program Files\Microsoft Device Inventory Agent\Logs` and logs can also be collected via Collect MDM Diagnostics. diff --git a/memdocs/intune/configuration/tutorial-walkthrough-administrative-templates.md b/memdocs/intune/configuration/tutorial-walkthrough-administrative-templates.md index d83515a4c24..4d6d6ecb958 100644 --- a/memdocs/intune/configuration/tutorial-walkthrough-administrative-templates.md +++ b/memdocs/intune/configuration/tutorial-walkthrough-administrative-templates.md @@ -202,7 +202,7 @@ In these next steps, you create security groups, and add users to these groups. - [Dynamic Group Membership in Microsoft Entra ID (Part 1)](/archive/blogs/pauljones/dynamic-group-membership-in-azure-active-directory-part-1) - [Dynamic Group Membership in Microsoft Entra ID (Part 2)](/archive/blogs/pauljones/dynamic-group-membership-in-azure-active-directory-part-2) -- Microsoft Entra ID P1 or P2 includes other services that are commonly used when managing apps and devices, including [multifactor authentication (MFA)](/azure/active-directory/authentication/concept-mfa-howitworks) and [conditional access](/azure/active-directory/conditional-access/overview). +- Microsoft Entra ID P1 or P2 includes other services that are commonly used when managing apps and devices, including [multifactor authentication (MFA)](/azure/active-directory/authentication/concept-mfa-howitworks) and [Conditional Access](/azure/active-directory/conditional-access/overview). - Many administrators ask when to use user groups and when to use device groups. For some guidance, go to [User groups vs. device groups](device-profile-assign.md#user-groups-vs-device-groups). diff --git a/memdocs/intune/configuration/vpn-settings-macos.md b/memdocs/intune/configuration/vpn-settings-macos.md index f2391ab5732..1a3f03b3dbc 100644 --- a/memdocs/intune/configuration/vpn-settings-macos.md +++ b/memdocs/intune/configuration/vpn-settings-macos.md @@ -7,7 +7,7 @@ keywords: author: MandiOhlinger ms.author: mandia manager: dougeby -ms.date: 04/15/2024 +ms.date: 11/19/2024 ms.topic: reference ms.service: microsoft-intune ms.subservice: configuration @@ -35,7 +35,8 @@ Depending on the settings you choose, not all values in the following list are c This feature applies to: -- macOS +- macOS + ## Before you begin @@ -47,11 +48,20 @@ This feature applies to: ## Base VPN -**Connection name**: Enter a name for this connection. End users see this name when they browse their device for the list of available VPN connections. +- **Deployment channel**: Select how you want to deploy the profile. This setting also determines the keychain where the authentication certificates are stored, so it's important to select the proper channel. It's not possible to edit the deployment channel after you deploy the profile. To change it, you must create a new profile. + + >[!NOTE] + > We recommend rechecking the deployment channel setting in existing profiles when the linked authentication certificates are up for renewal to ensure the intended channel is selected. If it isn't, create a new profile with the correct deployment channel. + + You have two options: + - **User channel**: Always select the user deployment channel in profiles with user certificates. This option stores certificates in the user keychain. + - **Device channel**: Always select the device deployment channel in profiles with device certificates. This option stores certificates in the system keychain. + +- **Connection name**: Enter a name for this connection. End users see this name when they browse their device for the list of available VPN connections. - **VPN server address**: Enter the IP address or fully qualified domain name of the VPN server that devices connect to. For example, enter `192.168.1.1` or `vpn.contoso.com`. - **Authentication method**: Choose how devices authenticate to the VPN server. Your options: - - **Certificates**: Under **Authentication certificate**, select a SCEP or PKCS certificate profile you previously created to authenticate the connection. For more information about certificate profiles, go to [How to configure certificates](../protect/certificates-configure.md). + - **Certificates**: Under **Authentication certificate**, select a SCEP or PKCS certificate profile you previously created to authenticate the connection. For more information about certificate profiles, go to [How to configure certificates](../protect/certificates-configure.md). Choose the certificates that align with your deployment channel selection. If you selected the user channel, your certificate options are limited to user certificate profiles. If you selected the device channel, you have both user and device certificate profiles to choose from. However, we recommend always selecting the certificate type that aligns with the selected channel. Storing user certificates in the system keychain increases security risks. - **Username and password**: End users must enter a username and password to sign into the VPN server. - **Connection type**: Select the VPN connection type from the following list of vendors: diff --git a/memdocs/intune/configuration/vpn-settings-windows-10.md b/memdocs/intune/configuration/vpn-settings-windows-10.md index 54dce306e9a..a59b49f8242 100644 --- a/memdocs/intune/configuration/vpn-settings-windows-10.md +++ b/memdocs/intune/configuration/vpn-settings-windows-10.md @@ -2,7 +2,7 @@ # required metadata title: Windows 10/11 VPN settings in Microsoft Intune -description: Learn and read about all the available VPN settings in Microsoft Intune, what they're used for, and what they do. See the traffic rules, conditional access, and DNS and proxy settings for Windows 10/11 and Windows Holographic for Business devices. +description: Learn and read about all the available VPN settings in Microsoft Intune, what they're used for, and what they do. See the traffic rules, Conditional Access, and DNS and proxy settings for Windows 10/11 and Windows Holographic for Business devices. keywords: author: MandiOhlinger ms.author: mandia diff --git a/memdocs/intune/configuration/wi-fi-settings-android-aosp.md b/memdocs/intune/configuration/wi-fi-settings-android-aosp.md index 34822016269..0612659fb0a 100644 --- a/memdocs/intune/configuration/wi-fi-settings-android-aosp.md +++ b/memdocs/intune/configuration/wi-fi-settings-android-aosp.md @@ -7,7 +7,7 @@ keywords: author: MandiOhlinger ms.author: mandia manager: dougeby -ms.date: 01/17/2024 +ms.date: 12/11/2024 ms.topic: reference ms.service: microsoft-intune ms.subservice: configuration @@ -55,7 +55,7 @@ For more information on AOSP, go to [Android Open Source Project](https://source When devices are connected to another preferred Wi-Fi connection, then they won't automatically connect to this Wi-Fi network. If devices fail to connect automatically when this setting is enabled, then disconnect the devices from any existing Wi-Fi connections. - **Hidden network**: Select **Enable** to hide this network from the list of available networks on the device. The SSID isn't broadcasted. Select **Disable** to show this network in the list of available networks on the device. -- **Wi-Fi type**: Select the security protocol to authenticate to the Wi-Fi network. Your options: +- **Security type**: Select the security protocol to authenticate to the Wi-Fi network. Your options: - **Open (no authentication)**: Only use this option if the network is unsecured. - **WEP-Pre-shared key**: Enter the password in **Pre-shared key** (PSK). When your organization's network is set up or configured, a password or network key is also configured. Enter this password or network key for the PSK value. diff --git a/memdocs/intune/configuration/wi-fi-settings-android-enterprise.md b/memdocs/intune/configuration/wi-fi-settings-android-enterprise.md index c4fd01fe79d..157ccae05d1 100644 --- a/memdocs/intune/configuration/wi-fi-settings-android-enterprise.md +++ b/memdocs/intune/configuration/wi-fi-settings-android-enterprise.md @@ -1,13 +1,13 @@ --- # required metadata -title: Wi-Fi settings for Android Enterprise and kiosk devices - Microsoft Intune | Microsoft Docs +title: Add Wi-Fi settings for Android Enterprise devices in Microsoft Intune description: Create or add a WiFi device configuration profile for Android Enterprise and Android Kiosk. See the different settings, add certificates, choose an EAP type, and select an authentication method in Microsoft Intune. For kiosk devices, also enter the Pre-shared key of your network. keywords: author: MandiOhlinger ms.author: mandia manager: dougeby -ms.date: 07/18/2024 +ms.date: 12/11/2024 ms.topic: reference ms.service: microsoft-intune ms.subservice: configuration @@ -28,7 +28,7 @@ ms.collection: - M365-identity-device-management --- -# Add Wi-Fi settings for Android Enterprise dedicated and fully managed devices in Microsoft Intune +# Add Wi-Fi settings for Android Enterprise devices in Microsoft Intune You can create a profile with specific Wi-Fi settings, and then deploy this profile to your Android Enterprise fully managed and dedicated devices. Microsoft Intune offers many features, including authenticating to your network, using a pre-shared key, and more. @@ -67,7 +67,7 @@ Select this option if you're deploying to an Android Enterprise dedicated, corpo When devices are connected to another preferred Wi-Fi connection, then they don't automatically connect to this Wi-Fi network. If devices fail to connect automatically when this setting is enabled, then disconnect the devices from any existing Wi-Fi connections. - **Hidden network**: Select **Enable** to hide this network from the list of available networks on the device. The SSID isn't broadcasted. Select **Disable** to show this network in the list of available networks on the device. -- **Wi-Fi type**: Select the security protocol to authenticate to the Wi-Fi network. Your options: +- **Security type**: Select the security protocol to authenticate to the Wi-Fi network. Your options: - **Open (no authentication)**: Only use this option if the network is unsecured. - **WEP-Pre-shared key**: Enter the password in **Pre-shared key**. When your organization's network is set up or configured, a password or network key is also configured. Enter this password or network key for the PSK value. @@ -258,6 +258,25 @@ Select this option if you're deploying to an Android Enterprise dedicated, corpo - **Wi-Fi type**: Select **Basic**. - **SSID**: Enter the **service set identifier**, which is the real name of the wireless network that devices connect to. However, users only see the **network name** you configured when they choose the connection. - **Hidden network**: Select **Enable** to hide this network from the list of available networks on the device. The SSID isn't broadcasted. Select **Disable** to show this network in the list of available networks on the device. +- **Wi-Fi type**: Select the security protocol to authenticate to the Wi-Fi network. Your options: + + - **Open (no authentication)**: Only use this option if the network is unsecured. + - **WEP-Pre-shared key**: Enter the password in **Pre-shared key**. When your organization's network is set up or configured, a password or network key is also configured. Enter this password or network key for the PSK value. + + > [!WARNING] + > On Android 12 and later, Google deprecated support for WEP pre-shared keys (PSK) in Wi-Fi configuration profiles. It's possible WEP might still work. But, it's not recommended and is considered obsolete. Instead, use WPA pre-shared keys (PSK) in your Wi-Fi configuration profiles. + > + > For more information, go to the [Android developer reference - WifiConfiguration.GroupCipher](https://developer.android.com/reference/android/net/wifi/WifiConfiguration.GroupCipher#summary). + + - **WPA-Pre-shared key**: Enter the password in **Pre-shared key**. When your organization's network is set up or configured, a password or network key is also configured. Enter this password or network key for the PSK value. + +- **Proxy settings**: Select a proxy configuration. Your options: + + - **None**: No proxy settings are configured. + + - **Automatic**: Use a file to configure the proxy server. Enter the **Proxy server URL** that contains the configuration file. For example, enter `http://proxy.contoso.com`, `10.0.0.11`, or `http://proxy.contoso.com/proxy.pac`. + + For more information on PAC files, see [Proxy Auto-Configuration (PAC) file](https://developer.mozilla.org/docs/Web/HTTP/Proxy_servers_and_tunneling/Proxy_Auto-Configuration_(PAC)_file) (opens a non-Microsoft site). ### Enterprise (personally owned work profile) diff --git a/memdocs/intune/configuration/wi-fi-settings-macos.md b/memdocs/intune/configuration/wi-fi-settings-macos.md index 03de0653506..48bc97cce36 100644 --- a/memdocs/intune/configuration/wi-fi-settings-macos.md +++ b/memdocs/intune/configuration/wi-fi-settings-macos.md @@ -8,7 +8,7 @@ keywords: author: MandiOhlinger ms.author: mandia manager: dougeby -ms.date: 06/25/2024 +ms.date: 11/19/2024 ms.topic: reference ms.service: microsoft-intune ms.subservice: configuration @@ -39,17 +39,17 @@ This feature applies to: These Wi-Fi settings are separated in to two categories: Basic settings and Enterprise settings. -This article describes the settings you can configure. +This article describes the settings you can configure. ## Before you begin - Create a [macOS Wi-Fi device configuration profile](wi-fi-settings-configure.md). -- These settings are available for all enrollment types. For more information on the enrollment types, go to [macOS enrollment](../enrollment/macos-enroll.md). +- These settings are available for all enrollment types. For more information on the enrollment types, go to [macOS enrollment](../enrollment/macos-enroll.md). ## Basic profiles -Basic or personal profiles use WPA/WPA2 to secure the Wi-Fi connection on devices. Typically, WPA/WPA2 is used on home networks or personal networks. You can also add a pre-shared key to authenticate the connection. +Basic or personal profiles use WPA/WPA2 to secure the Wi-Fi connection on devices. Typically, WPA/WPA2 is used on home networks or personal networks. You can also add a preshared key to authenticate the connection. - **Wi-Fi type**: Select **Basic**. - **SSID**: This **service set identifier** (SSID) property is the real name of the wireless network that devices connect to. However, users only see the network name you configured when they choose the connection. @@ -72,6 +72,14 @@ Basic or personal profiles use WPA/WPA2 to secure the Wi-Fi connection on device Enterprise profiles use Extensible Authentication Protocol (EAP) to authenticate Wi-Fi connections. EAP is often used by enterprises, as you can use certificates to authenticate and secure connections, and configure more security options. +- **Deployment channel**: Select how you want to deploy the profile. This setting also determines the keychain where the authentication certificates are stored, so it's important to select the proper channel. It's not possible to edit the deployment channel after you deploy the profile. To do so, you must create a new profile. + + >[!NOTE] + > We recommend rechecking the deployment channel setting in existing profiles when the linked authentication certificates are up for renewal to ensure the intended channel is selected. If it isn't, create a new profile with the correct deployment channel. + + You have two options: + - **User channel**: Always select the user deployment channel in profiles with user certificates. This option stores certificates in the user keychain. + - **Device channel**: Always select the device deployment channel in profiles with device certificates. This option stores certificates in the system keychain. - **Wi-Fi type**: Select **Enterprise**. - **SSID**: Short for **service set identifier**. This property is the real name of the wireless network that devices connect to. However, users only see the network name you configured when they choose the connection. - **Connect automatically**: Select **Enable** to automatically connect to this network when the device is in range. Select **Disable** to prevent devices from automatically connecting. @@ -92,7 +100,7 @@ Enterprise profiles use Extensible Authentication Protocol (EAP) to authenticate - **Certificate server names**: **Add** one or more common names used in the certificates issued by your trusted certificate authority (CA). When you enter this information, you can bypass the dynamic trust window displayed on user's devices when they connect to this Wi-Fi network. - **Root certificate for server validation**: Select one or more existing trusted root certificate profiles. When the client connects to the network, these certificates are used to establish a chain of trust with the server. If your authentication server uses a public certificate, then you don't need to include a root certificate. - - **Certificates**: Select the SCEP or PKCS client certificate profile that is also deployed to the device. This certificate is the identity presented by the device to the server to authenticate the connection. + - **Certificates**: Select the SCEP or PKCS client certificate profile that is also deployed to the device. This certificate is the identity presented by the device to the server to authenticate the connection. Choose the certificates that align with your deployment channel selection. If you selected the user channel, your certificate options are limited to user certificate profiles. If you selected the device channel, you have both user and device certificate profiles to choose from. However, we recommend always selecting the certificate type that aligns with the selected channel. Storing user certificates in the system keychain increases security risks. - **Identity privacy (outer identity)**: Enter the text sent in the response to an EAP identity request. This text can be any value, such as `anonymous`. During authentication, this anonymous identity is initially sent. Then, the real identification is sent in a secure tunnel. diff --git a/memdocs/intune/configuration/wired-network-settings-macos.md b/memdocs/intune/configuration/wired-network-settings-macos.md index 5b83fc6d797..c274edd3cda 100644 --- a/memdocs/intune/configuration/wired-network-settings-macos.md +++ b/memdocs/intune/configuration/wired-network-settings-macos.md @@ -8,7 +8,7 @@ keywords: author: MandiOhlinger ms.author: mandia manager: dougeby -ms.date: 06/25/2024 +ms.date: 11/19/2024 ms.topic: reference ms.service: microsoft-intune ms.subservice: configuration @@ -39,13 +39,13 @@ This feature applies to: - macOS -This article describes the settings you can configure. +This article describes the settings you can configure. ## Before you begin - Create a [macOS wired network device configuration profile](wired-networks-configure.md). -- These settings are available for all enrollment types. For more information on the enrollment types, go to [macOS enrollment](../enrollment/macos-enroll.md). +- These settings are available for all enrollment types. For more information on the enrollment types, go to [macOS enrollment](../enrollment/macos-enroll.md). ## Wired Network @@ -61,6 +61,15 @@ This article describes the settings you can configure. Options with "active" in the title use interfaces that are actively working on the device. If there are no active interfaces, the next interface in service-order priority is configured. By default, **First active Ethernet** is selected, which is also the default setting configured by macOS. +- **Deployment channel**: Select how you want to deploy the profile. This setting also determines the keychain where the authentication certificates are stored, so it's important to select the proper channel. It's not possible to edit the deployment channel after you deploy the profile. To do so, you must create a new profile. + + >[!NOTE] + > We recommend rechecking the deployment channel setting in existing profiles when the linked authentication certificates are up for renewal to ensure the intended channel is selected. If it isn't, create a new profile with the correct deployment channel. + + You have two options: + - **User channel**: Always select the user deployment channel in profiles with user certificates. This option stores certificates in the user keychain. + - **Device channel**: Always select the device deployment channel in profiles with device certificates. This option stores certificates in the system keychain. + - **EAP type**: To authenticate secured wired connections, select the Extensible Authentication Protocol (EAP) type. Your options: - **EAP-FAST**: Enter the **Protected Access Credential (PAC) Settings**. This option uses protected access credentials to create an authenticated tunnel between the client and the authentication server. Your options: @@ -87,7 +96,7 @@ This article describes the settings you can configure. - **Challenge Handshake Authentication Protocol (CHAP)** - **Microsoft CHAP (MS-CHAP)** - **Microsoft CHAP Version 2 (MS-CHAP v2)** - - **Certificates**: Select an existing SCEP client certificate profile that is also deployed to the device. This certificate is the identity presented by the device to the server to authenticate the connection. PKCS certificates aren't supported. + - **Certificates**: Select an existing SCEP client certificate profile that is also deployed to the device. This certificate is the identity presented by the device to the server to authenticate the connection. PKCS certificates aren't supported. Choose the certificate that aligns with your deployment channel selection. If you selected the user channel, your certificate options are limited to user certificate profiles. If you selected the device channel, you have both user and device certificate profiles to choose from. However, we recommend always selecting the certificate type that aligns with the selected channel. Storing user certificates in the system keychain increases security risks. - **Identity privacy (outer identity)**: Enter the text sent in the response to an EAP identity request. This text can be any value, such as `anonymous`. During authentication, this anonymous identity is initially sent. Then, the real identification is sent in a secure tunnel. - **LEAP** diff --git a/memdocs/intune/copilot/copilot-devices.md b/memdocs/intune/copilot/copilot-devices.md index df5f72f2d2d..340b0633a61 100644 --- a/memdocs/intune/copilot/copilot-devices.md +++ b/memdocs/intune/copilot/copilot-devices.md @@ -7,7 +7,7 @@ keywords: security copilot, intune, microsoft intune, copilot, device informatio author: Erikre ms.author: erikre manager: dougeby -ms.date: 04/01/2024 +ms.date: 11/08/2024 ms.topic: how-to ms.service: microsoft-intune ms.subservice: @@ -31,7 +31,7 @@ ms.collection: # Use Microsoft Copilot in Intune to troubleshoot devices (public preview) -Microsoft Copilot for Security is a generative-AI security analysis tool that can help your organization get information quickly. Copilot is [built into Microsoft Intune](copilot-intune-overview.md). It can help IT admins manage and troubleshoot devices. +Microsoft Security Copilot is a generative-AI security analysis tool that can help your organization get information quickly. Copilot is [built into Microsoft Intune](copilot-intune-overview.md). It can help IT admins manage and troubleshoot devices. Copilot uses your Intune data. Admins can only access the data that they have permissions to, which includes the [RBAC roles](../fundamentals/role-based-access-control.md) and [scope tags](../fundamentals/scope-tags.md) assigned to them. For more information, see [Microsoft Copilot in Intune FAQ](copilot-intune-faq.md). @@ -50,7 +50,7 @@ This article describes how to use Copilot to manage and troubleshoot device issu - To use Copilot in Intune, make sure Copilot is enabled. For more information, see: - [Microsoft Copilot in Intune](../copilot/copilot-intune-overview.md#before-you-begin) - - [Get started with Microsoft Copilot for Security](/security-copilot/get-started-security-copilot) + - [Get started with Microsoft Security Copilot](/security-copilot/get-started-security-copilot) - When you use the Copilot prompts to troubleshoot your devices, you are within the scope of the device you select. diff --git a/memdocs/intune/copilot/copilot-intune-faq.md b/memdocs/intune/copilot/copilot-intune-faq.md index 86c00f6728e..bec286077a4 100644 --- a/memdocs/intune/copilot/copilot-intune-faq.md +++ b/memdocs/intune/copilot/copilot-intune-faq.md @@ -7,7 +7,7 @@ keywords: security copilot, intune, microsoft intune, copilot, faq author: Erikre ms.author: erikre manager: dougeby -ms.date: 04/01/2024 +ms.date: 11/08/2024 ms.topic: how-to ms.service: microsoft-intune ms.subservice: @@ -37,25 +37,25 @@ This article answers common questions about using Microsoft Copilot in Intune. F ### How can I control access to Copilot in Intune? -When you set up Copilot for Security, you determine the Copilot role that your admins can have (owner or contributor), as described in [Roles and authentication in Microsoft Copilot for Security](/security-copilot/authentication). There are also Microsoft Entra roles that can control access to Copilot for Security. +When you set up Security Copilot, you determine the Copilot role that your admins can have (owner or contributor), as described in [Roles and authentication in Microsoft Security Copilot](/security-copilot/authentication). There are also Microsoft Entra roles that can control access to Security Copilot. -The Copilot for Security roles or the Microsoft Entra roles that you configure control access to Copilot in Intune. There aren't any Intune-specific roles-based access controls (RBAC) for Copilot in Intune. +The Security Copilot roles or the Microsoft Entra roles that you configure control access to Copilot in Intune. There aren't any Intune-specific roles-based access controls (RBAC) for Copilot in Intune. -After you enable Intune in Copilot for Security, your Intune admins can see the Copilot features in the Intune admin center. But they can only access the data that they have permission to. Copilot honors existing [Intune RBAC roles](../fundamentals/role-based-access-control.md) and [Intune scope tags](../fundamentals/scope-tags.md) that are assigned to your admins. +After you enable Intune in Security Copilot, your Intune admins can see the Copilot features in the Intune admin center. But they can only access the data that they have permission to. Copilot honors existing [Intune RBAC roles](../fundamentals/role-based-access-control.md) and [Intune scope tags](../fundamentals/scope-tags.md) that are assigned to your admins. So, if an admin tries to access Intune data that they don't have permissions to, they get the following error message: `You don't have permission to access this feature. Reach out to your IT administrator for help.` -If you want access to Copilot in Intune, contact the Copilot for Security workspace owner in your organization. If you want access to all your Intune data, contact your Intune administrator. +If you want access to Copilot in Intune, contact the Security Copilot workspace owner in your organization. If you want access to all your Intune data, contact your Intune administrator. -### Can I use Copilot for Security if I'm not an Intune admin, and vice versa? +### Can I use Security Copilot if I'm not an Intune admin, and vice versa? -Yes. Access to Copilot for Security is managed by using Copilot for Security or Microsoft Entra roles. For more information, see [Roles and authentication in Microsoft Copilot for Security](/security-copilot/authentication). +Yes. Access to Security Copilot is managed by using Security Copilot or Microsoft Entra roles. For more information, see [Roles and authentication in Microsoft Security Copilot](/security-copilot/authentication). -If you're an Intune admin and have the correct Copilot for Security or Microsoft Entra role assigned to you, you can use Copilot for Security to get insights about your Intune data. +If you're an Intune admin and have the correct Security Copilot or Microsoft Entra role assigned to you, you can use Security Copilot to get insights about your Intune data. -Copilot for Security is scoped to all your embedded services. +Security Copilot is scoped to all your embedded services. If you're an Intune admin or IT admin and only want Intune data, you should use [Copilot in Intune](copilot-intune-overview.md). Its scope is only Intune data, and its capabilities are integrated into the relevant areas of the Intune admin center. @@ -65,44 +65,44 @@ If you're a security admin, you can use [Copilot in Intune](copilot-intune-overv ### How do I turn on Intune capabilities? -In the [Microsoft Copilot for Security portal](https://go.microsoft.com/fwlink/?linkid=2247989), select **Sources** (prompt bar > right corner), and enable the Microsoft Intune plug-in. This plug-in allows you to access your Intune data and use the Copilot features in the Intune admin center. +In the [Microsoft Security Copilot portal](https://go.microsoft.com/fwlink/?linkid=2247989), select **Sources** (prompt bar > right corner), and enable the Microsoft Intune plug-in. This plug-in allows you to access your Intune data and use the Copilot features in the Intune admin center. -For more information about managing plug-ins, see [Manage plug-ins in Copilot for Security](/security-copilot/manage-plugins). +For more information about managing plug-ins, see [Manage plug-ins in Security Copilot](/security-copilot/manage-plugins). ### Can I use capabilities for other Copilot services in the Intune admin center? No. Copilot in Intune in the Intune admin center is available only for Intune capabilities. -You can't get insights from other Microsoft services, like Microsoft Defender, Microsoft Entra, and Microsoft Purview. To get insights from other Microsoft services, you can use the [Copilot for Security portal](https://go.microsoft.com/fwlink/?linkid=2247989). +You can't get insights from other Microsoft services, like Microsoft Defender, Microsoft Entra, and Microsoft Purview. To get insights from other Microsoft services, you can use the [Security Copilot portal](https://go.microsoft.com/fwlink/?linkid=2247989). ### How much does Copilot in Intune cost? -Copilot in Intune is included with Copilot for Security. Copilot for Security uses security compute units (SCUs). There aren't any other licensing requirements or Intune-specific licenses for using Copilot in Intune. +Copilot in Intune is included with Security Copilot. Security Copilot uses security compute units (SCUs). There aren't any other licensing requirements or Intune-specific licenses for using Copilot in Intune. For more information about SCUs, see: - [Get started with Microsoft Copilot](/security-copilot/get-started-security-copilot) -- [Manage capacity in Copilot for Security](/security-copilot/manage-usage) +- [Manage capacity in Security Copilot](/security-copilot/manage-usage) ### Is there a limit on the prompt output? -Copilot in Intune is bound by any token limits in Copilot for Security. For more information, see [Copilot for Security FAQ - Token limits](/security-copilot/faq-security-copilot#how-is-copilot-for-security-dealing-with-a-token-limit). +Copilot in Intune is bound by any token limits in Security Copilot. For more information, see [Security Copilot FAQ - Token limits](/security-copilot/faq-security-copilot#how-is-copilot-for-security-dealing-with-a-token-limit). -## Copilot for Security vs. Copilot in Intune +## Security Copilot vs. Copilot in Intune -### Does Copilot for Security give admins more access to Intune data than is available in the Intune admin center? +### Does Security Copilot give admins more access to Intune data than is available in the Intune admin center? -No. The Intune capabilities in Copilot for Security are built using the existing Microsoft Graph APIs, which are the same APIs that the Intune admin center uses. Both Copilot experiences use the same Intune capabilities. +No. The Intune capabilities in Security Copilot are built using the existing Microsoft Graph APIs, which are the same APIs that the Intune admin center uses. Both Copilot experiences use the same Intune capabilities. -### To get Intune insights, should I use Copilot for Security or Copilot in Intune? +### To get Intune insights, should I use Security Copilot or Copilot in Intune? -To use Copilot with your Intune data, you can use Copilot in Intune or Copilot for Security. Here's a comparison of the two experiences: +To use Copilot with your Intune data, you can use Copilot in Intune or Security Copilot. Here's a comparison of the two experiences: -| Feature | Copilot in Intune | Copilot for Security | +| Feature | Copilot in Intune | Security Copilot | |---|---|---| | **Access and data insights** | This Copilot is embedded in the Intune admin center and is scoped to only show Intune data.

    Intune admins should use Copilot in Intune for Intune-only tasks. | This Copilot is a standalone experience. It can access other embedded services, like Microsoft Defender, Microsoft Entra ID, Microsoft Purview, and Microsoft Intune.

    It accesses the same Intune capabilities as Copilot in Intune. | | **Open prompting** | Intune provides a set of prompts you can use. There isn't an open prompt. There are plans to include an open prompt in the future (no ETA).| Can use open prompts or use [promptbooks](/security-copilot/using-promptbooks). | -| **Prompt history** | The prompt/response history isn't available in the Intune admin center. To view the prompt history, use Copilot for Security.

    The prompts can look different compared with the prompts shown in Intune, as Intune enters the prompt for you. | You can review the prompt/response history even when the prompt is submitted in the standalone or embedded experience. | +| **Prompt history** | The prompt/response history isn't available in the Intune admin center. To view the prompt history, use Security Copilot.

    The prompts can look different compared with the prompts shown in Intune, as Intune enters the prompt for you. | You can review the prompt/response history even when the prompt is submitted in the standalone or embedded experience. | | **Target audience** | Focus is the IT admin/IT Pro. | Focus is the Security Operations Center (SOC) and can be used by IT admins. | ## Feedback and troubleshooting Copilot @@ -122,9 +122,9 @@ Other things you can try: - If you're working with Microsoft to debug the issue, support might ask you for the session ID. To get the session ID, you can: - Use the F12 developer tools in your browser. This information shows the capabilities that Copilot uses. - - In the [Copilot for Security portal](https://go.microsoft.com/fwlink/?linkid=2247989), you can view the prompt sessions and session IDs from the Intune embedded experience. + - In the [Security Copilot portal](https://go.microsoft.com/fwlink/?linkid=2247989), you can view the prompt sessions and session IDs from the Intune embedded experience. ## Related articles -- [Microsoft Copilot for Security FAQ](/security-copilot/faq-security-copilot) +- [Microsoft Security Copilot FAQ](/security-copilot/faq-security-copilot) - [Microsoft Copilot in Intune](copilot-intune-overview.md) \ No newline at end of file diff --git a/memdocs/intune/copilot/copilot-intune-overview.md b/memdocs/intune/copilot/copilot-intune-overview.md index c15da3ceec2..70ab14ec2a1 100644 --- a/memdocs/intune/copilot/copilot-intune-overview.md +++ b/memdocs/intune/copilot/copilot-intune-overview.md @@ -7,7 +7,7 @@ keywords: Security Copilot, Intune, Microsoft Intune, AI, Copilot, settings cata author: Erikre ms.author: erikre manager: dougeby -ms.date: 04/01/2024 +ms.date: 11/08/2024 ms.topic: get-started ms.service: microsoft-intune ms.subservice: @@ -36,7 +36,7 @@ ms.collection: This feature is in [public preview](../fundamentals/public-preview.md). -[Microsoft Copilot for Security](/security-copilot/microsoft-security-copilot) is a generative-AI security analysis tool. It can help you and your organization get information quickly and make decisions that affect security and risk. +[Microsoft Security Copilot](/security-copilot/microsoft-security-copilot) is a generative-AI security analysis tool. It can help you and your organization get information quickly and make decisions that affect security and risk. Intune has capabilities that are powered by Copilot. These capabilities access your Intune data and help you manage your policies and settings, understand your security posture, and troubleshoot device issues. @@ -46,9 +46,9 @@ There are two ways to access your Intune data by using Copilot: This experience has an IT admin/IT Pro focus. -- **Microsoft Copilot for Security**: This option is a standalone Copilot and is available in the [Microsoft Copilot for Security portal](https://go.microsoft.com/fwlink/?linkid=2247989). You can use this portal to get insights from Copilot for Security for all your enabled services, like Intune, Microsoft Defender, Microsoft Entra ID, Microsoft Purview, and more. +- **Microsoft Security Copilot**: This option is a standalone Copilot and is available in the [Microsoft Security Copilot portal](https://go.microsoft.com/fwlink/?linkid=2247989). You can use this portal to get insights from Security Copilot for all your enabled services, like Intune, Microsoft Defender, Microsoft Entra ID, Microsoft Purview, and more. - This experience has a Security Operations Center (SOC) focus and can be used by IT admins. For more information, see [Access your Microsoft Intune data in Copilot for Security](security-copilot.md). + This experience has a Security Operations Center (SOC) focus and can be used by IT admins. For more information, see [Access your Microsoft Intune data in Security Copilot](security-copilot.md). This article focuses on Copilot in Intune and describes the Intune features that you can use with Copilot. @@ -56,35 +56,35 @@ This article focuses on Copilot in Intune and describes the Intune features that To use Copilot in Intune, you should know the following information: -- **Copilot security compute units (SCUs)**: Copilot in Intune is included with Copilot for Security. There aren't any other licensing requirements or Intune-specific licenses for using Copilot in Intune. +- **Copilot security compute units (SCUs)**: Copilot in Intune is included with Security Copilot. There aren't any other licensing requirements or Intune-specific licenses for using Copilot in Intune. For more information about SCUs, see: - [Get started with Microsoft Copilot](/security-copilot/get-started-security-copilot) - - [Manage capacity in Copilot for Security](/security-copilot/manage-usage) + - [Manage capacity in Security Copilot](/security-copilot/manage-usage) -- **Copilot configuration**: Before you can use the Copilot features in Intune, Microsoft Copilot for Security must be configured, and you must complete the first run tour in the [Microsoft Copilot for Security portal](https://go.microsoft.com/fwlink/?linkid=2247989). For the setup tasks, see [Get started with Microsoft Copilot](/security-copilot/get-started-security-copilot). +- **Copilot configuration**: Before you can use the Copilot features in Intune, Microsoft Security Copilot must be configured, and you must complete the first run tour in the [Microsoft Security Copilot portal](https://go.microsoft.com/fwlink/?linkid=2247989). For the setup tasks, see [Get started with Microsoft Copilot](/security-copilot/get-started-security-copilot). You can check the status in the [Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) > **Tenant administration** > **Copilot**. :::image type="content" source="./media/copilot-intune-overview/tenant-administration-copilot-enabled.png" alt-text="Screenshot that shows Copilot is enabled in the Microsoft Intune tenant and Intune admin center." lightbox="./media/copilot-intune-overview/tenant-administration-copilot-enabled.png"::: -- **Copilot roles**: Access to Copilot in Intune is managed through Copilot for Security or Microsoft Entra ID. To use Copilot in Intune, you or your admin team must be assigned the appropriate role in Copilot for Security or Microsoft Entra ID. There isn't a built-in Intune role that has access to Copilot. +- **Copilot roles**: Access to Copilot in Intune is managed through Security Copilot or Microsoft Entra ID. To use Copilot in Intune, you or your admin team must be assigned the appropriate role in Security Copilot or Microsoft Entra ID. There isn't a built-in Intune role that has access to Copilot. - For more information, see [Roles and authentication in Microsoft Copilot for Security](/security-copilot/authentication). + For more information, see [Roles and authentication in Microsoft Security Copilot](/security-copilot/authentication). -- **Intune plug-in source**: To use Copilot in Intune, you need the Intune plug-in enabled in Copilot for Security. This plug-in allows you to access your Intune data and use Copilot in the Intune admin center. +- **Intune plug-in source**: To use Copilot in Intune, you need the Intune plug-in enabled in Security Copilot. This plug-in allows you to access your Intune data and use Copilot in the Intune admin center. - Go to the [Copilot for Security portal](https://go.microsoft.com/fwlink/?linkid=2247989) and select **Sources** (prompt bar > right corner). + Go to the [Security Copilot portal](https://go.microsoft.com/fwlink/?linkid=2247989) and select **Sources** (prompt bar > right corner). - :::image type="content" source="./media/copilot-intune-overview/security-copilot-sources.png" alt-text="Screenshot that shows the plugin sources that are available, enabled, and disabled in Microsoft Copilot for Security."::: + :::image type="content" source="./media/copilot-intune-overview/security-copilot-sources.png" alt-text="Screenshot that shows the plugin sources that are available, enabled, and disabled in Microsoft Security Copilot."::: In **Manage sources**, enable Microsoft Intune. - :::image type="content" source="./media/copilot-intune-overview/intune-plug-in-enabled.png" alt-text="Screenshot that shows the Microsoft Intune plug-in source is enabled in the Microsoft Copilot for Security portal."::: + :::image type="content" source="./media/copilot-intune-overview/intune-plug-in-enabled.png" alt-text="Screenshot that shows the Microsoft Intune plug-in source is enabled in the Microsoft Security Copilot portal."::: > [!TIP] - > Some roles can enable or disable plug-ins. For more information, see [Manage plug-ins in Microsoft Copilot for Security](/security-copilot/manage-plugins). + > Some roles can enable or disable plug-ins. For more information, see [Manage plug-ins in Microsoft Security Copilot](/security-copilot/manage-plugins). - **Your Intune data**: Copilot uses your Intune data. When an Intune admin submits a prompt, Copilot can only access the data that they have permissions to, which includes the [RBAC roles](../fundamentals/role-based-access-control.md) and [scope tags](../fundamentals/scope-tags.md) assigned to them. @@ -195,4 +195,4 @@ For a full list of supported properties in device query, go to [Device query](.. - [Use Microsoft Copilot in Intune to troubleshoot devices](../copilot/copilot-devices.md). - [Use the settings catalog to create device configuration policies](../configuration/settings-catalog.md). -- [Learn more about Intune capabilities in Microsoft Copilot for Security](security-copilot.md). +- [Learn more about Intune capabilities in Microsoft Security Copilot](security-copilot.md). diff --git a/memdocs/intune/copilot/security-copilot.md b/memdocs/intune/copilot/security-copilot.md index 5f312d6a034..000ae4d5652 100644 --- a/memdocs/intune/copilot/security-copilot.md +++ b/memdocs/intune/copilot/security-copilot.md @@ -1,13 +1,13 @@ --- # required metadata -title: Use Copilot for Security to get device and policy information -description: You can use Copilot for Security to get information about your Intune data, including devices, apps, policies, and groups managed in Intune. You can also compare policies, get device specific details, and get target info for policies. +title: Security Copilot in Microsoft Intune +description: You can use Security Copilot to get information about your Intune data, including devices, apps, policies, and groups managed in Intune. You can also compare policies, get device specific details, and get target info for policies. keywords: author: Erikre ms.author: erikre manager: dougeby -ms.date: 04/01/2024 +ms.date: 11/08/2024 ms.topic: concept-article ms.service: microsoft-intune ms.subservice: @@ -32,29 +32,46 @@ ms.collection: - magic-ai-copilot --- -# Access your Microsoft Intune data in Copilot for Security +# Security Copilot in Microsoft Intune -Copilot for Security is a cloud-based AI platform that provides a natural language Copilot experience. It can help support security professionals in different scenarios, like incident response, threat hunting, and intelligence gathering. For more information about what it can do, go to [What is Microsoft Copilot for Security?](/security-copilot/microsoft-security-copilot). +Microsoft Security Copilot is a cloud-based AI platform that provides a natural language Copilot experience. It can help support security professionals in different scenarios, like incident response, threat hunting, and intelligence gathering. For more information about what it can do, go to [What is Microsoft Security Copilot?](/security-copilot/microsoft-security-copilot) -**Copilot for Security integrates with your Microsoft Intune data**. +## Know before you begin -If you use [Microsoft Intune](../fundamentals/what-is-intune.md) in the same tenant as Copilot for Security, then you can use Copilot for Security to get insights about your Intune data. +If you're new to Security Copilot, you should familiarize yourself with it by reading these articles: +- [What is Microsoft Security Copilot?](/security-copilot/microsoft-security-copilot) +- [Microsoft Security Copilot experiences](/security-copilot/experiences-security-copilot) +- [Get started with Microsoft Security Copilot](/security-copilot/get-started-security-copilot) +- [Understand authentication in Microsoft Security Copilot](/security-copilot/authentication) +- [Prompting in Microsoft Security Copilot](/security-copilot/prompting-security-copilot) -There are Intune capabilities built into Copilot for Security, and you can use prompts to get more information, including: +## Security Copilot integration in Microsoft Intune + +If you use [Microsoft Intune](../fundamentals/what-is-intune.md) in the same tenant as Security Copilot, then you can use Security Copilot to get insights about your Intune data. + +There are Intune capabilities built into Security Copilot, and you can use prompts to get more information, including: - Information about your devices, apps, compliance & configuration policies, and policy assignments managed in Intune - Managed device attributes and hardware details - Issue with specific devices and compare a working & non-working device -This article shows you how to access your Microsoft Intune data in Copilot for Security and includes sample prompts. +This article shows you how to access your Microsoft Intune data in Security Copilot and includes sample prompts. + +## Key features + +There are three areas to use Copilot in Intune: -## Security admin focus +- [Policy and setting management](../copilot/copilot-intune-overview.md#policy-and-setting-management) +- [Device details and troubleshooting](../copilot/copilot-intune-overview.md#device-details-and-troubleshooting) +- [Device query](../copilot/copilot-intune-overview.md#query-with-copilot-in-device-query) -Copilot for Security has a Security Operations Center (SOC) or security admin focus. So, if you're a SOC analyst or security admin, then you can use Copilot for Security to get the security posture of devices that Intune manages. +### Security admin focus + +Security Copilot has a Security Operations Center (SOC) or security admin focus. So, if you're a SOC analyst or security admin, then you can use Security Copilot to get the security posture of devices that Intune manages. For example, there's a user or device that is showing signs of malicious intent. Also, you notice some events are happening after the malicious intent, like an unknown device enrolling in Intune. Maybe someone is trying to use stolen credentials to enroll and get access. You need to get more information. -In Copilot for Security, you can use the Intune capabilities to get more information, like: +In Security Copilot, you can use the Intune capabilities to get more information, like: - Ask about a specific device, get all the properties about that device, including the device name, device ID, and device manufacturer. - Determine when the device is enrolled in Intune. @@ -62,73 +79,71 @@ In Copilot for Security, you can use the Intune capabilities to get more informa - Determine the type of device, like a laptop or mobile phone. - Check the compliance status, especially if a device is noncompliant, and why it's noncompliant. -In Microsoft Defender, you can use this information, including the device type, to determine your next steps. For example, you might take different actions based on the type of device (laptop vs. mobile phone vs. tablet). Copilot for Security can also give you a link to the device in Microsoft Defender, so you can run any Defender actions. +In Microsoft Defender, you can use this information, including the device type, to determine your next steps. For example, you might take different actions based on the type of device (laptop vs. mobile phone vs. tablet). Security Copilot can also give you a link to the device in Microsoft Defender, so you can run any Defender actions. ### What you need to know - When an admin submits a prompt, Copilot can only access the data that the admin has permissions to, which includes the [RBAC roles](../fundamentals/role-based-access-control.md) and [Intune scope tags](../fundamentals/scope-tags.md) assigned to them. - If you want your admins to access all your Intune data in Copilot for Security, then use the following role in Microsoft Entra ID: + If you want your admins to access all your Intune data in Security Copilot, then use the following role in Microsoft Entra ID: - Intune Service Administrator (also known as Intune Administrator) For more information on roles and authentication, go to: - - [Roles and authentication in Microsoft Copilot for Security](/security-copilot/authentication) + - [Roles and authentication in Microsoft Security Copilot](/security-copilot/authentication) - [Role based access control (RBAC) in Intune](../fundamentals/role-based-access-control.md) - [Use RBAC and scope tags for distributed IT in Intune](../fundamentals/scope-tags.md) -- You can access your Intune data in the [Copilot for Security portal](https://go.microsoft.com/fwlink/?linkid=2247989) and Copilot in the [Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431). For more information on Copilot in Intune vs. Copilot for Security, and other common questions, go to the [Microsoft Copilot in Intune FAQ](copilot-intune-faq.md). - -## Open Copilot for Security and enable Intune +- You can access your Intune data in the [Security Copilot portal](https://go.microsoft.com/fwlink/?linkid=2247989) and Copilot in the [Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431). For more information on Copilot in Intune vs. Security Copilot, and other common questions, go to the [Microsoft Copilot in Intune FAQ](copilot-intune-faq.md). -To use the Intune capabilities in Copilot for Security, enable the Intune plugin. +## Enable the Security Copilot integration in Intune + +To use the Intune capabilities in Security Copilot, enable the Intune plugin. -1. Go to [Microsoft Copilot for Security](https://go.microsoft.com/fwlink/?linkid=2247989) and sign in with your credentials. +1. Go to [Security Copilot](https://go.microsoft.com/fwlink/?linkid=2247989) and sign in with your credentials. 2. In the prompt bar, select **Sources** (right corner). - :::image type="content" source="./media/security-copilot/security-copilot-sources.png" alt-text="Screenshot that shows the plugin sources that are available, enabled, and disabled in Microsoft Copilot for Security."::: + :::image type="content" source="./media/security-copilot/security-copilot-sources.png" alt-text="Screenshot that shows the plugin sources that are available, enabled, and disabled in Microsoft Security Copilot."::: 3. In **Manage sources**, turn on Microsoft Intune: - :::image type="content" source="./media/security-copilot/intune-plug-in-enabled.png" alt-text="Screenshot that shows the Microsoft Intune plug-in source is enabled in Microsoft Copilot for Security."::: + :::image type="content" source="./media/security-copilot/intune-plug-in-enabled.png" alt-text="Screenshot that shows the Microsoft Intune plug-in source is enabled in Security Copilot."::: > [!NOTE] - > Some roles can enable or disable plugins. For more information, go to [Manage plugins in Microsoft Copilot for Security](/security-copilot/manage-plugins). + > Some roles can enable or disable plugins. For more information, go to [Manage plugins in Microsoft Security Copilot](/security-copilot/manage-plugins). -## Use the built-in features +### Use the built-in features -In Copilot for Security, there are built in system features that are helpful for Intune admins. For a walkthrough of Copilot for Security, go to [Navigating Microsoft Copilot for Security](/security-copilot/navigating-security-copilot). +In Security Copilot, there are built in system features that are helpful for Intune admins. For a walkthrough of Security Copilot, go to [Navigating Microsoft Security Copilot](/security-copilot/navigating-security-copilot). This section describes some of the features that are helpful for Intune admins. -### System capabilities +#### System capabilities Capabilities are built-in features that can get data from the different plugins that you enable, including Microsoft Intune. When you use a prompt to ask something about your Intune data, like apps assigned to a user or device details, your prompts use these Intune capabilities. To view the list of Intune built-in system capabilities for Intune, use the following steps: -1. In the [Copilot for Security portal](https://go.microsoft.com/fwlink/?linkid=2247989) prompt bar, select the Copilot prompts icon > **See all system capabilities**. +1. In the [Security Copilot portal](https://go.microsoft.com/fwlink/?linkid=2247989) prompt bar, select the Copilot prompts icon > **See all system capabilities**. - :::image type="content" source="./media/security-copilot/security-copilot-system-capabilities.png" alt-text="Screenshot that shows how to select the prompts icon and system capabilities in Microsoft Copilot for Security."::: + :::image type="content" source="./media/security-copilot/security-copilot-system-capabilities.png" alt-text="Screenshot that shows how to select the prompts icon and system capabilities in Security Copilot."::: 2. In the Microsoft Intune section, there's a list of all the built-in capabilities for Intune. You can select any of the capabilities and get more information about that capability. -### Sessions - -When you use prompts in the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) or in the Copilot for Security portal, the sessions are saved. To see the saved sessions, use the following steps: +#### Sessions -1. In the [Copilot for Security portal](https://go.microsoft.com/fwlink/?linkid=2247989), go to the menu > **My sessions**. +When you use prompts in the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) or in the Security Copilot portal, the sessions are saved. To see the saved sessions, use the following steps: - :::image type="content" source="./media/security-copilot/security-copilot-menu-my-sessions.png" alt-text="Screenshot that shows the Microsoft Copilot for Security menu and My sessions with previous sessions in Copilot for Security portal."::: +1. In the [Security Copilot portal](https://go.microsoft.com/fwlink/?linkid=2247989), go to the menu at the top left > **My sessions**. 2. When you select a session, your previous prompts and results are shown. Every session also has a session ID in the URL. You can share this session ID with others to review the same prompt session. For example, your session ID is something like `https://securitycopilot.microsoft.com/sessions/023d1c61-f3c7-4702-8924-075a1058900d`. -## Sample prompts for Intune +## Sample Intune prompts -You can create your own prompts in Copilot for Security to get information about your Intune data. This section lists some ideas and examples. +You can create your own prompts in Security Copilot to get information about your Intune data. This section lists some ideas and examples. ### Before you begin @@ -143,8 +158,8 @@ You can create your own prompts in Copilot for Security to get information about You can also save your prompts in a promptbook for future use. For more information, go to: - - [Prompting in Microsoft Copilot for Security](/security-copilot/prompting-security-copilot) - - [Using promptbooks in Microsoft Copilot for Security](/security-copilot/using-promptbooks) + - [Prompting in Microsoft Security Copilot](/security-copilot/prompting-security-copilot) + - [Using promptbooks in Microsoft Security Copilot](/security-copilot/using-promptbooks) ### General information about your Intune data @@ -196,22 +211,22 @@ Get the **similarities and differences** between two devices, like the complianc ## Provide feedback -Your feedback on the Intune integration with Copilot for Security helps with development. To provide feedback, in Copilot for Security, use the feedback buttons at the bottom of each completed prompt. +Your feedback on the Intune integration with Security Copilot helps with development. To provide feedback, in Security Copilot, use the feedback buttons at the bottom of each completed prompt. -:::image type="content" source="./media/security-copilot/security-copilot-prompt-feedback.png" alt-text="Screenshot that shows how to submit feedback on the prompt results in Microsoft Copilot for Security."::: +:::image type="content" source="./media/security-copilot/security-copilot-prompt-feedback.png" alt-text="Screenshot that shows how to submit feedback on the prompt results in Security Copilot."::: Whenever possible, and when the result isn't what you expect, write a few words explaining what can be done to improve the outcome. If you entered Intune-specific prompts and the results aren't Intune related, then include that information. -## Data processing and privacy +## Privacy and data security in Security Copilot -For more information about data privacy in Copilot for Security, go to [Privacy and data security in Microsoft Copilot for Security](/security-copilot/privacy-data-security). +For more information about data privacy in Security Copilot, go to [Privacy and data security in Microsoft Security Copilot](/security-copilot/privacy-data-security). When you interact with the Security Copilot to get Intune data, the Security Copilot pulls that data from Intune. The prompts, the Intune data that's retrieved, and the output shown in the prompt results is processed and stored within the Security Copilot service. -When you use Copilot for Security to get Intune data, Copilot for Security also has access to the data and permissions defined by the [RBAC roles](../fundamentals/role-based-access-control.md) and [Intune scope tags](../fundamentals/scope-tags.md) assigned to you. +When you use Security Copilot to get Intune data, Security Copilot also has access to the data and permissions defined by the [RBAC roles](../fundamentals/role-based-access-control.md) and [Intune scope tags](../fundamentals/scope-tags.md) assigned to you. ## Related articles -- [What is Microsoft Copilot for Security?](/security-copilot/microsoft-security-copilot) -- [Privacy and data security in Microsoft Copilot for Security](/security-copilot/privacy-data-security) +- [What is Microsoft Security Copilot?](/security-copilot/microsoft-security-copilot) +- [Privacy and data security in Microsoft Security Copilot](/security-copilot/privacy-data-security) - [Use Microsoft Copilot in Intune](copilot-intune-overview.md) diff --git a/memdocs/intune/developer/app-sdk-android-phase7.md b/memdocs/intune/developer/app-sdk-android-phase7.md index 6a74718ff22..9178f809678 100644 --- a/memdocs/intune/developer/app-sdk-android-phase7.md +++ b/memdocs/intune/developer/app-sdk-android-phase7.md @@ -602,7 +602,7 @@ Most notifications are [MAMUserNotification]s, which provide information specifi - Your app called [unregisterAccountForMAM]. - An IT admin initiated a remote wipe. -- Admin-required conditional access policies weren't satisfied. +- Admin-required Conditional Access policies weren't satisfied. > [!WARNING] > An app should never register for both the `WIPE_USER_DATA` and `WIPE_USER_AUXILIARY_DATA` notifications. diff --git a/memdocs/intune/developer/app-sdk-ios-phase3.md b/memdocs/intune/developer/app-sdk-ios-phase3.md index b8ae1b08e10..6ce79464ba7 100644 --- a/memdocs/intune/developer/app-sdk-ios-phase3.md +++ b/memdocs/intune/developer/app-sdk-ios-phase3.md @@ -413,6 +413,9 @@ The return value of this method tells the SDK if the application must handle the * If false is returned, the SDK will restart the application after this method returns. The SDK immediately shows a dialog box that tells the user to restart the application. +>[!NOTE] +>.NET MAUI apps do not require a restart. + ## Exit Criteria After you've either configured the build plugin or integrated the command line tool into your build process, validate that it's running successfully: diff --git a/memdocs/intune/developer/app-sdk-ios-phase4.md b/memdocs/intune/developer/app-sdk-ios-phase4.md index c6933f0c0d8..7362ec6a29f 100644 --- a/memdocs/intune/developer/app-sdk-ios-phase4.md +++ b/memdocs/intune/developer/app-sdk-ios-phase4.md @@ -323,6 +323,10 @@ If your app integrates with Siri Intents or makes Siri Intent Donations, please ## Printing If your app implements printing and provides a custom print action on a custom menu, be sure to utilize `UIPrintInteractionController.isPrintingAvailable()` to determine if you should add your print action to your custom menu. + + ## Screen capture blocking + +For apps that have updated to v19.7.6 or later for Xcode 15 and v20.2.1 or later for Xcode 16 of the SDK, screen capture block will be applied if you have configured `Send Org data to other apps` to a value other than “All apps”. You can configure app configuration policy setting “com.microsoft.intune.mam.screencapturecontrol = Disabled” if you wish to allow screen capture for your iOS devices. ## Notifications diff --git a/memdocs/intune/developer/app-sdk-ios-phase6.md b/memdocs/intune/developer/app-sdk-ios-phase6.md index c7ef60be087..635a0934108 100644 --- a/memdocs/intune/developer/app-sdk-ios-phase6.md +++ b/memdocs/intune/developer/app-sdk-ios-phase6.md @@ -7,7 +7,7 @@ keywords: author: Erikre ms.author: erikre manager: dougeby -ms.date: 12/09/2023 +ms.date: 11/19/2024 ms.topic: reference ms.service: microsoft-intune ms.subservice: developer @@ -55,6 +55,10 @@ In addition to the Intune SDK, you need these two components to enable App Prote :::image type="content" alt-text="Diagram of MAM-CA remediation flow." source="./media/app-sdk-ios/app-ca-flow.png" lightbox="./media/app-sdk-ios/app-ca-flow.png"::: +### MAM compliance process flow + +:::image type="content" alt-text="Diagram of MAM compliance process flow." source="./media/app-sdk-ios/mam-compliance-flow.png" lightbox="./media/app-sdk-ios/mam-compliance-flow.png"::: + ### New APIs Most of the new APIs can be found in the IntuneMAMComplianceManager.h. The app needs to be aware of three differences in behavior explained below. @@ -62,7 +66,7 @@ New behavior | Description | -- | -- | App → ADAL/MSAL: Acquire token | When an application tries to acquire a token, it should be prepared to receive a ERROR_SERVER_PROTECTION_POLICY_REQUIRED. The app can receive this error during their initial account add flow or when accessing a token later in the application lifecycle. When the app receives this error, it won't be granted an access token and needs to be remediated to retrieve any server data. | App → Intune SDK: Call remediateComplianceForIdentity | When an app receives a ERROR_SERVER_PROTECTION_POLICY_REQUIRED from ADAL, or MSALErrorServerProtectionPoliciesRequired from MSAL it should call [[IntuneMAMComplianceManager instance] remediateComplianceForIdentity] to let Intune enroll the app and apply policy. The app may be restarted during this call. If the app needs to save state before restarting, it can do so in restartApplication delegate method in IntuneMAMPolicyDelegate.

    remediateComplianceForIdentity provides all the functionality of registerAndEnrollAccount and loginAndEnrollAccount. Therefore, the app doesn't need to use either of these older APIs. | -Intune → App: Delegate remediation notification |After Intune has retrieved and applied policies, it will notify the app of the result using the IntuneMAMComplianceDelegate protocol. Refer to IntuneMAMComplianceStatus in IntuneComplianceManager.h for information on how the app should handle each error. In all cases except IntuneMAMComplianceCompliant, the user won't have a valid access token.

    If the app already has managed content and isn't able to enter a compliant status, the application should call selective wipe to remove any corporate content.

    If we can't reach a compliant state, the app should display localized the error message and title string supplied by withErrorMessage and andErrorTitle. | +Intune → App: Delegate remediation notification |After Intune has retrieved and applied policies, it notifies the app of the result using the IntuneMAMComplianceDelegate protocol. Refer to IntuneMAMComplianceStatus in IntuneComplianceManager.h for information on how the app should handle each error. In all cases except IntuneMAMComplianceCompliant, the user won't have a valid access token.

    If the app already has managed content and isn't able to enter a compliant status, the application should call selective wipe to remove any corporate content.

    If we can't reach a compliant state, the app should display localized the error message and title string supplied by withErrorMessage and andErrorTitle. | Example for hasComplianceStatus method of IntuneMAMComplianceDelegate @@ -157,17 +161,18 @@ guard let authorityURL = URL(string: kAuthority) else { self.applicationContext = try MSALPublicClientApplication(configuration: msalConfiguration) ``` -To fetch the Entra object ID for the accountId parameter of the MAM SDK compliance remediation APIs you need to do the following: + +To fetch the Microsoft Entra object ID for the accountId parameter of the MAM SDK compliance remediation APIs, you need to do the following steps: - First get the homeAccountId from userInfo[MSALHomeAccountIdKey] within MSALError object sent back by MSAL when it reports ERROR_SERVER_PROTECTION_POLICY_REQUIRED to the app. -- This homeAccountId will be in the format ObjectId.TenantId. Extract the ObjectId value by spliting the string on the '.' and then use that value for the accountId parameter in remediation API remediateComplianceForAccountId. +- This homeAccountId is in the format ObjectId.TenantId. Extract the ObjectId value by splitting the string on the '.' and then use that value for the accountId parameter in remediation API remediateComplianceForAccountId. ### Exit criteria #### Configuring a test user for App Protection CA -1. Log in with your administrator credentials to https://portal.azure.com. -2. Select **Microsoft Entra ID** > **Security** > **Conditional Access** > **New policy**. Create a new conditional access policy. -3. Configure conditional access policy by setting the following items: +1. Sign in with your administrator credentials to https://portal.azure.com. +2. Select **Microsoft Entra ID** > **Security** > **Conditional Access** > **New policy**. Create a new Conditional Access policy. +3. Configure Conditional Access policy by setting the following items: - Filling in the **Name** field. - Enabling the policy. - Assigning the policy to a user or group. @@ -182,11 +187,11 @@ Test Case | How to test | Expected Outcome | -- | -- | -- | MAM-CA always applied | Ensure the user is targeted for both App Protection CA and MAM policy before enrolling in your app.| Verify that your app handles the remediation cases described above and the app can get an access token. | MAM-CA applied after user enrolled | The user should be logged into the app already, but not targeted for App Protection CA. | Target the user for App Protection CA in the console and verify that you correctly handle MAM remediation | -MAM-CA noncompliance | Set up an App Protection CA policy, but don't assign a MAM policy. | The user shouldn't be able to acquire an access token. This is useful for testing how your app handles IntuneMAMComplianceStatus error cases. | +MAM-CA noncompliance | Setup an App Protection CA policy, but don't assign a MAM policy. | The user shouldn't be able to acquire an access token. This is useful for testing how your app handles IntuneMAMComplianceStatus error cases. | ## Next Steps -After you've completed all the [Exit Criteria] above, your app is now successfully integrated with App Protection CA support. The subsequent section, [Stage 7: Web-view features], may or may not be required, depending on your app's desired app protection policy support. +After you've completed all the [Exit Criteria] above, your app is now successfully integrated with App Protection CA support. The subsequent section, [Stage 7: Web-view features] may or may not be required, depending on your app's desired app protection policy support. [Exit Criteria]:#exit-criteria diff --git a/memdocs/intune/developer/app-wrapper-prepare-android.md b/memdocs/intune/developer/app-wrapper-prepare-android.md index a2378c71bd4..50f0f8c1410 100644 --- a/memdocs/intune/developer/app-wrapper-prepare-android.md +++ b/memdocs/intune/developer/app-wrapper-prepare-android.md @@ -7,7 +7,7 @@ keywords: author: Erikre ms.author: erikre manager: dougeby -ms.date: 12/04/2023 +ms.date: 11/18/2024 ms.topic: reference ms.service: microsoft-intune ms.subservice: developer diff --git a/memdocs/intune/developer/apps-lob-app-versioning.md b/memdocs/intune/developer/apps-lob-app-versioning.md index da5551bf220..e5f8ff6fb32 100644 --- a/memdocs/intune/developer/apps-lob-app-versioning.md +++ b/memdocs/intune/developer/apps-lob-app-versioning.md @@ -7,7 +7,7 @@ keywords: author: Erikre ms.author: erikre manager: dougeby -ms.date: 12/04/2023 +ms.date: 11/18/2024 ms.topic: reference ms.service: microsoft-intune ms.subservice: developer diff --git a/memdocs/intune/developer/apps-prepare-mobile-application-management.md b/memdocs/intune/developer/apps-prepare-mobile-application-management.md index d123683ad7f..57e54191dd8 100644 --- a/memdocs/intune/developer/apps-prepare-mobile-application-management.md +++ b/memdocs/intune/developer/apps-prepare-mobile-application-management.md @@ -7,7 +7,7 @@ keywords: author: Erikre ms.author: erikre manager: dougeby -ms.date: 12/04/2023 +ms.date: 11/18/2024 ms.topic: reference ms.service: microsoft-intune ms.subservice: developer diff --git a/memdocs/intune/developer/data-warehouse-account-move.md b/memdocs/intune/developer/data-warehouse-account-move.md index a7b3cb9db47..ed1127e4a20 100644 --- a/memdocs/intune/developer/data-warehouse-account-move.md +++ b/memdocs/intune/developer/data-warehouse-account-move.md @@ -7,7 +7,7 @@ keywords: author: Erikre ms.author: erikre manager: dougeby -ms.date: 12/04/2023 +ms.date: 11/18/2024 ms.topic: reference ms.service: microsoft-intune ms.subservice: developer @@ -32,27 +32,27 @@ ms.collection: [!INCLUDE [azure_portal](../includes/azure_portal.md)] -By requesting an account move, you are requesting that your data center is changed to another location. After the move, your Data Warehouse will reset and begin recording data at the new location based on the specified day your move begins. To back up your previous Data Warehouse data, please complete the following steps **prior** to your account move. Most Data Warehouse tables retain data for 30 days, so any data gap in these tables will no longer be available 30 days after your account move. To learn more about the retention periods for specific tables, see [Data Warehouse data model](reports-ref-data-model.md). +By requesting an account move, you're requesting that your data center is changed to another location. After the move, your Data Warehouse will reset and begin recording data at the new location based on the specified day your move begins. To back up your previous Data Warehouse data, complete the following steps **prior** to your account move. Most Data Warehouse tables retain data for 30 days, so any data gap in these tables will no longer be available 30 days after your account move. To learn more about the retention periods for specific tables, see [Data Warehouse data model](reports-ref-data-model.md). ## Back up your Data Warehouse data To back up your Data Warehouse data, you must save your Data Warehouse data into a *.csv* file using the Data Warehouse API: -1. If you are a first-time user of the Data Warehouse API, follow the one-time process provided in the following article, [Get data from the Intune Data Warehouse API with a REST client](reports-proc-data-rest.md). +1. If you're a first-time user of the Data Warehouse API, follow the one-time process provided in the following article, [Get data from the Intune Data Warehouse API with a REST client](reports-proc-data-rest.md). 2. Use the PowerShell sample titled [Access the Intune Data Warehouse with PowerShell](https://github.com/Microsoft/Intune-Data-Warehouse/tree/master/Samples/PowerShell) to download all your data into CSV files. ## Back up your trend charts from the Microsoft Intune admin center -Some trend charts in your view of the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) will reset. You may back up these charts by running the following script in **Graph**:   +Some trend charts in your view of the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) resets. You may back up these charts by running the following script in **Graph**:   ### Terms & Conditions Acceptance reports 1. In the[Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), select **Tenant administration** > **Terms & Conditions**. -2. For each **Terms & Condition** item that you select, click **Acceptance Report** > **Export**. +2. For each **Terms & Condition** item that you select, select **Acceptance Report** > **Export**. 3. Save the report locally. ### App Protection reports 1. In the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), select **Apps** -> **Monitor** -> **App protection status**. -2. Click the download icon ( ⤓ ) to save each report. +2. Select the download icon ( ⤓ ) to save each report. ### Device Configuration charts 1. In the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), select **Devices** > **Manage devices** > **Configuration** > **Export**. @@ -77,11 +77,11 @@ Some trend charts in your view of the [Microsoft Intune admin center](https://go ## After a Data Warehouse account move -After the Data Warehouse account move, you'll see in Intune that the Data Warehouse was reset and your data is now stored in the new location. The charts and export options will reset, and you'll see a notification, which upon clicking will direct you to an article explaining why the charts have reset. +After the Data Warehouse account move, you'll see in Intune that the Data Warehouse was reset, and your data is now stored in the new location. The charts and export options reset, and you see a notification, which upon clicking will direct you to an article explaining why the charts have reset. ## Data Warehouse move example -Customer X requests an account move to begin on 1/06/2018. In response to the request, the customer will receive a link to see documentation detailing steps to take if they wish to back up their previous Data Warehouse. On 1/06/2018, the Data Warehouse and the charts it supports will reset and begin storing data in the new data center. +Customer X requests an account move to begin on 1/06/2018. In response to the request, the customer receives a link to see documentation detailing steps to take if they wish to back up their previous Data Warehouse. On 1/06/2018, the Data Warehouse and the charts it supports will reset and begin storing data in the new data center. ## Next steps diff --git a/memdocs/intune/developer/data-warehouse-app-only-auth.md b/memdocs/intune/developer/data-warehouse-app-only-auth.md index 2d1e64af328..42e7c70900c 100644 --- a/memdocs/intune/developer/data-warehouse-app-only-auth.md +++ b/memdocs/intune/developer/data-warehouse-app-only-auth.md @@ -8,7 +8,7 @@ keywords: author: Erikre ms.author: erikre manager: dougeby -ms.date: 12/04/2023 +ms.date: 11/18/2024 ms.topic: reference ms.service: microsoft-intune ms.subservice: developer diff --git a/memdocs/intune/developer/intune-data-warehouse-collections.md b/memdocs/intune/developer/intune-data-warehouse-collections.md index 12c586cf12f..900d388c384 100644 --- a/memdocs/intune/developer/intune-data-warehouse-collections.md +++ b/memdocs/intune/developer/intune-data-warehouse-collections.md @@ -7,7 +7,7 @@ keywords: author: Erikre ms.author: erikre manager: dougeby -ms.date: 12/04/2023 +ms.date: 11/18/2024 ms.topic: reference ms.service: microsoft-intune ms.subservice: developer diff --git a/memdocs/intune/developer/media/app-sdk-ios/app-ca-flow.png b/memdocs/intune/developer/media/app-sdk-ios/app-ca-flow.png index d81553e8878..45aca0cde43 100644 Binary files a/memdocs/intune/developer/media/app-sdk-ios/app-ca-flow.png and b/memdocs/intune/developer/media/app-sdk-ios/app-ca-flow.png differ diff --git a/memdocs/intune/developer/media/app-sdk-ios/mam-compliance-flow.png b/memdocs/intune/developer/media/app-sdk-ios/mam-compliance-flow.png new file mode 100644 index 00000000000..48d53248d33 Binary files /dev/null and b/memdocs/intune/developer/media/app-sdk-ios/mam-compliance-flow.png differ diff --git a/memdocs/intune/developer/reports-changelog.md b/memdocs/intune/developer/reports-changelog.md index 3f1dd063995..539497d9a39 100644 --- a/memdocs/intune/developer/reports-changelog.md +++ b/memdocs/intune/developer/reports-changelog.md @@ -7,7 +7,7 @@ keywords: Intune Data Warehouse author: Erikre ms.author: erikre manager: dougeby -ms.date: 12/04/2023 +ms.date: 11/18/2024 ms.topic: reference ms.service: microsoft-intune ms.subservice: developer diff --git a/memdocs/intune/enrollment/android-corporate-owned-work-profile-enroll.md b/memdocs/intune/enrollment/android-corporate-owned-work-profile-enroll.md index d6a511ea3a4..384f212539f 100644 --- a/memdocs/intune/enrollment/android-corporate-owned-work-profile-enroll.md +++ b/memdocs/intune/enrollment/android-corporate-owned-work-profile-enroll.md @@ -63,7 +63,7 @@ To set up Android Enterprise corporate-owned work profile device management, fol ### Create an enrollment profile > [!NOTE] -> - Tokens for corporate-owned devices with a work profile will not expire automatically. If an admin decides to revoke a token , the profile associated with it will not be displayed in **Devices** > **By platform** > **Android** > **Device onboarding** > **Enrollment** > **Corporate-owned devices with work profile**. To see all profiles associated with both active and inactive tokens, click on **Filter** and check the boxes for both "Active" and "Inactive" policy states. +> - Tokens for corporate-owned devices with a work profile will not expire automatically. If an admin decides to revoke a token, the profile associated with it will not be displayed in **Devices** > **By platform** > **Android** > **Device onboarding** > **Enrollment** > **Corporate-owned devices with work profile**. To see all profiles associated with both active and inactive tokens, click on **Filter** and check the boxes for both "Active" and "Inactive" policy states. > - For corporate-owned work profile (COPE) devices, the `afw#setup` enrollment method and the Near Field Communication (NFC) enrollment method are only supported on devices running Android 8-10. They are not available on Android 11. For more information, see the Google developer docs [here](https://developers.google.com/android/management/provision-device#company-owned_devices_for_work_and_personal_use:~:text=Note%3A%20DPC%20identifier%20method%20only%20supports%20full%20device%20management%20provisioning%20and%20cannot%20be%20used%20for%20corporate%2Downed%2C%20personally%20enabled,(COPE)%20provisioning%20on%20Android%2011%20devices.,-Company%2Downed). You must create an enrollment profile so that users can enroll corporate-owned work profile devices. When the profile is created, it provides you with an enrollment token (random string) and a QR code. Depending on the Android OS and version of the device, you can use either the token or QR code to [enroll the dedicated device](#enroll-the-corporate-owned-work-profile-devices). @@ -161,7 +161,8 @@ You can target apps and policies to either assigned or dynamic device groups. Yo Users can now [enroll their corporate-owned work profile devices](android-dedicated-devices-fully-managed-enroll.md). > [!NOTE] -> The Microsoft Intune app is automatically installed during enrollment. This app is required for enrollment and can't be uninstalled. If you deploy the Intune Company Portal app to a device and the user attempts to launch the app, they will be redirected to the Microsoft Intune app, and the Company Portal app icon will be hidden. +> The Microsoft Intune app automatically installs on corporate-owned work profile devices during enrollment. This app is required for enrollment and can't be uninstalled. If you deploy the Intune Company Portal app to a device and the user attempts to launch the app, they will be redirected to the Microsoft Intune app, and the Company Portal app icon will be hidden. +> The Microsoft Authenticator app automatically installs on corporate-owned work profile devices during enrollment. This app is required for enrollment and can't be uninstalled. ## Token types When you create the enrollment profile in the admin center, you have to select a token type. There are two types of tokens. Each type enables a different enrollment flow. diff --git a/memdocs/intune/enrollment/android-enterprise-overview.md b/memdocs/intune/enrollment/android-enterprise-overview.md index 8daa7408163..f7a0a9d27bd 100644 --- a/memdocs/intune/enrollment/android-enterprise-overview.md +++ b/memdocs/intune/enrollment/android-enterprise-overview.md @@ -95,7 +95,7 @@ Android Enterprise doesn't provide a default email app or native email profile o Gmail and Nine Work are two Exchange ActiveSync (EAS) client apps in the Play Store that support Android Enterprise app configuration. Intune provides configuration templates for Gmail and Nine Work apps so you can manage them as work apps. You can configure other email apps that support app configuration profiles in an app configuration policy. -If you're using Exchange ActiveSync conditional access for a personal or corporate-owned device, consider using the Gmail or Nine Work email app. The Microsoft Outlook for Android app, and any other email app that uses modern authentication via MSAL, is also supported. For more information, see [How to configure email settings in Microsoft Intune](../configuration/email-settings-configure.md). +If you're using Exchange ActiveSync Conditional Access for a personal or corporate-owned device, consider using the Gmail or Nine Work email app. The Microsoft Outlook for Android app, and any other email app that uses modern authentication via MSAL, is also supported. For more information, see [How to configure email settings in Microsoft Intune](../configuration/email-settings-configure.md). > [!TIP] > Azure AD Authentication Library (ADAL) has been deprecated, so we recommend updating apps that currently use ADAL to MSAL. For more information, see [Update your applications to use Microsoft Authentication Library (MSAL) and Microsoft Graph API](https://techcommunity.microsoft.com/t5/azure-active-directory-identity/update-your-applications-to-use-microsoft-authentication-library/ba-p/1257363). diff --git a/memdocs/intune/enrollment/android-fully-managed-enroll.md b/memdocs/intune/enrollment/android-fully-managed-enroll.md index 6aa7144dc92..fee1bfff1b1 100644 --- a/memdocs/intune/enrollment/android-fully-managed-enroll.md +++ b/memdocs/intune/enrollment/android-fully-managed-enroll.md @@ -113,7 +113,10 @@ Add these configurations to your group: You can't use dynamic groups with the default enrollment profile. For more information about how to create a dynamic group with rules, see [Create a group membership rule](/azure/active-directory/enterprise-users/groups-create-rule#to-create-a-group-membership-rule). -## Step 4: Enroll devices +## Step 4: Enroll devices +> [!NOTE] +> The Microsoft Authenticator app automatically installs on fully managed devices during enrollment. This app is required for this enrollment method and cannot be uninstalled. + After you set up the enrollment profile, token, and dynamic group, you can use any of these provisioning methods to enroll devices as fully managed: * Near Field Communication (NFC) diff --git a/memdocs/intune/enrollment/apple-account-driven-user-enrollment.md b/memdocs/intune/enrollment/apple-account-driven-user-enrollment.md index 90e0bf05376..70b06c97e41 100644 --- a/memdocs/intune/enrollment/apple-account-driven-user-enrollment.md +++ b/memdocs/intune/enrollment/apple-account-driven-user-enrollment.md @@ -8,7 +8,7 @@ keywords: author: Lenewsad ms.author: lanewsad manager: dougeby -ms.date: 09/09/2024 +ms.date: 12/06/2024 ms.topic: how-to ms.service: microsoft-intune ms.subservice: enrollment @@ -32,7 +32,7 @@ ms.collection: # Set up account driven Apple User Enrollment -Set up account driven Apple User Enrollment for personal devices enrolling in Microsoft Intune. Account driven user enrollment provides a faster and more user-friendly enrollment experience than [user enrollment with Company Portal](apple-user-enrollment-with-company-portal.md). The device user initiates enrollment by signing into their work account in the Settings app. After the user approves device management, the enrollment profile silently installs and Intune policies are applied. Intune uses just-in-time registration and the Microsoft Authenticator app for authentication to reduce the number of times users have to sign in during enrollment and when accessing work apps. +Set up account driven Apple User Enrollment for personal devices enrolling in Microsoft Intune. Account driven user enrollment provides a faster and more user-friendly enrollment experience than [user enrollment with Company Portal](apple-user-enrollment-with-company-portal.md). The device user initiates enrollment by signing into their work account in the Settings app. After the user approves device management, the enrollment profile silently installs and Intune policies are applied. Intune uses just-in-time (JIT) registration and the Microsoft Authenticator app for authentication to reduce the number of times users have to sign in during enrollment and when accessing work apps. This article describes how to set up account driven Apple User Enrollment in Microsoft Intune. You will: @@ -41,7 +41,7 @@ This article describes how to set up account driven Apple User Enrollment in Mic * Prepare employees and students for enrollment. ## Prerequisites -Microsoft Intune supports account driven Apple User Enrollment on devices running iOS/iPadOS version 15 or later. If you assign an account driven user enrollment profile to device users running iOS/iPadOS 14.9 or earlier, Microsoft Intune will automatically enroll them via user enrollment with Company Portal. +Microsoft Intune supports account driven Apple User Enrollment on devices running iOS/iPadOS version 15 or later. If you assign an account driven user enrollment profile to device users running iOS/iPadOS 14.9 or earlier, Microsoft Intune automatically enrolls them via user enrollment with Company Portal. Before beginning setup, complete the following tasks: @@ -49,9 +49,14 @@ Before beginning setup, complete the following tasks: - [Get Apple MDM Push certificate](apple-mdm-push-certificate-get.md) - [Create Managed Apple IDs for device users](https://support.apple.com/en-us/HT210737) (Opens Apple Support website) -You also need to set up service discovery so that Apple can reach the Intune service and retrieve enrollment information. To do this, set up and publish an HTTP well-known resource file on the same domain that employees sign into. Apple retrieves the file via an HTTP GET request to `“https://contoso.com/.well-known/com.apple.remotemanagement”`, with your organization's domain in place of `contoso.com`. Publish the file on a domain that can handle HTTP GET requests. +You also need to set up service discovery so that Apple can reach the Intune service and retrieve enrollment information. To complete this prerequisite, set up and publish an HTTP well-known resource file on the same domain that employees sign into. Apple retrieves the file via an HTTP GET request to `“https://contoso.com/.well-known/com.apple.remotemanagement”`, with your organization's domain in place of `contoso.com`. Publish the file on a domain that can handle HTTP GET requests. + + +> [!NOTE] +> The well-known resource file must be saved without a file extension, such as .json, to function correctly. + +Create the file in JSON format, with the content type set to `application/json`. We provide the following JSON samples that you can copy and paste into your file. Use the one that aligns with your environment. Replace the *YourAADTenantID* variable in the base URL with your organization's Microsoft Entra tenant ID. -Create the file in JSON format, with the content type set to `application/json`. We've provided the following JSON samples that you can copy and paste into your file. Use the one that aligns with your environment. Replace the *YourAADTenantID* variable in the base URL with your organization's Microsoft Entra tenant ID. Microsoft Intune environments: ```json @@ -72,7 +77,10 @@ Create the file in JSON format, with the content type set to `application/json`. The rest of the JSON sample is populated with all of the information you need, including: * Version: The server version is `mdm-byod`. -* BaseURL: This URL is the location where the Intune service resides. +* BaseURL: This URL is the location where the Intune service resides. + +> [!TIP] +> For more information about the technical requirements for service discovery, see [Implementing the simple authentication user-enrollment flow](https://developer.apple.com/documentation/devicemanagement/user_enrollment/onboarding_users_with_account_sign-in/implementing_the_simple_authentication_user-enrollment_flow) in the Apple Developer documentation. ## Best practices We recommend extra configurations to help improve the enrollment experience for device users. This section provides more information about each recommendation. @@ -96,7 +104,18 @@ Create an enrollment profile for devices enrolling via account driven user enrol 1. Select **Create profile** > **iOS/iPadOS**. 1. On the **Basics** page, enter a name and description for the profile so that you can distinguish it from other profiles in the admin center. Device users don't see these details. 1. Select **Next**. -1. On the **Settings** page, for **Enrollment type**, select **Account driven user enrollment**. +1. On the **Settings** page, for **Enrollment type**, select how you want to enroll devices. You can choose the enrollment method or allow users to make their own choice. Their choice determines the enrollment process that Microsoft Intune carries out. It's also reflected in the device ownership attribute in Microsoft Intune. To learn more about the user's experience and what they see onscreen during enrollment, see [Set up personal iOS device for work or school](../user-help/enroll-your-device-in-intune-ios.md). + + Your options: + + - **Account driven user enrollment**: Assigned users who initiate enrollment are enrolled via account driven user enrollment. + + - **Determine based on user choice**: Assigned users who initiate enrollment can select how they want to enroll their device. Their options: + + - **I own this device:** More settings appear with this selection. The user has the option to secure their entire device or only secure work-related apps and data. + + - **(Company) owns this device:** The device enrolls via Apple Device Enrollment. For more information about this enrollment method, see [Device Enrollment and MDM](https://support.apple.com/guide/deployment/device-enrollment-and-mdm-depd1c27dfe6/web) on the Apple Support website. + 1. Select **Next**. 1. On the **Assignments** page, assign the profile to all users, or select specific groups. Device groups aren't supported in user enrollment scenarios because user enrollment requires user identities. 1. Select **Next**. @@ -112,7 +131,7 @@ This section describes the enrollment steps for device users. We recommend using 3. Select **VPN & Device Management**. 4. Sign in with your work or school account, or with the Apple ID provided to you by your organization. 5. Select **Sign In to iCloud**. -6. Enter the password for the username that's shown on screen. Then select **Continue**. +6. Enter the password for the username that appears onscreen. Then select **Continue**. 7. Select **Allow Remote Management**. 8. Wait a few minutes while your device is configured and the management profile is installed. 9. To confirm your device is ready to use for work, go to **VPN & Device Management**. Confirm that your work account is listed under **MANAGED ACCOUNT**. diff --git a/memdocs/intune/enrollment/apple-school-manager-set-up-ios.md b/memdocs/intune/enrollment/apple-school-manager-set-up-ios.md index 812b2fd0bcd..3cd8621aceb 100644 --- a/memdocs/intune/enrollment/apple-school-manager-set-up-ios.md +++ b/memdocs/intune/enrollment/apple-school-manager-set-up-ios.md @@ -3,12 +3,12 @@ title: Apple School Manager Program enrollment for iOS/iPadOS devices titleSuffix: Microsoft Intune -description: Learn how to set up Apple School Manager program enrollment for corporate-owned iOS/iPadOS devices with Intune. +description: Learn how to set up Microsoft Intune with Apple School Manager for corporate-owned iOS/iPadOS devices. keywords: author: Lenewsad ms.author: lanewsad manager: dougeby -ms.date: 06/17/2020 +ms.date: 01/06/2025 ms.topic: how-to ms.service: microsoft-intune ms.subservice: enrollment @@ -20,7 +20,7 @@ ms.assetid: 4c35a23e-0c61-11e8-ba89-0ed5f89f718b #ROBOTS: #audience: -ms.reviewer: tisilver +ms.reviewer: annovich ms.suite: ems search.appverid: MET150 #ms.tgt_pltfrm: @@ -33,153 +33,25 @@ ms.collection: [!INCLUDE [azure_portal](../includes/azure_portal.md)] -You can set up Intune to enroll iOS/iPadOS devices purchased through the [Apple School Manager](https://school.apple.com/) program. Using Intune with Apple School Manager, you can enroll large numbers of iOS/iPadOS devices without ever touching them. When a student or teacher turns on the device, Setup Assistant runs with preconfigured settings and the device enrolls into management. +Set up Microsoft Intune to enroll iOS/iPadOS devices purchased through [Apple School Manager](https://school.apple.com/). Using Intune with Apple School Manager, you can enroll large numbers of iOS/iPadOS devices without ever touching them. When a student or teacher turns on the device, Apple Setup Assistant runs with preconfigured settings and the device enrolls into management. -To enable Apple School Manager enrollment, you use both the Intune and Apple School Manager portals. A list of serial numbers or a purchase order number is required so you can assign devices to Intune for management. You create Automated Device Enrollment (ADE) enrollment profiles containing settings that applied to devices during enrollment. -Apple School Manager enrollment can't be used with the [device enrollment manager](device-enrollment-manager-enroll.md). +## Prerequisites -**Prerequisites** -- [Apple Mobile Device Management (MDM) Push certificate](apple-mdm-push-certificate-get.md) -- [MDM Authority](../fundamentals/mdm-authority-set.md) -- If using ADFS, user affinity requires [WS-Trust 1.3 Username/Mixed endpoint](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/ff608241(v=ws.10)). [Learn more](/powershell/module/adfs/get-adfsendpoint). -- Devices purchased from the [Apple School Management](http://school.apple.com) program +To enable Apple School Manager enrollment, you use both the Microsoft Intune admin center and Apple School Manager portal. You need a list of serial numbers or a purchase order number so that you can assign devices to Intune. -## Get an Apple token and assign devices +- Get an [Apple mobile device management (MDM) push certificate](apple-mdm-push-certificate-get.md). +- Set up the [MDM Authority](../fundamentals/mdm-authority-set.md). +- If using Active Directory Federation Services (AD FS), user affinity requires [WS-Trust 1.3 Username/Mixed endpoint](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/ff608241(v=ws.10)). For more information, see [Get ADFS endpoint](/powershell/module/adfs/get-adfsendpoint). +- Devices must be purchased from [Apple School Manager](http://school.apple.com). -Before you can enroll corporate-owned iOS/iPadOS devices with Apple School Manager, you need a token (.p7m) file from Apple. This token lets Intune sync information about Apple School Manager-participating devices. It also permits Intune to perform enrollment profile uploads to Apple and to assign devices to those profiles. While you are in the Apple portal, you can also assign device serial numbers to manage. +Apple School Manager enrollment can't be used with the [device enrollment manager](device-enrollment-manager-enroll.md) account. -### Step 1: Download the Intune public key certificate required to create an Apple token +## Next steps -1. In the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Devices** > **Enrollment**. -1. Select the **Apple** tab. -1. Choose **Enrollment Program Tokens**. -1. Select **Add**. -1. Select **Download your public key** to download and save the encryption key (.pem) file locally. The .pem file is used to request a trust-relationship certificate from the Apple School Manager portal. +This series of articles describes how to set up Microsoft Intune for devices purchased through Apple School Manager. -### Step 2: Download a token and assign devices -1. Choose **Create a token via Apple School Manager**, and sign in to Apple School with your company Apple ID. You can use this Apple ID to renew your Apple School Manager token. -2. In the [Apple School Manager portal](https://school.apple.com), go to **MDM Servers**, and then choose **Add MDM Server** (upper right). -3. Enter the MDM server name. The server name is for your reference to identify the mobile device management (MDM) server. It isn't the name or URL of the Microsoft Intune server. -4. Choose **Upload File...** in the Apple portal, browse to the .pem file, and choose **Save MDM Server** (lower right). -5. Choose **Get Token** and then download the server token (.p7m) file to your computer. -6. Go to **Device Assignments**. Choose your devices by manually entering their serial numbers or order number. -7. Choose the action **Assign to Server**, and choose the **MDM Server** you created. -8. Specify how to **Choose Devices**, then provide device information and details. -9. Choose **Assign to Server** and choose the <ServerName> specified for Microsoft Intune, and then choose **OK**. - -### Step 3: Save the Apple ID used to create this token - -Return to the [admin center](https://go.microsoft.com/fwlink/?linkid=2109431) and enter the Apple ID. - -![Screenshot of specifying the Apple ID used to create the enrollment program token and browsing to the enrollment program token.](./media/apple-school-manager-set-up-ios/image03.png) - -### Step 4: Upload your token -In the **Apple token** box, browse to the certificate (.pem) file, choose **Open**, and then choose **Create**. With the push certificate, Intune can enroll and manage iOS/iPadOS devices by pushing policy to enrolled mobile devices. Intune automatically synchronizes your Apple School Manager devices from Apple. - -## Create an Apple enrollment profile -Now that you've installed your token, you can create an enrollment profile for Apple School devices. A device enrollment profile defines the settings applied to a group of devices during enrollment. - -1. In the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Devices** > **Enrollment**. -1. Select the **Apple** tab. -1. Under **Bulk Enrollment Methods**, Choose **Enrollment program tokens**. -1. Select a token. -1. Select **Profiles** > **Create profile** > **iOS/iPadOS**. - -1. Under **Create Profile**, enter a **Name** and **Description** for the profile for administrative purposes. Users don't see these details. You can use this **Name** field to create a dynamic group in Microsoft Entra ID. Use the profile name to define the enrollmentProfileName parameter to assign devices with this enrollment profile. Learn more about [Microsoft Entra dynamic groups](/azure/active-directory/active-directory-groups-dynamic-membership-azure-portal#rules-for-devices). - - ![Profile name and description.](./media/apple-school-manager-set-up-ios/image05.png) - -1. For **User Affinity**, choose whether devices with this profile must enroll with or without an assigned user. - - **Enroll with User Affinity** - Choose this option for devices that belong to users and that want to use the company portal for services like installing apps. This option also lets users authenticate their devices by using the company portal. If using ADFS, user affinity requires [WS-Trust 1.3 Username/Mixed endpoint](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/ff608241(v=ws.10)). [Learn more](/powershell/module/adfs/get-adfsendpoint). Apple School Manager's Shared iPad mode requires user enroll without user affinity. - - - **Enroll without User Affinity** - Choose this option for devices unaffiliated with a single user, such as a shared device. Use this option for devices that perform tasks without accessing local user data. Apps like the Company Portal app don't work. - -1. If you chose **Enroll with User Affinity**, you can let users authenticate with Company Portal, Setup Assistant (legacy), and Setup Assistant with modern authentication. Select the option. For more information about authentication methods, see [Authentication methods for automated device enrollment in Intune](automated-device-enrollment-authentication.md). - - > [!NOTE] - > If you want do any of the following, set **Authenticate with Company Portal instead of Apple Setup Assistant** to **Yes**. - > - use multifactor authentication - > - prompt users who need to change their password when they first sign in - > - prompt users to reset their expired passwords during enrollment - > - > These aren't supported when authenticating with Apple Setup Assistant. - -1. Choose **Device Management Settings** and choose if you want devices using this profile to be supervised. - **Supervised** devices give you more management options and disabled Activation Lock by default. Microsoft recommends using ADE as the mechanism for enabling Intune's supervised mode, especially for organizations that are deploying large numbers of iOS/iPadOS devices. - - Users are notified that their devices are supervised in two ways: - - - The lock screen says: "This iPhone is managed by Contoso." - - The **Settings** > **General** > **About** screen says: "This iPhone is supervised. Contoso can monitor your Internet traffic and locate this device." - - > [!NOTE] - > A device enrolled without supervision can only be reset to supervised by using the Apple Configurator. Resetting the device in this manner requires connecting an iOS/iPadOS device to a Mac with a USB cable. Learn more about this on [Apple Configurator docs](https://support.apple.com/guide/apple-configurator-mac). - -1. Choose if you want locked enrollment for devices using this profile. **Locked enrollment** disables iOS/iPadOS settings that allow the management profile to be removed from the **Settings** menu. After device enrollment, you can't change this setting without wiping the device. Such devices must have the **Supervised** Management Mode set to *Yes*. - -1. You can let multiple users sign on to enrolled iPads by using a managed Apple ID. To do so, choose **Yes** under **Shared iPad** (this option requires **Enroll without User Affinity** and **Supervised** mode set to **Yes**.) Managed Apple IDs are created in the Apple School Manager portal. Learn more about [shared iPad](../fundamentals/education-settings-configure-ios-shared.md) and [Apple's shared iPad requirements](https://help.apple.com/classroom/ipad/2.0/#/cad7e2e0cf56). - -1. Choose if you want the devices using this profile to be able to **Sync with computers**. **Deny All** means that all devices using this profile won't be able to sync with any data on any computer. If you choose **Allow Apple Configurator by certificate**, you must choose a certificate under **Apple Configurator Certificates**. - -1. If you chose **Allow Apple Configurator by certificate** in the previous step, choose an Apple Configurator Certificate to import. - -1. You can specify a naming format for devices that is automatically applied when they enroll. To do so, select **Yes** under **Apply device name template**. Then, in the **Device Name Template** box, enter the template to use for the names using this profile. You can specify a template format that includes the device type and serial number. - -1. Choose **OK**. - -1. Choose **Setup Assistant Settings** to configure the following profile settings: - - | Setting | Description | - |------------------------------------------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| - | Department Name | Appears when users tap About Configuration during activation. | - | Department Phone | Appears when the user clicks the Need Help button during activation. | - | Setup Assistant Options | The following optional settings can be set up later in the iOS/iPadOS Settings menu. | - | Passcode | Prompt for passcode during activation. Always require a passcode for unsecured devices unless access is controlled in some other manner (like kiosk mode that restricts the device to one app). | - | Location Services | If enabled, Setup Assistant prompts for the service during activation. | - | Restore | If enabled, Setup Assistant prompts for iCloud backup during activation. | - | iCloud and Apple ID | If enabled, Setup Assistant prompts the user to sign in an Apple ID and the Apps & Data screen will allow the device to be restored from iCloud backup. | - | Terms and Conditions | If enabled, Setup Assistant prompts users to accept Apple's terms and conditions during activation. | - | Touch ID | If enabled, Setup Assistant prompts for this service during activation. | - | Apple Pay | If enabled, Setup Assistant prompts for this service during activation. | - | Zoom | If enabled, Setup Assistant prompts for this service during activation. | - | Siri | If enabled, Setup Assistant prompts for this service during activation. | - | Diagnostic Data | If enabled, Setup Assistant prompts for this service during activation. | - - -1. Choose **OK**. - -1. To save the profile, choose **Create**. - -## Sync managed devices - -After Intune has been assigned permission to manage your Apple School Manager devices, synchronize Intune with the Apple service to see your managed devices in Intune. - -1. Return to **Enrollment Program Tokens**. -1. Select a token in the list. -1. Select **Devices** > **Sync**. -![Screenshot of the Enrollment Program Devices node and Sync link.](./media/device-enrollment-program-enroll-ios/image06.png) - -To follow Apple's terms for acceptable enrollment program traffic, Intune imposes the following restrictions: -- A full sync can run no more than once every seven days. During a full sync, Intune refreshes every Apple serial number assigned to Intune. If a full sync is attempted within seven days of the previous full sync, Intune only refreshes serial numbers that aren't already listed in Intune. -- Any sync request is given 15 minutes to finish. During this time or until the request succeeds, the **Sync** button is disabled. -- Intune syncs new and removed devices with Apple every 24 hours. - ->[!NOTE] ->You can also assign Apple School Manager serial numbers to profiles from the **Enrollment Program Devices** blade. - -## Assign a profile to devices -Apple School Manager devices managed by Intune must be assigned an enrollment profile before they're enrolled. - -1. Return to **Enrollment Program Tokens**. -1. Select a token in the list. -1. Select **Devices** and choose your devices. -1. Select **Assign profile**. Then select a profile for the devices. -1. Select **Assign**. - -## Distribute devices to users - -You have enabled management and syncing between Apple and Intune, and assigned a profile to let your Apple School devices enroll. You can now distribute devices to users. When an iOS/iPadOS Apple School Manager device is turned on, it's enrolled for management by Intune. Profiles can't be applied to activated devices currently in use until the device is wiped. - -## Connect School Data Sync -Microsoft Education is transitioning to a new School Data Sync (SDS) experience with enhanced features, starting August 2024 for the Northern Hemisphere and January 2025 for the Southern Hemisphere. The current Apple School Manager support will be retired by December 31, 2024. This new experience offers various enhancements over SDS (Classic) including decoupled data ingestion, faster syncs with fewer errors, support for larger organizations, and a modern user interface. If you have further questions, please contact Microsoft Education support with questions regarding the transition to the new School Data Sync experience. +1. 🡺 Prerequisites (*You are here*) +1. [Get an Apple token for school devices](apple-school-manager-step-1.md) +1. [Create an Apple enrollment profile](apple-school-manager-step-2.md) +1. [Sync and distribute devices](apple-school-manager-step-3.md) diff --git a/memdocs/intune/enrollment/apple-school-manager-step-1.md b/memdocs/intune/enrollment/apple-school-manager-step-1.md new file mode 100644 index 00000000000..d423823728c --- /dev/null +++ b/memdocs/intune/enrollment/apple-school-manager-step-1.md @@ -0,0 +1,72 @@ +--- +# required metadata + +title: Apple School Manager - get Apple token and assign devices +titleSuffix: Microsoft Intune +description: Get the Apple token needed to set up Apple School Manager and Microsoft Intune for corporate-owned iOS/iPadOS devices. +keywords: +author: Lenewsad +ms.author: lanewsad +manager: dougeby +ms.date: 01/07/2025 +ms.topic: how-to +ms.service: microsoft-intune +ms.subservice: enrollment +ms.localizationpriority: high +ms.assetid: 4c35a23e-0c61-11e8-ba89-0ed5f89f718b + +# optional metadata + +#ROBOTS: +#audience: + +ms.reviewer: annovich +ms.suite: ems +search.appverid: MET150 +#ms.tgt_pltfrm: +ms.collection: +- tier1 +- M365-identity-device-management +--- + +# Get an Apple token for school devices + +Before you can enroll corporate-owned iOS/iPadOS devices with Apple School Manager, you need a token (.p7m) file from Apple. This token lets Intune sync information about Apple School Manager-participating devices. It also permits Intune to perform enrollment profile uploads to Apple and to assign devices to those profiles. While you are in the Apple portal, you can also assign device serial numbers to manage. + +## Get Apple token +In the first set of steps, you download the Intune public key certificate required to create an Apple token. + +1. Sign in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) and go to **Devices**. +1. Expand **Device onboarding**, and then select **Enrollment**. +1. Select the **Apple** tab. +1. Choose **Enrollment program tokens**. +1. Select **Create**. +1. Select **I agree** to give permission to Microsoft to send user and device information to Apple. +1. Select **Download your public key**. This step downloads and saves the encryption key (.pem) file locally. The .pem file is used to request a trust-relationship certificate from the Apple School Manager portal. + + In the next set of steps, you download a token and assign devices. Keep the browser and tab with the admin center open while you're completing steps in Apple School Manager. + + > [!TIP] + > The following steps describe what you need to do in Apple School Manager. For the specific steps, see the [Apple School Manager User Guide](https://support.apple.com/guide/apple-school-manager/device-workflow-axm6a88f692e/1/web/1) (opens Apple Support). + +1. Choose **Create a token via Apple School Manager**, and sign in to [Apple School Manager](https://school.apple.com) with your company Apple ID. You can use this Apple ID to renew your Apple School Manager token. +1. In Apple School Manager, go to your MDM Server assignments to add an MDM server. +1. Enter the mobile device management (MDM) server name. The server name is for your reference to identify the MDM server. It isn't the name or URL of the Microsoft Intune server. +1. Upload the public key certificate file (.pem file). +1. Save your MDM server. +1. Select the download button to download the server token (.p7m) file to your computer. +1. Go to **Devices** and select the devices you want to assign to this token. You can sort by various device properties, like serial number. You can also select multiple devices simultaneously. +1. Select **Edit MDM Server**. Select the MDM server you just added, and then save your changes. This step assigns devices to the token. +1. Return to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) and enter the Apple ID you used to create the token. + + ![Example screenshot showing the Apple ID used to create the enrollment program token and browsing to the enrollment program token.](./media/apple-school-manager-set-up-ios/image03.png) + +1. For **Apple token**, browse to the certificate (.pem) file. Select **Open**, and then choose **Create**. With the push certificate, Intune can enroll and manage iOS/iPadOS devices by pushing policies to enrolled mobile devices. Intune automatically syncs your Apple School Manager devices from Apple. + +## Next steps +This series of articles describes how to set up Microsoft Intune for devices purchased through Apple School Manager. + +1. [Prerequisites](apple-school-manager-set-up-ios.md) +1. 🡺 Get an Apple token for school devices (*You are here*) +1. [Create an Apple enrollment profile](apple-school-manager-step-2.md) +1. [Sync and distribute devices](apple-school-manager-step-3.md) \ No newline at end of file diff --git a/memdocs/intune/enrollment/apple-school-manager-step-2.md b/memdocs/intune/enrollment/apple-school-manager-step-2.md new file mode 100644 index 00000000000..27d3b5ea28f --- /dev/null +++ b/memdocs/intune/enrollment/apple-school-manager-step-2.md @@ -0,0 +1,118 @@ +--- +# required metadata + +title: Apple School Manager - create enrollment profile +titleSuffix: Microsoft Intune +description: Learn how to create the enrollment profile in Intune for Apple School Manager enrollment. +keywords: +author: Lenewsad +ms.author: lanewsad +manager: dougeby +ms.date: 01/07/2025 +ms.topic: how-to +ms.service: microsoft-intune +ms.subservice: enrollment +ms.localizationpriority: high +ms.assetid: 4c35a23e-0c61-11e8-ba89-0ed5f89f718b + +# optional metadata + +#ROBOTS: +#audience: + +ms.reviewer: annovich +ms.suite: ems +search.appverid: MET150 +#ms.tgt_pltfrm: +ms.collection: +- tier1 +- M365-identity-device-management +--- + +# Create an Apple enrollment profile for school devices +After you get your Apple token, you can create an enrollment profile for school devices. An essential part of setup is creating enrollment profiles. The profiles contain the settings that apply to devices during device enrollment. + +## Create a profile + +1. In the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Devices**. +1. Expand **Device onboarding**, and then select **Enrollment**. +1. Select the **Apple** tab. +1. Under **Bulk Enrollment Methods**, choose **Enrollment program tokens**. +1. Choose a token, and then select **Profiles**. +1. Select **Create profile** > **iOS/iPadOS**. + +1. For **Basics**, give the profile a **Name** and **Description** for administrative purposes. Users don't see these details. + + ![Example screenshot of the profile name and description fields in the admin center.](./media/apple-school-manager-set-up-ios/image05.png) + + You can use the name you enter here to create a dynamic group in Microsoft Entra ID. To assign devices with this enrollment profile to a group, for example, enter the name in the *enrollmentProfileName* parameter in your dynamic group rules. For more information, see [Microsoft Entra dynamic groups](/azure/active-directory/active-directory-groups-dynamic-membership-azure-portal#rules-for-devices). + + +1. For **User Affinity**, decide if devices with this profile must enroll with an assigned user or without an assigned user. + - **Enroll with User Affinity** - Choose this option for devices that belong to users and that want to use the company portal for services like installing apps. This option also lets users authenticate their devices by using the company portal. If using Active Directory Federation Services (AD FS), user affinity requires [WS-Trust 1.3 Username/Mixed endpoint](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/ff608241(v=ws.10)). [Learn more](/powershell/module/adfs/get-adfsendpoint). Apple School Manager's Shared iPad mode requires user enroll without user affinity. + + - **Enroll without User Affinity** - Choose this option for devices unaffiliated with a single user, such as a shared device. Use this option for devices that perform tasks without accessing local user data. Apps like the Company Portal app don't work. + +1. If you chose **Enroll with User Affinity**, select how users must authenticate: Company Portal, Setup Assistant (legacy), or Setup Assistant with modern authentication. For more information about authentication methods, see [Authentication methods for automated device enrollment in Intune](automated-device-enrollment-authentication.md). + + > [!NOTE] + > If you want any of the following features, set **Authenticate with Company Portal instead of Apple Setup Assistant** to **Yes**. + > - use multifactor authentication + > - prompt users who need to change their password when they first sign in + > - prompt users to reset their expired passwords during enrollment + > + > These features aren't supported when authenticating with Apple Setup Assistant. + +1. Choose **Device Management Settings**. Decide if you want devices using this profile to be supervised. *Supervision* gives you more management options and disables Apple Activation Lock by default. Microsoft recommends using ADE as the mechanism for enabling Intune's supervised mode, especially for organizations that are deploying large numbers of iOS/iPadOS devices. + + Users are notified that their devices are supervised in two ways: + + - The lock screen says: "This iPhone is managed by Contoso." + - The **Settings** > **General** > **About** screen says: "This iPhone is supervised. Contoso can monitor your Internet traffic and locate this device." + + > [!NOTE] + > A device enrolled without supervision can only be reset to supervised by using the Apple Configurator. Resetting the device in this manner requires connecting an iOS/iPadOS device to a Mac with a USB cable. For more information, see the [Apple Configurator docs](https://support.apple.com/guide/apple-configurator-mac) (opens Apple Support). + +1. Choose if you want locked enrollment for devices using this profile. **Locked enrollment** disables iOS/iPadOS settings that allow the management profile to be removed from the **Settings** menu. After device enrollment, you can't change this setting without wiping the device. Such devices must have the supervised management mode set to *yes*. + +1. You can let multiple users sign on to enrolled iPads by using a managed Apple ID. To do so, choose **Yes** under **Shared iPad** (this option requires **Enroll without User Affinity** and **Supervised** mode set to **Yes**.) Managed Apple IDs are created in the Apple School Manager portal. Learn more about [shared iPad](../fundamentals/education-settings-configure-ios-shared.md) and [shared iPad requirements for Apple](https://help.apple.com/classroom/ipad/2.0/#/cad7e2e0cf56). + +1. Choose if you want the devices using this profile to be able to **Sync with computers**. **Deny All** means that devices using this profile can't sync with any data on any computer. + +1. If you chose **Allow Apple Configurator by certificate** in the previous step, choose an Apple Configurator Certificate to import. + +1. You can specify a naming format for devices that is automatically applied when they enroll. To do so, select **Yes** under **Apply device name template**. Then, in the **Device Name Template** box, enter the template to use for the names using this profile. You can specify a template format that includes the device type and serial number. + +1. Select **OK**. + +1. Select **Setup Assistant Settings** to configure the following profile settings: + + |Setting |Description | + |------------------------------------------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| + |**Department Name** | Appears when users tap About Configuration during activation. | + | **Department Phone** | Appears when the user selects the Need Help button during activation. | + |**Setup Assistant Options** | The following optional settings can be set up later in the iOS/iPadOS Settings menu. | + |**Passcode** | Prompt for passcode during activation. Always require a passcode for unsecured devices unless access is controlled in some other manner (like kiosk mode that restricts the device to one app). | + |**Location Services** | If enabled, Setup Assistant prompts for the service during activation. | + |**Restore** |If enabled, Setup Assistant prompts for iCloud backup during activation. | + | **iCloud and Apple ID** | If enabled, Setup Assistant prompts the user to sign in with an Apple ID, and the Apps & Data screen allows the device to be restored from iCloud backup. | + | **Terms and Conditions**|If enabled, Setup Assistant prompts users to accept Apple's terms and conditions during activation.| + |**Touch ID**|If enabled, Setup Assistant prompts for this service during activation. | + |**Apple Pay** | If enabled, Setup Assistant prompts for this service during activation. | + | **Zoom** |If enabled, Setup Assistant prompts for this service during activation. | + | **Siri**|If enabled, Setup Assistant prompts for this service during activation. | + | **Diagnostic Data** |If enabled, Setup Assistant prompts for this service during activation. | + + +1. Choose **OK**. + +1. To save the profile, choose **Create**. + +## Next steps +This series of articles describes how to set up Microsoft Intune for devices purchased through Apple School Manager. + +1. [Prerequisites](apple-school-manager-set-up-ios.md) +1. [Get an Apple token for school devices](apple-school-manager-step-1.md). +1. 🡺 Create an Apple enrollment profile (*You are here*). +1. [Sync and distribute devices](apple-school-manager-step-3.md). + diff --git a/memdocs/intune/enrollment/apple-school-manager-step-3.md b/memdocs/intune/enrollment/apple-school-manager-step-3.md new file mode 100644 index 00000000000..abc459bced2 --- /dev/null +++ b/memdocs/intune/enrollment/apple-school-manager-step-3.md @@ -0,0 +1,79 @@ +--- +# required metadata + +title: Apple School Manager - sync and distribute devices +titleSuffix: Microsoft Intune +description: Sync and distribute Apple School Manager devices enrolled in Microsoft Intune. +keywords: +author: Lenewsad +ms.author: lanewsad +manager: dougeby +ms.date: 01/06/2025 +ms.topic: how-to +ms.service: microsoft-intune +ms.subservice: enrollment +ms.localizationpriority: high +ms.assetid: 4c35a23e-0c61-11e8-ba89-0ed5f89f718b + +# optional metadata + +#ROBOTS: +#audience: + +ms.reviewer: annovich +ms.suite: ems +search.appverid: MET150 +#ms.tgt_pltfrm: +ms.collection: +- tier1 +- M365-identity-device-management +--- + +# Sync and distribute school devices + +After you assign Microsoft Intune permission to manage your Apple School Manager devices, sync Intune with the Apple service to see your managed devices in the admin center. + +## Start a sync + +1. In the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), return to **Enrollment program tokens**. +1. Select a token in the list. +1. Select **Devices** > **Sync**. + + > [!div class="mx-imgBorder"] + >![Screenshot of the Enrollment Program Devices node and Sync link.](./media/device-enrollment-program-enroll-ios/image06.png) + +To follow Apple's terms for acceptable enrollment program traffic, Intune imposes the following restrictions: +- A full sync can run no more than once every seven days. During a full sync, Intune refreshes every Apple serial number assigned to Intune. If a full sync is attempted within seven days of the previous full sync, Intune only refreshes serial numbers that aren't already listed in Intune. +- Any sync request is given 15 minutes to finish. During this time or until the request succeeds, the **Sync** button is disabled. +- Intune syncs new and removed devices with Apple every 24 hours. + +## Assign a profile to devices +Apple School Manager devices managed by Intune must be assigned an enrollment profile before they're enrolled. + +1. Return to **Enrollment program tokens**. +1. Select a token in the list. +1. Select **Devices**, and then choose your devices. +1. Select **Assign profile**. Then select a profile for the devices. +1. Select **Assign**. + +## Distribute devices to users + +You enabled management and syncing between Apple and Intune, and assigned a profile that lets Apple School devices enroll. You can now distribute devices to users. When an iOS/iPadOS Apple School Manager device is turned on, it enrolls in Microsoft Intune. Profiles can't be applied to activated devices currently in use until the device is wiped. + +## Connect School Data Sync +Microsoft Education is transitioning to a new School Data Sync (SDS) experience with enhanced features, starting August 2024 for the Northern Hemisphere and January 2025 for the Southern Hemisphere. The current Apple School Manager support will be retired by December 31, 2024. This new experience offers various enhancements over SDS (Classic) including: + +- Decoupled data ingestion +- Faster syncs with fewer errors +- Support for larger organizations +- A modern user interface + +Please contact Microsoft Education support with questions regarding the transition to the new School Data Sync experience. + +## Next steps +This series of articles describes how to set up Microsoft Intune for devices purchased through Apple School Manager. + +1. [Prerequisites](apple-school-manager-set-up-ios.md) +1. [Get an Apple token for school devices](apple-school-manager-step-1.md) +1. [Create an Apple enrollment profile](apple-school-manager-step-2.md) +1. 🡺 Sync and distribute devices (*You are here*) diff --git a/memdocs/intune/enrollment/apple-user-enrollment-with-company-portal.md b/memdocs/intune/enrollment/apple-user-enrollment-with-company-portal.md index 2ceb990673d..34a98972ef4 100644 --- a/memdocs/intune/enrollment/apple-user-enrollment-with-company-portal.md +++ b/memdocs/intune/enrollment/apple-user-enrollment-with-company-portal.md @@ -8,7 +8,7 @@ keywords: author: Lenewsad ms.author: lanewsad manager: dougeby -ms.date: 01/23/2024 +ms.date: 12/06/2024 ms.topic: how-to ms.service: microsoft-intune ms.subservice: enrollment @@ -72,14 +72,7 @@ Complete these steps to create an enrollment profile for devices enrolling via u 6. Select **Next**. -7. On the **Settings** page, select **User enrollment with Company Portal**. - - Alternatively, you can select **Determine based on user choice**, which lets assigned users select the enrollment type during enrollment. Their options: - - * **I own this device**: As a follow-up, the user must select whether they want to secure the entire device or only secure work-related apps and data. - * **(Company) owns this device**: The device enrolls via Apple Device Enrollment. For more information about this enrollment method, see [Device Enrollment and MDM](https://support.apple.com/guide/deployment/device-enrollment-and-mdm-depd1c27dfe6/web) on the Apple Support website. - - The device user's selection determines which enrollment process is carried out. Their choice is also reflected in the device ownership attribute shown in Intune. To learn more about the user experience and what they see onscreen during enrollment, see [Set up iOS/iPadOS device access to your company resources](../user-help/enroll-your-device-in-intune-ios.md). +7. On the **Settings** page, select **User enrollment with Company Portal**. 8. Select **Next**. diff --git a/memdocs/intune/enrollment/automated-device-enrollment-authentication.md b/memdocs/intune/enrollment/automated-device-enrollment-authentication.md index a8fe7e65cd3..ae33fcc55ce 100644 --- a/memdocs/intune/enrollment/automated-device-enrollment-authentication.md +++ b/memdocs/intune/enrollment/automated-device-enrollment-authentication.md @@ -50,7 +50,7 @@ Use the Intune Company Portal app as the authentication method if you want to: - Use multifactor authentication (MFA). - Prompt users to change their passwords when they first sign in. - Prompt users to reset their expired passwords during enrollment. - - Register devices in Microsoft Entra ID and use features available with Microsoft Entra ID, such as conditional access. + - Register devices in Microsoft Entra ID and use features available with Microsoft Entra ID, such as Conditional Access. - Automatically install the Company Portal app during enrollment. If your company uses the Volume Purchase Program (VPP), you can automatically install Company Portal app during enrollment without user Apple IDs. - You want to lock the device until the Company Portal app installs. @@ -65,7 +65,7 @@ This option provides the same security as Intune Company Portal authentication b * Use multifactor authentication (MFA). * Prompt users to change their passwords when they first sign in. * Prompt users to reset their expired passwords during enrollment. -* Register devices in Microsoft Entra ID and use features available with Microsoft Entra ID, such as conditional access. +* Register devices in Microsoft Entra ID and use features available with Microsoft Entra ID, such as Conditional Access. * Automatically install the Company Portal app during enrollment. If your company uses the Volume Purchase Program (VPP), you can automatically install Company Portal app during enrollment without user Apple IDs. * Allow users to use the device even when the Company Portal app isn't installed. @@ -86,7 +86,7 @@ In both scenarios, the Company Portal installation option is hidden from the dev ### Multifactor authentication -Multifactor authentication (MFA) will be required if a [conditional access policy that requires it](multi-factor-authentication.md) is applied at enrollment or during Company Portal sign-in. However, MFA is optional, based on the Microsoft Entra settings in the targeted conditional access policy. +Multifactor authentication (MFA) will be required if a [Conditional Access policy that requires it](multi-factor-authentication.md) is applied at enrollment or during Company Portal sign-in. However, MFA is optional, based on the Microsoft Entra settings in the targeted Conditional Access policy. External authentication methods are supported in Microsoft Entra ID, which means you can use your preferred MFA solution to facilitate MFA during device enrollment. If you choose to use a third-party MFA provider, before you deploy enrollment profiles to all devices, do a test run to ensure that both the Microsoft Entra MFA screen and MFA work during enrollment. For more information and support details about external authentication methods, see [Public preview: External authentication methods in Microsoft Entra ID](https://techcommunity.microsoft.com/t5/microsoft-entra-blog/public-preview-external-authentication-methods-in-microsoft/ba-p/4078808). @@ -96,9 +96,9 @@ After they go through the Setup Assistant screens, the device user lands on the - Won’t be fully registered with Microsoft Entra ID. - Won’t show up in the user’s device list in Microsoft Entra ID. -- Won’t have access to resources protected by conditional access. +- Won’t have access to resources protected by Conditional Access. - Won’t be evaluated for device compliance. -- Will be redirected to the Company Portal from other apps if the user tries to open any managed applications that are protected by conditional access. +- Will be redirected to the Company Portal from other apps if the user tries to open any managed applications that are protected by Conditional Access. ## Option 3: Just in Time Registration for Setup Assistant with modern authentication diff --git a/memdocs/intune/enrollment/corporate-identifiers-add.md b/memdocs/intune/enrollment/corporate-identifiers-add.md index 83e3a98b573..9050d63eb25 100644 --- a/memdocs/intune/enrollment/corporate-identifiers-add.md +++ b/memdocs/intune/enrollment/corporate-identifiers-add.md @@ -9,11 +9,6 @@ ms.author: lanewsad manager: dougeby ms.date: 08/08/2024 ms.topic: how-to -ms.service: microsoft-intune -ms.subservice: enrollment -ms.localizationpriority: high -ms.assetid: 566ed16d-8030-42ee-bac9-5f8252a83012 - # optional metadata #ROBOTS: @@ -120,7 +115,7 @@ Android serial numbers aren't guaranteed to be unique or present. Check with you ### Add Windows corporate identifiers > [!IMPORTANT] -> Corporate identifiers are supported for devices running Windows 10 KB5039299 (with OS Build 19045.4598) and later. If you're enrolling Windows 10 devices with an earlier build, do not use the corporate identifier feature. +> Windows corporate identifiers only apply at enrollment time. They don't determine ownership type in Intune after enrollment. Corporate identifiers are supported for devices running Windows 10 KB5039299 (with OS Build 19045.4598) and later. If you're enrolling Windows 10 devices with an earlier build, do not use the corporate identifier feature. To add corporate identifiers for corporate devices running Windows 11, list the manufacturer, model, and serial number for each device as shown in the following example. @@ -131,11 +126,14 @@ Lenovo,thinkpad t14,02234567890123 Remove all periods, if applicable, from the serial number before you add it to the file. -After you add Windows corporate identifiers, Intune marks devices that match all three identifiers as corporate-owned, and marks all other enrolling devices in your tenant as personal. This means that anything you exclude from the Windows corporate identifiers is marked personal. To change the ownership type after enrollment, you have to manually adjust it in the admin center. +After you add Windows corporate identifiers, Intune marks devices that match all three identifiers as corporate-owned, and marks all other enrolling devices in your tenant as personal. This means that anything you exclude from the Windows corporate identifiers is marked personal, but only at enrollment time. Existing Windows logic determines the final state in Intune. For more information, see the table in this section. To change the ownership type in Intune, you have to manually adjust it in the admin center. :::image type="content" source="./media/corporate-identifiers-add/device-enrollment-add-identifiers.png" alt-text="Screenshot of selecting and adding corporate identifiers."::: -The following table lists the type of ownership given to devices when they enroll without corporate identifiers and when they enroll with corporate identifiers. +The following table lists the type of ownership given to devices when they enroll without corporate identifiers and when they enroll with corporate identifiers. + +>[!TIP] +> As a reminder, corporate identifiers only change the device state at enrollment time. This means that after the device enrolls, the device state matches what you see in the **Without corporate identifiers** column in the table. |Windows enrollment types | Without corporate identifiers | With corporate identifiers | |---|---|---| @@ -153,7 +151,7 @@ The following table lists the type of ownership given to devices when they enrol | [Enrollment using the Intune Company Portal app](../user-help/enroll-windows-10-device.md) | Personal | Personal, unless defined by corporate identifiers | | Enrollment via a Microsoft 365 app, which occurs when users select the **Allow my organization to manage my device** option during app sign-in | Personal | Personal, unless defined by corporate identifiers | -Windows corporate identifiers can only change ownership type if someone adds them to Microsoft Intune. If you don't have corporate identifiers for Windows in Intune, or if you remove them, devices that are Microsoft Entra domain joined are marked as corporate-owned. This includes devices enrolled via [automatic MDM enrollment](windows-enroll.md#enable-windows-automatic-enrollment) with: +Windows corporate identifiers can only change ownership type if someone adds them to Microsoft Intune. If you don't have corporate identifiers for Windows in Intune, or if you remove them, devices that are Microsoft Entra domain joined are marked as corporate-owned at enrollment time. This includes devices enrolled via [automatic MDM enrollment](windows-enroll.md#enable-windows-automatic-enrollment) with: - [Microsoft Entra join during Windows setup](/azure/active-directory/device-management-azuread-joined-devices-frx). @@ -222,7 +220,7 @@ Follow up on imported devices to ensure that they enroll in Intune. After you ad 1. Select the device identifiers you want to delete, and choose **Delete**. 1. Confirm the deletion. -Deleting a corporate identifier for an enrolled device does not change the device's ownership. +Deleting a corporate identifier for an enrolled device doesn't change the device's ownership. ## Change device ownership @@ -247,6 +245,8 @@ To confirm the reason for an enrollment failure, go to **Devices** > **Enrollmen ## Known issues and limitations +- Windows corporate device identifiers only apply at enrollment time. This means that when a device with corporate identifiers enrolls using the *Add Work Account from Windows Settings* option, it's marked as corporate-owned only at enrollment time. Microsoft Intune treats it as a corporate device for the enrollment restriction evaluation, but then after that the device appears as a personal device in the admin center. See the table under [Add Windows corporate identifiers](#add-windows-corporate-identifiers) to help you determine the ownership type. Look to the **Without corporate identifiers** column to learn which devices remain corporate or personal in your tenant for the long-term. + - Windows corporate device identifiers are only supported for devices running: - Windows 10 version 22H2 (OS build 19045.4598) or later. @@ -261,7 +261,7 @@ To confirm the reason for an enrollment failure, go to **Devices** > **Enrollmen - Windows currently doesn't support device details in CSV files. -- Apple user enrollment with Company Portal and account driven user enrollment corporate identifiers are not currently supported because the MDM does not get access to the device serial number, IMEI, and UDID. +- Apple user enrollment with Company Portal and account driven user enrollment corporate identifiers aren't currently supported because the MDM doesn't get access to the device serial number, IMEI, and UDID. ## Resources diff --git a/memdocs/intune/enrollment/create-device-limit-restrictions.md b/memdocs/intune/enrollment/create-device-limit-restrictions.md index 97c6e512c43..d03c2755038 100644 --- a/memdocs/intune/enrollment/create-device-limit-restrictions.md +++ b/memdocs/intune/enrollment/create-device-limit-restrictions.md @@ -8,7 +8,7 @@ keywords: author: Lenewsad ms.author: lanewsad manager: dougeby -ms.date: 06/27/2024 +ms.date: 01/27/2025 ms.topic: how-to ms.service: microsoft-intune ms.subservice: enrollment diff --git a/memdocs/intune/enrollment/create-device-platform-restrictions.md b/memdocs/intune/enrollment/create-device-platform-restrictions.md index c41c68d3215..8c7f70a2fca 100644 --- a/memdocs/intune/enrollment/create-device-platform-restrictions.md +++ b/memdocs/intune/enrollment/create-device-platform-restrictions.md @@ -132,6 +132,9 @@ For example, you can use a filter to allow personal Windows devices to enroll wh For more information about creating filters, see [Create a filter](../fundamentals/filters.md). +> [!NOTE] +> It takes extra time to process assignment filters during enrollment. The update between Microsoft Entra and Intune that processes user, group, and filter assignments typically happens within 15 minutes. It's not instant. This amount of time can affect enrollment assignments. You should wait and enroll devices several minutes after adding the enrolling users to a group, not immediately after. + ### Supported filter properties Enrollment restrictions support fewer filter properties than other group-targeted policies. This is because devices aren't yet enrolled, so Intune doesn't have the device info to support all properties. The limited selection of properties become available when you: diff --git a/memdocs/intune/enrollment/device-enrollment-manager-enroll.md b/memdocs/intune/enrollment/device-enrollment-manager-enroll.md index 3e621b94bc5..19f8436fbf6 100644 --- a/memdocs/intune/enrollment/device-enrollment-manager-enroll.md +++ b/memdocs/intune/enrollment/device-enrollment-manager-enroll.md @@ -116,8 +116,8 @@ Applying a Microsoft Entra maximum device limit of less than 1,000 to a DEM acco ### Certificates You must use device-level certificates to manage Wi-Fi and email connections. -### Conditional access -Conditional access is only supported with DEM on devices running: +### Conditional Access +Conditional Access is only supported with DEM on devices running: * Windows 10, version 1803 and later * Windows 11 diff --git a/memdocs/intune/enrollment/device-enrollment-program-enroll-ios.md b/memdocs/intune/enrollment/device-enrollment-program-enroll-ios.md index 97e38d865e2..5b066beae38 100644 --- a/memdocs/intune/enrollment/device-enrollment-program-enroll-ios.md +++ b/memdocs/intune/enrollment/device-enrollment-program-enroll-ios.md @@ -140,9 +140,10 @@ Use [Apple Business Manager (ABM)](https://business.apple.com/) or [Apple School ### Step 1: Download the Intune public key certificate -1. In the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Devices** > **Enrollment**. +1. In the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Devices**. +1. Expand **Device onboarding**, and then select **Enrollment**. 1. Select the **Apple** tab. -1. Select **Enrollment Program Tokens** > **Add**. +1. Select **Enrollment Program Tokens** > **Create**. 1. On the **Basics** tab: @@ -210,13 +211,17 @@ Now that you've installed your token, you can create an enrollment profile for a > [!NOTE] > Devices will be blocked from enrolling if there aren't enough Company Portal licenses for a VPP token or if the token expires. Intune alerts you when a token is about to expire or licenses are running low. -1. In [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Devices** > **Enrollment**. +1. In [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Devices**. +1. Expand **Device onboarding**, and then select **Enrollment**. 1. Select the **Apple** tab. -1. Choose **Enrollment Program Tokens**. +1. Choose **Enrollment program tokens**. 1. Choose a token, and then select **Profiles**. 1. Select **Create profile** > **iOS/iPadOS**. 1. For **Basics**, give the profile a **Name** and **Description** for administrative purposes. Users don't see these details. -1. Select **Next**. +1. Select **Next**. + + > [!IMPORTANT] + > You must assign an enrollment policy to your devices before the devices become active. We recommend that you set a default enrollment policy as soon as possible so that as devices sync from Apple Business Manager or Apple School Manager, and then turn on, they can enroll correctly through automated device enrollment. If a device you synced from Apple is not assigned an enrollment policy and someone turns it on to set it up, enrollment will fail. > [!IMPORTANT] > If you make changes to an existing enrollment profile, the new settings won't take effect on assigned devices until devices are reset back to factory settings and reactivated. The device name template setting is the only setting you can change that doesn't require a factory reset to take effect. Changes to the naming template take effect at the next check-in. @@ -308,7 +313,7 @@ Now that you've installed your token, you can create an enrollment profile for a > [!NOTE] > If you set **Sync with computers** to **Deny all**, the port will be limited on iOS and iPadOS devices. The port will be limited to only charging. It will be blocked from using iTunes or Apple Configurator 2. > - >If you set **Sync with computers** to **Allow Apple Configurator by certificate**, make sure you have a local copy of the certificate that you can use later. You won't be able to make changes to the uploaded copy, and it's important to retain an copy of this certificate. If you want to connect to the iOS/iPadOS device from a Mac device, the same certificate must be installed on the device making the connection to the iOS/iPadOS device. + >If you set **Sync with computers** to **Allow Apple Configurator by certificate**, make sure you have a local copy of the certificate that you can use later. You won't be able to make changes to the uploaded copy, and it's important to retain a copy of this certificate. If you want to connect to the iOS/iPadOS device from a Mac device, the same certificate must be installed on the device making the connection to the iOS/iPadOS device. 1. If you selected **Allow Apple Configurator by certificate** in the previous step, choose an Apple Configurator certificate to import. The limit is 10 certificates. 1. For **Await final configuration**, your options are: @@ -385,7 +390,7 @@ The following table describes the Setup Assistant screens shown during automated | **Apple Pay** | Shows the Apple Pay setup pane, which gives users the option to set up Apple Pay on their devices. For iOS/iPadOS 7.0 and later. | | **Zoom** | Shows the zoom setup pane, which gives users the option to configure zoom settings. For iOS/iPadOS 8.3 and later, and deprecated in iOS/iPadOS 17. | | **Siri** | Shows the Siri setup pane to users. For iOS/iPadOS 7.0 and later. | -| **Diagnostics Data** | Shows the diagnostics pane where users can opt-in to send diagnostic data to Apple. For iOS/iPadOS 7.0 and later. | +| **Diagnostics Data** | Shows the diagnostics pane where users can opt in to send diagnostic data to Apple. For iOS/iPadOS 7.0 and later. | | **Display Tone** | Shows the display tone setup pane, where users can configure the display's white balance settings. For iOS/iPadOS 9.3.2 and later, and deprecated in iOS/iPadOS 15. | | **Privacy** | Shows the privacy setup pane to the user. For iOS/iPadOS 11.3 and later. | | **Android Migration** | Shows a setup pane meant for previous Android users. On this screen, users can migrate data from an Android device. For iOS/iPadOS 9.0 and later.| diff --git a/memdocs/intune/enrollment/device-enrollment-program-enroll-macos.md b/memdocs/intune/enrollment/device-enrollment-program-enroll-macos.md index 53e3bcbcc00..baf58e8c054 100644 --- a/memdocs/intune/enrollment/device-enrollment-program-enroll-macos.md +++ b/memdocs/intune/enrollment/device-enrollment-program-enroll-macos.md @@ -128,7 +128,10 @@ At the end of this procedure, you can assign this profile to Microsoft Entra dev 1. Select an enrollment program token. 1. Select **Profiles** > **Create profile** > **macOS**. - ![Create a profile screenshot.](./media/device-enrollment-program-enroll-macos/image04.png) + ![Create a profile screenshot.](./media/device-enrollment-program-enroll-macos/image04.png) + + > [!IMPORTANT] + > You must assign an enrollment policy to your devices before the devices become active. We recommend that you set a default enrollment policy as soon as possible so that as devices sync from Apple Business Manager or Apple School Manager, and then turn on, they can enroll correctly through automated device enrollment. If a device you synced from Apple is not assigned an enrollment policy and someone turns it on to set it up, enrollment will fail. 1. For **Basics**, enter a name and description for the profile so that you can distinguish it from other enrollment profiles. These details aren't visible to device users. @@ -149,9 +152,9 @@ At the end of this procedure, you can assign this profile to Microsoft Entra dev - Registers with Microsoft Entra ID. - Is added to the user's device record in Microsoft Entra ID. - Can be evaluated for device compliance. - - Gains access to resources protected by conditional access. + - Gains access to resources protected by Conditional Access. - If the user doesn't sign in to the Company Portal to complete registration, they'll be redirected to the Company Portal app each time they try to open a managed app with conditional access protection. + If the user doesn't sign in to the Company Portal to complete registration, they'll be redirected to the Company Portal app each time they try to open a managed app with Conditional Access protection. Devices running macOS 10.15 and later can use this method. Older macOS devices fall back to using the legacy Setup Assistant method. For more information about how to get the Company Portal app to Mac users, see [Add the Company Portal for macOS app](../apps/apps-company-portal-macos.md). @@ -215,8 +218,7 @@ At the end of this procedure, you can assign this profile to Microsoft Entra dev The following table describes the Setup Assistant screens shown during automated device enrollment for Macs. You can show or hide these screens on supported devices during enrollment. For more information about how each Setup Assistant screen affects the user experience, see these Apple resources: - [Apple Platform Deployment guide: Manage Setup Assistant for Apple devices](https://support.apple.com/en-mide/guide/deployment/depdeff4a547/web) -- [Apple Developer documentation: ShipKeys](https://developer.apple.com/documentation/devicemanagement/skipkeys) -- +- [Apple Developer documentation: ShipKeys](https://developer.apple.com/documentation/devicemanagement/skipkeys) | Setup Assistant screen | What happens when visible | |------------------------------------------|------------------------------------------| @@ -281,7 +283,7 @@ Optionally, you can select a default enrollment profile. The default profile is Distribute prepared devices throughout your organization. -* New or wiped Macs: New or wiped Macs configured in Apple Business Manager or Apple School Manager automatically enroll in Microsoft Intune during Setup Assistant when someone turns on the device. If you assigned the device to a macOS enrollment profile with user affinity, the device user must sign in to the Company Portal after Setup Assistant is done to finish Microsoft Entra registration and conditional access requirements. +* New or wiped Macs: New or wiped Macs configured in Apple Business Manager or Apple School Manager automatically enroll in Microsoft Intune during Setup Assistant when someone turns on the device. If you assigned the device to a macOS enrollment profile with user affinity, the device user must sign in to the Company Portal after Setup Assistant is done to finish Microsoft Entra registration and Conditional Access requirements. * Existing Macs: You can enroll devices that already went through Setup Assistant. Complete these steps to enroll corporate-owned Macs running macOS 10.13 and later. @@ -298,7 +300,7 @@ Distribute prepared devices throughout your organization. 1. Follow the onscreen prompts to download the Microsoft Intune management profile, certificates, and policies. >[!TIP] > You can confirm which profiles are on the device anytime by returning to **System Preferences** > **Profiles**. - 1. If you assigned the device to a macOS enrollment profile with user affinity, sign in to the Company Portal app to complete Microsoft Entra registration and conditional access requirements, and finish enrollment. + 1. If you assigned the device to a macOS enrollment profile with user affinity, sign in to the Company Portal app to complete Microsoft Entra registration and Conditional Access requirements, and finish enrollment. ## Renew enrollment program token Complete these steps to renew a server token that's about to expire. This procedure ensures that the associated enrollment program token in Intune remains active. diff --git a/memdocs/intune/enrollment/device-enrollment-shared-ipad.md b/memdocs/intune/enrollment/device-enrollment-shared-ipad.md index dc5bb6b5570..5d826bea087 100644 --- a/memdocs/intune/enrollment/device-enrollment-shared-ipad.md +++ b/memdocs/intune/enrollment/device-enrollment-shared-ipad.md @@ -159,7 +159,7 @@ The following limitations exist in Intune for Shared iPad: - Company Portal and available apps not supported: Intune Company Portal app and the Intune Company Portal website are not supported with Shared iPad. - App assignment requirements: You must assign apps as _required_ to device groups. *Available* apps are not supported with Shared iPad. - Passcode complexity can't be managed with Shared iPad: Shared iPad passcodes must have eight alphanumeric characters, and can't be changed in Apple Business Manager. The passcode complexity and length settings available in Intune device configuration profiles don't apply to Shared iPad. An MDM administrator can set the grace period, which specifies the number of minutes a user has to unlock the iPad without a passcode. -- Some policies not supported: These Intune policies are not supported with Shared iPad: app-based and device-based conditional access policies, app protection policies, and compliance policies. +- Some policies not supported: These Intune policies are not supported with Shared iPad: app-based and device-based Conditional Access policies, app protection policies, and compliance policies. - Email profile not supported: Email profiles aren't supported with Shared iPad. An error occurs when you assign an email profile to a Shared iPad device. - User-assigned policies don't appear in reports: Intune doesn't report device status or user status in reports for Shared iPad apps and profiles assigned to Microsoft Entra user groups. - Microsoft Entra federation requirement not enforced: The Microsoft Entra federation requirement isn't enforced. If the Managed Apple ID matches the Microsoft Entra UPN, and the Microsoft Entra user is assigned a user applicable device configuration profile, the profile will apply to the user when they sign in to a shared iPad using their Managed Apple ID. diff --git a/memdocs/intune/enrollment/device-group-mapping.md b/memdocs/intune/enrollment/device-group-mapping.md index 9ee17c6760f..c7e5a40e9c9 100644 --- a/memdocs/intune/enrollment/device-group-mapping.md +++ b/memdocs/intune/enrollment/device-group-mapping.md @@ -8,7 +8,7 @@ keywords: author: Lenewsad ms.author: lanewsad manager: dougeby -ms.date: 01/22/2024 +ms.date: 01/27/2025 ms.topic: how-to ms.service: microsoft-intune ms.subservice: enrollment @@ -54,13 +54,14 @@ Decide if it's necessary to show the device category selection prompt to end use ## Step 1: Create device category in Intune 1. Sign in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431). -2. Go to **Devices** > **Device categories**. -3. Choose **Create device category** to add a new category. -4. Enter the name of the new category, such as `HR` and an optional description. -5. Select **Next**. -6. Optionally, assign a scope tag, like `US-NC IT Team` or `JohnGlenn_ITDepartment`, to limit management of the category to specific IT groups. For more information about scope tags, see [Use RBAC and scope tags for distributed IT](../fundamentals/scope-tags.md). -7. Select **Next**. -8. Select **Create**. The new category is added to your **Device categories** list. +1. Go to **Devices**. +1. Expand **Manage devices**, and then select **Device categories**. +1. Choose **Create device category** to add a new category. +1. Enter the name of the new category, such as `HR` and an optional description. +1. Select **Next**. +1. Optionally, assign a scope tag, like `US-NC IT Team` or `JohnGlenn_ITDepartment`, to limit management of the category to specific IT groups. For more information about scope tags, see [Use RBAC and scope tags for distributed IT](../fundamentals/scope-tags.md). +1. Select **Next**. +1. Select **Create**. The new category is added to your **Device categories** list. You'll use the device category name when you create Microsoft Entra security groups in the next step. diff --git a/memdocs/intune/enrollment/device-staging-overview.md b/memdocs/intune/enrollment/device-staging-overview.md index 92eae35b8e7..e85d7fb5ecc 100644 --- a/memdocs/intune/enrollment/device-staging-overview.md +++ b/memdocs/intune/enrollment/device-staging-overview.md @@ -8,7 +8,7 @@ keywords: author: Lenewsad ms.author: lanewsad manager: dougeby -ms.date: 05/16/2024 +ms.date: 11/14/2024 ms.topic: how-to ms.service: microsoft-intune ms.subservice: enrollment @@ -66,19 +66,22 @@ In the first stage, an Intune admin completes the following steps: 1. Set the token's expiration date. -1. Optionally, in the admin center, create a dynamic device group or an assignment filter so you can assign policies and apps in the user stage. The dynamic device group feature isn't available to configure in the remaining stages. +1. Optionally, in the admin center, create a dynamic device group or an assignment filter. Then assign policies and apps, which reach the device after stage 3. In the second stage, an Intune admin or third-party vendor completes the following steps: 1. Unbox, assemble, and power on the new device you're enrolling. -1. With the device, scan the staging token's QR code or enter the token string. +2. With the device, scan the staging token's QR code or enter the token string. -1. Complete the enrollment steps and setup wizard. When you get to the sign-in screen, stop. Don't sign in. +> [!NOTE] +> Manual token entry isn't supported on Android Enterprise corporate-owned work profile (also known as COPE) devices running Android 11 and later. + +3. Complete the enrollment steps and setup wizard. At the end of setup, you are on the device's home screen. -1. Turn off the device and distribute it to the end user. +4. Turn off the device and distribute it to the end user. -During stage 2, the Intune assignment filter is the only available option for targeting policies and apps. After the final stage ends, you can use other supported targeting options. Example: User security groups and dynamic groups +During stage 2, the Intune assignment filter on the all devices group is the only available option for targeting policies and apps. After the final stage ends, you can use other supported targeting options. Example: User security groups and dynamic groups In the third, and final stage, an end user completes the following steps: @@ -123,7 +126,6 @@ In the second, and final stage, an end user completes the following steps: For detailed steps, see: - [Set up enrollment for Android Enterprise fully managed devices](android-fully-managed-enroll.md) -- - [Set up enrollment for corporate-owned work profile devices](android-corporate-owned-work-profile-enroll.md) ## Replace, remove, or export token diff --git a/memdocs/intune/enrollment/enrollment-notifications.md b/memdocs/intune/enrollment/enrollment-notifications.md index 5f18925f9f5..8e0f7b2af0c 100644 --- a/memdocs/intune/enrollment/enrollment-notifications.md +++ b/memdocs/intune/enrollment/enrollment-notifications.md @@ -58,7 +58,7 @@ The following example image shows what an enrollment notification looks like to ## Prerequisites Prior to creating enrollment notifications, you must [configure Microsoft Intune branding and customization settings](../apps/company-portal-app.md) under **Tenant administration** > **Customization**. -Enrollment notifications work with user-driven enrollment methods. They aren't supported in userless enrollment scenarios. +Enrollment notifications work with user-driven enrollment methods. They aren't supported in userless enrollment scenarios, or when provisioning Windows 365 Cloud PCs. ## You should know Email notifications appear in the user's inbox. Push notifications appear in the Intune Company Portal apps for iOS/iPadOS, macOS, and Android. Enrollment push notifications aren't supported in the Company Portal for Windows, so they'll never appear there. diff --git a/memdocs/intune/enrollment/enrollment-restrictions-set.md b/memdocs/intune/enrollment/enrollment-restrictions-set.md index 93079dc5b66..1361b00c329 100644 --- a/memdocs/intune/enrollment/enrollment-restrictions-set.md +++ b/memdocs/intune/enrollment/enrollment-restrictions-set.md @@ -8,7 +8,7 @@ keywords: author: Lenewsad ms.author: lanewsad manager: dougeby -ms.date: 04/02/2024 +ms.date: 12/12/2024 ms.topic: how-to ms.service: microsoft-intune ms.subservice: enrollment @@ -79,7 +79,12 @@ Block devices running on a specific device platform. You can apply this restrict In groups where both Android platforms are allowed, devices that support work profile will enroll with a work profile. Devices that don't support work profile will enroll on the Android device administrator platform. Neither work profile nor device administrator enrollment will work until you complete all prerequisites for Android enrollment. -This restriction is in the admin center under **Enrollment device platform restrictions**. + +This restriction is in the admin center under **Devices** > **Device onboarding** > **Enrollment** > **Device platform restriction**. + +> [!NOTE] +> Device platform enrollment restrictions use assignment filters. The update between Microsoft Entra and Intune that processes user, group, and filter assignments typically happens within 15 minutes. It's not instant. This amount of time can affect enrollment assignments. You should wait and enroll devices several minutes after adding the enrolling users to a group, not immediately after. + ### OS version This restriction enforces your maximum and minimum OS version requirements. This type of restriction works with the following operating systems: @@ -91,10 +96,10 @@ This restriction enforces your maximum and minimum OS version requirements. This \* Version restrictions are supported on these operating systems for devices enrolled via Intune Company Portal only. -This restriction is in the admin center under **Enrollment device platform restrictions**. +This restriction is in the admin center under **Devices** > **Device onboarding** > **Enrollment** > **Device platform restriction**. ### Device manufacturer -This restriction blocks devices made by specific manufacturers, and is applicable to Android devices only. It is in the admin center under **Enrollment device platform restrictions**. +This restriction blocks devices made by specific manufacturers, and is applicable to Android devices only. It is in the admin center under **Devices** > **Device onboarding** > **Enrollment** > **Device platform restriction**. ### Personally owned devices This restriction helps prevent device users from accidentally enrolling their personal devices, and applies to devices running: @@ -104,7 +109,7 @@ This restriction helps prevent device users from accidentally enrolling their pe * macOS * Windows 10/11 -This restriction is in the admin center under **Enrollment device platform restrictions**. +This restriction is in the admin center under **Devices** > **Device onboarding** > **Enrollment** > **Device platform restriction**. #### Blocking personal Android devices By default, until you manually make changes in the admin center, your Android Enterprise work profile device settings and Android device administrator device settings are the same. @@ -156,7 +161,8 @@ Intune also blocks personal devices using these enrollment methods: * Enrollment restrictions are applied to enrollments that are user-driven. Intune enforces the default policy in enrollment scenarios that aren't user-driven, such as: * Windows Autopilot self-deploying mode and Autopilot for pre-provisioned deployment - * Bulk enrollment via Windows Configuration Designer + * Bulk enrollment via Windows Configuration Designer + * Co-managed enrollments * Userless Apple automated device enrollment (without user-device affinity) * Azure Virtual Desktop * Windows 365 diff --git a/memdocs/intune/enrollment/enrollment-time-grouping.md b/memdocs/intune/enrollment/enrollment-time-grouping.md index e6361212dc7..c2eb05f8235 100644 --- a/memdocs/intune/enrollment/enrollment-time-grouping.md +++ b/memdocs/intune/enrollment/enrollment-time-grouping.md @@ -8,7 +8,7 @@ keywords: author: Lenewsad ms.author: lanewsad manager: dougeby -ms.date: 06/01/2024 +ms.date: 01/27/2025 ms.topic: how-to ms.service: microsoft-intune ms.subservice: enrollment @@ -65,10 +65,11 @@ The enrollment time grouping feature only applies to new device enrollments. It You can add one static Microsoft Entra security group per enrollment profile. As an Intune admin, you can only add Microsoft Entra groups that are authorized in the scope group for your Intune role. Make sure scope groups and group tags are assigned to the appropriate roles so that admins can see the security group during profile creation. -1. In the Microsoft Intune admin center, go to **Devices** >**Enrollment**. +1. In the Microsoft Intune admin center, go to **Devices**. +1. Expand **Device onboarding**, and then select **Enrollment**. 1. Select the type of enrollment you're configuring and create a profile. For more information about how to set up the profile, see [Create Windows Autopilot device preparation policy](/autopilot/device-preparation/tutorial/user-driven/entra-join-autopilot-policy). -After you save the profile, you can return to it at any time to edit group settings. Updates you make to the group settings don't apply to devices already enrolled with the profile. If you remove a device from the group, Microsoft Intune reevaluates policy configurations and forces the device to check in to obtain new configurations. +After you save the profile, you can return to it at any time to edit group settings. Updates you make to the group settings don't apply to devices already enrolled with the profile. If you remove a device from the group, Microsoft Intune reevaluates policy configurations and forces the device to check in to obtain new configurations. ## Step 3: Enroll devices diff --git a/memdocs/intune/enrollment/ios-device-enrollment.md b/memdocs/intune/enrollment/ios-device-enrollment.md index dbdaf5aa26b..b4a5872ed0b 100644 --- a/memdocs/intune/enrollment/ios-device-enrollment.md +++ b/memdocs/intune/enrollment/ios-device-enrollment.md @@ -8,7 +8,7 @@ keywords: author: Lenewsad ms.author: lanewsad manager: dougeby -ms.date: 07/16/2024 +ms.date: 01/14/2025 ms.topic: conceptual ms.service: microsoft-intune ms.subservice: enrollment @@ -56,7 +56,7 @@ The following table provides details about app and web-based enrollment. | Device reset required| ❌|❌| | Enrollment initiated by device user | ✔️ |✔️| | Supervision |❌|❌| -| Just-in-time registration | ❌ |✔️ | +| Just-in-time registration | ✔️ |✔️ | | Required apps | Intune Company Portal app for iOS
    Microsoft Authenticator | Microsoft Authenticator | | Enrollment location | App-based enrollment takes place in the Company Portal app, Safari, and device settings app. |Web-based enrollment takes place in Safari and the device settings app.| @@ -85,12 +85,14 @@ For more information about how employees and students can access these actions i ## Certificates This enrollment type supports the Automated Certificate Management Environment (ACME) protocol. When new devices enroll, the management profile from Intune receives an ACME certificate. The ACME protocol provides better protection than the SCEP protocol against unauthorized certificate issuance through robust validation mechanisms and automated processes, which helps reduce errors in certificate management. -Devices that are already enrolled do not get an ACME certificate on unless they re-enroll into Microsoft Intune. ACME is supported on devices running: +Devices that are already enrolled do not get an ACME certificate unless they re-enroll into Microsoft Intune. Acme is supported on devices running: - iOS 16.0 or later - iPadOS 16.1 or later +This capability is also supported in [GCC High tenants](../fundamentals/intune-govt-service-description.md). + ## Known issues and limitations Intune enrollment with Apple device enrollment has the following known issues and limitations. diff --git a/memdocs/intune/enrollment/macos-enroll.md b/memdocs/intune/enrollment/macos-enroll.md index a363bde7593..ae6f85e17a0 100644 --- a/memdocs/intune/enrollment/macos-enroll.md +++ b/memdocs/intune/enrollment/macos-enroll.md @@ -90,7 +90,7 @@ You can monitor the escrow status for any enrolled Mac in the admin center. The 2. Go to **Devices** > **By platform** > **macOS**. 3. Select a device from your list of macOS devices. 4. Select **Hardware**. -5. In your hardware details, scroll down to **Conditional access** > **Bootstrap token escrowed**. +5. In your hardware details, scroll down to **Conditional Access** > **Bootstrap token escrowed**. ### Manage kernel extensions and software updates diff --git a/memdocs/intune/enrollment/multi-factor-authentication.md b/memdocs/intune/enrollment/multi-factor-authentication.md index cc9bad1e8f0..44515169671 100644 --- a/memdocs/intune/enrollment/multi-factor-authentication.md +++ b/memdocs/intune/enrollment/multi-factor-authentication.md @@ -8,7 +8,7 @@ keywords: author: Lenewsad ms.author: lanewsad manager: dougeby -ms.date: 01/23/2024 +ms.date: 12/11/2024 ms.topic: how-to ms.service: microsoft-intune ms.subservice: enrollment @@ -34,41 +34,45 @@ ms.collection: *Applies to*: * Android * iOS/iPadOS - * macOS - * Windows 8.1 + * macOS * Windows 10 * Windows 11 -You can use Intune together with Microsoft Entra Conditional Access policies to require multifactor authentication (MFA) during device enrollment. If you require MFA, employees and students wanting to enroll devices must first authenticate with a second device and two forms of credentials. MFA requires them to authenticate using two or more of these verification methods: +You can use Intune together with Microsoft Entra Conditional Access policies to require multifactor authentication (MFA) during device enrollment. If you require MFA, employees and students wanting to enroll devices must first authenticate with a second device and two forms of credentials. MFA requires them to authenticate using two or more of these verification methods: - Something they know, such as a password or PIN. - Something they have that can't be duplicated, such as a trusted device or phone. -- Something they are, such as a fingerprint. +- Something they are, such as a fingerprint. + +If a device isn't compliant, the device user is prompted to make the device compliant before enrolling in Microsoft Intune. ## Prerequisites To implement this policy, you must assign Microsoft Entra ID P1 or later to users. ## Configure Intune to require multifactor authentication at device enrollment -Complete these steps to enable multi-factor authentication during Microsoft Intune enrollment. +Complete these steps to enable multifactor authentication during Microsoft Intune enrollment. > [!IMPORTANT] > Don't configure **Device based access rules** for Microsoft Intune enrollment. 1. Sign in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431). -1. Go to **Devices** > **Conditional Access**. This area is the same as the Conditional Access area available in the Microsoft Entra admin center. For more information about the available settings, see [Building a Conditional Access policy](/entra/identity/conditional-access/concept-conditional-access-policies). +1. Go to **Devices**. +1. Expand **Manage devices**, and then select **Conditional Access**. This Conditional Access area is the same as the Conditional Access area available in the Microsoft Entra admin center. For more information about the available settings, see [Building a Conditional Access policy](/entra/identity/conditional-access/concept-conditional-access-policies). 1. Choose **Create new policy**. 1. Name your policy. 1. Select the **Users** category. 1. Under the **Include** tab, choose **Select users or groups**. 2. Additional options appear. Select **Users and groups**. A list of users and groups opens. - 3. Add the users or groups you're assigning the policy to, and then choose **Select**. + 3. Browse and select the Microsoft Entra users or groups you want to include in the policy. Then choose **Select**. 4. To exclude users or groups from the policy, select the **Exclude** tab and add those users or groups like you did in the previous step. -1. Select the next category, **Target resources**. - 1. Select the **Include** tab. - 2. Choose **Select apps** > **Select**. - 3. Choose **Microsoft Intune Enrollment** > **Select** to add the app. Use the search bar in the app picker to find the app. +1. Select the next category, **Target resources**. In this step, you select the resources that the policy applies to. In this case, we want the policy to apply to events where users or groups try to access the Microsoft Intune Enrollment app. + 1. Under **Select what this policy applies to**, choose **Resources (formerly cloud apps)**. + 2. Select the **Include** tab. + 3. Choose **Select resources**. Additional options appear. + 4. Under **Select**, choose **None**. A list of resources open. + 5. Search for **Microsoft Intune Enrollment**. Then choose **Select** to add the app. For Apple automated device enrollments using Setup Assistant with modern authentication, you have two options to choose from. The following table describes the difference between the *Microsoft Intune* option and *Microsoft Intune Enrollment* option. @@ -80,17 +84,20 @@ Complete these steps to enable multi-factor authentication during Microsoft Intu > [!NOTE] > The Microsoft Intune Enrollment cloud app isn't created automatically for new tenants. To add the app for new tenants, a Microsoft Entra administrator must create a service principal object, with app ID d4ebce55-015a-49b5-a083-c84d1797ae8c, in PowerShell or Microsoft Graph. -1. Select the **Grant** category. - 1. Select **Require multifactor authentication** and **Require device to be marked as compliant**. +1. Select the **Grant** category. In this step, you grant or block access to the Microsoft Intune Enrollment app. + 1. Choose **Grant access**. + 1. Select **Require multifactor authentication**. + 1. Select **Require device to be marked as compliant**. 1. Under **For multiple controls**, select **Require all the selected controls**. 1. Choose **Select**. -1. Select the **Session** category. - 1. Select **Sign-in frequency** and choose **Every time**. +1. Select the **Session** category. In this step, you can make use of session controls to enable limited experiences within the Microsoft Intune Enrollment app. + 1. Select **Sign-in frequency**. Additional options appear. + 1. Choose **Every time**. 1. Choose **Select**. 1. For **Enable policy**, select **On**. 1. Select **Create** to save and create your policy. -After you apply and deploy this policy, users will see a one-time MFA prompt when they enroll their device. +After you apply and deploy this policy, device users enrolling their devices see a one-time MFA prompt. > [!NOTE] > A second device or a Temporary Access Pass is required to complete the MFA challenge for these types of corporate-owned devices: diff --git a/memdocs/intune/enrollment/terms-and-conditions-create.md b/memdocs/intune/enrollment/terms-and-conditions-create.md index de88197377b..505cb3ae88f 100644 --- a/memdocs/intune/enrollment/terms-and-conditions-create.md +++ b/memdocs/intune/enrollment/terms-and-conditions-create.md @@ -7,7 +7,7 @@ keywords: author: Lenewsad ms.author: lanewsad manager: dougeby -ms.date: 01/22/2024 +ms.date: 01/27/2025 ms.topic: how-to ms.service: microsoft-intune ms.subservice: enrollment @@ -37,7 +37,8 @@ This article describes how to get started with terms and conditions in Intune. Complete these steps to create an Intune terms and conditions policy. 1. Sign in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431). -1. Go to **Tenant administration** > **Terms and conditions**. +1. Go to **Tenant administration**. +1. Expand **End user experiences**, and then select **Terms and conditions**. 1. Choose **Create**. 1. On the **Basics** page, enter the following information: @@ -49,13 +50,13 @@ Complete these steps to create an Intune terms and conditions policy. - **Title**: The display name for your terms. Users see the title in the Company Portal app. - **Terms and conditions**: The terms and conditions that users see and must either accept or reject. - - **Summary of Terms**: Enter a brief, high-level explanation of what the user is agreeing to. This text is visible to device users. + - **Summary of terms**: Enter a brief, high-level explanation of what the user is agreeing to. This text is visible to device users. Example message: *By enrolling your device, you're agreeing to the terms of use set out by Contoso. Read the terms carefully before proceeding.* 1. Select **Next**. -1. On the **Select scope tags**, select a scope tag from the list to add it to the terms and conditions, or select the default scope tag. Then select **Next**. +1. Choose **Select scope tags**, and then select a scope tag from the list to add it to the terms and conditions, or select the default scope tag. Then select **Next**. 1. On the **Assignments** page, choose who you want to assign the terms to. Your options: - **Add all users**: Choose this option to assign these terms and conditions to all device users. @@ -86,7 +87,7 @@ An acceptance report provides the details of an individual's agreement to your t To view and export acceptance reports: -1. Go to **Tenant administration** > **Terms and conditions**. +1. Go to **Terms and conditions**. 2. Select your terms from the table. 3. Select **Acceptance Reporting** to view available reports. 4. Select **Export** to save the reports to your device. @@ -109,9 +110,9 @@ Microsoft Intune provides a version control setting so that you can track versio To edit terms and conditions: -1. Select **Tenant administration** > **Terms and conditions**. +1. Go to **Terms and conditions**. 2. From the table, choose the terms and conditions you want to edit. -3. Select **Properties** and then next to **Terms**, select **Edit.** +3. Select **Properties**, and then next to **Terms**, select **Edit.** 4. Adjust the existing content as needed. 5. If you edit the meaning of the terms at all, select the checkbox next to **Require users to re-accept, and increment the version number to *next version*.** In place of *next step*, you'll see the actual version number. 6. Select **Review + save**. diff --git a/memdocs/intune/enrollment/web-based-device-enrollment-ios.md b/memdocs/intune/enrollment/web-based-device-enrollment-ios.md index 442dedd32ed..3cc006d1c52 100644 --- a/memdocs/intune/enrollment/web-based-device-enrollment-ios.md +++ b/memdocs/intune/enrollment/web-based-device-enrollment-ios.md @@ -79,7 +79,7 @@ Return to **Enrollment types** to see a list of your enrollment profiles. Intune ## Step 3: Prepare employees for enrollment When an employee attempts to sign into a work app on their personal device, the app alerts them to the enrollment requirement and redirects them to the Company Portal website for enrollment. -Alternatively, you can provide employees and students with a URL that opens the Company Portal website. If you aren't utilizing conditional access, it's important to share the enrollment link with device users so that they know how to initiate enrollment. The link to share is: +Alternatively, you can provide employees and students with a URL that opens the Company Portal website. If you aren't utilizing Conditional Access, it's important to share the enrollment link with device users so that they know how to initiate enrollment. The link to share is: `https://portal.manage.microsoft.com/enrollment/webenrollment/ios` diff --git a/memdocs/intune/enrollment/windows-bulk-enroll.md b/memdocs/intune/enrollment/windows-bulk-enroll.md index ae7609b6284..77e92c24c04 100644 --- a/memdocs/intune/enrollment/windows-bulk-enroll.md +++ b/memdocs/intune/enrollment/windows-bulk-enroll.md @@ -129,6 +129,6 @@ You can check for success/failure of the settings in your package in the **Provi When not using an open network, you must use [device-level certificates](../protect/certificates-configure.md) to initiate connections. Bulk enrolled devices are unable to use to user-targeted certificates for network access. -### Conditional access +### Conditional Access -Conditional access is available for devices enrolled via bulk enrollment running Windows 11 or Windows 10, version 1803 and later. +Conditional Access is available for devices enrolled via bulk enrollment running Windows 11 or Windows 10, version 1803 and later. diff --git a/memdocs/intune/enrollment/windows-enrollment-create-cname.md b/memdocs/intune/enrollment/windows-enrollment-create-cname.md index 4916dce2fd6..b036dec1f51 100644 --- a/memdocs/intune/enrollment/windows-enrollment-create-cname.md +++ b/memdocs/intune/enrollment/windows-enrollment-create-cname.md @@ -87,7 +87,7 @@ Alternate redirection methods aren't supported with Intune. For example, you can ## Registration CNAME -Microsoft Entra ID uses a different CNAME during device registration for iOS/iPadOS, Android, and Windows devices. Intune conditional access requires devices to be registered to Microsoft Entra ID (also called *workplace joined*). If you plan to use conditional access, you should configure the *EnterpriseRegistration* CNAME for each company name you have. +Microsoft Entra ID uses a different CNAME during device registration for iOS/iPadOS, Android, and Windows devices. Intune Conditional Access requires devices to be registered to Microsoft Entra ID (also called *workplace joined*). If you plan to use Conditional Access, you should configure the *EnterpriseRegistration* CNAME for each company name you have. | Type | Host name | Points to | TTL | | --- | --- | --- | --- | diff --git a/memdocs/intune/fundamentals/android-os-project-supported-devices.md b/memdocs/intune/fundamentals/android-os-project-supported-devices.md index 0361383d0a3..39da1ac1d9d 100644 --- a/memdocs/intune/fundamentals/android-os-project-supported-devices.md +++ b/memdocs/intune/fundamentals/android-os-project-supported-devices.md @@ -57,4 +57,5 @@ Before setting up Microsoft Intune for Android Open Source Project devices, ensu | Lenovo| ThinkReality VRX | VRX_user_S766001_2310192349_kona | AR/VR Headset | | | DigiLens Inc.| DigiLens ARGO | DigiOS 2068 (B1.0001.2068) | AR/VR Headset | | | Vuzix | M400 | M-Series Version 3.0.2 | AR/VR Headset | | -| Vuzix | M4000 | M-Series Version 3.0.2 | AR/VR Headset | | \ No newline at end of file +| Vuzix | M4000 | M-Series Version 3.0.2 | AR/VR Headset | | +| Meta | Quest 3s | v71 | AR/VR Headset | | diff --git a/memdocs/intune/fundamentals/azure-virtual-desktop-multi-session.md b/memdocs/intune/fundamentals/azure-virtual-desktop-multi-session.md index 9c207d54018..a7381ace291 100644 --- a/memdocs/intune/fundamentals/azure-virtual-desktop-multi-session.md +++ b/memdocs/intune/fundamentals/azure-virtual-desktop-multi-session.md @@ -45,7 +45,7 @@ Windows 10 or Windows 11 Enterprise multi-session is a new Remote Desktop Sessio You can manage **Windows 10** and **Windows 11 Enterprise multi-session** VMs created in Azure Government Cloud in US Government Community (GCC), GCC High, and DoD. > [!IMPORTANT] -> Microsoft Intune support for Azure Virtual Desktop multi-session is not currently available for Citrix DaaS and VMware Horizon Cloud. +> Microsoft Intune support for Azure Virtual Desktop multi-session is not currently available for Citrix DaaS and VMware Horizon Cloud. Because Intune cannot offer support for Citrix DaaS, review the Citrix documentation, and be aware of Citrix support options for multi-session support. All questions, concerns or help should be directed to Citrix for multi-session support. See [Citrix support](https://docs.citrix.com/en-us/citrix-daas/install-configure/machine-identities/microsoft-intune ). ## Overview @@ -139,7 +139,7 @@ Windows 10 or Windows 11 Administrative Templates are supported for Windows 10 o To list supported Administrative Templates, you'll need to use the filter in Settings catalog. -## Compliance and Conditional access +## Compliance and Conditional Access You can secure your Windows 10 or Windows 11 Enterprise multi-session VMs by configuring compliance policies and Conditional Access policies in the Microsoft Intune admin center. The following compliance policies are supported on Windows 10 or Windows 11 Enterprise multi-session VMs: @@ -223,7 +223,10 @@ The following Windows 10 or Windows 11 desktop device remote actions aren't supp ## Retirement -Deleting VMs from Azure will leave orphaned device records in the Microsoft Intune admin center. They'll be automatically cleaned up according to the cleanup rules configured for the tenant. +Deleting VMs from Azure will leave orphaned device records in the Microsoft Intune admin center. AVD machines are deleted automatically after 30 days and removed permanently after 60 days. +For more information, see: +- [Using Intune device cleanup rules](https://techcommunity.microsoft.com/t5/device-management-in-microsoft/using-intune-device-cleanup-rules-updated-version/ba-p/3760854). +- [Automatically delete devices with cleanup rules](../remote-actions/devices-wipe.md#automatically-delete-devices-with-cleanup-rules) ## Security baselines diff --git a/memdocs/intune/fundamentals/azure-virtual-desktop.md b/memdocs/intune/fundamentals/azure-virtual-desktop.md index 052cb73e702..4a453a2f2c0 100644 --- a/memdocs/intune/fundamentals/azure-virtual-desktop.md +++ b/memdocs/intune/fundamentals/azure-virtual-desktop.md @@ -51,7 +51,7 @@ For more information on Azure Virtual Desktop licensing requirements, see [What For information about working with multi-session remote desktops, see [Windows 10 or Windows 11 Enterprise multi-session remote desktops](azure-virtual-desktop-multi-session.md). -Intune treats Azure Virtual Desktop personal VMs the same as Windows 10 or Windows 11 Enterprise physical desktops. This treatment lets you use some of your existing configurations and secure the VMs with compliance policy and conditional access. Intune management doesn't depend on or interfere with Azure Virtual Desktop management of the same virtual machine. +Intune treats Azure Virtual Desktop personal VMs the same as Windows 10 or Windows 11 Enterprise physical desktops. This treatment lets you use some of your existing configurations and secure the VMs with compliance policy and Conditional Access. Intune management doesn't depend on or interfere with Azure Virtual Desktop management of the same virtual machine. ## Limitations diff --git a/memdocs/intune/fundamentals/china-endpoints.md b/memdocs/intune/fundamentals/china-endpoints.md index 159daec34e6..a3fedfc450b 100644 --- a/memdocs/intune/fundamentals/china-endpoints.md +++ b/memdocs/intune/fundamentals/china-endpoints.md @@ -8,7 +8,7 @@ keywords: author: Smritib17 ms.author: smbhardwaj manager: dougeby -ms.date: 03/24/2023 +ms.date: 12/19/2024 ms.topic: reference ms.service: microsoft-intune ms.subservice: fundamentals @@ -49,10 +49,10 @@ The following tables list the ports and services that the Intune client accesses |**Endpoint**|**IP address**| |---------------------|-----------| -|*.manage.microsoftonline.cn | 40.73.38.143
    139.217.97.81
    52.130.80.24
    40.73.41.162
    40.73.58.153
    139.217.95.85 | - +|*.manage.microsoftonline.cn | 40.73.38.143
    139.217.97.81
    52.130.80.24
    40.73.41.162
    40.73.58.153
    139.217.95.85
    143.64.196.128/25
    40.162.2.128/25
    139.219.250.128/25
    163.228.221.128/25
    | ## Intune customer designated endpoints in China + - Azure portal: https:\//portal.azure.cn/ - Microsoft 365: https:\//portal.partner.microsoftonline.cn/ - Intune Company Portal: https:\//portal.manage.microsoftonline.cn/ @@ -69,6 +69,7 @@ If you're using Intune to deploy PowerShell scripts or Win32 apps, you'll also n ## Partner service endpoints Intune operated by 21Vianet depends on the following partner service endpoints: + - Azure AD Sync service: https:\//syncservice.partner.microsoftonline.cn/DirectoryService.svc - Evo STS: https:\//login.chinacloudapi.cn/ - Azure AD Graph: https:\//graph.chinacloudapi.us @@ -80,5 +81,6 @@ Intune operated by 21Vianet depends on the following partner service endpoints: [!INCLUDE [Intune notices](../includes/apple-device-network-information.md)] ## Next steps + [Learn more about Intune operated by 21Vianet in China](china.md) diff --git a/memdocs/intune/fundamentals/china.md b/memdocs/intune/fundamentals/china.md index d9e6afa6738..b8b3167d0a3 100644 --- a/memdocs/intune/fundamentals/china.md +++ b/memdocs/intune/fundamentals/china.md @@ -8,7 +8,7 @@ keywords: author: Smritib17 ms.author: smbhardwaj manager: dougeby -ms.date: 08/21/2024 +ms.date: 11/25/2024 ms.topic: conceptual ms.service: microsoft-intune ms.subservice: fundamentals @@ -35,7 +35,7 @@ ms.collection: Intune operated by 21Vianet is designed to meet the needs for secure, reliable, and scalable cloud services in China. Intune as a service is built on top of Microsoft Azure. Microsoft Azure operated by 21Vianet is a physically separated instance of cloud services located in China. It's independently operated and transacted by 21Vianet. This service is powered by technology that Microsoft has licensed to 21Vianet. -Microsoft doesn't operate the service itself. 21Vianet operates, provides, and manages delivery of the service. 21Vianet is an Internet data center services provider in China. It provides hosting, managed network services, and cloud computing infrastructure services. By licensing Microsoft technologies, 21Vianet operates local datacenters to provide you the ability to use Intune service while keeping your data within China. 21Vianet also provides your subscription, billing, and support services. +Microsoft doesn't operate the service itself. 21Vianet operates, provides, and manages delivery of the service. 21Vianet is an Internet data center services provider in China. It provides hosting, managed network services, and cloud computing infrastructure services. By licensing Microsoft technologies, 21Vianet operates local datacenters to provide you with the ability to use Intune service while keeping your data within China. 21Vianet also provides your subscription, billing, and support services. [!INCLUDE [GDPR-related guidance](../includes/gdpr-dsr-and-stp-note.md)] @@ -46,10 +46,10 @@ Because the China services are operated by a partner from inside China, there ar - Intune operated by 21Vianet only supports standalone deployments. Customers can use co-management to attach their existing Configuration Manager deployment to the Microsoft Intune cloud. - Migrations from public clouds to sovereign clouds aren't supported. Customers interested in moving to Intune operated by 21Vianet must migrate manually. - The tenant attach feature (syncing devices to Intune without enrollment to support cloud console scenarios) isn't currently supported. -- Derived Credentials are not supported with Intune operated by 21Vianet. +- Derived Credentials aren't supported with Intune operated by 21Vianet. - Management of Windows 10 is supported by using the modern MDM channel. - Intune operated by 21Vianet doesn't support on-premises Exchange Connector. -- Windows Autopilot and Business Store features aren't currently available. +- Windows Autopilot and Business Store features aren't currently available. As part of the 2409 Intune service release, we announced support for Windows Autopilot Device Preparation policy in Intune operated by 21Vianet in China cloud. For more information, see [(What's new in Windows Autopilot device preparation | Microsoft Learn](/autopilot/device-preparation/whats-new#windows-autopilot-device-preparation-deployment-status-report-available-in-the-monitor-tab-under-enrollment) - Intune operated by 21Vianet supports the Company Portal for Windows app. Use WinGet to download the Company portal package and dependencies and then deploy as a Line-of-Business app via Intune. [Use the WinGet tool to install and manage applications](/windows/package-manager/winget/). - Microsoft Intune Endpoint Analytics and Log Analytics features aren't currently available. - Because Google Mobile Services isn't available in China, customers in Intune operated by 21Vianet can't use features that require Google Mobile Services. These features include: @@ -60,7 +60,7 @@ Because the China services are operated by a partner from inside China, there ar - To follow local regulations and provide improved functionality, the Intune client experience (Company Portal app) may differ in China. - Fencing isn't available. - Mobile Application Management (MAM) availability is conditional on those apps being available in People's Republic of China. -- Mobile Threat Defense (MTD) connectors for Android and iOS/iPadOS devices are supported for the MTD partners that also support the 21Vianet environment. When you sign in to a 21Vianet tenant, you will see the connectors that are available in that environment. +- Mobile Threat Defense (MTD) connectors for Android and iOS/iPadOS devices are supported for the MTD partners that also support the 21Vianet environment. When you sign in to a 21Vianet tenant, you can see the connectors that are available in that environment. - Intune operated by 21Vianet doesn't support Android (AOSP) management for corporate devices. - Intune operated by 21Vianet doesn't support partner device management integration with Jamf for macOS devices. diff --git a/memdocs/intune/fundamentals/compliance-in-intune.md b/memdocs/intune/fundamentals/compliance-in-intune.md new file mode 100644 index 00000000000..692e4b6801c --- /dev/null +++ b/memdocs/intune/fundamentals/compliance-in-intune.md @@ -0,0 +1,101 @@ +--- +title: Compliance in Microsoft Intune +titleSuffix: +description: Learn about compliance, dependencies, and features in Microsoft Intune supporting data protection and regulatory requirements. +keywords: +author: Erikre +ms.author: erikre +manager: dougeby +ms.date: 12/03/2024 +ms.topic: overview +ms.service: microsoft-intune +ms.subservice: fundamentals +ms.localizationpriority: high +ms.collection: + - tier1 + - highpri + - essentials-compliance + +--- + +# Compliance in Microsoft Intune + +Intune supports compliance features to help organizations meet national, regional, and industry-specific regulations. Intune aligns with Microsoft's commitment to data protection, privacy, and compliance by offering tools to help secure and manage data effectively. + +## Shared responsibility model + +Microsoft ensures that Intune complies with various industry standards and regulatory frameworks. However, customers are responsible for implementing their data protection and compliance strategies to align with their specific organizational requirements. + +## Compliance certifications + +Intune is covered under several compliance certifications, and regulatory standards. The following table provides a sample of the key certifications that are covered: + +| Certification or Standard | Description | Applicability | +|---------------------------|-------------|---------------| +| [GDPR](/compliance/regulatory/gdpr) | EU General Data Protection Regulation for data privacy | European Union | +| [ISO 27001](/compliance/regulatory/offering-iso-27001) | International standard for information security management | Global | +| [HIPAA](/compliance/regulatory/offering-hipaa-hitech) | U.S. Health Insurance Portability and Accountability Act | United States | +| [SOC 2 Type 2](/compliance/regulatory/offering-soc-2) | Service Organization Controls for data security | Global | + +> [!NOTE] +> Microsoft Intune helps your organization meet regulatory compliance standards. Intune supports additional certifications, such as [ISO 22301](/compliance/regulatory/offering-iso-22301), [ISO/IEC 27017](/compliance/regulatory/offering-iso-27017), [ISO/IEC 27018](/compliance/regulatory/offering-iso-27018), [ISO/IEC 27701](/compliance/regulatory/offering-iso-27701), [SOC 1 Type 2](/compliance/regulatory/offering-soc-1), [SOC 3](/compliance/regulatory/offering-soc-3), and [WCAG](/compliance/regulatory/offering-wcag-2-1). + +For a complete list, see [Microsoft compliance offerings](/compliance/regulatory/offering-home). + +## Compliance dependencies + +Intune leverages other Microsoft services for compliance, including: + +- [Microsoft Purview](/purview/purview): A suite of data governance and compliance tools. +- [Microsoft Entra ID](/entra/fundamentals/whatis): Identity and access management, formerly known as Azure Active Directory (Azure AD). +- [Microsoft Purview Compliance Manager](/purview/compliance-manager): Tools for managing compliance across your organization. +- [Microsoft Defender for Endpoint](../protect/advanced-threat-protection.md): An enterprise endpoint security platform. + +## Microsoft Intune capabilities for compliance + +Microsoft Intune helps enforce compliance policies and protect organizational data specifically for Intune: + +- **Conditional Access**: Ensures only compliant devices and apps managed by Intune can access sensitive data. See [Conditional Access](/mem/intune/protect/conditional-access). +- **Device Compliance Enforcement**: Enforces device compliance policies to meet organizational security requirements. See [Device Compliance Policies](/mem/intune/protect/device-compliance-get-started). + +For more information about Intune compliance capabilities, visit the [Microsoft Intune documentation](/mem/intune). + +## Data residency and protection + +Intune supports compliance with data residency requirements by supporting Microsoft Cloud's regional and global data storage policies. These policies include: + +- **Data location**: Data is stored in Microsoft-managed data centers. For more information, see [Data storage and processing in Intune](../protect/privacy-data-store-process.md). +- **EU Data Boundary**: Ensures that data belonging to EU customers is stored and processed within the EU. For more information, see [EU Data Boundary](/privacy/eudb/eu-data-boundary-learn) and [Configure Microsoft Tunnel for Intune](../protect/microsoft-tunnel-configure.md). +- **Encryption**: Data is encrypted at rest and in transit. For more information, see [Access requirements policy mapping from Basic Mobility and Security to Intune](../fundamentals/policy-map-access-requirements.md). + +## Compliance features + +Intune includes several compliance features that help organizations meet regulatory requirements, manage data lifecycles, and protect sensitive information. These features are designed to ensure your organization can effectively monitor, classify, and safeguard its data while maintaining compliance with industry standards. + +### Data lifecycle management + +> [!IMPORTANT] +> Microsoft Intune doesn't use any personal data collected as part of providing the service for profiling, advertising, or marketing purposes. + +Intune supports data lifecycle management through retention policies and labels. These features help organizations retain or delete data based on compliance requirements. For more information, see [Privacy and personal data in Intune](../fundamentals/intune-service-servicing-information.md#privacy-and-personal-data-in-intune). + +### Auditing and reporting + +Microsoft Purview (included in the **Microsoft 365 E5** license) supports auditing and reporting for Intune. IT administrators can monitor data usage and ensure adherence to organizational compliance policies. Features include: + +- eDiscovery: Enables organizations to locate data for legal or regulatory needs. +- Data Retention Policies: Helps organizations manage data lifecycles. + +For more information, see the [Protect your sensitive data with Microsoft Purview](/purview/information-protection). + +### Privacy controls + +Intune includes privacy controls to manage data collection, storage, and sharing: + +For details about privacy, see [Privacy and personal data in Intune](../protect/privacy-personal-data.md). + +## Related articles + +- [Microsoft Privacy Statement](https://privacy.microsoft.com/privacystatement) +- [Microsoft Trust Center](https://www.microsoft.com/trust-center) +- [Microsoft Purview compliance portal](https://compliance.microsoft.com/) \ No newline at end of file diff --git a/memdocs/intune/fundamentals/deployment-guide-enroll.md b/memdocs/intune/fundamentals/deployment-guide-enroll.md index ef72e3c7235..23487ca7d84 100644 --- a/memdocs/intune/fundamentals/deployment-guide-enroll.md +++ b/memdocs/intune/fundamentals/deployment-guide-enroll.md @@ -105,7 +105,7 @@ If you're looking for more control, including where the terms appear, consider c For more information, see [Terms and conditions for user access](../enrollment/terms-and-conditions-create.md). ### Require multifactor authentication -Require users to authenticate via multi-factor authentication (MFA) during enrollment. If you require MFA, people wanting to enroll devices must authenticate with a second device and two forms of credentials before they can enroll their device. This is a one-time conditional step, and ensures that the person on the device is who they say they are. You can enable this behavior for all platforms except Linux by using a conditional access policy with an MFA policy. Microsoft Entra ID P1 or P2 is required. +Require users to authenticate via multi-factor authentication (MFA) during enrollment. If you require MFA, people wanting to enroll devices must authenticate with a second device and two forms of credentials before they can enroll their device. This is a one-time conditional step, and ensures that the person on the device is who they say they are. You can enable this behavior for all platforms except Linux by using a Conditional Access policy with an MFA policy. Microsoft Entra ID P1 or P2 is required. For more information, see [Require multifactor authentication for Intune device enrollments](../enrollment/multi-factor-authentication.md). diff --git a/memdocs/intune/fundamentals/deployment-guide-enrollment-ios-ipados.md b/memdocs/intune/fundamentals/deployment-guide-enrollment-ios-ipados.md index f2f4ec2cd4a..e5ea2229c42 100644 --- a/memdocs/intune/fundamentals/deployment-guide-enrollment-ios-ipados.md +++ b/memdocs/intune/fundamentals/deployment-guide-enrollment-ios-ipados.md @@ -385,7 +385,7 @@ This list provides an overview of the tasks required of administrators. - **Web based device enrollment**: Starting with iOS 15 and newer. This option is just like device enrollment with Company Portal, but enrollment takes place on the web version of Intune Company Portal, eliminating the need for the app. Additionally, this option enables employees and students without managed Apple IDs to enroll devices and access volume-purchased apps. - - **Determine based on user choice**: Gives end users a choice when they enroll. Depending on their selection, **User enrollment** or **Device enrollment** is used. + - **Determine based on user choice**: Gives end users a choice when they enroll. Depending on their selection, **Account driven user enrollment** or **Device enrollment** is used. - **Account driven user enrollment**: Starting with iOS 13 and newer. This option configures a specific set of features and organization apps, like password, per-app VPN, Wi-Fi, and Siri. If you use this method, and to help secure apps and their data, then we recommend also using app protection policies. diff --git a/memdocs/intune/fundamentals/deployment-guide-enrollment-linux.md b/memdocs/intune/fundamentals/deployment-guide-enrollment-linux.md index 9084fe3d7ae..1f99dc1646f 100644 --- a/memdocs/intune/fundamentals/deployment-guide-enrollment-linux.md +++ b/memdocs/intune/fundamentals/deployment-guide-enrollment-linux.md @@ -7,7 +7,7 @@ keywords: author: MandiOhlinger ms.author: mandia manager: dougeby -ms.date: 04/23/2024 +ms.date: 01/09/2025 ms.topic: conceptual ms.service: microsoft-intune ms.subservice: enrollment @@ -18,7 +18,7 @@ ms.localizationpriority: high #ROBOTS: #audience: #ms.devlang: -ms.reviewer: ilwu +ms.reviewer: arnab ms.suite: ems search.appverid: MET150 #ms.tgt_pltfrm: @@ -48,7 +48,7 @@ Use for personal/BYOD and organization-owned devices running Linux. --- | Feature | Use this enrollment option when | | --- | --- | -| You use Ubuntu Desktop (20.04 or 22.04 LTS on x86/64). | ✅ | +| You use Ubuntu Desktop (24.04, 22.04, or 20.04 LTS on x86/64). | ✅ | | You use Ubuntu Server. | ❌ | | You use RedHat Enterprise Linux 8 or 9. |✅ | | Devices are owned by the organization or school. | ✅ | diff --git a/memdocs/intune/fundamentals/deployment-guide-enrollment-macos.md b/memdocs/intune/fundamentals/deployment-guide-enrollment-macos.md index 45cbe84fbbc..bed921c0dc4 100644 --- a/memdocs/intune/fundamentals/deployment-guide-enrollment-macos.md +++ b/memdocs/intune/fundamentals/deployment-guide-enrollment-macos.md @@ -149,14 +149,14 @@ This task list provides an overview. For more specific information, go to [Autom - You want to use multifactor authentication (MFA). - You want to prompt users to update their expired password when they first sign in. - You want to prompt users to reset their expired passwords during enrollment. - - You want devices registered in Microsoft Entra ID. When they're registered, you can use features available with Microsoft Entra ID, such as conditional access. + - You want devices registered in Microsoft Entra ID. When they're registered, you can use features available with Microsoft Entra ID, such as Conditional Access. > [!NOTE] > During the Setup Assistant, users must enter their organization Microsoft Entra credentials (`user@contoso.com`). When they enter their credentials, the enrollment starts. If you want, users can also enter their Apple ID to access Apple specific features, such as Apple Pay. > > After the Setup Assistant completes, users can use the device. When the home screen shows, the enrollment is complete, and user affinity is established. The device isn't fully registered with Microsoft Entra ID, and doesn't show in a user's device list in Microsoft Entra ID. > - > If users need access to resources protected by conditional access or should be fully registered with Microsoft Entra ID, then [install the Company Portal app](../apps/apps-company-portal-macos.md). After it's installed, users open the Company Portal app, and sign in with their organization Microsoft Entra account (`user@contoso.com`). During this second login, any conditional access policies are evaluated, and Microsoft Entra registration is complete. Users can install and use organizational resources, including LOB apps. + > If users need access to resources protected by Conditional Access or should be fully registered with Microsoft Entra ID, then [install the Company Portal app](../apps/apps-company-portal-macos.md). After it's installed, users open the Company Portal app, and sign in with their organization Microsoft Entra account (`user@contoso.com`). During this second login, any Conditional Access policies are evaluated, and Microsoft Entra registration is complete. Users can install and use organizational resources, including LOB apps. - In the [Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Apple Configurator** enrollment and create an enrollment profile. Choose to **Enroll with user affinity** (associate a user to the device), or **Enroll without user affinity** (user-less devices or shared devices). diff --git a/memdocs/intune/fundamentals/deployment-guide-platform-linux.md b/memdocs/intune/fundamentals/deployment-guide-platform-linux.md index e1001eff858..cb18146dbeb 100644 --- a/memdocs/intune/fundamentals/deployment-guide-platform-linux.md +++ b/memdocs/intune/fundamentals/deployment-guide-platform-linux.md @@ -7,7 +7,7 @@ keywords: author: lenewsad ms.author: lanewsad manager: dougeby -ms.date: 07/22/2024 +ms.date: 11/04/2024 ms.topic: conceptual ms.service: microsoft-intune ms.subservice: fundamentals @@ -35,14 +35,14 @@ This guide describes everything you need to do to protect and manage Linux apps * Prepare your tenant for device enrollment. * Create Linux device compliance policies. * Add custom compliance settings. -* Enforce conditional access policies in Microsoft Edge. +* Enforce Conditional Access policies in Microsoft Edge. * Support employees and students enrolling their desktops. -For each section in this guide, review the associated tasks. Some tasks are required and some, like setting up conditional access, are optional. Select the provided links in each section to go to our recommended help docs on Microsoft Learn, where you can find more detailed information and how-to instructions. +For each section in this guide, review the associated tasks. Some tasks are required and some, like setting up Conditional Access, are optional. Select the provided links in each section to go to our recommended help docs on Microsoft Learn, where you can find more detailed information and how-to instructions. ## Step 1: Prerequisites - Microsoft Intune, Microsoft Entra ID, and Microsoft Edge power the feature and capabilities for Linux desktop management. Microsoft Intune powers the device management and compliance capabilities. Microsoft Entra ID powers conditional access, which is used alongside Microsoft Intune compliance policies. Microsoft Edge is the web browser app used to provide protected access to Microsoft 365 web apps. + Microsoft Intune, Microsoft Entra ID, and Microsoft Edge power the feature and capabilities for Linux desktop management. Microsoft Intune powers the device management and compliance capabilities. Microsoft Entra ID powers Conditional Access, which is used alongside Microsoft Intune compliance policies. Microsoft Edge is the web browser app used to provide protected access to Microsoft 365 web apps. Complete the following prerequisites as an Intune administrator to enable your tenant's endpoint management capabilities: @@ -71,17 +71,17 @@ You can enforce device compliance policies based on Linux distribution type, ver | [Create a device compliance policy](../protect/create-compliance-policy.md)|Get step-by-step guidance on how to create and assign a device compliance policy for Linux devices. | | [Add custom compliance settings](../protect/compliance-use-custom-settings.md) | With custom compliance settings, you can write your own Bash scripts to address compliance scenarios not yet included in the device compliance options built into Microsoft Intune. This article describes how to create, monitor, and troubleshoot custom compliance policies for Linux devices. Custom compliance settings require you to [create a custom script](../protect/compliance-custom-script.md) that identifies the settings and value pairs.| | [Add actions for noncompliance](../protect/actions-for-noncompliance.md) |Choose what happens when devices no longer meet the conditions of your compliance policy. Examples of actions include sending alerts, remotely locking devices, or retiring devices. You can add actions for noncompliance when you configure a device compliance policy, or later by editing the policy. | -| Create [a device-based](../protect/create-conditional-access-intune.md) or [app-based](../protect/app-based-conditional-access-intune-create.md) conditional access policy| Set up a conditional access policy to protect and grant access to Microsoft 365 web apps in the Microsoft Edge browser for Linux. Conditional access blocks noncompliant devices from accessing protected work apps in Edge, and grants access to compliant devices. You must have a device compliance policy for conditional access to work with Linux devices. | +| Create [a device-based](../protect/create-conditional-access-intune.md) or [app-based](../protect/app-based-conditional-access-intune-create.md) Conditional Access policy| Set up a Conditional Access policy to protect and grant access to Microsoft 365 web apps in the Microsoft Edge browser for Linux. Conditional Access blocks noncompliant devices from accessing protected work apps in Edge, and grants access to compliant devices. You must have a device compliance policy for Conditional Access to work with Linux devices. | ## Step 4: Enroll devices Enrollment is supported on Linux desktops running: -* Ubuntu LTS, version 22.04 or 20.04. +* Ubuntu LTS, version 24.04, 22.04 or 20.04. * RedHat Enterprise Linux 8 * RedHat Enterprise Linux 9 -Employees assigned Intune licenses can enroll their personal Linux devices into Microsoft Intune whenever they want. During enrollment, their device is registered with Microsoft Entra ID and evaluated for compliance. If you've applied a conditional access policy to Edge, users will be prompted to enroll their devices before they can access Microsoft 365 web apps with their work account. +Employees assigned Intune licenses can enroll their personal Linux devices into Microsoft Intune whenever they want. During enrollment, their device is registered with Microsoft Entra ID and evaluated for compliance. If you've applied a Conditional Access policy to Edge, users will be prompted to enroll their devices before they can access Microsoft 365 web apps with their work account. As an Intune administrator, you don't need to do anything to enable enrollment for employees, other than what's described under [Prerequisites](deployment-guide-platform-linux.md#step-1-prerequisites). However, it's important to provide them with help resources in case they need guidance during enrollment. @@ -93,7 +93,7 @@ As an Intune administrator, you don't need to do anything to enable enrollment f |[Install Microsoft Intune app for Linux](../user-help/microsoft-intune-app-linux.md)| Employees must install the Microsoft Intune app on their personal device for enrollment. This article describes how to install, update, and remove the Microsoft Intune app for Linux in the Terminal app. | |[Install Microsoft Edge web browser)](https://www.microsoft.com/edge)| To access protected websites and files, employees must have Microsoft Edge web browser, version 102.*X* or later. After they enroll their device, employees can sign into Microsoft Edge with their work account and access websites and files. | |[Enroll Linux device in Intune](../user-help/enroll-device-linux.md)| This article is for device users and describes how to enroll a device with the Microsoft Intune app, and includes system requirements, prerequisites, and next steps. During this step, Microsoft Intune registers the device with Microsoft Entra ID and creates a device record in Intune. After registration is complete, device compliance checks begin. | -|[Check device status and resolve compliance issues](../user-help/check-status-linux.md)| This article is for device users and describes how to resolve compliance issues in the Microsoft Intune app. Compliance checks happen during enrollment and thereafter when the device checks in with Intune. The Intune app notifies employees when they have a noncompliant setting on their device. Intune determines compliance and actions for noncompliance by using your device compliance and conditional access policies. | +|[Check device status and resolve compliance issues](../user-help/check-status-linux.md)| This article is for device users and describes how to resolve compliance issues in the Microsoft Intune app. Compliance checks happen during enrollment and thereafter when the device checks in with Intune. The Intune app notifies employees when they have a noncompliant setting on their device. Intune determines compliance and actions for noncompliance by using your device compliance and Conditional Access policies. | ## Next steps diff --git a/memdocs/intune/fundamentals/deployment-guide-platform-windows.md b/memdocs/intune/fundamentals/deployment-guide-platform-windows.md index a5c2b973cf4..cd62749c294 100644 --- a/memdocs/intune/fundamentals/deployment-guide-platform-windows.md +++ b/memdocs/intune/fundamentals/deployment-guide-platform-windows.md @@ -64,7 +64,7 @@ You can use Microsoft Entra Conditional Access policies in conjunction with devi | ---- | ------ | | [Create a compliance policy](../protect/create-compliance-policy.md)|Get step-by-step guidance on how to create and assign a compliance policy to user and device groups. | | [Add actions for noncompliance](../protect/actions-for-noncompliance.md) |Choose what happens when devices no longer meet the conditions of your compliance policy. Examples of actions include sending alerts, remotely locking devices, or retiring devices. You can add actions for noncompliance when you configure a device compliance policy, or later by editing the policy. | -| Create [a device-based](../protect/create-conditional-access-intune.md) or [app-based](../protect/app-based-conditional-access-intune-create.md) conditional access policy| Select the apps or services you want to protect and define the conditions for access. | +| Create [a device-based](../protect/create-conditional-access-intune.md) or [app-based](../protect/app-based-conditional-access-intune-create.md) Conditional Access policy| Select the apps or services you want to protect and define the conditions for access. | |[Block access to apps that don't use modern authentication](../protect/app-modern-authentication-block.md) | Create an app-based Conditional Access policy to block apps that use authentication methods other than OAuth2; for example, those apps that use basic and form-based authentication. Before you block access, however, sign in to Microsoft Entra ID and review the [authentication methods activity report](/azure/active-directory/authentication/howto-authentication-methods-activity) to see if users are using basic authentication to access essential things you forgot about or are unaware of. For example, things like meeting room calendar kiosks use basic authentication. | | [Add custom compliance settings](../protect/compliance-use-custom-settings.md) | With custom compliance settings, you can write your own Bash scripts to address compliance scenarios not yet included in the device compliance options built into Microsoft Intune. This article describes how to create, monitor, and troubleshoot custom compliance policies for Windows devices. Custom compliance settings require you to [create a custom script](../protect/compliance-custom-json.md) that identifies the settings and value pairs.| diff --git a/memdocs/intune/fundamentals/deployment-plan-compliance-policies.md b/memdocs/intune/fundamentals/deployment-plan-compliance-policies.md index b486c540b5e..dd6cee60baf 100644 --- a/memdocs/intune/fundamentals/deployment-plan-compliance-policies.md +++ b/memdocs/intune/fundamentals/deployment-plan-compliance-policies.md @@ -40,14 +40,14 @@ ms.collection: ### Defender for Endpoint -### Conditional access ? +### Conditional Access ? --> # Step 3 – Plan for compliance policies Previously, you set up your Intune subscription and created app protection policies. Next, plan for and configure device compliance settings and policies to help protect organizational data by requiring devices to meet requirements that you set. -:::image type="content" source="./media/deployment-plan-compliance-policies/deployment-plan-compliance-conditional-access.png" alt-text="Diagram that shows getting started with Microsoft Intune with step 3, which is creating compliance and conditional access policies."::: +:::image type="content" source="./media/deployment-plan-compliance-policies/deployment-plan-compliance-conditional-access.png" alt-text="Diagram that shows getting started with Microsoft Intune with step 3, which is creating compliance and Conditional Access policies."::: If you’re not yet familiar with compliance policies, see [Compliance overview](../protect/device-compliance-get-started.md). @@ -198,7 +198,7 @@ With robust device compliance policies in place, you can then implement more adv - Integrating device compliance status with *Conditional Access* to help gate which devices are allowed to access email, other cloud services, or on-premises resources. -- Including compliance data from *third-party compliance partners*. With such a configuration, compliance data from those devices can be used with your [conditional access policies](../protect/device-compliance-get-started.md#integrate-with-conditional-access). +- Including compliance data from *third-party compliance partners*. With such a configuration, compliance data from those devices can be used with your [Conditional Access policies](../protect/device-compliance-get-started.md#integrate-with-conditional-access). - Expanding on built-in device compliance policies by defining custom compliance settings that aren't available natively through the Intune compliance policy UI. diff --git a/memdocs/intune/fundamentals/deployment-plan-protect-apps.md b/memdocs/intune/fundamentals/deployment-plan-protect-apps.md index 73427bba58d..043334a5e3a 100644 --- a/memdocs/intune/fundamentals/deployment-plan-protect-apps.md +++ b/memdocs/intune/fundamentals/deployment-plan-protect-apps.md @@ -187,7 +187,7 @@ For more information about app configuration, go to the following topics: The Outlook for iOS and Android app is designed to enable users in your organization to do more from their mobile devices, by bringing together email, calendar, contacts, and other files. -The richest and broadest protection capabilities for Microsoft 365 data are available when you subscribe to the Enterprise Mobility + Security suite, which includes Microsoft Intune and Microsoft Entra ID P1 or P2 features, such as conditional access. At a minimum, you will want to deploy a conditional access policy that allows connectivity to Outlook for iOS and Android from mobile devices and an Intune app protection policy that ensures the collaboration experience is protected. +The richest and broadest protection capabilities for Microsoft 365 data are available when you subscribe to the Enterprise Mobility + Security suite, which includes Microsoft Intune and Microsoft Entra ID P1 or P2 features, such as Conditional Access. At a minimum, you will want to deploy a Conditional Access policy that allows connectivity to Outlook for iOS and Android from mobile devices and an Intune app protection policy that ensures the collaboration experience is protected. For more information about configuring Microsoft Outlook, go to the following topic: diff --git a/memdocs/intune/fundamentals/filters-device-properties.md b/memdocs/intune/fundamentals/filters-device-properties.md index 23deca8fafb..ff45ddbc769 100644 --- a/memdocs/intune/fundamentals/filters-device-properties.md +++ b/memdocs/intune/fundamentals/filters-device-properties.md @@ -7,7 +7,7 @@ keywords: author: MandiOhlinger ms.author: mandia manager: dougeby -ms.date: 08/21/2024 +ms.date: 11/14/2024 ms.topic: conceptual ms.service: microsoft-intune ms.subservice: fundamentals @@ -374,13 +374,17 @@ You can use the following app properties in your managed app filter rules: - `(app.deviceModel -eq "Surface Duo")` - `(app.deviceModel -in ["Surface Duo", "Surface Duo 2"])` - `(app.deviceModel -startsWith "Surface Duo")` + - `(app.deviceModel -startsWith "RealityDevice")` This property applies to: - Android - - iOS/iPadOS + - iOS/iPadOS/visionOS - Windows + > [!NOTE] + > The `app.deviceModel -startsWith "RealityDevice"` property is in preview and is only supported on the Microsoft Teams app. If your app protection policy is targeted to the iOS/iPadOS platform, it will also apply to visionOS. However, when targeting specific conditional launch settings to visionOS, such as "Min/Max OS version" or "Min app version", you can use the app property `app.deviceModel -startsWith "RealityDevice"` in your managed app filter rules. + - **`operatingSystemVersion` (Operating System Version)**: Create a filter rule based on the Intune device operating system (OS) version. Enter a version value (using `-eq`, `-ne`, `-gt`, `-ge`, `-lt`, `-le` operators). Examples: diff --git a/memdocs/intune/fundamentals/filters-performance-recommendations.md b/memdocs/intune/fundamentals/filters-performance-recommendations.md index ac621616ac3..85ad1746335 100644 --- a/memdocs/intune/fundamentals/filters-performance-recommendations.md +++ b/memdocs/intune/fundamentals/filters-performance-recommendations.md @@ -7,7 +7,7 @@ keywords: author: MandiOhlinger ms.author: mandia manager: dougeby -ms.date: 07/22/2024 +ms.date: 12/11/2024 ms.topic: conceptual ms.service: microsoft-intune ms.subservice: fundamentals @@ -89,6 +89,8 @@ These recommendations focus on improving performance and reducing latency in wor Larger groups take longer to sync membership updates between Microsoft Entra ID and Intune. The **All users** and **All devices** are usually the largest groups you have. If you assign Intune workloads to large Microsoft Entra groups that have many users or devices, then synchronization backlogs can happen in your Intune environment. This backlog impacts policy and app deployments, which take longer to reach managed devices. +The update from Microsoft Entra to Intune typically happens within 5 minutes. It's not instant. This time can affect enrollment assignments. Admins should enroll devices after several minutes, not immediately after adding the enrolling users to a group. + The built-in **All users** and **All devices** groups are Intune-only grouping objects that don't exist in Microsoft Entra ID. There isn't a continuous sync between Microsoft Entra ID and Intune. So, group membership is instant. > [!NOTE] diff --git a/memdocs/intune/fundamentals/filters-reports-troubleshoot.md b/memdocs/intune/fundamentals/filters-reports-troubleshoot.md index 33adbeb7714..e69d84362a8 100644 --- a/memdocs/intune/fundamentals/filters-reports-troubleshoot.md +++ b/memdocs/intune/fundamentals/filters-reports-troubleshoot.md @@ -7,7 +7,7 @@ keywords: author: MandiOhlinger ms.author: mandia manager: dougeby -ms.date: 12/05/2023 +ms.date: 11/20/2024 ms.topic: conceptual ms.service: microsoft-intune ms.subservice: fundamentals @@ -17,7 +17,7 @@ ms.localizationpriority: high #ROBOTS: #audience: #ms.devlang: -ms.reviewer: gokarthi +ms.reviewer: gokarthi, abalwan ms.suite: ems search.appverid: MET150 #ms.tgt_pltfrm: @@ -101,6 +101,7 @@ In the following example, you can see this information for the **Microsoft Word* > - In the **Device install status** report, apps deployed as "Available" aren't shown. To troubleshoot if a user/device is filtered in or out of an Available assignment, use the **Filter evaluation report for devices**. To generate filter evaluation results, the end user must go to the list of apps in the Company portal app or website. > - When assigning a policy, you can add devices to the "Excluded groups". These excluded devices aren't shown in the workload device status reports. > - In the **Apps** and **Settings Catalog** device status reports, there's a column that shows any filter evaluation. Currently, the filter evaluation information isn't available for all Intune workloads. +> - If you use the `operatingSystemVersion` filter for available apps on any Android, AOSP, or iOS platforms the evaluation result is inconclusive. This behavior is a known issue and will be fixed in a future release. No ETA. ## Reports for managed apps diff --git a/memdocs/intune/fundamentals/get-started-with-intune.md b/memdocs/intune/fundamentals/get-started-with-intune.md index 5cfa06bac1c..92f66fe2403 100644 --- a/memdocs/intune/fundamentals/get-started-with-intune.md +++ b/memdocs/intune/fundamentals/get-started-with-intune.md @@ -39,7 +39,7 @@ Microsoft Intune is a cloud-based service that helps you manage your devices and This article provides an overview of the steps to start your Intune deployment. -:::image type="content" source="./media/get-started-with-intune/get-started-overview.png" alt-text="Diagram that shows the different steps to get started with Microsoft Intune, including set up, adding apps, using compliance & conditional access, configuring device features, and then enrolling devices to be managed."::: +:::image type="content" source="./media/get-started-with-intune/get-started-overview.png" alt-text="Diagram that shows the different steps to get started with Microsoft Intune, including set up, adding apps, using compliance & Conditional Access, configuring device features, and then enrolling devices to be managed."::: > [!TIP] > As a companion to this article, the Microsoft 365 admin center also has some setup guidance. The guide customizes your experience based on your environment. To access this deployment guide, go to the [Microsoft Intune setup guide in the Microsoft 365 admin center](https://go.microsoft.com/fwlink/?linkid=2224812), and sign in with the **Global Reader** (at a minimum). For more information on these deployment guides and the roles needed, go to [Advanced deployment guides for Microsoft 365 and Office 365 products](/microsoft-365/enterprise/setup-guides-for-microsoft-365). diff --git a/memdocs/intune/fundamentals/groups-add.md b/memdocs/intune/fundamentals/groups-add.md index b745cac0a4d..aff95a6f320 100644 --- a/memdocs/intune/fundamentals/groups-add.md +++ b/memdocs/intune/fundamentals/groups-add.md @@ -8,7 +8,7 @@ keywords: author: Smritib17 ms.author: smbhardwaj manager: dougeby -ms.date: 10/18/2023 +ms.date: 01/14/2025 ms.topic: how-to #customer intent: As an IT admin, I want to add groups, so that users and devices are organized. ms.service: microsoft-intune @@ -40,7 +40,7 @@ Intune uses Microsoft Entra groups to manage devices and users. As an Intune adm You can add the following types of groups: -- **Assigned groups** - Manually add users or devices into a static group. +- **Assigned groups** - Manually add users or devices into a static group. - **Dynamic groups** (Requires Microsoft Entra ID P1 or P2) - Automatically add users or devices to user groups or device groups based on an expression you create. For example, when a user is added with the manager title, the user is automatically added to an **All managers** users group. Or, when a device has the iOS/iPadOS device OS type, the device is automatically added to an **All iOS/iPadOS devices** devices group. @@ -98,6 +98,29 @@ Consider some of the other dynamic user and device groups you can create, such a - Human Resources - All Charlotte employees +## Edit a group + +As an Intune admin, you can edit groups, such as changing the group members, owner, and properties. + +Use the following steps to edit an existing group: + +1. Sign in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431). +2. Select **Groups** > **All groups** > *select the name of a group to edit*. +3. Under the **Manage** menu group, select an area of the group to edit, such as **Properties**, **Members**, or **Owners**. + +When you add new members, you can choose from **Users**, **Groups**, **Devices**, and **Enterprise applications**. + +## Delete a group + +As an Intune admin, you can delete groups that are no longer needed. + +Use the following steps to delete an existing group: + +1. Sign in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431). +2. Select **Groups** > **All groups** > *select the name of a group to delete* > **Delete**. + +To view a list of recently deleted groups, select **Groups** > **Deleted groups**. Note that after deleting a group, the deleted groups list may may take time to update. + ## Device groups You can create **device groups** when you need to run administrative tasks based on the device identity, not the user identity. They're useful for managing devices that don't have dedicated users, such as kiosk devices, devices shared by shift workers, or devices assigned to a specific location. @@ -111,7 +134,7 @@ You can also use [device categories](../enrollment/device-group-mapping.md) to a ## Intune All users and All devices groups -When assigning policies and apps in the Intune admin center, you can choose to assign to **All users** or **All devices** groups, which are automatically created by Intune. +When assigning policies and apps in the Intune admin center, you can choose to assign to **All users** or **All devices** groups, which are automatically created by Intune. The **All devices** group targets all devices that are enrolled into management. The **All users** group is a simple way to target all users that are assigned an Intune license. These groups are considered "virtual" because you don't create them or view them in Microsoft Entra ID. They're convenient to use because they're already in your tenant, and they're a faster targeting unit than Microsoft Entra groups. @@ -123,7 +146,7 @@ When assigning policies and applications to large groups, such as **All users** For more guidance on using Filters, go to: - [Use filters when assigning your apps, policies, and profiles in Microsoft Intune](filters.md) -- [Performance recommendations for Grouping, Targeting and Filtering in large Microsoft Intune environments](filters-performance-recommendations.md) +- [Performance recommendations for Grouping, Targeting, and Filtering in large Microsoft Intune environments](filters-performance-recommendations.md) ## See also diff --git a/memdocs/intune/fundamentals/guided-scenarios-office-mobile.md b/memdocs/intune/fundamentals/guided-scenarios-office-mobile.md index d7cc3df9326..0f76f1f27fe 100644 --- a/memdocs/intune/fundamentals/guided-scenarios-office-mobile.md +++ b/memdocs/intune/fundamentals/guided-scenarios-office-mobile.md @@ -50,13 +50,13 @@ You can use App protection policies to prevent users from saving work files in u - Data relocation policies like **Save copies of org data**, and **Restrict cut, copy, and paste**. - Access policy settings to require simple PIN for access, and block managed apps from running on jailbroken or rooted devices. -App-based conditional access and client app management add a security layer by making sure only client apps that support Intune app protection policies can access Exchange online and other Microsoft 365 services. +App-based Conditional Access and client app management add a security layer by making sure only client apps that support Intune app protection policies can access Exchange online and other Microsoft 365 services. You can block the built-in mail apps on iOS/iPadOS and Android when you allow only the Microsoft Outlook app to access Exchange Online. Additionally, you can block apps that don't have Intune app protection policies applied from accessing SharePoint Online. -In this example, the admin has applied app protection policies to the Outlook app followed by a conditional access rule that adds the Outlook app to an approved list of apps that can be used when accessing corporate e-mail. +In this example, the admin has applied app protection policies to the Outlook app followed by a Conditional Access rule that adds the Outlook app to an approved list of apps that can be used when accessing corporate e-mail. -![Outlook app conditional access process flow](./media/guided-scenarios-office-mobile/guided-scenarios-office-mobile-02.png) +![Outlook app Conditional Access process flow](./media/guided-scenarios-office-mobile/guided-scenarios-office-mobile-02.png) ## Prerequisites @@ -120,7 +120,7 @@ The following settings are applied when using the **Enhanced data protection** s In this step, you can choose the user groups that you want to include to ensure that they have access to your corporate data. App protection is assigned to users, and not devices, so your corporate data will be secure regardless of the device used and its enrollment status. -Users without app protection policies and conditional access settings assigned will be able to save data from their corporate profile to personal apps and nonmanaged local storage on their mobile devices. They could also connect to corporate data services, such as Microsoft Exchange, with personal apps. +Users without app protection policies and Conditional Access settings assigned will be able to save data from their corporate profile to personal apps and nonmanaged local storage on their mobile devices. They could also connect to corporate data services, such as Microsoft Exchange, with personal apps. ## Step 6 - Review + create @@ -131,4 +131,4 @@ The final step allows you to review a summary of the settings you configured. On ## Next steps -- Enhance the security of work files by assigning users an App-based conditional access policy to protect cloud services from sending work files to unprotected apps. For more information, see [Set up app-based Conditional Access policies with Intune](../protect/app-based-conditional-access-intune-create.md). +- Enhance the security of work files by assigning users an App-based Conditional Access policy to protect cloud services from sending work files to unprotected apps. For more information, see [Set up app-based Conditional Access policies with Intune](../protect/app-based-conditional-access-intune-create.md). diff --git a/memdocs/intune/fundamentals/in-development.md b/memdocs/intune/fundamentals/in-development.md index 4e975e33bbc..a695a91edba 100644 --- a/memdocs/intune/fundamentals/in-development.md +++ b/memdocs/intune/fundamentals/in-development.md @@ -7,11 +7,11 @@ keywords: author: dougeby ms.author: dougeby manager: dougeby -ms.date: 10/29/2024 +ms.date: 01/03/2025 ms.topic: conceptual ms.service: microsoft-intune ms.subservice: fundamentals - + # optional metadata #audience: @@ -61,6 +61,14 @@ You can use RSS to be notified when this article is updated. For more informatio ## Microsoft Intune Suite +### Endpoint Privilege Manager support for Arm64 + +You'll soon be able to use [Endpoint Protection Manager](/mem/intune/protect/epm-overview) (EPM) file elevations on devices that run on Arm64 architecture. + +Applies to: + +- Windows + ### Use Copilot with Endpoint Privilege Manager to help identify potential elevation risks We’re adding support for Copilot to help you investigate Endpoint Privilege Manager (EPM) elevation details. Copilot will help you evaluate information from you EPM elevation requests to identify potential indicators of compromise by using information from [Microsoft Defender](/defender-endpoint/microsoft-defender-endpoint). @@ -77,13 +85,30 @@ EPM is available as an [Intune Suite add-on-capability](../fundamentals/intune-a ## App management -### Additional reporting details for LOB apps on AOSP devices +### Apple VPP using new API v2.0 -Additional details will be provided for app installation reporting of Line of Business (LOB) apps on Android Open Source Project (AOSP) devices. You will be able to see error codes and detailed error messages for LOB apps. For information about app status details, see [Monitor app information and assignments with Microsoft Intune](../apps/apps-monitor.md). +Apple recently updated how apps and books are managed through the Apple volume purchase program (VPP). Apple has updated their related API to version 2.0 and deprecated version 1.0. To support the Apple updates, Microsoft Intune will soon use the new API, which is faster and more scalable than the previous version. Applies to: -- Android Open Source Project (AOSP) devices +- iOS/iPadOS +- macOS + + +### Update to Apps workload experience in Intune + +The Apps workload in Intune will be updated to provide a more consistent UI and improved navigation structure so you can find the information you need faster. To find the **App** workload in Intune, navigate to [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) and select **Apps**. + + +### Add Enterprise App Catalog apps to ESP blocking apps list + +Enterprise App Catalog apps will be supported with Windows Autopilot. Microsoft Intune Enterprise App Management enables IT admins to easily manage applications from the Enterprise App Catalog. Using Windows Autopilot, you'll be able to select blocking apps from the Enterprise App Catalog in the Enrollment Status Page (ESP) and the Device Preparation Page (DPP) profiles. This allows you to update apps more easily without needing to update those profiles with the latest versions. + +For related information, see [Set up the Enrollment Status Page](../enrollment/windows-enrollment-status.md), [Overview of Windows Autopilot device preparation](/autopilot/device-preparation/overview), and [Add an Enterprise App Catalog app to Microsoft Intune](../apps/apps-add-enterprise-app.md). + +Applies to: + +- Windows ### Added protection for iOS/iPadOS app widgets @@ -97,99 +122,124 @@ Applies to: ## Device configuration -### Device Firmware Configuration Interface (DFCI) support for Samsung devices +### Android settings in the Settings Catalog -We're adding support to use DFCI profiles to manage UEFI (BIOS) settings for Samsung devices that run Windows 10 or Windows 11. Not all Samsung devices running Windows are enabled for DFCI. Contact your device vendor or device manufacturer for eligible devices. +The settings catalog will soon support Android Enterprise and AOSP. -You can manage DFCI profiles from within the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) by going to **Devices** > **Manage devices** > **Configuration** > **Create** > **New policy** > **Windows 10 and later** for platform > **Templates** > **Device Firmware Configuration Interface** for profile type. For more information about DFCI profiles, see: +Currently, to configure Android settings, you use the built-in templates. The settings from these templates are also available in the settings catalog. More settings will continue to be added. -- [Configure Device Firmware Configuration Interface (DFCI) profiles on Windows devices in Microsoft Intune](../configuration/device-firmware-configuration-interface-windows.md) -- [Device Firmware Configuration Interface (DFCI) management with Windows Autopilot](../../autopilot/dfci-management.md) +In the Intune admin center, when you create a device configuration profile, you select the **Profile Type** (**Devices** > **Manage devices** > **Configuration** > **Create** > **New policy** > select your **Platform** > **Profile Type**). All the profile types are moved to **Profile Type** > **Templates**. + +This change: + +- Will be a UI change with no impact on your existing policies. Your existing policies won't changing. You will still be able to create, edit, and assign these policies the same way. +- Will be the same UI experience as iOS/iPadOS, macOS, and Windows templates. + +To get started with settings catalog, go to [Use the settings catalog to configure settings on your devices](../configuration/settings-catalog.md). Applies to: -- Windows +- Android Enterprise +- AOSP -### New settings for Windows 24H2 in the Windows settings catalog -The Settings Catalog lists all the settings you can configure in a device policy, and all in one place. You can view these Windows settings in the Microsoft Intune admin center by going to **Devices** > **Manage devices** > **Configuration** > **Create** > **New policy** > **Windows 10 and later for platform** > **Settings catalog** for profile type. +### The Settings Catalog lists all the settings you can configure in a device policy -We're working on the addition of new settings for Window 24H2. +The Settings Catalog lists all the settings you can configure in a device policy, and all in one place. + +There will soon be new settings in the Settings Catalog to *Configure Multiple Display Mode* for Windows 24H2. To see available settings, in the Microsoft Intune admin center, go to **Devices** > **Manage devices** > **Configuration** > **Create** > **New policy** > **Windows 10 and later for platform** > **Settings catalog** for profile type. + +The **Configure Multiple Display Mode** setting allows monitors to extend or clone the display by default, facilitating the need for manual setup. It streamlines the multi-monitor configuration process, ensuring a consistent and user-friendly experience. Applies to: -- Windows +- Windows -### New settings available in the Apple settings catalog +### Low privileged account for Intune Connector for Active Directory for Hybrid join Autopilot flows -The [Settings Catalog](../configuration/settings-catalog.md) lists all the settings you can configure in a device policy, and all in one place. For more information about configuring Settings Catalog profiles in Intune, see [Create a policy using settings catalog](../configuration/settings-catalog.md). +We're updating the Intune Connector for Active Directory to use a low privileged account to increase the security of your environment. The old connector will no longer be available for download but will continue to work until deprecation. -We're adding new settings to the Settings Catalog. To view available settings, in the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Devices** > **Manage devices** > **Configuration** > **Create** > **New policy** > **iOS/iPadOS** or **macOS** for platform > **Settings catalog** for profile type. +For more information, see [Deploy Microsoft Entra hybrid joined devices by using Intune and Windows Autopilot](../../autopilot/windows-autopilot-hybrid.md). -#### iOS/iPadOS + -**Restrictions**: + -- Allow Apps To Be Hidden -- Allow Apps To Be Locked -- Allow Call Recording -- Allow Mail Summary -- Allow RCS Messaging + -##### macOS +## Device management -**Declarative Device Management (DDM) > Math Settings**: +### Remote actions with multiple administrative approval (MAA) -- Calculator - - Input Mode - RPN +Intune *access policies* help protect against a compromised administrative account by requiring that a second administrative account is used to approve a change before the change is applied. This capability is known as multiple administrative approval (MAA). The remote actions **Retire**, **Wipe** and **Delete** will support MAA. Onboarding Remote device actions to MAA, will help mitigate the risk of unauthorized or compromised remote actions being taken on device(s) by a single administrative account thereby enhancing the overall security posture of the environment. -**Restrictions**: +For more information on multiple administrative approval, see [Use multiple administrative approvals in Intune](../fundamentals/multi-admin-approval.md). -- Allow Mail Summary -- Allow Media Sharing Modification +### Remote Help supports Azure Virtual Desktop muti-session -The following settings have been deprecated by Apple and will be marked as deprecated in the Settings Catalog: +Currently, Remote Help supports Azure Virtual Desktop (AVD) sessions with one user on one virtual machine (VM). Going forward, Remote Help will enable support for multi-session AVD with several users on a single virtual machine. -#### macOS +For more information, see: -**Security > Firewall**: +- [Remote Help](../fundamentals/remote-help.md) +- [Using Azure Virtual Desktop multi-session with Microsoft Intune](../fundamentals/azure-virtual-desktop-multi-session.md) -- Enable Logging -- Logging Option +### Introducing platform level targeting of Device Cleanup rule - +We're adding a feature that will allow a customer to: + +- Configure one device cleanup rule per platform (Windows, iOS/macOS,iPadOS, Android, Linux) +- Configure a different RBAC permission and assign the permission to different RBAC roles + +Platform level targeting of the Device Cleanup rule will help administrators to remove stale and inactive devices from their tenant based on the active days rule specified by the admin. Scoped and targeted Device cleanup rules add an intermediate stage where an admin will be able to target removing stale devices by having a rule configured at the platform or OS level.  + +For more information, see [device cleanup rules](../remote-actions/devices-wipe.md#automatically-delete-devices-with-cleanup-rules). - +### Copilot assistant for device query + +You'll soon be able to use Copilot to generate a KQL query to help you get data from across multiple devices in Intune. This capability will be available in the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) by selecting **Devices** > **Device query** > **Query with Copilot**. -## Device management +## Device security -### Store macOS certificates in user keychain +### Updated security baseline for Microsoft Edge v128 + +We’re working on an update to add an Intune security baseline for Microsoft Edge v128. This update will bring support for recent settings so you can continue to maintain best-practice configurations for Microsoft Edge. -Soon you'll have the option to store macOS certificates in the user keychain. Currently, Microsoft Intune automatically stores user and device certificates in the *device* keychain. The enhancement will strengthen system security, and will improve the user experience by reducing certificate prompts. +For information about security baselines with Intune, see [Use security baselines to configure Windows devices in Intune](../protect/security-baselines.md). Applies to: -- macOS +- Windows -### Device Inventory for Windows +### Updated security baseline for Windows version 24H2 -Device inventory lets you collect and view additional hardware properties from your managed devices to help you better understand the state of your devices and make business decisions. +We're working on an update to add an Intune security baseline for **Windows version 24H2**. The new baseline version will use the unified settings platform seen in the Settings Catalog, which features an improved user interface and reporting experience, consistency and accuracy improvements with setting tattooing, and the new ability to support assignment filters for profiles. -You'll soon be able to choose what you want to collect from your devices, using the catalog of properties and then view the collected properties in the Resource Explorer view. +Use of [Intune security baselines](../protect/security-baselines.md) can help you maintain best-practice configurations for your Windows devices and can help you rapidly deploy configurations to your Windows devices that meet the security recommendations of the applicable security teams at Microsoft. -Applies to: +As with all baselines, the default baseline will represent the recommended configurations for each setting, which you can modify to meet the requirements of your organization. -- Windows (Corporate owned devices managed by Intune) +Applies to: - +- Windows -## Device security +### Security baselines for HoloLens 2 in public preview + +We’re working to release a public preview of two security baselines for HoloLens 2. These baselines represent Microsoft’s best practice guidelines and experience from deploying and supporting HoloLens 2 devices to customers across various industries. The baselines include: + +- **Standard Security Baseline for HoloLens 2**: + The standard security baseline for HoloLens 2 represents the recommendations for configuring security settings that are applicable to all types of customers irrespective of HoloLens 2 use case scenarios. + +- **Advanced Security Baseline for HoloLens 2**: + The advanced security baseline for HoloLens 2 represents the recommendations for configuring security settings for the customers who have strict security controls of their environment and require stringent security policies to be applied to any device used in their environment. + +To learn more about security baselines with Intune, see [Use security baselines to configure Windows devices in Intune](../protect/security-baselines.md). ### Linux support for Endpoint detection and response exclusion settings -We are adding a new Endpoint Security template under Endpoint detection and response (EDR) for the Linux platform, that will be supported through the [Microsoft Defender for Endpoint security settings management](../protect/mde-security-integration.md) scenario. +We're adding a new Endpoint Security template under Endpoint detection and response (EDR) for the Linux platform, that will be supported through the [Microsoft Defender for Endpoint security settings management](../protect/mde-security-integration.md) scenario. The template will support settings related to global exclusion settings. Applicable to antivirus and EDR engines on the client, the settings can configure exclusions to stop associated real time protection EDR alerts for the excluded items. Exclusions can be defined by the file path, folder, or process explicitly defined by the admin in the policy. @@ -203,7 +253,6 @@ We're updating the [Microsoft Tunnel readiness tool](../protect/microsoft-tunnel For more information on *auditd* and how to install it on your Microsoft Tunnel server, see [Linux system auditing](../protect/microsoft-tunnel-prerequisites.md#linux-system-auditing). - ### Support for Intune Device control policy for devices managed by Microsoft Defender for Endpoint You'll be able to use the endpoint security policy for *Device control* (Attack surface reduction policy) from the Microsoft Intune with the devices you manage through the [Microsoft Defender for Endpoint security settings management](../protect/mde-security-integration.md) capability. @@ -229,19 +278,6 @@ When this change takes effect, devices that are assigned this policy while manag ## Monitor and troubleshoot -### New device actions for single device query - -We're adding the Intune remote device actions to Single device query to help you manage your devices remotely. From the device query interface, you'll be able to run device actions based on query results for faster and more efficient troubleshooting. - -Applies to: - -- Windows - -For more information, see: - -- [Device query in Microsoft Intune](../../analytics/device-query.md) -- [Run remote actions on devices with Microsoft Intune](../remote-actions/device-management.md) - ### Device Query for Multiple Devices We're adding Device query for multiple devices. This feature allows you to gain comprehensive insights about your entire fleet of devices using Kusto Query Language (KQL) to query across collected inventory data for your devices. @@ -252,16 +288,6 @@ Applies to: - Windows -### ICCID will be inventoried for Android Enterprise Dedicated and Fully Managed - -We're adding the ability to view a device's ICCID number for devices enrolled as Android Enterprise Dedicated or Android Fully Managed. Admins can view ICCID numbers in their device inventory. - -When available, you can find the ICCID number for Android devices by navigating to **Devices** > **Android**. Select a device of interest. In the side panel, under **Monitor** select **Hardware**. The ICCID number will be in the **Network details** group. The ICCID number isn't supported for Android Corporate-Owned Work Profile devices. - -Applies to: - -- Android - diff --git a/memdocs/intune/fundamentals/intune-endpoints.md b/memdocs/intune/fundamentals/intune-endpoints.md index 60f00240b75..a6a780125e2 100644 --- a/memdocs/intune/fundamentals/intune-endpoints.md +++ b/memdocs/intune/fundamentals/intune-endpoints.md @@ -8,7 +8,7 @@ keywords: author: Smritib17 ms.author: smbhardwaj manager: dougeby -ms.date: 09/24/2024 +ms.date: 01/09/2025 ms.topic: reference ms.service: microsoft-intune ms.subservice: fundamentals @@ -19,7 +19,7 @@ ms.localizationpriority: high #ROBOTS: #audience: -ms.reviewer: srink +ms.reviewer: davidra ms.suite: ems search.appverid: MET150 #ms.tgt_pltfrm: @@ -97,7 +97,7 @@ The data columns shown in the tables are: ID |Desc |Category |ER |Addresses |Ports -- |---------------------------------------------------------------- |---------------------|--- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | --------------------------------| -163 | Intune client and host service| Allow
    Required | False | `*.manage.microsoft.com`
    `manage.microsoft.com`
    `EnterpriseEnrollment.manage.microsoft.com`
    `104.46.162.96/27, 13.67.13.176/28, 13.67.15.128/27, 13.69.231.128/28, 13.69.67.224/28, 13.70.78.128/28, 13.70.79.128/27, 13.71.199.64/28, 13.73.244.48/28, 13.74.111.192/27, 13.77.53.176/28, 13.86.221.176/28,13.89.174.240/28, 13.89.175.192/28, 20.189.229.0/25, 20.191.167.0/25, 20.37.153.0/24, 20.37.192.128/25, 20.38.81.0/24, 20.41.1.0/24, 20.42.1.0/24, 20.42.130.0/24, 20.42.224.128/25, 20.43.129.0/24, 20.44.19.224/27, 20.49.93.160/27, 40.119.8.128/25, 40.67.121.224/27, 40.70.151.32/28, 40.71.14.96/28, 40.74.25.0/24, 40.78.245.240/28, 40.78.247.128/27, 40.79.197.64/27, 40.79.197.96/28, 40.80.180.208/28, 40.80.180.224/27, 40.80.184.128/25, 40.82.248.224/28, 40.82.249.128/25, 52.150.137.0/25, 52.162.111.96/28, 52.168.116.128/27, 52.182.141.192/27, 52.236.189.96/27, 52.240.244.160/27, 20.204.193.12/30, 20.204.193.10/31, 20.192.174.216/29, 20.192.159.40/29` | **TCP:** 80, 443| +163 | Intune client and host service| Allow
    Required | False | `*.manage.microsoft.com`
    `manage.microsoft.com`
    `EnterpriseEnrollment.manage.microsoft.com`
    `104.46.162.96/27, 13.67.13.176/28, 13.67.15.128/27, 13.69.231.128/28, 13.69.67.224/28, 13.70.78.128/28, 13.70.79.128/27, 13.74.111.192/27, 13.77.53.176/28, 13.86.221.176/28,13.89.174.240/28, 13.89.175.192/28, 20.189.229.0/25, 20.191.167.0/25, 20.37.153.0/24, 20.37.192.128/25, 20.38.81.0/24, 20.41.1.0/24, 20.42.1.0/24, 20.42.130.0/24, 20.42.224.128/25, 20.43.129.0/24, 20.44.19.224/27, 40.119.8.128/25, 40.67.121.224/27, 40.70.151.32/28, 40.71.14.96/28, 40.74.25.0/24, 40.78.245.240/28, 40.78.247.128/27, 40.79.197.64/27, 40.79.197.96/28, 40.80.180.208/28, 40.80.180.224/27, 40.80.184.128/25, 40.82.248.224/28, 40.82.249.128/25, 52.150.137.0/25, 52.162.111.96/28, 52.168.116.128/27, 52.182.141.192/27, 52.236.189.96/27, 52.240.244.160/27, 20.204.193.12/30, 20.204.193.10/31, 20.192.174.216/29, 20.192.159.40/29, 104.208.197.64/27, 172.160.217.160/27, 172.201.237.160/27, 172.202.86.192/27, 172.205.63.0/25, 172.212.214.0/25, 172.215.131.0/27, 20.168.189.128/27, 20.199.207.192/28, 20.204.194.128/31, 20.208.149.192/27, 20.208.157.128/27, 20.214.131.176/29, 20.43.129.0/24, 20.91.147.72/29, 4.145.74.224/27, 4.150.254.64/27, 4.154.145.224/27, 4.200.254.32/27, 4.207.244.0/27, 4.213.25.64/27, 4.213.86.128/25, 4.216.205.32/27, 4.237.143.128/25, 40.84.70.128/25, 48.218.252.128/25, 57.151.0.192/27, 57.153.235.0/25, 57.154.140.128/25, 57.154.195.0/25, 57.155.45.128/25, 68.218.134.96/27, 74.224.214.64/27, 74.242.35.0/25, 172.208.170.0/25, 74.241.231.0/25, 74.242.184.128/25` | **TCP:** 80, 443| 172 | MDM Delivery Optimization | Default
    Required | False | `*.do.dsp.mp.microsoft.com`
    `*.dl.delivery.mp.microsoft.com`
    | **TCP:** 80, 443| 170 | MEM - Win32Apps| Default
    Required | False | `swda01-mscdn.manage.microsoft.com`
    `swda02-mscdn.manage.microsoft.com`
    `swdb01-mscdn.manage.microsoft.com`
    `swdb02-mscdn.manage.microsoft.com`
    `swdc01-mscdn.manage.microsoft.com`
    `swdc02-mscdn.manage.microsoft.com`
    `swdd01-mscdn.manage.microsoft.com`
    `swdd02-mscdn.manage.microsoft.com`
    `swdin01-mscdn.manage.microsoft.com`
    `swdin02-mscdn.manage.microsoft.com` | **TCP:** 443| 97 | Consumer Outlook.com, OneDrive, Device authentication and Microsoft account | Default
    Required | False | `account.live.com`
    `login.live.com`
    |**TCP:** 443 | @@ -113,7 +113,7 @@ ID |Desc |Category |ER |Addresses |Ports| 165 | Autopilot - NTP Sync | Default
    Required | False | `time.windows.com` |**UDP:** 123| 169 | Autopilot - WNS Dependencies| Default
    Required | False | `clientconfig.passport.net`
    `windowsphone.com`
    `*.s-microsoft.com`
    `c.s-microsoft.com` | **TCP:** 443 | 173 | Autopilot - Third party deployment dependencies| Default
    Required | False | `ekop.intel.com`
    `ekcert.spserv.microsoft.com`
    `ftpm.amd.com`
    | **TCP:** 443| -182 | Autopilot - Diagnostics upload| Default
    Required | False | `lgmsapeweu.blob.core.windows.net`
    | **TCP:** 443| +182 | Autopilot - Diagnostics upload | Default
    Required | False | `lgmsapeweu.blob.core.windows.net`
    `lgmsapewus2.blob.core.windows.net`
    `lgmsapesea.blob.core.windows.net`
    `lgmsapeaus.blob.core.windows.net`
    `lgmsapeind.blob.core.windows.net`
    | **TCP:** 443| ### Remote Help @@ -153,10 +153,9 @@ For Intune-managed Windows devices managed using Mobile Device Management (MDM), | --- | ---- | -------- | ----- | --------- | ----- | | 172 | MDM - Delivery Optimization Dependencies | Default
    Required | False | `*.do.dsp.mp.microsoft.com`
    `*.dl.delivery.mp.microsoft.com`
    | **TCP:** 80, 443 | -**Port requirements** - For peer-to-peer traffic, Delivery Optimization uses 7680 for TCP/IP. It uses Teredo on port 3544 for NAT traversal (use of Teredo is optional) -For client-service communication, it uses HTTP or HTTPS over port 80/443. +**Port requirements** - For client-service communication, it uses HTTP or HTTPS over port 80/443. Optionally, for peer-to-peer traffic, Delivery Optimization uses 7680 for TCP/IP and Teredo on port 3544 for NAT traversal. For more information, see [Delivery Optimization documentation](/windows/deployment/do/) -**Proxy requirements** - To use Delivery Optimization, you must allow Byte Range requests. For more information, see [Proxy requirements for Windows Update](/windows/deployment/update/windows-update-troubleshooting). +**Proxy requirements** - To use Delivery Optimization, you must allow Byte Range requests. For more information, see [Proxy requirements for Delivery Optimization](/windows/deployment/do/waas-delivery-optimization-faq#what-are-the-requirements-if-i-use-a-proxy). **Firewall requirements** - Allow the following hostnames through your firewall to support Delivery Optimization. For communication between clients and the Delivery Optimization cloud service: @@ -170,9 +169,10 @@ For Delivery Optimization metadata: | ID | Desc | Category | ER | Addresses | Ports | | --- | ---- | -------- | ----- | --------- | ----- | -| 178 | MEM - Apple Dependencies | Default
    Required | False | `itunes.apple.com`
    `*.itunes.apple.com`
    `*.mzstatic.com`
    `*.phobos.apple.com`
    `phobos.itunes-apple.com.akadns.net`
    `5-courier.push.apple.com`
    `phobos.apple.com`
    `ocsp.apple.com`
    `ax.itunes.apple.com`
    `ax.itunes.apple.com.edgesuite.net`
    `s.mzstatic.com`
    `a1165.phobos.apple.com`
    |**TCP:** 80, 443, 5223| +| 178 | MEM - Apple Dependencies | Default
    Required | False | `itunes.apple.com`
    `*.itunes.apple.com`
    `*.mzstatic.com`
    `*.phobos.apple.com`
    `phobos.itunes-apple.com.akadns.net`
    `*.push.apple.com`
    `phobos.apple.com`
    `ocsp.apple.com`
    `ax.itunes.apple.com`
    `ax.itunes.apple.com.edgesuite.net`
    `s.mzstatic.com`
    `a1165.phobos.apple.com`
    |**TCP:** 80, 443, 5223| For more information, see the following resources: + - [Use Apple products on enterprise networks](https://support.apple.com/HT210060) - [TCP and UDP ports used by Apple software products](https://support.apple.com/HT202944) - [About macOS, iOS/iPadOS, and iTunes server host connections and iTunes background processes](https://support.apple.com/HT201999) @@ -185,7 +185,7 @@ For more information, see the following resources: | 179 | MEM - Android AOSP Dependency | Default
    Required | False | `intunecdnpeasd.azureedge.net`
    | **TCP:** 443 | > [!NOTE] -> Because Google Mobile Services isn't available in China, devices in China managed by Intune can't use features that require Google Mobile Services. These features include: Google Play Protect capabilities such as SafetyNet device attestation, Managing apps from the Google Play Store, +> Because Google Mobile Services isn't available in China, devices in China managed by Intune can't use features that require Google Mobile Services. These features include: Google Play Protect capabilities such as Play Integrity Verdict, Managing apps from the Google Play Store, Android Enterprise capabilities (see this [Google documentation](https://support.google.com/work/android/answer/6270910)). Additionally, the Intune Company Portal app for Android uses Google Mobile Services to communicate with the Microsoft Intune service. Because Google Play services isn't available in China, some tasks can require up to 8 hours to finish. For more information, see [Limitations of Intune management when GMS is unavailable](../apps/manage-without-gms.md#limitations-of-intune-management-when-gms-is-unavailable). **Android port information** - Depending on how you choose to manage Android devices, you may need to open the Google Android Enterprise ports and/or the Android push notification. For more information on Android management methods supported, see the [Android enrollment documentation](deployment-guide-enrollment-android.md). @@ -288,23 +288,35 @@ The following tables list the ports and services that the Intune client accesses |Domains |IP address | |-----------|----------------| | login.microsoftonline.com
    *.officeconfig.msocdn.com
    config.office.com
    graph.windows.net
    enterpriseregistration.windows.net | More information [Office 365 URLs and IP address ranges](https://support.office.com/article/Office-365-URLs-and-IP-address-ranges-8548a211-3fe7-47cb-abb1-355ea5aa88a2) | -|*.manage.microsoft.com
    manage.microsoft.com
    |104.46.162.96/27
    13.67.13.176/28
    13.67.15.128/27
    13.69.231.128/28
    13.69.67.224/28
    13.70.78.128/28
    13.70.79.128/27
    13.71.199.64/28
    13.73.244.48/28
    13.74.111.192/27
    13.77.53.176/28
    13.86.221.176/28
    13.89.174.240/28
    13.89.175.192/28
    20.189.172.160/27
    20.189.229.0/25
    20.191.167.0/25
    20.37.153.0/24
    20.37.192.128/25
    20.38.81.0/24
    20.41.1.0/24
    20.42.1.0/24
    20.42.130.0/24
    20.42.224.128/25
    20.43.129.0/24
    20.44.19.224/27
    20.49.93.160/27
    20.192.174.216/29
    20.192.159.40/29
    20.204.193.12/30
    20.204.193.10/31
    40.119.8.128/25
    40.67.121.224/27
    40.70.151.32/28
    40.71.14.96/28
    40.74.25.0/24
    40.78.245.240/28
    40.78.247.128/27
    40.79.197.64/27
    40.79.197.96/28
    40.80.180.208/28
    40.80.180.224/27
    40.80.184.128/25
    40.82.248.224/28
    40.82.249.128/25
    52.150.137.0/25
    52.162.111.96/28
    52.168.116.128/27
    52.182.141.192/27
    52.236.189.96/27
    52.240.244.160/27| +|*.manage.microsoft.com
    manage.microsoft.com
    |104.46.162.96/27
    13.67.13.176/28
    13.67.15.128/27
    13.69.231.128/28
    13.69.67.224/28
    13.70.78.128/28
    13.70.79.128/27
    13.74.111.192/27
    13.77.53.176/28
    13.86.221.176/28
    13.89.174.240/28
    13.89.175.192/28
    20.189.172.160/27
    20.189.229.0/25
    20.191.167.0/25
    20.37.153.0/24
    20.37.192.128/25
    20.38.81.0/24
    20.41.1.0/24
    20.42.1.0/24
    20.42.130.0/24
    20.42.224.128/25
    20.43.129.0/24
    20.44.19.224/27
    20.192.174.216/29
    20.192.159.40/29
    20.204.193.12/30
    20.204.193.10/31
    40.119.8.128/25
    40.67.121.224/27
    40.70.151.32/28
    40.71.14.96/28
    40.74.25.0/24
    40.78.245.240/28
    40.78.247.128/27
    40.79.197.64/27
    40.79.197.96/28
    40.80.180.208/28
    40.80.180.224/27
    40.80.184.128/25
    40.82.248.224/28
    40.82.249.128/25
    52.150.137.0/25
    52.162.111.96/28
    52.168.116.128/27
    52.182.141.192/27
    52.236.189.96/27
    52.240.244.160/27| --> ## Network requirements for PowerShell scripts and Win32 apps -If you're using Intune to deploy PowerShell scripts or Win32 apps, you also need to grant access to endpoints in which your tenant currently resides. +If you are using Intune for scenarios that use the Intune management extension, like deploying [Win32 apps](../apps/apps-win32-app-management.md), [Powershell scripts](../apps/intune-management-extension.md), [Remediations](../fundamentals/remediations.md), [Endpoint analytics](../../analytics/overview.md), [Custom compliance policies](../protect/compliance-use-custom-settings.md) or [BIOS configuration profiles](../configuration/bios-configuration.md), you also need to grant access to endpoints in which your tenant currently resides. -To find your tenant location (or Azure Scale Unit (ASU), sign in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), choose **Tenant administration** > **Tenant details**. The location is under **Tenant location** as something like North America 0501 or Europe 0202. Look for the matching number in the following table. That row tells you which storage name and CDN endpoints to grant access to. The rows are differentiated by geographic region, as indicated by the first two letters in the names (na = North America, eu = Europe, ap = Asia Pacific). Your tenant location is one of these three regions although your organization's actual geographic location might be elsewhere. +Different endpoints are used depending on your tenant location. To find your tenant location, sign in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), choose **Tenant administration** > **Tenant details** > **Tenant location** with a value of *North America 0501* or similar. Using the region in the location (North America in *North America 0501*), review the table below for the CDN endpoints and ports required: > [!NOTE] > **Allow HTTP Partial response** is required for Scripts & Win32 Apps endpoints. -|Azure Scale Unit (ASU) | Storage name | CDN | Port | -| --- | --- |--- | --- | -|AMSUA0601
    AMSUA0602
    AMSUA0101
    AMSUA0102
    AMSUA0201
    AMSUA0202
    AMSUA0401
    AMSUA0402
    AMSUA0501
    AMSUA0502
    AMSUA0601
    AMSUA0701
    AMSUA0702
    AMSUA0801
    AMSUA0901 | naprodimedatapri
    naprodimedatasec
    naprodimedatahotfix | naprodimedatapri.azureedge.net
    naprodimedatasec.azureedge.net
    naprodimedatahotfix.azureedge.net | **TCP:** 443 | -| AMSUB0101
    AMSUB0102
    AMSUB0201
    AMSUB0202
    AMSUB0301
    AMSUB0302
    AMSUB0501
    AMSUB0502
    AMSUB0601
    AMSUB0701 | euprodimedatapri
    euprodimedatasec
    euprodimedatahotfix | euprodimedatapri.azureedge.net
    euprodimedatasec.azureedge.net
    euprodimedatahotfix.azureedge.net | **TCP:** 443 | -| AMSUC0101
    AMSUC0201
    AMSUC0301
    AMSUC0501
    AMSUC0601
    AMSUD0101| approdimedatapri
    approdimedatasec
    approdimedatahotifx | approdimedatapri.azureedge.net
    approdimedatasec.azureedge.net
    approdimedatahotfix.azureedge.net |**TCP:** 443 | +|Region | CDN | Port | +| --- |------------- | --- | +|North America | naprodimedatapri.azureedge.net
    naprodimedatasec.azureedge.net
    naprodimedatahotfix.azureedge.net
    imeswda-afd-primary.manage.microsoft.com
    imeswda-afd-secondary.manage.microsoft.com
    imeswda-afd-hotfix.manage.microsoft.com | **TCP:** 443 | +|Europe | euprodimedatapri.azureedge.net
    euprodimedatasec.azureedge.net
    euprodimedatahotfix.azureedge.net
    imeswdb-afd-primary.manage.microsoft.com
    imeswdb-afd-secondary.manage.microsoft.com
    imeswdb-afd-hotfix.manage.microsoft.com | **TCP:** 443 | +|Asia Pacific | approdimedatapri.azureedge.net
    approdimedatasec.azureedge.net
    approdimedatahotfix.azureedge.net
    imeswdc-afd-primary.manage.microsoft.com
    imeswdc-afd-secondary.manage.microsoft.com
    imeswdc-afd-hotfix.manage.microsoft.com |**TCP:** 443 | + +## Network requirements for macOS app and script deployments + +If you're using Intune to deploy apps or scripts on macOS, you also need to grant access to endpoints in which your tenant currently resides. + +Different endpoints are used depending on your tenant location. To find your tenant location, sign in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), choose **Tenant administration** > **Tenant details** > **Tenant location** with a value of *North America 0501* or similar. Using the region in the location (North America in *North America 0501*), review the table below for the CDN endpoints and ports required: + +|Region | CDN | Port | +| --- |------------- | --- | +|North America | macsidecar.manage.microsoft.com
    macsidecarprod.azureedge.net
    (azureedge.net domains will be disabled after 3/31/2025) | **TCP:** 443 | +|Europe | macsidecareu.manage.microsoft.com
    macsidecarprodeu.azureedge.net
    (azureedge.net domains will be disabled after 3/31/2025) | **TCP:** 443 | +|Asia Pacific| macsidecarap.manage.microsoft.com
    macsidecarprodap.azureedge.net
    (azureedge.net domains will be disabled after 3/31/2025) |**TCP:** 443 | ## Microsoft Store diff --git a/memdocs/intune/fundamentals/intune-govt-service-description.md b/memdocs/intune/fundamentals/intune-govt-service-description.md index 1f49422a6ff..5c574418725 100644 --- a/memdocs/intune/fundamentals/intune-govt-service-description.md +++ b/memdocs/intune/fundamentals/intune-govt-service-description.md @@ -7,7 +7,7 @@ keywords: author: MandiOhlinger ms.author: mandia manager: dougeby -ms.date: 10/30/2024 +ms.date: 01/21/2025 ms.topic: article ms.service: microsoft-intune ms.suite: ems @@ -89,6 +89,7 @@ The following features are currently not available and aren't supported in GCC H | Expedited updates | For more information on this feature, go to [Expedite Windows quality updates in Microsoft Intune](../protect/windows-10-expedite-updates.md). | | Feature updates | For more information on this feature, go to [Feature updates for Windows in Intune](../protect/windows-10-feature-updates.md). | | Windows Autopilot | The following features are in the planning phase:

    - Customize out-of-box experience (OOBE) and rename devices during provisioning based on organizational structure
    - Self-deploying and pre-provisioning mode
    - More admin-specified configurations delivered before allowing desktop access.
    - Enhanced optional desktop onboarding experience inside the Windows Company Portal app
    - The ability to associate a device with a tenant.

    For information about Windows Autopilot, go to [Windows Autopilot overview](/autopilot/overview). | +| BIOS configuration policies on Windows | For more information on this feature, go to [Use BIOS configuration profiles on Windows devices in Microsoft Intune](../configuration/bios-configuration.md). | ### Not available diff --git a/memdocs/intune/fundamentals/intune-planning-guide.md b/memdocs/intune/fundamentals/intune-planning-guide.md index 2d39a8ba885..364d89ec669 100644 --- a/memdocs/intune/fundamentals/intune-planning-guide.md +++ b/memdocs/intune/fundamentals/intune-planning-guide.md @@ -332,7 +332,7 @@ Managing devices is a relationship with different services. Intune includes the - **[Microsoft Copilot in Intune](../copilot/copilot-intune-overview.md)** is a generative-AI security analysis tool. It accesses your Intune data and can help you manage your policies and settings, understand your security posture, and troubleshoot device issues. - Copilot in Intune is licensed through Microsoft Copilot for Security. For more information, go to [Get started with Microsoft Copilot for Security](/copilot/security/get-started-security-copilot). + Copilot in Intune is licensed through Microsoft Security Copilot. For more information, go to [Get started with Microsoft Security Copilot](/copilot/security/get-started-security-copilot). - **[Intune Suite](intune-add-ons.md)** provides advanced endpoint management and security features, like remote help, Microsoft Cloud PKI, Endpoint Privilege Management, and more. The Intune Suite is available as a separate license. diff --git a/memdocs/intune/fundamentals/intune-us-government-endpoints.md b/memdocs/intune/fundamentals/intune-us-government-endpoints.md index a98b4d7793d..a5632c16243 100644 --- a/memdocs/intune/fundamentals/intune-us-government-endpoints.md +++ b/memdocs/intune/fundamentals/intune-us-government-endpoints.md @@ -8,7 +8,7 @@ keywords: author: Smritib17 ms.author: smbhardwaj manager: dougeby -ms.date: 10/04/2021 +ms.date: 1/16/2025 ms.topic: conceptual ms.service: microsoft-intune ms.subservice: fundamentals @@ -44,7 +44,7 @@ You can modify proxy server settings on individual client computers. You can als Managed devices require configurations that let **All Users** access services through firewalls. > [!NOTE] -> The inspection of SSL traffic is not supported on 'manage.microsoft.us', or 'has.spserv.microsoft.com' endpoint. +> The inspection of SSL traffic is not supported on '*.manage.microsoft.us', or 'has.spserv.microsoft.com' endpoint. For more information about Windows 10 auto-enrollment and device registration for US government customers, see [Set up automatic enrollment for Windows](../enrollment/windows-enroll.md). @@ -52,14 +52,16 @@ The following tables list the ports and services that the Intune client accesses | Endpoint | IP address | |---------------------|-----------| -|*.manage.microsoft.us | 52.227.99.114
    20.141.108.112
    13.72.17.166
    52.126.185.115
    52.227.211.91
    23.97.10.212
    52.227.29.124
    52.247.174.16
    52.227.29.244
    52.227.208.144
    52.227.1.233
    20.141.104.221
    52.247.134.218
    20.141.78.227
    13.77.236.201 | +|*.manage.microsoft.us | 52.227.99.114
    20.141.108.112
    13.72.17.166
    52.126.185.115
    52.227.211.91
    23.97.10.212
    52.227.29.124
    52.247.174.16
    52.227.29.244
    52.227.208.144
    52.227.1.233
    20.141.104.221
    52.247.134.218
    20.141.78.227
    13.77.236.201
    62.10.86.128/25
    62.10.87.128/25
    20.159.110.0/25
    20.159.111.0/25
    | | enterpriseregistration.microsoftonline.us | 13.72.188.239
    13.72.55.179 | -## US Government customer designated endpoints: +## US Government customer designated endpoints + - Azure portal: https:\//portal.azure.us/ - Microsoft 365: https:\//portal.office365.us/ - Intune Company Portal: https:\//portal.manage.microsoft.us/ - Microsoft Intune admin center: https:\//intune.microsoft.us/ + ## Network requirements for PowerShell scripts and Win32 apps If you're using Intune to deploy PowerShell scripts or Win32 apps, you'll also need to grant access to endpoints in which your tenant currently resides. @@ -68,8 +70,20 @@ If you're using Intune to deploy PowerShell scripts or Win32 apps, you'll also n | --- | --- |--- | |FXPASU01 | sovereignprodimedatapri
    sovereignprodimedatasec
    sovereignprodimedatahotfix | sovereignprodimedatapri.azureedge.net
    sovereignprodimedatasec.azureedge.net
    sovereignprodimedatahotfix.azureedge.net | +## Microsoft Defender for Endpoint + +For more information about configuring Defender for Endpoint connectivity, see [Connectivity Requirements](../protect/mde-security-integration.md#connectivity-requirements). + +To support Defender for Endpoint security settings management, allow the following hostnames through your firewall. +For communication between clients and the cloud service: + +- \*.dm.microsoft.us - The use of a wildcard supports the cloud-service endpoints that are used for enrollment, check-in, and reporting, and which can change as the service scales. + + > [!IMPORTANT] + > SSL Inspection is not supported on endpoints required for Microsoft Defender for Endpoint. + +## Partner service endpoints that Intune depends on -## Partner service endpoints that Intune depends on: - Azure AD Sync service: https:\//syncservice.gov.us.microsoftonline.com/DirectoryService.svc - Evo STS: https:\//login.microsoftonline.us - Directory Proxy: https:\//directoryproxy.microsoftazure.us/DirectoryProxy.svc @@ -82,5 +96,6 @@ If you're using Intune to deploy PowerShell scripts or Win32 apps, you'll also n [!INCLUDE [Intune notices](../includes/apple-device-network-information.md)] ## Next steps + [Network endpoints for Microsoft Intune](intune-endpoints.md) diff --git a/memdocs/intune/fundamentals/licenses-assign.md b/memdocs/intune/fundamentals/licenses-assign.md index 61176de9ddc..8a66a825461 100644 --- a/memdocs/intune/fundamentals/licenses-assign.md +++ b/memdocs/intune/fundamentals/licenses-assign.md @@ -6,7 +6,7 @@ keywords: author: Erikre ms.author: erikre manager: dougeby -ms.date: 05/20/2024 +ms.date: 01/24/2025 ms.topic: how-to ms.service: microsoft-intune ms.subservice: fundamentals @@ -30,32 +30,24 @@ ms.collection: # Assign licenses to users so they can enroll devices in Intune -Whether you manually add users or synchronize from your on-premises Active Directory, you must first assign each user an Intune Plan 1 license before users can enroll their devices in Intune. For a list of licenses, see [Microsoft Intune licensing](licenses.md). +Whether you manually add users or synchronize from your on-premises Active Directory, you must first assign each user license before users can enroll their devices in Intune. For a list of licenses, see [Microsoft Intune licensing](licenses.md). > [!NOTE] -> Users assigned Intune app protection policy and not enrolling their devices into Microsoft Intune will also require an Intune license to receive policy. +> Users assigned Intune app protection policy and not enrolling their devices into Microsoft Intune will also require an Intune license to receive the policy. -## Assign an Intune license in the Microsoft Intune admin center +## Assign an Intune license in the Microsoft 365 admin center -You can use the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) to manually add cloud-based users and assign licenses to both cloud-based user accounts and accounts synchronized from your on-premises Active Directory to Microsoft Entra ID. +You can use the [Microsoft 365 admin center](https://go.microsoft.com/fwlink/p/?LinkId=698854) to manually add cloud-based users and assign licenses to both cloud-based user accounts and accounts synchronized from your on-premises Active Directory to Microsoft Entra ID. -1. In the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), select **Users** > **All Users** > choose a user > **Licenses** > **Assignments**. +1. In the [Microsoft 365 admin center](https://go.microsoft.com/fwlink/p/?LinkId=698854), select **Users** > **Active users** > *choose an unlicensed user* > **Licenses and apps**. -2. Choose the box for **Intune** > **Save**. If you want to use the Enterprise Mobility + Security E5 or other license, choose that box instead. +2. Choose the box for **Intune** > **Save changes**. If you want to use the Enterprise Mobility + Security E5 or other license, choose that box instead. For more information about Microsoft Intune licenses, see [Microsoft Intune licensing](licenses.md). - ![Screenshot of the Microsoft 365 admin center Product licenses section.](./media/licenses-assign/mem-assign-license.png) - -3. The user account now has the permissions needed to use the service and enroll devices into management. - - - -## Assign an Intune license by using Microsoft Entra ID - -You can also assign Intune licenses to users by using Microsoft Entra ID. For more information, see the [License users in Microsoft Entra article](/azure/active-directory/active-directory-licensing-group-assignment-azure-portal). +The user account now has the permissions needed to use the service and enroll devices into Intune management. ## Use School Data Sync to assign licenses to users in Intune for Education -If you are an educational organization, you can use School Data Sync (SDS) to assign Intune for Education licenses to synced users. Just choose the Intune for Education checkbox when you're setting up your SDS profile. +If you're an educational organization, you can use School Data Sync (SDS) to assign Intune for Education licenses to synced users. Just choose the Intune for Education checkbox when you're setting up your SDS profile. ![Screenshot of SDS profile setting](./media/licenses-assign/i4e-sds-profile-setup-setting.png) @@ -68,13 +60,13 @@ See this [overview of School Data Sync](https://support.office.com/article/Overv ## How user and device licenses affect access to services - Each **user** that you assign a user software license to may access and use the online services and related software (including System Center software) to manage applications and up to 15 MDM devices. -- You can purchase licenses for any devices separately from user licenses. Device licenses do not need to be assigned to the devices. Each device that accesses and uses the online services and related software (including System Center software) must have a device license available in the Microsoft 365 tenant. +- You can purchase licenses for any devices separately from user licenses. Device licenses don't need to be assigned to the devices. Each device that accesses and uses the online services and related software (including System Center software) must have a device license available in the Microsoft 365 tenant. - If a device is used by more than one user, each device requires a device based software license or all users require a user software license. - If you remove a license from a user that has managed devices, it may affect the compliance or management of those devices. ## How to restore users accidentally unlicensed -- If you have accidentally removed the license for one or more users, you can restore their device compliance and management by re-assigning the license for those users. For more information, see [Assign Microsoft Intune licenses](#assign-an-intune-license-in-the-microsoft-intune-admin-center). +- If you have accidentally removed the license for one or more users, you can restore their device compliance and management by re-assigning the license for those users. For more information, see [Assign Microsoft Intune licenses](#assign-an-intune-license-in-the-microsoft-365-admin-center). ## Understanding the type of licenses you have purchased @@ -84,6 +76,26 @@ How you purchased Intune determines your subscription information: - If you purchased Intune through a Cloud Solution Provider, check with your reseller. - If you purchased Intune with a CC# or Invoice, then your licenses will be user-based. +## Look up current licenses + +You must use [Microsoft 365 admin center](https://go.microsoft.com/fwlink/p/?LinkId=698854) to manage your licenses. However, you can view license details in Microsoft Intune admin center and Microsoft Entra admin center. + +### Microsoft 365 admin center + +Using the [Microsoft 365 admin center](https://go.microsoft.com/fwlink/p/?LinkId=698854), you can manage the subscription licenses your organization has available. To find these details, sign-in to the [Microsoft 365 admin center](https://go.microsoft.com/fwlink/p/?LinkId=698854), select **Billing** > **Licenses**, then select the **Subscriptions** tab. Additionally, you can view the products owned by your organization in the [Microsoft 365 admin center](https://go.microsoft.com/fwlink/p/?LinkId=698854) by selecting **Billing** > **Your products**, then select the **Products** tab. The [Microsoft 365 admin center](https://go.microsoft.com/fwlink/p/?LinkId=698854) also provides licenses details for users by selecting **Users** > **Active users** > *select a user* > **Licenses and apps**. + +> [!NOTE] +> Managing licenses is only available with in the Microsoft 365 Admin Center. + +### Microsoft Intune admin center + +Using the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), you can view the **Total licensed users** and the **Total Intune licenses**. To find these details, sign-in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), select **Tenant administration** > **Tenant status** and select the **Tenant details** tab. Additionally, you can view the assigned licenses available for a user in Intune by selecting **Users** > *select a user* > **Licenses**. + +### Microsoft Entra admin center + +Much like Microsoft Intune admin center, you can use the [Microsoft Entra admin center](https://entra.microsoft.com) to view available product licenses and assigned user license. To view product licenses in the [Microsoft Entra admin center](https://entra.microsoft.com), select **Licenses** under the **Billing** section, and select **All products**. To view the assigned licenses available for a user, select **Users** > **All users** > *select a user* > **Licenses**. + + ## Look up current licenses using PowerShell To view the number of free and used licenses on a Microsoft Intune subscription, you can use the following steps to run PowerShell commands. @@ -116,9 +128,9 @@ A list of the **Account ID**, the **Active Units**, and the **Consumed Units** w Organizations that use Microsoft Enterprise Mobility + Security (formerly Enterprise Mobility Suite) might have users who only require Microsoft Entra ID P1 or P2 or Intune services in the EMS package. You can assign one or a subset of services using [Microsoft Graph PowerShell cmdlets](/powershell/module/microsoft.graph.users.actions/set-mguserlicense). -To selectively assign user licenses for EMS services, open PowerShell as an administrator on a computer with the [Microsoft Graph PowerShel](/powershell/microsoftgraph/installation) installed. You can install PowerShell on a local computer or on an ADFS server. +To selectively assign user licenses for EMS services, open PowerShell as an administrator on a computer with the [Microsoft Graph PowerShell](/powershell/microsoftgraph/installation) installed. You can install PowerShell on a local computer or on an ADFS server. -You must create a new license SKU definition that applies only to the desired service plans. To do this, disable the plans you don't want to apply. For example, you might create a license SKU definition that does not assign an Intune license. To see a list of available services, type: +You must create a new license SKU definition that applies only to the desired service plans. To do this, disable the plans you don't want to apply. For example, you might create a license SKU definition that doesn't assign an Intune license. To see a list of available services, type: ```powershell (Get-MgSubscribedSku | Where {$_.SkuPartNumber -eq "EMS"}).ServiceStatus diff --git a/memdocs/intune/fundamentals/licenses.md b/memdocs/intune/fundamentals/licenses.md index bd538e0c96f..da78ff7a575 100644 --- a/memdocs/intune/fundamentals/licenses.md +++ b/memdocs/intune/fundamentals/licenses.md @@ -109,7 +109,7 @@ You can purchase device licenses based on your estimated usage. Microsoft Intune When a device is enrolled by using a device license, the following Intune functions aren't supported: - [Intune app protection policies](../apps/app-protection-policy.md) -- [Conditional access](../protect/conditional-access.md) +- [Conditional Access](../protect/conditional-access.md) - User-based management features, such as email and calendaring ## Confirm your licenses diff --git a/memdocs/intune/fundamentals/microsoft-intune-service-description.md b/memdocs/intune/fundamentals/microsoft-intune-service-description.md index f5b6f80f952..9000bd78154 100644 --- a/memdocs/intune/fundamentals/microsoft-intune-service-description.md +++ b/memdocs/intune/fundamentals/microsoft-intune-service-description.md @@ -66,7 +66,7 @@ Because the mobile device management ecosystem changes frequently with operating * [What's new in Microsoft Intune](whats-new.md). This topic is updated with the monthly service update and weekly when, for example, apps such as the Company Portal app are released. -* Important service updates are also announced in the [Microsoft 365 admin center](https://admin.microsoft.com/) Message Center. If you install the companion [Microsoft 365 Admin mobile app](https://support.office.com/article/Office-365-Admin-Mobile-App-e16f6421-2a1a-4142-bf9d-9846600a060a), you can receive notifications on your mobile device. Learn more about how to work with the [Microsoft 365 Message Center](https://support.office.com/client/results?Shownav=true&ns=O365ENTADMIN&version=15&ver=15&HelpID=O365E_MCManageUpdates). +* Important service updates are also announced in the [Microsoft 365 admin center](https://admin.microsoft.com/) Message Center. If you install the companion [Microsoft 365 Admin mobile app](https://support.office.com/article/Office-365-Admin-Mobile-App-e16f6421-2a1a-4142-bf9d-9846600a060a), you can receive notifications on your mobile device. Learn more about how to work with the [Microsoft 365 Message Center](/microsoft-365/admin/manage/message-center). A few helpful hints: diff --git a/memdocs/intune/fundamentals/migrate-to-intune.md b/memdocs/intune/fundamentals/migrate-to-intune.md index edb56701467..740aac8b982 100644 --- a/memdocs/intune/fundamentals/migrate-to-intune.md +++ b/memdocs/intune/fundamentals/migrate-to-intune.md @@ -136,7 +136,7 @@ To evaluate and migrate policies from Basic Mobility and Security to Intune: :::image type="content" source="./media/migrate-to-intune/recommendations-page.png" alt-text="Screenshot of migration evaluation example in the Microsoft Intune admin center after migrating Microsoft 365 Basic Mobility and Security policies to Intune"::: - Not all device settings correspond exactly to Intune settings and values. So, they can't be moved with precise one-to-one mapping. You need to review and possibly adjust these settings. - - The conditional access (CA) settings that control the Office 365 services are the same CA policies in Microsoft Entra ID. So, you don't need to review or make changes to them unless you want to. + - The Conditional Access (CA) settings that control the Office 365 services are the same CA policies in Microsoft Entra ID. So, you don't need to review or make changes to them unless you want to. 4. Select an item in the list. The **Compliance policy recommendation overview** page opens. Review the instructions. 5. Select **Details** to review the recommended settings and group assignments: @@ -206,13 +206,13 @@ This section describes what happens behind the scenes when you migrate from Basi - [Configurations policy mapping from Basic Mobility and Security to Intune](policy-map-configurations.md) - [Miscellaneous policy mapping from Basic Mobility and Security to Intune](policy-map-miscellaneous.md) -- When you complete the migration, your migrated policies are in Microsoft Intune admin center. The new policies include compliance policies, device configuration profiles, and conditional access policies. The new policies are in the following locations: +- When you complete the migration, your migrated policies are in Microsoft Intune admin center. The new policies include compliance policies, device configuration profiles, and Conditional Access policies. The new policies are in the following locations: | Intune policy type | Intune location | | --- | --- | | [Compliance policies](../protect/device-compliance-get-started.md)

    Specify the device settings as access requirements. | [Microsoft Intune Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) > **Devices** > **Compliance** | | [Configuration profiles](../configuration/device-profiles.md)

    Specify other settings that aren't part of the access requirements, including email profiles. | [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) > **Devices** > **Manage devices** > **Configuration** | - | [Conditional access policies]( ../protect/conditional-access.md)

    Microsoft Entra Conditional Access blocks access if the settings aren't compliant. | [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) > **Devices** > **Conditional access** > **Classic policies** | + | [Conditional Access policies]( ../protect/conditional-access.md)

    Microsoft Entra Conditional Access blocks access if the settings aren't compliant. | [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) > **Devices** > **Conditional Access** > **Classic policies** | ## Known issues diff --git a/memdocs/intune/fundamentals/multi-admin-approval.md b/memdocs/intune/fundamentals/multi-admin-approval.md index 7da061c925f..6925f3e27cf 100644 --- a/memdocs/intune/fundamentals/multi-admin-approval.md +++ b/memdocs/intune/fundamentals/multi-admin-approval.md @@ -51,7 +51,7 @@ To create an access policy, your account must be assigned the [*Intune Service A To be an approver for access policies, an account must be in the approver group that’s assigned to the access policy for a specific type of resource. -If your organization allows unlicensed administrators for Intune roles, all approver groups must also be a member group of one or more Intune role assignments. +If your organization allows unlicensed administrators for Intune roles, all approver groups must also be a member group of one or more Intune role assignments. There is no specific requirement for which role assignment the approver group must be added to. If the approver group is not added to a role assignment this will result in approver group members being removed from the group periodically. ## How multi admin approval and Access policies work diff --git a/memdocs/intune/fundamentals/policy-map-miscellaneous.md b/memdocs/intune/fundamentals/policy-map-miscellaneous.md index c0d9687ca8e..1610d6b7828 100644 --- a/memdocs/intune/fundamentals/policy-map-miscellaneous.md +++ b/memdocs/intune/fundamentals/policy-map-miscellaneous.md @@ -83,7 +83,7 @@ These settings are backed by the Conditional Access policy [GraphAggregatorServi This setting modifies one classic Conditional Access policy: -- **Endpoint security** > **Conditional access** > **Classic policies** > **[GraphAggregatorService] Device policy** > **Conditions** > **Client apps (Preview)** > **Mobile apps and desktop clients** > **Exchange ActiveSync clients** > **Apply policy only to supported platform** +- **Endpoint security** > **Conditional Access** > **Classic policies** > **[GraphAggregatorService] Device policy** > **Conditions** > **Client apps (Preview)** > **Mobile apps and desktop clients** > **Exchange ActiveSync clients** > **Apply policy only to supported platform** ### Are there any security groups you want to exclude from access control? @@ -95,7 +95,7 @@ This setting modifies five classic Conditional Access policies: - [Office 365 SharePoint Online] Device policy - [Outlook Service for OneDrive] Device policy -- **Endpoint security** > **Conditional access** > policy name > **Users and groups** > **Exclude** +- **Endpoint security** > **Conditional Access** > policy name > **Users and groups** > **Exclude** ## Device security policy Name and Description diff --git a/memdocs/intune/fundamentals/remote-help-android.md b/memdocs/intune/fundamentals/remote-help-android.md index 681ad9aca70..650e82bf80b 100644 --- a/memdocs/intune/fundamentals/remote-help-android.md +++ b/memdocs/intune/fundamentals/remote-help-android.md @@ -233,13 +233,7 @@ In this section: > [!IMPORTANT] > If the device is running in kiosk mode, the Settings app (which is where the permission is granted) needs to be designated as a system app so that it can launch. See [Granting overlay permissions to Managed Home Screen for Android Enterprise dedicated devices](https://techcommunity.microsoft.com/t5/intune-customer-success/granting-overlay-permissions-to-managed-home-screen-for-android/ba-p/3247041) for detailed instructions. -The Remote Help app needs the **Display over other apps** or **Appear on top** permission to display the Remote Help session UI. To grant this permission, complete the following steps: - -1. After installing the Remote Help app, launch it. - -2. If the permission isn't already granted, the app displays a prompt that launches **Settings** to grant the permission. - -3. Tap **Grant** on the prompt, scroll down to **Appear on top** and turn the setting **On**. (The specific UI may differ depending on your device.) +The Remote Help app needs the **Display over other apps** or **Appear on top** permission to display the Remote Help session UI. To grant this permission, create an OEMConfig profile that configures the permissions in the OEMConfig app. ##### Knox KLMS Agent consent diff --git a/memdocs/intune/fundamentals/remote-help-macos.md b/memdocs/intune/fundamentals/remote-help-macos.md index 1965687d518..61c43edbacd 100644 --- a/memdocs/intune/fundamentals/remote-help-macos.md +++ b/memdocs/intune/fundamentals/remote-help-macos.md @@ -56,7 +56,7 @@ The Remote Help web app supports the following capabilities on macOS: - **Use Remote Help with unenrolled devices**: Disabled by default, you can choose to allow help to devices that aren't enrolled with Intune. -- **Conditional access**: Administrators can now utilize conditional access capability when setting up policies and conditions for Remote Help. For more information on setting up conditional access, see [Setup Conditional Access for Remote Help](remote-help-windows.md#setup-conditional-access-for-remote-help). +- **Conditional Access**: Administrators can now utilize Conditional Access capability when setting up policies and conditions for Remote Help. For more information on setting up Conditional Access, see [Setup Conditional Access for Remote Help](remote-help-windows.md#setup-conditional-access-for-remote-help). - **Compliance Warnings**: Remote Help will show non-compliance warnings if the device the helper is connecting to isn't compliant with its assigned policies. This warning doesn't block access but provides transparency about the risk of using sensitive data like administrative credentials during the session. @@ -88,7 +88,6 @@ General prerequisites for Remote Help are listed here [Prerequisites for Remote ### Remote Help Native macOS App supported operating systems -- macOS 12 (Monterey) - macOS 13 (Ventura) - macOS 14 (Sonoma) - macOS 15 (Sequoia) diff --git a/memdocs/intune/fundamentals/remote-help-webapp.md b/memdocs/intune/fundamentals/remote-help-webapp.md index 2f7e86b7e2a..55e1e2002e8 100644 --- a/memdocs/intune/fundamentals/remote-help-webapp.md +++ b/memdocs/intune/fundamentals/remote-help-webapp.md @@ -45,7 +45,7 @@ The Remote Help web app supports the following capabilities: Use Remote Help with unenrolled devices: Disabled by default, you can choose to allow help to devices that aren't enrolled with Intune. -- **Conditional access**: Administrators can now utilize conditional access capability when setting up policies and conditions for Remote Help. For more information on setting up conditional access, go to [Setup Conditional Access for Remote Help](remote-help-windows.md#setup-conditional-access-for-remote-help). +- **Conditional Access**: Administrators can now utilize Conditional Access capability when setting up policies and conditions for Remote Help. For more information on setting up Conditional Access, go to [Setup Conditional Access for Remote Help](remote-help-windows.md#setup-conditional-access-for-remote-help). - **Compliance Warnings**: Before connecting to a user's device, a helper will see a non-compliance warning about that device if it's not compliant with its assigned policies. This warning doesn’t block access but provides transparency about the risk of using sensitive data like administrative credentials during the session. diff --git a/memdocs/intune/fundamentals/remote-help-windows.md b/memdocs/intune/fundamentals/remote-help-windows.md index 568e10cd49a..f7ab9b00ab2 100644 --- a/memdocs/intune/fundamentals/remote-help-windows.md +++ b/memdocs/intune/fundamentals/remote-help-windows.md @@ -48,7 +48,7 @@ The Remote Help app is available from Microsoft to install on both devices enrol The Remote Help app supports the following capabilities on Windows: -- **Conditional access**: Administrators can now utilize conditional access capability when setting up policies and conditions for Remote Help. For example, multi-factor authentication, installing security updates, and locking access to Remote Help for a specific region or IP addresses. For more information on setting up conditional access, go to [Setup Conditional Access for Remote Help](#setup-conditional-access-for-remote-help) +- **Conditional Access**: Administrators can now utilize Conditional Access capability when setting up policies and conditions for Remote Help. For example, multi-factor authentication, installing security updates, and locking access to Remote Help for a specific region or IP addresses. For more information on setting up Conditional Access, go to [Setup Conditional Access for Remote Help](#setup-conditional-access-for-remote-help) - **Compliance Warnings**: Before a helper can connect to a user's device, the helper sees a non-compliance warning about that device if it's not compliant with its assigned policies. This warning doesn't block access but provides transparency about the risk of using sensitive data like administrative credentials during the session. @@ -117,6 +117,10 @@ Download the latest version of Remote Help direct from Microsoft at [aka.ms/down The most recent version of Remote Help is **5.1.1419.0** +### Deploy Remote Help as an Enterprise App Catalog app +The Enterprise App Catalog is a collection of prepackaged Win32 apps that have been designed and prepared by Microsoft to support Intune. An Enterprise App Catalog app is a Windows app that you can add via the Enterprise App Catalog in Intune. This app type leverages the Win32 platform and has support for customizable capabilities. Remote Help is available in the Enterprise App Catalog. To learn more, see [Add an Enterprise App Catalog app to Microsoft Intune](/mem/intune/apps/apps-add-enterprise-app#add-a-windows-catalog-app-win32-to-intune). + + ### Deploy Remote Help as a Win32 app To deploy Remote Help with Intune, you can add the app as a Windows Win32 app, and define a detection rule to identify devices that don't have the most current version of Remote Help installed. Before you can add Remote Help as a Win32 app, you must repackage *remotehelpinstaller.exe* as a *.intunewin* file, which is a Win32 app file you can deploy with Intune. For information on how to repackage a file as a Win32 app, see [Prepare the Win32 app content for upload](../apps/apps-win32-prepare.md). @@ -275,9 +279,9 @@ Depending on the environment that Remote Help is utilized in, it may be necessar - C:\Program Files\Remote help\RHService.exe - C:\Program Files\Remote help\RemoteHelpRDP.exe -## Setup conditional access for Remote Help +## Setup Conditional Access for Remote Help -This section outlines the steps for provisioning the Remote Help service on the tenant for conditional access. +This section outlines the steps for provisioning the Remote Help service on the tenant for Conditional Access. 1. Open PowerShell in admin mode. - It may be necessary to install [Microsoft Graph PowerShell](/powershell/microsoftgraph/installation)  diff --git a/memdocs/intune/fundamentals/remote-help.md b/memdocs/intune/fundamentals/remote-help.md index 988ed027dc7..193cc02faaa 100644 --- a/memdocs/intune/fundamentals/remote-help.md +++ b/memdocs/intune/fundamentals/remote-help.md @@ -87,19 +87,18 @@ For specific prerequisites based on the platform that you're using, go to: Limitations: +- You cannot establish a Remote Help session from one tenant to a different tenant. +- Remote Help might not be available in all markets or localizations. - Remote Help is supported in Government Community Cloud (GCC) environments on the following platforms: - Windows 10/11 - Windows 10/11 on ARM64 devices - Windows 365 - Samsung and Zebra devices enrolled as Android Enterprise dedicated devices - - macOS 12, 13, 14, and 15 + - macOS 13, 14, and 15 Remote Help isn't supported on GCC High or DoD (U.S. Department of Defense) tenants. For more information, go to [Microsoft Intune for US Government GCC High and DoD service description](intune-govt-service-description.md). - - You cannot establish a Remote Help session from one tenant to a different tenant. - - Remote Help might not be available in all markets or localizations. - ## Supported platforms and devices This feature applies to: @@ -109,7 +108,7 @@ This feature applies to: - Windows 10 on ARM64 devices - Windows 365 - Android Enterprise Dedicated (Samsung and Zebra devices) -- macOS 12, 13, 14, and 15 +- macOS 13, 14, and 15 ## Data and privacy diff --git a/memdocs/intune/fundamentals/role-based-access-control-reference.md b/memdocs/intune/fundamentals/role-based-access-control-reference.md index 14ea9f58d98..66921ba74d5 100644 --- a/memdocs/intune/fundamentals/role-based-access-control-reference.md +++ b/memdocs/intune/fundamentals/role-based-access-control-reference.md @@ -186,7 +186,7 @@ Application Managers manage mobile and managed applications, can read device inf ## Endpoint Security Manager -Manages security and compliance features such as security baselines, device compliance, conditional access, and Microsoft Defender ATP. +Manages security and compliance features such as security baselines, device compliance, Conditional Access, and Microsoft Defender ATP. | Permission | Action | | ---------- | ------ | diff --git a/memdocs/intune/fundamentals/role-based-access-control.md b/memdocs/intune/fundamentals/role-based-access-control.md index b5bef210f22..40fc2b496b5 100644 --- a/memdocs/intune/fundamentals/role-based-access-control.md +++ b/memdocs/intune/fundamentals/role-based-access-control.md @@ -7,7 +7,7 @@ keywords: author: Smritib17 ms.author: smbhardwaj manager: dougeby -ms.date: 06/20/2024 +ms.date: 12/02/2024 ms.topic: conceptual ms.service: microsoft-intune ms.subservice: fundamentals @@ -18,7 +18,7 @@ ms.localizationpriority: high #ROBOTS: #audience: -ms.reviewer: +ms.reviewer: davidra ms.suite: ems search.appverid: MET150 #ms.tgt_pltfrm: @@ -59,7 +59,7 @@ You can assign built-in roles to groups without further configuration. You can't - **Application Manager**: Manages mobile and managed applications, can read device information and can view device configuration profiles. - **Endpoint Privilege Manager**: Manages Endpoint Privilege Management policies in the Intune console. - **Endpoint Privilege Reader**: Endpoint Privilege Readers can view Endpoint Privilege Management policies in the Intune console. -- **Endpoint Security Manager**: Manages security and compliance features, such as security baselines, device compliance, conditional access, and Microsoft Defender for Endpoint. +- **Endpoint Security Manager**: Manages security and compliance features, such as security baselines, device compliance, Conditional Access, and Microsoft Defender for Endpoint. - **Help Desk Operator**: Performs remote tasks on users and devices, and can assign applications or policies to users or devices. - **Intune Role Administrator**: Manages custom Intune roles and adds assignments for built-in Intune roles. It's the only Intune role that can assign permissions to Administrators. - **Policy and Profile Manager**: Manages compliance policy, configuration profiles, Apple enrollment, corporate device identifiers, and security baselines. @@ -77,7 +77,7 @@ You can create your own roles with custom permissions. For more information abou ### Microsoft Entra roles with Intune access -Microsoft recommends following the principle of least-permissions by only assigning the minimum required permissions for an administrator to perform their duties. Global Administrator and Intune Service Administrator +Microsoft recommends following the principle of least-permissions by only assigning the minimum required permissions for an administrator to perform their duties. Global Administrator and Intune Service Administrator are [privileged roles](/entra/identity/role-based-access-control/privileged-roles-permissions) and assignment should be limited. | Microsoft Entra role | All Intune data | Intune audit data | @@ -97,6 +97,16 @@ are [privileged roles](/entra/identity/role-based-access-control/privileged-role > [!TIP] > Intune also shows three Microsoft Entra extensions: **Users**, **Groups**, and **Conditional Access**, which are controlled using Microsoft Entra RBAC. Additionally, the **User Account Administrator** only performs Microsoft Entra user/group activities and does not have full permissions to perform all activities in Intune. For more information, see [RBAC with Microsoft Entra ID](/azure/active-directory/active-directory-assign-admin-roles). +## Privileged Identity Management for Intune + +Intune supports two methods of role elevation. There are performance and least privilege differences between the two methods. + +- **Method 1**: Create a just-in-time (JIT) policy with [Microsoft Entra Privileged Identity Management (PIM)](/entra/id-governance/privileged-identity-management/pim-configure) for the Microsoft Entra built-in **Intune Administrator** role and assign it an administrator account. + +- **Method 2**: Utilize [Privileged Identity Management (PIM) for Groups](/entra/id-governance/privileged-identity-management/concept-pim-for-groups) with an Intune RBAC role assignment. For more information about using PIM for Groups with Intune RBAC roles, see: [Configuring Microsoft Intune just-in-time admin access with Microsoft Entra PIM for Groups | Microsoft Community Hub](https://techcommunity.microsoft.com/blog/intunecustomersuccess/configuring-microsoft-intune-just-in-time-admin-access-with-azure-ad-pim-for-gro/3843972) + +When using PIM elevation for Microsoft Entra ID built-in Intune Administrator role, elevation typically happens within 10 seconds. PIM Groups based elevation for Intune Custom Roles can take up to 15 minutes to be applied. + ## Role assignments A role assignment defines: diff --git a/memdocs/intune/fundamentals/scope-tags.md b/memdocs/intune/fundamentals/scope-tags.md index dfba98b9037..97c19ce0e90 100644 --- a/memdocs/intune/fundamentals/scope-tags.md +++ b/memdocs/intune/fundamentals/scope-tags.md @@ -8,7 +8,7 @@ keywords: author: Smritib17 ms.author: smbhardwaj manager: dougeby -ms.date: 09/29/2023 +ms.date: 11/26/2023 ms.topic: how-to ms.service: microsoft-intune ms.subservice: fundamentals @@ -55,6 +55,8 @@ The default scope tag feature is similar to the security scopes feature in Micro ## To create a scope tag +Creating, updating or deleting scope tags requires an administrator assigned the Global Administrator or Intune Adminstrator Entra ID role. Administrators with a scope tag in their role assignment cannot update or delete the scope tag from the master list of scope tags. + 1. In the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), choose **Tenant administration** > **Roles** > **Scope (Tags)** > **Create**. 2. On the **Basics** page, provide a **Name** and optional **Description**. Choose **Next**. 3. On the **Assignments** page, choose the groups containing the devices that you want to assign this scope tag. Choose **Next**. @@ -88,7 +90,7 @@ For objects that support scope tags, scope tags usually appear under **Propertie 1. In the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), choose **Devices** > **Manage devices** > **Configuration** > choose a profile. 2. Choose **Properties** > **Scope (Tags)** > **Edit** > **Select scope tags** > choose the tags that you want to add to the profile. You can assign a maximum of 100 scope tags to an object. -4. Choose **Select** > **Review + save**. +3. Choose **Select** > **Review + save**. ## Scope tag details diff --git a/memdocs/intune/fundamentals/tenant-status.md b/memdocs/intune/fundamentals/tenant-status.md index 450af88d909..5254171d81a 100644 --- a/memdocs/intune/fundamentals/tenant-status.md +++ b/memdocs/intune/fundamentals/tenant-status.md @@ -85,7 +85,7 @@ For example, if you select the **VPP Expiry Date** connector, the **iOS Volume-P ## Service health and message center -The Service health and message center page are where you can view details about the Intune *Service health*, *Issues in your environment that require action*, and *Message center* posts that can provide information about updates and planned changes. +The Service health and message center page is where you can view details about the Intune *Service health*, *Issues in your environment that require action*, and *Message center* posts that can provide information about updates and planned changes. You can only set up your communication preferences for Intune Message center through the Microsoft 365 admin center. To do so, sign in to the [Microsoft 365 admin center](https://admin.microsoft.com/) and go to **Health** > **Service health**. Select **Customize**, and then open the **Email** tab. On the *Email* tab, select the checkbox for **Send me email notifications about service health**, and then configure the additional preferences to meet your requirements. ### Service health diff --git a/memdocs/intune/fundamentals/tutorial-walkthrough-endpoint-manager.md b/memdocs/intune/fundamentals/tutorial-walkthrough-endpoint-manager.md index c9dea49e46f..265e92e9a8b 100644 --- a/memdocs/intune/fundamentals/tutorial-walkthrough-endpoint-manager.md +++ b/memdocs/intune/fundamentals/tutorial-walkthrough-endpoint-manager.md @@ -108,7 +108,7 @@ Follow the steps below to better understand Intune in the Microsoft Intune admin 5. From the **Devices - Overview** pane, select **Conditional Access** to display details about access policies. - :::image type="content" alt-text="Screenshot of the Microsoft Intune admin center - Conditional access." source="./media/tutorial-walkthrough-endpoint-manager/tutorial-walkthrough-mem-05.png" lightbox="./media/tutorial-walkthrough-endpoint-manager/tutorial-walkthrough-mem-05.png"::: + :::image type="content" alt-text="Screenshot of the Microsoft Intune admin center - Conditional Access." source="./media/tutorial-walkthrough-endpoint-manager/tutorial-walkthrough-mem-05.png" lightbox="./media/tutorial-walkthrough-endpoint-manager/tutorial-walkthrough-mem-05.png"::: > [!TIP] > If you have previously used Intune in the Azure portal, you found the above details in the Azure portal by signing in to [Intune](https://go.microsoft.com/fwlink/?linkid=2090973) and selecting **Conditional Access**. diff --git a/memdocs/intune/fundamentals/users-add.md b/memdocs/intune/fundamentals/users-add.md index 1942dd322dc..fbf4a501b2f 100644 --- a/memdocs/intune/fundamentals/users-add.md +++ b/memdocs/intune/fundamentals/users-add.md @@ -7,7 +7,7 @@ keywords: author: Smritib17 ms.author: smbhardwaj manager: dougeby -ms.date: 09/27/2023 +ms.date: 01/23/2025 ms.topic: how-to ms.service: microsoft-intune ms.subservice: fundamentals @@ -30,72 +30,105 @@ ms.collection: # Add users and grant administrative permission to Intune -As an administrator, you can add users directly or synchronize users from your on-premises Active Directory. Once added, users can enroll devices and access company resources. You can also give users more permissions including *global administrator* and *service administrator* permissions. +As an administrator, you can add users directly or synchronize users from your on-premises Active Directory. Once added and enabled, users can enroll devices and access company resources. You can also give users more permissions including *global administrator* and *service administrator* permissions. ## Add users to Intune -You can manually add users to your Intune subscription via the [Microsoft 365 admin center](https://admin.microsoft.com) or the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431). An administrator can edit user accounts to assign Intune licenses. You can assign licenses in either the Microsoft 365 admin center or the Microsoft Intune admin center. For more information on using the Microsoft 365 admin center, see [Add users individually or in bulk to the Microsoft 365 admin center](https://support.office.com/article/Add-users-individually-or-in-bulk-to-Office-365-Admin-Help-1970f7d6-03b5-442f-b385-5880b9c256ec). - -### Add Intune users in the Microsoft 365 admin center - -1. Sign in to [Microsoft 365 admin center](https://admin.microsoft.com) with a global administrator or user management administrator account. -2. In the Microsoft 365 menu, select **Users** > **Active users** > **Add a user**. -3. Provide the following user details: - - **First name** - - **Last name** - - **Display name** - - **User name** - Universal principle name (UPN) stored in Microsoft Entra ID used to access the service. - - **Password** - Autogenerate or create. -4. Choose **Next**. -5. In the **Assign product licenses** page, select a **Location** and then choose a license for this user. A license including Intune is required. -6. Choose **Next**. -7. In the **Optional settings** page, you can - - Assign the new user more roles (by default the new user is given the User role). - - Provide profile information. -8. Choose **Next**. -9. On the **Review and finish** page, select **Finish adding** to add the user. Choose **Close** to close the **Add a user** page. - -> [!NOTE] -> If you're moving to Microsoft 365 from an Office 365 subscription, your users and groups are already in Microsoft Entra ID. Intune uses the same Microsoft Entra ID, and can use the existing users and groups. +You can manually add users to your Intune subscription via the [Microsoft 365 admin center](https://admin.microsoft.com), the [Microsoft Entra admin center](https://entra.microsoft.com), or the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431). In addition, an administrator can edit user accounts to assign Intune licenses. You can assign licenses in either the Microsoft 365 admin center or the Microsoft Intune admin center. For more information on using the Microsoft 365 admin center, see [Add users individually or in bulk to the Microsoft 365 admin center](https://support.office.com/article/Add-users-individually-or-in-bulk-to-Office-365-Admin-Help-1970f7d6-03b5-442f-b385-5880b9c256ec). For more information on using the Microsoft Entra admin center, see [How to create, invite, and delete users](/entra/fundamentals/how-to-create-delete-users). ### Add individual Intune users in the Microsoft Intune admin center 1. In the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), choose **Users** > **All users** > **New user** > **Create new user**. -2. Specify the following user details: - - **User name** - The new name that the user will use to sign in to Microsoft Entra ID. - - **Name** - The user's given name. - - **First name** - The user's first name. - - **Last name** - The user's last name. -3. Choose whether you want to create the password for the new user or have it autogenerated. -4. To assign the new user to groups (optional), choose **0 groups selected** to open the **Groups** pane. Here you can select the groups you want to assign to the user. When finished selecting groups, choose **Select**. -5. By default, the new user is assigned the role of **User**. If you want to add roles to the user, select **User** under **Groups and roles**. In the **Directory roles** pane, select the roles you want to assign to the user and then choose **Select**. -6. If you want to block the user from signing in, you can select **Yes** for **Block sign in**. Make sure to switch this back to **No** when you're ready to let the user sign in. -7. Choose a **Usage location** for the new user. Usage location is required before you can assign the new user an Intune license. -8. Optionally, you can provide information for the **Job title**, **Department**, **Company name**, and **Manager** fields. -9. Select **Create** to add the new user to Intune. +2. On the **Basics** tab, add the following user details: + - **User principal name** - Universal principle name (UPN) stored in Microsoft Entra ID used to access the service. + - **Mail nickname** - If you need to enter an email nickname that is different from the user principal name you entered, uncheck the **Derive from user principal name** option, then enter the mail nickname.. + - **Display name** - The user's name, , such as Chris Green or Chris A. Green. + - **Password** - Add a password for the new user or choose to have it autogenerated. + - **Account enabled** - Choose to enable the account once it is created. If not checked, this user will be blocked from signing in. This can be updated after user creation. + + Either select the **Review + create** button to create the new user or **Next: Properties** to complete the next section. + +3. On the **Properties** tab, add the following details: + - **Identity:** + - **FirstName** + - **Last name** + - **User type** - Choose either **Member** or **Guest**. Both of these user types are internal to your organization. Members are commonly full-time employees in your organization. Guests have an account in your tenant, but have guest-level privileges. It's possible they were created within your tenant prior to the availability of B2B collaboration. + - **Authorization info** - You can add up to 5 certificate user IDs. These are used as a part of Certificate Based Authentication and require a specific format. For more information, see [Mapping to the certificateUserIds attribute in Microsoft Entra ID](/entra/identity/authentication/concept-certificate-based-authentication-certificateuserids). + - **Job information:** Add any job-related information, such as the user's job title, department, or manager. + - **Contact information:** Add any relevant contact information for the user. + - **Parental controls:** For organizations like K-12 school districts, the user's age group may need to be provided. *Minors* are 12 and under, *Not adult* are 13-18 years old, and *Adults* are 18 and over. The combination of age group and consent provided by parent options determine the Legal age group classification. The Legal age group classification may limit the user's access and authority. + - **Settings:** The **Usage location** specify the user's global location. + + Either select the **Review + create** button to create the new user or **Next: Assignments** to complete the next section. + +4. On the **Assignments** tab, add the following details: + You can assign the user to an administrative unit, group, or Microsoft Entra role when the account is created. You can assign the user to up to 20 groups or roles. You can only assign the user to one administrative unit. Assignments can be added after the user is created. + + **To assign a group to the new user**: + + 1. Select **+ Add group**. + 1. From the menu that appears, choose up to 20 groups from the list and select the **Select** button. + 1. Select the **Review + create** button. + + **To assign a role to the new user**: + + 1. Select **+ Add role**. + 1. From the menu that appears, choose up to 20 roles from the list and select the **Select** button. + 1. Select the **Review + create** button. + + **To add an administrative unit to the new user**: + + 1. Select **+ Add administrative unit**. + 1. From the menu that appears, choose one administrative unit from the list and select the **Select** button. + 1. Select the **Review + create** button. + +5. On the **Review + Create** tab, review the details to be sure the information is correct and details passed validation. + Review the details and select the **Create** button if everything looks good. > [!NOTE] +> If you're moving to Microsoft 365 from an Office 365 subscription, your users and groups are already in Microsoft Entra ID. Intune uses the same Microsoft Entra ID, and can use the existing users and groups. +> > You can also invite guest users to your Intune tenant. For more information, see [Add Microsoft Entra B2B collaboration users in the Microsoft Entra admin center](/entra/external-id/add-users-administrator). ### Add multiple Intune users in the Microsoft Intune admin center -You can add Intune users in bulk by uploading a csv file containing the full list of users. The following steps allow you to add multiple users to Intune: +You can add Intune users in bulk by uploading a *csv* file containing the full list of users. The following steps allow you to add multiple users to Intune: -1. In the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), choose **Users** > **All users** > **Bulk operations** > **Bulk create**. The **Bulk create user** pane is displayed. -2. Download, edit, and upload a *csv* template containing a list of users that you want to add to Intune. +1. Sign in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) as at least a [User Administrator](/entra/identity/role-based-access-control/permissions-reference#user-administrator). +2. Select **Users** > **All users** > **Bulk operations** > **Bulk create**. The **Bulk create users** pane is displayed. +3. Download, edit, and upload a *csv* template containing a list of users that you want to add to Intune. The *csv* file is a comma-separated value list that can be edited in Notepad or Excel. For more information about using a *csv* file to add Intune users, see [Bulk create users in Microsoft Entra ID](/azure/active-directory/enterprise-users/users-bulk-add). > [!NOTE] > You can also invite multiple guest users to your Intune tenant. For more information, see [Tutorial: Bulk invite Microsoft Entra B2B collaboration users](/entra/external-id/tutorial-bulk-invite). +## Delete user from Intune + +When a user has left your organization, you can delete them from your Intune tenant. If needed, you can choose to delete multiple users using **Bulk operations**. + +To delete an individual user from Intune: + +1. Sign in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) as at least a [User Administrator](/entra/identity/role-based-access-control/permissions-reference#user-administrator). +2. Browse to **Users** > **All users**. +3. Select the user you want to delete. +4. Select **Delete**. + +To delete multiple users from Intune: + +1. Sign in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) as at least a [User Administrator](/entra/identity/role-based-access-control/permissions-reference#user-administrator). +2. Select **Users** > **All users** > **Bulk operations** > **Bulk delete**. The **Bulk delete users** pane is displayed. +4. Download, edit, and upload a *csv* template containing a list of users that you want to delete from Intune. + +For related information, see [Bulk delete users in Microsoft Entra ID](/entra/identity/users/users-bulk-delete). + ## Grant admin permissions After you've added users to your Intune subscription, we recommend that you grant a few users administrative permission. To grant admin permissions, follow these steps: ### Give admin permissions in Microsoft 365 -1. Sign in to the [Microsoft 365 admin center](https://admin.microsoft.com) with a global administrator account > select **Users** > **Active users** > choose the user to give admin permissions. +1. Sign in to the[Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) with a global administrator account > select **Users** > **Active users** > choose the user to give admin permissions. 2. In the user pane, choose **Manage roles** under **Roles**. 3. In the **Manage roles** pane, choose the admin permission to grant from the list of available roles. 4. Choose **Save changes**. @@ -127,15 +160,13 @@ You can configure directory synchronization to import user accounts from your on Be sure your AD admins have access to your Microsoft Entra subscription, and are trained to complete common AD and Microsoft Entra tasks. - - ### How to sync on-premises users with Microsoft Entra ID - To move existing users from on-premises Active Directory to Microsoft Entra ID, you can set up [hybrid identity](/azure/active-directory/hybrid/whatis-hybrid-identity). Hybrid identities exist in both services - on-premises AD and Microsoft Entra ID. - You can also export Active Directory users using the UI or through script. An internet search can help you find the best option for your organization. -- To synchronize your user accounts with Microsoft Entra ID, use the [Microsoft Entra Connect wizard](https://www.microsoft.com/download/details.aspx?id=47594). The Microsoft Entra Connect wizard provides a simplified and guided experience for connecting your on-premises identity infrastructure to the cloud. Choose your topology and needs (single or multiple directories, password hash sync, pass-through authentication, or federation). The wizard deploys and configures all components required to get your connection up and running. Including: sync services, Active Directory Federation Services (AD FS), and the [Microsoft Graph PowerShell](/powershell/microsoftgraph/overview?view=graph-powershell-1.0&branch=main) module. +- To synchronize your user accounts with Microsoft Entra ID, use the [Microsoft Entra Connect wizard](https://www.microsoft.com/download/details.aspx?id=47594). The Microsoft Entra Connect wizard provides a simplified and guided experience for connecting your on-premises identity infrastructure to the cloud. Choose your topology and needs (single or multiple directories, password hash sync, pass-through authentication, or federation). The wizard deploys and configures all components required to get your connection up and running. Including: sync services, Active Directory Federation Services (AD FS), and the [Microsoft Graph PowerShell](/powershell/microsoftgraph/overview?view=graph-powershell-1.0) module. > [!TIP] > Microsoft Entra Connect encompasses functionality that was previously released as Dirsync and Azure AD Sync. Learn more about [directory integration](/previous-versions/azure/azure-services/jj573653(v=azure.100)). To learn about syncing user accounts from a local directory to Microsoft Entra ID, see [Similarities between Active Directory and Microsoft Entra ID](/previous-versions/azure/azure-services/dn518177(v=azure.100)). diff --git a/memdocs/intune/fundamentals/what-is-device-management.md b/memdocs/intune/fundamentals/what-is-device-management.md index 2fd75bfb51c..3ee9e542e4d 100644 --- a/memdocs/intune/fundamentals/what-is-device-management.md +++ b/memdocs/intune/fundamentals/what-is-device-management.md @@ -69,7 +69,7 @@ For more information about Intune and its benefits, go to: ### Cloud attach your on-premises Configuration Manager -Many organizations use on-premises Configuration Manager to manage devices, including desktops and servers. You can cloud-attach your on-premises Configuration Manager to Microsoft Intune. When you cloud-attach, you get the benefits of Intune and the cloud, including [conditional access](../../configmgr/comanage/quickstart-conditional-access.md), [running remote actions](../../configmgr/comanage/quickstart-remote-actions.md), [using Windows Autopilot](../../configmgr/comanage/quickstart-autopilot.md), and more. +Many organizations use on-premises Configuration Manager to manage devices, including desktops and servers. You can cloud-attach your on-premises Configuration Manager to Microsoft Intune. When you cloud-attach, you get the benefits of Intune and the cloud, including [Conditional Access](../../configmgr/comanage/quickstart-conditional-access.md), [running remote actions](../../configmgr/comanage/quickstart-remote-actions.md), [using Windows Autopilot](../../configmgr/comanage/quickstart-autopilot.md), and more. For more information, go to: diff --git a/memdocs/intune/fundamentals/what-is-intune.md b/memdocs/intune/fundamentals/what-is-intune.md index a4fde607378..5fb07608a91 100644 --- a/memdocs/intune/fundamentals/what-is-intune.md +++ b/memdocs/intune/fundamentals/what-is-intune.md @@ -44,7 +44,7 @@ Microsoft Intune is a **cloud-based endpoint management solution**. It manages u You can protect access and data on organization-owned and users personal devices. And, Intune has compliance and reporting features that support the [Zero Trust security model](zero-trust-with-microsoft-intune.md). -> [!VIDEO https://www.microsoft.com/videoplayer/embed/RWAoF9] +> [!VIDEO https://learn-video.azurefd.net/vod/player?id=dbd45acc-fa88-41aa-a9ac-7a751378d603] This article lists some features and benefits of Microsoft Intune. @@ -85,7 +85,7 @@ For more information, go to [Manage apps using Microsoft Intune](manage-apps.md) ✅ **Automate policy deployment** -You can create policies for apps, security, device configuration, compliance, conditional access, and more. When the policies are ready, you can deploy these policies to your user groups and device groups. To receive these policies, the devices only need internet access. +You can create policies for apps, security, device configuration, compliance, Conditional Access, and more. When the policies are ready, you can deploy these policies to your user groups and device groups. To receive these policies, the devices only need internet access. For more information, go to [Assign policies in Microsoft Intune](../configuration/device-profile-assign.md). @@ -120,7 +120,7 @@ For more information, go to [Intune Suite add-on features](intune-add-ons.md). ✅ **Use Microsoft Copilot in Intune for AI-generated analysis** -Copilot in Intune is available and has capabilities that are powered by Copilot for Security. +Copilot in Intune is available and has capabilities that are powered by Security Copilot. Copilot can summarize existing policies, give you more setting information, including recommended values and potential conflicts. You can also get device details and troubleshoot a device. @@ -169,7 +169,7 @@ Microsoft Intune integrates with other Microsoft products and services that focu - **[Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/microsoft-defender-endpoint)** to help enterprises prevent, detect, investigate, and respond to threats - In Intune, you can create a service-to-service connection between Intune and Microsoft Defender for Endpoint. When they're connected, you can create policies that scan files, detect threats, and report threat levels to Microsoft Defender for Endpoint. You can also create compliance policies that set an allowable level of risk. When combined with conditional access, you can block access to organization resources for devices that are noncompliant. + In Intune, you can create a service-to-service connection between Intune and Microsoft Defender for Endpoint. When they're connected, you can create policies that scan files, detect threats, and report threat levels to Microsoft Defender for Endpoint. You can also create compliance policies that set an allowable level of risk. When combined with Conditional Access, you can block access to organization resources for devices that are noncompliant. For more specific information, go to: @@ -252,7 +252,7 @@ On devices enrolled in Intune, you can: - Create and deploy policies that configure security settings, set password requirements, deploy certificates, and more. - Use mobile threat defense services to scan devices, detect threats, and remediate threats. - View data and reports that measure compliance with your security settings and rules. -- Use conditional access to only allow managed and compliant devices access to organization resources, apps, and data. +- Use Conditional Access to only allow managed and compliant devices access to organization resources, apps, and data. - Remove organization data if a device is lost or stolen. For personal devices, users might not want their IT admins to have full control. To support a hybrid work environment, give users options. For example, users enroll their devices if they want full access to your organization's resources. Or, if these users only want access to Outlook or Microsoft Teams, then use app protection policies that require multifactor authentication (MFA). @@ -262,7 +262,7 @@ On devices using application management, you can: - Use mobile threat defense services to protect app data. The service can scan devices, detect threats, and assess risk. - Prevent organization data from being copied and pasted into personal apps. - Use app protection policies on apps and on unmanaged devices enrolled in a third party or partner MDM. -- Use conditional access to restrict the apps that can access organization email and files. +- Use Conditional Access to restrict the apps that can access organization email and files. - Remove organization data within apps. For more information, go to: diff --git a/memdocs/intune/fundamentals/whats-new-archive.md b/memdocs/intune/fundamentals/whats-new-archive.md index b4b41c64ea9..9fa2578dc50 100644 --- a/memdocs/intune/fundamentals/whats-new-archive.md +++ b/memdocs/intune/fundamentals/whats-new-archive.md @@ -810,7 +810,7 @@ Due to the rollout timelines, we're updating our documentation to the new experi #### BlackBerry Protect Mobile now supports app protection policies -You can now use Intune app protection policies with *BlackBerry Protect Mobile* (powered by Cylance AI). With this change, Intune supports BlackBerry Protect Mobile for mobile application management (MAM) scenarios for [unenrolled devices](../protect/mtd-add-apps-unenrolled-devices.md). This support includes the use of risk assessment with Conditional access and configuration of Conditional Launch settings for unenrolled devices. +You can now use Intune app protection policies with *BlackBerry Protect Mobile* (powered by Cylance AI). With this change, Intune supports BlackBerry Protect Mobile for mobile application management (MAM) scenarios for [unenrolled devices](../protect/mtd-add-apps-unenrolled-devices.md). This support includes the use of risk assessment with Conditional Access and configuration of Conditional Launch settings for unenrolled devices. While configuring the CylancePROTECT Mobile connector (formerly BlackBerry Mobile), you now can select options to turn on *App protection policy evaluation* for both Android and iOS/iPadOS devices. @@ -1626,7 +1626,7 @@ Applies to: For more information on these settings, see [Apple's developer website](https://developer.apple.com/documentation/devicemanagement/settingscommand/command/settings). For more information about configuring Settings Catalog profiles in Intune, see [Create a policy using settings catalog](../configuration/settings-catalog.md). -#### New setting available in the macOS settings catalog +#### New settings available in the macOS settings catalog The [Settings Catalog](../configuration/settings-catalog.md) lists all the settings you can configure in a device policy, and all in one place. @@ -2090,8 +2090,7 @@ In Intune, you can use the new **Store app** type to deploy Store apps to your d Now, you can use the **Turn off the Store application** policy to disable end users' direct access to Store apps. When it's disabled, end users can still access and install Store apps from the Windows Company Portal app and through Intune app management. If you want to allow random store app installs outside of Intune, then don't configure this policy. -The previous **Only display the private store within the Microsoft Store app** policy doesn't prevent end users from directly accessing the store using the Windows Package Manager `winget` APIs. So, if your goal is to block random unmanaged Store application installs on client devices, then it's recommended to use the **Turn off the Store application** policy. Don't use the **Only display the private store within the Microsoft Store app** policy -. +The previous **Only display the private store within the Microsoft Store app** policy doesn't prevent end users from directly accessing the store using the Windows Package Manager `winget` APIs. So, if your goal is to block random unmanaged Store application installs on client devices, then it's recommended to use the **Turn off the Store application** policy. Don't use the **Only display the private store within the Microsoft Store app** policy. Applies to: - Windows 10 and later @@ -2578,7 +2577,7 @@ Applies to: ### App management #### Microsoft Store for Business or Microsoft Store for Education -Apps added from the Microsoft Store for Business or Microsoft Store for Education won't deploy to devices and users. Apps show as "not applicable" in reporting. Apps already deployed are unaffected. Use the [new Microsoft Store app](../apps/store-apps-microsoft.md) to deploy Microsoft Store apps to devices or users. For related information, see [Plan for Change: Ending support for Microsoft Store for Business and Education apps](whats-new.md#plan-for-change-ending-support-for-microsoft-store-for-business-and-education-apps) for upcoming dates when Microsoft Store for Business apps will no longer deploy and Microsoft Store for Business apps will be removed. +Apps added from the Microsoft Store for Business or Microsoft Store for Education won't deploy to devices and users. Apps show as "not applicable" in reporting. Apps already deployed are unaffected. Use the [new Microsoft Store app](../apps/store-apps-microsoft.md) to deploy Microsoft Store apps to devices or users. For related information, see [Adding your Microsoft Store for Business and Education apps to the Microsoft Store in Intune](https://aka.ms/Intune/MSfB-support) for upcoming dates when Microsoft Store for Business apps will no longer deploy and Microsoft Store for Business apps will be removed. For more information, see the following resources: @@ -2903,16 +2902,16 @@ The Microsoft Store for Business connector is no longer available in the [Micros It's now also possible to delete Microsoft Store for Business apps from the **Apps** pane in the Microsoft Intune admin center so that you can clean up your environment as you move to the new Microsoft Store app type. -For related information, see [Plan for Change: Ending support for Microsoft Store for Business and Education apps](whats-new.md#plan-for-change-ending-support-for-microsoft-store-for-business-and-education-apps) for upcoming dates when Microsoft Store for Business apps won't deploy and Microsoft Store for Business apps are removed. +For related information, see [Adding your Microsoft Store for Business and Education apps to the Microsoft Store in Intune](https://aka.ms/Intune/MSfB-support) for upcoming dates when Microsoft Store for Business apps won't deploy and Microsoft Store for Business apps are removed. ### Device configuration -#### Remote Help now supports conditional access capability -Administrators can now utilize conditional access capability when setting up policies and conditions for Remote Help. For example, multifactor authentication, installing security updates, and locking access to Remote Help for a specific region or IP addresses. +#### Remote Help now supports Conditional Access capability +Administrators can now utilize Conditional Access capability when setting up policies and conditions for Remote Help. For example, multifactor authentication, installing security updates, and locking access to Remote Help for a specific region or IP addresses. For more information, see: -- [Conditional access](../protect/conditional-access.md) +- [Conditional Access](../protect/conditional-access.md) - [Remote Help](remote-help-windows.md#setup-conditional-access-for-remote-help) ### Device security @@ -3725,7 +3724,7 @@ Configure Microsoft Intune to skip or show a new Setup Assistant pane called **T As a public preview, you can use the Mobile Application Management (MAM) to the Microsoft Tunnel VPN gateway for iOS/iPadOS. With this preview for iOS devices that haven't enrolled with Intune, supported apps on those unenrolled devices can use Microsoft Tunnel to connect to your organization when working with corporate data and resources. This feature includes VPN gateway support for: - Secure access to on-premises apps and resources using modern authentication -- Single Sign On and conditional access +- Single Sign On and Conditional Access For more information, go to: @@ -3749,7 +3748,7 @@ Applies to: - Windows 11 #### SentinelOne – New mobile threat defense partner -You can now use [SentinelOne](../protect/sentinelone-mobile-threat-defense-connector.md) as an integrated Mobile Threat Defense (MTD) partner with Intune. By configuring the SentinelOne connector in Intune, you can control mobile device access to corporate resources using conditional access that's based on risk assessment in your compliance policy. The SentinelOne connector can also send risk levels to app protection policies. +You can now use [SentinelOne](../protect/sentinelone-mobile-threat-defense-connector.md) as an integrated Mobile Threat Defense (MTD) partner with Intune. By configuring the SentinelOne connector in Intune, you can control mobile device access to corporate resources using Conditional Access that's based on risk assessment in your compliance policy. The SentinelOne connector can also send risk levels to app protection policies. ### Device configuration @@ -4063,7 +4062,7 @@ For more information, see [Use Access policies to require multiple administrativ As a public preview, you can now use Microsoft Tunnel with unenrolled devices. This capability is called [Microsoft Tunnel for Mobile Application Management](../protect/microsoft-tunnel-mam.md) (MAM). This preview supports Android, and without any changes to your existing Tunnel infrastructure, supports the Tunnel VPN gateway for: - Secure access to on-premises apps and resources using modern authentication -- Single Sign On and conditional access +- Single Sign On and Conditional Access To use Tunnel MAM, unenrolled devices must install Microsoft Edge, Microsoft Defender for Endpoint, and the Company Portal. You can then use the Microsoft Intune admin center to configure the following profiles for the unenrolled devices: @@ -4262,7 +4261,7 @@ All configurations need to be done in the Microsoft Intune admin center. The Mic ### App management #### Ending support for Windows Information Protection -Windows Information Protection (WIP) policies without enrollment are being deprecated. You can no longer create new WIP policies without enrollment. Until December of 2022, you can modify existing policies until the deprecation of the *without enrollment* scenario is complete. For more information, go to [Plan for Change: Ending support for Windows Information Protection](whats-new.md#plan-for-change-ending-support-for-windows-information-protection). +Windows Information Protection (WIP) policies without enrollment are being deprecated. You can no longer create new WIP policies without enrollment. Until December of 2022, you can modify existing policies until the deprecation of the *without enrollment* scenario is complete. For more information, go to [Support tip: End of support guidance for Windows Information Protection](https://aka.ms/Intune-WIP-support). ### Device Configuration @@ -4751,7 +4750,7 @@ The **All devices** option is now available for [compliance policy](../protect/c When you include the *All devices* group, you can then exclude individual groups of devices to further refine the assignment scope. #### Trend Micro – New mobile threat defense partner -You can now use [Trend Micro Mobile Security as a Service](../protect/trend-micro-mobile-threat-defense-connector.md) as an integrated mobile threat defense (MTD) partner with Intune. By configuring the Trend MTD connector in Intune, you can control mobile device access to corporate resources using conditional access that's based on risk assessment. +You can now use [Trend Micro Mobile Security as a Service](../protect/trend-micro-mobile-threat-defense-connector.md) as an integrated mobile threat defense (MTD) partner with Intune. By configuring the Trend MTD connector in Intune, you can control mobile device access to corporate resources using Conditional Access that's based on risk assessment. For more information, see: - [Mobile threat defense integration with Intune](../protect/mobile-threat-defense.md) @@ -5402,4 +5401,4 @@ Intune's remote action to [Collect diagnostics](../remote-actions/collect-diagno The new details that are collected include: - Files: `C:\Program Files\Microsoft Update Health Tools\Logs\*.etl` -- Registry Keys: `HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\CloudManagedUpdate` \ No newline at end of file +- Registry Keys: `HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\CloudManagedUpdate` diff --git a/memdocs/intune/fundamentals/whats-new.md b/memdocs/intune/fundamentals/whats-new.md index 8e8e34fe44f..3106c21f527 100644 --- a/memdocs/intune/fundamentals/whats-new.md +++ b/memdocs/intune/fundamentals/whats-new.md @@ -7,7 +7,7 @@ keywords: author: brenduns ms.author: brenduns manager: dougeby -ms.date: 10/31/2024 +ms.date: 01/21/2025 ms.topic: conceptual ms.service: microsoft-intune ms.subservice: fundamentals @@ -75,6 +75,171 @@ You can use RSS to be notified when this page is updated. For more information, ### Tenant administration --> + +## Week of January 20, 2025 + +### Monitor and troubleshoot + +#### Use Support Assistant to resolve issues + +Support Assistant is now available in Intune. It leverages AI to enhance your help and support experience, ensuring more efficient issue resolution. Support Assistant is available in the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) by selecting **Troubleshoot + support** > **Help and Support**, or by selecting the question mark near your profile pic. Currently, the Support Assistant is in preview. You can enable and disable Support Assistant by choosing to opt-in and opt-out at any time. For related information, see [How to get support in the Microsoft Intune admin center](/mem/get-support). + +## Week of December 30, 2024 + +### Device enrollment + +#### Intune ends support for Android device administrator on devices with access to Google Mobile Services +As of December 31, 2024, Microsoft Intune no longer supports Android device administrator management on devices with access to Google Mobile Services (GMS). This change comes after Google deprecated Android device administrator management and ceased support. Intune support and help documentation remains for devices without access to GMS running Android 15 or earlier, and Microsoft Teams devices migrating to Android Open Source Project (AOSP) management. For more information about how this change impacts your tenant, see [Intune ending support for Android device administrator on devices with GMS access in December 2024](https://techcommunity.microsoft.com/blog/intunecustomersuccess/intune-ending-support-for-android-device-administrator-on-devices-with-gms-in-de/3915443). + + +## Week of December 16, 2024 (Service release 2412) + +### App management + +#### Increased scale for Customization policies + +You can now create up to 25 policies that customize the Company Portal and Intune app experience. The previous maximum number of Customization policies was 10. Navigate to the Intune admin center, and select **Tenant administration** > **Customization**. + +For more information about customizing the Company Portal and Intune apps, see [Customizing the user experience](../apps/company-portal-app.md#customizing-the-user-experience). + +### Device security + +#### Support for tamper protection in policies for Security settings management for Microsoft Defender for Endpoint + +> [!NOTE] +> +> *Rollout of this feature is delayed and now expected to be available on or around January 18th, 2025.* + +You can now manage the Microsoft Defender for Endpoint CSP setting for [tamper protection](/windows/client-management/mdm/defender-csp) on unenrolled devices you manage as part of the [Defender for Endpoint security settings management](../protect/mde-security-integration.md#which-solution-should-i-use) scenario. + +With this support, tamper protection configurations from *Windows Security Experience* profiles for *Antivirus* policies now apply to all devices instead of only to those that are enrolled with Intune. + + +### Device configuration + +#### Ending support for administrative templates when creating a new configuration profile + +Customers cannot create new Administrative Templates configuration profile through **Devices > Configuration > Create > New policy > Windows 10 and later > Administrative Templates**. A (retired) tag is seen next to **Administrative Templates** and the **Create** button is now greyed out. Other templates will continue to be supported. + +However, customers can now use the Settings Catalog for creating new **Administrative Templates** configuration profile by navigating to **Devices > Configuration > Create > New policy > Windows 10 and later > Settings Catalog**. + +There are no changes in the following UI experiences: + +- Editing an existing Administrative template. +- Deleting an existing Administrative template. +- Adding, modifying or deleting settings in an existing Administrative template. +- **Imported Administrative templates (Preview)** template, which is used for Custom ADMX. + +For more information, see [Use ADMX templates on Windows 10/11 devices in Microsoft Intune](..\configuration\administrative-templates-windows.md). + +Applies to: + +- Windows + +### Device management + +#### More Wi-Fi configurations are now available for personally-owned work profile devices + +Intune Wi-Fi configuration profiles for Android Enterprise personally-owned work profile devices now support configuration of pre-shared keys and proxy settings. + +You can find these settings in the admin console in **Devices** > **Manage devices** > **Configuration** > **Create** > **New Policy**. Set **Platform** to Android Enterprise and then in the **Personally-Owned Work Profile** section, select Wi-Fi and select the **Create** button. + +In the **Configuration settings** tab, when you select Basic Wi-Fi type, several new options are available: + +1. Security type, with options for Open (no authentication), WEP-Pre-shared key, and WPA-Pre-shared key. + +2. Proxy settings, with the option to select Automatic and then specify the proxy server URL. + +It was possible to configure these in the past with Custom Configuration policies, but going forward, we recommend setting these in the Wi-Fi Configuration profile, because [Intune is ending support for Custom policies in April 2024.](https://aka.ms/Intune/Android-customprofiles). + +For more information, see [Wi-Fi settings for personally-owned work profile devices.](../configuration/wi-fi-settings-android-enterprise.md#personally-owned-work-profile). + +Applies to: + +- Android Enterprise + +## Week of December 9, 2024 + +### Tenant administration + +#### Intune now supports Ubuntu 24.04 LTS for Linux management. + +We're now supporting device management for Ubuntu 24.04 LTS. You can enroll and manage Linux devices running Ubuntu 24.04, and assign standard compliance policies, custom configuration scripts, and compliance scripts. + +For more information, see the following in Intune documentation: + +- [Deployment guide: Manage Linux devices in Microsoft Intune](../fundamentals/deployment-guide-platform-linux.md) +- [Enrollment guide: Enroll Linux desktop devices in Microsoft Intune](../fundamentals/deployment-guide-enrollment-linux.md). To enroll Linux devices, ensure that they are running Ubuntu 20.04 LTS or higher. + +Applies to: + +- Linux Ubuntu Desktops + +## Week of December 2, 2024 + +### Device enrollment + +#### Change to enrollment behavior for iOS enrollment profile type + +At Apple WWDC 2024, Apple ended support for profile-based Apple user enrollment. For more information, see [Support has ended for profile-based user enrollment with Company Portal](#support-has-ended-for-apple-profile-based-user-enrollment-with-company-portal). As a result of this change, we updated the behavior that occurs when you select **Determine based on user choice** as the enrollment profile type for bring-your-own-device (BYOD) enrollments. + +Now when users select **I own this device** during a BYOD enrollment, Microsoft Intune enrolls them via account-driven user enrollment, rather than profile-based user enrollment, and then secures only work-related apps. Less than one percent of Apple devices across all Intune tenants are currently enrolled this way, so this change doesn't affect most enrolled devices. There is no change for iOS users who select **My company owns this device** during a BYOD enrollment. Intune enrolls them via device enrollment with Intune Company Portal, and then secures their entire device. + +If you currently allow users in BYOD scenarios to determine their enrollment profile type, you must take action to ensure account-driven user enrollment works by completing all prerequisites. For more information, see [Set up account driven Apple user enrollment](../enrollment/apple-account-driven-user-enrollment.md). If you don't give users the option to choose their enrollment profile type, there are no action items. + +### Device management + +#### Device Inventory for Windows + +Device inventory lets you collect and view additional hardware properties from your managed devices to help you better understand the state of your devices and make business decisions. + +You can now choose what you want to collect from your devices, using the catalog of properties and then view the collected properties in the Resource Explorer view. + +For more information, see: + +- [Properties catalog](../configuration/properties-catalog.md) +- [Data collection platform](../../analytics/data-platform-schema.md) + +Applies to: + +- Windows 10 and later (Corporate owned devices managed by Intune) + +## Week of November 18, 2024 (Service release 2411) + +### App management + +#### Configuration values for specific managed applications on Intune enrolled iOS devices + +Starting with Intune's September (2409) service release, the **IntuneMAMUPN**, **IntuneMAMOID**, and **IntuneMAMDeviceID** app configuration values are automatically sent to managed applications on Intune enrolled iOS devices for the following apps: + +- Microsoft Excel +- Microsoft Outlook +- Microsoft PowerPoint +- Microsoft Teams +- Microsoft Word + +For more information, see [Plan for Change: Specific app configuration values will be automatically sent to specific apps](../fundamentals/whats-new.md#plan-for-change-specific-app-configuration-values-will-be-automatically-sent-to-specific-apps) and Intune [Support tip: Intune MAM users on iOS/iPadOS userless devices may be blocked in rare cases](https://techcommunity.microsoft.com/blog/intunecustomersuccess/support-tip-intune-mam-users-on-iosipados-userless-devices-may-be-blocked-in-rar/4254335). + +#### Additional installation error reporting for LOB apps on AOSP devices + +Additional details are now provided for app installation reporting of Line of Business (LOB) apps on Android Open Source Project (AOSP) devices. You can view installation error codes and detailed error messages for LOB apps in Intune. + +For information about app installation error details, see [Monitor app information and assignments with Microsoft Intune](../apps/apps-monitor.md#app-installation-error-reporting). + +Applies to: + +- Android Open Source Project (AOSP) devices + +#### Microsoft Teams app protection on VisionOS devices (preview) + +Microsoft Intune app protection policies (APP) are now supported on the Microsoft Teams app on VisionOS devices. + +To learn more about how to target policies to VisionOS devices, see [Managed app properties](../fundamentals/filters-device-properties.md#managed-app-properties) for more information about filters for managed app properties. + +Applies to: + +- Microsoft Teams for iOS on VisionOS devices + ## Week of October 28, 2024 ### Device security @@ -117,7 +282,7 @@ For information about this Autopilot support, see the following in the Autopilot #### Minimum OS version for Android devices is Android 10 and later for user-based management methods -Beginning in October 2024, Android 10 and later is the minimum Android OS version that is supported for user-based management methods, which includes: +Beginning in October 2024, Android 10 and later is the [minimum Android OS version that is supported for user-based management methods](../fundamentals/supported-devices-browsers.md#android), which includes: - Android Enterprise personally-owned work profile - Android Enterprise corporate owned work profile @@ -139,7 +304,7 @@ Userless methods of Android device management (Dedicated and AOSP userless) and #### Collection of additional device inventory details -Intune now collects additional files and registry keys to assist in troubleshooting the Device Hardware Inventory feature. +Intune now collects additional files and registry keys to assist in troubleshooting the [Device Hardware Inventory](../remote-actions/collect-diagnostics.md) feature. Applies to: @@ -161,7 +326,7 @@ For more information, see [New look for Intune Company Portal app for Windows](h The Key Distribution Center (KDC) requires user or device objects to be strongly mapped to Active Directory for certificate-based authentication. This means that a Simple Certificate Enrollment Protocol (SCEP) certificate's subject alternative name (SAN) must have a security identifier (SID) extension that maps to the user or device SID in Active Directory. The mapping requirement protects against certificate spoofing and ensures that certificate-based authentication against the KDC continues working. -To meet requirements, modify or create a SCEP certificate profile in Microsoft Intune. Then add a `URI` attribute and the `OnPremisesSecurityIdentifier` variable to the SAN. After you do that, Microsoft Intune appends a tag with the SID extension to the SAN and issues new certificates to targeted users and devices. If the user or device has a SID on premises that's been synced to Microsoft Entra ID, the certificate shows the SID. If they don't have a SID, a new certificate is issued without the SID. +To meet requirements, modify or create a SCEP certificate profile in Microsoft Intune. Then add a `URI` attribute and the `OnPremisesSecurityIdentifier` variable to the SAN. After you do that, Microsoft Intune appends a tag with the SID extension to the SAN and issues new certificates to targeted users and devices. If the user or device has a SID on premises that's synced to Microsoft Entra ID, the certificate shows the SID. If they don't have a SID, a new certificate is issued without the SID. For more information and steps, see [Update certificate connector: Strong mapping requirements for KB5014754](../protect/certificates-profile-scep.md). @@ -184,7 +349,7 @@ For more information about the Intune features supported in GCC High and DoD env #### Updates to PKCS certificate issuance process in Microsoft Intune Certificate Connector, version 6.2406.0.1001 -We've updated the process for Public Key Cryptography Standards (PKCS) certificate issuance in Microsoft Intune to support the security identifiers (SID) information requirements described in [KB5014754](https://support.microsoft.com/topic/kb5014754-certificate-based-authentication-changes-on-windows-domain-controllers-ad2c23b0-15d8-4340-a468-4d4f3b188f16). As part of this update, an OID attribute containing the user or device SID is added to the certificate. This change is available with the Certificate Connector for Microsoft Intune, version 6.2406.0.1001, and applies to users and devices synced from Active Directory on-premises to Microsoft Entra ID. +We updated the process for Public Key Cryptography Standards (PKCS) certificate issuance in Microsoft Intune to support the security identifiers (SID) information requirements described in [KB5014754](https://support.microsoft.com/topic/kb5014754-certificate-based-authentication-changes-on-windows-domain-controllers-ad2c23b0-15d8-4340-a468-4d4f3b188f16). As part of this update, an OID attribute containing the user or device SID is added to the certificate. This change is available with the Certificate Connector for Microsoft Intune, version 6.2406.0.1001, and applies to users and devices synced from Active Directory on-premises to Microsoft Entra ID. The SID update is available for user certificates across all platforms, and for device certificates specifically on Microsoft Entra hybrid joined Windows devices. @@ -202,6 +367,12 @@ For more information, see: Working time settings allow you to enforce policies that limit access to apps and mute message notifications received from apps during non-working time. The limit access setting is now available for the Microsoft Teams and Microsoft Edge apps. You can limit access by using App Protection Policies (APP) to block or warn end users from using the iOS/iPadOS or Android Teams and Microsoft Edge apps during non-working time by setting the **Non-working time** conditional launch setting. Also, you can create a non-working time policy to mute notifications from the Teams app to end users during non-working time. +For more information, see: + +- [Android app protection policy settings](../apps/app-protection-policy-settings-android.md#conditional-launch) +- [iOS app protection policy settings](../apps/app-protection-policy-settings-ios.md#conditional-launch) +- [Quiet time policies for iOS/iPadOS and Android apps](../apps/apps-quiet-time-policies.md#quiet-time-policy-types) + Applies to: - Android @@ -209,7 +380,7 @@ Applies to: #### Streamlined app creation experience for apps from Enterprise App Catalog -We've streamlined the way apps from Enterprise App Catalog are added to Intune. We now provide a direct app link rather than duplicating the app binaries and metadata. App contents now download from a `*.manage.microsoft.com` subdomain. This update helps to improve the latency when adding an app to Intune. When you add an app from Enterprise App Catalog, it syncs immediately and is ready for additional action from within Intune. +We've streamlined the way apps from [Enterprise App Catalog](../apps/apps-add-enterprise-app.md) are added to Intune. We now provide a direct app link rather than duplicating the app binaries and metadata. App contents now download from a `*.manage.microsoft.com` subdomain. This update helps to improve the latency when adding an app to Intune. When you add an app from Enterprise App Catalog, it syncs immediately and is ready for additional action from within Intune. #### Update Enterprise App Catalog apps @@ -381,7 +552,7 @@ All Android devices automatically migrate to the updated Managed Home Screen (MH #### Support has ended for Apple profile-based user enrollment with Company Portal -Apple supports two types of manual enrollment methods for users and devices in bring-your-own-device (BYOD) scenarios: *profile-based enrollment* and *account-driven enrollment*. Apple has ended support for profile-based user enrollment, known in Intune as *user enrollment with Company Portal*. This method was their privacy-focused BYOD enrollment flow that used managed Apple IDs. As a result of this change, Intune has ended support for [profile-based user enrollment with Company Portal](../enrollment/apple-user-enrollment-with-company-portal.md). Users can no longer enroll devices targeted with this enrollment profile type. This change doesn't affect devices that are already enrolled with this profile type, so you can continue to manage them in the admin center and receive Microsoft Intune technical support. Less than 1% of Apple devices across all Intune tenants are currently enrolled this way, so this change doesn't affect most enrolled devices. +Apple supports two types of manual enrollment methods for users and devices in bring-your-own-device (BYOD) scenarios: *profile-based enrollment* and *account-driven enrollment*. Apple ended support for profile-based user enrollment, known in Intune as *user enrollment with Company Portal*. This method was their privacy-focused BYOD enrollment flow that used managed Apple IDs. As a result of this change, Intune has ended support for [profile-based user enrollment with Company Portal](../enrollment/apple-user-enrollment-with-company-portal.md). Users can no longer enroll devices targeted with this enrollment profile type. This change doesn't affect devices that are already enrolled with this profile type, so you can continue to manage them in the admin center and receive Microsoft Intune technical support. Less than 1% of Apple devices across all Intune tenants are currently enrolled this way, so this change doesn't affect most enrolled devices. There's no change to profile-based device enrollment with Company Portal, the default enrollment method for BYOD scenarios. Devices enrolled via Apple automated device enrollment also remain unaffected. @@ -595,7 +766,7 @@ Intune now supports account-driven Apple User Enrollment, the new, and improved For more information, see [Set up account driven Apple User Enrollment](../enrollment/apple-account-driven-user-enrollment.md) on Microsoft Learn. -Apple has announced they are ending support for profile-based Apple User Enrollment. As a result, Microsoft Intune will end support for Apple User Enrollment with Company Portal shortly after the release of iOS/iPadOS 18. We recommend enrolling devices with account-driven Apple User Enrollment for similar functionality and an improved user experience. +Apple announced they are ending support for profile-based Apple User Enrollment. As a result, Microsoft Intune will end support for Apple User Enrollment with Company Portal shortly after the release of iOS/iPadOS 18. We recommend enrolling devices with account-driven Apple User Enrollment for similar functionality and an improved user experience. #### Use corporate Microsoft Entra account to enable Android Enterprise management options in Intune @@ -678,7 +849,7 @@ Applies to: You can specify the time that OS updates are enforced on devices in their local time zone. For example, configuring an OS update to be enforced at 5pm schedules the update for 5pm in the device's local time zone. Previously, this setting used the time zone of the browser where the policy was configured. -This change only applies to new policies that are created in the August 2408 release and later. The **Target Date Time** setting is in the settings catalog at **Devices** > **Manage devices** > **Configuration** > **Create** > **New policy** > **iOS/iPadOS** or **macOS** for platform > **Settings catalog** for profile type > **Declarative Device Management** > Software Update. +This change only applies to new policies that are created in the August 2408 release and later. The **Target Date Time** setting is in the [settings catalog](../configuration/settings-catalog.md) at **Devices** > **Manage devices** > **Configuration** > **Create** > **New policy** > **iOS/iPadOS** or **macOS** for platform > **Settings catalog** for profile type > **Declarative Device Management** > Software Update. In a future release, the **UTC** text will be removed from the **Target Date Time** setting. @@ -751,7 +922,9 @@ ACME is supported for Apple Device Enrollment, Apple Configurator enrollment, an - iOS 16.0 or later - iPadOS 16.1 or later -- macOS 13.1 or later +- macOS 13.1 or later + +This capability is also supported in [GCC High tenants](../fundamentals/intune-govt-service-description.md). ## Week of July 22, 2024 (Service release 2407) @@ -865,7 +1038,7 @@ You can now configure just-in-time (JIT) registration and JIT compliance remedia We have consolidated the Intune profiles that were related to identity and account protection, into a single new profile named *Account protection*. This new profile is found in the [account protection policy node of endpoint security](../protect/endpoint-security-account-protection-policy.md), and is now the only profile template that remains available when creating new policy instances for identity and account protection. The new profile includes Windows Hello for Business settings for both users and devices, and settings for Windows Credential Guard. -Because this new profile uses Intune’s unified settings format for device management, the profiles settings are also available through the settings catalog, and help to improve the reporting experience in the Intune admin center. +Because this new profile uses Intune’s unified settings format for device management, the profiles settings are also available through the [settings catalog](../configuration/settings-catalog.md), and help to improve the reporting experience in the Intune admin center. You can continue to use any instances of the following profile templates that you already have in place, but Intune no longer supports creating new instances of these profiles: @@ -1345,7 +1518,7 @@ Applies to: Feature updates can now be made available to end users as **Optional** updates, with the introduction of **Optional** Feature updates. End users see the update in the **Windows Update** settings page in the same way that it's shown for consumer devices. -End users can easily opt in to try out the next Feature update and provide feedback. When it's time to roll out the feature as a **Required** update, then admins can change the setting on the policy, and update the rollout settings so that the update is deployed as a **Required** update to devices that don't yet have it installed. +End users can easily opt in to try out the next Feature update and provide feedback. When it's time to roll out the feature as a **Required** update, admins can change the setting on the policy and update the rollout settings so that the update is deployed as a **Required** update to devices that don't yet have it installed. For more information on Optional Feature updates, see [Feature updates for Windows 10 and later policy in Intune](..//protect/windows-10-feature-updates.md#create-and-assign-feature-updates-for-windows-10-and-later-policy). diff --git a/memdocs/intune/includes/android-device-administrator-support.md b/memdocs/intune/includes/android-device-administrator-support.md index 6338e8f11ff..5fd923c6c12 100644 --- a/memdocs/intune/includes/android-device-administrator-support.md +++ b/memdocs/intune/includes/android-device-administrator-support.md @@ -4,7 +4,7 @@ description: include file author: lenewsad ms.service: microsoft-intune ms.topic: include -ms.date: 06/12/2024 +ms.date: 12/31/2024 ms.author: lanewsad ms.custom: include file ms.collection: @@ -13,4 +13,4 @@ ms.collection: --- > [!IMPORTANT] -> Microsoft Intune is ending support for Android device administrator management on devices with access to Google Mobile Services (GMS) on December 31, 2024. After that date, device enrollment, technical support, bug fixes, and security fixes will be unavailable. If you currently use device administrator management, we recommend switching to another Android management option in Intune before support ends. For more information, see [Ending support for Android device administrator on GMS devices](https://techcommunity.microsoft.com/t5/intune-customer-success/microsoft-intune-ending-support-for-android-device-administrator/ba-p/3915443). +> Android device administrator management is deprecated and no longer available for devices with access to Google Mobile Services (GMS). If you currently use device administrator management, we recommend switching to another Android management option. Support and help documentation remain available for some devices without GMS, running Android 15 and earlier. For more information, see [Ending support for Android device administrator on GMS devices](https://techcommunity.microsoft.com/t5/intune-customer-success/microsoft-intune-ending-support-for-android-device-administrator/ba-p/3915443). diff --git a/memdocs/intune/includes/intune-notices.md b/memdocs/intune/includes/intune-notices.md index 615a5ca2d36..751c02f1e05 100644 --- a/memdocs/intune/includes/intune-notices.md +++ b/memdocs/intune/includes/intune-notices.md @@ -4,7 +4,7 @@ description: include file author: dougeby ms.service: microsoft-intune ms.topic: include -ms.date: 10/30/2024 +ms.date: 1/6/2025 ms.author: dougeby manager: dougeby ms.custom: include file @@ -12,52 +12,132 @@ ms.custom: include file These notices provide important information that can help you prepare for future Intune changes and features. -### Update to the latest Intune App SDK and Intune App Wrapper for Android 15 support -We've recently released new versions of the Intune App SDK and Intune App Wrapping Tool for Android to support Android 15. We recommend upgrading your app to the latest SDK or wrapper versions to ensure applications stay secure and run smoothly. - +### Move to new Microsoft Graph Beta API properties for Windows Autopilot self-deploying mode and pre-provisioning + +In late February 2025, a select number of old Microsoft Graph Beta API [windowsAutopilotDeploymentProfile](/graph/api/resources/intune-shared-windowsautopilotdeploymentprofile) properties used for Windows Autopilot self-deploying mode and pre-provisioning will be removed and stop working. The same data can be found using newer Graph API properties. + #### How does this affect you or your users? -If you have applications using the Intune App SDK or Intune App Wrapping Tool for Android, it's recommended that you update your app to the latest version to support Android 15. - +If you have automation or scripts using the following Windows Autopilot properties, you must update to the new properties to prevent them from breaking. + +| Old | New | +| -------- | ------- | +| enableWhiteglove | preprovisioningAllowed | +| extractHardwareHash | hardwareHashExtractionEnabled | +| language | Locale | +| outOfBoxExperienceSettings | outOfBoxExperienceSetting | +| outOfBoxExperienceSettings.HidePrivacySettings | outOfBoxExperienceSetting.PrivacySettingsHidden | +| outOfBoxExperienceSettings.HideEULA | outOfBoxExperienceSetting.EULAHidden | +| outOfBoxExperienceSettings.SkipKeyboardSelectionPage | outOfBoxExperienceSettings.KeyboardSelectionPageSkipped | +| outOfBoxExperienceSettings.HideEscapeLink | outOfBoxExperienceSettings.EscapeLinkHidden | + #### How can you prepare? -If you choose to build apps targeting Android API 35, you'll need to adopt the new version of the Intune App SDK for Android (v11.0.0). If you’ve wrapped your app and are targeting API 35 you'll need to use the new version of the App wrapper (v1.0.4549.6). +Update your automation or scripts to use the new Graph API properties to avoid deployment issues. -> [!NOTE] -> As a reminder, while apps must update to the latest SDK if targeting Android 15, apps do not need to update the SDK to simply run on Android 15. +**Additional information:** -You should also plan to update your documentation or developer guidance if applicable to include this change in support for the SDK. +- [windowsAutopilotDeploymentProfile resource type - Microsoft Graph Beta | Microsoft Learn](/graph/api/resources/intune-shared-windowsautopilotdeploymentprofile) +- [azureADWindowsAutopilotDeploymentProfile resource type - Microsoft Graph Beta | Microsoft Learn](/graph/api/resources/intune-enrollment-azureadwindowsautopilotdeploymentprofile) +- [outOfBoxExperienceSettings resource type - Microsoft Graph Beta | Microsoft Learn](/graph/api/resources/intune-enrollment-outofboxexperiencesettings) -Here are the public repositories: -- [Intune App SDK for Android](https://github.com/microsoftconnect/ms-intune-app-sdk-android) -- [Intune App Wrapping Tool for Android](https://github.com/microsoftconnect/intune-app-wrapping-tool-android) +### Plan for Change: Blocking screen capture in the latest Intune App SDK for iOS and Intune App Wrapping Tool for iOS + +We recently released updated versions of the Intune App SDK and the Intune App Wrapping Tool. Included in these releases (v19.7.5+ for Xcode 15 and v20.2.0+ for Xcode 16) is the support for blocking screen capture, Genmojis and writing tools in response to the new AI features in iOS/iPadOS 18.2. + +#### How does this affect you or your users? + +For apps that have updated to the latest Intune App SDK or Intune App Wrapping Tool versions screen capture will be blocked if you've configured “Send Org data to other apps” to a value other than “All apps”. To allow screen capture for your iOS/iPadOS devices, configure the [Managed apps app configuration policy](../apps/app-configuration-policies-managed-app.md) setting “com.microsoft.intune.mam.screencapturecontrol" to **Disabled**. + +#### How can you prepare? + +Review your app protection policies and if needed, create a [Managed apps app configuration policy](../apps/app-configuration-policies-managed-app.md) to allow screen capture by configuring the above setting *(Apps > App configuration policies > Create > Managed apps > Step 3 ‘Settings’ under General configuration)*. For more information review, [iOS app protection policy settings – Data protection](../apps/app-protection-policy-settings-ios.md#data-protection) and [App configuration policies - Managed apps](../apps/app-configuration-policies-overview.md#managed-apps). ### Take Action: Update to the latest Intune App SDK for iOS and Intune App Wrapping Tool for iOS -To support the upcoming release of iOS/iPadOS 18.1, update to the latest versions of the Intune App SDK and the Intune App Wrapping Tool to ensure applications stay secure and run smoothly. **Important:** If you don't update to the latest versions, some app protection policies may not apply to your app in certain scenarios. Review the following GitHub announcements for more details on the specific impact: +To support the upcoming release of iOS/iPadOS 18.2, update to the latest versions of the Intune App SDK and the Intune App Wrapping Tool to ensure applications stay secure and run smoothly. **Important:** If you don't update to the latest versions, some app protection policies may not apply to your app in certain scenarios. Review the following GitHub announcements for more details on the specific impact: -- SDK for iOS: [Update recommended prior to iOS 18.1 general availability - microsoftconnect/ms-intune-app-sdk-ios - Discussion #477](https://github.com/microsoftconnect/ms-intune-app-sdk-ios/discussions/477) -- Wrapper for iOS: [Update recommended prior to iOS 18.1 general availability - microsoftconnect/intune-app-wrapping-tool-ios - Discussion #125](https://github.com/microsoftconnect/intune-app-wrapping-tool-ios/discussions/125) +- SDK for iOS: [Update recommended prior to iOS 18.2 general availability - microsoftconnect/ms-intune-app-sdk-ios - Discussion #495](https://github.com/microsoftconnect/ms-intune-app-sdk-ios/discussions/495) +- Wrapper for iOS: [Update recommended prior to iOS 18.2 general availability - microsoftconnect/intune-app-wrapping-tool-ios - Discussion #128](https://github.com/microsoftconnect/intune-app-wrapping-tool-ios/discussions/128) As a best practice, always update your iOS apps to the latest App SDK or App Wrapping Tool to ensure that your app continues to run smoothly. #### How does this affect you or your users? -If you have applications using the Intune App SDK or Intune App Wrapping Tool, you'll need to update to the latest version to support iOS 18.1. +If you have applications using the Intune App SDK or Intune App Wrapping Tool, you'll need to update to the latest version to support iOS 18.2. #### How can you prepare? -For apps running on iOS 18.1, you must update to the new version of the Intune App SDK for iOS +For apps running on iOS 18.2, you must update to the new version of the Intune App SDK for iOS: +- [For apps built with XCode 15 use v19.7.6 - Release 19.7.6 - microsoftconnect/ms-intune-app-sdk-ios - GitHub](https://github.com/microsoftconnect/ms-intune-app-sdk-ios/releases/tag/19.7.6) +- [For apps built with XCode 16 use v20.2.1 - Release 20.2.1 - microsoftconnect/ms-intune-app-sdk-ios - GitHub](https://github.com/microsoftconnect/ms-intune-app-sdk-ios/releases/tag/20.2.1) + +For apps running on iOS 18.2, you must update to the new version of the Intune App Wrapping Tool for iOS: +- [For apps built with XCode 15 use v19.7.6 - Release 19.7.6 - microsoftconnect/intune-app-wrapping-tool-ios - GitHub](https://github.com/microsoftconnect/intune-app-wrapping-tool-ios/releases/tag/19.7.6) +- [For apps built with XCode 16 use v20.2.1 - Release 20.2.1 - microsoftconnect/intune-app-wrapping-tool-ios - GitHub](https://github.com/microsoftconnect/intune-app-wrapping-tool-ios/releases/tag/20.2.1) -- For apps built with XCode 15 use v19.7.1 - [Release 19.7.1 - microsoftconnect/ms-intune-app-sdk-ios - GitHub](https://github.com/microsoftconnect/ms-intune-app-sdk-ios/releases/tag/19.7.1) -- For apps built with XCode 16 use v20.1.2 - [Release 20.1.2 - microsoftconnect/ms-intune-app-sdk-ios - GitHub](https://github.com/microsoftconnect/ms-intune-app-sdk-ios/releases/tag/20.1.2) +> [!IMPORTANT] +> +> The listed SDK releases support blocking screen capture, Genmojis and writing tools in response to new AI features in iOS 18.2. For apps that have updated to these SDK versions, screen capture block is applied if you have configured *Send Org data to other apps* to a value other than *All apps*. See [iOS/iPadOS app protection policy settings](../apps/app-protection-policy-settings-ios.md#data-protection) for more info. You can configure app configuration policy setting **com.microsoft.intune.mam.screencapturecontrol = Disabled** if you wish to allow screen capture for your iOS devices. See [App configuration policies for Microsoft Intune](../apps/app-configuration-policies-overview.md#managed-apps) for more info. Intune will be providing more granular controls for blocking specific AI features in the future. Follow [What's new in Microsoft Intune](../fundamentals/whats-new.md) to stay up to date. +> +> Notify your users as applicable, to ensure they upgrade their apps to the latest version prior to upgrading to iOS 18.2. You can review the Intune App SDK version in use by your users in the Microsoft Intune admin center by navigating to **Apps** > **Monitor** > **App protection status**, then review *Platform version* and *iOS SDK version*. +> +> If you have questions, leave a comment on the applicable GitHub announcement. Additionally, if you haven't already, navigate to the applicable GitHub repository and subscribe to *Releases* and *Discussions* (Watch > Custom > select Releases, Discussions) to ensure you stay up-to-date with the latest SDK releases, updates, and other important announcements. -For apps running on iOS 18.1, you must update to the new version of the Intune App Wrapping Tool for iOS +### Plan for Change: Specific app configuration values will be automatically sent to specific apps -- For apps built with XCode 15 use v19.7.1 - [Release 19.7.1 - microsoftconnect/intune-app-wrapping-tool-ios - GitHub](https://github.com/microsoftconnect/intune-app-wrapping-tool-ios/releases/tag/19.7.1) -- For apps built with XCode 16 use v20.1.2 - [Release 20.1.2 - microsoftconnect/intune-app-wrapping-tool-ios - GitHub](https://github.com/microsoftconnect/intune-app-wrapping-tool-ios/releases/tag/20.1.2) +Starting with Intune's September (2409) service release, the **IntuneMAMUPN**, **IntuneMAMOID**, and **IntuneMAMDeviceID** app configuration values will be automatically sent to managed applications on Intune enrolled iOS devices for the following apps: Microsoft Excel, Microsoft Outlook, Microsoft PowerPoint, Microsoft Teams and Microsoft Word. Intune will continue to expand this list to include additional managed apps. -Notify your users as applicable, to ensure they upgrade their apps to the latest version prior to upgrading to iOS 18.1. You can review the Intune App SDK version in use by your users in the Microsoft Intune admin center by navigating to **Apps** > **Monitor** > **App protection status**, then review “Platform version” and “iOS SDK version”. +#### How does this affect you or your users? + +If these values aren't configured correctly for iOS devices, there's a possibility of either the policy not getting delivered to the app or the wrong policy is delivered. For more information, see [Support tip: Intune MAM users on iOS/iPadOS userless devices may be blocked in rare cases](https://techcommunity.microsoft.com/blog/intunecustomersuccess/support-tip-intune-mam-users-on-iosipados-userless-devices-may-be-blocked-in-rar/4254335). + +#### How can you prepare? + +No additional action is needed. + +### Plan for Change: Implement strong mapping for SCEP and PKCS certificates + +With the May 10, 2022, Windows update ([KB5014754](https://support.microsoft.com/topic/kb5014754-certificate-based-authentication-changes-on-windows-domain-controllers-ad2c23b0-15d8-4340-a468-4d4f3b188f16)), changes were made to the Active Directory Kerberos Key Distribution (KDC) behavior in Windows Server 2008 and later versions to mitigate elevation of privilege vulnerabilities associated with certificate spoofing. Windows will enforce these changes on **February 11, 2025**. + +To prepare for this change, Intune has released the ability to include the security identifier to strongly map SCEP and PKCS certificates. For more information, review the blog: [Support tip: Implementing strong mapping in Microsoft Intune certificates](https://techcommunity.microsoft.com/blog/intunecustomersuccess/support-tip-implementing-strong-mapping-in-microsoft-intune-certificates/4053376) + +#### How does this affect you or your users? + +These changes will impact SCEP and PKCS certificates delivered by Intune for Microsoft Entra hybrid joined users or devices. If a certificate can't be strongly mapped, authentication will be denied. To enable strong mapping: + +- SCEP certificates: Add the security identifier to your SCEP profile. We strongly recommend testing with a small group of devices and then slowly rollout updated certificates to minimize disruptions to your users. +- PKCS certificates: Update to the latest version of the Certificate Connector, change the registry key to enable the security identifier, and then restart the connector service. **Important:** Before you modify the registry key, review how to change the registry key and how to back up and restore the registry. + +For detailed steps and additional guidance, review the blog: [Support tip: Implementing strong mapping in Microsoft Intune certificates](https://techcommunity.microsoft.com/blog/intunecustomersuccess/support-tip-implementing-strong-mapping-in-microsoft-intune-certificates/4053376) + +#### How can you prepare? + +If you use SCEP or PKCS certificates for Microsoft Entra Hybrid joined users or devices, you'll need to take action before February 11, 2025 to either: + +- **(Recommended)** Enable strong mapping by reviewing the steps described in the blog: [Support tip: Implementing strong mapping in Microsoft Intune certificates](https://techcommunity.microsoft.com/blog/intunecustomersuccess/support-tip-implementing-strong-mapping-in-microsoft-intune-certificates/4053376) +- Alternatively, if all certificates can't be renewed before February 11, 2025, with the SID included, enable Compatibility mode by adjusting the registry settings as described in [KB5014754](https://support.microsoft.com/topic/kb5014754-certificate-based-authentication-changes-on-windows-domain-controllers-ad2c23b0-15d8-4340-a468-4d4f3b188f16). Compatibility mode will remain valid until September 2025. + +### Update to the latest Intune App SDK and Intune App Wrapper for Android 15 support + +We've recently released new versions of the Intune App SDK and Intune App Wrapping Tool for Android to support Android 15. We recommend upgrading your app to the latest SDK or wrapper versions to ensure applications stay secure and run smoothly. + +#### How does this affect you or your users? + +If you have applications using the Intune App SDK or Intune App Wrapping Tool for Android, it's recommended that you update your app to the latest version to support Android 15. + +#### How can you prepare? + +If you choose to build apps targeting Android API 35, you'll need to adopt the new version of the Intune App SDK for Android (v11.0.0). If you’ve wrapped your app and are targeting API 35 you'll need to use the new version of the App wrapper (v1.0.4549.6). + +> [!NOTE] +> As a reminder, while apps must update to the latest SDK if targeting Android 15, apps don't need to update the SDK to run on Android 15. + +You should also plan to update your documentation or developer guidance if applicable to include this change in support for the SDK. + +Here are the public repositories: +- [Intune App SDK for Android](https://github.com/microsoftconnect/ms-intune-app-sdk-android) +- [Intune App Wrapping Tool for Android](https://github.com/microsoftconnect/intune-app-wrapping-tool-android) ### Take Action: Enable multifactor authentication for your tenant before October 15, 2024 @@ -111,51 +191,17 @@ Later this year, we expect macOS 15 Sequoia to be released by Apple. Microsoft I This change only affects you if you currently manage, or plan to manage, macOS devices with Intune. This change might not affect you because your users have likely already upgraded their macOS devices. For a list of supported devices, see [macOS Ventura is compatible with these computers](https://support.apple.com/102861). > [!NOTE] -> Devices that are currently enrolled on macOS 12.x or below will continue to remain enrolled even when those versions are no longer supported. New devices will be unable to enroll if they are running macOS 12.x or below. +> Devices that are currently enrolled on macOS 12.x or below will continue to remain enrolled even when those versions are no longer supported. New devices will be unable to enroll if they're running macOS 12.x or below. #### How can you prepare? Check your Intune reporting to see what devices or users might be affected. Go to **Devices** > **All devices** and filter by macOS. You can add more columns to help identify who in your organization has devices running macOS 12.x or earlier. Ask your users to upgrade their devices to a supported OS version. -### Plan for Change: Ending support for Intune App SDK Xamarin Bindings in May 2024 - -With the [end of support for Xamarin Bindings](https://dotnet.microsoft.com/platform/support/policy/xamarin), Intune will end support for Xamarin apps and the Intune App SDK Xamarin Bindings beginning on **May 1, 2024**. - -#### How does this affect you or your users? - -If you have iOS and/or Android apps built with Xamarin and are using the Intune App SDK Xamarin Bindings to enable app protection policies, upgrade your apps to .NET MAUI. - -#### How can you prepare? - -Upgrade your Xamarin based apps to .NET MAUI. Review the following documentation for more information on Xamarin support and upgrading your apps: - -- [Xamarin Support Policy | .NET](https://dotnet.microsoft.com/platform/support/policy/xamarin) -- [Upgrade from Xamarin to .NET | Microsoft Lear](/dotnet/maui/migration/?view=net-maui-8.0&preserve-view=true) -- [Microsoft Intune App SDK for .NET MAUI – Android | NuGet Gallery](https://www.nuget.org/packages/Microsoft.Intune.Maui.Essentials.android) -- [Microsoft Intune App SDK for .NET MAUI – iOS | NuGet Gallery](https://www.nuget.org/packages/Microsoft.Intune.Maui.Essentials.iOS) - -### Plan for Change: Update your PowerShell scripts with a Microsoft Entra ID registered app ID - -Last year we announced a [new Microsoft Intune GitHub repository](https://aka.ms/Intune/Scripts-blog) based on the Microsoft Graph SDK-based PowerShell module. The legacy Microsoft Intune PowerShell sample scripts GitHub repository is now read-only. Additionally, in **May 2024**, due to updated authentication methods in the Graph SDK-based PowerShell module, the global Microsoft Intune PowerShell application (client) ID based authentication method will be removed. - -#### How does this affect you or your users? - -If you're using the Intune PowerShell application ID (d1ddf0e4-d672-4dae-b554-9d5bdfd93547), you'll need to update your scripts with a Microsoft Entra ID registered application ID to prevent your scripts from breaking. - -#### How can you prepare? - -Update your PowerShell scripts by: - -1. Creating a new app registration in the Microsoft Entra admin center. For detailed instructions, read: [Quickstart: Register an application with the Microsoft identity platform](/entra/identity-platform/quickstart-register-app). -2. Update scripts containing the Intune application ID (d1ddf0e4-d672-4dae-b554-9d5bdfd93547) with the new application ID created in step 1. - -For detailed step-by-step instructions visit [powershell-intune-samples/Updating App Registration (github.com)](https://github.com/microsoftgraph/powershell-intune-samples/blob/master/Updating%20App%20Registration). - ### Intune moving to support Android 10 and later for user-based management methods in October 2024 In October 2024, Intune will be moving to support Android 10 and later for user-based management methods, which includes: -- Android Enterprise personally-owned work profile +- Android Enterprise personally owned work profile - Android Enterprise corporate owned work profile - Android Enterprise fully managed - Android Open Source Project (AOSP) user-based @@ -193,11 +239,11 @@ For more information, review: [Manage operating system versions with Microsoft I Today, when creating iOS/iPadOS enrollment profiles, “Device enrollment with Company Portal” is shown as the default method. In an upcoming service release, the default method will change to “Web based device enrollment” during profile creation. Additionally for *new* tenants, if no enrollment profile is created, the user will enroll using web-based device enrollment. > [!NOTE] -> For web enrollment, you will need to deploy the single sign-on (SSO) extension policy to enable just in time (JIT) registration, for more information review: [Set up just in time registration in Microsoft Intune](../enrollment/set-up-just-in-time-registration.md). +> For web enrollment, you need to deploy the single sign-on (SSO) extension policy to enable just in time (JIT) registration, for more information review: [Set up just in time registration in Microsoft Intune](../enrollment/set-up-just-in-time-registration.md). #### How does this affect you or your users? -This is an update to the user interface when creating new iOS/iPadOS enrollment profiles to display “Web based device enrollment” as the default method, existing profiles are not impacted. For *new* tenants, if no enrollment profile is created, the user will enroll using web-based device enrollment. +This is an update to the user interface when creating new iOS/iPadOS enrollment profiles to display “Web based device enrollment” as the default method, existing profiles aren't impacted. For *new* tenants, if no enrollment profile is created, the user will enroll using web-based device enrollment. #### How can you prepare? @@ -210,9 +256,9 @@ Update your documentation and user guidance as needed. If you currently use devi ### Plan for Change: Transition Jamf macOS devices from Conditional Access to Device Compliance -We've been working with Jamf on a migration plan to help customers transition macOS devices from Jamf Pro’s Conditional Access integration to their Device Compliance integration. The Device Compliance integration uses the newer Intune partner compliance management API, which involves a simpler setup than the partner device management API and brings macOS devices onto the same API as iOS devices managed by Jamf Pro. The platform Jamf Pro’s Conditional Access feature is built on will no longer be supported after September 1, 2024. +We've been working with Jamf on a migration plan to help customers transition macOS devices from Jamf Pro’s Conditional Access integration to their Device Compliance integration. The Device Compliance integration uses the newer Intune partner compliance management API, which involves a simpler setup than the partner device management API and brings macOS devices onto the same API as iOS devices managed by Jamf Pro. The platform Jamf Pro’s Conditional Access feature is built on will no longer be supported after January 31, 2025. -Note that customers in some environments cannot be transitioned initially, for more details and updates read the blog: [Support tip: Transitioning Jamf macOS devices from Conditional Access to Device Compliance](https://techcommunity.microsoft.com/t5/intune-customer-success/support-tip-transitioning-jamf-macos-devices-from-conditional/ba-p/3913059). +Note that customers in some environments can't be transitioned initially, for more details and updates read the blog: [Support tip: Transitioning Jamf macOS devices from Conditional Access to Device Compliance](https://techcommunity.microsoft.com/t5/intune-customer-success/support-tip-transitioning-jamf-macos-devices-from-conditional/ba-p/3913059). #### How does this affect you or your users? @@ -240,42 +286,3 @@ After Intune ends support for Android device administrator, devices with access Stop enrolling devices into Android device administrator and migrate impacted devices to other management methods. You can check your Intune reporting to see which devices or users might be affected. Go to **Devices** > **All devices** and filter the OS column to **Android (device administrator)** to see the list of devices. Read the blog, [Microsoft Intune ending support for Android device administrator on devices with GMS access](https://aka.ms/Intune-Android-DA-blog), for our recommended alternative Android device management methods and information about the impact to devices without access to GMS. - -### Plan for Change: Ending support for Microsoft Store for Business and Education apps - -In April 2023, we began ending support for the Microsoft Store for Business experience in Intune. This occurs in several stages. For more information, see: [Adding your Microsoft Store for Business and Education apps to the Microsoft Store in Intune](https://aka.ms/Intune/MSfB-support) - -### How does this affect you or your users? - -If you're using Microsoft Store for Business and Education apps: - -1. On April 30, 2023, Intune will disconnect Microsoft Store for Business services. Microsoft Store for Business and Education apps won't be able to sync with Intune and the connector page will be removed from the Intune admin center. -2. On June 15, 2023, Intune will stop enforcing online and offline Microsoft Store for Business and Education apps on devices. Downloaded applications remain on the device with limited support. Users might still be able to access the app from their device, but the app won't be managed. Existing synced Intune app objects remain to allow admins to view the apps that had been synced and their assignments. Additionally, you'll not be able to sync apps via the Microsoft Graph API syncMicrosoftStoreForBusinessApps and related API properties will display stale data. -3. On September 15, 2023, Microsoft Store for Business and Education apps will be removed from the Intune admin center. Apps on the device remain until intentionally removed. The Microsoft Graph API microsoftStoreForBusinessApp will no longer be available about a month later. - -The retirement of Microsoft Store for Business and Education was [announced in 2021](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/evolving-the-microsoft-store-for-business-and-education/ba-p/2569423). When the Microsoft Store for Business and Education portals are retired, admins will no longer be able to manage the list of Microsoft Store for Business and Education apps that are synced or download offline content from the Microsoft Store for Business and Education portals. - -### How can you prepare? - -We recommend adding your apps through the new Microsoft Store app experience in Intune. If an app isn't available in the Microsoft Store, you need to retrieve an app package from the vendor and install it as a line-of-business (LOB) app or Win32 app. For instructions read the following articles: - -- [Add Microsoft Store apps to Microsoft Intune](../apps/store-apps-microsoft.md) -- [Add a Windows line-of-business app to Microsoft Intune](../apps/lob-apps-windows.md) -- [Add, assign, and monitor a Win32 app in Microsoft Intune](../apps/apps-win32-add.md) - -Related information - -- [Update to Intune integration with the Microsoft Store on Windows](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/update-to-endpoint-manager-integration-with-the-microsoft-store/ba-p/3585077) -- [Unpacking Endpoint Management: The future of app management in Intune](https://techcommunity.microsoft.com/t5/endpoint-management-events/unpacking-endpoint-management-the-future-of-app-management-in/ev-p/3724878) - -### Plan for Change: Ending support for Windows Information Protection - -Microsoft Windows [announced](https://go.microsoft.com/fwlink/?linkid=2202124) they're ending support for Windows Information Protection (WIP). The Microsoft Intune family of products will be discontinuing future investments in managing and deploying WIP. In addition to limiting future investments, we removed support for WIP *without enrollment* scenario at the end of calendar year 2022. - -### How does this affect you or your users? - -If you have enabled WIP policies, you should turn off or disable these policies. - -### How can you prepare? - -We recommend disabling WIP to ensure users in your organization do not lose access to documents that have been protected by WIP policy. Read the blog [Support tip: End of support guidance for Windows Information Protection](https://aka.ms/Intune-WIP-support) for more details and options for removing WIP from your devices. diff --git a/memdocs/intune/includes/mdm-supported-devices.md b/memdocs/intune/includes/mdm-supported-devices.md index f0e4df39afe..25600f2fe8e 100644 --- a/memdocs/intune/includes/mdm-supported-devices.md +++ b/memdocs/intune/includes/mdm-supported-devices.md @@ -4,35 +4,36 @@ ms.author: erikje ms.service: microsoft-intune ms.subservice: fundamentals ms.topic: include -ms.date: 10/10/2024 +ms.date: 11/04/2024 ms.localizationpriority: high --- ### Apple -- **User assigned devices** - devices enrolled with user affinity using Automated Device Enrollment or personally enrolled devices. - - iOS/iPadOS 15.x and later - - macOS 13.0 and later -- **User-less devices** - devices enrolled without user affinity using Automated Device Enrollment or Apple Configurator. +- **Devices with user affinity** - devices enrolled with user affinity using ADE (automated device enrollment) or personally enrolled devices. +- Supported: + - iOS/iPadOS 16.x and later + - macOS 13.x and later +- **Devices without user affinity** - devices enrolled without user affinity using ADE (automated device enrollment) or Apple Configurator. - Supported: - iOS/iPadOS 16.x and later - - macOS 13.0 and later + - macOS 13.x and later - Allowed to enroll: - iOS/iPadOS 13.x and later - - macOS 10.14 and later + - macOS 10.1x and later > [!NOTE] > **Supported** versions include devices running the three most recent operating system versions. These devices can enroll and take advantage of all Intune functionality that is applicable, and all new eligible features will work on these devices. > > **Allowed** versions includes devices running a non-supported version (within three versions of the supported versions). These devices can enroll and take advantage of Intune's eligible features but there is no guarantee that they will work as expected. > -> Intune requires iOS 15.x or later for app protection policies and app configuration. +> Intune requires iOS/iPadOS 16.x or later for app protection policies and app configuration. ### Android - For user-based management methods: Android 10.0 and later - For userless management methods: Android 8.0 and later (including Samsung KNOX Standard 3.0 and higher: [requirements](https://www.samsungknox.com/en/knox-platform/supported-devices/2.4+)) -- Android enterprise +- Android Enterprise: Android 8.0 and later - Android open source project device: [See here for the list of supported devices](../fundamentals/android-os-project-supported-devices.md) [!INCLUDE [android-supported-os](android-supported-os.md)] @@ -40,6 +41,9 @@ ms.localizationpriority: high - Ubuntu Desktop 22.04 LTS with a GNOME graphical desktop environment - Ubuntu Desktop 20.04 LTS with a GNOME graphical desktop environment +- Ubuntu LTS, version 24.04 +- RedHat Enterprise Linux 8 +- RedHat Enterprise Linux 9 > [!NOTE] > Ubuntu Desktop already has a GNOME graphical desktop environment installed. diff --git a/memdocs/intune/index.yml b/memdocs/intune/index.yml index 1341161f314..decac21d09f 100644 --- a/memdocs/intune/index.yml +++ b/memdocs/intune/index.yml @@ -247,9 +247,6 @@ conceptualContent: - url: ./fundamentals/monitor-audit-logs.md itemType: how-to-guide text: Use audit logs to track and monitor events - - url: /mem/analytics/ - itemType: concept - text: Endpoint analytics docs footerLink: text: Browse all reporting and monitoring articles url: ./fundamentals/reports.md @@ -265,6 +262,18 @@ conceptualContent: - url: ./protect/microsoft-tunnel-mam.md itemType: how-to-guide text: Microsoft Tunnel for Mobile Application Management + + - title: Microsoft Endpoint analytics + links: + - url: ../analytics/overview.md + itemType: how-to-guide + text: Overview of Endpoint analytics + - url: ../analytics/scores.md + itemType: how-to-guide + text: Scores, baselines and insight + - url: ../analytics/startup-performance.md + itemType: how-to-guide + text: Reports in Endpoint analytics - title: Developer guidance links: diff --git a/memdocs/intune/industry/education/tutorial-school-deployment/common-config-ipads-ai.md b/memdocs/intune/industry/education/tutorial-school-deployment/common-config-ipads-ai.md index 471b12382f2..ebb9575cd4d 100644 --- a/memdocs/intune/industry/education/tutorial-school-deployment/common-config-ipads-ai.md +++ b/memdocs/intune/industry/education/tutorial-school-deployment/common-config-ipads-ai.md @@ -9,6 +9,8 @@ ms.manager: dougeby no-loc: [Microsoft, Apple] ms.collection: - graph-interactive +ms.service: microsoft-intune +ms.subservice: education --- # Apple Intelligence @@ -38,7 +40,7 @@ To learn more, see: [!INCLUDE [graph-explorer-introduction](../../../includes/graph-explorer-intro.md)] -This will create a policy in your tenant with the name **_MSLearn_Example_CommonEDU - iPads - Appple Intelligence**. +This will create a policy in your tenant with the name **:::no-loc text="_MSLearn_Example_CommonEDU - iPads - Apple Intelligence":::**. ```msgraph-interactive POST https://graph.microsoft.com/beta/deviceManagement/configurationPolicies diff --git a/memdocs/intune/industry/education/tutorial-school-deployment/common-config-ipads-device-restrictions.md b/memdocs/intune/industry/education/tutorial-school-deployment/common-config-ipads-device-restrictions.md index 15dde916548..276e99db7fa 100644 --- a/memdocs/intune/industry/education/tutorial-school-deployment/common-config-ipads-device-restrictions.md +++ b/memdocs/intune/industry/education/tutorial-school-deployment/common-config-ipads-device-restrictions.md @@ -9,6 +9,8 @@ ms.manager: dougeby no-loc: [Microsoft, Apple] ms.collection: - graph-interactive +ms.service: microsoft-intune +ms.subservice: education --- # Common Education iPad device restrictions @@ -97,7 +99,7 @@ To learn more, see: [!INCLUDE [graph-explorer-introduction](../../../includes/graph-explorer-intro.md)] -This will create a policy in your tenant with the name **_MSLearn_Example_CommonEDU - iPads - Device restrictions**. +This will create a policy in your tenant with the name **:::no-loc text="_MSLearn_Example_CommonEDU - iPads - Device restrictions":::**. ```msgraph-interactive POST https://graph.microsoft.com/beta/deviceManagement/configurationPolicies @@ -131,7 +133,7 @@ Content-Type: application/json [!INCLUDE [graph-explorer-introduction](../../../includes/graph-explorer-intro.md)] -This will create a policy in your tenant with the name **_MSLearn_Example_CommonEDU - iPads - Device restrictions (require additional consideration)**. +This will create a policy in your tenant with the name **:::no-loc text="_MSLearn_Example_CommonEDU - iPads - Device restrictions (require additional consideration)":::**. ```msgraph-interactive POST https://graph.microsoft.com/beta/deviceManagement/configurationPolicies diff --git a/memdocs/intune/industry/education/tutorial-school-deployment/common-config-ipads-nouser.md b/memdocs/intune/industry/education/tutorial-school-deployment/common-config-ipads-nouser.md index 8d5c79bbd0a..e251824fe3e 100644 --- a/memdocs/intune/industry/education/tutorial-school-deployment/common-config-ipads-nouser.md +++ b/memdocs/intune/industry/education/tutorial-school-deployment/common-config-ipads-nouser.md @@ -9,6 +9,8 @@ ms.manager: dougeby no-loc: [Microsoft, Apple] ms.collection: - graph-interactive +ms.service: microsoft-intune +ms.subservice: education --- # iPads with no user affinity @@ -43,7 +45,7 @@ To learn more, see: [!INCLUDE [graph-explorer-introduction](../../../includes/graph-explorer-intro.md)] -This will create a policy in your tenant with the name **_MSLearn_Example_CommonEDU - iPads - No user affinity**. +This will create a policy in your tenant with the name **:::no-loc text="_MSLearn_Example_CommonEDU - iPads - No user affinity":::**. ```msgraph-interactive POST https://graph.microsoft.com/beta/deviceManagement/configurationPolicies diff --git a/memdocs/intune/industry/education/tutorial-school-deployment/common-config-ipads-optional.md b/memdocs/intune/industry/education/tutorial-school-deployment/common-config-ipads-optional.md index dff086ba432..fec60b208f5 100644 --- a/memdocs/intune/industry/education/tutorial-school-deployment/common-config-ipads-optional.md +++ b/memdocs/intune/industry/education/tutorial-school-deployment/common-config-ipads-optional.md @@ -9,6 +9,8 @@ ms.manager: dougeby no-loc: [Microsoft, Apple] ms.collection: - graph-interactive +ms.service: microsoft-intune +ms.subservice: education --- # Optional restrictions @@ -29,10 +31,10 @@ To learn more, see: |---|---|:---:|---|---| | Managed Settings > Bluetooth | **:::no-loc text="Enabled":::** | True | Enable the Bluetooth setting. | [:::no-loc text="Enabled":::](https://developer.apple.com/documentation/devicemanagement/settingscommand/command/settings/bluetooth) | | Restrictions | **:::no-loc text="Force Automatic Date And Time":::** | True | Enables the Set Automatically feature in Date & Time and the user can't disable it.

    **Note:**
    • Location services must be enabled during Setup Assistant.
    • Manual Time Zone policy will return an error if this policy is set to True.
    | [:::no-loc text="forceAutomaticDateAndTime":::](https://developer.apple.com/documentation/devicemanagement/restrictions) | -| Managed Settings > Time Zone | **:::no-loc text="Time Zone":::** | **Example**:
    America/Los_Angeles
    Asia/Tokyo
    Australia/Brisbane

    See complete list in [:::no-loc text="IANA time zone database":::](https://data.iana.org/time-zones/tzdb/zone.tab). | If the **forceAutomaticDateAndTime** restriction is set in Restrictions, this setting fails with an error. Otherwise, setting this value disables automatic time zone logic. The user is still able to change the time zone; for example, by turning automatic date and time back on. The intention is to allow setting the time zone when automatic determination isn't available, such as when Location Services are off. | [:::no-loc text="TimeZone":::](https://developer.apple.com/documentation/devicemanagement/settingscommand/command/settings/timezone) | +| Managed Settings > Time Zone | **:::no-loc text="Time Zone":::** | **Example**:
    :::no-loc text="America/Los_Angeles":::
    :::no-loc text="Asia/Tokyo":::
    :::no-loc text="Australia/Brisbane":::

    See complete list in [:::no-loc text="IANA time zone database":::](https://data.iana.org/time-zones/tzdb/zone.tab). | If the **forceAutomaticDateAndTime** restriction is set in Restrictions, this setting fails with an error. Otherwise, setting this value disables automatic time zone logic. The user is still able to change the time zone; for example, by turning automatic date and time back on. The intention is to allow setting the time zone when automatic determination isn't available, such as when Location Services are off. | [:::no-loc text="TimeZone":::](https://developer.apple.com/documentation/devicemanagement/settingscommand/command/settings/timezone) | | Restrictions | **:::no-loc text="Allow Bluetooth Modification":::** | False | Prevents modification of Bluetooth settings. | [:::no-loc text="allowBluetoothModification":::](https://developer.apple.com/documentation/devicemanagement/restrictions) | | Restrictions | **:::no-loc text="Allow USB Restricted Mode":::** | True | Allows iOS devices to always connect to USB accessories while locked. If the system has Lockdown mode enabled, it ignores this value. | [:::no-loc text="allowUSBRestrictedMode":::](https://developer.apple.com/documentation/devicemanagement/restrictions) | -| Restrictions | **:::no-loc text="Blocked App Bundle IDs":::** | **Example:**
    com.apple.facetime
    com.apple.findmy
    com.apple.Home
    com.apple.MobileStore
    com.apple.MobileSMS
    com.apple.Music
    com.apple.podcasts
    com.apple.stocks
    com.apple.tv
    com.apple.store.Jolly
    com.apple.supportapp | Prevents showing or launching apps with bundle IDs in the array. | [:::no-loc text="blockedAppBundleIDs":::](https://developer.apple.com/documentation/devicemanagement/restrictions) | +| Restrictions | **:::no-loc text="Blocked App Bundle IDs":::** | **Example:**
    :::no-loc text="com.apple.facetime":::
    :::no-loc text="com.apple.findmy":::
    :::no-loc text="com.apple.Home":::
    :::no-loc text="com.apple.MobileStore":::
    :::no-loc text="com.apple.MobileSMS":::
    :::no-loc text="com.apple.Music":::
    :::no-loc text="com.apple.podcasts":::
    :::no-loc text="com.apple.stocks":::
    :::no-loc text="com.apple.tv":::
    :::no-loc text="com.apple.store.Jolly":::
    :::no-loc text="com.apple.supportapp"::: | Prevents showing or launching apps with bundle IDs in the array. | [:::no-loc text="blockedAppBundleIDs":::](https://developer.apple.com/documentation/devicemanagement/restrictions) | | Restrictions | **:::no-loc text="Enforced Software Update Delay":::** | 30 | How many days to delay a software update on the device. | [:::no-loc text="enforcedSoftwareUpdateDelay":::](https://developer.apple.com/documentation/devicemanagement/restrictions) | | Restrictions | **:::no-loc text="Force Classroom Automatically Join Classes":::** | True | Automatically gives permission to the teacher's requests without prompting the student. | [:::no-loc text="forceClassroomAutomaticallyJoinClasses":::](https://developer.apple.com/documentation/devicemanagement/restrictions) | | Restrictions | **:::no-loc text="Force Classroom Request Permission To Leave Classes":::** | True | A student enrolled in an unmanaged course through Classroom needs to request permission from the teacher to leave the course. | [:::no-loc text="forceClassroomRequestPermissionToLeaveClasses":::](https://developer.apple.com/documentation/devicemanagement/restrictions) | @@ -46,7 +48,7 @@ To learn more, see: [!INCLUDE [graph-explorer-introduction](../../../includes/graph-explorer-intro.md)] -This will create a policy in your tenant with the name **_MSLearn_Example_CommonEDU - iPads - Optional**. +This will create a policy in your tenant with the name **:::no-loc text="_MSLearn_Example_CommonEDU - iPads - Optional":::**. ```msgraph-interactive POST https://graph.microsoft.com/beta/deviceManagement/configurationPolicies diff --git a/memdocs/intune/industry/education/tutorial-school-deployment/common-config-overview.md b/memdocs/intune/industry/education/tutorial-school-deployment/common-config-overview.md index c89e98535ec..030ea364b9d 100644 --- a/memdocs/intune/industry/education/tutorial-school-deployment/common-config-overview.md +++ b/memdocs/intune/industry/education/tutorial-school-deployment/common-config-overview.md @@ -8,6 +8,8 @@ author: yegor-a ms.author: egorabr ms.manager: dougeby no-loc: [Microsoft, Windows, Autopatch, Autopilot, Edge, Apple] +ms.service: microsoft-intune +ms.subservice: education --- # Common Education configuration overview diff --git a/memdocs/intune/industry/education/tutorial-school-deployment/common-config-settings-catalog-delivery-optimization.md b/memdocs/intune/industry/education/tutorial-school-deployment/common-config-settings-catalog-delivery-optimization.md index 66ed57a2cf5..1f716a115b5 100644 --- a/memdocs/intune/industry/education/tutorial-school-deployment/common-config-settings-catalog-delivery-optimization.md +++ b/memdocs/intune/industry/education/tutorial-school-deployment/common-config-settings-catalog-delivery-optimization.md @@ -7,6 +7,10 @@ author: yegor-a ms.author: egorabr ms.manager: dougeby no-loc: [Microsoft, Windows, Autopatch, Autopilot] +ms.collection: +- graph-interactive +ms.service: microsoft-intune +ms.subservice: education --- # Delivery Optimization @@ -24,14 +28,31 @@ To learn more, see: > [!TIP] > When creating a settings catalog profile in the Microsoft Intune admin center, you can copy a policy name from this article and paste it into the settings picker search field to find the desired policy. -## Settings catalog policies - -| **Name** | **Value** | **Notes** | **CSP** | -|---|---|---|---| -| **:::no-loc text="DO Delay Background Download From Http":::** | 3600 | 1 hour in seconds. After the max delay is reached, the download will resume using HTTP, either downloading the entire payload or complementing the bytes that couldn't be downloaded from Peers. | [:::no-loc text="DODelayBackgroundDownloadFromHttp":::](/windows/client-management/mdm/policy-csp-deliveryoptimization#dodelaybackgrounddownloadfromhttp) | -| **:::no-loc text="DO Download Mode":::** | HTTP blended with peering behind the same NAT. | Delivery Optimization enables peer sharing on the same network between clients that connect to the Internet using the same public IP. | [:::no-loc text="DODownloadMode":::](/windows/client-management/mdm/policy-csp-deliveryoptimization#dodownloadmode) | -| **:::no-loc text="DO Max Cache Age":::** | 1209600 | 14 days in seconds. Specifies the maximum time in seconds that each file is held in the Delivery Optimization cache after downloading successfully. | [:::no-loc text="DOMaxCacheAge":::](/windows/client-management/mdm/policy-csp-deliveryoptimization#domaxcacheage) | -| **:::no-loc text="DO Min Disk Size Allowed To Peer":::** | 100 | Specifies the required minimum disk size (capacity in GB) for the device to use Peer Caching. Recommended values: 64 GB to 256 GB.Adjust as necessary according to your hardware. | [:::no-loc text="DOMinDiskSizeAllowedToPeer":::](/windows/client-management/mdm/policy-csp-deliveryoptimization#domindisksizeallowedtopeer) | -| **:::no-loc text="DO Min File Size To Cache":::** | 5 | Specifies the minimum content file size in MB enabled to use Peer Caching. | [:::no-loc text="DOMinFileSizeToCache":::](/windows/client-management/mdm/policy-csp-deliveryoptimization#dominfilesizetocache) | -| **:::no-loc text="DO Min RAM Allowed To Peer":::** | 2 | Specifies the minimum RAM size in GB required to use Peer Caching. | [:::no-loc text="DOMinRAMAllowedToPeer":::](/windows/client-management/mdm/policy-csp-deliveryoptimization#dominramallowedtopeer) | -| **:::no-loc text="DO Restrict Peer selection By":::** | Subnet mask | Set this policy to restrict peer selection | [:::no-loc text="DORestrictPeerSelectionBy":::](/windows/client-management/mdm/policy-csp-deliveryoptimization#dorestrictpeerselectionby) | +## [**Settings**](#tab/settings) + +| **Category** | **Name** | **Value** | **Notes** | **CSP** | +|---|---|---|---|---| +| Delivery Optimization | **:::no-loc text="DO Delay Background Download From Http":::** | 3600 | 1 hour in seconds. After the max delay is reached, the download will resume using HTTP, either downloading the entire payload or complementing the bytes that couldn't be downloaded from Peers. | [:::no-loc text="DODelayBackgroundDownloadFromHttp":::](/windows/client-management/mdm/policy-csp-deliveryoptimization#dodelaybackgrounddownloadfromhttp) | +| Delivery Optimization | **:::no-loc text="DO Download Mode":::** | HTTP blended with peering behind the same NAT. | Delivery Optimization enables peer sharing on the same network between clients that connect to the Internet using the same public IP. | [:::no-loc text="DODownloadMode":::](/windows/client-management/mdm/policy-csp-deliveryoptimization#dodownloadmode) | +| Delivery Optimization | **:::no-loc text="DO Max Cache Age":::** | 1209600 | 14 days in seconds. Specifies the maximum time in seconds that each file is held in the Delivery Optimization cache after downloading successfully. | [:::no-loc text="DOMaxCacheAge":::](/windows/client-management/mdm/policy-csp-deliveryoptimization#domaxcacheage) | +| Delivery Optimization | **:::no-loc text="DO Min Disk Size Allowed To Peer":::** | 100 | Specifies the required minimum disk size (capacity in GB) for the device to use Peer Caching. Recommended values: 64 GB to 256 GB.Adjust as necessary according to your hardware. | [:::no-loc text="DOMinDiskSizeAllowedToPeer":::](/windows/client-management/mdm/policy-csp-deliveryoptimization#domindisksizeallowedtopeer) | +| Delivery Optimization | **:::no-loc text="DO Min File Size To Cache":::** | 5 | Specifies the minimum content file size in MB enabled to use Peer Caching. | [:::no-loc text="DOMinFileSizeToCache":::](/windows/client-management/mdm/policy-csp-deliveryoptimization#dominfilesizetocache) | +| Delivery Optimization | **:::no-loc text="DO Min RAM Allowed To Peer":::** | 2 | Specifies the minimum RAM size in GB required to use Peer Caching. | [:::no-loc text="DOMinRAMAllowedToPeer":::](/windows/client-management/mdm/policy-csp-deliveryoptimization#dominramallowedtopeer) | +| Delivery Optimization | **:::no-loc text="DO Restrict Peer selection By":::** | Subnet mask | Set this policy to restrict peer selection | [:::no-loc text="DORestrictPeerSelectionBy":::](/windows/client-management/mdm/policy-csp-deliveryoptimization#dorestrictpeerselectionby) | + +## [:::image type="icon" source="../../../media/icons/graph.svg"::: **Create policy using Graph Explorer**](#tab/graph) + +[!INCLUDE [graph-explorer-introduction](../../../includes/graph-explorer-intro.md)] + +This will create a policy in your tenant with the name **:::no-loc text="_MSLearn_Example_CommonEDU - Windows - Delivery Optimization":::**. + +```msgraph-interactive +POST https://graph.microsoft.com/beta/deviceManagement/configurationPolicies +Content-Type: application/json + +{"name":"_MSLearn_Example_CommonEDU - Windows - Delivery Optimization","description":"https://aka.ms/ManageEduDevices","platforms":"windows10","technologies":"mdm","roleScopeTagIds":["0"],"settings":[{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSimpleSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_deliveryoptimization_dodelaybackgrounddownloadfromhttp","simpleSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationIntegerSettingValue","value":3600}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_deliveryoptimization_dodownloadmode","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_deliveryoptimization_dodownloadmode_1","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSimpleSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_deliveryoptimization_domaxcacheage","simpleSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationIntegerSettingValue","value":1209600}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSimpleSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_deliveryoptimization_domindisksizeallowedtopeer","simpleSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationIntegerSettingValue","value":100}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSimpleSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_deliveryoptimization_dominfilesizetocache","simpleSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationIntegerSettingValue","value":5}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSimpleSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_deliveryoptimization_dominramallowedtopeer","simpleSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationIntegerSettingValue","value":2}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_deliveryoptimization_dorestrictpeerselectionby","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_deliveryoptimization_dorestrictpeerselectionby_1","children":[]}}}]} +``` + +[!INCLUDE [graph-explorer-steps](../../../includes/graph-explorer-steps.md)] + +--- diff --git a/memdocs/intune/industry/education/tutorial-school-deployment/common-config-settings-catalog-device-restrictions.md b/memdocs/intune/industry/education/tutorial-school-deployment/common-config-settings-catalog-device-restrictions.md index e2d4bc91e1f..d9c76009c01 100644 --- a/memdocs/intune/industry/education/tutorial-school-deployment/common-config-settings-catalog-device-restrictions.md +++ b/memdocs/intune/industry/education/tutorial-school-deployment/common-config-settings-catalog-device-restrictions.md @@ -7,6 +7,10 @@ author: yegor-a ms.author: egorabr ms.manager: dougeby no-loc: [Microsoft, Windows, Autopatch, Autopilot] +ms.collection: +- graph-interactive +ms.service: microsoft-intune +ms.subservice: education --- # Common Education device restrictions @@ -24,72 +28,91 @@ To learn more, see [Use the settings catalog to configure settings on Windows, i Configure these settings to personalize user experience and simplify the Windows sign-in process. Values for these settings should be defined according to the environment. -| **Name** | **Value** | **Notes** | **CSP** | -|---|---|---|---| -|**:::no-loc text="Preferred Aad Tenant Domain Name":::** | _domain_ | Simplifies the sign-in to Windows by automatically appending the domain to the username | [:::no-loc text="Authentication/PreferredAadTenantDomainName":::](/windows/client-management/mdm/policy-csp-authentication#preferredaadtenantdomainname) | -|**:::no-loc text="Desktop Image Url":::** | _url_ | An http or https Url to a jpg, jpeg or png image that needs to be downloaded and used as the Desktop Image or a file Url to a local image on the file system that needs to be used as the Desktop Image. | [:::no-loc text="Personalization/DesktopImageUrl":::](/windows/client-management/mdm/personalization-csp#desktopimageurl) | -|**:::no-loc text="Lock Screen Image Url":::** | _url_ | An http or https URL to a jpg, jpeg or png image that needs to be downloaded and used as the Lock Screen Image. | [:::no-loc text="Personalization/LockScreenImageUrl":::](/windows/client-management/mdm/personalization-csp#lockscreenimageurl) | -|**:::no-loc text="Configure Time Zone":::** | _timezone_ | Use Timezone column from [:::no-loc text="Default Time Zones":::](/windows-hardware/manufacture/desktop/default-time-zones) | [:::no-loc text="TimeLanguageSettings/ConfigureTimeZone":::](/windows/client-management/mdm/policy-csp-timelanguagesettings#configuretimezone) | +| **Category** | **Name** | **Value** | **Notes** | **CSP** | +|---|---|---|---|---| +| Authentication |**:::no-loc text="Preferred Aad Tenant Domain Name":::** | _domain_ | Simplifies the sign-in to Windows by automatically appending the domain to the username | [:::no-loc text="Authentication/PreferredAadTenantDomainName":::](/windows/client-management/mdm/policy-csp-authentication#preferredaadtenantdomainname) | +| Personalization |**:::no-loc text="Desktop Image Url":::** | _url_ | An http or https Url to a jpg, jpeg or png image that needs to be downloaded and used as the Desktop Image or a file Url to a local image on the file system that needs to be used as the Desktop Image. | [:::no-loc text="Personalization/DesktopImageUrl":::](/windows/client-management/mdm/personalization-csp#desktopimageurl) | +| Personalization |**:::no-loc text="Lock Screen Image Url":::** | _url_ | An http or https URL to a jpg, jpeg or png image that needs to be downloaded and used as the Lock Screen Image. | [:::no-loc text="Personalization/LockScreenImageUrl":::](/windows/client-management/mdm/personalization-csp#lockscreenimageurl) | +| Time Language Settings |**:::no-loc text="Configure Time Zone":::** | _timezone_ | Use Timezone column from [:::no-loc text="Default Time Zones":::](/windows-hardware/manufacture/desktop/default-time-zones) | [:::no-loc text="TimeLanguageSettings/ConfigureTimeZone":::](/windows/client-management/mdm/policy-csp-timelanguagesettings#configuretimezone) | ## General restrictions Commonly applied device restrictions in education. -| **Name** | **Value** | **Notes** | **CSP** | -|---|---|---|---| -|**:::no-loc text="Allow Cortana Above Lock":::** | Block | The system will need to be unlocked for the user to interact with Cortana using speech. | [:::no-loc text="AboveLock/AllowCortanaAboveLock":::](/windows/client-management/mdm/policy-csp-abovelock#allowcortanaabovelock) | -|**:::no-loc text="Allow Toasts":::** | Block | Block toast notifications above the device lock screen | [:::no-loc text="AboveLock/AllowToasts":::](/windows/client-management/mdm/policy-csp-abovelock#allowtoasts) | -|**:::no-loc text="Allow Adding Non Microsoft Accounts Manually":::** | Block | Block users from adding non-MSA email account. | [:::no-loc text="Accounts/AllowAddingNonMicrosoftAccountsManually":::](/windows/client-management/mdm/policy-csp-accounts#allowaddingnonmicrosoftaccountsmanually) | -|**:::no-loc text="Allow Microsoft Account Connection":::** | Block | Block users from using an MSA account for non-email related connection authentication and services. | [:::no-loc text="Accounts/AllowMicrosoftAccountConnection":::](/windows/client-management/mdm/policy-csp-accounts#allowmicrosoftaccountconnection) | -|**:::no-loc text="Specify the system hibernate timeout (on battery)":::** | Disabled | | [:::no-loc text="Power/HibernateTimeoutOnBattery":::](/windows/client-management/mdm/policy-csp-power#hibernatetimeoutonbattery) | -|**:::no-loc text="Specify the system sleep timeout (on battery)":::** | Enabled | Only enables the setting configuration. | [:::no-loc text="Power/StandbyTimeoutOnBattery":::](/windows/client-management/mdm/policy-csp-power#standbytimeoutonbattery) | -|**:::no-loc text="System Sleep Timeout (seconds):":::** | 3600 | | [:::no-loc text="Power/StandbyTimeoutOnBattery":::](/windows/client-management/mdm/policy-csp-power#standbytimeoutonbattery) | -|**:::no-loc text="Specify the system sleep timeout (plugged in)":::** | Enabled | Only enables the setting configuration. | [:::no-loc text="Power/StandbyTimeoutPluggedIn":::](/windows/client-management/mdm/policy-csp-power#standbytimeoutpluggedin) | -|**:::no-loc text="System Sleep Timeout (seconds):":::** | 3600 | | [:::no-loc text="Power/StandbyTimeoutPluggedIn":::](/windows/client-management/mdm/policy-csp-power#standbytimeoutpluggedin) | -|**:::no-loc text="Turn off the display (on battery)":::** | Enabled | | [:::no-loc text="Power/DisplayOffTimeoutOnBattery":::](/windows/client-management/mdm/policy-csp-power#displayofftimeoutonbattery) | -|**:::no-loc text="On battery power, turn display off after (seconds)":::** | 300 | | [:::no-loc text="Power/DisplayOffTimeoutOnBattery":::](/windows/client-management/mdm/policy-csp-power#displayofftimeoutonbattery) | -|**:::no-loc text="Turn off the display (plugged in)":::** | Enabled | | [:::no-loc text="Power/DisplayOffTimeoutPluggedIn":::](/windows/client-management/mdm/policy-csp-power#displayofftimeoutpluggedin) | -|**:::no-loc text="When plugged in, turn display off after (seconds)":::** | 300 | | [:::no-loc text="Power/DisplayOffTimeoutPluggedIn":::](/windows/client-management/mdm/policy-csp-power#displayofftimeoutpluggedin) | -|**:::no-loc text="All Removable Storage classes: Deny all access":::** | Disabled | Do not block access to removable storage | [:::no-loc text="ADMX_RemovableStorage/RemovableStorageClasses_DenyAll_Access_2":::](/windows/client-management/mdm/policy-csp-admx-removablestorage#removablestorageclasses_denyall_access_2) | -|**:::no-loc text="Allow Advertising":::** | Block | Blocks the device from sending out Bluetooth advertisements. | [:::no-loc text="Bluetooth/AllowAdvertising":::](/windows/client-management/mdm/policy-csp-bluetooth#allowadvertising) | -|**:::no-loc text="Allow Discoverable Mode":::** | Allow | Allow other Bluetooth-enabled devices discover the device. | [:::no-loc text="Bluetooth/AllowDiscoverableMode":::](/windows/client-management/mdm/policy-csp-bluetooth#allowdiscoverablemode) | -|**:::no-loc text="Allow Prompted Proximal Connections":::** | Block | Block users on these managed devices from using Swift Pair and other proximity based scenarios. | [:::no-loc text="Bluetooth/AllowPromptedProximalConnections":::](/windows/client-management/mdm/policy-csp-bluetooth#allowpromptedproximalconnections) | -|**:::no-loc text="Allow Camera":::** | Allowed | | [:::no-loc text="Camera/AllowCamera":::](/windows/client-management/mdm/policy-csp-camera#allowcamera) | -|**:::no-loc text="Allow Bluetooth":::** | Allow Bluetooth. The radio in the Bluetooth control panel will be functional and the user will be able to turn Bluetooth on. | | [:::no-loc text="Connectivity/AllowBluetooth":::](/windows/client-management/mdm/policy-csp-connectivity#allowbluetooth) | -|**:::no-loc text="Allow Cellular Data Roaming":::** | Do not allow cellular data roaming. The user cannot turn it on. This value is not supported in Windows 10, version 1511. | | [:::no-loc text="Connectivity/AllowCellularDataRoaming":::](/windows/client-management/mdm/policy-csp-connectivity#allowcellulardataroaming) | -|**:::no-loc text="Allow Cortana":::** | Block | | [:::no-loc text="Experience/AllowCortana":::](/windows/client-management/mdm/policy-csp-experience#allowcortana) | -|**:::no-loc text="Allow Manual MDM Unenrollment":::** | Block | Block the user from deleting the workplace account using the workplace control panel. | [:::no-loc text="Experience/AllowManualMDMUnenrollment":::](/windows/client-management/mdm/policy-csp-experience#allowmanualmdmunenrollment) | -|**:::no-loc text="Allow Widgets":::** | Not allowed. | This policy applies to the entire widgets experience, including content on the taskbar. | [:::no-loc text="AllowNewsAndInterests":::](/windows/client-management/mdm/policy-csp-newsandinterests) | -|**:::no-loc text="Allow Windows Spotlight (User)":::** | Block | Turn off Windows spotlight on lock screen, Windows Tips, Microsoft consumer features and other related features. | [:::no-loc text="Experience/AllowWindowsSpotlight":::](/windows/client-management/mdm/policy-csp-experience#allowwindowsspotlight) | -|**:::no-loc text="Allow All Trusted Apps":::** | Explicit allow unlock. | Allow install of any LOB or developer-signed Windows Store app (which must be signed with a certificate chain that can be successfully validated by the local computer) | [:::no-loc text="ApplicationManagement/AllowAllTrustedApps":::](/windows/client-management/mdm/policy-csp-applicationmanagement#allowalltrustedapps) | -|**:::no-loc text="Allow Developer Unlock":::** | Explicit deny. | Block developing Microsoft Store apps or installing them directly from an IDE. | [:::no-loc text="ApplicationManagement/AllowDeveloperUnlock":::](/windows/client-management/mdm/policy-csp-applicationmanagement#allowdeveloperunlock) | -|**:::no-loc text="Allow Shared User App Data":::** | Block | Windows app can't share app data with other instances of that app. | [:::no-loc text="ApplicationManagement/AllowSharedUserAppData":::](/windows/client-management/mdm/policy-csp-applicationmanagement#allowshareduserappdata) | -|**:::no-loc text="Turn off the Store application":::** | Enabled | Access to the Store application is denied. | [:::no-loc text="ADMX_WindowsStore/RemoveWindowsStore_2":::](/windows/client-management/mdm/policy-csp-admx-windowsstore#removewindowsstore_2) | -|**:::no-loc text="Allow Hibernate":::** | Block | Windows 11 only | [:::no-loc text="Power/AllowHibernate":::](/windows/client-management/mdm/policy-csp-power#allowhibernate) | -|**:::no-loc text="Energy Saver Battery Threshold On Battery":::** | 50 | Energy Saver will be automatically turned on at (and below) the specified level. | [:::no-loc text="Power/EnergySaverBatteryThresholdOnBattery":::](/windows/client-management/mdm/policy-csp-power#energysaverbatterythresholdonbattery) | -|**:::no-loc text="Energy Saver Battery Threshold Plugged In":::** | 40 | Energy Saver will be automatically turned on at (and below) the specified level. | [:::no-loc text="Power/EnergySaverBatteryThresholdPluggedIn":::](/windows/client-management/mdm/policy-csp-power#energysaverbatterythresholdpluggedin) | -|**:::no-loc text="Select Lid Close Action On Battery":::** | Sleep | | [:::no-loc text="Power/SelectLidCloseActionOnBattery":::](/windows/client-management/mdm/policy-csp-power#selectlidcloseactiononbattery) | -|**:::no-loc text="Select Lid Close Action Plugged In":::** | Sleep | | [:::no-loc text="Power/SelectLidCloseActionPluggedIn":::](/windows/client-management/mdm/policy-csp-power#selectlidcloseactionpluggedin) | -|**:::no-loc text="Select Power Button Action On Battery":::** | Sleep | | [:::no-loc text="Power/SelectPowerButtonActionOnBattery":::](/windows/client-management/mdm/policy-csp-power#selectpowerbuttonactiononbattery) | -|**:::no-loc text="Select Power Button Action Plugged In":::** | Sleep | | [:::no-loc text="Power/SelectPowerButtonActionPluggedIn":::](/windows/client-management/mdm/policy-csp-power#selectpowerbuttonactionpluggedin) | -|**:::no-loc text="Select Sleep Button Action On Battery":::** | Sleep | | [:::no-loc text="Power/SelectSleepButtonActionOnBattery":::](/windows/client-management/mdm/policy-csp-power#selectsleepbuttonactiononbattery) | -|**:::no-loc text="Select Sleep Button Action Plugged In":::** | Sleep | | [:::no-loc text="Power/SelectSleepButtonActionPluggedIn":::](/windows/client-management/mdm/policy-csp-power#selectsleepbuttonactionpluggedin) | -|**:::no-loc text="Turn Off Hybrid Sleep On Battery":::** | hybrid sleep | A hiberfile isn't generated when the system transitions to sleep (Stand By). | [:::no-loc text="Power/TurnOffHybridSleepOnBattery":::](/windows/client-management/mdm/policy-csp-power#turnoffhybridsleeponbattery) | -|**:::no-loc text="Turn Off Hybrid Sleep Plugged In":::** | hybrid sleep | A hiberfile isn't generated when the system transitions to sleep (Stand By). | [:::no-loc text="Power/TurnOffHybridSleepPluggedIn":::](/windows/client-management/mdm/policy-csp-power#turnoffhybridsleeppluggedin) | -|**:::no-loc text="Unattended Sleep Timeout On Battery":::** | 3600 | How much idle time (seconds) should elapse before Windows automatically transitions to sleep when left unattended. | [:::no-loc text="Power/UnattendedSleepTimeoutOnBattery":::](/windows/client-management/mdm/policy-csp-power#unattendedsleeptimeoutonbattery) | -|**:::no-loc text="Unattended Sleep Timeout Plugged In":::** | 3600 | How much idle time (seconds) should elapse before Windows automatically transitions to sleep when left unattended. | [:::no-loc text="Power/UnattendedSleepTimeoutPluggedIn":::](/windows/client-management/mdm/policy-csp-power#unattendedsleeptimeoutpluggedin) | -|**:::no-loc text="Allow Add Provisioning Package":::** | Allow | Allow the runtime configuration agent to install provisioning packages. | [:::no-loc text="Security/AllowAddProvisioningPackage":::](/windows/client-management/mdm/policy-csp-security#allowaddprovisioningpackage) | -|**:::no-loc text="Allow Remove Provisioning Package":::** | Allow | Allow the runtime configuration agent to remove provisioning packages. | [:::no-loc text="Security/AllowRemoveProvisioningPackage":::](/windows/client-management/mdm/policy-csp-security#allowremoveprovisioningpackage) | -|**:::no-loc text="Allow Date Time":::** | Block | Block the user from changing date and time settings. | [:::no-loc text="Settings/AllowDateTime":::](/windows/client-management/mdm/policy-csp-settings#allowdatetime) | -|**:::no-loc text="Allow Language":::** | Block | Block the user from changing the language settings. | [:::no-loc text="Settings/AllowLanguage":::](/windows/client-management/mdm/policy-csp-settings#allowlanguage) | -|**:::no-loc text="Allow Power Sleep":::** | Block | Block the user from changing power and sleep settings. | [:::no-loc text="Settings/AllowPowerSleep":::](/windows/client-management/mdm/policy-csp-settings#allowpowersleep) | -|**:::no-loc text="Allow Region":::** | Block | Block the user from changing the region settings. | [:::no-loc text="Settings/AllowRegion":::](/windows/client-management/mdm/policy-csp-settings#allowregion) | -|**:::no-loc text="Enable Shared PC Mode":::** | False | | [:::no-loc text="SharedPC/EnableSharedPCMode":::](/windows/client-management/mdm/sharedpc-csp#enablesharedpcmode) | -|**:::no-loc text="Restrict Local Storage":::** | False | | [:::no-loc text="SharedPC/RestrictLocalStorage":::](/windows/client-management/mdm/sharedpc-csp#restrictlocalstorage) | -|**:::no-loc text="Set Edu Policies":::** | true | [:::no-loc text="Windows 10 configuration recommendations for education customers":::](/education/windows/configure-windows-for-education) | [:::no-loc text="SharedPC/SetEDUpolicies":::](/windows/client-management/mdm/sharedpc-csp#setedupolicies) | -|**:::no-loc text="Allow End Task":::** | Block | | [:::no-loc text="TaskManager/AllowEndTask":::](/windows/client-management/mdm/policy-csp-taskmanager#allowendtask) | -|**:::no-loc text="Allow Auto Connect To Wi Fi Sense Hotspots":::** | Block | | [:::no-loc text="Wifi/AllowAutoConnectToWiFiSenseHotspots":::](/windows/client-management/mdm/policy-csp-wifi#allowautoconnecttowifisensehotspots) | -|**:::no-loc text="Allow Internet Sharing":::** | Block | | [:::no-loc text="Wifi/AllowInternetSharing":::](/windows/client-management/mdm/policy-csp-wifi#allowinternetsharing) | -|**:::no-loc text="Hide Fast User Switching":::** | Enabled | | [:::no-loc text="WindowsLogon/HideFastUserSwitching":::](/windows/client-management/mdm/policy-csp-windowslogon#hidefastuserswitching) | -|**:::no-loc text="Disable Automatic Re Deployment Credentials":::** | Disabled | Enables local Autopilot Reset | [:::no-loc text="CredentialProviders/DisableAutomaticReDeploymentCredentials":::](/en-us/windows/client-management/mdm/policy-csp-credentialproviders#disableautomaticredeploymentcredentials) | -|**:::no-loc text="Configure Chat Icon":::** | Disabled | Configures the Teams Chat icon on the taskbar for Windows 11 | [:::no-loc text="Experience/ConfigureChatIcon":::](/en-us/windows/client-management/mdm/policy-csp-experience#configurechaticon) | +### [**Settings**](#tab/settings) + +| **Category** | **Name** | **Value** | **Notes** | **CSP** | +|---|---|---|---|---| +| Above Lock |**:::no-loc text="Allow Cortana Above Lock":::** | Block | The system will need to be unlocked for the user to interact with Cortana using speech. | [:::no-loc text="AboveLock/AllowCortanaAboveLock":::](/windows/client-management/mdm/policy-csp-abovelock#allowcortanaabovelock) | +| Above Lock |**:::no-loc text="Allow Toasts":::** | Block | Block toast notifications above the device lock screen | [:::no-loc text="AboveLock/AllowToasts":::](/windows/client-management/mdm/policy-csp-abovelock#allowtoasts) | +| Accounts |**:::no-loc text="Allow Adding Non Microsoft Accounts Manually":::** | Block | Block users from adding non-MSA email account. | [:::no-loc text="Accounts/AllowAddingNonMicrosoftAccountsManually":::](/windows/client-management/mdm/policy-csp-accounts#allowaddingnonmicrosoftaccountsmanually) | +| Accounts |**:::no-loc text="Allow Microsoft Account Connection":::** | Block | Block users from using an MSA account for non-email related connection authentication and services. | [:::no-loc text="Accounts/AllowMicrosoftAccountConnection":::](/windows/client-management/mdm/policy-csp-accounts#allowmicrosoftaccountconnection) | +| Administrative Templates > System > Power Management > Sleep Settings |**:::no-loc text="Specify the system hibernate timeout (on battery)":::** | Disabled | | [:::no-loc text="Power/HibernateTimeoutOnBattery":::](/windows/client-management/mdm/policy-csp-power#hibernatetimeoutonbattery) | +| Administrative Templates > System > Power Management > Sleep Settings |**:::no-loc text="Specify the system sleep timeout (on battery)":::** | Enabled | Only enables the setting configuration. | [:::no-loc text="Power/StandbyTimeoutOnBattery":::](/windows/client-management/mdm/policy-csp-power#standbytimeoutonbattery) | +| Administrative Templates > System > Power Management > Sleep Settings |**:::no-loc text="System Sleep Timeout (seconds):":::** | 3600 | | [:::no-loc text="Power/StandbyTimeoutOnBattery":::](/windows/client-management/mdm/policy-csp-power#standbytimeoutonbattery) | +| Administrative Templates > System > Power Management > Sleep Settings |**:::no-loc text="Specify the system sleep timeout (plugged in)":::** | Enabled | Only enables the setting configuration. | [:::no-loc text="Power/StandbyTimeoutPluggedIn":::](/windows/client-management/mdm/policy-csp-power#standbytimeoutpluggedin) | +| Administrative Templates > System > Power Management > Sleep Settings |**:::no-loc text="System Sleep Timeout (seconds):":::** | 3600 | | [:::no-loc text="Power/StandbyTimeoutPluggedIn":::](/windows/client-management/mdm/policy-csp-power#standbytimeoutpluggedin) | +| Administrative Templates > System > Power Management > Video and Display Settings |**:::no-loc text="Turn off the display (on battery)":::** | Enabled | | [:::no-loc text="Power/DisplayOffTimeoutOnBattery":::](/windows/client-management/mdm/policy-csp-power#displayofftimeoutonbattery) | +| Administrative Templates > System > Power Management > Video and Display Settings |**:::no-loc text="On battery power, turn display off after (seconds)":::** | 300 | | [:::no-loc text="Power/DisplayOffTimeoutOnBattery":::](/windows/client-management/mdm/policy-csp-power#displayofftimeoutonbattery) | +| Administrative Templates > System > Power Management > Video and Display Settings |**:::no-loc text="Turn off the display (plugged in)":::** | Enabled | | [:::no-loc text="Power/DisplayOffTimeoutPluggedIn":::](/windows/client-management/mdm/policy-csp-power#displayofftimeoutpluggedin) | +| Administrative Templates > System > Power Management > Video and Display Settings |**:::no-loc text="When plugged in, turn display off after (seconds)":::** | 300 | | [:::no-loc text="Power/DisplayOffTimeoutPluggedIn":::](/windows/client-management/mdm/policy-csp-power#displayofftimeoutpluggedin) | +| Administrative Templates > System > Removable Storage Access |**:::no-loc text="All Removable Storage classes: Deny all access":::** | Disabled | Do not block access to removable storage | [:::no-loc text="ADMX_RemovableStorage/RemovableStorageClasses_DenyAll_Access_2":::](/windows/client-management/mdm/policy-csp-admx-removablestorage#removablestorageclasses_denyall_access_2) | +| Administrative Templates > Windows Components > Store |**:::no-loc text="Turn off the Store application":::** | Enabled | Access to the Store application is denied. | [:::no-loc text="ADMX_WindowsStore/RemoveWindowsStore_2":::](/windows/client-management/mdm/policy-csp-admx-windowsstore#removewindowsstore_2) | +| Bluetooth |**:::no-loc text="Allow Advertising":::** | Block | Blocks the device from sending out Bluetooth advertisements. | [:::no-loc text="Bluetooth/AllowAdvertising":::](/windows/client-management/mdm/policy-csp-bluetooth#allowadvertising) | +| Bluetooth |**:::no-loc text="Allow Discoverable Mode":::** | Allow | Allow other Bluetooth-enabled devices discover the device. | [:::no-loc text="Bluetooth/AllowDiscoverableMode":::](/windows/client-management/mdm/policy-csp-bluetooth#allowdiscoverablemode) | +| Bluetooth |**:::no-loc text="Allow Prompted Proximal Connections":::** | Block | Block users on these managed devices from using Swift Pair and other proximity based scenarios. | [:::no-loc text="Bluetooth/AllowPromptedProximalConnections":::](/windows/client-management/mdm/policy-csp-bluetooth#allowpromptedproximalconnections) | +| Camera |**:::no-loc text="Allow Camera":::** | Allowed | | [:::no-loc text="Camera/AllowCamera":::](/windows/client-management/mdm/policy-csp-camera#allowcamera) | +| Connectivity |**:::no-loc text="Allow Bluetooth":::** | Allow Bluetooth. The radio in the Bluetooth control panel will be functional and the user will be able to turn Bluetooth on. | | [:::no-loc text="Connectivity/AllowBluetooth":::](/windows/client-management/mdm/policy-csp-connectivity#allowbluetooth) | +| Connectivity |**:::no-loc text="Allow Cellular Data Roaming":::** | Do not allow cellular data roaming. The user cannot turn it on. This value is not supported in Windows 10, version 1511. | | [:::no-loc text="Connectivity/AllowCellularDataRoaming":::](/windows/client-management/mdm/policy-csp-connectivity#allowcellulardataroaming) | +| Credential Providers |**:::no-loc text="Disable Automatic Re Deployment Credentials":::** | Disabled | Enables local Autopilot Reset | [:::no-loc text="CredentialProviders/DisableAutomaticReDeploymentCredentials":::](/en-us/windows/client-management/mdm/policy-csp-credentialproviders#disableautomaticredeploymentcredentials) | +| Experience |**:::no-loc text="Allow Cortana":::** | Block | | [:::no-loc text="Experience/AllowCortana":::](/windows/client-management/mdm/policy-csp-experience#allowcortana) | +| Experience |**:::no-loc text="Allow Manual MDM Unenrollment":::** | Block | Block the user from deleting the workplace account using the workplace control panel. | [:::no-loc text="Experience/AllowManualMDMUnenrollment":::](/windows/client-management/mdm/policy-csp-experience#allowmanualmdmunenrollment) | +| Experience |**:::no-loc text="Allow Windows Spotlight (User)":::** | Block | Turn off Windows spotlight on lock screen, Windows Tips, Microsoft consumer features and other related features. | [:::no-loc text="Experience/AllowWindowsSpotlight":::](/windows/client-management/mdm/policy-csp-experience#allowwindowsspotlight) | +| Experience |**:::no-loc text="Configure Chat Icon":::** | Disabled | Configures the Teams Chat icon on the taskbar for Windows 11 | [:::no-loc text="Experience/ConfigureChatIcon":::](/en-us/windows/client-management/mdm/policy-csp-experience#configurechaticon) | +| Microsoft App Store |**:::no-loc text="Allow All Trusted Apps":::** | Explicit allow unlock. | Allow install of any LOB or developer-signed Windows Store app (which must be signed with a certificate chain that can be successfully validated by the local computer) | [:::no-loc text="ApplicationManagement/AllowAllTrustedApps":::](/windows/client-management/mdm/policy-csp-applicationmanagement#allowalltrustedapps) | +| Microsoft App Store |**:::no-loc text="Allow Developer Unlock":::** | Explicit deny. | Block developing Microsoft Store apps or installing them directly from an IDE. | [:::no-loc text="ApplicationManagement/AllowDeveloperUnlock":::](/windows/client-management/mdm/policy-csp-applicationmanagement#allowdeveloperunlock) | +| Microsoft App Store |**:::no-loc text="Allow Shared User App Data":::** | Block | Windows app can't share app data with other instances of that app. | [:::no-loc text="ApplicationManagement/AllowSharedUserAppData":::](/windows/client-management/mdm/policy-csp-applicationmanagement#allowshareduserappdata) | +| Power |**:::no-loc text="Allow Hibernate":::** | Block | Windows 11 only | [:::no-loc text="Power/AllowHibernate":::](/windows/client-management/mdm/policy-csp-power#allowhibernate) | +| Power |**:::no-loc text="Energy Saver Battery Threshold On Battery":::** | 50 | Energy Saver will be automatically turned on at (and below) the specified level. | [:::no-loc text="Power/EnergySaverBatteryThresholdOnBattery":::](/windows/client-management/mdm/policy-csp-power#energysaverbatterythresholdonbattery) | +| Power |**:::no-loc text="Energy Saver Battery Threshold Plugged In":::** | 40 | Energy Saver will be automatically turned on at (and below) the specified level. | [:::no-loc text="Power/EnergySaverBatteryThresholdPluggedIn":::](/windows/client-management/mdm/policy-csp-power#energysaverbatterythresholdpluggedin) | +| Power |**:::no-loc text="Select Lid Close Action On Battery":::** | Sleep | | [:::no-loc text="Power/SelectLidCloseActionOnBattery":::](/windows/client-management/mdm/policy-csp-power#selectlidcloseactiononbattery) | +| Power |**:::no-loc text="Select Lid Close Action Plugged In":::** | Sleep | | [:::no-loc text="Power/SelectLidCloseActionPluggedIn":::](/windows/client-management/mdm/policy-csp-power#selectlidcloseactionpluggedin) | +| Power |**:::no-loc text="Select Power Button Action On Battery":::** | Sleep | | [:::no-loc text="Power/SelectPowerButtonActionOnBattery":::](/windows/client-management/mdm/policy-csp-power#selectpowerbuttonactiononbattery) | +| Power |**:::no-loc text="Select Power Button Action Plugged In":::** | Sleep | | [:::no-loc text="Power/SelectPowerButtonActionPluggedIn":::](/windows/client-management/mdm/policy-csp-power#selectpowerbuttonactionpluggedin) | +| Power |**:::no-loc text="Select Sleep Button Action On Battery":::** | Sleep | | [:::no-loc text="Power/SelectSleepButtonActionOnBattery":::](/windows/client-management/mdm/policy-csp-power#selectsleepbuttonactiononbattery) | +| Power |**:::no-loc text="Select Sleep Button Action Plugged In":::** | Sleep | | [:::no-loc text="Power/SelectSleepButtonActionPluggedIn":::](/windows/client-management/mdm/policy-csp-power#selectsleepbuttonactionpluggedin) | +| Power |**:::no-loc text="Turn Off Hybrid Sleep On Battery":::** | hybrid sleep | A hiberfile isn't generated when the system transitions to sleep (Stand By). | [:::no-loc text="Power/TurnOffHybridSleepOnBattery":::](/windows/client-management/mdm/policy-csp-power#turnoffhybridsleeponbattery) | +| Power |**:::no-loc text="Turn Off Hybrid Sleep Plugged In":::** | hybrid sleep | A hiberfile isn't generated when the system transitions to sleep (Stand By). | [:::no-loc text="Power/TurnOffHybridSleepPluggedIn":::](/windows/client-management/mdm/policy-csp-power#turnoffhybridsleeppluggedin) | +| Power |**:::no-loc text="Unattended Sleep Timeout On Battery":::** | 3600 | How much idle time (seconds) should elapse before Windows automatically transitions to sleep when left unattended. | [:::no-loc text="Power/UnattendedSleepTimeoutOnBattery":::](/windows/client-management/mdm/policy-csp-power#unattendedsleeptimeoutonbattery) | +| Power |**:::no-loc text="Unattended Sleep Timeout Plugged In":::** | 3600 | How much idle time (seconds) should elapse before Windows automatically transitions to sleep when left unattended. | [:::no-loc text="Power/UnattendedSleepTimeoutPluggedIn":::](/windows/client-management/mdm/policy-csp-power#unattendedsleeptimeoutpluggedin) | +| Security |**:::no-loc text="Allow Add Provisioning Package":::** | Allow | Allow the runtime configuration agent to install provisioning packages. | [:::no-loc text="Security/AllowAddProvisioningPackage":::](/windows/client-management/mdm/policy-csp-security#allowaddprovisioningpackage) | +| Security |**:::no-loc text="Allow Remove Provisioning Package":::** | Allow | Allow the runtime configuration agent to remove provisioning packages. | [:::no-loc text="Security/AllowRemoveProvisioningPackage":::](/windows/client-management/mdm/policy-csp-security#allowremoveprovisioningpackage) | +| Settings |**:::no-loc text="Allow Date Time":::** | Block | Block the user from changing date and time settings. | [:::no-loc text="Settings/AllowDateTime":::](/windows/client-management/mdm/policy-csp-settings#allowdatetime) | +| Settings |**:::no-loc text="Allow Language":::** | Block | Block the user from changing the language settings. | [:::no-loc text="Settings/AllowLanguage":::](/windows/client-management/mdm/policy-csp-settings#allowlanguage) | +| Settings |**:::no-loc text="Allow Power Sleep":::** | Block | Block the user from changing power and sleep settings. | [:::no-loc text="Settings/AllowPowerSleep":::](/windows/client-management/mdm/policy-csp-settings#allowpowersleep) | +| Settings |**:::no-loc text="Allow Region":::** | Block | Block the user from changing the region settings. | [:::no-loc text="Settings/AllowRegion":::](/windows/client-management/mdm/policy-csp-settings#allowregion) | +| Shared PC |**:::no-loc text="Enable Shared PC Mode":::** | False | | [:::no-loc text="SharedPC/EnableSharedPCMode":::](/windows/client-management/mdm/sharedpc-csp#enablesharedpcmode) | +| Shared PC |**:::no-loc text="Restrict Local Storage":::** | False | | [:::no-loc text="SharedPC/RestrictLocalStorage":::](/windows/client-management/mdm/sharedpc-csp#restrictlocalstorage) | +| Shared PC |**:::no-loc text="Set Edu Policies":::** | true | [:::no-loc text="Windows 10 configuration recommendations for education customers":::](/education/windows/configure-windows-for-education) | [:::no-loc text="SharedPC/SetEDUpolicies":::](/windows/client-management/mdm/sharedpc-csp#setedupolicies) | +| Task Manager |**:::no-loc text="Allow End Task":::** | Block | | [:::no-loc text="TaskManager/AllowEndTask":::](/windows/client-management/mdm/policy-csp-taskmanager#allowendtask) | +| Widgets |**:::no-loc text="Allow Widgets":::** | Not allowed. | This policy applies to the entire widgets experience, including content on the taskbar. | [:::no-loc text="AllowNewsAndInterests":::](/windows/client-management/mdm/policy-csp-newsandinterests) | +| Wi-Fi Settings |**:::no-loc text="Allow Auto Connect To Wi Fi Sense Hotspots":::** | Block | | [:::no-loc text="Wifi/AllowAutoConnectToWiFiSenseHotspots":::](/windows/client-management/mdm/policy-csp-wifi#allowautoconnecttowifisensehotspots) | +| Wi-Fi Settings |**:::no-loc text="Allow Internet Sharing":::** | Block | | [:::no-loc text="Wifi/AllowInternetSharing":::](/windows/client-management/mdm/policy-csp-wifi#allowinternetsharing) | +| Windows Logon |**:::no-loc text="Hide Fast User Switching":::** | Enabled | | [:::no-loc text="WindowsLogon/HideFastUserSwitching":::](/windows/client-management/mdm/policy-csp-windowslogon#hidefastuserswitching) | + +### [:::image type="icon" source="../../../media/icons/graph.svg"::: **Create policy using Graph Explorer**](#tab/graph) + +[!INCLUDE [graph-explorer-introduction](../../../includes/graph-explorer-intro.md)] + +This will create a policy in your tenant with the name **:::no-loc text="_MSLearn_Example_CommonEDU - Windows - Device restrictions":::**. + +```msgraph-interactive +POST https://graph.microsoft.com/beta/deviceManagement/configurationPolicies +Content-Type: application/json + +{"name":"_MSLearn_Example_CommonEDU - Windows - Device restrictions","description":"https://aka.ms/ManageEduDevices","platforms":"windows10","technologies":"mdm","roleScopeTagIds":["0"],"settings":[{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_abovelock_allowcortanaabovelock","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_abovelock_allowcortanaabovelock_0","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_abovelock_allowtoasts","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_abovelock_allowtoasts_0","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_accounts_allowaddingnonmicrosoftaccountsmanually","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_accounts_allowaddingnonmicrosoftaccountsmanually_0","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_accounts_allowmicrosoftaccountconnection","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_accounts_allowmicrosoftaccountconnection_0","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_power_hibernatetimeoutonbattery","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_power_hibernatetimeoutonbattery_0","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_power_standbytimeoutonbattery","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_power_standbytimeoutonbattery_1","children":[{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSimpleSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_power_standbytimeoutonbattery_enterdcstandbytimeout","simpleSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationIntegerSettingValue","value":3600}}]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_power_standbytimeoutpluggedin","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_power_standbytimeoutpluggedin_1","children":[{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSimpleSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_power_standbytimeoutpluggedin_enteracstandbytimeout","simpleSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationIntegerSettingValue","value":3600}}]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_power_displayofftimeoutonbattery","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_power_displayofftimeoutonbattery_1","children":[{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSimpleSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_power_displayofftimeoutonbattery_entervideodcpowerdowntimeout","simpleSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationIntegerSettingValue","value":300}}]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_power_displayofftimeoutpluggedin","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_power_displayofftimeoutpluggedin_1","children":[{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSimpleSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_power_displayofftimeoutpluggedin_entervideoacpowerdowntimeout","simpleSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationIntegerSettingValue","value":300}}]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_admx_removablestorage_removablestorageclasses_denyall_access_2","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_admx_removablestorage_removablestorageclasses_denyall_access_2_0","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_admx_windowsstore_removewindowsstore_2","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_admx_windowsstore_removewindowsstore_2_1","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_bluetooth_allowadvertising","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_bluetooth_allowadvertising_0","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_bluetooth_allowdiscoverablemode","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_bluetooth_allowdiscoverablemode_1","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_bluetooth_allowpromptedproximalconnections","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_bluetooth_allowpromptedproximalconnections_0","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_camera_allowcamera","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_camera_allowcamera_1","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_connectivity_allowbluetooth","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_connectivity_allowbluetooth_2","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_connectivity_allowcellulardataroaming","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_connectivity_allowcellulardataroaming_0","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_credentialproviders_disableautomaticredeploymentcredentials","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_credentialproviders_disableautomaticredeploymentcredentials_0","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_experience_allowcortana","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_experience_allowcortana_0","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_experience_allowmanualmdmunenrollment","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_experience_allowmanualmdmunenrollment_0","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"user_vendor_msft_policy_config_experience_allowwindowsspotlight","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"user_vendor_msft_policy_config_experience_allowwindowsspotlight_0","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_experience_configurechaticon","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_experience_configurechaticon_3","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_applicationmanagement_allowalltrustedapps","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_applicationmanagement_allowalltrustedapps_1","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_applicationmanagement_allowdeveloperunlock","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_applicationmanagement_allowdeveloperunlock_0","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_applicationmanagement_allowshareduserappdata","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_applicationmanagement_allowshareduserappdata_0","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_power_allowhibernate","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_power_allowhibernate_0","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSimpleSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_power_energysaverbatterythresholdonbattery","simpleSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationIntegerSettingValue","value":50}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSimpleSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_power_energysaverbatterythresholdpluggedin","simpleSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationIntegerSettingValue","value":40}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_power_selectlidcloseactiononbattery","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_power_selectlidcloseactiononbattery_1","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_power_selectlidcloseactionpluggedin","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_power_selectlidcloseactionpluggedin_1","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_power_selectpowerbuttonactiononbattery","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_power_selectpowerbuttonactiononbattery_1","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_power_selectpowerbuttonactionpluggedin","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_power_selectpowerbuttonactionpluggedin_1","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_power_selectsleepbuttonactiononbattery","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_power_selectsleepbuttonactiononbattery_1","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_power_selectsleepbuttonactionpluggedin","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_power_selectsleepbuttonactionpluggedin_1","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_power_turnoffhybridsleeponbattery","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_power_turnoffhybridsleeponbattery_1","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_power_turnoffhybridsleeppluggedin","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_power_turnoffhybridsleeppluggedin_1","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSimpleSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_power_unattendedsleeptimeoutonbattery","simpleSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationIntegerSettingValue","value":3600}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSimpleSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_power_unattendedsleeptimeoutpluggedin","simpleSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationIntegerSettingValue","value":3600}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_security_allowaddprovisioningpackage","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_security_allowaddprovisioningpackage_1","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_security_allowremoveprovisioningpackage","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_security_allowremoveprovisioningpackage_1","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_settings_allowdatetime","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_settings_allowdatetime_0","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_settings_allowlanguage","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_settings_allowlanguage_0","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_settings_allowpowersleep","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_settings_allowpowersleep_0","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_settings_allowregion","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_settings_allowregion_0","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"vendor_msft_sharedpc_enablesharedpcmode","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"vendor_msft_sharedpc_enablesharedpcmode_false","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"vendor_msft_sharedpc_restrictlocalstorage","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"vendor_msft_sharedpc_restrictlocalstorage_false","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"vendor_msft_sharedpc_setedupolicies","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"vendor_msft_sharedpc_setedupolicies_true","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_taskmanager_allowendtask","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_taskmanager_allowendtask_0","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_wifi_allowautoconnecttowifisensehotspots","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_wifi_allowautoconnecttowifisensehotspots_0","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_wifi_allowinternetsharing","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_wifi_allowinternetsharing_0","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_newsandinterests_allownewsandinterests","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_newsandinterests_allownewsandinterests_0","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_windowslogon_hidefastuserswitching","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_windowslogon_hidefastuserswitching_1","children":[]}}}]} +``` + +[!INCLUDE [graph-explorer-steps](../../../includes/graph-explorer-steps.md)] + +--- diff --git a/memdocs/intune/industry/education/tutorial-school-deployment/common-config-settings-catalog-edge.md b/memdocs/intune/industry/education/tutorial-school-deployment/common-config-settings-catalog-edge.md index 55cba31b2de..ce85b3625f8 100644 --- a/memdocs/intune/industry/education/tutorial-school-deployment/common-config-settings-catalog-edge.md +++ b/memdocs/intune/industry/education/tutorial-school-deployment/common-config-settings-catalog-edge.md @@ -7,6 +7,10 @@ author: yegor-a ms.author: egorabr ms.manager: dougeby no-loc: [Microsoft, Windows, Autopatch, Autopilot, Edge] +ms.collection: +- graph-interactive +ms.service: microsoft-intune +ms.subservice: education --- # Microsoft Edge @@ -30,83 +34,119 @@ To learn more, see: > [!TIP] > When creating a settings catalog profile in the Microsoft Intune admin center, you can copy a policy name from this article and paste it into the settings picker search field to find the desired policy. -## Settings catalog policies - -| **Name** | **Value** | **Notes** | **CSP** | -|---|---|---|---| -| **:::no-loc text="Ads setting for sites with intrusive ads":::** | Disabled | Block ads on sites with intrusive ads. | [:::no-loc text="AdsSettingForIntrusiveAdsSites":::](/deployedge/microsoft-edge-policies#adssettingforintrusiveadssites) | -| **:::no-loc text="Default sensors setting":::** | Disabled | Don't allow any site to access sensors. | [:::no-loc text="DefaultSensorsSetting":::](/deployedge/microsoft-edge-policies#defaultsensorssetting) | -| **:::no-loc text="Allow import of data from other browsers on each Microsoft Edge launch":::** | Disabled | Users will never see a prompt to import their browsing data from other browsers on each Microsoft Edge launch. | [:::no-loc text="ImportOnEachLaunch":::](/deployedge/microsoft-edge-policies#importoneachlaunch) | -| **:::no-loc text="Allow importing of browser settings":::** | Disabled | Browser settings aren't imported at first run, and users can't import them manually. | [:::no-loc text="ImportBrowserSettings":::](/deployedge/microsoft-edge-policies#importbrowsersettings) | -| **:::no-loc text="Allow importing of favorites":::** | Disabled | Favorites aren't imported at first run, and users can't import them manually. | [:::no-loc text="ImportFavorites":::](/deployedge/microsoft-edge-policies#importfavorites) | -| **:::no-loc text="Allow feature recommendations and browser assistance notifications from Microsoft Edge":::** | Disabled | This setting controls the in-browser assistance notifications, which are intended to help users get the most out of Microsoft Edge by recommending features and by helping them use browser features. | [:::no-loc text="ShowRecommendationsEnabled":::](/deployedge/microsoft-edge-policies#showrecommendationsenabled) | -| **:::no-loc text="Allow suggestions from local providers":::** | Disabled | Suggestions from local providers are never used. Local history and local favorites suggestions won't appear. | [:::no-loc text="LocalProvidersEnabled":::](/deployedge/microsoft-edge-policies#localprovidersenabled) | -| **:::no-loc text="Allow surf game":::** | Disabled | Users won't be able to play the surf game when the device is offline or if the user navigates to edge://surf. | [:::no-loc text="AllowSurfGame":::](/deployedge/microsoft-edge-policies#allowsurfgame) | -| **:::no-loc text="Allow user feedback":::** | Disabled | Microsoft Edge uses the Edge Feedback feature (enabled by default) to allow users to send feedback, suggestions, or customer surveys and to report any issues with the browser. | [:::no-loc text="UserFeedbackAllowed":::](/deployedge/microsoft-edge-policies#userfeedbackallowed) | -| **:::no-loc text="Allow users to access the games menu":::** | Disabled | Users won't be able to access the games menu. | [:::no-loc text="AllowGamesMenu":::](/deployedge/microsoft-edge-policies#allowgamesmenu) | -| **:::no-loc text="Allow users to proceed from the HTTPS warning page":::** | Disabled | Users are blocked from clicking through any warning page. | [:::no-loc text="SSLErrorOverrideAllowed":::](/deployedge/microsoft-edge-policies#sslerroroverrideallowed) | -| **:::no-loc text="Allow websites to query for available payment methods":::** | Disabled | Websites that use Payment Request will be informed that no payment methods are available. | [:::no-loc text="PaymentMethodQueryEnabled":::](/deployedge/microsoft-edge-policies#paymentmethodqueryenabled) | -| **:::no-loc text="Block access to a list of URLs":::** | Enabled | Only enables the setting configuration. | [:::no-loc text="URLBlocklist":::](/deployedge/microsoft-edge-policies#urlblocklist) | -| **:::no-loc text="Block access to a list of URLs > Block access to a list of URLs (Device)":::** | edge://flags | Define a list of sites, based on URL patterns, that are blocked (your users can't load them). | [:::no-loc text="URLBlocklist":::](/deployedge/microsoft-edge-policies#urlblocklist) | -| **:::no-loc text="Block all ads on Bing search results":::** | Enabled | A user can search on bing.com and have an ad-free search experience. At the same time, the SafeSearch setting will be set to 'Strict' and can't be changed by the user. | [:::no-loc text="BingAdsSuppression":::](/deployedge/microsoft-edge-policies#bingadssuppression) | -| **:::no-loc text="Block tracking of users' web-browsing activity":::** | Enabled | Only enables the setting configuration. | [:::no-loc text="TrackingPrevention":::](/deployedge/microsoft-edge-policies#trackingprevention) | -| **:::no-loc text="Block tracking of users' web-browsing activity > Block tracking of users' web-browsing activity (Device)":::** | Balanced (blocks harmful trackers and trackers from sites user has nt visited; content and ads will be less personalized#) | Optional:
    Strict (blocks harmful trackers and majority of trackers from all sites; content and ads will have minimal personalization. Some parts of sites might not work) | [:::no-loc text="TrackingPrevention":::](/deployedge/microsoft-edge-policies#trackingprevention) | -| **:::no-loc text="Browser sign-in settings":::** | Enabled | Only enables the setting configuration. | [:::no-loc text="BrowserSignin":::](/deployedge/microsoft-edge-policies#browsersignin) | -| **:::no-loc text="Browser sign-in settings > Browser sign-in settings (Device)":::** | Force users to sign-in to use the browser | This policy requires user cloud identity. | [:::no-loc text="BrowserSignin":::](/deployedge/microsoft-edge-policies#browsersignin) | -| **:::no-loc text="Clear browsing data when Microsoft Edge closes":::** | Disabled | Users can configure the Clear browsing data option in Settings. | [:::no-loc text="ClearBrowsingDataOnExit":::](/deployedge/microsoft-edge-policies#clearbrowsingdataonexit) | -| **:::no-loc text="Configure Do Not Track":::** | Enable | Do Not Track requests let the websites you visit know that you don't want your browsing activity to be tracked. | [:::no-loc text="ConfigureDoNotTrack":::](/deployedge/microsoft-edge-policies#configuredonottrack) | -| **:::no-loc text="Configure InPrivate mode availability":::** | Enabled | Only enables the setting configuration. | [:::no-loc text="InPrivateModeAvailability":::](/deployedge/microsoft-edge-policies#inprivatemodeavailability) | -| **:::no-loc text="Configure InPrivate mode availability > Configure InPrivate mode availability (Device)":::** | InPrivate mode disabled | | [:::no-loc text="InPrivateModeAvailability":::](/deployedge/microsoft-edge-policies#inprivatemodeavailability) | -| **:::no-loc text="Configure Microsoft Defender SmartScreen to block potentially unwanted apps":::** | Enabled | Potentially unwanted app blocking with Microsoft Defender SmartScreen provides warning messages to help protect users from adware, coin miners, bundleware, and other low-reputation apps that are hosted by websites. | [:::no-loc text="SmartScreenPuaEnabled":::](/deployedge/microsoft-edge-policies#smartscreenpuaenabled) | -| **:::no-loc text="Configure users ability to override feature flags":::** | Disabled | Users can't override state of feature flags using command line arguments or edge://flags page. | [:::no-loc text="FeatureFlagOverridesControl":::](/deployedge/microsoft-edge-policies#featureflagoverridescontrol) | -| **:::no-loc text="Configure whether a user always has a default profile automatically signed in with their work or school account":::** | Enabled | A non-removable profile will be created with the user's work or school account on Windows. This profile can't be signed out or removed. | [:::no-loc text="NonRemovableProfileEnabled":::](/deployedge/microsoft-edge-policies#nonremovableprofileenabled) | -| **:::no-loc text="Continue running background apps after Microsoft Edge closes":::** | Disabled | Background mode disable to prevent conflicts with assessment software. | [:::no-loc text="BackgroundModeEnabled":::](/deployedge/microsoft-edge-policies#backgroundmodeenabled) | -| **:::no-loc text="Control where developer tools can be used":::** | Enabled | Only enables the setting configuration. | [:::no-loc text="DeveloperToolsAvailability":::](/deployedge/microsoft-edge-policies#developertoolsavailability) | -| **:::no-loc text="Control where developer tools can be used (Device)":::** | Don't allow using the developer tools | | [:::no-loc text="DeveloperToolsAvailability":::](/deployedge/microsoft-edge-policies#developertoolsavailability) | -| **:::no-loc text="Enable AutoFill for addresses":::** | Disabled | AutoFill never suggests or fills in address information, nor does it save additional address information that the user might submit while browsing the web. | [:::no-loc text="AutofillAddressEnabled":::](/deployedge/microsoft-edge-policies#autofilladdressenabled) | -| **:::no-loc text="Enable AutoFill for credit cards":::** | Disabled | AutoFill never suggests, fills, or recommends new payment Instruments. Additionally, it won't save any payment instrument information that users submit while browsing the web. | [:::no-loc text="AutofillCreditCardEnabled":::](/deployedge/microsoft-edge-policies#autofillcreditcardenabled) | -| **:::no-loc text="Enable Drop feature in Microsoft Edge":::** | Disabled | Drop lets users send messages or files to themselves. | [:::no-loc text="EdgeEDropEnabled":::](/deployedge/microsoft-edge-policies#edgeedropenabled) | -| **:::no-loc text="Enable full-tab promotional content":::** | Disabled | This setting controls the presentation of welcome pages that help users sign into Microsoft Edge, choose their default browser, or learn about product features. | [:::no-loc text="PromotionalTabsEnabled":::](/deployedge/microsoft-edge-policies#promotionaltabsenabled) | -| **:::no-loc text="Enable Microsoft Search in Bing suggestions in the address bar":::** | Enabled | Enables the display of relevant Microsoft Search in Bing suggestions in the address bar's suggestion list when the user types a search string in the address bar. | [:::no-loc text="AddressBarMicrosoftSearchInBingProviderEnabled":::](/deployedge/microsoft-edge-policies#addressbarmicrosoftsearchinbingproviderenabled) | -| **:::no-loc text="Enable profile creation from the Identity flyout menu or the Settings page":::** | Disabled | Users can't add new profiles from the Identity flyout menu or the Settings page. | [:::no-loc text="BrowserAddProfileEnabled":::](/deployedge/microsoft-edge-policies#browseraddprofileenabled) | -| **:::no-loc text="Enable search suggestions":::** | Enabled | Enables web search suggestions in Microsoft Edge's Address Bar and Auto-Suggest List. | [:::no-loc text="SearchSuggestEnabled":::](/deployedge/microsoft-edge-policies#searchsuggestenabled) | -| **:::no-loc text="Enforce Bing SafeSearch":::** | Enabled | Only enables the setting configuration. | [:::no-loc text="ForceBingSafeSearch":::](/deployedge/microsoft-edge-policies#forcebingsafesearch) | -| **:::no-loc text="Enforce Bing SafeSearch (Device)":::** | Configure strict search restrictions in Bing | | [:::no-loc text="ForceBingSafeSearch":::](/deployedge/microsoft-edge-policies#forcebingsafesearch) | -| **:::no-loc text="Enforce Google SafeSearch":::** | Enabled | Forces queries in Google Web Search to be performed with SafeSearch set to active, and prevents users from changing this setting. | [:::no-loc text="ForceGoogleSafeSearch":::](/deployedge/microsoft-edge-policies#forcegooglesafesearch) | -| **:::no-loc text="Force minimum YouTube Restricted Mode":::** | Enabled | Only enables the setting configuration. | [:::no-loc text="ForceYouTubeRestrict":::](/deployedge/microsoft-edge-policies#forceyoutuberestrict) | -| **:::no-loc text="Force minimum YouTube Restricted Mode (Device)":::** | Enforce Strict Restricted Mode for YouTube | | [:::no-loc text="ForceYouTubeRestrict":::](/deployedge/microsoft-edge-policies#forceyoutuberestrict) | -| **:::no-loc text="Force synchronization of browser data and do not show the sync consent prompt":::** | Enabled | Forces data synchronization in Microsoft Edge. This policy also prevents the user from turning sync off. | [:::no-loc text="ForceSync":::](/deployedge/microsoft-edge-policies#forcesync) | -| **:::no-loc text="Hide the First-run experience and splash screen":::** | Enabled | The First-run experience and the splash screen won't be shown to users when they run Microsoft Edge for the first time. | [:::no-loc text="HideFirstRunExperience":::](/deployedge/microsoft-edge-policies#hidefirstrunexperience) | -| **:::no-loc text="In-app support Enabled":::** | Disabled | Microsoft Edge uses the in-app support feature (enabled by default) to allow users to contact our support agents directly from the browser. | [:::no-loc text="InAppSupportEnabled":::](/deployedge/microsoft-edge-policies#inappsupportenabled) | -| **:::no-loc text="Microsoft Edge Insider Promotion Enabled":::** | Disabled | The Microsoft Edge Insider promotion content won't be shown on the About Microsoft Edge page. | [:::no-loc text="MicrosoftEdgeInsiderPromotionEnabled":::](/deployedge/microsoft-edge-policies#microsoftedgeinsiderpromotionenabled) | -| **:::no-loc text="Save and fill memberships":::** | Disabled | Users can't have their membership info automatically saved and used to fill form fields while using Microsoft Edge. | [:::no-loc text="AutofillMembershipsEnabled":::](/deployedge/microsoft-edge-policies#autofillmembershipsenabled) | -| **:::no-loc text="Send all intranet sites to Internet Explorer":::** | Disabled | | [:::no-loc text="SendIntranetToInternetExplorer":::](/deployedge/microsoft-edge-policies#sendintranettointernetexplorer) | -| **:::no-loc text="Shopping in Microsoft Edge Enabled":::** | Disabled | Shopping features such as price comparison, coupons, rebates, and express checkout won't be automatically found for retail domains. | [:::no-loc text="EdgeShoppingAssistantEnabled":::](/deployedge/microsoft-edge-policies#edgeshoppingassistantenabled) | -| **:::no-loc text="Show Hubs Sidebar":::** | Disabled | The Sidebar will never be shown. | [:::no-loc text="HubsSidebarEnabled":::](/deployedge/microsoft-edge-policies#hubssidebarenabled) | -| **:::no-loc text="Show Microsoft Rewards experiences":::** | Disabled | | [:::no-loc text="ShowMicrosoftRewards":::](/deployedge/microsoft-edge-policies#showmicrosoftrewards) | -| **:::no-loc text="Update policy override default":::** | Enabled | Only enables the setting configuration. | [:::no-loc text="UpdateDefault":::](/deployedge/microsoft-edge-update-policies#updatedefault) | -| **:::no-loc text="Update policy override default > Policy (Device)":::** | Always allow updates (recommended) | | [:::no-loc text="UpdateDefault":::](/deployedge/microsoft-edge-update-policies#updatedefault) | -| **:::no-loc text="Configure cookies":::** | Enabled | Only enables the setting configuration. | [:::no-loc text="DefaultCookiesSetting":::](/deployedge/microsoft-edge-policies#defaultcookiessetting) | -| **:::no-loc text="Configure cookies (Device)":::** | Let all sites create cookies | | [:::no-loc text="DefaultCookiesSetting":::](/deployedge/microsoft-edge-policies#defaultcookiessetting) | -| **:::no-loc text="Default pop-up window setting":::** | Enabled | Only enables the setting configuration. | [:::no-loc text="DefaultPopupsSetting":::](/deployedge/microsoft-edge-policies#defaultpopupssetting) | -| **:::no-loc text="Default pop-up window setting (Device)":::** | Allow all sites to show pop-ups | | [:::no-loc text="DefaultPopupsSetting":::](/deployedge/microsoft-edge-policies#defaultpopupssetting) | -| **:::no-loc text="Blocks external extensions from being installed":::** | Disabled | External extensions are allowed to be installed. | [:::no-loc text="BlockExternalExtensions":::](/deployedge/microsoft-edge-policies#blockexternalextensions) | -| **:::no-loc text="Control which extensions cannot be installed":::** | Disabled | The user can install any extension in Microsoft Edge. | [:::no-loc text="ExtensionInstallBlocklist":::](/deployedge/microsoft-edge-policies#extensioninstallblocklist) | -| **:::no-loc text="Enable implicit sign-in":::** | Enabled | Edge will attempt to sign the user into their profile based on what and how they sign in to their OS. | [:::no-loc text="ImplicitSignInEnabled":::](/deployedge/microsoft-edge-policies#implicitsigninenabled) | -| **:::no-loc text="Enable printing":::** | Enabled | | [:::no-loc text="PrintingEnabled":::](/deployedge/microsoft-edge-policies#printingenabled) | -| **:::no-loc text="Prevent bypassing Microsoft Defender SmartScreen prompts for sites":::** | Enabled | Users can't ignore Microsoft Defender SmartScreen warnings and they're blocked from continuing to the site. | [:::no-loc text="PreventSmartScreenPromptOverride":::](/deployedge/microsoft-edge-policies#preventsmartscreenpromptoverride) | -| **:::no-loc text="Allow Microsoft News content on the new tab page":::** | Disabled | Microsoft Edge does not display Microsoft News content on the new tab page, the Content control in the NTP settings flyout is disabled and set to 'Content off'. | [:::no-loc text="NewTabPageContentEnabled":::](/deployedge/microsoft-edge-policies#newtabpagecontentenabled) | -| **:::no-loc text="Hide the default top sites from the new tab page":::** | Enabled | The default top site tiles are hidden. | [:::no-loc text="NewTabPageHideDefaultTopSites":::](/deployedge/microsoft-edge-policies#newtabpagehidedefaulttopsites) | +## [**Settings**](#tab/settings) + +| **Category** | **Name** | **Value** | **Notes** | **CSP** | +|---|---|---|---|---| +| Microsoft Edge |**:::no-loc text="Ads setting for sites with intrusive ads":::** | Disabled | Block ads on sites with intrusive ads. | [:::no-loc text="AdsSettingForIntrusiveAdsSites":::](/deployedge/microsoft-edge-policies#adssettingforintrusiveadssites) | +| Microsoft Edge |**:::no-loc text="Allow feature recommendations and browser assistance notifications from Microsoft Edge":::** | Disabled | This setting controls the in-browser assistance notifications, which are intended to help users get the most out of Microsoft Edge by recommending features and by helping them use browser features. | [:::no-loc text="ShowRecommendationsEnabled":::](/deployedge/microsoft-edge-policies#showrecommendationsenabled) | +| Microsoft Edge |**:::no-loc text="Allow import of data from other browsers on each Microsoft Edge launch":::** | Disabled | Users will never see a prompt to import their browsing data from other browsers on each Microsoft Edge launch. | [:::no-loc text="ImportOnEachLaunch":::](/deployedge/microsoft-edge-policies#importoneachlaunch) | +| Microsoft Edge |**:::no-loc text="Allow importing of browser settings":::** | Disabled | Browser settings aren't imported at first run, and users can't import them manually. | [:::no-loc text="ImportBrowserSettings":::](/deployedge/microsoft-edge-policies#importbrowsersettings) | +| Microsoft Edge |**:::no-loc text="Allow importing of favorites":::** | Disabled | Favorites aren't imported at first run, and users can't import them manually. | [:::no-loc text="ImportFavorites":::](/deployedge/microsoft-edge-policies#importfavorites) | +| Microsoft Edge |**:::no-loc text="Allow suggestions from local providers":::** | Disabled | Suggestions from local providers are never used. Local history and local favorites suggestions won't appear. | [:::no-loc text="LocalProvidersEnabled":::](/deployedge/microsoft-edge-policies#localprovidersenabled) | +| Microsoft Edge |**:::no-loc text="Allow surf game":::** | Disabled | Users won't be able to play the surf game when the device is offline or if the user navigates to edge://surf. | [:::no-loc text="AllowSurfGame":::](/deployedge/microsoft-edge-policies#allowsurfgame) | +| Microsoft Edge |**:::no-loc text="Allow user feedback":::** | Disabled | Microsoft Edge uses the Edge Feedback feature (enabled by default) to allow users to send feedback, suggestions, or customer surveys and to report any issues with the browser. | [:::no-loc text="UserFeedbackAllowed":::](/deployedge/microsoft-edge-policies#userfeedbackallowed) | +| Microsoft Edge |**:::no-loc text="Allow users to access the games menu":::** | Disabled | Users won't be able to access the games menu. | [:::no-loc text="AllowGamesMenu":::](/deployedge/microsoft-edge-policies#allowgamesmenu) | +| Microsoft Edge |**:::no-loc text="Allow users to proceed from the HTTPS warning page":::** | Disabled | Users are blocked from clicking through any warning page. | [:::no-loc text="SSLErrorOverrideAllowed":::](/deployedge/microsoft-edge-policies#sslerroroverrideallowed) | +| Microsoft Edge |**:::no-loc text="Allow websites to query for available payment methods":::** | Disabled | Websites that use Payment Request will be informed that no payment methods are available. | [:::no-loc text="PaymentMethodQueryEnabled":::](/deployedge/microsoft-edge-policies#paymentmethodqueryenabled) | +| Microsoft Edge |**:::no-loc text="Block access to a list of URLs":::** | Enabled | Only enables the setting configuration. | [:::no-loc text="URLBlocklist":::](/deployedge/microsoft-edge-policies#urlblocklist) | +| Microsoft Edge |**:::no-loc text="Block access to a list of URLs > Block access to a list of URLs (Device)":::** | edge://flags | Define a list of sites, based on URL patterns, that are blocked (your users can't load them). | [:::no-loc text="URLBlocklist":::](/deployedge/microsoft-edge-policies#urlblocklist) | +| Microsoft Edge |**:::no-loc text="Block all ads on Bing search results":::** | Enabled | A user can search on bing.com and have an ad-free search experience. At the same time, the SafeSearch setting will be set to 'Strict' and can't be changed by the user. | [:::no-loc text="BingAdsSuppression":::](/deployedge/microsoft-edge-policies#bingadssuppression) | +| Microsoft Edge |**:::no-loc text="Block tracking of users' web-browsing activity":::** | Enabled | Only enables the setting configuration. | [:::no-loc text="TrackingPrevention":::](/deployedge/microsoft-edge-policies#trackingprevention) | +| Microsoft Edge |**:::no-loc text="Block tracking of users' web-browsing activity > Block tracking of users' web-browsing activity (Device)":::** | Balanced (blocks harmful trackers and trackers from sites user has nt visited; content and ads will be less personalized#) | Optional:
    Strict (blocks harmful trackers and majority of trackers from all sites; content and ads will have minimal personalization. Some parts of sites might not work) | [:::no-loc text="TrackingPrevention":::](/deployedge/microsoft-edge-policies#trackingprevention) | +| Microsoft Edge |**:::no-loc text="Browser sign-in settings":::** | Enabled | Only enables the setting configuration. | [:::no-loc text="BrowserSignin":::](/deployedge/microsoft-edge-policies#browsersignin) | +| Microsoft Edge |**:::no-loc text="Browser sign-in settings > Browser sign-in settings (Device)":::** | Force users to sign-in to use the browser | This policy requires user cloud identity. | [:::no-loc text="BrowserSignin":::](/deployedge/microsoft-edge-policies#browsersignin) | +| Microsoft Edge |**:::no-loc text="Clear browsing data when Microsoft Edge closes":::** | Disabled | Users can configure the Clear browsing data option in Settings. | [:::no-loc text="ClearBrowsingDataOnExit":::](/deployedge/microsoft-edge-policies#clearbrowsingdataonexit) | +| Microsoft Edge |**:::no-loc text="Configure Do Not Track":::** | Enable | Do Not Track requests let the websites you visit know that you don't want your browsing activity to be tracked. | [:::no-loc text="ConfigureDoNotTrack":::](/deployedge/microsoft-edge-policies#configuredonottrack) | +| Microsoft Edge |**:::no-loc text="Configure InPrivate mode availability":::** | Enabled | Only enables the setting configuration. | [:::no-loc text="InPrivateModeAvailability":::](/deployedge/microsoft-edge-policies#inprivatemodeavailability) | +| Microsoft Edge |**:::no-loc text="Configure InPrivate mode availability > Configure InPrivate mode availability (Device)":::** | InPrivate mode disabled | | [:::no-loc text="InPrivateModeAvailability":::](/deployedge/microsoft-edge-policies#inprivatemodeavailability) | +| Microsoft Edge |**:::no-loc text="Configure whether a user always has a default profile automatically signed in with their work or school account":::** | Enabled | A non-removable profile will be created with the user's work or school account on Windows. This profile can't be signed out or removed. | [:::no-loc text="NonRemovableProfileEnabled":::](/deployedge/microsoft-edge-policies#nonremovableprofileenabled) | +| Microsoft Edge |**:::no-loc text="Continue running background apps after Microsoft Edge closes":::** | Disabled | Background mode disable to prevent conflicts with assessment software. | [:::no-loc text="BackgroundModeEnabled":::](/deployedge/microsoft-edge-policies#backgroundmodeenabled) | +| Microsoft Edge |**:::no-loc text="Control where developer tools can be used":::** | Enabled | Only enables the setting configuration. | [:::no-loc text="DeveloperToolsAvailability":::](/deployedge/microsoft-edge-policies#developertoolsavailability) | +| Microsoft Edge |**:::no-loc text="Control where developer tools can be used (Device)":::** | Don't allow using the developer tools | | [:::no-loc text="DeveloperToolsAvailability":::](/deployedge/microsoft-edge-policies#developertoolsavailability) | +| Microsoft Edge |**:::no-loc text="Default sensors setting":::** | Disabled | Don't allow any site to access sensors. | [:::no-loc text="DefaultSensorsSetting":::](/deployedge/microsoft-edge-policies#defaultsensorssetting) | +| Microsoft Edge |**:::no-loc text="Enable AutoFill for addresses":::** | Disabled | AutoFill never suggests or fills in address information, nor does it save additional address information that the user might submit while browsing the web. | [:::no-loc text="AutofillAddressEnabled":::](/deployedge/microsoft-edge-policies#autofilladdressenabled) | +| Microsoft Edge |**:::no-loc text="Enable AutoFill for payment instruments":::** | Disabled | AutoFill never suggests, fills, or recommends new payment Instruments. Additionally, it won't save any payment instrument information that users submit while browsing the web. | [:::no-loc text="AutofillCreditCardEnabled":::](/deployedge/microsoft-edge-policies#autofillcreditcardenabled) | +| Microsoft Edge |**:::no-loc text="Enable Drop feature in Microsoft Edge":::** | Disabled | Drop lets users send messages or files to themselves. | [:::no-loc text="EdgeEDropEnabled":::](/deployedge/microsoft-edge-policies#edgeedropenabled) | +| Microsoft Edge |**:::no-loc text="Enable full-tab promotional content":::** | Disabled | This setting controls the presentation of welcome pages that help users sign into Microsoft Edge, choose their default browser, or learn about product features. | [:::no-loc text="PromotionalTabsEnabled":::](/deployedge/microsoft-edge-policies#promotionaltabsenabled) | +| Microsoft Edge |**:::no-loc text="Enable Microsoft Search in Bing suggestions in the address bar":::** | Enabled | Enables the display of relevant Microsoft Search in Bing suggestions in the address bar's suggestion list when the user types a search string in the address bar. | [:::no-loc text="AddressBarMicrosoftSearchInBingProviderEnabled":::](/deployedge/microsoft-edge-policies#addressbarmicrosoftsearchinbingproviderenabled) | +| Microsoft Edge |**:::no-loc text="Enable profile creation from the Identity flyout menu or the Settings page":::** | Disabled | Users can't add new profiles from the Identity flyout menu or the Settings page. | [:::no-loc text="BrowserAddProfileEnabled":::](/deployedge/microsoft-edge-policies#browseraddprofileenabled) | +| Microsoft Edge |**:::no-loc text="Enable search suggestions":::** | Enabled | Enables web search suggestions in Microsoft Edge's Address Bar and Auto-Suggest List. | [:::no-loc text="SearchSuggestEnabled":::](/deployedge/microsoft-edge-policies#searchsuggestenabled) | +| Microsoft Edge |**:::no-loc text="Enforce Bing SafeSearch":::** | Enabled | Only enables the setting configuration. | [:::no-loc text="ForceBingSafeSearch":::](/deployedge/microsoft-edge-policies#forcebingsafesearch) | +| Microsoft Edge |**:::no-loc text="Enforce Bing SafeSearch (Device)":::** | Configure strict search restrictions in Bing | | [:::no-loc text="ForceBingSafeSearch":::](/deployedge/microsoft-edge-policies#forcebingsafesearch) | +| Microsoft Edge |**:::no-loc text="Enforce Google SafeSearch":::** | Enabled | Forces queries in Google Web Search to be performed with SafeSearch set to active, and prevents users from changing this setting. | [:::no-loc text="ForceGoogleSafeSearch":::](/deployedge/microsoft-edge-policies#forcegooglesafesearch) | +| Microsoft Edge |**:::no-loc text="Force minimum YouTube Restricted Mode":::** | Enabled | Only enables the setting configuration. | [:::no-loc text="ForceYouTubeRestrict":::](/deployedge/microsoft-edge-policies#forceyoutuberestrict) | +| Microsoft Edge |**:::no-loc text="Force minimum YouTube Restricted Mode (Device)":::** | Enforce Strict Restricted Mode for YouTube | | [:::no-loc text="ForceYouTubeRestrict":::](/deployedge/microsoft-edge-policies#forceyoutuberestrict) | +| Microsoft Edge |**:::no-loc text="Force synchronization of browser data and do not show the sync consent prompt":::** | Enabled | Forces data synchronization in Microsoft Edge. This policy also prevents the user from turning sync off. | [:::no-loc text="ForceSync":::](/deployedge/microsoft-edge-policies#forcesync) | +| Microsoft Edge |**:::no-loc text="Hide the First-run experience and splash screen":::** | Enabled | The First-run experience and the splash screen won't be shown to users when they run Microsoft Edge for the first time. | [:::no-loc text="HideFirstRunExperience":::](/deployedge/microsoft-edge-policies#hidefirstrunexperience) | +| Microsoft Edge |**:::no-loc text="In-app support Enabled":::** | Disabled | Microsoft Edge uses the in-app support feature (enabled by default) to allow users to contact our support agents directly from the browser. | [:::no-loc text="InAppSupportEnabled":::](/deployedge/microsoft-edge-policies#inappsupportenabled) | +| Microsoft Edge |**:::no-loc text="Microsoft Edge Insider Promotion Enabled":::** | Disabled | The Microsoft Edge Insider promotion content won't be shown on the About Microsoft Edge page. | [:::no-loc text="MicrosoftEdgeInsiderPromotionEnabled":::](/deployedge/microsoft-edge-policies#microsoftedgeinsiderpromotionenabled) | +| Microsoft Edge |**:::no-loc text="Save and fill memberships":::** | Disabled | Users can't have their membership info automatically saved and used to fill form fields while using Microsoft Edge. | [:::no-loc text="AutofillMembershipsEnabled":::](/deployedge/microsoft-edge-policies#autofillmembershipsenabled) | +| Microsoft Edge |**:::no-loc text="Send all intranet sites to Internet Explorer":::** | Disabled | | [:::no-loc text="SendIntranetToInternetExplorer":::](/deployedge/microsoft-edge-policies#sendintranettointernetexplorer) | +| Microsoft Edge |**:::no-loc text="Shopping in Microsoft Edge Enabled":::** | Disabled | Shopping features such as price comparison, coupons, rebates, and express checkout won't be automatically found for retail domains. | [:::no-loc text="EdgeShoppingAssistantEnabled":::](/deployedge/microsoft-edge-policies#edgeshoppingassistantenabled) | +| Microsoft Edge |**:::no-loc text="Show Hubs Sidebar":::** | Disabled | The Sidebar will never be shown. | [:::no-loc text="HubsSidebarEnabled":::](/deployedge/microsoft-edge-policies#hubssidebarenabled) | +| Microsoft Edge |**:::no-loc text="Show Microsoft Rewards experiences":::** | Disabled | | [:::no-loc text="ShowMicrosoftRewards":::](/deployedge/microsoft-edge-policies#showmicrosoftrewards) | +| Microsoft Edge > Content settings |**:::no-loc text="Configure cookies":::** | Enabled | Only enables the setting configuration. | [:::no-loc text="DefaultCookiesSetting":::](/deployedge/microsoft-edge-policies#defaultcookiessetting) | +| Microsoft Edge > Content settings |**:::no-loc text="Configure cookies (Device)":::** | Let all sites create cookies | | [:::no-loc text="DefaultCookiesSetting":::](/deployedge/microsoft-edge-policies#defaultcookiessetting) | +| Microsoft Edge > Content settings |**:::no-loc text="Default pop-up window setting":::** | Enabled | Only enables the setting configuration. | [:::no-loc text="DefaultPopupsSetting":::](/deployedge/microsoft-edge-policies#defaultpopupssetting) | +| Microsoft Edge > Content settings |**:::no-loc text="Default pop-up window setting (Device)":::** | Allow all sites to show pop-ups | | [:::no-loc text="DefaultPopupsSetting":::](/deployedge/microsoft-edge-policies#defaultpopupssetting) | +| Microsoft Edge > Experimentation |**:::no-loc text="Configure users ability to override feature flags":::** | Disabled | Users can't override state of feature flags using command line arguments or edge://flags page. | [:::no-loc text="FeatureFlagOverridesControl":::](/deployedge/microsoft-edge-policies#featureflagoverridescontrol) | +| Microsoft Edge > Extensions |**:::no-loc text="Blocks external extensions from being installed":::** | Disabled | External extensions are allowed to be installed. | [:::no-loc text="BlockExternalExtensions":::](/deployedge/microsoft-edge-policies#blockexternalextensions) | +| Microsoft Edge > Extensions |**:::no-loc text="Control which extensions cannot be installed":::** | Disabled | The user can install any extension in Microsoft Edge. | [:::no-loc text="ExtensionInstallBlocklist":::](/deployedge/microsoft-edge-policies#extensioninstallblocklist) | +| Microsoft Edge > Identity and sign-in |**:::no-loc text="Enable implicit sign-in":::** | Enabled | Edge will attempt to sign the user into their profile based on what and how they sign in to their OS. | [:::no-loc text="ImplicitSignInEnabled":::](/deployedge/microsoft-edge-policies#implicitsigninenabled) | +| Microsoft Edge > Printing |**:::no-loc text="Enable printing":::** | Enabled | | [:::no-loc text="PrintingEnabled":::](/deployedge/microsoft-edge-policies#printingenabled) | +| Microsoft Edge > SmartScreen settings |**:::no-loc text="Configure Microsoft Defender SmartScreen to block potentially unwanted apps":::** | Enabled | Potentially unwanted app blocking with Microsoft Defender SmartScreen provides warning messages to help protect users from adware, coin miners, bundleware, and other low-reputation apps that are hosted by websites. | [:::no-loc text="SmartScreenPuaEnabled":::](/deployedge/microsoft-edge-policies#smartscreenpuaenabled) | +| Microsoft Edge > SmartScreen settings |**:::no-loc text="Prevent bypassing Microsoft Defender SmartScreen prompts for sites":::** | Enabled | Users can't ignore Microsoft Defender SmartScreen warnings and they're blocked from continuing to the site. | [:::no-loc text="PreventSmartScreenPromptOverride":::](/deployedge/microsoft-edge-policies#preventsmartscreenpromptoverride) | +| Microsoft Edge > Startup, home page and new tab page |**:::no-loc text="Allow Microsoft News content on the new tab page":::** | Disabled | Microsoft Edge does not display Microsoft News content on the new tab page, the Content control in the NTP settings flyout is disabled and set to 'Content off'. | [:::no-loc text="NewTabPageContentEnabled":::](/deployedge/microsoft-edge-policies#newtabpagecontentenabled) | +| Microsoft Edge > Startup, home page and new tab page |**:::no-loc text="Hide the default top sites from the new tab page":::** | Enabled | The default top site tiles are hidden. | [:::no-loc text="NewTabPageHideDefaultTopSites":::](/deployedge/microsoft-edge-policies#newtabpagehidedefaulttopsites) | +| Microsoft Edge Update > Applications |**:::no-loc text="Update policy override default":::** | Enabled | Only enables the setting configuration. | [:::no-loc text="UpdateDefault":::](/deployedge/microsoft-edge-update-policies#updatedefault) | +| Microsoft Edge Update > Applications |**:::no-loc text="Update policy override default > Policy (Device)":::** | Always allow updates (recommended) | | [:::no-loc text="UpdateDefault":::](/deployedge/microsoft-edge-update-policies#updatedefault) | + +## [:::image type="icon" source="../../../media/icons/graph.svg"::: **Create policy using Graph Explorer**](#tab/graph) + +[!INCLUDE [graph-explorer-introduction](../../../includes/graph-explorer-intro.md)] + +This will create a policy in your tenant with the name **:::no-loc text="_MSLearn_Example_CommonEDU - Windows - Microsoft Edge":::**. + +```msgraph-interactive +POST https://graph.microsoft.com/beta/deviceManagement/configurationPolicies +Content-Type: application/json + +{"name":"_MSLearn_Example_CommonEDU - Windows - Microsoft Edge","description":"https://aka.ms/ManageEduDevices","platforms":"windows10","technologies":"mdm","roleScopeTagIds":["0"],"settings":[{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_microsoft_edgev78diff~policy~microsoft_edge_adssettingforintrusiveadssites","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_microsoft_edgev78diff~policy~microsoft_edge_adssettingforintrusiveadssites_0","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_microsoft_edgev104~policy~microsoft_edge_importoneachlaunch","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_microsoft_edgev104~policy~microsoft_edge_importoneachlaunch_0","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_microsoft_edgev78diff~policy~microsoft_edge_importbrowsersettings","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_microsoft_edgev78diff~policy~microsoft_edge_importbrowsersettings_0","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge_importfavorites","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge_importfavorites_0","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_microsoft_edgev89~policy~microsoft_edge_showrecommendationsenabled","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_microsoft_edgev89~policy~microsoft_edge_showrecommendationsenabled_0","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_microsoft_edgev83diff~policy~microsoft_edge_localprovidersenabled","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_microsoft_edgev83diff~policy~microsoft_edge_localprovidersenabled_0","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_microsoft_edgev83diff~policy~microsoft_edge_allowsurfgame","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_microsoft_edgev83diff~policy~microsoft_edge_allowsurfgame_0","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge_userfeedbackallowed","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge_userfeedbackallowed_0","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_microsoft_edgev99~policy~microsoft_edge_allowgamesmenu","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_microsoft_edgev99~policy~microsoft_edge_allowgamesmenu_0","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge_sslerroroverrideallowed","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge_sslerroroverrideallowed_0","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_microsoft_edgev80diff~policy~microsoft_edge_paymentmethodqueryenabled","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_microsoft_edgev80diff~policy~microsoft_edge_paymentmethodqueryenabled_0","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge_urlblocklist","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge_urlblocklist_1","children":[{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSimpleSettingCollectionInstance","settingDefinitionId":"device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge_urlblocklist_urlblocklistdesc","simpleSettingCollectionValue":[{"value":"edge://flags","@odata.type":"#microsoft.graph.deviceManagementConfigurationStringSettingValue"}]}]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_microsoft_edgev83diff~policy~microsoft_edge_bingadssuppression","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_microsoft_edgev83diff~policy~microsoft_edge_bingadssuppression_1","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_microsoft_edgev78diff~policy~microsoft_edge_trackingprevention","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_microsoft_edgev78diff~policy~microsoft_edge_trackingprevention_1","children":[{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_microsoft_edgev78diff~policy~microsoft_edge_trackingprevention_trackingprevention","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_microsoft_edgev78diff~policy~microsoft_edge_trackingprevention_trackingprevention_2","children":[]}}]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge_browsersignin","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge_browsersignin_1","children":[{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge_browsersignin_browsersignin","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge_browsersignin_browsersignin_2","children":[]}}]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_microsoft_edgev78diff~policy~microsoft_edge_clearbrowsingdataonexit","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_microsoft_edgev78diff~policy~microsoft_edge_clearbrowsingdataonexit_0","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge_configuredonottrack","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge_configuredonottrack_1","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge_inprivatemodeavailability","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge_inprivatemodeavailability_1","children":[{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge_inprivatemodeavailability_inprivatemodeavailability","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge_inprivatemodeavailability_inprivatemodeavailability_1","children":[]}}]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_microsoft_edgev78diff~policy~microsoft_edge_nonremovableprofileenabled","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_microsoft_edgev78diff~policy~microsoft_edge_nonremovableprofileenabled_1","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge~contentsettings_defaultcookiessetting","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge~contentsettings_defaultcookiessetting_1","children":[{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge~contentsettings_defaultcookiessetting_defaultcookiessetting","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge~contentsettings_defaultcookiessetting_defaultcookiessetting_1","children":[]}}]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge~contentsettings_defaultpopupssetting","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge~contentsettings_defaultpopupssetting_1","children":[{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge~contentsettings_defaultpopupssetting_defaultpopupssetting","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge~contentsettings_defaultpopupssetting_defaultpopupssetting_1","children":[]}}]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge_backgroundmodeenabled","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge_backgroundmodeenabled_0","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge_developertoolsavailability","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge_developertoolsavailability_1","children":[{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge_developertoolsavailability_developertoolsavailability","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge_developertoolsavailability_developertoolsavailability_2","children":[]}}]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_microsoft_edgev86~policy~microsoft_edge_defaultsensorssetting","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_microsoft_edgev86~policy~microsoft_edge_defaultsensorssetting_0","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge_autofilladdressenabled","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge_autofilladdressenabled_0","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge_autofillcreditcardenabled","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge_autofillcreditcardenabled_0","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_microsoft_edgev104~policy~microsoft_edge_edgeedropenabled","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_microsoft_edgev104~policy~microsoft_edge_edgeedropenabled_0","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge_promotionaltabsenabled","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge_promotionaltabsenabled_0","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_microsoft_edgev81diff~policy~microsoft_edge_addressbarmicrosoftsearchinbingproviderenabled","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_microsoft_edgev81diff~policy~microsoft_edge_addressbarmicrosoftsearchinbingproviderenabled_1","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge_browseraddprofileenabled","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge_browseraddprofileenabled_0","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge_searchsuggestenabled","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge_searchsuggestenabled_1","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge_forcebingsafesearch","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge_forcebingsafesearch_1","children":[{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge_forcebingsafesearch_forcebingsafesearch","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge_forcebingsafesearch_forcebingsafesearch_2","children":[]}}]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge_forcegooglesafesearch","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge_forcegooglesafesearch_1","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_microsoft_edgev93~policy~microsoft_edge~experimentation_featureflagoverridescontrol","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_microsoft_edgev93~policy~microsoft_edge~experimentation_featureflagoverridescontrol_0","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_microsoft_edgev88~policy~microsoft_edge~extensions_blockexternalextensions","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_microsoft_edgev88~policy~microsoft_edge~extensions_blockexternalextensions_0","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge~extensions_extensioninstallblocklist","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge~extensions_extensioninstallblocklist_0","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge_forceyoutuberestrict","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge_forceyoutuberestrict_1","children":[{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge_forceyoutuberestrict_forceyoutuberestrict","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge_forceyoutuberestrict_forceyoutuberestrict_2","children":[]}}]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_microsoft_edgev86~policy~microsoft_edge_forcesync","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_microsoft_edgev86~policy~microsoft_edge_forcesync_1","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_microsoft_edgev80diff~policy~microsoft_edge_hidefirstrunexperience","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_microsoft_edgev80diff~policy~microsoft_edge_hidefirstrunexperience_1","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_microsoft_edgev93~policy~microsoft_edge~identity_implicitsigninenabled","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_microsoft_edgev93~policy~microsoft_edge~identity_implicitsigninenabled_1","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_microsoft_edgev98~policy~microsoft_edge_inappsupportenabled","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_microsoft_edgev98~policy~microsoft_edge_inappsupportenabled_0","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_microsoft_edgev98~policy~microsoft_edge_microsoftedgeinsiderpromotionenabled","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_microsoft_edgev98~policy~microsoft_edge_microsoftedgeinsiderpromotionenabled_0","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge~printing_printingenabled","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge~printing_printingenabled_1","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_microsoft_edgev110~policy~microsoft_edge_autofillmembershipsenabled","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_microsoft_edgev110~policy~microsoft_edge_autofillmembershipsenabled_0","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge_sendintranettointernetexplorer","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge_sendintranettointernetexplorer_0","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_microsoft_edgev87~policy~microsoft_edge_edgeshoppingassistantenabled","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_microsoft_edgev87~policy~microsoft_edge_edgeshoppingassistantenabled_0","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_microsoft_edgev99~policy~microsoft_edge_hubssidebarenabled","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_microsoft_edgev99~policy~microsoft_edge_hubssidebarenabled_0","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_microsoft_edgev88~policy~microsoft_edge_showmicrosoftrewards","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_microsoft_edgev88~policy~microsoft_edge_showmicrosoftrewards_0","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_microsoft_edgev80diff~policy~microsoft_edge~smartscreen_smartscreenpuaenabled","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_microsoft_edgev80diff~policy~microsoft_edge~smartscreen_smartscreenpuaenabled_1","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge~smartscreen_preventsmartscreenpromptoverride","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge~smartscreen_preventsmartscreenpromptoverride_1","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_microsoft_edgev91~policy~microsoft_edge~startup_newtabpagecontentenabled","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_microsoft_edgev91~policy~microsoft_edge~startup_newtabpagecontentenabled_0","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge~startup_newtabpagehidedefaulttopsites","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge~startup_newtabpagehidedefaulttopsites_1","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_update~policy~cat_google~cat_googleupdate~cat_applications_pol_defaultupdatepolicy","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_update~policy~cat_google~cat_googleupdate~cat_applications_pol_defaultupdatepolicy_1","children":[{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_update~policy~cat_google~cat_googleupdate~cat_applications_pol_defaultupdatepolicy_part_updatepolicy","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_update~policy~cat_google~cat_googleupdate~cat_applications_pol_defaultupdatepolicy_part_updatepolicy_1","children":[]}}]}}}]} +``` + +[!INCLUDE [graph-explorer-steps](../../../includes/graph-explorer-steps.md)] + +--- ## (Optional) Startup, home page and new tab page -| **Name** | **Value** | **Notes** | **CSP** | -|---|---|---|---| -| **:::no-loc text="Action to take on startup":::** | _custom_ | Specify how Microsoft Edge behaves when it starts. | [:::no-loc text="RestoreOnStartup":::](/deployedge/microsoft-edge-policies#restoreonstartup) | -| **:::no-loc text="Configure the home page URL":::** | Enabled | Configures the default home page URL in Microsoft Edge. The home page is the page opened by the Home button. | [:::no-loc text="HomepageLocation":::](/deployedge/microsoft-edge-policies#homepagelocation) | -| **:::no-loc text="Home page URL (Device)":::** | _custom_ _url_ | | [:::no-loc text="HomepageLocation":::](/deployedge/microsoft-edge-policies#homepagelocation) | -| **:::no-loc text="Configure the new tab page URL":::** | Disabled | This policy determines the page that's opened when new tabs are created (including when new windows are opened). It also affects the startup page if that's set to open to the new tab page. | [:::no-loc text="NewTabPageLocation":::](/deployedge/microsoft-edge-policies#newtabpagelocation) | -| **:::no-loc text="New tab page URL (Device)":::** | _custom_ _url_ | | [:::no-loc text="NewTabPageLocation":::](/deployedge/microsoft-edge-policies#newtabpagelocation) | +### [**Settings**](#tab/settings) + +| **Category** | **Name** | **Value** | **Notes** | **CSP** | +|---|---|---|---|---| +| Microsoft Edge > Startup, home page and new tab page |**:::no-loc text="Action to take on startup":::** | _custom_ | Specify how Microsoft Edge behaves when it starts. | [:::no-loc text="RestoreOnStartup":::](/deployedge/microsoft-edge-policies#restoreonstartup) | +| Microsoft Edge > Startup, home page and new tab page |**:::no-loc text="Configure the home page URL":::** | Enabled | Configures the default home page URL in Microsoft Edge. The home page is the page opened by the Home button. | [:::no-loc text="HomepageLocation":::](/deployedge/microsoft-edge-policies#homepagelocation) | +| Microsoft Edge > Startup, home page and new tab page |**:::no-loc text="Home page URL (Device)":::** | _custom_ _url_ | | [:::no-loc text="HomepageLocation":::](/deployedge/microsoft-edge-policies#homepagelocation) | +| Microsoft Edge > Startup, home page and new tab page |**:::no-loc text="Configure the new tab page URL":::** | Disabled | This policy determines the page that's opened when new tabs are created (including when new windows are opened). It also affects the startup page if that's set to open to the new tab page. | [:::no-loc text="NewTabPageLocation":::](/deployedge/microsoft-edge-policies#newtabpagelocation) | +| Microsoft Edge > Startup, home page and new tab page |**:::no-loc text="New tab page URL (Device)":::** | _custom_ _url_ | | [:::no-loc text="NewTabPageLocation":::](/deployedge/microsoft-edge-policies#newtabpagelocation) | + +### [:::image type="icon" source="../../../media/icons/graph.svg"::: **Create policy using Graph Explorer**](#tab/graph) + +[!INCLUDE [graph-explorer-introduction](../../../includes/graph-explorer-intro.md)] + +This will create a policy in your tenant with the name **:::no-loc text="_MSLearn_Example_CommonEDU - Windows - Microsoft Edge (Optional)":::**. + +```msgraph-interactive +POST https://graph.microsoft.com/beta/deviceManagement/configurationPolicies +Content-Type: application/json + +{"name":"_MSLearn_Example_CommonEDU - Windows - Microsoft Edge (Optional)","description":"https://aka.ms/ManageEduDevices","platforms":"windows10","technologies":"mdm","roleScopeTagIds":["0"],"settings":[{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge~startup_restoreonstartup","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge~startup_restoreonstartup_1","children":[{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge~startup_restoreonstartup_restoreonstartup","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge~startup_restoreonstartup_restoreonstartup_5","children":[]}}]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge~startup_homepagelocation","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge~startup_homepagelocation_1","children":[{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSimpleSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge~startup_homepagelocation_homepagelocation","simpleSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationStringSettingValue","value":"https://www.office.com"}}]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge~startup_newtabpagelocation","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge~startup_newtabpagelocation_1","children":[{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSimpleSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_microsoft_edge~policy~microsoft_edge~startup_newtabpagelocation_newtabpagelocation","simpleSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationStringSettingValue","value":"https://www.office.com"}}]}}}]} +``` + +[!INCLUDE [graph-explorer-steps](../../../includes/graph-explorer-steps.md)] + +--- ## (Optional) Content settings in Microsoft 365 admin center diff --git a/memdocs/intune/industry/education/tutorial-school-deployment/common-config-settings-catalog-onedrive-knownfoldermove.md b/memdocs/intune/industry/education/tutorial-school-deployment/common-config-settings-catalog-onedrive-knownfoldermove.md index 8f05c990417..d51207ba384 100644 --- a/memdocs/intune/industry/education/tutorial-school-deployment/common-config-settings-catalog-onedrive-knownfoldermove.md +++ b/memdocs/intune/industry/education/tutorial-school-deployment/common-config-settings-catalog-onedrive-knownfoldermove.md @@ -7,6 +7,10 @@ author: yegor-a ms.author: egorabr ms.manager: dougeby no-loc: [Microsoft, Windows, Autopatch, Autopilot] +ms.collection: +- graph-interactive +ms.service: microsoft-intune +ms.subservice: education --- # OneDrive Known Folder Move @@ -24,28 +28,52 @@ To learn more, see: > [!TIP] > When creating a settings catalog profile in the Microsoft Intune admin center, you can copy a policy name from this article and paste it into the settings picker search field to find the desired policy. -## Settings catalog policies - -| **Name** | **Value** | **Notes** | **CSP** | -|---|---|---|---| -|**:::no-loc text="Allow syncing OneDrive accounts for only specific organizations":::** | Enabled | Only enables the setting configuration. | [:::no-loc text="AllowTenantList":::](/sharepoint/use-group-policy#allow-syncing-onedrive-accounts-for-only-specific-organizations) | -|**:::no-loc text="Allow syncing OneDrive accounts for only specific organizations > Tenant ID: (Device)":::** | _tenant ID_ | **Important!** This is a tenant-specific value. [How to find your Microsoft Entra tenant ID](/entra/fundamentals/how-to-find-tenant)| [:::no-loc text="AllowTenantList":::](/sharepoint/use-group-policy#allow-syncing-onedrive-accounts-for-only-specific-organizations) | -|**:::no-loc text="Block file downloads when users are low on disk space":::** | Enabled | | [:::no-loc text="MinDiskSpaceLimitInMB":::](/sharepoint/use-group-policy#block-file-downloads-when-users-are-low-on-disk-space) | -|**:::no-loc text="Block file downloads when users are low on disk space > Minimum available disk space: (Device)":::** | 1024 | Only enables the setting configuration. | [:::no-loc text="MinDiskSpaceLimitInMB":::](/sharepoint/use-group-policy#block-file-downloads-when-users-are-low-on-disk-space) | -|**:::no-loc text="Convert synced team site files to online-only files":::** | Enabled | Files in currently syncing team sites are changed to online-only files, by default. Files later added or updated in the team site are also downloaded as online-only files. | [:::no-loc text="DehydrateSyncedTeamSites":::](/sharepoint/use-group-policy#convert-synced-team-site-files-to-online-only-files) | -|**:::no-loc text="Disable the tutorial that appears at the end of OneDrive Setup (User)":::** | Enabled | | [:::no-loc text="DisableTutorial":::](/sharepoint/use-group-policy#disable-the-tutorial-that-appears-at-the-end-of-onedrive-setup) | -|**:::no-loc text="Prevent users from redirecting their Windows known folders to their PC":::** | Enabled | | [:::no-loc text="KFMBlockOptOut":::](/sharepoint/use-group-policy#prevent-users-from-redirecting-their-windows-known-folders-to-their-pc) | -|**:::no-loc text="Prevent users from syncing libraries and folders shared from other organizations":::** | Enabled | | [:::no-loc text="BlockExternalSync":::](/sharepoint/use-group-policy#prevent-users-from-syncing-libraries-and-folders-shared-from-other-organizations) | -|**:::no-loc text="Prevent users from syncing personal OneDrive accounts (User)":::** | Enabled | | [:::no-loc text="DisablePersonalSync":::](/sharepoint/use-group-policy#prevent-users-from-syncing-personal-onedrive-accounts) | -|**:::no-loc text="Set the sync app update ring":::** | Enabled | Only enables the setting configuration. | [:::no-loc text="GPOSetUpdateRing":::](/sharepoint/use-group-policy#set-the-sync-app-update-ring) | -|**:::no-loc text="Set the sync app update ring > Update ring: (Device)":::** | Production | Users get the latest features as they become available. | [:::no-loc text="GPOSetUpdateRing":::](/sharepoint/use-group-policy#set-the-sync-app-update-ring) | -|**:::no-loc text="Silently move Windows known folders to OneDrive":::** | Enabled | **Important!** Make sure to pick the setting with 5 sub-settings listed below.Redirect and move your users' Documents, Pictures, and/or Desktop folders to OneDrive without any user interaction. | [:::no-loc text="KFMSilentOptIn":::](/sharepoint/use-group-policy#silently-move-windows-known-folders-to-onedrive) | -|**:::no-loc text="Silently move Windows known folders to OneDrive > Desktop (Device)":::** | True | | [:::no-loc text="KFMSilentOptIn":::](/sharepoint/use-group-policy#silently-move-windows-known-folders-to-onedrive) | -|**:::no-loc text="Silently move Windows known folders to OneDrive > Documents (Device)":::** | True | | [:::no-loc text="KFMSilentOptIn":::](/sharepoint/use-group-policy#silently-move-windows-known-folders-to-onedrive) | -|**:::no-loc text="Silently move Windows known folders to OneDrive > Pictures (Device)":::** | True | | [:::no-loc text="KFMSilentOptIn":::](/sharepoint/use-group-policy#silently-move-windows-known-folders-to-onedrive) | -|**:::no-loc text="Silently move Windows known folders to OneDrive > Show notification to users after folders have been redirected: (Device)":::** | No | | [:::no-loc text="KFMSilentOptIn":::](/sharepoint/use-group-policy#silently-move-windows-known-folders-to-onedrive) | -|**:::no-loc text="Silently move Windows known folders to OneDrive > Tenant ID: (Device)":::** | _{tenant ID}_ | | [:::no-loc text="KFMSilentOptIn":::](/sharepoint/use-group-policy#silently-move-windows-known-folders-to-onedrive) | -|**:::no-loc text="Silently sign in users to the OneDrive sync app with their Windows credentials":::** | Enabled | Users who are signed in on a PC that's joined to Microsoft Entra ID can set up the sync app without entering their account credentials. | [:::no-loc text="SilentAccountConfig":::](/sharepoint/use-group-policy#silently-sign-in-users-to-the-onedrive-sync-app-with-their-windows-credentials) | -|**:::no-loc text="Use OneDrive Files On-Demand":::** | Enabled | New users who set up the sync app see online-only files in File Explorer, by default. | [:::no-loc text="FilesOnDemandEnabled":::](/sharepoint/use-group-policy#use-onedrive-files-on-demand) | -|**:::no-loc text="Warn users who are low on disk space":::** | Enabled | Only enables the setting configuration. | [:::no-loc text="WarningMinDiskSpaceLimitInMB":::](/sharepoint/use-group-policy#warn-users-who-are-low-on-disk-space) | -|**:::no-loc text="Warn users who are low on disk space > Minimum available disk space: (Device)":::** | 2048 | Specify a miminimum amount of available disk space in MB, and warn users when the OneDrive sync app (OneDrive.exe) downloads a file that causes them to have less than this amount. | [:::no-loc text="WarningMinDiskSpaceLimitInMB":::](/sharepoint/use-group-policy#warn-users-who-are-low-on-disk-space) | +## [**Settings**](#tab/settings) + +### Organization-specific settings catalog policies + +| **Category** | **Name** | **Value** | **Notes** | **CSP** | +|---|---|---|---|---| +| OneDrive |**:::no-loc text="Allow syncing OneDrive accounts for only specific organizations":::** | Enabled | Only enables the setting configuration. | [:::no-loc text="AllowTenantList":::](/sharepoint/use-group-policy#allow-syncing-onedrive-accounts-for-only-specific-organizations) | +| OneDrive |**:::no-loc text="Allow syncing OneDrive accounts for only specific organizations > Tenant ID: (Device)":::** | _tenant ID_ | **Important!** This is a tenant-specific value. [How to find your Microsoft Entra tenant ID](/entra/fundamentals/how-to-find-tenant)| [:::no-loc text="AllowTenantList":::](/sharepoint/use-group-policy#allow-syncing-onedrive-accounts-for-only-specific-organizations) | + +### General restrictions + +| **Category** | **Name** | **Value** | **Notes** | **CSP** | +|---|---|---|---|---| +| OneDrive |**:::no-loc text="Block file downloads when users are low on disk space":::** | Enabled | | [:::no-loc text="MinDiskSpaceLimitInMB":::](/sharepoint/use-group-policy#block-file-downloads-when-users-are-low-on-disk-space) | +| OneDrive |**:::no-loc text="Block file downloads when users are low on disk space > Minimum available disk space: (Device)":::** | 1024 | Only enables the setting configuration. | [:::no-loc text="MinDiskSpaceLimitInMB":::](/sharepoint/use-group-policy#block-file-downloads-when-users-are-low-on-disk-space) | +| OneDrive |**:::no-loc text="Convert synced team site files to online-only files":::** | Enabled | Files in currently syncing team sites are changed to online-only files, by default. Files later added or updated in the team site are also downloaded as online-only files. | [:::no-loc text="DehydrateSyncedTeamSites":::](/sharepoint/use-group-policy#convert-synced-team-site-files-to-online-only-files) | +| OneDrive |**:::no-loc text="Disable the tutorial that appears at the end of OneDrive Setup (User)":::** | Enabled | | [:::no-loc text="DisableTutorial":::](/sharepoint/use-group-policy#disable-the-tutorial-that-appears-at-the-end-of-onedrive-setup) | +| OneDrive |**:::no-loc text="Prevent users from redirecting their Windows known folders to their PC":::** | Enabled | | [:::no-loc text="KFMBlockOptOut":::](/sharepoint/use-group-policy#prevent-users-from-redirecting-their-windows-known-folders-to-their-pc) | +| OneDrive |**:::no-loc text="Prevent users from syncing libraries and folders shared from other organizations":::** | Enabled | | [:::no-loc text="BlockExternalSync":::](/sharepoint/use-group-policy#prevent-users-from-syncing-libraries-and-folders-shared-from-other-organizations) | +| OneDrive |**:::no-loc text="Prevent users from syncing personal OneDrive accounts (User)":::** | Enabled | | [:::no-loc text="DisablePersonalSync":::](/sharepoint/use-group-policy#prevent-users-from-syncing-personal-onedrive-accounts) | +| OneDrive |**:::no-loc text="Set the sync app update ring":::** | Enabled | Only enables the setting configuration. | [:::no-loc text="GPOSetUpdateRing":::](/sharepoint/use-group-policy#set-the-sync-app-update-ring) | +| OneDrive |**:::no-loc text="Set the sync app update ring > Update ring: (Device)":::** | Production | Users get the latest features as they become available. | [:::no-loc text="GPOSetUpdateRing":::](/sharepoint/use-group-policy#set-the-sync-app-update-ring) | +| OneDrive |**:::no-loc text="Silently move Windows known folders to OneDrive":::** | Enabled | **!Important**: Make sure to pick the setting with 5 sub-settings listed below. Redirect and move your users' Documents, Pictures, and/or Desktop folders to OneDrive without any user interaction. | [:::no-loc text="KFMSilentOptIn":::](/sharepoint/use-group-policy#silently-move-windows-known-folders-to-onedrive) | +| OneDrive |**:::no-loc text="Silently move Windows known folders to OneDrive > Desktop (Device)":::** | True | | [:::no-loc text="KFMSilentOptIn":::](/sharepoint/use-group-policy#silently-move-windows-known-folders-to-onedrive) | +| OneDrive |**:::no-loc text="Silently move Windows known folders to OneDrive > Documents (Device)":::** | True | | [:::no-loc text="KFMSilentOptIn":::](/sharepoint/use-group-policy#silently-move-windows-known-folders-to-onedrive) | +| OneDrive |**:::no-loc text="Silently move Windows known folders to OneDrive > Pictures (Device)":::** | True | | [:::no-loc text="KFMSilentOptIn":::](/sharepoint/use-group-policy#silently-move-windows-known-folders-to-onedrive) | +| OneDrive |**:::no-loc text="Silently move Windows known folders to OneDrive > Show notification to users after folders have been redirected: (Device)":::** | No | | [:::no-loc text="KFMSilentOptIn":::](/sharepoint/use-group-policy#silently-move-windows-known-folders-to-onedrive) | +| OneDrive |**:::no-loc text="Silently move Windows known folders to OneDrive > Tenant ID: (Device)":::** | _{tenant ID}_ | | [:::no-loc text="KFMSilentOptIn":::](/sharepoint/use-group-policy#silently-move-windows-known-folders-to-onedrive) | +| OneDrive |**:::no-loc text="Silently sign in users to the OneDrive sync app with their Windows credentials":::** | Enabled | Users who are signed in on a PC that's joined to Microsoft Entra ID can set up the sync app without entering their account credentials. | [:::no-loc text="SilentAccountConfig":::](/sharepoint/use-group-policy#silently-sign-in-users-to-the-onedrive-sync-app-with-their-windows-credentials) | +| OneDrive |**:::no-loc text="Use OneDrive Files On-Demand":::** | Enabled | New users who set up the sync app see online-only files in File Explorer, by default. | [:::no-loc text="FilesOnDemandEnabled":::](/sharepoint/use-group-policy#use-onedrive-files-on-demand) | +| OneDrive |**:::no-loc text="Warn users who are low on disk space":::** | Enabled | Only enables the setting configuration. | [:::no-loc text="WarningMinDiskSpaceLimitInMB":::](/sharepoint/use-group-policy#warn-users-who-are-low-on-disk-space) | +| OneDrive |**:::no-loc text="Warn users who are low on disk space > Minimum available disk space: (Device)":::** | 2048 | Specify a minimum amount of available disk space in MB, and warn users when the OneDrive sync app (OneDrive.exe) downloads a file that causes them to have less than this amount. | [:::no-loc text="WarningMinDiskSpaceLimitInMB":::](/sharepoint/use-group-policy#warn-users-who-are-low-on-disk-space) | + +## [:::image type="icon" source="../../../media/icons/graph.svg"::: **Create policy using Graph Explorer**](#tab/graph) + +[!INCLUDE [graph-explorer-introduction](../../../includes/graph-explorer-intro.md)] + +This will create a policy in your tenant with the name **:::no-loc text="_MSLearn_Example_CommonEDU - Windows - OneDrive Known Folder Move":::**. + +```msgraph-interactive +POST https://graph.microsoft.com/beta/deviceManagement/configurationPolicies +Content-Type: application/json + +{"name":"_MSLearn_Example_CommonEDU - Windows - OneDrive Known Folder Move","description":"https://aka.ms/ManageEduDevices","platforms":"windows10","technologies":"mdm","roleScopeTagIds":["0"],"settings":[{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_onedrivengscv2~policy~onedrivengsc_allowtenantlist","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_onedrivengscv2~policy~onedrivengsc_allowtenantlist_1","children":[{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSimpleSettingCollectionInstance","settingDefinitionId":"device_vendor_msft_policy_config_onedrivengscv2~policy~onedrivengsc_allowtenantlist_allowtenantlistbox","simpleSettingCollectionValue":[{"value":" tenantId","@odata.type":"#microsoft.graph.deviceManagementConfigurationStringSettingValue"}]}]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_onedrivengscv3~policy~onedrivengsc_mindiskspacelimitinmb","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_onedrivengscv3~policy~onedrivengsc_mindiskspacelimitinmb_1","children":[{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSimpleSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_onedrivengscv3~policy~onedrivengsc_mindiskspacelimitinmb_mindiskspacemb","simpleSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationIntegerSettingValue","value":1024}}]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_onedrivengscv2~policy~onedrivengsc_dehydratesyncedteamsites","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_onedrivengscv2~policy~onedrivengsc_dehydratesyncedteamsites_1","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"user_vendor_msft_policy_config_onedrivengscv6~policy~onedrivengsc_disablefreanimation","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"user_vendor_msft_policy_config_onedrivengscv6~policy~onedrivengsc_disablefreanimation_1","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_onedrivengscv2~policy~onedrivengsc_blockexternalsync","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_onedrivengscv2~policy~onedrivengsc_blockexternalsync_1","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"user_vendor_msft_policy_config_onedrivengscv2~policy~onedrivengsc_disablepersonalsync","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"user_vendor_msft_policy_config_onedrivengscv2~policy~onedrivengsc_disablepersonalsync_1","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_onedrivengscv2~policy~onedrivengsc_gposetupdatering","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_onedrivengscv2~policy~onedrivengsc_gposetupdatering_1","children":[{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_onedrivengscv2~policy~onedrivengsc_gposetupdatering_gposetupdatering_dropdown","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_onedrivengscv2~policy~onedrivengsc_gposetupdatering_gposetupdatering_dropdown_5","children":[]}}]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_onedrivengscv2.updates~policy~onedrivengsc_kfmoptinnowizard","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_onedrivengscv2.updates~policy~onedrivengsc_kfmoptinnowizard_1","children":[{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_onedrivengscv2.updates~policy~onedrivengsc_kfmoptinnowizard_kfmoptinnowizard_desktop_checkbox","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_onedrivengscv2.updates~policy~onedrivengsc_kfmoptinnowizard_kfmoptinnowizard_desktop_checkbox_1","children":[]}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_onedrivengscv2.updates~policy~onedrivengsc_kfmoptinnowizard_kfmoptinnowizard_documents_checkbox","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_onedrivengscv2.updates~policy~onedrivengsc_kfmoptinnowizard_kfmoptinnowizard_documents_checkbox_1","children":[]}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_onedrivengscv2.updates~policy~onedrivengsc_kfmoptinnowizard_kfmoptinnowizard_pictures_checkbox","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_onedrivengscv2.updates~policy~onedrivengsc_kfmoptinnowizard_kfmoptinnowizard_pictures_checkbox_1","children":[]}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_onedrivengscv2.updates~policy~onedrivengsc_kfmoptinnowizard_kfmoptinnowizard_dropdown","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_onedrivengscv2.updates~policy~onedrivengsc_kfmoptinnowizard_kfmoptinnowizard_dropdown_0","children":[]}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSimpleSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_onedrivengscv2.updates~policy~onedrivengsc_kfmoptinnowizard_kfmoptinnowizard_textbox","simpleSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationStringSettingValue","value":"tenantId"}}]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_onedrivengscv2~policy~onedrivengsc_silentaccountconfig","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_onedrivengscv2~policy~onedrivengsc_silentaccountconfig_1","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_onedrivengscv2~policy~onedrivengsc_filesondemandenabled","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_onedrivengscv2~policy~onedrivengsc_filesondemandenabled_1","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_onedrivengscv3~policy~onedrivengsc_warningmindiskspacelimitinmb","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_onedrivengscv3~policy~onedrivengsc_warningmindiskspacelimitinmb_1","children":[{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSimpleSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_onedrivengscv3~policy~onedrivengsc_warningmindiskspacelimitinmb_warningmindiskspacemb","simpleSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationIntegerSettingValue","value":2048}}]}}}]} +``` + +[!INCLUDE [graph-explorer-steps](../../../includes/graph-explorer-steps.md)] + +--- diff --git a/memdocs/intune/industry/education/tutorial-school-deployment/common-config-settings-catalog-start-menu.md b/memdocs/intune/industry/education/tutorial-school-deployment/common-config-settings-catalog-start-menu.md index 742874a055a..f16eecd043b 100644 --- a/memdocs/intune/industry/education/tutorial-school-deployment/common-config-settings-catalog-start-menu.md +++ b/memdocs/intune/industry/education/tutorial-school-deployment/common-config-settings-catalog-start-menu.md @@ -7,6 +7,10 @@ author: yegor-a ms.author: egorabr ms.manager: dougeby no-loc: [Microsoft, Windows, Autopatch, Autopilot] +ms.collection: +- graph-interactive +ms.service: microsoft-intune +ms.subservice: education --- # Start menu customization @@ -28,17 +32,34 @@ To learn more, see: > [!TIP] > When creating a settings catalog profile in the Microsoft Intune admin center, you can copy a policy name from this article and paste it into the settings picker search field to find the desired policy. -## Settings catalog policies - -| **Name** | **Value** | **Notes** | **CSP** | -|---|---|---|---| -| **:::no-loc text="Start Layout":::** | A custom XML string | Create and deploy a custom Start menu and taskbar layout. Please refer to articles in the learn more section above. | [:::no-loc text="StartLayout":::](/windows/client-management/mdm/policy-csp-start#startlayout) | -| **:::no-loc text="Hide App List":::** | None | | [:::no-loc text="Start/HideAppList":::](/windows/client-management/mdm/policy-csp-start#hideapplist) | -| **:::no-loc text="Hide Change Account Settings":::** | Disabled | | [:::no-loc text="Start/HideChangeAccountSettings":::](/windows/client-management/mdm/policy-csp-start#hidechangeaccountsettings) | -| **:::no-loc text="Hide Frequently Used Apps":::** | Enabled | | [:::no-loc text="Start/HideFrequentlyUsedApps":::](/windows/client-management/mdm/policy-csp-start#hidefrequentlyusedapps) | -| **:::no-loc text="Hide Power Button":::** | Disabled | | [:::no-loc text="Start/HidePowerButton":::](/windows/client-management/mdm/policy-csp-start#hidepowerbutton) | -| **:::no-loc text="Hide Recent Jumplists":::** | Enabled | | [:::no-loc text="Start/HideRecentJumplists":::](/windows/client-management/mdm/policy-csp-start#hiderecentjumplists) | -| **:::no-loc text="Hide Recently Added Apps":::** | Enabled | | [:::no-loc text="Start/HideRecentlyAddedApps":::](/windows/client-management/mdm/policy-csp-start#hiderecentlyaddedapps) | -| **:::no-loc text="Hide User Tile":::** | Disabled | | [:::no-loc text="Start/HideUserTile":::](/windows/client-management/mdm/policy-csp-start#hideusertile) | -| **:::no-loc text="Hide Lock":::** | Disabled | | [:::no-loc text="Start/HideLock":::](/windows/client-management/mdm/policy-csp-start#hidelock) | -| **:::no-loc text="Hide Sign Out":::** | Disabled | | [:::no-loc text="Start/HideSignOut":::](/windows/client-management/mdm/policy-csp-start#hidesignout) | +## [**Settings**](#tab/settings) + +| **Category** | **Name** | **Value** | **Notes** | **CSP** | +|---|---|---|---|---| +| Start | **:::no-loc text="Start Layout":::** | A custom XML string | Create and deploy a custom Start menu and taskbar layout. Please refer to articles in the learn more section above. | [:::no-loc text="StartLayout":::](/windows/client-management/mdm/policy-csp-start#startlayout) | +| Start | **:::no-loc text="Hide App List":::** | None | | [:::no-loc text="Start/HideAppList":::](/windows/client-management/mdm/policy-csp-start#hideapplist) | +| Start | **:::no-loc text="Hide Change Account Settings":::** | Disabled | | [:::no-loc text="Start/HideChangeAccountSettings":::](/windows/client-management/mdm/policy-csp-start#hidechangeaccountsettings) | +| Start | **:::no-loc text="Hide Frequently Used Apps":::** | Enabled | | [:::no-loc text="Start/HideFrequentlyUsedApps":::](/windows/client-management/mdm/policy-csp-start#hidefrequentlyusedapps) | +| Start | **:::no-loc text="Hide Power Button":::** | Disabled | | [:::no-loc text="Start/HidePowerButton":::](/windows/client-management/mdm/policy-csp-start#hidepowerbutton) | +| Start | **:::no-loc text="Hide Recent Jumplists":::** | Enabled | | [:::no-loc text="Start/HideRecentJumplists":::](/windows/client-management/mdm/policy-csp-start#hiderecentjumplists) | +| Start | **:::no-loc text="Hide Recently Added Apps":::** | Enabled | | [:::no-loc text="Start/HideRecentlyAddedApps":::](/windows/client-management/mdm/policy-csp-start#hiderecentlyaddedapps) | +| Start | **:::no-loc text="Hide User Tile":::** | Disabled | | [:::no-loc text="Start/HideUserTile":::](/windows/client-management/mdm/policy-csp-start#hideusertile) | +| Start | **:::no-loc text="Hide Lock":::** | Disabled | | [:::no-loc text="Start/HideLock":::](/windows/client-management/mdm/policy-csp-start#hidelock) | +| Start | **:::no-loc text="Hide Sign Out":::** | Disabled | | [:::no-loc text="Start/HideSignOut":::](/windows/client-management/mdm/policy-csp-start#hidesignout) | + +## [:::image type="icon" source="../../../media/icons/graph.svg"::: **Create policy using Graph Explorer**](#tab/graph) + +[!INCLUDE [graph-explorer-introduction](../../../includes/graph-explorer-intro.md)] + +This will create a policy in your tenant with the name **:::no-loc text="_MSLearn_Example_CommonEDU - Windows - Start menu":::**. + +```msgraph-interactive +POST https://graph.microsoft.com/beta/deviceManagement/configurationPolicies +Content-Type: application/json + +{"name":"_MSLearn_Example_CommonEDU - Windows - Start menu","description":"https://aka.ms/ManageEduDevices","platforms":"windows10","technologies":"mdm","roleScopeTagIds":["0"],"settings":[{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_start_hideapplist","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_start_hideapplist_0","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_start_hidechangeaccountsettings","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_start_hidechangeaccountsettings_0","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_start_hidefrequentlyusedapps","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_start_hidefrequentlyusedapps_1","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_start_hidepowerbutton","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_start_hidepowerbutton_0","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_start_hiderecentjumplists","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_start_hiderecentjumplists_1","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_start_hiderecentlyaddedapps","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_start_hiderecentlyaddedapps_1","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_start_hideusertile","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_start_hideusertile_0","children":[{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_start_hidelock","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_start_hidelock_0","children":[]}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_start_hidesignout","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_start_hidesignout_0","children":[]}}]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSimpleSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_start_startlayout","simpleSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationStringSettingValue","value":""}}}]} +``` + +[!INCLUDE [graph-explorer-steps](../../../includes/graph-explorer-steps.md)] + +--- diff --git a/memdocs/intune/industry/education/tutorial-school-deployment/common-config-settings-catalog-windows-privacy.md b/memdocs/intune/industry/education/tutorial-school-deployment/common-config-settings-catalog-windows-privacy.md index 835f0a63762..779d70a808d 100644 --- a/memdocs/intune/industry/education/tutorial-school-deployment/common-config-settings-catalog-windows-privacy.md +++ b/memdocs/intune/industry/education/tutorial-school-deployment/common-config-settings-catalog-windows-privacy.md @@ -7,6 +7,10 @@ author: yegor-a ms.author: egorabr ms.manager: dougeby no-loc: [Microsoft, Windows, Autopatch, Autopilot] +ms.collection: +- graph-interactive +ms.service: microsoft-intune +ms.subservice: education --- # Windows privacy @@ -24,9 +28,26 @@ To learn more, see [Use the settings catalog to configure settings on Windows, i > [!TIP] > When creating a settings catalog profile in the Microsoft Intune admin center, you can copy a policy name from this article and paste it into the settings picker search field to find the desired policy. -## Settings catalog policies +## [**Settings**](#tab/settings) -| **Name** | **Value** | **Notes** | **CSP** | -|---|---|---|---| -| **:::no-loc text="Allow Location":::** | Force Location On. All Location Privacy settings are toggled on and grayed out. Users can't change the settings and all consent permissions will be automatically suppressed. | Required to invoke **Locate device** action on Windows devices in Intune. | [:::no-loc text="System/AllowLocation":::](/windows/client-management/mdm/policy-csp-system#allowlocation) | -| **:::no-loc text="Let Apps Access Location":::** | Force allow. | Windows apps are allowed to access location. You can specify either a default setting for all apps or a per-app setting by specifying a Package Family Name. You can get the Package Family Name for an app by using the Get-AppPackage Windows PowerShell cmdlet. A per-app setting overrides the default setting. | [:::no-loc text="Privacy/LetAppsAccessLocation":::](/windows/client-management/mdm/policy-csp-privacy#letappsaccesslocation) | +| **Category** | **Name** | **Value** | **Notes** | **CSP** | +|---|---|---|---|---| +| Privacy | **:::no-loc text="Let Apps Access Location":::** | Force allow. | Windows apps are allowed to access location. You can specify either a default setting for all apps or a per-app setting by specifying a Package Family Name. You can get the Package Family Name for an app by using the Get-AppPackage Windows PowerShell cmdlet. A per-app setting overrides the default setting. | [:::no-loc text="Privacy/LetAppsAccessLocation":::](/windows/client-management/mdm/policy-csp-privacy#letappsaccesslocation) | +| System | **:::no-loc text="Allow Location":::** | Force Location On. All Location Privacy settings are toggled on and grayed out. Users can't change the settings and all consent permissions will be automatically suppressed. | Required to invoke **Locate device** action on Windows devices in Intune. | [:::no-loc text="System/AllowLocation":::](/windows/client-management/mdm/policy-csp-system#allowlocation) | + +## [:::image type="icon" source="../../../media/icons/graph.svg"::: **Create policy using Graph Explorer**](#tab/graph) + +[!INCLUDE [graph-explorer-introduction](../../../includes/graph-explorer-intro.md)] + +This will create a policy in your tenant with the name **:::no-loc text="_MSLearn_Example_CommonEDU - Windows - Privacy":::**. + +```msgraph-interactive +POST https://graph.microsoft.com/beta/deviceManagement/configurationPolicies +Content-Type: application/json + +{"name":"_MSLearn_Example_CommonEDU - Windows - Privacy","description":"https://aka.ms/ManageEduDevices","platforms":"windows10","technologies":"mdm","roleScopeTagIds":["0"],"settings":[{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_privacy_letappsaccesslocation","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_privacy_letappsaccesslocation_1","children":[]}}},{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_system_allowlocation","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_system_allowlocation_2","children":[]}}}]} +``` + +[!INCLUDE [graph-explorer-steps](../../../includes/graph-explorer-steps.md)] + +--- diff --git a/memdocs/intune/industry/education/tutorial-school-deployment/common-config-windows-update.md b/memdocs/intune/industry/education/tutorial-school-deployment/common-config-windows-update.md index bef0859618e..b391d98b41d 100644 --- a/memdocs/intune/industry/education/tutorial-school-deployment/common-config-windows-update.md +++ b/memdocs/intune/industry/education/tutorial-school-deployment/common-config-windows-update.md @@ -7,6 +7,10 @@ author: yegor-a ms.author: egorabr ms.manager: dougeby no-loc: [Microsoft, Windows, Autopatch, Autopilot] +ms.collection: +- graph-interactive +ms.service: microsoft-intune +ms.subservice: education --- # Windows Update @@ -26,6 +30,8 @@ To learn more, see: - [YouTube: Windows Update for Business Fundamentals](https://www.youtube.com/watch?v=TXwp-jLDcg0&list=PLMuDtq95SdKvpS9zPyFt9fc9HgepQxaw9&index=1) - [YouTube: Windows Update for Business Fundamentals (Japanese)](https://youtu.be/o6_eGOyv-_g) +### [**Settings**](#tab/settings) + | **Update settings** | **Value** | **Notes** | **CSP** | | --- | --- | --- | --- | | **Microsoft product updates** | Allow | Don't set to Block. In order to revert the configuration, PowerShell commands have to be run on each device. | [:::no-loc text="AllowMUUpdateService":::](/windows/client-management/mdm/policy-csp-update#allowmuupdateservice) | @@ -39,7 +45,7 @@ To learn more, see: | **User experience settings** | **Value** | **Notes** | **CSP** | | --- | --- | --- | --- | | **Automatic update behavior** | Reset to default | Auto install and restart. Updates are downloaded automatically on non-metered networks and installed during "Automatic Maintenance" when the device isn't in use and isn't running on battery power.

    **Note:** If Windows Update policy is configured via the settings catalog, the value should be **Auto install and restart**. | [:::no-loc text="AllowAutoUpdate":::](/windows/client-management/mdm/policy-csp-update#allowautoupdate) | -| **Restart checks (EDU Restart)** | Allow | Must not be disabled in existing Windows Update Rings. This setting is no longer available when creating a new Windows Update Ring policy. | [:::no-loc text="SetEDURestart":::](/windows/client-management/mdm/policy-csp-update#setedurestart) | +| **Restart checks (EDU Restart)** | Allow | Must not be disabled in existing Windows Update Rings.

    This setting is no longer available when creating a new Windows Update Ring policy. | [:::no-loc text="SetEDURestart":::](/windows/client-management/mdm/policy-csp-update#setedurestart) | | **Option to pause Windows updates** | Disable | | [:::no-loc text="SetDisablePauseUXAccess":::](/windows/client-management/mdm/policy-csp-update#setdisablepauseuxaccess) | | **Option to check for Windows updates** | Disable | | [:::no-loc text="SetDisableUXWUAccess":::](/windows/client-management/mdm/policy-csp-update#setdisableuxwuaccess) | | **Change notification update level** | Turn off all notifications, excluding restart warnings | | [:::no-loc text="UpdateNotificationLevel":::](/windows/client-management/mdm/policy-csp-update#updatenotificationlevel) | @@ -49,6 +55,23 @@ To learn more, see: | **Grace period** | 2 | | [:::no-loc text="ConfigureDeadlineGracePeriod":::](/windows/client-management/mdm/policy-csp-update#configuredeadlinegraceperiod)

    [:::no-loc text="ConfigureDeadlineGracePeriodForFeatureUpdates":::](/windows/client-management/mdm/policy-csp-update#configuredeadlinegraceperiodforfeatureupdates) | | **Auto reboot before deadline** | Yes | | [:::no-loc text="ConfigureDeadlineNoAutoReboot":::](/windows/client-management/mdm/policy-csp-update#configuredeadlinenoautoreboot) | +### [:::image type="icon" source="../../../media/icons/graph.svg"::: **Create policy using Graph Explorer**](#tab/graph) + +[!INCLUDE [graph-explorer-introduction](../../../includes/graph-explorer-intro.md)] + +This will create a policy in your tenant with the name **:::no-loc text="_MSLearn_Example_CommonEDU - Windows - Update ring":::**. + +```msgraph-interactive +POST https://graph.microsoft.com/beta/deviceManagement/deviceConfigurations +Content-Type: application/json + +{"@odata.type":"#microsoft.graph.windowsUpdateForBusinessConfiguration","id":"","displayName":"_MSLearn_Example_CommonEDU - Windows - Update ring","description":"https://aka.ms/ManageEduDevices","roleScopeTagIds":["0"],"microsoftUpdateServiceAllowed":true,"driversExcluded":false,"qualityUpdatesDeferralPeriodInDays":7,"featureUpdatesDeferralPeriodInDays":30,"allowWindows11Upgrade":false,"qualityUpdatesPaused":false,"featureUpdatesPaused":false,"businessReadyUpdatesOnly":"userDefined","skipChecksBeforeRestart":false,"automaticUpdateMode":"windowsDefault","installationSchedule":null,"userPauseAccess":"disabled","userWindowsUpdateScanAccess":"disabled","updateNotificationLevel":"restartWarningsOnly","updateWeeks":null,"featureUpdatesRollbackWindowInDays":14,"deadlineForFeatureUpdatesInDays":7,"deadlineForQualityUpdatesInDays":3,"deadlineGracePeriodInDays":2,"postponeRebootUntilAfterDeadline":false,"engagedRestartDeadlineInDays":null,"engagedRestartSnoozeScheduleInDays":null,"engagedRestartTransitionScheduleInDays":null,"engagedRestartSnoozeScheduleForFeatureUpdatesInDays":null,"engagedRestartTransitionScheduleForFeatureUpdatesInDays":null,"autoRestartNotificationDismissal":"notConfigured","scheduleRestartWarningInHours":null,"scheduleImminentRestartWarningInMinutes":null} +``` + +[!INCLUDE [graph-explorer-steps](../../../includes/graph-explorer-steps.md)] + +--- + ## Settings catalog Settings described in this section aren't available in an Update ring policy and should be configured using a settings catalog type configuration profile. @@ -58,9 +81,28 @@ To learn more, see [Use the settings catalog to configure settings on Windows, i > [!TIP] > When creating a settings catalog profile in the Microsoft Intune admin center, you can copy a policy name from this article and paste it into the settings picker search field to find the desired policy. -| **Name** | **Value** | **Notes** | **CSP** | -| --- | --- | --- | --- | -| **:::no-loc text="No update notifications during active hours":::** | Enabled | | [:::no-loc text="NoUpdateNotificationsDuringActiveHours":::](/windows/client-management/mdm/policy-csp-update#noupdatenotificationsduringactivehours) | +### [**Settings**](#tab/settings) + +| **Category** | **Name** | **Value** | **Notes** | **CSP** | +|---|---|---|---|---| +| Windows Update For Business | **:::no-loc text="No update notifications during active hours":::** | Enabled | | [:::no-loc text="NoUpdateNotificationsDuringActiveHours":::](/windows/client-management/mdm/policy-csp-update#noupdatenotificationsduringactivehours) | + +### [:::image type="icon" source="../../../media/icons/graph.svg"::: **Create policy using Graph Explorer**](#tab/graph) + +[!INCLUDE [graph-explorer-introduction](../../../includes/graph-explorer-intro.md)] + +This will create a policy in your tenant with the name **:::no-loc text="_MSLearn_Example_CommonEDU - Windows - Updates":::**. + +```msgraph-interactive +POST https://graph.microsoft.com/beta/deviceManagement/configurationPolicies +Content-Type: application/json + +{"name":"_MSLearn_Example_CommonEDU - Windows - Updates","description":"https://aka.ms/ManageEduDevices","platforms":"windows10","technologies":"mdm","roleScopeTagIds":["0"],"settings":[{"@odata.type":"#microsoft.graph.deviceManagementConfigurationSetting","settingInstance":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingInstance","settingDefinitionId":"device_vendor_msft_policy_config_update_noupdatenotificationsduringactivehours","choiceSettingValue":{"@odata.type":"#microsoft.graph.deviceManagementConfigurationChoiceSettingValue","value":"device_vendor_msft_policy_config_update_noupdatenotificationsduringactivehours_1","children":[]}}}]} +``` + +[!INCLUDE [graph-explorer-steps](../../../includes/graph-explorer-steps.md)] + +--- ## Windows Update Feature Control diff --git a/memdocs/intune/industry/education/tutorial-school-deployment/configure-device-apps.md b/memdocs/intune/industry/education/tutorial-school-deployment/configure-device-apps.md index 8f89c62def9..74044930c46 100644 --- a/memdocs/intune/industry/education/tutorial-school-deployment/configure-device-apps.md +++ b/memdocs/intune/industry/education/tutorial-school-deployment/configure-device-apps.md @@ -7,6 +7,8 @@ author: scottbreenmsft ms.author: scbree ms.manager: dougeby ms.date: 5/2/2024 +ms.service: microsoft-intune +ms.subservice: education --- # Configure applications with Microsoft Intune diff --git a/memdocs/intune/industry/education/tutorial-school-deployment/configure-device-settings.md b/memdocs/intune/industry/education/tutorial-school-deployment/configure-device-settings.md index 09118441227..2e7c0daa8dd 100644 --- a/memdocs/intune/industry/education/tutorial-school-deployment/configure-device-settings.md +++ b/memdocs/intune/industry/education/tutorial-school-deployment/configure-device-settings.md @@ -7,6 +7,8 @@ author: scottbreenmsft ms.author: scbree ms.manager: dougeby ms.date: 5/2/2024 +ms.service: microsoft-intune +ms.subservice: education --- # Configure and secure devices with Microsoft Intune @@ -251,6 +253,7 @@ It is critical to ensure that the devices you manage are secured using the diffe - [Account protection][MEM-7] - [Security Baselines](/mem/intune/protect/security-baselines) - [Local Administrator Password Solution](/windows-server/identity/laps/laps-overview) +- [Web Content Filtering on Edge](/deployedge/microsoft-edge-web-content-filtering) ### [Intune For Education](#tab/intune-for-education) @@ -280,6 +283,7 @@ For more information, see [Security][INT-4]. > - [Account protection][MEM-7] > - [Security Baselines](/mem/intune/protect/security-baselines) > - [Local Administrator Password Solution](/windows-server/identity/laps/laps-overview) +> - [Web Content Filtering on Edge](/deployedge/microsoft-edge-web-content-filtering) ::: zone-end diff --git a/memdocs/intune/industry/education/tutorial-school-deployment/configure-devices-overview.md b/memdocs/intune/industry/education/tutorial-school-deployment/configure-devices-overview.md index 1f145e0e916..b7ab4ada447 100644 --- a/memdocs/intune/industry/education/tutorial-school-deployment/configure-devices-overview.md +++ b/memdocs/intune/industry/education/tutorial-school-deployment/configure-devices-overview.md @@ -3,10 +3,11 @@ title: Configure devices with Microsoft Intune description: Learn how to configure policies and applications in preparation for device deployment. ms.date: 5/2/2024 ms.topic: tutorial -ms.collection: essentials-manage author: scottbreenmsft ms.author: scbree ms.manager: dougeby +ms.service: microsoft-intune +ms.subservice: education --- # Configure settings and applications with Microsoft Intune diff --git a/memdocs/intune/industry/education/tutorial-school-deployment/enroll-autopilot.md b/memdocs/intune/industry/education/tutorial-school-deployment/enroll-autopilot.md index 6fa6279abfa..1a9c3888623 100644 --- a/memdocs/intune/industry/education/tutorial-school-deployment/enroll-autopilot.md +++ b/memdocs/intune/industry/education/tutorial-school-deployment/enroll-autopilot.md @@ -6,6 +6,8 @@ ms.topic: tutorial author: scottbreenmsft ms.author: scbree ms.manager: dougeby +ms.service: microsoft-intune +ms.subservice: education --- # Windows Autopilot diff --git a/memdocs/intune/industry/education/tutorial-school-deployment/enroll-entra-join.md b/memdocs/intune/industry/education/tutorial-school-deployment/enroll-entra-join.md index fcc7f544de0..915974c8c8d 100644 --- a/memdocs/intune/industry/education/tutorial-school-deployment/enroll-entra-join.md +++ b/memdocs/intune/industry/education/tutorial-school-deployment/enroll-entra-join.md @@ -6,6 +6,8 @@ ms.topic: tutorial author: scottbreenmsft ms.author: scbree ms.manager: dougeby +ms.service: microsoft-intune +ms.subservice: education --- # Automatic Intune enrollment via Microsoft Entra join diff --git a/memdocs/intune/industry/education/tutorial-school-deployment/enroll-ios-ade.md b/memdocs/intune/industry/education/tutorial-school-deployment/enroll-ios-ade.md index e2522d0a31e..150a24cdcd3 100644 --- a/memdocs/intune/industry/education/tutorial-school-deployment/enroll-ios-ade.md +++ b/memdocs/intune/industry/education/tutorial-school-deployment/enroll-ios-ade.md @@ -6,6 +6,8 @@ ms.topic: tutorial author: scottbreenmsft ms.author: scbree ms.manager: dougeby +ms.service: microsoft-intune +ms.subservice: education --- # Enroll devices with Automated Device Enrollment diff --git a/memdocs/intune/industry/education/tutorial-school-deployment/enroll-ios-apple-configurator.md b/memdocs/intune/industry/education/tutorial-school-deployment/enroll-ios-apple-configurator.md index 705d9a787a2..226b0bb3e8e 100644 --- a/memdocs/intune/industry/education/tutorial-school-deployment/enroll-ios-apple-configurator.md +++ b/memdocs/intune/industry/education/tutorial-school-deployment/enroll-ios-apple-configurator.md @@ -6,6 +6,8 @@ ms.topic: tutorial author: scottbreenmsft ms.author: scbree ms.manager: dougeby +ms.service: microsoft-intune +ms.subservice: education --- # Bulk enrollment with Apple Configurator diff --git a/memdocs/intune/industry/education/tutorial-school-deployment/enroll-ios-company-portal.md b/memdocs/intune/industry/education/tutorial-school-deployment/enroll-ios-company-portal.md index a434db89fb1..7725f0099a6 100644 --- a/memdocs/intune/industry/education/tutorial-school-deployment/enroll-ios-company-portal.md +++ b/memdocs/intune/industry/education/tutorial-school-deployment/enroll-ios-company-portal.md @@ -6,6 +6,8 @@ ms.topic: tutorial author: scottbreenmsft ms.author: scbree ms.manager: dougeby +ms.service: microsoft-intune +ms.subservice: education --- # Enroll devices with Company Portal diff --git a/memdocs/intune/industry/education/tutorial-school-deployment/enroll-overview.md b/memdocs/intune/industry/education/tutorial-school-deployment/enroll-overview.md index 7ca721b1c42..b0c1af757f0 100644 --- a/memdocs/intune/industry/education/tutorial-school-deployment/enroll-overview.md +++ b/memdocs/intune/industry/education/tutorial-school-deployment/enroll-overview.md @@ -7,6 +7,8 @@ zone_pivot_groups: platforms-windows-ios author: scottbreenmsft ms.author: scbree ms.manager: dougeby +ms.service: microsoft-intune +ms.subservice: education --- # Device enrollment overview diff --git a/memdocs/intune/industry/education/tutorial-school-deployment/enroll-package.md b/memdocs/intune/industry/education/tutorial-school-deployment/enroll-package.md index 60af4e6818d..6ea6ed66627 100644 --- a/memdocs/intune/industry/education/tutorial-school-deployment/enroll-package.md +++ b/memdocs/intune/industry/education/tutorial-school-deployment/enroll-package.md @@ -6,6 +6,8 @@ ms.topic: tutorial author: scottbreenmsft ms.author: scbree ms.manager: dougeby +ms.service: microsoft-intune +ms.subservice: education --- # Enrollment with provisioning packages diff --git a/memdocs/intune/industry/education/tutorial-school-deployment/introduction.md b/memdocs/intune/industry/education/tutorial-school-deployment/introduction.md index 992b6e2bb31..49eaa896061 100644 --- a/memdocs/intune/industry/education/tutorial-school-deployment/introduction.md +++ b/memdocs/intune/industry/education/tutorial-school-deployment/introduction.md @@ -3,10 +3,11 @@ title: Introduction to the tutorial for deploying and managing devices in a scho description: Introduction to deployment and management of devices in education environments. ms.date: 5/2/2024 ms.topic: tutorial -ms.collection: essentials-get-started ms.author: scbree author: scottbreenmsft ms.manager: dougeby +ms.service: microsoft-intune +ms.subservice: education --- # Tutorial: deploy and manage devices in a school diff --git a/memdocs/intune/industry/education/tutorial-school-deployment/manage-avoid-policy-conflicts.md b/memdocs/intune/industry/education/tutorial-school-deployment/manage-avoid-policy-conflicts.md index 8743b37a775..808df6198ff 100644 --- a/memdocs/intune/industry/education/tutorial-school-deployment/manage-avoid-policy-conflicts.md +++ b/memdocs/intune/industry/education/tutorial-school-deployment/manage-avoid-policy-conflicts.md @@ -5,6 +5,8 @@ ms.date: 7/11/2024 ms.topic: tutorial ms.author: scbree author: scottbreenmsft +ms.service: microsoft-intune +ms.subservice: education --- # Avoiding policy conflicts diff --git a/memdocs/intune/industry/education/tutorial-school-deployment/manage-overview.md b/memdocs/intune/industry/education/tutorial-school-deployment/manage-overview.md index fe71e6eed80..e5add0dfe7d 100644 --- a/memdocs/intune/industry/education/tutorial-school-deployment/manage-overview.md +++ b/memdocs/intune/industry/education/tutorial-school-deployment/manage-overview.md @@ -6,6 +6,8 @@ ms.topic: tutorial author: scottbreenmsft ms.author: scbree ms.manager: dougeby +ms.service: microsoft-intune +ms.subservice: education --- # Manage devices with Microsoft Intune diff --git a/memdocs/intune/industry/education/tutorial-school-deployment/manage-surface-devices.md b/memdocs/intune/industry/education/tutorial-school-deployment/manage-surface-devices.md index 38ef96e2fad..e946f6b8d4c 100644 --- a/memdocs/intune/industry/education/tutorial-school-deployment/manage-surface-devices.md +++ b/memdocs/intune/industry/education/tutorial-school-deployment/manage-surface-devices.md @@ -8,6 +8,8 @@ ms.author: scbree ms.manager: dougeby appliesto: - ✅ Surface devices +ms.service: microsoft-intune +ms.subservice: education --- # Management functionalities for Surface devices diff --git a/memdocs/intune/industry/education/tutorial-school-deployment/plan-grouping.md b/memdocs/intune/industry/education/tutorial-school-deployment/plan-grouping.md index dad842eadc2..a2ebb511b4b 100644 --- a/memdocs/intune/industry/education/tutorial-school-deployment/plan-grouping.md +++ b/memdocs/intune/industry/education/tutorial-school-deployment/plan-grouping.md @@ -6,6 +6,8 @@ ms.topic: tutorial ms.author: scbree author: scottbreenmsft zone_pivot_groups: platforms-windows-ios +ms.service: microsoft-intune +ms.subservice: education --- # Plan Education device grouping and targeting diff --git a/memdocs/intune/industry/education/tutorial-school-deployment/reset-wipe.md b/memdocs/intune/industry/education/tutorial-school-deployment/reset-wipe.md index 8552e111064..df70c09c916 100644 --- a/memdocs/intune/industry/education/tutorial-school-deployment/reset-wipe.md +++ b/memdocs/intune/industry/education/tutorial-school-deployment/reset-wipe.md @@ -7,6 +7,8 @@ zone_pivot_groups: platforms-windows-ios author: scottbreenmsft ms.author: scbree ms.manager: dougeby +ms.service: microsoft-intune +ms.subservice: education --- # Reset and wipe devices diff --git a/memdocs/intune/industry/education/tutorial-school-deployment/set-up-microsoft-entra-id.md b/memdocs/intune/industry/education/tutorial-school-deployment/set-up-microsoft-entra-id.md index 5348436a922..5ed9a19003d 100644 --- a/memdocs/intune/industry/education/tutorial-school-deployment/set-up-microsoft-entra-id.md +++ b/memdocs/intune/industry/education/tutorial-school-deployment/set-up-microsoft-entra-id.md @@ -6,6 +6,8 @@ ms.topic: tutorial author: scottbreenmsft ms.author: scbree ms.manager: dougeby +ms.service: microsoft-intune +ms.subservice: education --- # Set up Microsoft Entra ID diff --git a/memdocs/intune/industry/education/tutorial-school-deployment/set-up-microsoft-intune.md b/memdocs/intune/industry/education/tutorial-school-deployment/set-up-microsoft-intune.md index 9da23f7f719..b21781c980c 100644 --- a/memdocs/intune/industry/education/tutorial-school-deployment/set-up-microsoft-intune.md +++ b/memdocs/intune/industry/education/tutorial-school-deployment/set-up-microsoft-intune.md @@ -7,6 +7,8 @@ ms.author: scbree author: scottbreenmsft zone_pivot_groups: platforms-windows-ios ms.manager: dougeby +ms.service: microsoft-intune +ms.subservice: education --- # Set up Microsoft Intune diff --git a/memdocs/intune/industry/education/tutorial-school-deployment/troubleshoot-overview.md b/memdocs/intune/industry/education/tutorial-school-deployment/troubleshoot-overview.md index 200f7f05590..99e678ea272 100644 --- a/memdocs/intune/industry/education/tutorial-school-deployment/troubleshoot-overview.md +++ b/memdocs/intune/industry/education/tutorial-school-deployment/troubleshoot-overview.md @@ -7,6 +7,8 @@ ms.topic: tutorial ms.author: scbree author: scottbreenmsft ms.manager: dougeby +ms.service: microsoft-intune +ms.subservice: education --- # Troubleshoot devices diff --git a/memdocs/intune/protect/actions-for-noncompliance.md b/memdocs/intune/protect/actions-for-noncompliance.md index 1ccb1736ded..f6a3266ada7 100644 --- a/memdocs/intune/protect/actions-for-noncompliance.md +++ b/memdocs/intune/protect/actions-for-noncompliance.md @@ -269,7 +269,7 @@ You can add optional actions when you create a compliance policy, or update an e - **Send push notification to end user**: Configure this action to send a push notification about noncompliance to a device through the Company Portal app or Intune App on the device. -5. Configure a **Schedule**: Enter the number of days (0 to 365) after noncompliance to trigger the action on users' devices. After this grace period, you can enforce a [conditional access](conditional-access-intune-common-ways-use.md) policy. If you enter **0** (zero) number of days, then conditional access takes effect **immediately**. For example, if a device is noncompliant, use conditional access to block access to email, SharePoint, and other organization resources immediately. +5. Configure a **Schedule**: Enter the number of days (0 to 365) after noncompliance to trigger the action on users' devices. After this grace period, you can enforce a [Conditional Access](conditional-access-intune-common-ways-use.md) policy. If you enter **0** (zero) number of days, then Conditional Access takes effect **immediately**. For example, if a device is noncompliant, use Conditional Access to block access to email, SharePoint, and other organization resources immediately. When you create a compliance policy, the **Mark device noncompliant** action is automatically created, and automatically set to **0** days (immediately). With this action, when the device checks in with Intune and evaluates the policy, if it isn't compliant to that policy Intune immediately marks that device as noncompliant. If the client checks in at a later time after remediating the issues that lead to noncompliance, its status will update to its new compliance status. If you use Conditional Access, those policies also apply as soon as a device is marked as noncompliant. To set a grace period to allow for a condition of noncompliance to be remediated before the device is marked as noncompliant, change the **Schedule** on the **Mark device noncompliant** action. diff --git a/memdocs/intune/protect/advanced-threat-protection-configure.md b/memdocs/intune/protect/advanced-threat-protection-configure.md index 1b5618f4fb0..b2a888bacf0 100644 --- a/memdocs/intune/protect/advanced-threat-protection-configure.md +++ b/memdocs/intune/protect/advanced-threat-protection-configure.md @@ -1,13 +1,13 @@ --- # required metadata -title: Configure Microsoft Defender for Endpoint in Microsoft Intune -description: Configure Microsoft Defender for Endpoint in Intune, including connecting to Defender for Endpoint, onboarding devices, assigning compliance for risk levels, and conditional access policies. +title: Onboard and Configure Devices with Microsoft Defender for Endpoint via Microsoft Intune +description: Integrate Microsoft Defender for Endpoint with Microsoft Intune, including connecting the products, onboarding devices, and assigning policies for compliance and risk level assessment. keywords: configure, manage, capabilities, attack surface reduction, next-generation protection, security controls, endpoint detection and response, auto investigation and remediation, security controls, controls, microsoft defender for endpoint, mde author: brenduns ms.author: brenduns manager: dougeby -ms.date: 04/17/2024 +ms.date: 12/13/2024 ms.topic: how-to ms.service: microsoft-intune ms.subservice: protect @@ -31,80 +31,89 @@ ms.collection: - sub-secure-endpoints --- -# Configure Microsoft Defender for Endpoint in Intune +# Integrate Microsoft Defender for Endpoint with Intune and Onboard Devices -Use the information and procedures in this article to configure integration of Microsoft Defender for Endpoint with Intune. Configuration includes the following general steps: +Use the information and procedures in this article to connect Microsoft Defender for Endpoint with Intune and to then onboard and configure devices for Defender for Endpoint. Information in this article includes the following general steps: -- **Establish a service-to-service connection between Intune and Microsoft Defender for Endpoint**. This connection lets Microsoft Defender for Endpoint collect data about machine risk from supported devices you manage with Intune. See the [prerequisites](../protect/advanced-threat-protection.md#prerequisites) to use Microsoft Defender for Endpoint with Intune. -- **Use Intune policy to onboard devices with Microsoft Defender for Endpoint**. You onboard devices to configure them to communicate with Microsoft Defender for Endpoint and to provide data that helps assess their risk level. -- **Use Intune device compliance policies to set the level of risk you want to allow**. Microsoft Defender for Endpoint reports a devices risk level. Devices that exceed the allowed risk level are identified as noncompliant. -- **Use a conditional access policy** to block users from accessing corporate resources from devices that are noncompliant. +- **Establish a service-to-service connection between Intune and Microsoft Defender for Endpoint**. This connection enables Intune to interact with Microsoft Defender on devices, including installation (onboarding) and configuration of the Defender for Endpoint client, and integration of machine risk scores from supported devices you manage with Intune. See the [prerequisites](../protect/advanced-threat-protection.md#prerequisites) to use Microsoft Defender for Endpoint with Intune. +- **Onboard devices to Defender for Endpoint**. You onboard devices to configure them to communicate with Microsoft Defender for Endpoint and to provide data that helps assess their risk level. Each platform has separate requirements to onboard to Defender. +- **Use Intune device compliance policies to set the level of risk you want to allow**. Microsoft Defender for Endpoint reports on the risk level of devices. Devices that exceed the allowed risk level are identified as noncompliant. +- **Use Conditional Access policy** to block users from accessing corporate resources while using a device that is identified as noncompliant. - **Use** [**app protection policies**](../protect/mtd-app-protection-policy.md) for Android and iOS/iPadOS, to set device risk levels. App protection policies work with both enrolled and unenrolled devices. -In addition to managing settings for Microsoft Defender for Endpoint on devices that enroll with Intune, you can manage Defender for Endpoint security configurations on devices that aren’t enrolled with Intune. This scenario is called *Security Management for Microsoft Defender for Endpoint* and requires configuring the *Allow Microsoft Defender for Endpoint to enforce Endpoint Security Configurations* toggle to *On*. For more information, see [MDE Security Configuration Management](../protect/mde-security-integration.md). +In addition to managing settings for Microsoft Defender for Endpoint on devices that enroll with Intune, you can manage Defender for Endpoint security configurations on devices that aren’t enrolled with Intune. This scenario is called *Security Management for Microsoft Defender for Endpoint* and requires configuring the *Allow Microsoft Defender for Endpoint to enforce Endpoint Security Configurations* toggle to *On*. For more information, see [Microsoft Defender for Endpoint Security Configuration Management](../protect/mde-security-integration.md). [!INCLUDE [android_device_administrator_support](../includes/android-device-administrator-support.md)] ## Connect Microsoft Defender for Endpoint to Intune -The first step you take is to set up the service-to-service connection between Intune and Microsoft Defender for Endpoint. Set up requires administrative access to both the Microsoft Defender Security Center, and to Intune. +Before Intune and Defender for Endpoint can work together, you must set up the service-to-service connection between Intune and Microsoft Defender for Endpoint. This is a one-time action per tenant. Setup requires administrative access to both the Microsoft Defender Security Center and the Microsoft Intune admin center. -You only need to enable Microsoft Defender for Endpoint a single time per tenant. +### Enable Intune and Microsoft Defender for Endpoint integration -### To enable Microsoft Defender for Endpoint +1. Open the Microsoft Defender for Endpoint portal at [security.microsoft.com](https://security.microsoft.com). The Intune admin center also includes a link to the Defender for Endpoint portal. -Open the Microsoft Defender for Endpoint portal at [security.microsoft.com](https://security.microsoft.com). The Intune admin center also includes a link to the Defender for Endpoint portal. + 1. Sign in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431). -1. Sign in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431). + 2. Select **Endpoint security** > **Microsoft Defender for Endpoint** and review the **Connection status** at the top of the page. If it’s **Enabled**, Defender and Intune are already connected and you can skip to step #2. -2. Select **Endpoint security** > **Microsoft Defender for Endpoint**, and then select **Open the Microsoft Defender Security Center**. + If the status is **Unavailable**, continue here. + 3. Scroll down to the bottom of the *Microsoft Defender for Endpoint* page and select the link **Open the Microsoft Defender Security Center** to open the Microsoft Defender for portal and continue with the next numbered step. > [!TIP] > - > In the Intune admin center, if the **Connection status** at the top of the Microsoft Defender for Endpoint page is already set to **Enabled**, the connection to Intune is already active and the admin center displays different UI text for the link. In this event, select **Open the Microsoft Defender for Endpoint admin console** to open the Microsoft Defender for portal. Then you can use the guidance in the following step to confirm that the **Microsoft Intune connection** is set to **On**. + > If the connection is already active, the link to open the Defender portal reads: **Open the Microsoft Defender for Endpoint admin console**. :::image type="content" source="./media/advanced-threat-protection-configure/atp-device-compliance-open-microsoft-defender.png" alt-text="Screen shot that shows the patch to open the Microsoft Defender Security Center."::: -3. In **Microsoft Defender** portal (previously the *Microsoft Defender Security Center*): - 1. Select [**Settings** > **Endpoints** >**Advanced features**](https://security.microsoft.com/preferences2/integration). - 2. For **Microsoft Intune connection**, choose **On**: +2. In [**Microsoft Defender** portal](https://security.microsoft.com/): + + 1. Use the left-hand pane to scroll down and select **Settings** > **Endpoints** >**Advanced features**. + 2. On the advanced features pane, scroll down to locate the entry for **Microsoft Intune connection** and set the toggle to **On**. :::image type="content" source="./media/advanced-threat-protection-configure/atp-security-center-intune-toggle.png" alt-text="Screen shot of the Microsoft Intune connection setting."::: - 3. Select **Save preferences**. + 3. Select **Save preferences** to complete the connection between Intune and Defender for Endpoint. > [!NOTE] > Once the connection is established, the services are expected to sync with each other _at least_ once every 24 hours. The number of days without sync until the connection is considered unresponsive is configurable in the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431). Select **Endpoint security** > **Microsoft Defender for Endpoint** > **Number of days until partner is unresponsive** -4. Return to **Microsoft Defender for Endpoint** page in the Microsoft Intune admin center. +3. Return to **Microsoft Defender for Endpoint** page in the Microsoft Intune admin center where you configure aspects of the Defender for Endpoint integration. The Connection status should now display **Enabled**. + + On this page, review each category and the available configurations for platform support and platforms specific options you plan to use, and set those toggles to **On**. You can return later to enable or disable any of these options. + + To set up the following integrations of Microsoft Defender for Endpoint, your account must be assigned an Intune [role-based access control]( /mem/intune/fundamentals/role-based-access-control) (RBAC) role that includes *Read* and *Modify* for the *Mobile Threat Defense* permission in Intune. The *Endpoint Security Manager* built-in admin role for Intune has these permissions included. + + **Compliance policy evaluation** - To use Defender for Endpoint with **compliance policies**, configure the following under **Compliance policy evaluation** for the platforms you support: + + - Set **Connect Android devices** to Microsoft Defender for Endpoint to **On** + - Set **Connect iOS/iPadOS devices** to Microsoft Defender for Endpoint to **On** + - Set **Connect Windows devices** to Microsoft Defender for Endpoint to **On** - 1. To use Defender for Endpoint with **compliance policies**, configure the following under **Compliance policy evaluation** for the platforms you support: - - Set **Connect Android devices** to Microsoft Defender for Endpoint to **On** - - Set **Connect iOS/iPadOS devices** to Microsoft Defender for Endpoint to **On** - - Set **Connect Windows devices** to Microsoft Defender for Endpoint to **On** + When these configurations are *On*, applicable devices that you manage with Intune, and devices you enroll in the future, are connected to Microsoft Defender for Endpoint for compliance. - When these configurations are *On*, applicable devices that you manage with Intune, and devices you enroll in the future, are connected to Microsoft Defender for Endpoint for compliance. + For iOS devices, Defender for Endpoint also supports the following settings that help provide the Vulnerability Assessment of apps on Microsoft Defender for Endpoint for iOS. For more information about using the following two settings, see [Configure vulnerability assessment of apps](/microsoft-365/security/defender-endpoint/ios-configure-features#configure-vulnerability-assessment-of-apps). - For iOS devices, Defender for Endpoint also supports the following settings that help provide the Vulnerability Assessment of apps on Microsoft Defender for Endpoint for iOS. For more information about using the following two settings, see [Configure vulnerability assessment of apps](/microsoft-365/security/defender-endpoint/ios-configure-features#configure-vulnerability-assessment-of-apps). + - **Enable App Sync for iOS Devices**: Set to **On** to allow Defender for Endpoint to request metadata of iOS applications from Intune to use for threat analysis purposes. The iOS device must be MDM-enrolled and provide updated app data during device check-in. - - **Enable App Sync for iOS Devices**: Set to **On** to allow Defender for Endpoint to request metadata of iOS applications from Intune to use for threat analysis purposes. The iOS device must be MDM-enrolled and provide updated app data during device check-in. + - **Send full application inventory data on personally owned iOS/iPadOS Devices**: This setting controls the application inventory data that Intune shares with Defender for Endpoint when Defender for Endpoint syncs app data and requests the app inventory list. - - **Send full application inventory data on personally owned iOS/iPadOS Devices**: This setting controls the application inventory data that Intune shares with Defender for Endpoint when Defender for Endpoint syncs app data and requests the app inventory list. + When set to **On**, Defender for Endpoint can request a list of applications from Intune for personally owned iOS/iPadOS devices. This list includes unmanaged apps and apps that were deployed through Intune. - When set to **On**, Defender for Endpoint can request a list of applications from Intune for personally owned iOS/iPadOS devices. This list includes unmanaged apps and apps that were deployed through Intune. + When set to **Off**, data about unmanaged apps isn’t provided. Intune does share data for the apps that were deployed through Intune. - When set to **Off**, data about unmanaged apps isn’t provided. Intune does share data for the apps that were deployed through Intune. + For more information, see [Mobile Threat Defense toggle options](../protect/mtd-connector-enable.md#mobile-threat-defense-toggle-options). - For more information, see [Mobile Threat Defense toggle options](../protect/mtd-connector-enable.md#mobile-threat-defense-toggle-options). - 2. To use Defender for Endpoint with **app protection policies** for Android and iOS/iPadOS, configure the following under **App protection policy evaluation** for the platforms you use: - - Set **Connect Android devices to Microsoft Defender** for Endpoint to **On**. - - Set **Connect iOS/iPadOS devices to Microsoft Defender for Endpoint** on to **On**. + **App protection policy evaluation** - Configure the following toggles to use Defender for Endpoint with Intune **app protection policies** for Android and iOS/iPadOS, configure the following under **App protection policy evaluation** for the platforms you use: - To set up an integration Microsoft Defender for Endpoint for compliance and app protection policy evaluation, you must have a role that includes *Read* and *Modify* for the *Mobile Threat Defense* permission in Intune. The *Endpoint Security Manager* built-in admin role for Intune has these permissions included. For more information about both MDM Compliance Policy Settings and App Protection Policy Settings, see [Mobile Threat Defense toggle options](../protect/mtd-connector-enable.md#mobile-threat-defense-toggle-options). + - Set **Connect Android devices to Microsoft Defender** for Endpoint to **On**. + - Set **Connect iOS/iPadOS devices to Microsoft Defender for Endpoint** on to **On**. -5. Select **Save**. + For more information, see [Mobile Threat Defense toggle options](../protect/mtd-connector-enable.md#mobile-threat-defense-toggle-options). + +4. Select **Save**. > [!TIP] > @@ -112,39 +121,55 @@ Open the Microsoft Defender for Endpoint portal at [security.microsoft.com](http ## Onboard devices -When you enable support for Microsoft Defender for Endpoint in Intune, you established a service-to-service connection between Intune and Microsoft Defender for Endpoint. You can then onboard devices you manage with Intune to Microsoft Defender for Endpoint. Onboarding enables collection of data about device risk levels. +After establishing the service-to-service connection between Intune and Microsoft Defender for Endpoint, use Intune to onboard your managed devices to Microsoft Defender for Endpoint. Onboarding involves enrolling devices into the Defender for Endpoint service to ensure they're protected and monitored for security threats and enables collection of data about device risk levels. When onboarding devices, be sure to use the most recent version of Microsoft Defender for Endpoint for each platform. +The process to onboard devices to Defender for Endpoint varies by platform. + ### Onboard Windows devices -- [**Endpoint detection and response**](../protect/endpoint-security-edr-policy.md) (EDR) policy. The *Microsoft Defender for Endpoint* page in the Intune admin center includes a link that directly opens the EDR policy creation workflow, which is part of endpoint security in Intune. +With a connection between Intune and Defender established, Intune automatically receives an onboarding configuration package from Defender that can be used by Intune to onboard Windows devices. This package is used by Intune EDR policy to configure devices to communicate with [Microsoft Defender for Endpoint services](/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection) and to scan files and detect threats. The onboarded devices also report their risk level to Microsoft Defender for Endpoint based on your compliance policies. - Use EDR policies to configure device security without the overhead of the larger body of settings found in device configuration profiles. You can also use EDR policy with tenant attached devices, which are devices you manage with Configuration Manager. +Onboarding of a device using the configuration package is a one-time action. - When you configure EDR policy after connecting Intune to Defender, the policy setting *Microsoft Defender for Endpoint client configuration package type* has a new configuration option: **Auto from connector**. With this option, Intune automatically gets the onboarding package (blob) from your Defender for Endpoint deployment, replacing the need to manually configure an Onboard package. +To deploy the onboarding package for Windows devices, you can choose to use a preconfigured EDR policy option, which deploys to the *All devices* group to onboard all applicable Windows devices, or you can manually create the EDR Policy for more granular deployments, which requires you to complete a few additional steps. -- **Device configuration policy**. When creating a device configuration policy to onboard Windows devices, select the *Microsoft Defender for Endpoint* template. When you connected Intune to Defender, Intune received an onboarding configuration package from Defender. This package is used by the template to configure devices to communicate with [Microsoft Defender for Endpoint services](/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection) and to scan files and detect threats. The onboarded devices also report their risk level to Microsoft Defender for Endpoint based on your compliance policies. -After onboarding a device using the configuration package, you don't need to do it again. +#### Use the preconfigured policy -- [**Group policy or Microsoft Configuration Manager**](/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints). [Onboard Windows machines using Microsoft Configuration Manager](/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-sccm) has more details on the Microsoft Defender for Endpoint settings. +With this path, you provide a name for the onboarding policy and select both the *platform* and *profile*. Other settings are preselected and include use of the onboarding package without additional settings, use of the *Default* scope tag, and assignment to the *All Devices* group. You can’t change these options during policy creation, but can return later to edit the policy details. -> [!TIP] -> -> When using multiple policies or policy types like *device configuration* policy and *endpoint detection and response* policy to manage the same device settings (such as onboarding to Defender for Endpoint), you can create policy conflicts for devices. To learn more about conflicts, see [Manage conflicts](../protect/endpoint-security-policy.md#manage-conflicts) in the *Manage security policies* article. +1. Open the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) and go to **Endpoint security** > **Endpoint detection and response** > and select the **EDR Onboarding Status** tab. + +2. On this tab, select **Deploy preconfigured policy**. -### Create the device configuration profile to onboard Windows devices + :::image type="content" source="./media/advanced-threat-protection-configure/select-preconfigured-policy.jpg" alt-text="Screen shot that displays the path to the preconfigured policy option."::: + +3. For Platform, select **Windows** for devices managed directly by Intune, or **Windows (ConfigMgr)** for devices managed through the Tenant Attach scenario. For Profile select **Endpoint detection and response**. + +4. Specify a Name for the policy. + +5. On the **Review and Create** page you can review this policies configuration. When ready select **Save** to save this policy, which immediately begins to deploy to the *All Devices* group. + +#### Create your own EDR policy: + +With this path, you can define all aspects of the initial onboarding policy before it begins to deploy to devices. 1. Sign in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431). -2. Select **Endpoint security** > **Endpoint detection and response** > **Create Policy**. -3. For **Platform**, select **Windows 10, Windows 11, and Windows Server**. -4. For **Profile type**, select **Endpoint detection and response**, and then select **Create**. -5. On the **Basics** page, enter a *Name* and *Description* (optional) for the profile, then choose **Next**. -6. On the **Configuration settings** page, configure the following options for **Endpoint Detection and Response**: - - **Microsoft Defender for Endpoint client configuration package type**: Select *Auto from connector* to use the onboarding package (blob) from your Defender for Endpoint deployment. If you are onboarding to a different or disconnected Defender for Endpoint deployment, select *Onboard* and paste the text from the WindowsDefenderATP.onboarding blob file into the *Onboarding (Device)* field. +2. Select **Endpoint security** > **Endpoint detection and response** > and in the *Summary* tab, select **Create Policy**. + +3. For *Platform* select **Windows**, for Profile select **Endpoint detection and response**, and then select **Create**. + +4. On the **Basics** page, enter a *Name and Description* (optional) for the profile, then choose Next. + +5. On the **Configuration settings** page, configure the following options depending on your needs: + + - **Microsoft Defender for Endpoint client configuration package type**: Select **Auto from connector**. With this option, the onboarding policy automatically uses the onboarding blob that Intune received from Microsoft Defender. If you're onboarding to a different or disconnected Defender for Endpoint deployment, select Onboard and paste the text from the WindowsDefenderATP.onboarding blob file into the *Onboarding (Device)* field. + - **Sample Sharing**: Returns or sets the Microsoft Defender for Endpoint Sample Sharing configuration parameter. - - **[Deprecated] Telemetry Reporting Frequency**: For devices that are at high risk, **Enable** this setting so it reports telemetry to the Microsoft Defender for Endpoint service more frequently. + + - **[Deprecated] Telemetry Reporting Frequency**: This setting is deprecated and no longer applies to new devices. The setting remains visible in the policy UI for visibility for older policies that had this configured. :::image type="content" source="./media/advanced-threat-protection-configure/automatic-package-configuration.png" alt-text="Screen shot of the configuration options for Endpoint Detection and Response."::: @@ -154,65 +179,83 @@ After onboarding a device using the configuration package, you don't need to do > > If you haven’t configured this connection successfully, the setting *Microsoft Defender for Endpoint client configuration package type* only includes options to specify onboard and offboard blobs. -7. Select **Next** to open the **Scope tags** page. Scope tags are optional. Select **Next** to continue. +6. Select **Next** to open the **Scope tags** page. Scope tags are optional. Select **Next** to continue. -8. On the **Assignments** page, select the groups that will receive this profile. For more information on assigning profiles, see [Assign user and device profiles](../configuration/device-profile-assign.md). +7. On the **Assignments** page, select the groups that will receive this profile. For more information on assigning profiles, see [Assign user and device profiles](../configuration/device-profile-assign.md). When you deploy to user groups, a user must sign in on a device before the policy applies and the device can onboard to Defender for Endpoint. - Select **Next**. + Select **Next** to continue. -9. On the **Review + create** page, when you're done, choose **Create**. The new profile is displayed in the list when you select the policy type for the profile you created. - **OK**, and then **Create** to save your changes, which creates the profile. +8. On the **Review + create** page, when you're done, choose **Create**. The new profile is displayed in the list when you select the policy type for the profile you created. + + > [!TIP] + > When using multiple policies or policy types like *device configuration* policy and *endpoint detection and response* policy to manage the same device settings, you can create policy conflicts for devices. To learn more about conflicts, see [Manage conflicts](../protect/endpoint-security-policy.md#manage-conflicts) in the *Manage security policies* article. ### Onboard macOS devices After you establish the service-to-service connection between Intune and Microsoft Defender for Endpoint, you can onboard macOS devices to Microsoft Defender for Endpoint. Onboarding configures devices to communicate with Microsoft Defender Endpoint, which then collects data about devices risk level. -For configuration guidance for Intune, see [Microsoft Defender for Endpoint for macOS](../apps/apps-advanced-threat-protection-macos.md). +Intune doesn't support an automatic onboarding package for macOS as it does for Windows devices. For configuration guidance for Intune, see [Microsoft Defender for Endpoint for macOS](../apps/apps-advanced-threat-protection-macos.md). For more information about Microsoft Defender for Endpoint for Mac including what's new in the latest release, see [Microsoft Defender for Endpoint for Mac](/microsoft-365/security/defender-endpoint/microsoft-defender-endpoint-mac?view=o365-worldwide&preserve-view=true) in the Microsoft 365 security documentation. ### Onboard Android devices -After you establish the service-to-service connection between Intune and Microsoft Defender for Endpoint, you can onboard Android devices to Microsoft Defender for Endpoint. Onboarding configures devices to communicate with Defender for Endpoint, which then collects data about the devices risk level. +After you establish the service-to-service connection between Intune and Microsoft Defender for Endpoint, you can onboard Android devices to Microsoft Defender for Endpoint. -There isn't a configuration package for devices that run Android. Instead, see [Overview of Microsoft Defender for Endpoint for Android](/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-android) in the Microsoft Defender for Endpoint documentation for the prerequisites and onboarding instructions for Android. +Intune doesn't support an automatic onboarding package for Android as it does for Windows devices. For configuration guidance for Intune, see [Overview of Microsoft Defender for Endpoint for Android](/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-android) in the Microsoft Defender for Endpoint documentation for the prerequisites and onboarding instructions for Android. For devices that run Android, you can also use Intune policy to modify Microsoft Defender for Endpoint on Android. For more information, see [Microsoft Defender for Endpoint web protection](../protect/advanced-threat-protection-manage-android.md). ### Onboard iOS/iPadOS devices -After you establish the service-to-service connection between Intune and Microsoft Defender for Endpoint, you can onboard iOS/iPadOS devices to Microsoft Defender for Endpoint. Onboarding configures devices to communicate with Defender for Endpoint, which then collects data about the devices risk level. +After you establish the service-to-service connection between Intune and Microsoft Defender for Endpoint, you can onboard iOS/iPadOS devices to Microsoft Defender for Endpoint. -There isn't a configuration package for devices that run iOS/iPadOS. Instead, see [Overview of Microsoft Defender for Endpoint for iOS](/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-ios) in the Microsoft Defender for Endpoint documentation for prerequisites and onboarding instructions for iOS/iPadOS. +Intune doesn't support an automatic onboarding package for iOS/iPadOS as it does for Windows devices. For configuration guidance for Intune, see [Overview of Microsoft Defender for Endpoint for iOS](/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-ios) in the Microsoft Defender for Endpoint documentation for prerequisites and onboarding instructions for iOS/iPadOS. -For devices that run iOS/iPadOS (in Supervised Mode), there's specialized ability given the increased management capabilities provided by the platform on these types of devices. To take advantage of these capabilities, the Defender app needs to know if a device is in Supervised Mode. Intune allows you to configure the Defender for iOS app through an App Configuration policy (for managed devices) that should be targeted to all iOS Devices as a best practice. For more information, see [Complete deployment for supervised devices](/microsoft-365/security/defender-endpoint/ios-install?#complete-deployment-for-supervised-devices). +For devices that run iOS/iPadOS (in Supervised Mode), there's specialized ability given the increased management capabilities provided by the platform on these types of devices. To take advantage of these capabilities, the Defender app needs to know if a device is in *Supervised Mode*. For more information, see [Complete deployment for supervised devices](/microsoft-365/security/defender-endpoint/ios-install?#complete-deployment-for-supervised-devices). 1. Sign in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431). + 2. Select **Apps** > **App configuration policies** > **+ Add**, and then select**Managed devices** from the drop down list. + 3. On the **Basics** page, enter a *Name* and *Description* (optional) for the profile, select **Platform** as **iOS/iPadOS** then choose **Next**. + 4. Select **Targeted app** as **Microsoft Defender for iOS**. + 5. On the **Settings** page, set the **Configuration key** as **issupervised**, then **Value type** as **string** with the **{{issupervised}}** as the **Configuration value**. + 6. Select **Next** to open the **Scope tags** page. Scope tags are optional. Select **Next** to continue. + 7. On the **Assignments** page, select the groups that will receive this profile. For this scenario, it's a best practice to target **All Devices**. For more information on assigning profiles, see [Assign user and device profiles](../configuration/device-profile-assign.md). - When deploying policy to user groups, a user must sign-in on a device before the policy applies. + When you deploy policy to user groups, a user must sign-in on a device before the policy applies. Select **Next**. 8. On the **Review + create** page, when you're done, choose **Create**. The new profile is displayed in the list of configuration profiles. -Further, for devices that run iOS/iPadOS (in Supervised Mode), the Defender for iOS team has made available a custom .mobileconfig profile to deploy to iPad/iOS devices. The .mobileconfig profile is used to analyze network traffic to ensure a safe browsing experience - a feature of Defender for iOS. + ### View the count of devices that are onboarded to Microsoft Defender for Endpoint +You can view a report on device onboarding status from within the Intune admin center by going to **Endpoint security** > **Endpoint detection and response** > and selecting the **EDR Onboarding Status** tab. -To view the onboarded devices from Microsoft Defender for Endpoint within the Microsoft Defender for Endpoint connector page, you need an Intune role that includes *Read* for the *Microsoft Defender Advanced Threat Protection* permission. - -:::image type="content" source="./media/advanced-threat-protection-configure/onboard-report.png" alt-text="Sample view of the onboarded device report."::: +To view this information, your account must be assigned an Intune role that includes *Read* for the *Microsoft Defender Advanced Threat Protection* permission. ## Create and assign compliance policy to set device risk level @@ -235,7 +278,7 @@ If you're not familiar with creating compliance policy, reference the [Create a 1. Sign in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431). -2. Select **Devices** > **Compliance**. On the **Policies** tab, select **+ Create policy**. +2. Select **Devices** > **Compliance**. On the **Policies** tab, select **+ Create policy**. 3. For **Platform**, use the drop-down box to select one of the following options: - **Android device administrator** @@ -263,7 +306,7 @@ If you're not familiar with creating compliance policy, reference the [Create a Use the procedure to [create an application protection policy for either iOS/iPadOS or Android](../apps/app-protection-policies.md#app-protection-policies-for-iosipados-and-android-apps), and use the following information on the *Apps*, *Conditional launch*, and *Assignments* pages: - **Apps**: Select the apps you wish to be targeted by app protection policies. For this feature set, these apps are blocked or selectively wiped based on device risk assessment from your chosen Mobile Threat Defense vendor. -- **Conditional launch**: Below *Device conditions*, use the drop-down box to select **Max allowed device threat level**. +- **Conditional launch**: Below *Device conditions*, use the drop-down box to select **Max allowed device threat level**. Options for the threat level **Value**: @@ -282,31 +325,31 @@ Use the procedure to [create an application protection policy for either iOS/iPa > [!IMPORTANT] > If you create an app protection policy for any protected app, the device's threat level is assessed. Depending on the configuration, devices that don’t meet an acceptable level are either blocked or selectively wiped through conditional launch. If blocked, they are prevented from accessing corporate resources until the threat on the device is resolved and reported to Intune by the chosen MTD vendor. -## Create a conditional access policy +## Create a Conditional Access policy -Conditional access policies can use data from Microsoft Defender for Endpoint to block access to resources for devices that exceed the threat level you set. You can block access from the device to corporate resources, such as SharePoint or Exchange Online. +Conditional Access policies can use data from Microsoft Defender for Endpoint to block access to resources for devices that exceed the threat level you set. You can block access from the device to corporate resources, such as SharePoint or Exchange Online. > [!TIP] > > Conditional Access is a Microsoft Entra technology. The *Conditional Access* node found in the Microsoft Intune admin center is the node from *Microsoft Entra*. 1. Sign in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431). -2. Select **Endpoint security** > **Conditional access** > **Create new policy**. Because Intune presents the policy creation user interface for Conditional Access from the Azure portal, the interface is different than the policy creation workflow you might be familiar with. +2. Select **Endpoint security** > **Conditional Access** > **Create new policy**. Because Intune presents the policy creation user interface for Conditional Access from the Azure portal, the interface is different than the policy creation workflow you might be familiar with. 3. Enter a policy **Name**. 4. For **Users**, use the *Include* and *Exclude* tabs to configure groups that will receive this policy. 5. For **Target resources**, set *Select what this policy applies to* to **Cloud apps**, and then choose which apps to protect. For example, choose **Select apps** and then for *Select*, search for and select **Office 365 SharePoint Online** and **Office 365 Exchange Online**. -6. For **Conditions**, select **Client apps** and then set *Configure* to **Yes**. Next, select the checkboxes for **Browser** and **Mobile apps and desktop clients**. Then, select **Done** to save the client app configuration. -7. For **Grant**, configure this policy to apply based on device compliance rules. For example: +6. For **Conditions**, select **Client apps** and then set *Configure* to **Yes**. Next, select the checkboxes for **Browser** and **Mobile apps and desktop clients**. Then, select **Done** to save the client app configuration. +7. For **Grant**, configure this policy to apply based on device compliance rules. For example: 1. Select **Grant access**. 2. Select the checkbox for **Require device to be marked as compliant**. 3. Select **Require all the selected controls**. Choose **Select** to save the Grant configuration. -8. For **Enable policy**, select **On** and then **Create** to save your changes. +8. For **Enable policy**, select **On** and then **Create** to save your changes. -## Next steps +## Related content - [Configure Microsoft Defender for Endpoint settings on Android](../protect/advanced-threat-protection-manage-android.md) - [Monitor compliance for risk levels](../protect/advanced-threat-protection-monitor.md) diff --git a/memdocs/intune/protect/advanced-threat-protection-manage-android.md b/memdocs/intune/protect/advanced-threat-protection-manage-android.md index 16b89cd4a5a..033f377a360 100644 --- a/memdocs/intune/protect/advanced-threat-protection-manage-android.md +++ b/memdocs/intune/protect/advanced-threat-protection-manage-android.md @@ -44,6 +44,27 @@ With Intune device configuration policy, you can turn off all or part of the web - **Android Enterprise Fully Managed profile**. Use an app configuration profile and the [configuration designer](../apps/app-configuration-policies-use-android.md#use-the-configuration-designer) to disable the entire web protection feature or to disable only the use of VPNs. +**The following browsers are supported with Defender loopback VPN:** +- Chrome- +- Microsoft Edge +- Opera +- Samsung Internet +- Firefox +- Brave +- Tor +- Browser Leopard +- DuckDuckGo +- Dolphin + +**The following browsers are supported with accessibility service without Defender loopback VPN:** +- Chrome +- Edge +- Opera +- Samsung Internet + +> [!IMPORTANT] +> Work profile scenarios (Android Enterprise personally owned devices using a work profile and Android Enterprise corporate owned work profile) do not support the accessibility service. + To configure web protection on devices, use the following procedures to create and deploy the applicable configuration. ## Disable web protection for Android device administrator @@ -114,18 +135,16 @@ To configure web protection on devices, use the following procedures to create a 6. Find and select configuration keys **Anti-Phishing** and **VPN**, and then select **OK** to return to the **Settings** page. -7. For the **Configuration values** of both configuration keys (**Anti-Phishing** and **VPN**), enter **0** to disable web protection. +1. For the **Configuration values** of both configuration keys (**Anti-Phishing** and **VPN**), enter **0** to disable web protection and enter **1** to enable web protection. By default, web protection is enabled. > [!NOTE] - > - > The **Web Protection** configuration key is deprecated. If you've used this key in the past, complete the previous steps to re-configure the setting by setting the keys **Anti-Phishing** and **VPN** to enable or disable web protection. - + > Values for Anti-Phishing and VPN should be same either to be 0 to disable or 1 to enable, otherwise both features will automatically be disabled. + > [!NOTE] - > - > Enter **1** for both configuration values (**Anti-Phishing** and **VPN**) to enable web protection. This setting is the default. - + > The **Web Protection** configuration key is deprecated. If you've used this key in the past, complete the previous steps to re-configure the setting by setting the keys **Anti-Phishing** and **VPN** to enable or disable web protection. + Select **Next** to continue. - + 8. In **Assignments**, specify the groups that receive the profile. For more information on assigning profiles, see [Assign user and device profiles](../configuration/device-profile-assign.md). 9. In **Review + create**, when you're done, select **Create**. The new profile is displayed in the list when you select the policy type for the profile you created. @@ -134,21 +153,21 @@ To configure web protection on devices, use the following procedures to create a 1. Complete the same configuration steps [described previously](#disable-web-protection-for-the-android-enterprise-personally-owned-work-profile), and add web protection configuration keys **Anti-phishing** and **VPN**. The only difference is the **Profile Type** value. For this value, select **Fully Managed, Dedicated, and Corporate-Owned Work Profile Only**. - - To disable web protection, enter **0** for configuration values **Anti-Phishing** and **VPN**. + - To disable web protection, enter **0** for configuration values **Anti-Phishing** and **VPN** and enter **1** for both configuration values (**Anti-Phishing** and **VPN**) to enable web protection. By default, web protection is enabled. + - To disable only the use of VPN by web protection, enter these configuration values: - - **0** for **VPN** - - **1** for **Anti-Phishing** - + - **0** for **VPN** + + - **1** for **Anti-Phishing** + > [!NOTE] - > - > You can't disable VPN for the Android Enterprise Fully Managed profile if you've configured the Auto Setup of Always-on VPN device configuration policy on the enrolled devices. - + > For 'Android Enterprise corporate owned work profile' enrollment scenario values for VPN and Anti-Phishing should be same either both 0 to disable or 1 to enable, otherwise both features will automatically be disabled, but for 'Android Enterprise corporate owned fully managed - no work profile' enrollment scenario need not to have the same value for VPN and Anti-Phishing, each feature can work individually. + > [!NOTE] - > - > Enter **1** for both configuration values (**Anti-Phishing** and **VPN**) to enable web protection. This setting is the default. - + > You can't disable VPN for the Android Enterprise Fully Managed profile if you've configured the Auto Setup of Always-on VPN device configuration policy on the enrolled devices. + Select **Next** to continue. - + 2. In **Assignments**, specify the groups that receive the profile. For more information on assigning profiles, see [Assign user and device profiles](../configuration/device-profile-assign.md). 3. In **Review + create**, when you're done, select **Create**. The new profile is displayed in the list when you select the policy type for the profile you @@ -162,4 +181,6 @@ To configure web protection on devices, use the following procedures to create a - Learn more from the Microsoft Defender for Endpoint documentation: - [Microsoft Defender for Endpoint Conditional Access](/windows/security/threat-protection/microsoft-defender-atp/conditional-access) + - [Microsoft Defender for Endpoint risk dashboard](/windows/security/threat-protection/microsoft-defender-atp/security-operations-dashboard) + diff --git a/memdocs/intune/protect/advanced-threat-protection.md b/memdocs/intune/protect/advanced-threat-protection.md index 8b4d8a00323..9dc035f70e7 100644 --- a/memdocs/intune/protect/advanced-threat-protection.md +++ b/memdocs/intune/protect/advanced-threat-protection.md @@ -45,7 +45,7 @@ To be successful, use the following configurations in concert, which are detaile - **Use a device compliance policy to set the level of risk you want to allow**. Risk levels are reported by Microsoft Defender for Endpoint. Devices that exceed the allowed risk level are identified as noncompliant. See [Create and assign compliance policy to set device risk level](../protect/advanced-threat-protection-configure.md#create-and-assign-compliance-policy-to-set-device-risk-level) and [Create and assign app protection policy to set device risk level](../protect/advanced-threat-protection-configure.md#create-and-assign-app-protection-policy-to-set-device-risk-level). -- **Use a conditional access policy** to block users from accessing corporate resources from devices that are noncompliant. See [Create a conditional access policy](../protect/advanced-threat-protection-configure.md#create-a-conditional-access-policy). +- **Use a Conditional Access policy** to block users from accessing corporate resources from devices that are noncompliant. See [Create a Conditional Access policy](../protect/advanced-threat-protection-configure.md#create-a-conditional-access-policy). When you integrate Intune with Microsoft Defender for Endpoint, you can take advantage of Microsoft Defender for Endpoints Threat & Vulnerability Management (TVM) and [use Intune to remediate endpoint weakness identified by TVM](atp-manage-vulnerabilities.md). @@ -66,7 +66,7 @@ Microsoft Defender for Endpoint can help resolve security events like this scena You can integrate Microsoft Defender for Endpoint with Microsoft Intune as a Mobile Threat Defense solution. Integration can help you prevent security breaches and limit the impact of breaches within an organization. -Because you have an Intune device compliance policy to classify devices with a *Medium* or *High* level of risk as noncompliant, the compromised device is classified as noncompliant. This classification allows your conditional access policy to kick in and block access from that device to your corporate resources. +Because you have an Intune device compliance policy to classify devices with a *Medium* or *High* level of risk as noncompliant, the compromised device is classified as noncompliant. This classification allows your Conditional Access policy to kick in and block access from that device to your corporate resources. For devices that run Android, you can use Intune policy to modify the configuration of Microsoft Defender for Endpoint on Android. For more information, see [Microsoft Defender for Endpoint web protection](../protect/advanced-threat-protection-manage-android.md). @@ -94,7 +94,7 @@ For the system requirements for Microsoft Defender for Endpoint, see [Minimum re ## Next steps -- To connect Microsoft Defender for Endpoint to Intune, onboard devices, and configure conditional access policies, see [Configure Microsoft Defender for Endpoint in Intune](../protect/advanced-threat-protection-configure.md). +- To connect Microsoft Defender for Endpoint to Intune, onboard devices, and configure Conditional Access policies, see [Configure Microsoft Defender for Endpoint in Intune](../protect/advanced-threat-protection-configure.md). Learn more from the Intune documentation: diff --git a/memdocs/intune/protect/app-based-conditional-access-intune-create.md b/memdocs/intune/protect/app-based-conditional-access-intune-create.md index 7352b8095ce..71e5159966c 100644 --- a/memdocs/intune/protect/app-based-conditional-access-intune-create.md +++ b/memdocs/intune/protect/app-based-conditional-access-intune-create.md @@ -51,7 +51,7 @@ Before you can create Conditional Access policies from the Microsoft Intune admi 1. Sign in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) -2. Select **Endpoint security** > **Conditional access** > **New policy**. +2. Select **Endpoint security** > **Conditional Access** > **New policy**. 3. Enter a policy **Name**, and then under *Assignments*, select **Users or workload identities**, and apply the policy to *Users and groups*. Use the Include or Exclude options to add your groups for the policy. diff --git a/memdocs/intune/protect/app-modern-authentication-block.md b/memdocs/intune/protect/app-modern-authentication-block.md index 2a1f63f39cd..d5f4a111005 100644 --- a/memdocs/intune/protect/app-modern-authentication-block.md +++ b/memdocs/intune/protect/app-modern-authentication-block.md @@ -37,7 +37,7 @@ App-based Conditional Access with app protection policies rely on applications u ## Block access to apps -To block access to apps that don't use modern authentication, use Intune app protection policies to implement conditional access. For more information, see [App-based Conditional Access with Intune](app-based-conditional-access-intune.md). +To block access to apps that don't use modern authentication, use Intune app protection policies to implement Conditional Access. For more information, see [App-based Conditional Access with Intune](app-based-conditional-access-intune.md). ## Additional information diff --git a/memdocs/intune/protect/atp-manage-vulnerabilities.md b/memdocs/intune/protect/atp-manage-vulnerabilities.md index 282f27df14b..86dfe65d810 100644 --- a/memdocs/intune/protect/atp-manage-vulnerabilities.md +++ b/memdocs/intune/protect/atp-manage-vulnerabilities.md @@ -6,7 +6,7 @@ description: Use Microsoft Intune Security Tasks to manage threats and vulnerabi author: brenduns ms.author: brenduns manager: dougeby -ms.date: 03/15/2024 +ms.date: 12/06/2024 ms.topic: how-to ms.service: microsoft-intune ms.subservice: protect @@ -28,72 +28,58 @@ ms.collection: - sub-secure-endpoints --- -# Use Microsoft Intune to remediate vulnerabilities identified by Microsoft Defender for Endpoint +# Use Microsoft Intune security tasks to remediate device vulnerabilities identified by Microsoft Defender for endpoint -When you integrate Microsoft Defender for Endpoint with Microsoft Intune, you can take advantage of Defender for Endpoint's threat and vulnerability management by using Intune security tasks. Security Tasks in Intune help Intune admins understand and then remediate many device weaknesses that Microsoft Defender for Endpoint's vulnerability management capability identifies. This integration brings a risk-based approach to the discovery and prioritization of vulnerabilities and can help improve remediation response time across your environment. +When you [integrate Microsoft Defender for Endpoint with Microsoft Intune](/mem/intune/protect/advanced-threat-protection-configure#connect-microsoft-defender-for-endpoint-to-intune), you can leverage Defender's threat and vulnerability management through Intune security tasks. These tasks help Intune admins understand and address current vulnerabilities based on guidance from Defender for Endpoint. This integration enhances the discovery and prioritization of vulnerabilities, improving remediation response times across your environment. [Threat & Vulnerability Management](/windows/security/threat-protection/windows-defender-atp/next-gen-threat-and-vuln-mgt) is part of [Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/microsoft-defender-endpoint). ## How integration works + +After you integrate Intune with Microsoft Defender for Endpoint, Defender for Endpoint receives threat and vulnerability details from Intune-managed devices. These details are visible to security admins in the Microsoft Defender Security Center console. -After you [connect Intune to Microsoft Defender for Endpoint](../protect/advanced-threat-protection-configure.md), Defender for Endpoint receives threat and vulnerability details from the devices you manage with Intune. These details become visible to security admins from within the Microsoft Defender Security Center console. +In the Security Center console, [security admins can review endpoint vulnerabilities](/defender-vulnerability-management/defender-vulnerability-management#remediation-and-tracking) and create security tasks managed through Intune. These tasks appear in the Microsoft Intune admin center, where Intune admins can act and remediate issues based on Defender's guidance: -In the Microsoft Defender Security Center console, security admins can review and act on endpoint vulnerabilities by taking a few simple actions that create *security tasks* for Microsoft Intune. Security tasks immediately appear in the Microsoft Intune admin center where they're visible to Intune admins who can then use the details to act and remediate the issues. - -- Vulnerabilities are based on the threats or issues as evaluated by Microsoft Defender for Endpoint when it scans and evaluates a device. -- Not all Vulnerabilities and issues that Defender for Endpoint identifies support remediation through Intune. Such issues don't result in the creation of a security task for Intune. +- Vulnerabilities are identified through scans and assessments by Microsoft Defender for Endpoint. +- Not all identified vulnerabilities support remediation through Intune; only those vulnerabilities that are compatible result in security tasks. Security tasks identify: - The type of vulnerability - Priority - Status -- Steps to take to remediate the vulnerability - -In the admin center, an Intune admin can review and then choose to accept or reject the task. After an admin accepts a task in Intune, they can use Intune to remediate the vulnerability, guided by the details provided in the task. +- Steps for remediation -With successful remediation, the Intune admin sets the security task to **Complete Task**. This status displays in Intune and is passed back to Defender for Endpoint, where security admins can confirm the revised status for the vulnerability. +Intune admins can view a security task and then choose to accept or reject it. For accepted tasks, the admin follows the guidance provided to use Intune for remediation. Once the remediation is successful, the admin sets the task to **Complete Task**, which updates its status in both Intune and Defender for Endpoint where security admins can verify the revised status of the vulnerability. -**About security tasks**: +### Types of security tasks Each security task has a *Remediation Type*: +- Application: For example, Microsoft Defender for Endpoint finds a vulnerability in an app like *Contoso Media Player v4*. An admin creates a task to update the app, which might involve applying a security update or installing a new version. +- Configuration: For instance, if devices lack protection from *Potentially Unwanted Applications* (PUA), an admin creates a task to configure the setting in the Microsoft Defender Antivirus profile. -- **Application** – An application is identified that has a vulnerability or issue you can mitigate with Intune. For example, Microsoft Defender for Endpoint identifies a vulnerability for an app named *Contoso Media Player v4*, and an admin creates a security task to update that app. The Contoso Media player is an unmanaged app that was deployed with Intune, and there could be a security update or newer version of an application that resolves the issue. - -- **Configuration** – Vulnerabilities or risks in your environment can be mitigated through use of Intune endpoint security policies. For example, Microsoft Defender for Endpoint identifies that devices lack protection from *Potentially Unwanted Applications* (PUA). An admin creates a security task for this issue, which identifies a mitigation of configuring the setting **Action to take on potentially unwanted apps** as part of the Microsoft Defender Antivirus profile for Antivirus policy. +When Intune doesn’t support implementation of a suitable remediation, Microsoft Defender for Endpoint doesn't create a security task. - When a configuration issue doesn't have a plausible remediation that Intune can provide, Microsoft Defender for Endpoint doesn't create a security task for it. +### Remediation actions -**Remediation actions**: +Common security task remediations include: -Common remediation actions include: - -- **Block** an application from being run. +- **Block** an application from running. - **Deploy** an operating system update to mitigate the vulnerability. - **Deploy** endpoint security policy to mitigate the vulnerability. - **Modify** a registry value. - **Disable** or **Enable** a configuration to affect the vulnerability. -- **Require Attention** alerts the admin to the threat when there's no suitable recommendation to provide. - -**Workflow example**: - -The following example demonstrates the workflow of discovering an application vulnerability to remediation. This same general workflow applies for configuration issues: - -- A Microsoft Defender for Endpoint scan identifies a vulnerability for an app named Contoso Media Player v4, and an admin creates a security task to update that app. The Contoso Media player is an unmanaged app that wasn't deployed with Intune. - - This security task appears in the Microsoft Intune admin center with a status of Pending: - - ![View the list of security tasks in the Intune admin center](./media/atp-manage-vulnerabilities/temp-security-tasks.png) +- **Require Attention**, which alerts the admin when no suitable recommendation is available. -- The Intune admin selects the security task to view details about the task. The admin then selects **Accept**, which updates the status in Intune, and in Defender for Endpoint to be *Accepted*. +### Workflow Example - ![Accept or reject a security task](./media/atp-manage-vulnerabilities/temp-accept-task.png) +Following is an example of the workflow for discovering and remediating an application vulnerability: -- The admin then remediates the task based on the guidance provided. The guidance varies depending on the type of remediation needed. When available, remediation guidance includes links that open relevant panes for configurations in Intune. - - Because the media player in this example isn't a managed app, Intune can only provide text instructions. For a managed app, Intune could provide instructions to download an updated version, and provide a link to open the deployment for the app so that the updated files can be added to the deployment. - -- After remediation is complete, the Intune admin opens the security task and selects **Complete Task**. The remediation status is updated for Intune and in Defender for Endpoint, where security admins confirm the revised status for the vulnerability. +- A Microsoft Defender for Endpoint scan identifies a vulnerability in the app Contoso Media Player v4, which is an unmanaged app that isn't deployed by Intune. An admin creates a security task to update the app. +- The security task appears in the Microsoft Intune admin center with a status of **Pending**. +- The Intune admin views the task details and selects **Accept**, which changes the status of the task to Accepted in both Intune and Defender for Endpoint. +- The admin follows the remediation guidance provided. For managed apps, Intune might include instructions or links to update the app. For unmanaged apps, Intune can only provide text instructions. +- After addressing the vulnerability, the Intune admin marks the task as **Complete Task*. This action updates the status in both Intune and Defender for Endpoint, where security admins confirm the remediation is successful and complete. ## Prerequisites @@ -102,29 +88,23 @@ The following example demonstrates the workflow of discovering an application vu - Microsoft Intune Plan 1 - Microsoft Defender for Endpoint ([Sign up for a free trial](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-main-abovefoldlink).) -**Intune configurations for Defender for Endpoint**: - -- Configure a service-to-service connection with Microsoft Defender for Endpoint. -- Deploy a device configuration policy with a profile type of **Microsoft Defender for Endpoint (desktop devices running Windows 10 or later)** to devices that use Microsoft Defender for Endpoint to assess risk. +Intune configurations for Defender for Endpoint: +- Configure a [service-to-service connection](/mem/intune/protect/advanced-threat-protection-configure#connect-microsoft-defender-for-endpoint-to-intune) with Microsoft Defender for Endpoint. +- Deploy an Intune policy that configures settings for **Microsoft Defender for Endpoint** to devices to assess risk. - For information about how to set up Intune to work with Defender for Endpoint, see [Enforce compliance for Microsoft Defender for Endpoint with Conditional Access in Intune](advanced-threat-protection-configure.md#connect-microsoft-defender-for-endpoint-to-intune). ## Work with security tasks -Before you can work with security tasks, they must be created from within the Defender Security Center. For information on using the Microsoft Defender Security Center to create security tasks, see [Remediate vulnerabilities with threat and vulnerability management](/microsoft-365/security/defender-endpoint/tvm-remediation?view=o365-worldwide&preserve-view=true#request-remediation) in the Defender for Endpoint documentation. +Before you manage security tasks, they must be created within the Defender Security Center. For detailed instructions, see the Defender for Endpoint documentation on [remediating vulnerabilities](/microsoft-365/security/defender-endpoint/tvm-remediation?view=o365-worldwide&preserve-view=true#request-remediation). To manage security tasks: 1. Sign in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431). 2. Select **Endpoint security** > **Security tasks**. - -3. Select a task from the list to open a resource window that displays more details for that security task. - - While viewing the security task resource window, you can select additional links: - +3. Choose a security task to view its details. In the task window, you can select additional links, including: - MANAGED APPS - View the app that is vulnerable. When the vulnerability applies to multiple apps, Intune displays a filtered list of apps. - - DEVICES - View a list of the *Vulnerable devices*, from which you can link through to an entry with more details for the vulnerability on that device. + - DEVICES - View a list of the *Vulnerable devices* from which you can link through to an entry with more details for the vulnerability on that device. - REQUESTOR - Use the link to send mail to the admin who submitted this security task. - NOTES - Read custom messages submitted by the requestor when opening the security task. @@ -132,16 +112,12 @@ To manage security tasks: 5. After accepting a task, reopen the security task (if it closed), and follow the REMEDIATION details to remediate the vulnerability. The instructions provided by Defender for Endpoint in the security task details vary depending on the vulnerability involved. - When it's possible to do so, the remediation instructions include links that open the relevant configuration objects in the Microsoft Intune admin center. - 6. After completing the remediation steps, open the security task and select **Complete Task**. This action updates the security task status in both Intune and Defender for Endpoint. -After remediation is successful, the risk exposure score in Defender for Endpoint can drop, based on new information from the remediated devices. - -## Next Steps - -Learn more about Intune and [Microsoft Defender for Endpoint](advanced-threat-protection.md). +Successful remediation can reduce the risk exposure score in Defender for Endpoint based on subsequent status updates from the remediated devices. -Review Intune [Mobile Threat Defense](mobile-threat-defense.md). +## Related content -Review the [Threat & Vulnerability Management dashboard](/windows/security/threat-protection/windows-defender-atp/tvm-dashboard-insights) in Microsoft Defender for Endpoint. +- Learn more about Intune and [Microsoft Defender for Endpoint](advanced-threat-protection.md). +- Review Intune [Mobile Threat Defense](mobile-threat-defense.md). +- Review the [Threat & Vulnerability Management dashboard](/windows/security/threat-protection/windows-defender-atp/tvm-dashboard-insights) in Microsoft Defender for Endpoint. diff --git a/memdocs/intune/protect/better-mobile-threat-defense-connector.md b/memdocs/intune/protect/better-mobile-threat-defense-connector.md index 19a653dbe0a..6835606eab1 100644 --- a/memdocs/intune/protect/better-mobile-threat-defense-connector.md +++ b/memdocs/intune/protect/better-mobile-threat-defense-connector.md @@ -63,9 +63,12 @@ The Better Mobile app is installed and run on mobile devices. This app captures - Microsoft Intune Plan 1 subscription - Better Mobile Threat Defense subscription + + ## Sample scenarios Here are some common scenarios. diff --git a/memdocs/intune/protect/certificates-imported-pfx-configure.md b/memdocs/intune/protect/certificates-imported-pfx-configure.md index f1c6b12b307..12a66ea0078 100644 --- a/memdocs/intune/protect/certificates-imported-pfx-configure.md +++ b/memdocs/intune/protect/certificates-imported-pfx-configure.md @@ -225,7 +225,7 @@ For more information about other available commands, see the readme file at [PFX ## Create a PKCS imported certificate profile -After importing the certificates to Intune, create a **PKCS imported certificate** profile, and assign it to Microsoft Entra groups. +After importing the certificates to Intune, create a **PKCS imported certificate** profile, and assign it to Microsoft Entra groups. > [!NOTE] > After you create a PKCS imported certificate profile, the **Intended Purpose** and **Key storage provider** (KSP) values in the profile are read-only and can't be edited. If you need a different value for either of these settings, create and deploy a new profile. @@ -248,7 +248,7 @@ After importing the certificates to Intune, create a **PKCS imported certificate 7. In **Configuration settings**, enter the following properties: - - **Intended purpose**: Specify the intended purpose of the certificates that are imported for this profile. Administrators can import certificates with different intended purposes (like S/MIME signing or S/MIME encryption). The intended purpose selected in the certificate profile matches the certificate profile with the right imported certificates. Intended purpose is a tag to group imported certificates together and doesn't guarantee that certificates imported with that tag will meet the intended purpose. + - **Intended purpose**: Specify the intended purpose of the certificates that are imported for this profile. Administrators can import certificates with different intended purposes (like S/MIME signing or S/MIME encryption). The intended purpose selected in the certificate profile matches the certificate profile with the right imported certificates. Intended purpose is a tag to group imported certificates together and doesn't guarantee that certificates imported with that tag will meet the intended purpose. When multiple certificates are imported for a single user, Intune selects the imported certificate that has the most recent certificate start date and time in case there is more than one certificate with the same intended purpose. - **Key storage provider (KSP)**: For Windows, select where to store the keys on the device. diff --git a/memdocs/intune/protect/certificates-pfx-configure.md b/memdocs/intune/protect/certificates-pfx-configure.md index 06c5940cecb..dcfb48092df 100644 --- a/memdocs/intune/protect/certificates-pfx-configure.md +++ b/memdocs/intune/protect/certificates-pfx-configure.md @@ -5,7 +5,7 @@ keywords: author: lenewsad ms.author: lanewsad manager: dougeby -ms.date: 10/01/2024 +ms.date: 11/19/2024 ms.topic: how-to ms.service: microsoft-intune ms.subservice: protect @@ -16,7 +16,7 @@ ms.localizationpriority: high #ROBOTS: #audience: -ms.reviewer: lacranda +ms.reviewer: sheetg ms.suite: ems search.appverid: MET150 #ms.tgt_pltfrm: @@ -303,17 +303,18 @@ For guidance, see [Install and configure the Certificate Connector for Microsoft |Setting | Platform | Details | |------------|------------|------------| - |**Renewal threshold (%)** |
    • All |Recommended is 20% | - |**Certificate validity period** |
      • All |If you didn't change the certificate template, this option might be set to one year.

        Use a validity period of five days or up to 24 months. When the validity period is less than five days, there's a high likelihood of the certificate entering a near-expiry or expired state, which can cause the MDM agent on devices to reject the certificate before it’s installed. | - |**Key storage provider (KSP)** |
        • Windows 10/11 |For Windows, select where to store the keys on the device. | - |**Certification authority** |
          • All |Displays the internal fully qualified domain name (FQDN) of your Enterprise CA. | - |**Certification authority name** |
            • All |Lists the name of your Enterprise CA, such as "Contoso Certification Authority." | - |**Certificate template name** |
              • All |Lists the name of your certificate template. | - |**Certificate type** |
                • Android Enterprise (*Corporate-Owned and Personally-Owned Work Profile*)
                • iOS
                • macOS
                • Windows 10/11 |Select a type:
                  • **User** certificates can contain both user and device attributes in the subject and subject alternative name (SAN) of the certificate.
                  • **Device** certificates can only contain device attributes in the subject and SAN of the certificate. Use Device for scenarios such as user-less devices, like kiosks or other shared devices.

                    This selection affects the Subject name format. | - |**Subject name format** |
                    • All |For details on how to configure the subject name format, see [Subject name format](#subject-name-format) later in this article.

                      For the following platforms, the Subject name format is determined by the certificate type:
                      • Android Enterprise (*Work Profile*)
                      • iOS
                      • macOS
                      • Windows 10/11

                      | - |**Subject alternative name** |

                      • All |For *Attribute*, select **User principal name (UPN)** unless otherwise required, configure a corresponding *Value*, and then select **Add**.

                        You can use variables or static text for the SAN of both certificate types. Use of a variable isn't required.

                        For more information, see [Subject name format](#subject-name-format) later in this article.| + |**Deployment channel**|macOS|Select how you want to deploy the profile. This setting also determines the keychain where the linked certificates are stored, so it's important to select the proper channel.

                        Always select the user deployment channel in profiles with user certificates. The user channel stores certificates in the user keychain. Always select the device deployment channel in profiles with device certificates. The device channel stores certificates in the system keychain.

                        It's not possible to edit the deployment channel after you deploy the profile. You must create a new profile to select a different channel. + |**Renewal threshold (%)** |All |Recommended is 20% | + |**Certificate validity period** |All |If you didn't change the certificate template, this option might be set to one year.

                        Use a validity period of five days or up to 24 months. When the validity period is less than five days, there's a high likelihood of the certificate entering a near-expiry or expired state, which can cause the MDM agent on devices to reject the certificate before it’s installed. | + |**Key storage provider (KSP)** |Windows 10/11 |For Windows, select where to store the keys on the device. | + |**Certification authority** |All |Displays the internal fully qualified domain name (FQDN) of your Enterprise CA. | + |**Certification authority name** |All |Lists the name of your Enterprise CA, such as "Contoso Certification Authority." | + |**Certificate template name** |All |Lists the name of your certificate template. | + |**Certificate type** |
                        • Android Enterprise (*Corporate-Owned and Personally-Owned Work Profile*)
                        • iOS
                        • macOS
                        • Windows 10/11 |Select a type:
                          • **User** certificates can contain both user and device attributes in the subject and subject alternative name (SAN) of the certificate.
                          • **Device** certificates can only contain device attributes in the subject and SAN of the certificate. Use Device for scenarios such as user-less devices, like kiosks or other shared devices.

                            This selection affects the Subject name format.

                            For macOS, if this profile is configured to use the device deployment channel, you can select **User** or **Device**. If the profile is configured to use the user deployment channel, you can select only **User**. | + |**Subject name format** |All |For details on how to configure the subject name format, see [Subject name format](#subject-name-format) later in this article.

                            For the following platforms, the Subject name format is determined by the certificate type:
                            • Android Enterprise (*Work Profile*)
                            • iOS
                            • macOS
                            • Windows 10/11

                            | + |**Subject alternative name** |All |For *Attribute*, select **User principal name (UPN)** unless otherwise required, configure a corresponding *Value*, and then select **Add**.

                            You can use variables or static text for the SAN of both certificate types. Use of a variable isn't required.

                            For more information, see [Subject name format](#subject-name-format) later in this article.| |**Extended key usage** |

                            • Android device administrator
                            • Android Enterprise (*Device Owner*, *Corporate-Owned and Personally-Owned Work Profile*)
                            • Windows 10/11 |Certificates usually require *Client Authentication* so that the user or device can authenticate to a server. | - |**Allow all apps access to private key** |
                              • macOS |Set to **Enable** to give apps that are configured for the associated mac device access to the PKCS certificate's private key.

                                For more information on this setting, see *AllowAllAppsAccess* the Certificate Payload section of [Configuration Profile Reference](https://developer.apple.com/business/documentation/Configuration-Profile-Reference.pdf) in the Apple developer documentation. | + |**Allow all apps access to private key** |macOS |Set to **Enable** to give apps that are configured for the associated mac device access to the PKCS certificate's private key.

                                For more information on this setting, see *AllowAllAppsAccess* the Certificate Payload section of [Configuration Profile Reference](https://developer.apple.com/business/documentation/Configuration-Profile-Reference.pdf) in the Apple developer documentation. | |**Root Certificate** |
                                • Android device administrator
                                • Android Enterprise (*Device Owner*, *Corporate-Owned and Personally-Owned Work Profile*) |Select a root CA certificate profile that was previously assigned. | 8. This step applies only to **Android Enterprise** devices profiles for **Fully Managed, Dedicated, and Corporate-Owned work Profile**. diff --git a/memdocs/intune/protect/certificates-profile-scep.md b/memdocs/intune/protect/certificates-profile-scep.md index c44baf140eb..65443983fb0 100644 --- a/memdocs/intune/protect/certificates-profile-scep.md +++ b/memdocs/intune/protect/certificates-profile-scep.md @@ -5,7 +5,7 @@ keywords: author: lenewsad ms.author: lanewsad manager: dougeby -ms.date: 10/15/2024 +ms.date: 11/25/2024 ms.topic: how-to ms.service: microsoft-intune ms.subservice: protect @@ -15,7 +15,7 @@ ms.subservice: protect #ROBOTS: #audience: -ms.reviewer: lacranda +ms.reviewer: sheetg ms.suite: ems search.appverid: MET150 #ms.tgt_pltfrm: @@ -55,7 +55,8 @@ Devices that run Android Enterprise might require a PIN before SCEP can provisio **Applies to**: - Windows 10 -- Windows 11 +- Windows 11 +- Android - iOS - macOS @@ -101,7 +102,7 @@ For more information about the KDC's requirements and enforcement date for stron 1. Under Monitoring, certificate reporting isn't available for **Device Owner** SCEP certificate profiles. 1. You can't use Intune to revoke certificates that were provisioned by SCEP certificate profiles for **Device Owners**. You can manage revocation through an external process or directly with the certification authority. - 1. SCEP certificate profiles are supported for Wi-Fi network configuration. VPN configuration profile support isn't available. A future update might include support for VPN configuration profiles. + 1. SCEP certificate profiles are supported for Wi-Fi network configuration. VPN configuration profile support isn't available. A future update might include support for VPN configuration profiles. 1. The following variables aren't available for use on Android (AOSP) SCEP certificate profiles. Support for these variables will come in a future update. - onPremisesSamAccountName - OnPrem_Distinguished_Name @@ -124,6 +125,11 @@ For more information about the KDC's requirements and enforcement date for stron 7. In **Configuration settings**, complete the following configurations: + - **Deployment channel**: Select how you want to deploy the profile. This setting also determines the keychain where the linked certificates are stored, so it's important to select the proper channel. + + Always select the user deployment channel in profiles with user certificates. The user channel stores certificates in the user keychain. Always select the device deployment channel in profiles with device certificates. The device channel stores certificates in the system keychain. + + It's not possible to edit the deployment channel after you deploy the profile. You must create a new profile to select a different channel. - **Certificate type**: *(Applies to: Android, Android Enterprise, Android (AOSP), iOS/iPadOS, macOS, Windows 8.1, and Windows 10/11)* @@ -134,11 +140,13 @@ For more information about the KDC's requirements and enforcement date for stron - **Device**: *Device* certificates can only contain device attributes in the subject and SAN of the certificate. - Use **Device** for scenarios such as user-less devices, like kiosks, or for Windows devices. On Windows devices, the certificate is placed in the Local Computer certificate store. + Use **Device** for scenarios such as user-less devices, like kiosks, or for Windows devices. On Windows devices, the certificate is placed in the Local Computer certificate store. + + For macOS, if this profile is configured to use the device deployment channel, you can select **User** or **Device**. If the profile is configured to use the user deployment channel, you can select only **User**. > [!NOTE] > Storage of certificates provisioned by SCEP: - > - *macOS* - Certificates you provision with SCEP are always placed in the system keychain (System store) of the device. + > - *macOS* - Certificates you provision with SCEP are always placed in the system keychain (also called *system store* or *device keychain*) of the device, unless you select the user deployment channel. > > - *Android* - Devices have both a *VPN and apps* certificate store, and a *WIFI* certificate store. Intune always stores SCEP certificates in the VPN and apps store on a device. Use of the VPN and apps store makes the certificate available for use by any other app. > diff --git a/memdocs/intune/protect/compliance-policy-create-ios.md b/memdocs/intune/protect/compliance-policy-create-ios.md index 5e86f1fdf1f..526e3b23bc0 100644 --- a/memdocs/intune/protect/compliance-policy-create-ios.md +++ b/memdocs/intune/protect/compliance-policy-create-ios.md @@ -141,7 +141,7 @@ For details about email profiles, see [configure access to organization email us *Supported for iOS 8.0 and later* - **Not configured** (*default*) - Users can create simple passwords like **1234** or **1111**. - - **Block** - Users can't create simple passwords, such as **1234** or **1111**. + - **Block** - Users can't create simple passwords, such as **1234** or **1111**. - **Minimum password length** *Supported for iOS 8.0 and later* @@ -151,30 +151,34 @@ For details about email profiles, see [configure access to organization email us - **Required password type** *Supported for iOS 8.0 and later* - Choose if a password should have only **Numeric** characters, or if there should be a mix of numbers and other characters (**Alphanumeric**). + Choose the password type required on the device. When set to **Not configured**, which is the default choice, Intune doesn't change or update this setting. Your options: + + - **Not configured**: The password is determined by the device's default settings. A user's OS might allow simple passwords, like *0000* and *1234*. + - **Alphanumeric**: The password must contain a mix of uppercase letters, lowercase letters, and numeric characters. + - **Numeric**: The password at minimum must be a set of numeric characters, such as *123456789*. Alphabetic passwords and alphanumeric passwords are also supported. - **Number of non-alphanumeric characters in password** - Enter the minimum number of special characters, such as `&`, `#`, `%`, `!`, and so on, that must be in the password. + Enter the minimum number of special characters, such as `&`, `#`, `%`, `!`, and so on, that must be in the password. Setting a higher number requires the user to create a password that is more complex. - **Maximum minutes after screen lock before password is required** *Supported for iOS 8.0 and later* - Specify how soon after the screen is locked before a user must enter a password to access the device. Options include the default of *Not configured*, *Immediately*, and from *1 Minute* to *4 hours*. + Select how much time is allowed to pass after the screen locks before users have to enter a password to access their device. Options include the default of **Not configured**, **Immediately**, and from **1 minute** to **4 hours**. - **Maximum minutes of inactivity until screen locks** - Enter the idle time before the device locks its screen. Options include the default of *Not configured*, *Immediately*, and from *1 Minute* to *15 Minutes*. + Select the amount of idle time allowed before the device locks its screen. Options include the default of **Not configured**, **Immediately**, and from **1 minute** to **15 minutes**. - **Password expiration (days)** *Supported for iOS 8.0 and later* - Select the number of days before the password expires, and they must create a new one. + Enter how long, in days, a password is valid before the user must create a new one. - **Number of previous passwords to prevent reuse** *Supported for iOS 8.0 and later* - Enter the number of previously used passwords that can't be used. + Enter the number of previously used passwords that can't be used. For example, if you enter 5, users can't reuse their 5 most recent passwords. ### Device Security @@ -182,17 +186,17 @@ For details about email profiles, see [configure access to organization email us You can restrict apps by adding their bundle IDs to the policy. If a device has the app installed, the device is marked as noncompliant. - **App name** - Enter a user-friendly name to help you identify the bundle ID. - - **App Bundle ID** - Enter the unique bundle identifier assigned by the app provider. + - **App bundle ID** - Enter the unique bundle identifier assigned by the app provider. To get the app bundle ID: - - Apple's web site has a list of [built-in Apple apps](https://support.apple.com/HT211833). - - For apps added to Intune, [you can use the Intune admin center](../apps/get-app-bundle-id-intune-admin-center.md). - - For some examples, go to [Bundle IDs for built-in iOS/iPadOS apps](../configuration/bundle-ids-built-in-ios-apps.md). + - The Apple website has a list of [built-in Apple apps](https://support.apple.com/HT211833). + - For apps added to Intune, [you can use the Intune admin center](../apps/get-app-bundle-id-intune-admin-center.md). + - For examples, see [Bundle IDs for built-in iOS/iPadOS apps](../configuration/bundle-ids-built-in-ios-apps.md). > [!NOTE] > - > The *Restricted apps* setting applies to un-managed applications that are installed outside of management context. + > The *Restricted apps* setting applies to un-managed apps that are installed outside of management context. ## Next steps diff --git a/memdocs/intune/protect/compliance-policy-create-linux.md b/memdocs/intune/protect/compliance-policy-create-linux.md index 387e57a9c8d..732cc919767 100644 --- a/memdocs/intune/protect/compliance-policy-create-linux.md +++ b/memdocs/intune/protect/compliance-policy-create-linux.md @@ -18,7 +18,7 @@ ms.localizationpriority: medium #ROBOTS: #audience: -ms.reviewer: ilwu +ms.reviewer: arnab ms.suite: ems search.appverid: MET150 #ms.tgt_pltfrm: @@ -69,7 +69,7 @@ Add settings to manage disk encryption. - **Require Device Encryption** – Specifies whether device-level encryption is required for writable fixed disks on this computer. - Users of devices that aren’t encrypted receive a message that they must encrypt the drives to bring the device into compliance. + Users of devices that aren't encrypted receive a message that they must encrypt the drives to bring the device into compliance. There are several options for disk and partition encryption on Linux operating systems. At this time, Intune recognizes any encryption system that uses the underlying [dm-crypt](https://gitlab.com/cryptsetup/cryptsetup/-/wikis/DMCrypt) subsystem that has been standard on Linux systems for some time. @@ -97,7 +97,7 @@ Users that fail to meet password complexity requirements can receive a message t ## Refresh compliance status -If you must modify a device’s configuration, use one of the following methods to refresh the device compliance status with Intune after making changes: +If you must modify a device's configuration, use one of the following methods to refresh the device compliance status with Intune after making changes: - If the Microsoft Intune app is still running, on the apps *device details* page or the *compliance issues* page, select the **Refresh** link. The device starts a new check-in. diff --git a/memdocs/intune/protect/compliance-policy-create-windows.md b/memdocs/intune/protect/compliance-policy-create-windows.md index 341fbb4bf61..bfbb092bcf8 100644 --- a/memdocs/intune/protect/compliance-policy-create-windows.md +++ b/memdocs/intune/protect/compliance-policy-create-windows.md @@ -7,7 +7,7 @@ keywords: author: lenewsad ms.author: lanewsad manager: dougeby -ms.date: 6/18/2024 +ms.date: 11/19/2024 ms.topic: reference ms.service: microsoft-intune ms.subservice: protect @@ -267,7 +267,7 @@ Applies only to co-managed devices running Windows 10/11. Intune-only devices re ### Microsoft Defender for Endpoint rules -For additional information on Microsoft Defender for Endpoint integration in conditional access scenarios, see [Configure Conditional Access in Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/configure-conditional-access). +For additional information on Microsoft Defender for Endpoint integration in Conditional Access scenarios, see [Configure Conditional Access in Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/configure-conditional-access). - **Require the device to be at or under the machine risk score**: Use this setting to take the risk assessment from your defense threat services as a condition for compliance. Choose the maximum allowed threat level: @@ -279,6 +279,21 @@ For additional information on Microsoft Defender for Endpoint integration in con To set up Microsoft Defender for Endpoint as your defense threat service, see [Enable Microsoft Defender for Endpoint with Conditional Access](advanced-threat-protection.md). +## Windows Subsystem for Linux + +The settings in this section require the Windows Subsystem for Linux (WSL) plug-in. For more information, see [Evaluate compliance for Windows Subsystem for Linux](compliance-wsl.md). + +For **Allowed Linux distributions and versions**, enter at least one Linux distribution name. Optionally, enter a minimum or maximum OS version. + + > [!NOTE] + > The distribution names and versions you enter affect the compliance policy in the following ways: + > - If no distribution is provided, all distributions are allowed. This is the default behavior. + > - If only distribution names are provided, all installed versions of that distribution are allowed. + > - If a distribution name and a minimum OS version are provided, all installed distributions with the provided name and minimum version or later are allowed. + > - If a distribution name and a maximum OS version are provided, all installed distributions with the provided name and maximum version or earlier are allowed. + > - If a distribution name, a minimum OS version, and a maximum OS version are provided, all installed distributions and OS versions within the provided range are allowed. + + ## Windows Holographic for Business Windows Holographic for Business uses the **Windows 10 and later** platform. Windows Holographic for Business supports the following setting: diff --git a/memdocs/intune/protect/compliance-policy-monitor.md b/memdocs/intune/protect/compliance-policy-monitor.md index 0fa1368925a..83ac6d88143 100644 --- a/memdocs/intune/protect/compliance-policy-monitor.md +++ b/memdocs/intune/protect/compliance-policy-monitor.md @@ -234,6 +234,13 @@ Policy conflicts can occur when multiple Intune policies are applied to a device To learn more about conflict resolution for policies, see [Compliance and device configuration policies that conflict](../configuration/device-profile-troubleshoot.md#compliance-and-device-configuration-policies-that-conflict). +## How Intune evaluates the default compliance policy + +In Intune, the default compliance policy is evaluated for every device on every calculation. The evaluation process identifies the device as noncompliant if any of the following statements are false: +- The device has a compliance policy assigned: At least one applicable compliance policy must be assigned to the device with an applicable setting. +- The device is active: The device should remain in contact with Intune. This requires it to be turned on with an internet connection. The default grace period is 30 days. +- The enrolled user exists: The user that is actively using the device exists and has a valid Intune license. + ## Next steps [Compliance policies overview](device-compliance-get-started.md) diff --git a/memdocs/intune/protect/compliance-use-custom-settings.md b/memdocs/intune/protect/compliance-use-custom-settings.md index 1bc42be16ee..d43c9b5956c 100644 --- a/memdocs/intune/protect/compliance-use-custom-settings.md +++ b/memdocs/intune/protect/compliance-use-custom-settings.md @@ -49,7 +49,7 @@ Before you can add custom settings to a policy, you must prepare a JSON file, an The scripts must be uploaded to the Microsoft Intune admin center before you create a compliance policy. You select the script when you’re configuring a policy to support custom settings. -After you deploy custom compliance settings and devices report back, you can view the results alongside the built-in compliance setting details in the Microsoft Intune admin center. Custom compliance settings can be used for conditional access decisions in the same way built-in compliance settings are. Together they form a compound rule set, equally affecting the device compliance state. +After you deploy custom compliance settings and devices report back, you can view the results alongside the built-in compliance setting details in the Microsoft Intune admin center. Custom compliance settings can be used for Conditional Access decisions in the same way built-in compliance settings are. Together they form a compound rule set, equally affecting the device compliance state. ## Prerequisites diff --git a/memdocs/intune/protect/compliance-wsl.md b/memdocs/intune/protect/compliance-wsl.md index b6baa5663dc..635ab4c9178 100644 --- a/memdocs/intune/protect/compliance-wsl.md +++ b/memdocs/intune/protect/compliance-wsl.md @@ -6,8 +6,8 @@ description: Evaluate WSL attributes on a host device for compliance. keywords: author: lenewsad ms.author: lanewsad -manager: dougeby -ms.date: 5/29/2024 +manager: dougeby +ms.date: 11/19/2024 ms.topic: how-to ms.service: microsoft-intune ms.subservice: protect @@ -20,7 +20,7 @@ ms.localizationpriority: high #ms.devlang: ms.suite: ems search.appverid: MET150 -ms.reviewer: ilwu +ms.reviewer: arnab #ms.tgt_pltfrm: ms.custom: intune-azure ms.collection: @@ -41,128 +41,91 @@ Create a Microsoft Intune policy that checks the compliance of devices running W This article describes how to set up compliance checks for WSL. -> [!IMPORTANT] -> This feature is in public preview. For more information, see [Public preview in Microsoft Intune](../fundamentals/public-preview.md). - ## Requirements -These resources are required to create your custom compliance script: - -- [Intune WSL plug-in](https://github.com/microsoft/shell-intune-samples/blob/master/Linux/WSL/IntuneWSLPluginInstaller/IntuneWSLPluginInstaller.msi): Use the example Powershell script to get the installation package file for the Intune WSL plug-in. - -- [Custom compliance script](https://github.com/microsoft/shell-intune-samples/blob/master/Linux/WSL/WSL%20Management%20Example/WSLDistroVersionCompliance.ps1): The example PowerShell script calculates compliance against WSL distros based on Distro and Distro Version. - -- [JSON for validation](https://github.com/microsoft/shell-intune-samples/blob/master/Linux/WSL/WSL%20Management%20Example/WSLDetectionRule.json): Use the example JSON to define WSL detection rules. +To create your compliance policy with WSL settings, you must meet these requirements: -## Step 1: Install Intune WSL plug-in +- The [Intune WSL plugin](https://go.microsoft.com/fwlink/?linkid=2296896) must be installed for compliance evaluation. + +- The Microsoft Intune management extension must be installed on the target device. Make sure devices meet one of the following conditions so that the management extension can install: + + - Assign a PowerShell script or a proactive remediation to the user or device. + - Deploy a Win32 app or Microsoft Store app to the user or device. + - Assign a custom compliance policy to the user or device. -Use the Intune WSL plug-in resource to install the Intune WSL plug-in on the target machine. +## Before you begin -## Step 2: Add policy for line-of-business app +Unassign and remove existing custom compliance policies for WSL. Then review the [limitations](#limitations) with WSL settings in compliance policies so that you know what to expect. -Create an app policy for the Intune WSL plug-in. The Intune WSL plug-in is considered a Windows line-of-business app. +## Add Intune WSL plugin as a Win32 app -1. In the Microsoft Intune admin center, go to **Apps** > **Windows**. +Create a Win32 app policy for the [Intune WSL plugin](https://github.com/microsoft/shell-intune-samples/blame/master/Linux/WSL/IntuneWSLPluginInstaller/IntuneWSLPluginInstaller.msi), and assign it to the target Microsoft Entra group. -2. Enter app information: - - **Select file**: Select this option to upload the installation package file for the Intune WSL plug-in. - - **Name**: Enter **Intune WSL Plugin**. - - **Description**: Enter a description for the app. This setting is optional but recommended. - - **Publisher**: Enter **Microsoft Intune**. +1. Use the [Microsoft Win32 Content Prep Tool](https://github.com/Microsoft/Microsoft-Win32-Content-Prep-Tool) to convert the Intune WSL plugin to the *.intunewin* format. For more information, see [Convert the Win32 app content](../apps/apps-win32-prepare.md#convert-the-win32-app-content). -3. Select **Next** to go to **Assignments**. +2. Sign in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) as at least an Intune administrator. -4. Add Microsoft Entra users under **Required** to assign the policy. +3. Go to **Apps** > **All apps** > **Add**. -5. Select **Next** to go to **Review + create**. +4. For **App type**, scroll down to **Other**, and then select **Windows app (Win32)**. -6. Review the summary and then select **Create** to save the policy. +5. Choose **Select**. The **Add app** steps appear. -## Step 3: Set up custom script -In a command line, complete the following steps: +6. Choose **Select app package file**. -1. Modify the following properties in lines 23-28 of the custom compliance script to match your organization's requirements: +7. Select the **Folder** button and browse your files for the app package file. Upload the Intune WSL plugin installation file with the *.intunewin* extension. - - Distros +8. Select **OK** to continue. - - Minimum/maximum version - - - Number of days since last check-in a device can remain compliant - -1. In the JSON for validation resource, modify the following fields with your organization's custom values: - - - **MoreInfoUrl** - Enter the URL where device users can go to learn more about how to meet compliance requirements. - - - **RemediationStrings**: Enter helpful information for the device user about the compliance requirement for WSL. - - - **Language** - Example: `en-us` - - **Title** - Example: `WSL distros not in compliance with company policy` - - **Description** - Example: `Make sure only allowed distros and versions are registered in WSL.` +9. Enter the following app information: + - **Select file**: The app package file you selected in the previous step appears here. Select the file to upload a different installation package file for the Intune WSL plugin. + - **Name**: Enter **Intune WSL Plugin**. + - **Description**: Select **Edit Description** to enter a description for the app. For example, you can describe its purpose or how your organization plans to use it. This setting is optional but recommended. + - **Publisher**: Enter **Microsoft Intune**. -## Step 4: Deploy custom compliance policy - Deploy the custom compliance policy to targeted devices. +10. Select **Next** to go to **Program**. - 1. In the admin center, go to **Endpoint security** > **Device compliance**. - - 1. Go to **Scripts**. - - 1. Select **Add** > **Windows 10 and later**. - - 1. Enter the basic information for your policy, including name and description. - - 1. Select **Next** to go to **Settings**. - - 1. Copy and paste your custom compliance script into **Detection Script**. - - 1. Leave all other settings as is. +11. Review the settings that are prepopulated so that you're familiar with how the app behaves. Leave the settings as-is. -## Step 5: Create device compliance policy -Create a new device compliance policy for devices running Windows 10 and later. +12. Select **Next** to go to **Requirements**. -1. In the admin center, go to **Endpoint security** > **Device compliance**. +13. Enter the requirements devices must meet to install the app. -1. Go to **Policies**. +14. Select **Next** to go to **Detection rules**. -1. Select **Create policy**. +15. Review the detection rules that are prepopulated. These rules are app-specific and detect the presence of the app. Leave the settings as-is. -1. For platform, choose **Windows 10 and later**. +16. Select **Next** to go to **Dependencies**. Leave the settings as-is. -1. Select **Create**. +17. Select **Next** to go to **Supersedence**. Leave the settings as-is. -1. Enter the basic information for your policy, including **Name** and **Description**. +18. Select **Next** to go to **Assignments**. -1. Select **Next** to go to **Compliance settings**. +19. To assign the policy, add Microsoft Entra users under **Required**. -1. Expand **Custom Compliance**: - - 1. Select the custom compliance script file as the discovery script. - - 1. Upload your JSON validation file. +20. Select **Next** to go to **Review + create**. -1. Leave all other settings as is. Select **Next**. +21. Review the summary, and then select **Create** to save the policy. -1. Review the summary of your policy, and then select **Create** to save it. +> [!NOTE] +> When you create a compliance policy with WSL settings, it automatically generates a read-only custom script. Editing the compliance policy also edits the associated custom script. These scripts appear in the Microsoft Intune admin center in **Devices** > **Compliance** > **Scripts** and are called *Built-in WSL Compliance-< compliance policy id >*. -## Remediation +## Limitations -A quick way to get a device back to a compliant state is to unregister the noncompliant distro on the device. Use the following command to unregister a distro: +This section describes the known limitations with using the Intune WSL plugin for compliance evaluation. -```PowerShell +- Compliance evaluation requires the installed Linux distributions in WSL to run at least one time before it works. If you install a Linux distribution with the `--no-launch` [command for WSL](/windows/wsl/basic-commands), the compliance evaluation won't work. -wsl --unregister [DISTRONAME] +- Compliance evaluation might not function as expected on custom Linux images or Linux images without the `etc/os-release` directory. -``` -## Troubleshooting +- Even with the Intune WSL plugin, it's possible for malicious software or user actions to compromise the compliance evaluation mechanism. -**Wsl/Service/CreateInstance/CreateVm/Plugin/ERROR_MOD_NOT_FOUND** +## Next steps -Restart the WSL service. In an elevated PowerShell window, run the following commands: - -```PowerShell - sc.exe stop wslservice +- [Create a compliance policy](create-compliance-policy.md#create-the-policy), and set the **Platform** to **Windows 10 and later**. For more information about the compliance settings for Windows Subsystem for Linux, see [Windows Subsystem for Linux](compliance-policy-create-windows.md#windows-subsystem-for-linux). - wsl.exe echo “test” +- [Add actions for noncompliant devices](actions-for-noncompliance.md) and [use scope tags to filter policies](../fundamentals/scope-tags.md). -``` +- [Monitor your compliance policies](compliance-policy-monitor.md). -For WSL troubleshooting help, see [Windows Subsystem for Linux](/windows/wsl/troubleshooting). +- For troubleshooting help, see [Troubleshooting Windows Subsystem for Linux](/windows/wsl/troubleshooting). diff --git a/memdocs/intune/protect/conditional-access-exchange-create.md b/memdocs/intune/protect/conditional-access-exchange-create.md index b8fed4d7100..bde9a7a186e 100644 --- a/memdocs/intune/protect/conditional-access-exchange-create.md +++ b/memdocs/intune/protect/conditional-access-exchange-create.md @@ -100,7 +100,7 @@ Before you can configure Conditional Access, verify the following configurations 8. After you create the email profile, [assign it to groups](/mem/intune/configuration/device-profile-assign). - 9. Set up [device-based conditional access](/mem/intune/protect/conditional-access-intune-common-ways-use#device-based-conditional-access). + 9. Set up [device-based Conditional Access](/mem/intune/protect/conditional-access-intune-common-ways-use#device-based-conditional-access). > [!NOTE] > Microsoft Outlook for Android and iOS/iPadOS is not supported via the Exchange on-premises connector. If you want to leverage Microsoft Entra Conditional Access policies and Intune App Protection Policies with Outlook for iOS/iPadOS and Android for your on-premises mailboxes, please see [Using hybrid Modern Authentication with Outlook for iOS/iPadOS and Android](/Exchange/clients/outlook-for-ios-and-android/use-hybrid-modern-auth). diff --git a/memdocs/intune/protect/create-compliance-policy.md b/memdocs/intune/protect/create-compliance-policy.md index aeedab1c731..3610ea4b894 100644 --- a/memdocs/intune/protect/create-compliance-policy.md +++ b/memdocs/intune/protect/create-compliance-policy.md @@ -7,7 +7,7 @@ keywords: author: lenewsad ms.author: lanewsad manager: dougeby -ms.date: 03/13/2024 +ms.date: 12/13/2024 ms.topic: how-to ms.service: microsoft-intune ms.subservice: protect @@ -81,7 +81,8 @@ For more information about using custom compliance settings, including supported 1. Sign in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431). -2. Go to **Devices** > **Compliance** and choose **Create policy**. +2. Go to **Devices**. +3. Under **Manage devices**, select **Compliance**. Then choose **Create policy**. 4. Select a **Platform** for this policy from the following options: - **Android device administrator** @@ -89,19 +90,20 @@ For more information about using custom compliance settings, including supported - **Android Enterprise** - **iOS/iPadOS** - **Linux** - (Ubuntu Desktop, version 20.04 LTS and 22.04 LTS, RedHat Enterprise Linux 8, or RedHat Enterprise Linux 9) - - **macOS** - - **Windows 8.1 and later** - - **Windows 10 and later** + - **macOS** + - **Windows 10 and later** + - **Windows 8.1 and later** + - For *Android Enterprise*, you also select a **Policy type**: + For *Android Enterprise*, you also select a **Profile type**. Your options: - **Fully managed, dedicated, and corporate-owned work profile** - **Personally-owned work profile** Then select **Create** to open the configuration page. -5. On the **Basics** tab, specify a **Name** that helps you identify them later. For example, a good policy name is **Mark iOS/iPadOS jailbroken devices as not compliant**. +5. On the **Basics** tab, enter a **Name** that helps you identify this policy later. For example, a good policy name is **Mark iOS/iPadOS jailbroken devices as not compliant**. - You can also choose to specify a **Description**. + Optionally, enter a **Description** for the policy. 6. On the **Compliance settings** tab, expand the available categories, and configure settings for your policy. The following articles describe the available compliance settings for each platform: - [Android device administrator](compliance-policy-create-android.md) @@ -113,32 +115,32 @@ For more information about using custom compliance settings, including supported - [Windows 8.1 and later](compliance-policy-create-windows-8-1.md) - [Windows 10/11](compliance-policy-create-windows.md) -7. Add custom settings to policies for supported platforms. +7. Optionally, you can add custom settings for supported platforms. > [!TIP] - > This is an optional step that’s supported only for the following platforms: + > This is an optional step that’s supported for the following platforms: > > - Linux - Ubuntu Desktop, version 20.04 LTS and 22.04 LTS - > - Windows 10/11 + > - Windows 10 and later > Before you can add custom settings to a policy, you must have uploaded a detection script to Intune, and have ready a JSON file that defines the settings you want to use for compliance. See [Custom compliance settings](../protect/compliance-use-custom-settings.md). On the **Compliance settings** page, expand the **Custom Compliance** category: **For Windows**: 1. On the *Compliance settings* page, expand **Custom Compliance** and set *Custom compliance* to **Require**. - 2. For *Select your discovery script*, select **Click to select**, and then specify a script that’s been previously added to the Microsoft Intune admin center. This script must be uploaded before you begin to create the policy. - 3. For *Upload and validate the JSON file with your custom compliance settings*, select the folder icon and then locate and add the JSON file for Windows that you want to use with this policy. For assistance with the JSON, see [Create a JSON for custom compliance settings](compliance-custom-json.md). + 2. For *Select your discovery script*, select **Click to select**, and then enter the name of a script that you previously added to the Microsoft Intune admin center. This script must be uploaded before you begin to create the policy. Choose **Select** to continue to the next step. + 3. For *Upload and validate the JSON file with your custom compliance settings*, select the folder icon, and then find and add the JSON file for Windows that you want to use with this policy. For assistance with the JSON, see [Create a JSON for custom compliance settings](compliance-custom-json.md). **For Linux**: - 1. On the *Compliance settings* page, select **Add settings** to open the *Settings picker* pane. - 2. Select **Custom Compliance**, and then select 8. - 3. Back on the *Compliance settings* page, select the toggle for *Require Custom Compliance* to change it to be **True**. - 4. For *Select your discovery script*, select **Set reusable settings**, and then specify a script that’s been previously added to the Microsoft Intune admin center. This script must have been uploaded before you begin to create the policy. - 5. For *Select your rules file*, select the folder icon and then locate and add the JSON file for Linux that you want to use with this policy. For assistance with the JSON, see [Create a JSON for custom compliance settings](compliance-custom-json.md). + 1. On the *Compliance settings* page, select **Add settings** to open the **Settings picker**. + 2. Select **Custom Compliance**. Then close the settings picker. + 3. Switch **Require Custom Compliance** to **True**. T + 4. For **Select your discovery script**, select **Select a script**. Then select a script that’s been previously added to the Microsoft Intune admin center. This script must be uploaded before you begin to create the policy. + 6. For **Select your rules file**, select the folder icon and then locate and add the JSON file for Linux that you want to use with this policy. For assistance with the JSON, see [Create a JSON for custom compliance settings](compliance-custom-json.md). - The JSON you enter is validated and any problems are displayed. After validation of the JSON contents, the rules from the JSON are displayed in table format. + Wait while Intune validates the JSON. Problems that need to be fixed appear onscreen. After validation of the JSON contents, the rules from the JSON appear in table format. -8. On the **Actions for noncompliance** tab, specify a sequence of actions to apply automatically to devices that don't meet this compliance policy. +8. On the **Actions for noncompliance** tab, select a sequence of actions to apply automatically to devices that don't meet this compliance policy. You can add multiple actions, and configure schedules and details for some actions. For example, you might change the schedule of the default action *Mark device noncompliant* to occur after one day. You can then add an action to send an email to the user when the device isn't compliant to warn them of that status. You can also add actions that lock or retire devices that remain noncompliant. @@ -152,7 +154,7 @@ For more information about using custom compliance settings, including supported 10. On the **Assignments** tab, assign the policy to your groups. - Select **+ Select groups to include** and then assign the policy to one or more groups. The policy will apply to these groups when you save the policy after the next step. + Select **Add groups**, and then assign the policy to one or more groups. The policy will apply to these groups when you save the policy after the next step. Policies for Linux don't support user-based assignments and can only be assigned to device groups. @@ -205,4 +207,4 @@ For example, a device has three compliance policies assigned to it: one Unknown ## Next steps -[Monitor your policies](compliance-policy-monitor.md). \ No newline at end of file +[Monitor your policies](compliance-policy-monitor.md). diff --git a/memdocs/intune/protect/create-conditional-access-intune.md b/memdocs/intune/protect/create-conditional-access-intune.md index bf7f35120d7..7ab2da8f6d6 100644 --- a/memdocs/intune/protect/create-conditional-access-intune.md +++ b/memdocs/intune/protect/create-conditional-access-intune.md @@ -54,7 +54,7 @@ To take advantage of device compliance status, configure Conditional Access poli 1. Sign in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431). -2. Select **Endpoint security** > **Conditional access** > **Create new policy**. +2. Select **Endpoint security** > **Conditional Access** > **Create new policy**. :::image type="content" source="./media/create-conditional-access-intune/create-ca.png" alt-text="Create a new Conditional Access policy"::: The **New** pane opens, which is the configuration pane from Microsoft Entra. The policy you’re creating is a Microsoft Entra policy for Conditional Access. To learn more about this pane and Conditional Access policies, see [Conditional Access policy components](/azure/active-directory/conditional-access/concept-conditional-access-policies) in the Microsoft Entra content. diff --git a/memdocs/intune/protect/data-enable-windows-data.md b/memdocs/intune/protect/data-enable-windows-data.md index c660c587bb5..af72645535e 100644 --- a/memdocs/intune/protect/data-enable-windows-data.md +++ b/memdocs/intune/protect/data-enable-windows-data.md @@ -8,7 +8,7 @@ keywords: author: Smritib17 ms.author: smbhardwaj manager: dougeby -ms.date: 10/05/2023 +ms.date: 11/26/2023 ms.topic: conceptual ms.service: microsoft-intune ms.subservice: protect @@ -69,7 +69,7 @@ To learn more about this configuration, see [Enable Windows diagnostic data proc ### Windows license verification -Use the *Windows license verification* category to enable use of Intune features in your tenant that require Windows E3 or equivalent licenses. +Use the *Windows license verification* category to enable use of Intune features in your tenant that require Windows E3 or equivalent licenses. The following features require you to attest to having Windows E3 or equivalent licenses: diff --git a/memdocs/intune/protect/derived-credentials.md b/memdocs/intune/protect/derived-credentials.md index bbcb6d33ddc..c9068245c99 100644 --- a/memdocs/intune/protect/derived-credentials.md +++ b/memdocs/intune/protect/derived-credentials.md @@ -118,7 +118,7 @@ Before you configure an issuer, review that issuer's documentation to understand Depending on the issuer you choose, you might need staff to be available at the time of enrollment to help users complete the process. Also review your current Intune configurations to ensure they don't block access that's necessary for devices or users to complete the credential request. -For example, you might use conditional access to block access to email for noncompliant devices. If you rely on email notifications to inform the user to start the derived credential enrollment process, your users might not receive those instructions until they're compliant with policy. +For example, you might use Conditional Access to block access to email for noncompliant devices. If you rely on email notifications to inform the user to start the derived credential enrollment process, your users might not receive those instructions until they're compliant with policy. Similarly, some derived credential request workflows require the use of the device camera to scan an on-screen QR code. This code links that device to the authentication request that occurred against the derived credential issuer with the user's smart card credentials. If device configuration policies block camera use, the user can't complete the derived credential enrollment request. @@ -128,7 +128,7 @@ Similarly, some derived credential request workflows require the use of the devi - Users aren't notified that they must enroll for derived credentials until you target them with a policy that requires derived credentials. -- Notification can be through app notification for the Company Portal, through email, or both. If you choose to use email notifications and you use enabled conditional access, users might not receive the email notification if their device isn't compliant. +- Notification can be through app notification for the Company Portal, through email, or both. If you choose to use email notifications and you use enabled Conditional Access, users might not receive the email notification if their device isn't compliant. > [!IMPORTANT] > To ensure notifications related to device credentials are successfully received by end users, you should enable app notifications for the Company Portal, email notifications, or both. diff --git a/memdocs/intune/protect/device-compliance-get-started.md b/memdocs/intune/protect/device-compliance-get-started.md index d91abdb84cb..a64f89c7e84 100644 --- a/memdocs/intune/protect/device-compliance-get-started.md +++ b/memdocs/intune/protect/device-compliance-get-started.md @@ -129,7 +129,7 @@ Intune includes a device compliance dashboard that you use to monitor the compli When you use Conditional Access, you can configure your Conditional Access policies to use the results of your device compliance policies to determine which devices can access your organizational resources. This access control is in addition to and separate from the actions for noncompliance that you include in your device compliance policies. -When a device enrolls in Intune it registers in Microsoft Entra ID. The compliance status for devices is reported to Microsoft Entra ID. If your Conditional Access policies have Access controls set to *Require device to be marked as compliant*, Conditional access uses that compliance status to determine whether to grant or block access to email and other organization resources. +When a device enrolls in Intune it registers in Microsoft Entra ID. The compliance status for devices is reported to Microsoft Entra ID. If your Conditional Access policies have Access controls set to *Require device to be marked as compliant*, Conditional Access uses that compliance status to determine whether to grant or block access to email and other organization resources. If you use device compliance status with Conditional Access policies, review how your tenant configures the *Mark devices with no compliance policy assigned as* option, which you manage under [Compliance policy settings](#compliance-policy-settings). diff --git a/memdocs/intune/protect/device-compliance-partners.md b/memdocs/intune/protect/device-compliance-partners.md index 37d5f1fc4f7..bc0246ed33b 100644 --- a/memdocs/intune/protect/device-compliance-partners.md +++ b/memdocs/intune/protect/device-compliance-partners.md @@ -32,7 +32,7 @@ ms.collection: # Support third-party device compliance partners in Intune -Several third-party device compliance partners have been evaluated as a supported partner solution that you can integrate with Microsoft Intune. When you use a [third-party device compliance partner](#supported-device-compliance-partners), the partner adds the compliance state data it collects to Microsoft Entra ID. You can then use the device compliance data from the partner along side the compliance results you collect with Intune to power your [conditional access policies](../protect/device-compliance-get-started.md#integrate-with-conditional-access) that help to protect your organization and data. +Several third-party device compliance partners have been evaluated as a supported partner solution that you can integrate with Microsoft Intune. When you use a [third-party device compliance partner](#supported-device-compliance-partners), the partner adds the compliance state data it collects to Microsoft Entra ID. You can then use the device compliance data from the partner along side the compliance results you collect with Intune to power your [Conditional Access policies](../protect/device-compliance-get-started.md#integrate-with-conditional-access) that help to protect your organization and data. Third-party partners support one or more of the following platforms: @@ -61,6 +61,7 @@ The following compliance partners are supported as generally available: - Addigy - BlackBerry UEM - Citrix Workspace device compliance +- Clomo MDM - IBM MaaS360 - Jamf Pro - Kandji @@ -86,7 +87,7 @@ The following compliance partners are supported as generally available: ## Configure Intune to work with a device compliance partner -Enable support for a device compliance partner to use compliance state data from that partner with your conditional access policies. +Enable support for a device compliance partner to use compliance state data from that partner with your Conditional Access policies. ### Add a compliance partner to Intune @@ -139,8 +140,10 @@ To enable a device compliance partner to work with Intune, you must complete con - [42Gears SureMDM](https://docs.42gears.com/suremdm/docs/SureMDM/ConditionalAccessintheSureMDMCon.html) - [Citrix Endpoint Management integration with Microsoft Endpoint Manager](https://docs.citrix.com/en-us/citrix-endpoint-management/integration-with-mem.html) +- [Clomo MDM](https://support.clomo.com/?page_id=61477) - [Kandji Device Compliance](https://support.kandji.io/support/solutions/articles/72000630314) - [VMware Workspace ONE UEM](https://docs.vmware.com/en/VMware-Workspace-ONE-UEM/2102/Directory_Service_Integration/GUID-800FB831-AA66-4094-8F5A-FA5899A3C70C.html) + ## Enroll your devices to your device compliance partner diff --git a/memdocs/intune/protect/encrypt-devices-filevault.md b/memdocs/intune/protect/encrypt-devices-filevault.md index 21766c3a71b..1c476c66b42 100644 --- a/memdocs/intune/protect/encrypt-devices-filevault.md +++ b/memdocs/intune/protect/encrypt-devices-filevault.md @@ -117,7 +117,13 @@ You can add this permission and right to your own [custom RBAC roles](../fundame To enable FileVault, select and configure the following settings from the *Full Disk Encryption* category: - - FileVault > **Enable** - Set to **On** + - FileVault > Configure the following: + - **Enable** - Set to **On** + - **Defer** - Set to **Enabled** + + > [!IMPORTANT] + > The *Defer* setting must be configured to *Enabled* to successfully apply FileVault settings. + - FileVault Recovery Key Escrow > **Location** - Specify a description of the location where the recovery key is escrowed. This text is inserted into the message the user sees when enabling FileVault. > [!TIP] diff --git a/memdocs/intune/protect/endpoint-security-app-control-policy.md b/memdocs/intune/protect/endpoint-security-app-control-policy.md index ba79d597475..1dd0699a26f 100644 --- a/memdocs/intune/protect/endpoint-security-app-control-policy.md +++ b/memdocs/intune/protect/endpoint-security-app-control-policy.md @@ -70,7 +70,7 @@ The following devices are supported for App Control for Business policies when t - **Windows Enterprise or Education**: - Windows 10 version 1903 or later - - Windows 11 version 1903 or later + - Windows 11 - **Windows Professional**: - Windows 10 with [KB5019959](https://support.microsoft.com/topic/november-8-2022-kb5019959-os-builds-19042-2251-19043-2251-19044-2251-and-19045-2251-f65e0600-2135-4efd-a979-08d1df34dce8) diff --git a/memdocs/intune/protect/endpoint-security-manage-devices.md b/memdocs/intune/protect/endpoint-security-manage-devices.md index 24a798e1131..d1dd18ab7a7 100644 --- a/memdocs/intune/protect/endpoint-security-manage-devices.md +++ b/memdocs/intune/protect/endpoint-security-manage-devices.md @@ -99,6 +99,16 @@ To view the report, select a device and then select **Device configuration**, wh Devices that are managed by Configuration Manager don’t display policy details in the report. To view additional information for these devices, use the Configuration Manager console. +## Review your profiles for endpoint security policies + +From the *Endpoint security* node in the admin center, you can select the *Summary* tab of a specific policy type to view, select, and then edit all the profiles you've created for that policy type. In this view: + +- *Policy type* identifies the profile. +- *Platform* identifies the device platform. + +In addition to the different endpoint security policy views, you can go to **Devices** > *All devices* and below *Manage devices*, select **Configuration** to view and edit your endpoint security profiles for the macOS and Windows platforms along side your Device Configuration profiles. In this view, endpoint security policies are identified by their template type, like *Microsoft Defender Antivirus* in the *Policy type* column. See [Monitor device configuration policies in Microsoft Intune +](../configuration/device-profile-monitor.md). + ## Remote actions for devices Remote actions are actions you can start or apply to a device from the Microsoft Intune admin center. When you view details for a device, you can access remote actions that apply to the device. diff --git a/memdocs/intune/protect/endpoint-security.md b/memdocs/intune/protect/endpoint-security.md index b9e8fdfb8ed..037ff5955b2 100644 --- a/memdocs/intune/protect/endpoint-security.md +++ b/memdocs/intune/protect/endpoint-security.md @@ -7,7 +7,7 @@ keywords: author: brenduns ms.author: brenduns manager: dougeby -ms.date: 03/19/2024 +ms.date: 01/28/2025 ms.topic: overview ms.service: microsoft-intune ms.subservice: protect @@ -81,21 +81,19 @@ For more information, see [Manage devices with endpoint security in Microsoft In ## Manage Security baselines -Security baselines in Intune are preconfigured groups of settings that are best practice recommendations from the relevant Microsoft security teams for the product. Intune supports security baselines for Windows 10/11 device settings, Microsoft Edge, Microsoft Defender for Endpoint Protection, and more. - -You can use security baselines to rapidly deploy a *best practice* configuration of device and application settings to protect your users and devices. Security baselines are supported for devices that run Windows 10 version 1809 and later, and Windows 11. +Security baselines in Intune are preconfigured groups of Windows device configuration settings that are pre-configured with defaults that set the *best practice* recommendations from the relevant Microsoft security teams. Intune supports security baselines for Windows device settings, Microsoft Edge, Microsoft Defender for Endpoint Protection, and more. For more information, see [Use security baselines to configure Windows devices in Intune](../protect/security-baselines.md). -Security baselines are one of several methods in Intune to configure settings on devices. When managing settings, it's important to understand what other methods are in use in your environment that can configure your devices so you can avoid conflicts. See [Avoid policy conflicts](#avoid-policy-conflicts) later in this article. +Security baselines are one of several methods in Intune to configure device configuration settings. When managing settings, it's important to understand what other methods are in use in your environment that can configure your devices so you can avoid conflicts. See [Avoid policy conflicts](#avoid-policy-conflicts) later in this article. ## Review Security tasks from Microsoft Defender for Endpoint When you integrate Intune with Microsoft Defender for Endpoint, you can review *Security tasks* in Intune that identify at-risk devices and provide steps to mitigate that risk. You can then use the tasks to report back to Microsoft Defender for Endpoint when those risks are successfully mitigated. -- Your Microsoft Defender for Endpoint team determines what devices are at risk and pass that information to your Intune team as a security task. With a few clicks, they create a security task for Intune that identifies the devices at risk, the vulnerability, and provides guidance on how to mitigate that risk. +- Your Microsoft Defender for Endpoint team determines what devices are at risk and pass that information to your Intune team as a *Security task*. With only a few clicks, they create Security tasks for Intune that identify the devices at risk, the vulnerability, and that provide guidance on how to mitigate that risk. -- The Intune Admins review security tasks and then act within Intune to remediate those tasks. Once mitigated, they set the task to complete, which communicates that status back to the Microsoft Defender for Endpoint team. +- Intune Admins can select and review security tasks, and then act within Intune to remediate those tasks. Once mitigated they set the task to complete, which communicates that status back to the Microsoft Defender for Endpoint team. Through Security tasks both teams remain in sync as to which devices are at risk, and how and when those risks are remediated. @@ -103,7 +101,7 @@ To learn more about using Security tasks, see [Use Intune to remediate vulnerabi ## Use policies to manage device security -As a security admin, use the security policies that are found under *Manage* in the Endpoint security node. With these policies, you can configure device security without having to navigate the larger body and range of settings in device configuration profiles or security baselines. +As a security admin, use the security policies that are found under *Manage* in the Endpoint security node. With these policies, you can configure device security without having to navigate the larger body and range of device configuration settings available through device configuration profiles or security baselines. ![Manage policies](./media/endpoint-security/endpoint-security-policies.png) @@ -111,7 +109,7 @@ To learn more about using these security policies, see [Manage device security w Endpoint security policies are one of several methods in Intune to configure settings on devices. When managing settings, it's important to understand what other methods are in use in your environment that can configure your devices, and avoid conflicts. See [Avoid policy conflicts](#avoid-policy-conflicts) later in this article. -Also found under *Manage* are *Device compliance* and *Conditional access* policies. These policies types aren't focused security policies for configuring endpoints, but are important tools for managing devices and access to your corporate resources. +Also found under *Manage* are *Device compliance* and *Conditional Access* policies. These policies types aren't focused security policies for configuring endpoints, but are important tools for managing devices and access to your corporate resources. ## Use device compliance policy @@ -125,24 +123,24 @@ The [available compliance settings](../protect/device-compliance-get-started.md# In addition to the policy rules, compliance policies support [Actions for noncompliance](../protect/actions-for-noncompliance.md). These actions are a time-ordered sequence of actions to apply to noncompliant devices. Actions include sending email or notifications to alert device users about noncompliance, remotely locking devices, or even retiring noncompliant devices and removing any company data that might be on it. -When you integrate Intune Microsoft Entra [Conditional Access policies](#configure-conditional-access) to enforce compliance policies, Conditional access can use the compliance data to gate access to corporate resources for both managed devices, and from devices that you don't manage. +When you integrate Intune Microsoft Entra [Conditional Access policies](#configure-conditional-access) to enforce compliance policies, Conditional Access can use the compliance data to gate access to corporate resources for both managed devices, and from devices that you don't manage. To learn more, see [Set rules on devices to allow access to resources in your organization using Intune](../protect/device-compliance-get-started.md). Device compliance policies are one of several methods in Intune to configure settings on devices. When managing settings, it's important to understand what other methods are in use in your environment that can configure your devices, and to avoid conflicts. See [Avoid policy conflicts](#avoid-policy-conflicts) later in this article. -## Configure conditional access +## Configure Conditional Access To protect your devices and corporate resources, you can use Microsoft Entra Conditional Access policies with Intune. -Intune passes the results of your device compliance policies to Microsoft Entra, which then uses conditional access policies to enforce which devices and apps can access your corporate resources. Conditional access policies also help to gate access for devices that you don't manage with Intune, and can use compliance details from [Mobile Threat Defense partners](../protect/mobile-threat-defense.md) you integrate with Intune. +Intune passes the results of your device compliance policies to Microsoft Entra, which then uses Conditional Access policies to enforce which devices and apps can access your corporate resources. Conditional Access policies also help to gate access for devices that you don't manage with Intune, and can use compliance details from [Mobile Threat Defense partners](../protect/mobile-threat-defense.md) you integrate with Intune. -The following are two common methods of using conditional access with Intune: +The following are two common methods of using Conditional Access with Intune: -- **Device-based conditional access**, to ensure only managed and compliant devices can access network resources. -- **App-based conditional access**, which uses app-protection policies to manage access to network resources by users on devices that you don't manage with Intune. +- **Device-based Conditional Access**, to ensure only managed and compliant devices can access network resources. +- **App-based Conditional Access**, which uses app-protection policies to manage access to network resources by users on devices that you don't manage with Intune. -To learn more about using conditional access with Intune, see [Learn about Conditional Access and Intune](../protect/conditional-access.md). +To learn more about using Conditional Access with Intune, see [Learn about Conditional Access and Intune](../protect/conditional-access.md). ## Set up Integration with Microsoft Defender for Endpoint @@ -162,7 +160,7 @@ While Intune can integrate with several [Mobile Threat Defense partners](../prot To manage tasks in the Endpoint security node of the Microsoft Intune admin center, an account must: - Be assigned a license for Intune. -- Have role-based access control (RBAC) permissions equal to the permissions provided by the built-in Intune role of **Endpoint Security Manager**. The *Endpoint Security Manager* role grants access to the Microsoft Intune admin center. This role can be used by individuals who manage security and compliance features, including security baselines, device compliance, conditional access, and Microsoft Defender for Endpoint. +- Have role-based access control (RBAC) permissions equal to the permissions provided by the built-in Intune role of **Endpoint Security Manager**. The *Endpoint Security Manager* role grants access to the Microsoft Intune admin center. This role can be used by individuals who manage security and compliance features, including security baselines, device compliance, Conditional Access, and Microsoft Defender for Endpoint. For more information, see [Role-based access control (RBAC) with Microsoft Intune](../fundamentals/role-based-access-control.md). @@ -276,11 +274,11 @@ If conflicts happen, you can use Intune's built-in tools to identify and resolve - [Troubleshoot policies and profiles in Intune](/troubleshoot/mem/intune/troubleshoot-policies-in-microsoft-intune) - [Monitor your security baselines](../protect/security-baselines-monitor.md#troubleshoot-using-per-setting-status) -## Next steps +## Related content Configure: - [Security baselines](../protect/security-baselines.md) - [Compliance policies](../protect/device-compliance-get-started.md) -- [Conditional access policies](#configure-conditional-access) +- [Conditional Access policies](#configure-conditional-access) - [Integration with Microsoft Defender for Endpoint](../protect/advanced-threat-protection.md) diff --git a/memdocs/intune/protect/epm-deployment-considerations-ki.md b/memdocs/intune/protect/epm-deployment-considerations-ki.md index 105775814dd..34a158a009d 100644 --- a/memdocs/intune/protect/epm-deployment-considerations-ki.md +++ b/memdocs/intune/protect/epm-deployment-considerations-ki.md @@ -52,7 +52,11 @@ We're working to resolve a few scenarios that prevent Windows 10 devices from au Endpoint Privilege Management doesn't support UAC being explicitly disabled. Windows policy controls for UAC Prompt Behavior exist to control the behavior of UAC. If organizations take extra steps to disable UAC outside of the existing policy controls, like disabling Windows services, they might experience issues with Endpoint Privilege Management. -### Organizations use Application Control for Business might experience issues running Endpoint Privilege Management +### Organizations that enable Administrator Protection might experience issues with Endpoint Privilege Management + +Administrator Protection doesn't currently support elevations initiated from Endpoint Privilege Management. If organizations enable Administrator Protection on devices where standard users rely on EPM to handle elevation, the elevation will fail. We're working to resolve this issue in a future release. + +### Organizations using Application Control for Business might experience issues running Endpoint Privilege Management Application Control for Business policies that don't account for the EPM client components could prevent the EPM components from functioning. In order to use EPM with AppControl, ensure that your Application Control policy includes rules that allow EPM to function. For more information about troubleshooting application control, see [WDAC debugging and troubleshooting](/windows/security/application-security/application-control/windows-defender-application-control/operations/wdac-debugging-and-troubleshooting). @@ -116,7 +120,7 @@ Endpoint Privilege Management doesn’t manage elevation requests by users that ### What files can be elevated to administrator? -Endpoint Privilege Management supports executable files including those with the `.msi` extension and `.ps1` PowerShell scripts. +Endpoint Privilege Management supports executable files including those with the `.exe` `.msi` extensions and `.ps1` PowerShell scripts. ### Why doesn't 'Run with elevated access" show on start menu items? diff --git a/memdocs/intune/protect/epm-guidance-for-creating-rules.md b/memdocs/intune/protect/epm-guidance-for-creating-rules.md index 940375b6589..384917494de 100644 --- a/memdocs/intune/protect/epm-guidance-for-creating-rules.md +++ b/memdocs/intune/protect/epm-guidance-for-creating-rules.md @@ -1,12 +1,12 @@ --- title: Guidance for creating elevation rules with Endpoint Privilege Management -description: View guidance on how to create strong rules with Endpoint Privilege Management +description: View guidance on how to create strong file elevation rules with Microsoft Intune Endpoint Privilege Management keywords: author: brenduns ms.author: brenduns manager: dougeby -ms.date: 02/09/2024 -ms.topic: how-to +ms.date: 01/28/2025 +ms.topic: article ms.service: microsoft-intune ms.subservice: protect ms.localizationpriority: high @@ -41,9 +41,9 @@ Endpoint Privilege Management supports your zero-trust journey by helping your o Endpoint Privilege Management rules consist of two fundamental elements: a *detection* and an *elevation action*. -**Detections** are classified as the set of attributes that are used to identify an application or binary. Detections are comprised of attributes such as file name, file version, or attributes of a signature. +**Detections** are defined as the set of attributes used to identify an application or binary. These attributes include file name, file version, and signature properties. -**Elevation actions** are the resulting elevation that occurs after an application or binary has been detected. +**Elevation actions** are the resulting elevation that occurs after an application or binary is detected. It's important when defining *detections* that they're defined to be as *descriptive* as possible. To be descriptive, use strong attributes, or multiple attributes to increase the strength of the detection. The goal when defining detections should be to eliminate the ability for multiple files to fall into the same rule, unless that is explicitly the intent. @@ -58,7 +58,7 @@ File hash can be gathered from the direct binary using the [Get-Filehash PowerSh Certificate rules are a strong type of attribute and should be paired with other attributes. Pairing a certificate with attributes like product name, internal name, and description, drastically improves the security of the rule. These attributes are protected by a files signature, and often indicate specifics about the signed file. > [!CAUTION] -> Using just a certificate and a file name provides very limited protection for misuse of a rule. File names can be changed by any *standard user* provided they have access to the directory where the file resides. This might not be a concern for files that reside in a write-protected directory. +> Using just a certificate and a file name provides very limited protection for misuse of a rule. Any *standard user* with access to a directory where the file resides can change the file name. This issue might not be a concern for files that reside in a write-protected directory. ### Rules containing file name @@ -79,7 +79,6 @@ Example module import steps and output from Get-FileAttributes run against msinf PS C:\Windows\system32> Import-Module 'C:\Program Files\Microsoft EPM Agent\EpmTools\EpmCmdlets.dll' PS C:\Windows\system32> Get-FileAttributes -FilePath C:\Windows\System32\msinfo32.exe -CertOutputPath C:\CertsForMsInfo\ - FileName : msinfo32.exe FilePath : C:\Windows\System32 FileHash : 18C8442887C36F7DB61E77013AAA5A1A6CDAF73D4648B2210F2D51D8B405191D @@ -93,25 +92,25 @@ CompanyName : Microsoft Corporation ``` > [!NOTE] -> The certificate chain for msinfo32.exe is output to the C:\CertsForMsInfo directory listed in the command above. +> The certificate chain for msinfo32.exe is output to the C:\CertsForMsInfo directory listed in the command example. For more information, see [EpmTools PowerShell module](../protect/epm-overview.md#epmtools-powershell-module). ### Controlling child process behavior -Child process behavior allows you to control the context when a child process is created by a process elevated with EPM. This behavior allows you to further restrict processes which normally would be automatically delegated the context of it's parent process. +Child process behavior allows you to control the context when a process elevated with EPM creates a child process. This behavior allows you to further restrict processes which normally would be automatically delegated the context of its parent process. Windows automatically delegates the context of a parent to a child, so take special care in controlling the behavior for your allowed applications. Ensure you evaluate what is needed when you create elevation rules, and implement the principle of least privilege. > [!NOTE] > -> Changing the child process behavior may have compatiability issues with certain applications that expect the default Windows behavior. Make sure you thoroughly test applications when manipulating the child process behavior. +> Changing the child process behavior might have compatibility issues with certain applications that expect the default Windows behavior. Make sure you thoroughly test applications when manipulating the child process behavior. ## Deploying rules created with Endpoint Privilege Management Endpoint Privilege Management rules are deployed like any other policy in Microsoft Intune. This means that rules can be deployed to users or devices, and rules are merged on the client side and selected at run time. Any conflicts are resolved based on the [policy conflict behavior](../protect/epm-policies.md#policy-conflict-handling-for-endpoint-privilege-management). -Rules deployed to a device are applied to *every user* that uses that device. Rules that are deployed to a *user* apply only to that user on each device that they utilize. When an elevation action occurs, rules deployed to the user are given precedence to rules deployed to a device. This behavior allows you to deploy a set of rules to devices that might apply to all users on that device, and a more permissive set of rules to a support admin to allow them to elevate a broader set of applications when they sign-in to the device temporarily. +Rules deployed to a device apply to *every user* that uses that device. Rules that are deployed to a *user* apply only to that user on each device that they utilize. When an elevation action occurs, rules deployed to the user are given precedence to rules deployed to a device. This behavior allows you to deploy a set of rules to devices that might apply to all users on that device, and a more permissive set of rules to a support admin to allow them to elevate a broader set of applications when they sign-in to the device temporarily. *Default Elevation behavior* is used only when no rule match can be found. This also requires use of the *Run with elevated access* right-click menu, which is interpreted as a user *explicitly* asking for an application to be elevated. @@ -122,9 +121,9 @@ Endpoint Privilege Management and Windows built-in user account control (UAC) ar When moving users to run as standard users and utilizing Endpoint Privilege Management, you might choose to change the default UAC behavior for standard users. This change can reduce confusion when an application requires elevation and create a better end user experience. Examine [behavior of the elevation prompt for standard users](/windows/security/identity-protection/user-account-control/user-account-control-security-policy-settings#user-account-control-behavior-of-the-elevation-prompt-for-standard-users) for more information. > [!NOTE] -> Endpoint Privilege Management will not interfere with user account control actions (or UAC) being run by an Administrator on the device. It is possible to create rules that apply to Administrators on the device, so special considerations should be given to rules that are applied to all users on a device and the impact on users with Administrator rights. +> Endpoint Privilege Management doesn't interfere with user account control actions (or UAC) that's run by an Administrator on the device. It's possible to create rules that apply to Administrators on the device, so give special consideration to rules that are applied to all users on a device and the impact on users with Administrator rights. -## Next steps +## Related content - [Learn about Endpoint Privilege Management](../protect/epm-overview.md) - [Configure policies for Endpoint Privilege Management](../protect/epm-policies.md) diff --git a/memdocs/intune/protect/epm-overview.md b/memdocs/intune/protect/epm-overview.md index 00a6c37adbd..40c96a5a485 100644 --- a/memdocs/intune/protect/epm-overview.md +++ b/memdocs/intune/protect/epm-overview.md @@ -65,6 +65,7 @@ Endpoint Privilege Management has the following requirements: Endpoint Privilege Management supports the following operating systems: +- Windows 11, version 24H2 - Windows 11, version 23H2 (22631.2506 or later) with [KB5031455](https://support.microsoft.com/topic/october-31-2023-kb5031455-os-builds-22621-2506-and-22631-2506-preview-6513c5ec-c5a2-4aaf-97f5-44c13d29e0d4) - Windows 11, version 22H2 (22621.2215 or later) with [KB5029351](https://support.microsoft.com/topic/august-22-2023-kb5029351-os-build-22621-2215-preview-9af25662-083a-43f5-b3a7-975fe25cc692) - Windows 11, version 21H2 (22000.2713 or later) with [KB5034121](https://support.microsoft.com/topic/january-9-2024-kb5034121-os-build-22000-2713-f5847e32-0b71-4151-8190-54d3e36386f0) @@ -74,6 +75,7 @@ Endpoint Privilege Management supports the following operating systems: > [!IMPORTANT] > > - Elevation settings policy will show as not applicable for devices that don't run a supported operating system version. +> - Endpoint Privilege Management is only compatible with 64-bit Operating System Architectures. Windows on ARM is not currently supported. > - Endpoint Privilege Management has some new networking requirements, see [Network Endpoints for Intune](../../intune/fundamentals/intune-endpoints.md#microsoft-intune-endpoint-privilege-management). ## Government cloud support diff --git a/memdocs/intune/protect/epm-policies.md b/memdocs/intune/protect/epm-policies.md index 1753d2f5700..c878873eb3d 100644 --- a/memdocs/intune/protect/epm-policies.md +++ b/memdocs/intune/protect/epm-policies.md @@ -261,7 +261,10 @@ Use either of the following methods to create new elevation rules, which are add 1. For the rule, configure the elevation **Type** and **Child process behavior**, and then select **OK**. The policy is updated with the new rule. 2. After the rule is added to the policy, you can edit the policy to gain access to the rule and then modify it to make additional configurations if needed. - + + **Require the same file path as this elevation:** + When you select this checkbox, the File Path field in the rule is set to the file path as seen in the report. If the checkbox isn’t selected, the path remains empty. + :::image type="content" source="./media/epm-policies/create-a-rule.png" alt-text="Image from the admin center UI of the create a rule pane." lightbox="./media/epm-policies/create-a-rule.png"::: ### Manually configure elevation rules for Windows elevation rules policy diff --git a/memdocs/intune/protect/exchange-connector-install.md b/memdocs/intune/protect/exchange-connector-install.md index 111c9470bc3..a8113173ad6 100644 --- a/memdocs/intune/protect/exchange-connector-install.md +++ b/memdocs/intune/protect/exchange-connector-install.md @@ -45,11 +45,11 @@ To help protect access to Exchange, Intune relies on an on-premises component th > [!IMPORTANT] > Intune will be removing support for the Exchange On-Premises Connector feature from the Intune service beginning in the 2007 (July) release. Existing customers with an active connector will be able to continue with the current functionality at this time. New customers and existing customers that do not have an active connector will no longer be able to create new connectors or manage Exchange ActiveSync (EAS) devices from Intune. For those tenants, Microsoft recommends the use of Exchange [hybrid modern authentication (HMA)](/office365/enterprise/hybrid-modern-auth-overview) to protect access to Exchange on-premises. HMA enables both Intune App Protection Policies (also known as MAM) and Conditional Access through Outlook Mobile for Exchange on-premises. -The information in this article can help you install and monitor the Intune Exchange connector. You can use the connector with your [conditional access policies](conditional-access-exchange-create.md) to allow or block access to your Exchange on-premises mailboxes. +The information in this article can help you install and monitor the Intune Exchange connector. You can use the connector with your [Conditional Access policies](conditional-access-exchange-create.md) to allow or block access to your Exchange on-premises mailboxes. The connector is installed and runs on your on-premises hardware. It discovers devices that connect to Exchange, communicating device information to the Intune service. The connector allows or blocks devices based on whether the devices are enrolled and compliant. These communications use the HTTPS protocol. -When a device tries to access your on-premises Exchange server, the Exchange connector maps Exchange ActiveSync (EAS) records in Exchange Server to Intune records to make sure the device enrolls with Intune and complies with your device's policies. Depending on your conditional access policies, the device can be allowed or blocked. For more information, see [What are common ways to use conditional access with Intune?](conditional-access-intune-common-ways-use.md) +When a device tries to access your on-premises Exchange server, the Exchange connector maps Exchange ActiveSync (EAS) records in Exchange Server to Intune records to make sure the device enrolls with Intune and complies with your device's policies. Depending on your Conditional Access policies, the device can be allowed or blocked. For more information, see [What are common ways to use Conditional Access with Intune?](conditional-access-intune-common-ways-use.md) Both *discovery* and *allow and block* operations are done by using standard Exchange PowerShell cmdlets. These operations use the service account that's provided when the Exchange connector is initially installed. @@ -62,9 +62,9 @@ Follow these general steps to set up a connection that enables Intune to communi 3. Validate the Exchange connection. 4. Repeat these steps for each additional Exchange organization you want to connect to Intune. -## How conditional access for Exchange on-premises works +## How Conditional Access for Exchange on-premises works -Conditional access for Exchange on-premises works differently than Azure Conditional Access based policies. You install the Intune Exchange on-premises connector to directly interact with Exchange server. The Intune Exchange connector pulls in all the Exchange Active Sync (EAS) records that exist at the Exchange server so Intune can take these EAS records and map them to Intune device records. These records are devices enrolled and recognized by Intune. This process allows or blocks e-mail access. +Conditional Access for Exchange on-premises works differently than Azure Conditional Access based policies. You install the Intune Exchange on-premises connector to directly interact with Exchange server. The Intune Exchange connector pulls in all the Exchange Active Sync (EAS) records that exist at the Exchange server so Intune can take these EAS records and map them to Intune device records. These records are devices enrolled and recognized by Intune. This process allows or blocks e-mail access. If the EAS record is new and Intune isn't aware of it, Intune issues a cmdlet (pronounced "command-let") that directs the Exchange server to block access to e-mail. Following are more details on how this process works: @@ -87,7 +87,7 @@ If the EAS record is new and Intune isn't aware of it, Intune issues a cmdlet (p 8. The Microsoft Entra Device Registration saves the device state information. -9. If the user meets the conditional access policies, Intune issues a cmdlet through the Intune Exchange connector that allows the mailbox to sync. +9. If the user meets the Conditional Access policies, Intune issues a cmdlet through the Intune Exchange connector that allows the mailbox to sync. 10. Exchange server sends the notification to EAS client so the user can access e-mail. @@ -184,7 +184,7 @@ Follow these steps to install the Intune Exchange connector. If you have multipl 4. In the **User (domain\user)** and **Password** fields, enter credentials to connect to your Exchange server. The account you specify must have a license to use Intune. -5. Provide credentials to send notifications to a user's Exchange Server mailbox. This user can be dedicated to just notifications. The notifications user needs an Exchange mailbox to send notifications by email. You can configure these notifications by using conditional access policies in Intune. +5. Provide credentials to send notifications to a user's Exchange Server mailbox. This user can be dedicated to just notifications. The notifications user needs an Exchange mailbox to send notifications by email. You can configure these notifications by using Conditional Access policies in Intune. Make sure the Autodiscover service and Exchange Web Services are configured on the Exchange CAS. For more information, see [Client Access server](/Exchange/architecture/client-access/client-access?view=exchserver-2019&preserve-view=true). @@ -288,9 +288,9 @@ In addition to the in-console status, you can use the [System Center Operations An Intune Exchange connector automatically synchronizes EAS and Intune device records regularly. If the compliance status of a device changes, the automatic sync process regularly updates records so that device access can be blocked or allowed. -- A **quick sync** occurs regularly, several times a day. A quick sync retrieves device information for Intune-licensed and on-premises Exchange users that are targeted for conditional access and that have changed since the last sync. +- A **quick sync** occurs regularly, several times a day. A quick sync retrieves device information for Intune-licensed and on-premises Exchange users that are targeted for Conditional Access and that have changed since the last sync. -- A **full sync** occurs once daily by default. A full sync retrieves device information for all Intune-licensed and on-premises Exchange users that are targeted for conditional access. A full sync also retrieves Exchange Server information and ensures that the configuration that Intune specifies is updated on the Exchange server. +- A **full sync** occurs once daily by default. A full sync retrieves device information for all Intune-licensed and on-premises Exchange users that are targeted for Conditional Access. A full sync also retrieves Exchange Server information and ensures that the configuration that Intune specifies is updated on the Exchange server. You can force a connector to run a sync by using the **Quick Sync** or **Full Sync** options on the Intune dashboard: @@ -305,4 +305,4 @@ You can force a connector to run a sync by using the **Quick Sync** or **Full Sy ## Next steps -Create a [conditional access policy for on-premises Exchange servers](conditional-access-exchange-create.md). +Create a [Conditional Access policy for on-premises Exchange servers](conditional-access-exchange-create.md). diff --git a/memdocs/intune/protect/jamf-mtd-connector.md b/memdocs/intune/protect/jamf-mtd-connector.md index 16ac3d814cb..0af8824bf64 100644 --- a/memdocs/intune/protect/jamf-mtd-connector.md +++ b/memdocs/intune/protect/jamf-mtd-connector.md @@ -2,13 +2,12 @@ # required metadata title: Set up Jamf Mobile Security with Intune -titleSuffix: Intune on Azure description: How to set up Jamf Mobile Threat Defense with Microsoft Intune to control mobile device access to your corporate resources. keywords: author: brenduns ms.author: brenduns manager: dougeby -ms.date: 02/28/2024 +ms.date: 01/28/2025 ms.topic: how-to ms.service: microsoft-intune ms.subservice: protect @@ -33,14 +32,14 @@ ms.collection: # Jamf Mobile Threat Defense connector with Intune -Control mobile device access to corporate resources using conditional access based on risk assessment conducted by Jamf. Jamf is a Mobile Threat Defense (MTD) solution that integrates with Microsoft Intune. Risk is assessed based on telemetry collected from devices by the Jamf service, including: +Control mobile device access to corporate resources using Conditional Access based on risk assessment conducted by Jamf. Jamf is a Mobile Threat Defense (MTD) solution that integrates with Microsoft Intune. Risk is assessed based on telemetry collected from devices by the Jamf service, including: - Operating system vulnerabilities - Malicious apps installed - Malicious network profiles - Cryptojacking -You can configure *conditional access* policies that are based on Jamf's risk assessment, enabled through Intune device compliance policies. Risk assessment policy can allow or block noncompliant devices from accessing corporate resources based on detected threats. +You can configure *Conditional Access* policies that are based on Jamf's risk assessment, enabled through Intune device compliance policies. Risk assessment policy can allow or block noncompliant devices from accessing corporate resources based on detected threats. ## How do Intune and Jamf Mobile Threat Defense help protect your company resources? @@ -54,7 +53,7 @@ Jamf updates Intune with each device’s latest threat level (Secure, Low, Mediu These categories and their associated threat levels are configurable in Jamf Security Cloud portal such that the total calculated threat level for each device is customizable per your organization’s security requirements. With threat level in hand, there are two Intune policy types that make use of this information to manage access to corporate data: -- Using **Device Compliance Policies** with Conditional Access, administrators set policies to automatically mark a managed device as “out of compliance” based upon the Jamf-reported threat level. This compliance flag subsequently drives Conditional Access Policies to allow or deny access to applications that utilize modern authentication. See [Create Mobile Threat Defense (MTD) device compliance policy](../protect/mtd-device-compliance-policy-create.md) with Intune for configuration details. +- Using **Device Compliance Policies** with Conditional Access, administrators set policies to automatically mark a managed device as “out of compliance” based upon the Jamf-reported threat level. This compliance flag empowers Conditional Access policies to allow or deny access to applications that utilize modern authentication. See [Create Mobile Threat Defense (MTD) device compliance policy](../protect/mtd-device-compliance-policy-create.md) with Intune for configuration details. - Using **App Protection Policies** with Conditional Launch, administrators can set policies that are enforced at the native app level (for example, Android and iOS/iPad OS apps like Outlook, OneDrive, etc.) based upon the Jamf-reported threat level. These policies can also be used for unenrolled devices with MAM managed applications to provide uniform policy across all device platforms and ownership modes. See [Create Mobile Threat Defense app protection policy](../protect/mtd-app-protection-policy.md) with Intune for configuration details. @@ -129,7 +128,7 @@ When the Jamf Mobile Threat Defense solution considers a device to be infected: :::image type="content" source="./media/jamf-mtd-connector/jamf-mobile-app-policy-remediated.png" alt-text=" Product flow for App protection policies to grant access after malware is remediated."::: -## Next steps +## Related content - [Integrate Jamf with Intune](jamf-mtd-connector-integration.md) - [Set up Jamf apps](mtd-apps-ios-app-configuration-policy-add-assign.md) diff --git a/memdocs/intune/protect/lookout-mtd-connector-integration.md b/memdocs/intune/protect/lookout-mtd-connector-integration.md index a654e1d033a..9d1a2975a3d 100644 --- a/memdocs/intune/protect/lookout-mtd-connector-integration.md +++ b/memdocs/intune/protect/lookout-mtd-connector-integration.md @@ -138,7 +138,7 @@ In the Lookout MES Console, select **System** > **Manage Enrollment** > **Enroll - For **Disconnected Status**, specify the number of days before an unconnected device is marked as disconnected. - Disconnected devices are considered as noncompliant and are blocked from accessing your company applications based on the Intune conditional access policies. You can specify values between 1 and 90 days. + Disconnected devices are considered as noncompliant and are blocked from accessing your company applications based on the Intune Conditional Access policies. You can specify values between 1 and 90 days. ![Lookout enrollment settings on the System module](./media/lookout-mtd-connector-integration/lookout-console-enrollment-settings.png) diff --git a/memdocs/intune/protect/managed-software-updates-ios-macos.md b/memdocs/intune/protect/managed-software-updates-ios-macos.md index b74d79f5da1..b555cb80e68 100644 --- a/memdocs/intune/protect/managed-software-updates-ios-macos.md +++ b/memdocs/intune/protect/managed-software-updates-ios-macos.md @@ -171,7 +171,26 @@ Managed software updates use the same reporting as device configuration policies > [!IMPORTANT] > A policy that reports Success only means that the configuration successfully installed on the device. Monitor the OS version of targeted devices to ensure that they update. After devices have updated to a later OS version than configured in the policy, the policy will report error as the device sees this as an attempt to downgrade. It's recommended to remove the older OS version policy from devices in this state. -## Delay visibility of updates +## Using the Software Update Settings declarative configuration + +When you configure managed software updates, you might want to manage aspects of the software update process leading up to the enforcement of an update. Using this configuration, you can: + +- Require that an admin or standard user can perform updates on the device + +- Control how users can manually interact with software update settings like automatic download and install or the behavior of Rapid Security Responses + +- Hide updates from users for a specified time period + +- Suppress update notifications up to one hour before the enforcement deadline + +- Control whether users are allowed to update to the latest major update, latest minor update, or are offered both. + +Previously in MDM, these settings were spread across multiple payloads such as Restrictions, Managed Settings, and Software Update. As of August 2024, it's recommended to use the DDM-based Software Update Settings configuration to manage updates. To create a Software Update Settings policy, go to the Settings catalog > Declarative Device Management (DDM) > Software Update Settings. More information on these settings is available in the documentation section for the [Software Update Settings declarative configuration](/mem/intune/configuration/apple-settings-catalog-configurations). + +## Delay visibility of updates using MDM + +> [!NOTE] +> As of August 2024, it's recommended to use the DDM-based Software Update Settings configuration to manage update settings such as deferrals. When you configure managed software updates, you might want to hide updates from users for a specified time period. To hide the updates, use a settings catalog policy that configures an update restriction. @@ -192,3 +211,4 @@ To create a restrictions policy, go to the **Settings catalog** > **Restrictions - [macOS software update policies in Intune](software-updates-macos.md) - [Software updates planning guide for supervised iOS/iPadOS devices in Intune](software-updates-guide-ios-ipados.md) - [Software updates planning guide for managed macOS devices in Intune](software-updates-guide-macos.md) + diff --git a/memdocs/intune/protect/mde-security-integration.md b/memdocs/intune/protect/mde-security-integration.md index 40b3923dadb..2424bd2c28c 100644 --- a/memdocs/intune/protect/mde-security-integration.md +++ b/memdocs/intune/protect/mde-security-integration.md @@ -1,13 +1,13 @@ --- # required metadata -title: Use Intune to manage Microsoft Defender settings on devices that aren't enrolled with Intune +title: Learn about using Intune to manage Microsoft Defender settings on devices that aren't enrolled with Intune description: Learn how to use Intune policy to manage Microsoft Defender security settings on devices that aren't enrolled with Microsoft Intune. keywords: author: brenduns ms.author: brenduns manager: dougeby -ms.date: 10/30/2024 +ms.date: 01/16/2025 ms.topic: how-to ms.service: microsoft-intune ms.subservice: protect @@ -30,7 +30,7 @@ ms.reviewer: laarrizz --- -# Use Intune endpoint security policies to manage Microsoft Defender for Endpoint on devices not enrolled with Intune +# Learn how to use Intune endpoint security policies to manage Microsoft Defender for Endpoint on devices that are not enrolled with Intune When you integrate Microsoft Intune with Microsoft Defender for Endpoint, you can use Intune endpoint security policies to manage the Defender security settings on devices that aren't enrolled with Intune. This capability is known as *Defender for Endpoint security settings management*. @@ -66,7 +66,7 @@ When a supported device onboards to Microsoft Defender for Endpoint: - The device is surveyed for an existing Microsoft Intune presence, which is a mobile device management (MDM) enrollment to Intune. - Devices without an Intune presence enable the security settings management feature. - For devices that aren't fully Microsoft Entra registered, a synthetic device identity is created in Microsoft Entra ID that allows the device to retrieve policies. Fully registered devices use their current registration. -- Policies retrieved from Microsoft Intune are enforced on the device by Microsoft Defender for Endpoint. +- On the device, Microsoft Defender for Endpoint enforces policies that are retrieved from Microsoft Intune. ### Government cloud support @@ -88,6 +88,10 @@ Devices must have access to the following endpoint: - `*.dm.microsoft.com` - The use of a wildcard supports the cloud-service endpoints that are used for enrollment, check-in, and reporting, and which can change as the service scales. +> [!NOTE] +> +> Endpoints for government customers are located at [Network endpoints for US government deployments](../fundamentals/intune-us-government-endpoints.md) + ### Supported platforms Policies for Microsoft Defender for Endpoint security management are supported for the following device platforms: @@ -117,6 +121,7 @@ To confirm the version of the Defender agent, in the Defender portal go to the d With [Microsoft Defender for Endpoint for macOS](/microsoft-365/security/defender-endpoint/microsoft-defender-endpoint-mac#system-requirements) agent version **101.23052.0004** or later, security settings management supports the following macOS versions: +- macOS 15 (Sequoia) - macOS 14 (Sonoma) - macOS 13 (Ventura) - macOS 12 (Monterey) @@ -137,7 +142,7 @@ To confirm the version of the Defender agent, in the Defender portal go to the d - Windows Server 2019 (with [KB5025229](https://support.microsoft.com/topic/april-11-2023-kb5025229-os-build-17763-4252-e8ead788-2cd3-4c9b-8c77-d677e2d8744f)) - Windows Server 2019 Core (with the [Server Core App Compatibility Feature on Demand](/windows-server/get-started/server-core-app-compatibility-feature-on-demand) installed) - Windows Server 2022, including Server Core (with [KB5025230](https://support.microsoft.com/topic/april-11-2023-security-update-kb5025230-5048ddfb-7bf3-4e6c-b29a-7b44b789d282)) -- Domain controllers (preview). See important information in [Use of security settings management on domain controllers](#use-of-security-settings-management-on-domain-controllers) (in this article). +- Domain controllers. See important information in [Use of security settings management on domain controllers](#use-of-security-settings-management-on-domain-controllers) (in this article). Security settings management doesn't work on and isn't supported with the following devices: @@ -154,7 +159,7 @@ To use security settings management, you need: > [!NOTE] > - > **Exception**: If you have access to Microsoft Defender for Endpoint *only* through Microsoft Defender for servers (part of Microsoft Defender for Cloud, formerly Azure Security Center), the security settings management functionality isn't available. You will need to have at least one Microsoft Defender for Endpoint (user) subscription license active. + > **Exception**: If you have access to Microsoft Defender for Endpoint *only* through Microsoft Defender for servers (part of Microsoft Defender for Cloud, formerly Azure Security Center), the security settings management functionality isn't available. You must have at least one Microsoft Defender for Endpoint (user) subscription license active. The Endpoint security node is where you configure and deploy policies to manage Microsoft Defender for Endpoint for your devices and monitor device status. @@ -162,7 +167,7 @@ To use security settings management, you need: ### Role-based access controls (RBAC) -For guidance on assigning the right level of permissions and rights to administrators who manage Intune endpoint security policies from within the Intune admin center, see [Assign-role-based-access-controls-for-endpoint-security-policy](endpoint-security-policy.md#assign-role-based-access-controls-for-endpoint-security-policy). +For guidance on assigning the right level of permissions and rights to administrators who manage Intune endpoint security policies from within the Intune admin center, see [Assign role-based access controls for endpoint security policy](endpoint-security-policy.md#assign-role-based-access-controls-for-endpoint-security-policy). ## Architecture @@ -179,11 +184,11 @@ The following diagram is a conceptual representation of the Microsoft Defender f > [!IMPORTANT] > -> Security settings management uses a synthetic registration for devices that don't fully register in Microsoft Entra ID, and drops the Microsoft Entra hybrid join prerequisite. With this change, Windows devices that previously had enrollment errors will begin onboarding to Defender and then receive and process the security settings management policies. +> Security settings management uses a synthetic registration for devices that don't fully register in Microsoft Entra ID, and drops the Microsoft Entra hybrid join prerequisite. With this change, Windows devices that previously had enrollment errors begin onboarding to Defender and then receive and process the security settings management policies. > -> To filter for devices that were unable to enroll due to failing to meet the Microsoft Entra hybrid join prerequisite, navigate to the **Devices** list in the Microsoft Defender portal, and filter by enrollment status. Because these devices are not fully registered, their device attributes show **MDM** = **Intune** and **Join Type** = **Blank**. These devices will now enroll with security settings management using the synthetic registration. +> To filter for devices that were unable to enroll due to failing to meet the Microsoft Entra hybrid join prerequisite, navigate to the **Devices** list in the Microsoft Defender portal, and filter by enrollment status. Because these devices aren't fully registered, their device attributes show **MDM** = **Intune** and **Join Type** = **Blank**. These devices now enroll with security settings management using the synthetic registration. > -> After enrolling these devices appear in the device lists for Microsoft Defender, Microsoft Intune, and Microsoft Entra portals. While the devices won't be fully registered with Microsoft Entra, their synthetic registration counts as one device object. +> After enrolling these devices appear in the device lists for Microsoft Defender, Microsoft Intune, and Microsoft Entra portals. While the devices don't fully register with Microsoft Entra, their synthetic registration counts as one device object. @@ -205,7 +210,7 @@ In the Microsoft Intune admin center, go to the All Devices page. Devices enroll > [!TIP] > -> In June 2023, security settings management began using synthetic registration for devices that don't fully register in Microsoft Entra. With this change, devices that previously had enrollment errors will begin onboarding to Defender and then receive and process the security settings management policies. +> In June 2023, security settings management began using synthetic registration for devices that don't fully register in Microsoft Entra. With this change, devices that previously had enrollment errors begin onboarding to Defender and then receive and process the security settings management policies. ### What to expect in the Microsoft Azure portal @@ -219,7 +224,7 @@ To ensure that all devices enrolled in Defender for Endpoint security settings m > > From July 2023 to September 25, 2023, security settings management ran an opt-in public preview that introduced new behavior for devices that were managed and enrolled to the scenario. Starting on September 25, 2023, the public preview behavior became generally available and now applies to all tenants that use security settings management. > -> If you used security settings management prior to September 25, 2023, and did not join the opt-in public preview that ran from July 2023 to September 25, 2023, review your Microsoft Entra groups that rely on system labels to make changes that will identify new devices you manage with security settings management. This is because prior to September 25, 2023, devices not managed through the opt-in public preview would use the following system labels (tags) of *MDEManaged* and *MDEJoined* to identify managed devices. These two system labels are no longer supported and are no longer added to devices that enroll. +> If you used security settings management prior to September 25, 2023, and didn't join the opt-in public preview that ran from July 2023 to September 25, 2023, review your Microsoft Entra groups that rely on system labels to make changes that will identify new devices you manage with security settings management. This is because prior to September 25, 2023, devices not managed through the opt-in public preview would use the following system labels (tags) of *MDEManaged* and *MDEJoined* to identify managed devices. These two system labels are no longer supported and are no longer added to devices that enroll. Use the following guidance for your Dynamic groups: @@ -233,7 +238,7 @@ Also, when configuring security settings management, if you intend to manage ent Microsoft Intune includes several methods and policy types to manage the configuration of Defender for Endpoint on devices. The following table identifies the Intune policies and profiles that support deployment to devices managed by Defender for Endpoint security settings management and can help you identify if this solution is right for your needs. -When you deploy an endpoint security policy that's supported for both *Defender for Endpoint security settings management* and *Microsoft Intune*, a single instance of that policy can be processed by: +When you deploy an endpoint security policy that's supported for both *Defender for Endpoint security settings management* and *Microsoft Intune*, a single instance of that policy is processed by: - Devices supported through security settings management (Microsoft Defender) - Devices that are managed by either Intune or Configuration Manager. @@ -271,22 +276,24 @@ To support use with Microsoft Defender security settings management, your polici | Antivirus | Defender Update controls | ![Supported](./media/mde-security-integration/green-check.png) | ![Supported](./media/mde-security-integration/green-check.png) | | Antivirus | Microsoft Defender Antivirus | ![Supported](./media/mde-security-integration/green-check.png) | ![Supported](./media/mde-security-integration/green-check.png) | | Antivirus | Microsoft Defender Antivirus exclusions| ![Supported](./media/mde-security-integration/green-check.png) | ![Supported](./media/mde-security-integration/green-check.png) | -| Antivirus | Windows Security Experience | *Note 1* | ![Supported](./media/mde-security-integration/green-check.png) | +| Antivirus | Windows Security Experience | ![Supported](./media/mde-security-integration/green-check.png) *See note* ***2*** | ![Supported](./media/mde-security-integration/green-check.png) | | Attack Surface Reduction | Attack Surface Reduction Rules | ![Supported](./media/mde-security-integration/green-check.png) | ![Supported](./media/mde-security-integration/green-check.png) | -|Attack Surface Reduction|Device Control | *Note 1* | ![Supported](./media/mde-security-integration/green-check.png) | +|Attack Surface Reduction|Device Control | *Note* ***1*** | ![Supported](./media/mde-security-integration/green-check.png) | | Endpoint detection and response | Endpoint detection and response | ![Supported](./media/mde-security-integration/green-check.png)| ![Supported](./media/mde-security-integration/green-check.png)| | Firewall | Firewall | ![Supported](./media/mde-security-integration/green-check.png) | ![Supported](./media/mde-security-integration/green-check.png) | | Firewall | Firewall Rules | ![Supported](./media/mde-security-integration/green-check.png) | ![Supported](./media/mde-security-integration/green-check.png) | ***1*** - This profile is visible in the Defender portal but isn't supported for devices managed only by Microsoft Defender through the Microsoft Defender security settings management scenario. This profile is supported only for devices managed by Intune. +***2*** - This profile is visible in the Defender portal. Support of this profile for devices managed only by Microsoft Defender through the Microsoft Defender security settings management scenario is delayed until on or around January 18, 2025. When support for this scenario becomes available, this note will be removed. + **Each Intune endpoint security profile** is a discrete group of settings intended for use by security admins who focus on protecting devices in your organization. The following are descriptions of the profiles that are supported by the security settings management scenario: - **[Antivirus](endpoint-security-antivirus-policy.md)** policies manage the security configurations found in Microsoft Defender for Endpoint. > [!NOTE] > - > While endpoints do not require a restart in order to apply modified settings or new policies, we are aware of an issue where the *AllowOnAccessProtection* and *DisableLocalAdminMerge* settings might at times require end users to restart their devices for these settings to update. We are currently investigating this issue in order to provide a resolution. + > While endpoints don't require a restart in order to apply modified settings or new policies, there's an issue where the *AllowOnAccessProtection* and *DisableLocalAdminMerge* settings might at times require end users to restart their devices for these settings to update. This issue is under investigation in order to provide a resolution. - **[Attack surface reduction (ASR)](endpoint-security-asr-policy.md)** policies focus on minimizing the places where your organization is vulnerable to cyberthreats and attacks. With security settings management, ASR rules apply to devices that run *Windows 10*, *Windows 11*, and *Windows Server*. @@ -303,7 +310,7 @@ To support use with Microsoft Defender security settings management, your polici - **[Firewall](endpoint-security-firewall-policy.md)** policies focus on the Defender firewall on your devices. -- **Firewall Rules** are a type of profile for [Firewall](endpoint-security-firewall-policy.md) policy that are comprised of are granular rules for Firewalls, including specific ports, protocols, applications, and networks. +- **Firewall Rules** are a type of profile for [Firewall](endpoint-security-firewall-policy.md) policy that is comprised of granular rules for Firewalls, including specific ports, protocols, applications, and networks. ## Configure your tenant to support Defender for Endpoint security settings management @@ -325,15 +332,11 @@ In the Microsoft Defender portal, as a security administrator: 2. Initially, we recommend testing the feature for each platform by selecting the platforms option for **On tagged devices**, and then tagging the devices with the `MDE-Management` tag. - > [!IMPORTANT] - > - > Use of [*Microsoft Defender for Endpoint's Dynamic tag capability*](/microsoft-365/security/defender/configure-asset-rules?view=o365-worldwide&preserve-view=true) to tag devices with *MDE-Management* isn't currently supported with security settings management. Devices tagged through this capability won't successfully enroll. This issue remains under investigation. - > [!TIP] > > Use the proper device tags to test and validate your rollout on a small number of devices. > - > When deploying to the *All devices* group, any device that falls into the scope configured will automatically be enrolled. + > When you deploy to the *All devices* group, any device that falls into the scope configured will automatically be enrolled. > > While most devices complete enrollment and apply assigned policy within a few minutes, a device can sometimes take up to 24 hours to complete enrollment. @@ -343,7 +346,7 @@ In the Microsoft Defender portal, as a security administrator: > [!TIP] > - > To ensure your Microsoft Defender portal users have consistent permissions across portals, if not already provided, request that your IT administrator grant them the Microsoft Intune **Endpoint Security Manager** [built-in RBAC role](../fundamentals/role-based-access-control.md). + > To ensure your Microsoft Defender portal users have consistent permissions across portals, if not already provided, request that your IT administrator grants them the Microsoft Intune **Endpoint Security Manager** [built-in RBAC role](../fundamentals/role-based-access-control.md). ### Configure Intune @@ -363,7 +366,7 @@ Microsoft Defender for Endpoint supports several options to onboard devices. For ## Coexistence with Microsoft Configuration Manager -In some environments it might be desired to use security settings management with devices managed by Configuration Manager. If you use both, you need to control policy through a single channel. Use of more than one channel creates the opportunity for conflicts and undesired results. +In some environments, it might be desired to use security settings management with devices managed by Configuration Manager. If you use both, you need to control policy through a single channel. Use of more than one channel creates the opportunity for conflicts and undesired results. To support this, configure the *Manage Security settings using Configuration Manager* toggle to *Off*. Sign in to the [Microsoft Defender portal](https://security.microsoft.com/) and go to **Settings** > **Endpoints** > **Configuration Management** > **Enforcement Scope**: @@ -377,7 +380,7 @@ After devices onboard to Defender for Endpoint, you'll need to create device gro 2. Go to **Devices** > **All devices**, and then select the column **Managed by** to sort the view of devices. - Devices that onboard to Microsoft Defender for Endpoint and have registered but aren't managed by Intune display **Microsoft Defender for Endpoint** in the *Managed by* column. These are the devices that can receive policy for security management for Microsoft Defender for Endpoint. + Devices that onboard to Microsoft Defender for Endpoint and are registered but aren't managed by Intune display **Microsoft Defender for Endpoint** in the *Managed by* column. These are the devices that can receive policy for security management for Microsoft Defender for Endpoint. Starting on September 25, 2023, devices that use security management for Microsoft Defender for Endpoint can no longer be identified by using the following system labels: @@ -386,7 +389,7 @@ After devices onboard to Defender for Endpoint, you'll need to create device gro Instead of using system labels, you can use the management type attribute, and configure it to **MicrosoftSense**. -You can create groups for these devices [in Microsoft Entra](/azure/active-directory/fundamentals/active-directory-groups-create-azure-portal) or [from within the Microsoft Intune admin center](../fundamentals/groups-add.md). When creating groups, you can use the **OS** value for a device if you're deploying policies to devices running Windows Server vs devices that run a client version of Windows: +You can create groups for these devices [in Microsoft Entra](/azure/active-directory/fundamentals/active-directory-groups-create-azure-portal) or [from within the Microsoft Intune admin center](../fundamentals/groups-add.md). When creating groups, you can use the **OS** value for a device if you're deploying policies to devices running Windows Server vs devices that run a client version of Windows: - **Windows 10 and Windows 11** - The deviceOSType or OS displays as *Windows* - **Windows Server** - The deviceOSType or OS displays as *Windows Server* @@ -411,12 +414,12 @@ You can create groups for these devices [in Microsoft Entra](/azure/active-direc > > Custom scripts and [Microsoft Entra dynamic device groups](/azure/active-directory/enterprise-users/groups-dynamic-membership) created before this change that specify rules that reference only *Windows* might exclude *Windows Servers* when used with the Security Management for Microsoft Defender for Endpoint solution. For example: > -> - If you have a rule that uses the `equals` or `not equals` operator to identify *Windows*, this change will affect your rule. That is because previously both *Windows* and *Windows Server* were reported as *Windows*. To continue to include both, you must update the rule to also reference *Windows Server*. -> - If you have a rule that use the `contains` or `like` operator to specify *Windows*, then the rule won't be affected by this change. These operators can find both *Windows* and *Windows Server*. +> - If you have a rule that uses the `equals` or `not equals` operator to identify *Windows*, this change affects your rule. That is because previously both *Windows* and *Windows Server* were reported as *Windows*. To continue to include both, you must update the rule to also reference *Windows Server*. +> - If you have a rule that uses the `contains` or `like` operator to specify *Windows*, then your rule isn't affected by this change. These operators can find both *Windows* and *Windows Server*. > [!TIP] > -> Users that are delegated the ability to manage endpoint security settings may not have the ability to implement tenant-wide configurations in Microsoft Intune. Check with your Intune administrator for more information on roles and permissions in your organization. +> Users that are delegated the ability to manage endpoint security settings might not have the ability to implement tenant-wide configurations in Microsoft Intune. Check with your Intune administrator for more information on roles and permissions in your organization. ## Deploy policy @@ -427,7 +430,7 @@ For the list of policy and profile combinations supported for security settings > [!TIP] > Avoid deploying multiple policies that manage the same setting to a device. > -> Microsoft Intune supports deploying multiple instances of each endpoint security policy type to the same device, with each policy instance being received by the device separately. Therefore, a device might receive separate configurations for the same setting from different policies, which results in a conflict. Some settings (like Antivirus Exclusions) will merge on the client and apply successfully. +> Microsoft Intune supports deploying multiple instances of each endpoint security policy type to the same device, with each policy instance being received by the device separately. Therefore, a device might receive separate configurations for the same setting from different policies, which results in a conflict. Some settings (like Antivirus Exclusions) merge on the client and apply successfully. 1. Sign in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431). @@ -457,9 +460,9 @@ For the list of policy and profile combinations supported for security settings > [!TIP] > - > - Assignment filters are not supported for devices managed by security settings management. + > - Assignment filters aren't supported for devices managed by security settings management. > - Only *Device Objects* are applicable for Microsoft Defender for Endpoint management. Targeting users is not supported. - > - Policies configured will apply to both Microsoft Intune and Microsoft Defender for Endpoint clients. + > - Policies apply to both Microsoft Intune and Microsoft Defender for Endpoint clients. 8. Complete the policy creation process and then on the **Review + create** page, select **Create**. The new profile is displayed in the list when you select the policy type for the profile you created. @@ -469,6 +472,8 @@ For the list of policy and profile combinations supported for security settings ## Monitor status +**Intune:** + Status and reports for policies that target devices in this channel are available from the policy node under Endpoint security in the Microsoft Intune admin center. Drill in to the policy type and then select the policy to view its status. You can view the list of platforms, policy types, and profiles that support security settings management in the table in [Which solution should I use](#which-solution-should-i-use), earlier in this article. @@ -476,16 +481,27 @@ Drill in to the policy type and then select the policy to view its status. You c When you select a policy, you can view information about the device check-in status, and can select: - **View report** - View a list of devices that received the policy. You can select a device to drill in and see its per-setting status. You can then select a setting to view more information about it, including other policies that manage that same setting, which could be a source of conflict. - - **Per setting status** - View the settings that are managed by the policy, and a count of success, errors, or conflicts for each setting. +**Defender Portal:** + +You can also monitor the Intune policies that are applied from within the [Microsoft Defender portal](https://security.microsoft.com/). Within the portal, go to **Endpoints**, expand *configuration management* and select *Endpoint security policies*. Select a policy to view its status, and then select: + +- **Overview** - View an overview of the groups the policy is applied to, the policy settings that are applied, and device check-in status. +- **Policy Settings Values** - View the settings that are configured by the policy. +- **Policy settings status** - View the settings that are managed by the policy, and a count of success, errors, or conflicts for each setting. +- **Applied devices** - View the devices to which the policy is applied. +- **Assigned Groups** - View the groups to which the policy is assigned. + +For more information, see [Manage endpoint security policies in Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/manage-security-policies?toc=/mem/intune/toc.json&bc=/mem/breadcrumb/toc.json) in the Defender content. + ## Frequently asked questions and considerations ### Device check-in frequency Devices managed by this capability check-in with Microsoft Intune every 90 minutes to update policy. -You can manually sync a device on-demand from the [Microsoft Defender portal](https://security.microsoft.com/). Sign-in to the portal and go to **Devices**. Select a device that is managed by Microsoft Defender for Endpoint, and then select the **Policy sync** button: +You can manually sync a device on-demand from the [Microsoft Defender portal](https://security.microsoft.com/). Sign-in to the portal and go to **Devices**. Select a device that is managed by Microsoft Defender for Endpoint, and then select the **Policy sync** button: :::image type="content" source="./media/mde-security-integration/policy-sync-from-mde.png" alt-text="Manually sync devices managed by Microsoft Defender for Endpoint." lightbox="./media/mde-security-integration/policy-sync-from-mde.png" ::: @@ -510,7 +526,7 @@ Once a device is removed from either location, that change propagates to the oth ### Unable to enable the Security Management for Microsoft Defender for Endpoint workload in Endpoint Security -While initial provisioning flows can be completed by an Administrator with permissions in both services, the following roles are sufficient to complete configurations in each separate service: +While an Administrator with permissions in both services can complete initial provisioning flows, the following roles are sufficient to complete configurations in each separate service: - For Microsoft Defender, use the Security Administrator role. - For Microsoft Intune, use the Endpoint Security Manager role. @@ -529,11 +545,11 @@ The following security settings are pending deprecation. The Defender for Endpoi ### Use of security settings management on domain controllers -Currently in preview, security settings management is now supported on domain controllers. To manage security settings on domain controllers, you must enable it in the enforcement scope page (go to **Settings** > **Endpoints** **Enforcement scope**). Windows Server devices must be enabled before you can enable configuration of domain controllers. Additionally, if the *on tagged devices* option is selected for Windows Servers, configuration of domain controllers is limited to tagged devices, too. +Security settings management is supported on domain controllers. To manage security settings on domain controllers, you must enable it in the enforcement scope page (go to **Settings** > **Endpoints** **Enforcement scope**). Windows Server devices must be enabled before you can enable configuration of domain controllers. Additionally, if the *on tagged devices* option is selected for Windows Servers, configuration of domain controllers is limited to tagged devices, too. > [!CAUTION] > - Misconfiguration of domain controllers could have a negative impact on both your security posture and operational continuity. -> - If configuration of domain controllers is enabled in your tenant, make sure to review all Windows policies to make sure you're not unintentionally targeting Microsoft Entra device groups that contain domain controllers. To minimize risk to productivity, firewall policies aren't supported on domain controllers. +> - If configuration of domain controllers is enabled in your tenant, make sure to review all Windows policies to make sure you're not unintentionally targeting Microsoft Entra device groups that contain domain controllers. To minimize risk to productivity, firewall policies aren't supported on domain controllers. > - We recommend reviewing all policies targeted to domain controllers before unenrolling those devices. Make any required configurations first, and then unenroll your domain controllers. Defender for Endpoint configuration is maintained on each device after the device is unenrolled. ### PowerShell restrict mode @@ -546,7 +562,7 @@ Security settings management doesn't work for a device that has PowerShell *Lang If you previously had a third-party security tool on the machine and are now managing it with Defender for Endpoint, you might see some impact on Defender for Endpoint's capability to manage Security settings in rare cases. In such cases, as a troubleshooting measure, uninstall and reinstall the latest version of Defender for Endpoint on your machine. -## Next steps +## Related content - [Monitor Defender for Endpoint in Intune](advanced-threat-protection-monitor.md) - [Manage endpoint security policies in Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/manage-security-policies) in the Defender documentation. diff --git a/memdocs/intune/protect/media/advanced-threat-protection-configure/atp-security-center-intune-toggle.png b/memdocs/intune/protect/media/advanced-threat-protection-configure/atp-security-center-intune-toggle.png index 02f3b4cfba5..f46587c8150 100644 Binary files a/memdocs/intune/protect/media/advanced-threat-protection-configure/atp-security-center-intune-toggle.png and b/memdocs/intune/protect/media/advanced-threat-protection-configure/atp-security-center-intune-toggle.png differ diff --git a/memdocs/intune/protect/media/advanced-threat-protection-configure/onboard-report.png b/memdocs/intune/protect/media/advanced-threat-protection-configure/onboard-report.png deleted file mode 100644 index 97bfe933863..00000000000 Binary files a/memdocs/intune/protect/media/advanced-threat-protection-configure/onboard-report.png and /dev/null differ diff --git a/memdocs/intune/protect/media/advanced-threat-protection-configure/select-preconfigured-policy.jpg b/memdocs/intune/protect/media/advanced-threat-protection-configure/select-preconfigured-policy.jpg new file mode 100644 index 00000000000..4cf35040813 Binary files /dev/null and b/memdocs/intune/protect/media/advanced-threat-protection-configure/select-preconfigured-policy.jpg differ diff --git a/memdocs/intune/protect/media/endpoint-security/endpoint-security-policies.png b/memdocs/intune/protect/media/endpoint-security/endpoint-security-policies.png index e88579b9fa4..2741f58c96b 100644 Binary files a/memdocs/intune/protect/media/endpoint-security/endpoint-security-policies.png and b/memdocs/intune/protect/media/endpoint-security/endpoint-security-policies.png differ diff --git a/memdocs/intune/protect/media/microsoft-cloud-pki-deployment/byoca-ca-deployment.png b/memdocs/intune/protect/media/microsoft-cloud-pki-deployment/byoca-ca-deployment.png new file mode 100644 index 00000000000..133b1e0e533 Binary files /dev/null and b/memdocs/intune/protect/media/microsoft-cloud-pki-deployment/byoca-ca-deployment.png differ diff --git a/memdocs/intune/protect/media/microsoft-cloud-pki-deployment/certs-in-play-for-cba.png b/memdocs/intune/protect/media/microsoft-cloud-pki-deployment/certs-in-play-for-cba.png new file mode 100644 index 00000000000..2fb38f595f2 Binary files /dev/null and b/memdocs/intune/protect/media/microsoft-cloud-pki-deployment/certs-in-play-for-cba.png differ diff --git a/memdocs/intune/protect/media/microsoft-cloud-pki-deployment/root-ca-deployment.png b/memdocs/intune/protect/media/microsoft-cloud-pki-deployment/root-ca-deployment.png new file mode 100644 index 00000000000..d6485bd39e1 Binary files /dev/null and b/memdocs/intune/protect/media/microsoft-cloud-pki-deployment/root-ca-deployment.png differ diff --git a/memdocs/intune/protect/media/microsoft-cloud-pki-fundamentals/certificate-handshake.png b/memdocs/intune/protect/media/microsoft-cloud-pki-fundamentals/certificate-handshake.png new file mode 100644 index 00000000000..2b8ff0e4def Binary files /dev/null and b/memdocs/intune/protect/media/microsoft-cloud-pki-fundamentals/certificate-handshake.png differ diff --git a/memdocs/intune/protect/media/microsoft-cloud-pki-fundamentals/chain-of-trust.png b/memdocs/intune/protect/media/microsoft-cloud-pki-fundamentals/chain-of-trust.png new file mode 100644 index 00000000000..b975199f4cc Binary files /dev/null and b/memdocs/intune/protect/media/microsoft-cloud-pki-fundamentals/chain-of-trust.png differ diff --git a/memdocs/intune/protect/media/microsoft-cloud-pki-fundamentals/chain-validation.png b/memdocs/intune/protect/media/microsoft-cloud-pki-fundamentals/chain-validation.png new file mode 100644 index 00000000000..7773dd73dc4 Binary files /dev/null and b/memdocs/intune/protect/media/microsoft-cloud-pki-fundamentals/chain-validation.png differ diff --git a/memdocs/intune/protect/media/microsoft-cloud-pki/architecture-flow.png b/memdocs/intune/protect/media/microsoft-cloud-pki/architecture-flow.png new file mode 100644 index 00000000000..7af60d1112e Binary files /dev/null and b/memdocs/intune/protect/media/microsoft-cloud-pki/architecture-flow.png differ diff --git a/memdocs/intune/protect/media/microsoft-cloud-pki/microsoft-cloud-pki-architecture.png b/memdocs/intune/protect/media/microsoft-cloud-pki/microsoft-cloud-pki-architecture.png deleted file mode 100644 index a5efd804551..00000000000 Binary files a/memdocs/intune/protect/media/microsoft-cloud-pki/microsoft-cloud-pki-architecture.png and /dev/null differ diff --git a/memdocs/intune/protect/microsoft-cloud-pki-audit-logs.md b/memdocs/intune/protect/microsoft-cloud-pki-audit-logs.md index 29902a31d88..d7cc8c63ee9 100644 --- a/memdocs/intune/protect/microsoft-cloud-pki-audit-logs.md +++ b/memdocs/intune/protect/microsoft-cloud-pki-audit-logs.md @@ -6,7 +6,7 @@ keywords: author: lenewsad ms.author: lanewsad manager: dougeby -ms.date: 02/26/2024 +ms.date: 12/06/2024 ms.topic: how-to ms.service: microsoft-intune ms.subservice: protect diff --git a/memdocs/intune/protect/microsoft-cloud-pki-configure-byoca.md b/memdocs/intune/protect/microsoft-cloud-pki-configure-byoca.md index d8698c2357b..48d33938b2c 100644 --- a/memdocs/intune/protect/microsoft-cloud-pki-configure-byoca.md +++ b/memdocs/intune/protect/microsoft-cloud-pki-configure-byoca.md @@ -6,7 +6,7 @@ keywords: author: lenewsad ms.author: lanewsad manager: dougeby -ms.date: 06/13/2024 +ms.date: 12/06/2024 ms.topic: how-to ms.service: microsoft-intune ms.subservice: protect diff --git a/memdocs/intune/protect/microsoft-cloud-pki-configure-ca.md b/memdocs/intune/protect/microsoft-cloud-pki-configure-ca.md index 688c965017a..3ac758ff3e1 100644 --- a/memdocs/intune/protect/microsoft-cloud-pki-configure-ca.md +++ b/memdocs/intune/protect/microsoft-cloud-pki-configure-ca.md @@ -5,7 +5,7 @@ keywords: author: lenewsad ms.author: lanewsad manager: dougeby -ms.date: 06/12/2024 +ms.date: 12/06/2024 ms.topic: how-to ms.service: microsoft-intune ms.subservice: protect diff --git a/memdocs/intune/protect/microsoft-cloud-pki-delete.md b/memdocs/intune/protect/microsoft-cloud-pki-delete.md index 44d76241484..16a92c351bd 100644 --- a/memdocs/intune/protect/microsoft-cloud-pki-delete.md +++ b/memdocs/intune/protect/microsoft-cloud-pki-delete.md @@ -6,7 +6,7 @@ keywords: author: lenewsad ms.author: lanewsad manager: dougeby -ms.date: 07/30/2024 +ms.date: 12/06/2024 ms.topic: how-to ms.service: microsoft-intune ms.subservice: protect diff --git a/memdocs/intune/protect/microsoft-cloud-pki-deployment.md b/memdocs/intune/protect/microsoft-cloud-pki-deployment.md index 83ef571cada..3111e93b2c1 100644 --- a/memdocs/intune/protect/microsoft-cloud-pki-deployment.md +++ b/memdocs/intune/protect/microsoft-cloud-pki-deployment.md @@ -6,7 +6,7 @@ keywords: author: lenewsad ms.author: lanewsad manager: dougeby -ms.date: 02/26/2024 +ms.date: 12/06/2024 ms.topic: how-to ms.service: microsoft-intune ms.subservice: protect @@ -55,7 +55,7 @@ Identify your relying parties. The relying party is a user or system that consum - A Wi-Fi access point using radius certificate-based authentication. - A VPN server authenticating a remote user. -- A user visiting an SSL protected web site in a web browser. +- A user visiting an TLS/LLS protected web site in a web browser. ### Determine location for trust anchor @@ -71,13 +71,13 @@ When using certificates to perform certificate-based authentication, ensure that If the issuing CA certificate is missing, a relying party can request it via the Authority Information Access (AIA) property in the certificate by using the native OS platform certificate chaining engine. > [!NOTE] -> When connecting to a relying party such as a Wi-Fi access point or VPN server, an SSL/TLS connection is first established by the managed Intune device when attempting to connect. Microsoft Cloud PKI doesn't provide these TLS/SSL certificates. You must obtain these certificates through another PKI or CA service. As a result, when you create a Wi-Fi or VPN profile, you also have to create a trusted certificate profile and assign it to managed devices to trust the TLS/SSL connection. The trusted certificate profile must contain the public keys for the root and issuing CAs responsible for issuing the TLS/SSL certificate. +> When connecting to a relying party such as a Wi-Fi access point or VPN server, an TLS/SSL connection is first established by the managed Intune device when attempting to connect. Microsoft Cloud PKI doesn't provide these TLS/SSL certificates. You must obtain these certificates through another PKI or CA service. As a result, when you create a Wi-Fi or VPN profile, you also have to create a trusted certificate profile and assign it to managed devices to trust the TLS/SSL connection. The trusted certificate profile must contain the public keys for the root and issuing CAs responsible for issuing the TLS/SSL certificate. ## Deployment options This section describes the Microsoft Intune-supported deployment options for Microsoft Cloud PKI. -There are methods for deploying CA certificates to relying parties not managed by Intune, such as radius servers, Wi-Fi access points, VPN servers, and web app servers supporting certificate-based authentication. +There are methods for deploying CA certificates to relying parties not managed by Intune. Relying parties such as radius servers, Wi-Fi access points, VPN servers, and web app servers supporting certificate-based authentication. If the relying party is a member of an Active Directory Domain, then use Group Policy to deploy CA certificates. For more information, see: @@ -86,7 +86,7 @@ If the relying party is a member of an Active Directory Domain, then use Group P If the relying party isn't a member of Active Directory Domain, ensure the CA certificate trust chain for the Microsoft Cloud PKI root and issuing CA is installed in the security store of the relying party. The appropriate security store varies depending on the OS platform and the hosting application providing the service. -Also consider the relying party software configuration needed to support additional certification authorities. +Also consider the relying party software configuration needed to support other certification authorities. ### Option 1: Microsoft Cloud PKI root CA @@ -109,15 +109,16 @@ Relying parties require the following CA certificate trust chain. |Cloud PKI CA certificate| Root CA certificate required, issuing CA optional but recommended | If the relying party's server or service is a member server in Active Directory (AD) domain, use Group Policy to deploy CA certificates. If it's not in AD domain, a manual installation method might be required. | |Private CA certificate| Root CA certificate required, issuing CA certificate optional but recommended | If the relying party's server or service is a member server in Active Directory (AD) domain, use Group Policy to deploy CA certificates. If it's not in AD domain, a manual installation method might be required. | - +> ![Diagram of the Microsoft Cloud PKI root CA deployment flow.](./media/microsoft-cloud-pki-deployment/root-ca-deployment.png) + ### Option 2: Bring your own CA (BYOCA) @@ -142,10 +143,11 @@ The relying party should already have the private CA certificate chain. However, Relying parties trust the Cloud PKI BYOCA issued SCEP certificate to the managed device, because it chains up to the private CA trust chain already present on the relying party. - +> ![Diagram of the CA certificate trust chains that must be deployed to Intune managed devices.](./media/microsoft-cloud-pki-deployment/byoca-ca-deployment.png) +`*` In this diagram, *private* refers to the Active Directory Certificate Service or a non-Microsoft service. ## Summary diff --git a/memdocs/intune/protect/microsoft-cloud-pki-fundamentals.md b/memdocs/intune/protect/microsoft-cloud-pki-fundamentals.md index a372e7f38a2..daebe76a9ea 100644 --- a/memdocs/intune/protect/microsoft-cloud-pki-fundamentals.md +++ b/memdocs/intune/protect/microsoft-cloud-pki-fundamentals.md @@ -6,7 +6,7 @@ keywords: author: lenewsad ms.author: lanewsad manager: dougeby -ms.date: 02/26/2024 +ms.date: 12/06/2024 ms.topic: how-to ms.service: microsoft-intune ms.subservice: protect @@ -113,10 +113,12 @@ After the chain is built, the following checks are performed on each certificate The certificate and its chain are considered valid after all checks are complete, and come back successful. - +The following diagram illustrates the *name matching* chain validation flow. + +> [!div class="mx-imgBorder"] +> ![Diagram of the chain validation process using the name match method.](./media/microsoft-cloud-pki-fundamentals/chain-validation.png) ### Ensure a chain of trust @@ -124,8 +126,10 @@ When you use certificates to perform certificate-based authentication, you must The root CA must be present. If the issuing CA certificate isn't present, then it can be requested by the relying party using the native certificate chain engine for the intended OS platform. The relying party can request the issuing CA certificate using the leaf certificate's *authority information access* property. -## Certificate-based authentication +> [!div class="mx-imgBorder"] +> ![Diagram of the chain of validation process.](./media/microsoft-cloud-pki-fundamentals/chain-of-trust.png) +## Certificate-based authentication This section provides a basic understanding of the various certificates being used when a client or device performs certificate-based authentication. The following steps describe the handshake that takes place between a client and a relying party service during certificate-based authentication. @@ -135,7 +139,7 @@ The following steps describe the handshake that takes place between a client and 3. The relying party requests a certificate to be used for client authentication. 4. The client presents its client authentication certificate to the relying party to authenticate. - +> [!div class="mx-imgBorder"] +> ![Diagram of a handshake between a client and relying party service.](./media/microsoft-cloud-pki-fundamentals/certificate-handshake.png) In an environment without Microsoft Cloud PKI, a private CA is responsible for issuing both the TLS/SSL certificate used by the relying party, and the device client authentication certificate. Microsoft Cloud PKI can be used to issue the device client authentication certificate, effectively replacing the private CA for this specific task. diff --git a/memdocs/intune/protect/microsoft-cloud-pki-monitor.md b/memdocs/intune/protect/microsoft-cloud-pki-monitor.md index 9dc632e7586..13cd16db2be 100644 --- a/memdocs/intune/protect/microsoft-cloud-pki-monitor.md +++ b/memdocs/intune/protect/microsoft-cloud-pki-monitor.md @@ -6,7 +6,7 @@ keywords: author: lenewsad ms.author: lanewsad manager: dougeby -ms.date: 02/26/2024 +ms.date: 12/06/2024 ms.topic: how-to ms.service: microsoft-intune ms.subservice: protect diff --git a/memdocs/intune/protect/microsoft-cloud-pki-overview.md b/memdocs/intune/protect/microsoft-cloud-pki-overview.md index c9f5d0b5a81..6d3653f5389 100644 --- a/memdocs/intune/protect/microsoft-cloud-pki-overview.md +++ b/memdocs/intune/protect/microsoft-cloud-pki-overview.md @@ -6,7 +6,7 @@ keywords: author: lenewsad ms.author: lanewsad manager: dougeby -ms.date: 06/03/2024 +ms.date: 12/06/2024 ms.topic: how-to ms.service: microsoft-intune ms.subservice: protect @@ -76,14 +76,14 @@ The following table lists the features and scenarios supported with Microsoft Cl | Feature | Overview | | --- | --- | -| Create multiple CAs in an Intune tenant | Create two-tier PKI hierarchy with root and issuing CA in the cloud. | +| Create multiple certificate authorities (CA) in an Intune tenant | Create two-tier PKI hierarchy with root and issuing CA in the cloud. | | Bring your own CA (BYOCA) | Anchor an Intune Issuing CA to a private CA through Active Directory Certificate Services or a non-Microsoft certificate service. If you have an existing PKI infrastructure, you can maintain the same root CA and create an issuing CA that chains to your external root. This option includes support for external private CA N+ tier hierarchies. | | Signing and Encryption algorithms| Intune supports RSA, key sizes 2048, 3072, and 4096. | | Hash algorithms | Intune supports SHA-256, SHA-384, and SHA-512. | |HSM keys (signing and encryption)|Keys are provisioned using [Azure Managed Hardware Security Module (Azure Managed HSM)](/azure/key-vault/managed-hsm/overview).

                                  CAs created with a licensed Intune Suite or Cloud PKI Standalone Add-on automatically use HSM signing and encryption keys. No Azure subscription is required for Azure HSM. | |Software Keys (signing and encryption) |CAs created during a trial period of Intune Suite or Cloud PKI standalone Add-on use software-backed signing and encryption keys using `System.Security.Cryptography.RSA`. | | Certificate registration authority | Providing a Cloud Certificate Registration Authority supporting Simple Certificate Enrollment Protocol (SCEP) for each Cloud PKI Issuing CA.| -|Certificate Revocation List (CRL) distribution points | Intune hosts the CRL distribution point (CDP) for each CA.

                                  The CRL validity period is seven days. Publishing and refresh happens every 3.5 days. The CRL is updated with every certificate revocation. | +|Certificate Revocation List (CRL) distribution points | Intune hosts the CRL distribution point (CDP) for each CA.

                                  The CRL validity period is seven days. Publishing and refresh happen every 3.5 days. The CRL is updated with every certificate revocation. | |Authority Information Access (AIA) end points | Intune hosts the AIA endpoint for each Issuing CA. The AIA endpoint can be used by relying parties to retrieve parent certificates. | | End-entity certificate issuance for users and devices | Also referred to as *leaf certificate* issuance. Support is for the SCEP (PKCS#7) protocol and certification format, and Intune-MDM enrolled devices supporting the SCEP profile. | | Certificate life-cycle management | Issue, renew, and revoke end-entity certificates. | @@ -94,39 +94,48 @@ The following table lists the features and scenarios supported with Microsoft Cl ## Architecture -Microsoft Cloud PKI is made up of several key components working together to simplify the complexity and management of a public key infrastructure; a Cloud PKI service for creating and hosting certification authorities, combined with a certificate registration authority to automatically service incoming certificate requests from Intune-enrolled devices. The registration authority supports the Simple Certificate Enrollment Protocol (SCEP). +Microsoft Cloud PKI is made up of several key components working together to simplify the complexity and management of a public key infrastructure. It includes a Cloud PKI service for creating and hosting certification authorities, combined with a certificate registration authority to automatically service incoming certificate requests from Intune-enrolled devices. The registration authority supports the Simple Certificate Enrollment Protocol (SCEP). > [!div class="mx-imgBorder"] -> ![Drawing of the Microsoft Cloud PKI architecture.](./media/microsoft-cloud-pki/microsoft-cloud-pki-architecture.png) +> ![Drawing of the Microsoft Cloud PKI architecture.](./media/microsoft-cloud-pki/architecture-flow.png) +`*` See **Components** for a breakdown of services. **Components**: * A - Microsoft Intune * B - Microsoft Cloud PKI services - * B.1 - Microsoft Cloud PKI service - * B.2 - Microsoft Cloud PKI SCEP service - * B.3 - Microsoft Cloud PKI SCEP validation service + * B1 - Microsoft Cloud PKI service + * B2 - Microsoft Cloud PKI SCEP service + * B3 - Microsoft Cloud PKI SCEP validation service - The *certificate registration authority* makes up B.2 and B.3 in the diagram. + The *certificate registration authority* makes up B2 and B3 in the diagram. These components replace the need for an on-premises certificate authority, NDES, and Intune certificate connector. **Actions**: -Before the device checks in to the Intune service, an Intune administrator or Intune role with permissions to manage the Microsoft Cloud PKI service must: +Before the device checks in to the Intune service, an Intune administrator or Intune role with permissions to manage the Microsoft Cloud PKI service must complete the following actions: * Create the required Cloud PKI certification authority for the root and issuing CAs in Microsoft Intune. -* Create and assign the required trust certificate profiles for the root and issuing CAs. This flow isn't shown in the diagram. -* Create and assign the required platform-specific SCEP certificate profiles. This flow isn't shown in the diagram. +* Create and assign the required trust certificate profiles for the root and issuing CAs. +* Create and assign the required platform-specific SCEP certificate profiles. + +These actions require components B1, B2, and B3. > [!NOTE] > A Cloud PKI Issuing Certification Authority is required to issue certificates for Intune managed devices. Cloud PKI provides a SCEP service that acts as a Certificate Registration Authority. The service requests certificates from the Issuing CA on behalf of Intune-managed devices using a SCEP profile. -1. A device checks in with the Intune service and receives the trusted certificate and SCEP profiles. -2. Based on the SCEP profile, the device creates a certificate signing request (CSR). The private key is created on the device, and never leaves the device. The CSR and the SCEP challenge are sent to the SCEP service in the cloud (SCEP URI property in the SCEP profile). The SCEP challenge is encrypted and signed using the Intune SCEP RA keys. -3. The SCEP validation service verifies the CSR against the SCEP challenge (*shown as B.3 in diagram*). Validation ensures the request comes from an enrolled and managed device. It also ensures the Challenge is untampered, and that it matches the expected values from the SCEP profile. If any of these checks fail, the certificate request is rejected. -4. After the CSR is validated, the SCEP validation service, also known as the *registration authority*, requests that the issuing CA signs the CSR (*shown as B.1 in diagram*). -5. The signed certificate is delivered to the Intune MDM-enrolled device. +The flow continues with the following actions, shown in the diagram as A1 through A5: + +A1. A device checks in with the Intune service and receives the trusted certificate and SCEP profiles. + +A2. Based on the SCEP profile, the device creates a certificate signing request (CSR). The private key is created on the device, and never leaves the device. The CSR and the SCEP challenge are sent to the SCEP service in the cloud (SCEP URI property in the SCEP profile). The SCEP challenge is encrypted and signed using the Intune SCEP RA keys. + +A3. The SCEP validation service verifies the CSR against the SCEP challenge. Validation ensures the request comes from an enrolled and managed device. It also ensures the challenge is untampered, and that it matches the expected values from the SCEP profile. If any of these checks fail, the certificate request is rejected. + +A4. After the CSR is validated, the SCEP validation service, also known as the *registration authority*, requests that the issuing CA signs the CSR. + +A5. The signed certificate is delivered to the Intune MDM-enrolled device. >[!NOTE] > The SCEP challenge is encrypted and signed using the Intune SCEP registration authority keys. @@ -161,7 +170,7 @@ During the trial period, you can create up to six CAs in your tenant. Cloud PKI ## CA configuration examples -Two-tier Cloud PKI root & issuing CAs, and bring-your-own CAs can coexist in Intune. You can use the following configurations, provided as examples, to create CAs in Microsoft Cloud PKI: +Two-tier Cloud PKI root & issuing CAs, and bring-your-own CAs can coexist in Intune. You can use the following configurations, provided as examples, to create CAs in Microsoft Cloud PKI: * One root CA with five issuing CAs * Three root CAs with one issuing CA each @@ -179,4 +188,4 @@ For the latest changes and additions, see [What's new in Microsoft Intune](../fu * Cloud PKI Root CA * Cloud PKI Issuing CA * BYOCA Issuing CA -* In the admin center, when you select **View all certificates** for an issuing CA, Intune only shows the first 1000 issued certificates. We're actively working to address this limitation. As a workaround, go to **Devices** > **Monitor**. Then select **Certificates** to view all issued certificates. +* In the admin center, when you select **View all certificates** for an issuing CA, Intune only shows the first 1,000 issued certificates. We're actively working to address this limitation. As a workaround, go to **Devices** > **Monitor**. Then select **Certificates** to view all issued certificates. diff --git a/memdocs/intune/protect/microsoft-tunnel-conditional-access.md b/memdocs/intune/protect/microsoft-tunnel-conditional-access.md index 1b95225dfd6..cb8227603f5 100644 --- a/memdocs/intune/protect/microsoft-tunnel-conditional-access.md +++ b/memdocs/intune/protect/microsoft-tunnel-conditional-access.md @@ -54,7 +54,7 @@ Before you can configure Conditional Access policies for the tunnel, you must en If you'll use Conditional Access policy to limit user access, we recommend configuring this policy after you provision your tenant to support the Microsoft Tunnel Gateway cloud app, but before you install the Tunnel Gateway. -1. Sign in to [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) > **Endpoint Security** > **Conditional access** > **Create new policy**. The admin center presents the Microsoft Entra interface for creating conditional access policies. +1. Sign in to [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) > **Endpoint Security** > **Conditional Access** > **Create new policy**. The admin center presents the Microsoft Entra interface for creating Conditional Access policies. 2. Specify a name for this policy. diff --git a/memdocs/intune/protect/microsoft-tunnel-configure.md b/memdocs/intune/protect/microsoft-tunnel-configure.md index 4b1fe3e74dc..4fe5c7c6800 100644 --- a/memdocs/intune/protect/microsoft-tunnel-configure.md +++ b/memdocs/intune/protect/microsoft-tunnel-configure.md @@ -130,9 +130,9 @@ However, if you plan to install the Microsoft Tunnel Gateway to a rootless Podma - Download the tool directly by using a web browser. Go to to download the file **mstunnel-setup**. - Sign in to [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) > **Tenant administration** > **Microsoft Tunnel Gateway**, select the **Servers** tab, select **Create** to open the *Create a server* pane, and then select **Download script**. - + ![Screen capture for download of installation script](./media/microsoft-tunnel-configure/download-installation-script.png) - + - Use a Linux command to download the tunnel software directly. For example, on the server where you'll install the tunnel, you can use **wget** or **curl** to open the link [https://aka.ms/microsofttunneldownload](https://aka.ms/microsofttunneldownload). For example, to use **wget** and log details to *mstunnel-setup* during the download, run `wget --output-document=mstunnel-setup https://aka.ms/microsofttunneldownload` @@ -412,7 +412,8 @@ Intune periodically releases updates to the Microsoft Tunnel server. To stay in By default, after a new upgrade is available Intune automatically starts the upgrade of tunnel servers as soon as possible, at each of your tunnel sites. To help you manage upgrades, you can configure options that manage the upgrade process: -- You can allow automatic upgrade of servers at a site, or require admin approval before upgrades being. +- You can allow automatic upgrade of servers at a site, or require admin approval before upgrades begin. + - You can configure a maintenance window, which limits when upgrades at a site can start. For more information about upgrades for Microsoft Tunnel, including how to view tunnel status and configure upgrade options, see [Upgrade Microsoft Tunnel](microsoft-tunnel-upgrade.md). diff --git a/memdocs/intune/protect/microsoft-tunnel-mam-ios.md b/memdocs/intune/protect/microsoft-tunnel-mam-ios.md index 27385a16ee2..0b83b64ba22 100644 --- a/memdocs/intune/protect/microsoft-tunnel-mam-ios.md +++ b/memdocs/intune/protect/microsoft-tunnel-mam-ios.md @@ -5,7 +5,7 @@ keywords: author: brenduns ms.author: brenduns manager: dougeby -ms.date: 08/01/2024 +ms.date: 01/08/2025 ms.topic: how-to ms.service: microsoft-intune ms.subservice: protect @@ -200,13 +200,7 @@ This policy provides the necessary data protection and establishes a means of de 1. Sign in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) and go to **Apps** > **App protection policies** > **+ Create policy** > and select **iOS/iPadOS**. 2. On the *Basics* tab, enter a *Name* for the policy, and a *Description* (optional), and then select **Next**. -3. On the *Apps* tab: - 1. Set *Target apps on all device types* to **No**. - 1. For *Device types*, select **Unmanaged**. - - :::image type="content" source="./media/microsoft-tunnel-mam-ios/app-protection-target-policy.png" alt-text="Configure the app protection policy to target unmanaged devices."::: - -4. For LOB apps, select on **+ Select custom apps** to open the *Select apps to target* pane. Next, on the *Select apps to target* pane: +3. On the *Apps* tab, for LOB apps, select **+ Select custom apps** to open the *Select apps to target* pane. Then, on the *Select apps to target* pane: 1. For *Bundle ID*, specify the LOB apps Bundle ID and then select **Add**. 1. Select the app you just added, and then **Select**. diff --git a/memdocs/intune/protect/microsoft-tunnel-prerequisites.md b/memdocs/intune/protect/microsoft-tunnel-prerequisites.md index 31dbf62708b..185340bbb10 100644 --- a/memdocs/intune/protect/microsoft-tunnel-prerequisites.md +++ b/memdocs/intune/protect/microsoft-tunnel-prerequisites.md @@ -5,7 +5,7 @@ keywords: author: brenduns ms.author: brenduns manager: dougeby -ms.date: 10/24/2024 +ms.date: 01/13/2025 ms.topic: how-to ms.service: microsoft-intune ms.subservice: protect @@ -61,20 +61,15 @@ Set up a Linux based virtual machine or a physical server on which to install th |Distribution version | Container requirements | Considerations | |-----------------------|--------------------------|--------------------| - | CentOS 7.4+ | Docker CE | Support ends June 2024. CentOS 8+ isn't supported | - | Red Hat (RHEL) 7.4+ | Docker CE | Support ends June 2024 | - | Red Hat (RHEL) 8.6 | Support ends June 2024 Podman 4.0 *(default)*
                                  Podman 3.0 | This version of RHEL doesn't automatically load the *ip_tables* module into the Linux kernel. When you use this version, plan to [manually load the ip_tables](#manually-load-ip_tables) before Tunnel is installed.

                                  [Containers created by Podman v3 and earlier](https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html-single/8.6_release_notes/index#enhancement_containers) aren't usable with Podman v4.0. If upgrading and changing containers from v3 to v4.0, plan to create new containers and to uninstall and then reinstall Microsoft Tunnel.| - | Red Hat (RHEL) 8.7 | Podman 4.2 *(default)* | This version of RHEL doesn't automatically load the *ip_tables* module into the Linux kernel. When you use this version, plan to [manually load the ip_tables](#manually-load-ip_tables) before Tunnel is installed.

                                  [Containers created by Podman v3 and earlier](https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html-single/8.7_release_notes/index#enhancement_containers) aren't usable with Podman v4.2 and later. If upgrading and changing containers, plan to create new containers and to uninstall and then reinstall Microsoft Tunnel.| - | Red Hat (RHEL) 8.8 | Podman 4.4.1 | This version of RHEL doesn't automatically load the *ip_tables* module into the Linux kernel. When you use this version, plan to [manually load the ip_tables](#manually-load-ip_tables) before Tunnel is installed.

                                  [Containers created by Podman v3 and earlier](https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html-single/8.7_release_notes/index#enhancement_containers) aren't usable with Podman v4.2 and later. If upgrading and changing containers, plan to create new containers and to uninstall and then reinstall Microsoft Tunnel.| + | Red Hat (RHEL) 8.7 | Podman 4.2 *(default)* | Support ends May 2025.This version of RHEL doesn't automatically load the *ip_tables* module into the Linux kernel. When you use this version, plan to [manually load the ip_tables](#manually-load-ip_tables) before Tunnel is installed.

                                  [Containers created by Podman v3 and earlier](https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html-single/8.7_release_notes/index#enhancement_containers) aren't usable with Podman v4.2 and later. If upgrading and changing containers, plan to create new containers and to uninstall and then reinstall Microsoft Tunnel.| + | Red Hat (RHEL) 8.8 | Podman 4.4.1 |Support ends May 2025. This version of RHEL doesn't automatically load the *ip_tables* module into the Linux kernel. When you use this version, plan to [manually load the ip_tables](#manually-load-ip_tables) before Tunnel is installed.

                                  [Containers created by Podman v3 and earlier](https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html-single/8.7_release_notes/index#enhancement_containers) aren't usable with Podman v4.2 and later. If upgrading and changing containers, plan to create new containers and to uninstall and then reinstall Microsoft Tunnel.| | Red Hat (RHEL) 8.9 | Podman 4.4.1 | This version of RHEL doesn't automatically load the *ip_tables* module into the Linux kernel. When you use this version, plan to [manually load the ip_tables](#manually-load-ip_tables) before Tunnel is installed.

                                  [Containers created by Podman v3 and earlier](https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html-single/8.7_release_notes/index#enhancement_containers) aren't usable with Podman v4.2 and later. If upgrading and changing containers, plan to create new containers and to uninstall and then reinstall Microsoft Tunnel.| | Red Hat (RHEL) 8.10 | Podman 4.9.4-rhel *(default)* | This version of RHEL doesn't automatically load the *ip_tables* module into the Linux kernel. When you use this version, plan to [manually load the ip_tables](#manually-load-ip_tables) before Tunnel is installed.

                                  [Containers created by Podman v3 and earlier](https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html-single/8.7_release_notes/index#enhancement_containers) aren't usable with Podman v4.2 and later. If upgrading and changing containers, plan to create new containers and to uninstall and then reinstall Microsoft Tunnel.| - | Red Hat (RHEL) 9.0 | Support ends June 2024 Podman 4.4.1 *(default)* | This version of RHEL doesn't automatically load the *ip_tables* module into the Linux kernel. When you use this version, plan to [manually load the ip_tables](#manually-load-ip_tables) before Tunnel is installed.

                                  [Containers created by Podman v3 and earlier](https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html-single/8.7_release_notes/index#enhancement_containers) aren't usable with Podman v4.2 and later. If upgrading and changing containers, plan to create new containers and to uninstall and then reinstall Microsoft Tunnel.

                                  Support ends Feb 2024. | - | Red Hat (RHEL) 9.1 | Podman 4.4.1 *(default)* | This version of RHEL doesn't automatically load the *ip_tables* module into the Linux kernel. When you use this version, plan to [manually load the ip_tables](#manually-load-ip_tables) before Tunnel is installed.

                                  [Containers created by Podman v3 and earlier](https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html-single/8.7_release_notes/index#enhancement_containers) aren't usable with Podman v4.2 and later. If upgrading and changing containers, plan to create new containers and to uninstall and then reinstall Microsoft Tunnel.| - | Red Hat (RHEL) 9.2 | Podman 4.4.1 *(default)* | This version of RHEL doesn't automatically load the *ip_tables* module into the Linux kernel. When you use this version, plan to [manually load the ip_tables](#manually-load-ip_tables) before Tunnel is installed.

                                  [Containers created by Podman v3 and earlier](https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html-single/8.7_release_notes/index#enhancement_containers) aren't usable with Podman v4.2 and later. If upgrading and changing containers, plan to create new containers and to uninstall and then reinstall Microsoft Tunnel.| + | Red Hat (RHEL) 9.2 | Podman 4.4.1 *(default)* | Support ends May 2025.This version of RHEL doesn't automatically load the *ip_tables* module into the Linux kernel. When you use this version, plan to [manually load the ip_tables](#manually-load-ip_tables) before Tunnel is installed.

                                  [Containers created by Podman v3 and earlier](https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html-single/8.7_release_notes/index#enhancement_containers) aren't usable with Podman v4.2 and later. If upgrading and changing containers, plan to create new containers and to uninstall and then reinstall Microsoft Tunnel.| | Red Hat (RHEL) 9.3 | Podman 4.6.1. *(default)* | This version of RHEL doesn't automatically load the *ip_tables* module into the Linux kernel. When you use this version, plan to [manually load the ip_tables](#manually-load-ip_tables) before Tunnel is installed.

                                  [Containers created by Podman v3 and earlier](https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html-single/8.7_release_notes/index#enhancement_containers) aren't usable with Podman v4.2 and later. If upgrading and changing containers, plan to create new containers and to uninstall and then reinstall Microsoft Tunnel.| | Red Hat (RHEL) 9.4 | Podman 4.9.4-rhel *(default)* | This version of RHEL doesn't automatically load the *ip_tables* module into the Linux kernel. When you use this version, plan to [manually load the ip_tables](#manually-load-ip_tables) before Tunnel is installed.

                                  [Containers created by Podman v3 and earlier](https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html-single/8.7_release_notes/index#enhancement_containers) aren't usable with Podman v4.2 and later. If upgrading and changing containers, plan to create new containers and to uninstall and then reinstall Microsoft Tunnel.| - | Ubuntu 20.04 | Docker CE | | | Ubuntu 22.04 | Docker CE | | + | Ubuntu 24.04 | Docker CE | | > [!IMPORTANT] > In April of 2023, Ubuntu will end support for Ubuntu 18.04. With the end of support by Ubuntu, Intune will also end support for Ubuntu 18.04 for use with Microsoft Tunnel. For more information, see [https://wiki.ubuntu.com/Releases](https://wiki.ubuntu.com/Releases). @@ -124,7 +119,9 @@ Set up a Linux based virtual machine or a physical server on which to install th - The Subject Alternative Name (SAN) of the TLS certificate you use to secure the Tunnel Gateway endpoint must match the IP address or FQDN of the Tunnel Gateway server. - - TLS certificate can't have an expiration date longer than two years. If the date is longer than two years, it isn't accepted on iOS devices. + - For iOS devices, public TLS certificates must be issued from the Root CA and have a maximum expiration date of 398 days. Certificates issued by user-added or administrator added Root CAs can have a maximum expiration date of up to two years (730 days). For more information about these TLS certificate requirements, see [About upcoming limits on trusted certificates](https://support.apple.com/102028) at support.apple.com. + + - For Android devices, we recommend that public TLS certificates issued from the Root CA have a maximum expiration date of 398 days.git a - Support of wildcards is limited. For example, **\*.contoso.com** is supported, but **cont\*.com** isn't supported. diff --git a/memdocs/intune/protect/microsoft-tunnel-upgrade.md b/memdocs/intune/protect/microsoft-tunnel-upgrade.md index a0e1dd50474..2df7c56cd86 100644 --- a/memdocs/intune/protect/microsoft-tunnel-upgrade.md +++ b/memdocs/intune/protect/microsoft-tunnel-upgrade.md @@ -129,6 +129,20 @@ The Microsoft Tunnel version for a server isn’t available in the Intune UI at > > Container releases take place in stages. If you notice that your container images are not the most recent, please be assured that they will be updated and delivered within the following week. +### December 2, 2024 + +Image hash values: + +- **agentImageDigest**: sha256:110b111d7f3fee3d13ac29da62560800c26d2a05bdc337c965b0ce1f2ec2756c + +- **serverImageDigest**: sha256:3a5844f4e7156c966a2d0f5affd8b15ac3b441bd301a5a0b7c9b7db2ae6f5ed3 + +Changes in this release: + +- Diagnostic tool improvements +- Bug fixes for rootless container mode in mst-cli +- Localization improvements in mstunnel-setup +- Improvement on error handling ### October 2, 2024 @@ -139,7 +153,8 @@ Image hash values: - **serverImageDigest**: sha256:0efab5013351bcd81f186973e75ed5d9f91bbe6271e3be481721500f946fc9ec Changes in this release: --Upgrade from .NET 6 to .NET 8 + +- Upgrade from .NET 6 to .NET 8 - Upgrade ocserv to version 1.3.0 - Fix rootless container bug in installer @@ -151,7 +166,7 @@ Image hash values: - **serverImageDigest**: sha256:6484d311d1bd6cbe55d71306595715bafa6a20a000be6fd6f9e530716cef6c16 -Changes in this release: +Changes in this release: - Add diagnostic tools for host troubleshooting - Upgrade Azure Linux image to 2.0.20240829 @@ -195,6 +210,25 @@ Changes in this release: - Hardened containers by reducing the container capabilities to minimum - Security updates on the base image +## Next steps + +[Reference for Microsoft Tunnel](../protect/microsoft-tunnel-reference.md) + + - -## Next steps - -[Reference for Microsoft Tunnel](../protect/microsoft-tunnel-reference.md) diff --git a/memdocs/intune/protect/mtd-enable-unenrolled-devices.md b/memdocs/intune/protect/mtd-enable-unenrolled-devices.md index 4348ba1e34f..42bd5ee5b1d 100644 --- a/memdocs/intune/protect/mtd-enable-unenrolled-devices.md +++ b/memdocs/intune/protect/mtd-enable-unenrolled-devices.md @@ -37,7 +37,7 @@ During Mobile Threat Defense (MTD) setup, you've configured a policy for classif [!INCLUDE [mtd-mam-note](../../intune/protect/includes/mtd-mam-note.md)] -## Classic conditional access policies for Mobile Threat Defense (MTD) apps +## Classic Conditional Access policies for Mobile Threat Defense (MTD) apps When you integrate a new Mobile Threat Defense application with Intune and enable the connection to Intune, Intune creates a classic Conditional Access policy in Microsoft Entra ID. Each third-party MTD partner you integrate with creates a new classic Conditional Access policy. These policies can be ignored, but shouldn't be edited, deleted, or disabled. @@ -55,7 +55,7 @@ Classic Conditional Access policies for MTD apps: - Are distinct from Conditional Access policies you might create to help manage MTD. - By default, don't interact with other Condition -To view classic conditional access policies, in [Azure](https://portal.azure.com/#home), go to **Microsoft Entra ID** > **Conditional Access** > **Classic policies**. +To view classic Conditional Access policies, in [Azure](https://portal.azure.com/#home), go to **Microsoft Entra ID** > **Conditional Access** > **Classic policies**. ## To enable the Mobile Threat Defense connector diff --git a/memdocs/intune/protect/security-baseline-settings-defender.md b/memdocs/intune/protect/security-baseline-settings-defender.md index 63c246d31b5..4384b50f9b4 100644 --- a/memdocs/intune/protect/security-baseline-settings-defender.md +++ b/memdocs/intune/protect/security-baseline-settings-defender.md @@ -39,37 +39,44 @@ zone_pivot_groups: atp-baseline-versions --> -# List of the settings in the Microsoft Defender for Endpoint security baseline in Intune +# Microsoft Defender for Endpoint security baseline settings reference for Microsoft Intune -This article is a reference for the settings that are available in the different versions of the Microsoft Defender for Endpoint security baseline that you can deploy with Microsoft Intune. Use the tabs to select and view the settings in the most recent baseline version and a few older versions that might still be in use. +This article is a reference for the settings that are available in the Microsoft Defender for Endpoint security baseline for Microsoft Intune. -For each setting this reference identifies the baselines default configuration, which is also the recommended configuration for that setting provided by the relevant security team. Because products and the security landscape evolve, the recommended defaults in one baseline version might not match the defaults you find in later versions of the same baseline. Different baseline types, like the *MDM security* and the *Defender for Endpoint* baselines, can also set different defaults. +## About this reference article -When the Intune UI includes a *Learn more* link for a setting, you’ll find that here as well. Use that link to view the settings *policy configuration service provider* (CSP) or relevant content that explains the settings operation. +Each security baseline is a group of preconfigured Windows settings that help you apply and enforce granular security settings that the relevant security teams recommend. You can also customize each baseline you deploy to enforce only those settings and values you require. When you create a security baseline profile in Intune, you're creating a template that consists of multiple device configuration settings. -When a new version of a baseline becomes available, it replaces the previous version. Profiles instances that are created prior to the availability of a new version: +The details that display in this article are based on baseline version you select at the top of the article. For each version, this article displays: + +- A list of each setting with its configuration as found in the default instance of that baseline version. +- When available, a link to the underlying configuration service provider (CSP) documentation or other related content from the relevant product group that provides context and possibly additional details for a settings use. + +When a new version of a baseline becomes available, it replaces the previous version. Profile instances that you’ve created prior to the availability of a new version: - Become read-only. You can continue to use those profiles but can't edit them to change their configuration. -- Can be updated to the latest version. After you update a profile to the current baseline version, you can edit the profile to modify settings. +- Can be updated to the current version. After you update a profile to the current baseline version, you can edit the profile to modify settings. -To learn more about using security baselines, see [Use security baselines](security-baselines.md). In that article you'll also find information about how to: +To learn more about using security baselines, see: +- [Use security baselines](../protect/security-baselines.md) +- [Change the baseline version for a profile](../protect/security-baselines-configure.md#update-baselines-that-use-the-previous-format) +- [Manage security baselines](../protect/security-baselines-configure.md) -- [Change the baseline version for a profile](../protect/security-baselines-configure.md#update-baselines-that-use-the-previous-format) to update a profile to use the latest version of that baseline. ::: zone pivot="mde-v24h1" -**Microsoft Defender for Endpoint baseline version 24H1** +## Microsoft Defender for Endpoint baseline version 24H1 ::: zone-end ::: zone pivot="atp-december-2020" -**Microsoft Defender for Endpoint baseline for December 2020 - version 6** +## Microsoft Defender for Endpoint baseline for December 2020 - version 6 ::: zone-end ::: zone pivot="atp-sept-2020" -**Microsoft Defender for Endpoint baseline for September 2020 - version 5** +## Microsoft Defender for Endpoint baseline for September 2020 - version 5 ::: zone-end ::: zone pivot="atp-april-2020" -**Microsoft Defender for Endpoint baseline for April 2020 - version 4** +## Microsoft Defender for Endpoint baseline for April 2020 - version 4 ::: zone-end ::: zone pivot="atp-march-2020" -**Microsoft Defender for Endpoint baseline for March 2020 - version 3** +## Microsoft Defender for Endpoint baseline for March 2020 - version 3 ::: zone-end The Microsoft Defender for Endpoint baseline is available when your environment meets the prerequisites for using [Microsoft Defender for Endpoint](advanced-threat-protection.md#prerequisites). @@ -78,9 +85,9 @@ This baseline is optimized for physical devices and isn't recommended for use on ::: zone pivot="mde-v24h1" -## Administrative Templates +### Administrative Templates -### System > Device Installation > Device Installation Restrictions +#### System > Device Installation > Device Installation Restrictions - **Prevent installation of devices using drivers that match these device setup classes** Baseline default: *Enabled* @@ -92,7 +99,7 @@ This baseline is optimized for physical devices and isn't recommended for use on - **Also apply to matching devices that are already installed.** Baseline default: *False* -### Windows Components > BitLocker Drive Encryption +#### Windows Components > BitLocker Drive Encryption - **Choose drive encryption method and cipher strength (Windows 10 [Version 1511] and later)** Baseline default: *Enabled* @@ -107,7 +114,7 @@ This baseline is optimized for physical devices and isn't recommended for use on - **Select the encryption method for fixed data drives:** Baseline default: *XTS-AES 128-bit (default)* -### Windows Components > BitLocker Drive Encryption > Fixed Data Drives +#### Windows Components > BitLocker Drive Encryption > Fixed Data Drives - **Choose how BitLocker-protected fixed drives can be recovered** Baseline default: *Enabled* @@ -119,7 +126,7 @@ This baseline is optimized for physical devices and isn't recommended for use on - **Allow data recovery agent** Baseline default: *True* - - **Configure storage of BitLocker recovery information to AD DS:** + - **Configure storage of BitLocker recovery information to AD DS** Baseline default: *Backup recovery passwords and key packages* Value: *Allow 256-bit recovery key* @@ -144,7 +151,7 @@ This baseline is optimized for physical devices and isn't recommended for use on - **Select the encryption type: (Device)** Baseline default: *Used Space Only encryption* -### Windows Components > BitLocker Drive Encryption > Operating System Drives +#### Windows Components > BitLocker Drive Encryption > Operating System Drives - **Allow devices compliant with InstantGo or HSTI to opt out of pre-boot PIN.** Baseline default: *Disabled* @@ -208,7 +215,7 @@ This baseline is optimized for physical devices and isn't recommended for use on - **Configure TPM startup key:** Baseline default: *Do not allow startup key with TPM* -### Windows Components > BitLocker Drive Encryption > Removable Data Drives +#### Windows Components > BitLocker Drive Encryption > Removable Data Drives - **Control use of BitLocker on removable drives** Baseline default: *Enabled* @@ -234,7 +241,7 @@ This baseline is optimized for physical devices and isn't recommended for use on - **Do not allow write access to devices configured in another organization** Baseline default: *False* -### Windows Components > File Explorer +#### Windows Components > File Explorer - **Configure Windows Defender SmartScreen** Baseline default: *Enabled* @@ -243,7 +250,7 @@ This baseline is optimized for physical devices and isn't recommended for use on - **Pick one of the following settings: (Device)** Baseline default: *Warn and prevent bypass* -### Windows Components > Internet Explorer +#### Windows Components > Internet Explorer - **Prevent bypassing SmartScreen Filter warnings about files that are not commonly downloaded from the Internet** Baseline default: *Enabled* @@ -260,7 +267,7 @@ This baseline is optimized for physical devices and isn't recommended for use on - **Select SmartScreen Filter mode** Baseline default: *On* -## BitLocker +### BitLocker - **Allow Warning For Other Disk Encryption** Baseline default: *Enabled* @@ -274,7 +281,7 @@ This baseline is optimized for physical devices and isn't recommended for use on Baseline default: *Enabled* [Learn more](/windows/client-management/mdm/bitlocker-csp?WT.mc_id=Portal-fx#requiredeviceencryption) -## Defender +### Defender - **Allow Archive Scanning** Baseline default: *Allowed. Scans the archive files.* @@ -464,19 +471,19 @@ This baseline is optimized for physical devices and isn't recommended for use on Baseline default: *Send all samples automatically.* [Learn more](/windows/client-management/mdm/policy-csp-Defender?WT.mc_id=Portal-fx#submitsamplesconsent) -## Device Guard +### Device Guard - **Credential Guard** Baseline default: *(Enabled with UEFI lock) Turns on Credential Guard with UEFI lock.* [Learn more](/windows/client-management/mdm/policy-csp-deviceguard?WT.mc_id=Portal-fx#lsacfgflags) -## Dma Guard +### Dma Guard - **Device Enumeration Policy** Baseline default: *Block all (Most restrictive)* [Learn more](/windows/client-management/mdm/policy-csp-dmaguard?WT.mc_id=Portal-fx#deviceenumerationpolicy) -## Firewall +### Firewall - **Certificate revocation list verification** Baseline default: *None* @@ -620,7 +627,7 @@ This baseline is optimized for physical devices and isn't recommended for use on Value: *300* [Learn more](/windows/client-management/mdm/firewall-csp?WT.mc_id=Portal-fx#mdmstoreglobalsaidletime) -## Microsoft Edge +### Microsoft Edge - **Configure Microsoft Defender SmartScreen** Baseline default: *Enabled* @@ -646,7 +653,7 @@ This baseline is optimized for physical devices and isn't recommended for use on ::: zone-end ::: zone pivot="atp-sept-2020,atp-december-2020" -## Attack Surface Reduction Rules +### Attack Surface Reduction Rules Attack surface reduction rules support a merger of settings from different policies, to create a superset of policy for each device. Only the settings that aren't in conflict are merged. Settings that are in conflict are not added to the superset of rules. Previously, if two policies included conflicts for a single setting, both policies were flagged as being in conflict, and no settings from either profile would be deployed. @@ -716,7 +723,7 @@ To learn more, see [Attack surface reduction rules](/windows/security/threat-pro ::: zone pivot="atp-march-2020,atp-april-2020" -## Application Guard +### Application Guard For more information, see [WindowsDefenderApplicationGuard CSP](/windows/client-management/mdm/windowsdefenderapplicationguard-csp) in the Windows documentation. @@ -744,7 +751,7 @@ When you use Microsoft Edge, Microsoft Defender Application Guard protects your ::: zone-end ::: zone pivot="atp-december-2020,atp-sept-2020,atp-march-2020,atp-april-2020" -## BitLocker +### BitLocker ::: zone-end ::: zone pivot="atp-march-2020,atp-april-2020" @@ -927,7 +934,7 @@ When you use Microsoft Edge, Microsoft Defender Application Guard protects your ::: zone pivot="atp-march-2020,atp-april-2020" -## Browser +### Browser - **Require SmartScreen for Microsoft Edge** Baseline default: *Yes* @@ -941,7 +948,7 @@ When you use Microsoft Edge, Microsoft Defender Application Guard protects your Baseline default: *Yes* [Learn more](/windows/client-management/mdm/policy-csp-browser#browser-preventsmartscreenpromptoverrideforfiles) -## Data Protection +### Data Protection - **Block direct memory access** Baseline default: *Yes* @@ -950,13 +957,13 @@ When you use Microsoft Edge, Microsoft Defender Application Guard protects your ::: zone-end ::: zone pivot="atp-march-2020,atp-april-2020,atp-sept-2020,atp-december-2020" -## Device Guard +### Device Guard - **Turn on credential guard** Baseline default: *Enable with UEFI lock* [Learn more](https://go.microsoft.com/fwlink/?linkid=872424) -## Device Installation +### Device Installation ::: zone-end ::: zone pivot="atp-march-2020,atp-april-2020" @@ -1000,7 +1007,7 @@ When you use Microsoft Edge, Microsoft Defender Application Guard protects your ::: zone-end ::: zone pivot="atp-sept-2020,atp-december-2020" -## DMA Guard +### DMA Guard ::: zone-end ::: zone pivot="atp-sept-2020,atp-december-2020" @@ -1021,7 +1028,7 @@ When you use Microsoft Edge, Microsoft Defender Application Guard protects your -## Endpoint Detection and Response +### Endpoint Detection and Response - **Sample sharing for all files** Baseline default: *Yes* @@ -1034,7 +1041,7 @@ When you use Microsoft Edge, Microsoft Defender Application Guard protects your ::: zone-end ::: zone pivot="atp-march-2020,atp-april-2020,atp-sept-2020,atp-december-2020" -## Firewall +### Firewall - **Stateful File Transfer Protocol (FTP)** Baseline default: *Disabled* @@ -1200,7 +1207,7 @@ When you use Microsoft Edge, Microsoft Defender Application Guard protects your ::: zone-end ::: zone pivot="atp-march-2020,atp-april-2020,atp-sept-2020,atp-december-2020" -## Microsoft Defender +### Microsoft Defender ::: zone-end ::: zone pivot="atp-december-2020" @@ -1591,7 +1598,7 @@ When you use Microsoft Edge, Microsoft Defender Application Guard protects your -## Microsoft Defender Security Center +### Microsoft Defender Security Center - **Block users from editing the Exploit Guard protection interface** Baseline default: *Yes* @@ -1600,7 +1607,7 @@ When you use Microsoft Edge, Microsoft Defender Application Guard protects your ::: zone-end ::: zone pivot="atp-march-2020,atp-april-2020,atp-sept-2020,atp-december-2020" -## Smart Screen +### Smart Screen - **Block users from ignoring SmartScreen warnings** Baseline default: *Yes* @@ -1649,7 +1656,7 @@ When you use Microsoft Edge, Microsoft Defender Application Guard protects your -## Windows Hello for Business +### Windows Hello for Business For more information, see [PassportForWork CSP](/windows/client-management/mdm/passportforwork-csp) in the Windows documentation. diff --git a/memdocs/intune/protect/security-baseline-settings-edge.md b/memdocs/intune/protect/security-baseline-settings-edge.md index ab1ce8e995d..0c37a57bcbf 100644 --- a/memdocs/intune/protect/security-baseline-settings-edge.md +++ b/memdocs/intune/protect/security-baseline-settings-edge.md @@ -7,7 +7,7 @@ description: View a list of the settings in the Microsoft Intune security baseli author: brenduns ms.author: brenduns manager: dougeby -ms.date: 03/26/2024 +ms.date: 01/09/2025 ms.topic: reference ms.service: microsoft-intune ms.subservice: protect @@ -32,37 +32,46 @@ zone_pivot_groups: edge-baseline-versions # List of the settings in the Microsoft Edge security baseline in Intune -This article is a reference for the settings that are available in the different versions of the Microsoft Edge security baseline that you can deploy with Microsoft Intune. You can use the tabs below to select and view the settings in the current baseline version and a few older versions that might still be in use. +This article is a reference for the settings that are available in the Microsoft Edge security baseline for Microsoft Intune. -For each setting you’ll find the baselines default configuration, which is also the recommended configuration for that setting provided by the relevant security team. Because products and the security landscape evolve, the recommended defaults in one baseline version might not match the defaults you find in later versions of the same baseline. Different baseline types could also set different defaults. +In May 2023, the settings for the Microsoft Edge baselines updated to a new format. This article provides a reference for Microsoft Edge baselines version 85 and earlier. To view the settings reference for newer baselines, see [Microsoft Edge security baseline settings reference for Microsoft Intune](../protect/security-baseline-v2-edge-settings.md). - -Although the settings in the Intune UI for this baseline omit *Learn more* links, this article includes links to relevant content. +## About this reference article -When a new version of a baseline becomes available, it replaces the previous version. Profiles instances that you’ve created prior to the availability of a new version: +Each security baseline is a group of preconfigured Windows settings that help you apply and enforce granular security settings that the relevant security teams recommend. You can also customize each baseline you deploy to enforce only those settings and values you require. When you create a security baseline profile in Intune, you're creating a template that consists of multiple device configuration settings. + +The details that display in this article are based on baseline version you select at the top of the article. For each version, this article displays: + +- A list of each setting with its configuration as found in the default instance of that baseline version. +- When available, a link to the underlying configuration service provider (CSP) documentation or other related content from the relevant product group that provides context and possibly additional details for a settings use. + +When a new version of a baseline becomes available, it replaces the previous version. Profile instances that you’ve created prior to the availability of a new version: - Become read-only. You can continue to use those profiles but can't edit them to change their configuration. -- Can be updated to the latest version. After you update a profile to the current baseline version, you can edit the profile to modify settings. +- Can be updated to the current version. After you update a profile to the current baseline version, you can edit the profile to modify settings. + +To learn more about using security baselines, see: +- [Use security baselines](../protect/security-baselines.md) +- [Change the baseline version for a profile](../protect/security-baselines-configure.md#update-baselines-that-use-the-previous-format) +- [Manage security baselines](../protect/security-baselines-configure.md) -To learn more about using security baselines, see [Use security baselines](security-baselines.md). In that article you'll also find information about how to: - -- [Change the baseline version for a profile](../protect/security-baselines-configure.md#update-baselines-that-use-the-previous-format) to update a profile to use the latest version of that baseline. ::: zone pivot="edge-sept-2020" -**Microsoft Edge baseline for September 2020 (Edge version 85)** +## Microsoft Edge baseline for September 2020 (Edge version 85) + ::: zone-end ::: zone pivot="edge-april-2020" -**Microsoft Edge baseline for April 2020 (Edge version 80)** +## Microsoft Edge baseline for April 2020 (Edge version 80) ::: zone-end ::: zone pivot="edge-october-2019" -**Microsoft Edge baseline for October 2019** +## Microsoft Edge baseline for October 2019 > [!NOTE] -> The Microsoft Edge baseline for October 2019 is in Public Preview. +> The Microsoft Edge baseline for October 2019 is a Public Preview. ::: zone-end -## Microsoft Edge +### Microsoft Edge ::: zone pivot="edge-sept-2020,edge-april-2020" diff --git a/memdocs/intune/protect/security-baseline-settings-mdm-all.md b/memdocs/intune/protect/security-baseline-settings-mdm-all.md index 31c02051079..fd9899df65d 100644 --- a/memdocs/intune/protect/security-baseline-settings-mdm-all.md +++ b/memdocs/intune/protect/security-baseline-settings-mdm-all.md @@ -7,7 +7,7 @@ description: View the default setting configuration of the various Microsoft Int author: brenduns ms.author: brenduns manager: dougeby -ms.date: 07/01/2024 +ms.date: 01/09/2025 ms.topic: reference ms.service: microsoft-intune ms.subservice: protect @@ -29,42 +29,55 @@ ms.collection: zone_pivot_groups: windows-mdm-versions --- -# List of the settings in the Windows MDM security baseline in Intune +# Windows MDM security baseline settings reference for Microsoft Intune -This article is a reference for the settings that are available in the different versions of the Windows Mobile Device Management (MDM) security baseline for Windows 10 and Windows 11 devices that you manage with Microsoft Intune. You can use the provided Tabs to select and view the settings in the current baseline version and a few older versions that might still be in use. +This article is a reference for the settings that are available in the Windows Mobile Device Management (MDM) security baseline for Microsoft Intune. -For each setting you’ll find the baselines default configuration, which is also the recommended configuration for that setting provided by the relevant security team. Because products and the security landscape evolve, the recommended defaults in one baseline version might not match the defaults you find in later versions of the same baseline. Different baseline types, like the *MDM security* and the *Defender for Endpoint* baselines, could also set different defaults. +## About this reference article -When the Intune UI includes a *Learn more* link for a setting, you’ll find that here as well. Use that link to view the settings *policy configuration service provider* (CSP) or relevant content that explains the settings operation. +Each security baseline is a group of preconfigured Windows settings that help you apply and enforce granular security settings that the relevant security teams recommend. You can also customize each baseline you deploy to enforce only those settings and values you require. When you create a security baseline profile in Intune, you're creating a template that consists of multiple device configuration settings. -When a new version of a baseline becomes available, it replaces the previous version. Profiles instances that you’ve created before the availability of a new version: +The details that display in this article are based on baseline version you select at the top of the article. For each version, this article displays: + +- A list of each setting with its configuration as found in the default instance of that baseline version. +- When available, a link to the underlying configuration service provider (CSP) documentation or other related content from the relevant product group that provides context and possibly additional details for a settings use. + +When a new version of a baseline becomes available, it replaces the previous version. Profile instances that you’ve created prior to the availability of a new version: - Become read-only. You can continue to use those profiles but can't edit them to change their configuration. -- Can be updated to the latest version. After you update a profile to the current baseline version, you can edit the profile to modify settings. +- Can be updated to the current version. After you update a profile to the current baseline version, you can edit the profile to modify settings. + +To learn more about using security baselines, see: + +- [Use security baselines](../protect/security-baselines.md) +- [Change the baseline version for a profile](../protect/security-baselines-configure.md#update-baselines-that-use-the-previous-format) +- [Manage security baselines](../protect/security-baselines-configure.md) -To learn more about using security baselines, see [Use security baselines](security-baselines.md). In that article you'll also find information about how to [Change the baseline version for a profile](../protect/security-baselines-configure.md#update-baselines-that-use-the-previous-format) to update a profile to use the latest version of that baseline. ::: zone pivot="mdm-23h2" -**Security Baseline for Windows, version 23H2** +## Security Baseline for Windows, version 23H2 The settings in this baseline are taken from the **version 23H2** of the Group Policy security baseline as found in the [Security Compliance Toolkit and Baselines](https://www.microsoft.com/en-us/download/details.aspx?id=55319) from the Microsoft Download Center, and include only the settings that apply to Windows devices managed through Intune. When available, the setting name links to the source Configuration Service Provider (CSP), and then displays that settings default configuration in the baseline. ::: zone-end ::: zone pivot="mdm-november-2021" -**Security Baseline for Windows, November 2021** +## Security Baseline for Windows, November 2021 + ::: zone-end ::: zone pivot="mdm-december-2020" -**Security Baseline for Windows, December 2020** +## Security Baseline for Windows, December 2020 + ::: zone-end ::: zone pivot="mdm-august-2020" -**Security Baseline for Windows, August 2020** +## Security Baseline for Windows, August 2020 + ::: zone-end ::: zone pivot="mdm-23h2" -## Administrative Templates +### Administrative Templates -### Control Panel > Personalization +#### Control Panel > Personalization - **Prevent enabling lock screen camera** Baseline default: *Enabled* @@ -74,7 +87,7 @@ The settings in this baseline are taken from the **version 23H2** of the Group P Baseline default: *Enabled* [Learn more](/windows/client-management/mdm/policy-csp-devicelock?WT.mc_id=Portal-fx#preventlockscreenslideshow) -### MS Security Guide +#### MS Security Guide - **Apply UAC restrictions to local accounts on network logons** Baseline default: *Enabled* @@ -98,7 +111,7 @@ The settings in this baseline are taken from the **version 23H2** of the Group P Baseline default: *Disabled* [Learn more](/windows/client-management/mdm/policy-csp-mssecurityguide?WT.mc_id=Portal-fx#wdigestauthentication) -### MSS (Legacy) +#### MSS (Legacy) - **MSS: (DisableIPSourceRouting IPv6) IP source routing protection level (protects against packet spoofing)** Baseline default: *Enabled* @@ -120,19 +133,19 @@ The settings in this baseline are taken from the **version 23H2** of the Group P Baseline default: *Enabled* [Learn more](/windows/client-management/mdm/policy-csp-msslegacy?WT.mc_id=Portal-fx#allowthecomputertoignorenetbiosnamereleaserequestsexceptfromwinsservers) -### Network > DNS Client +#### Network > DNS Client - **Turn off multicast name resolution** Baseline default: *Enabled* [Learn more](/windows/client-management/mdm/policy-csp-admx-dnsclient?WT.mc_id=Portal-fx#turn_off_multicast) -### Network > Network Connections +#### Network > Network Connections - **Prohibit use of Internet Connection Sharing on your DNS domain network** Baseline default: *Enabled* [Learn more](/windows/client-management/mdm/policy-csp-admx-networkconnections?WT.mc_id=Portal-fx#nc-showsharedaccessui) -### Network > Network Provider +#### Network > Network Provider - **Hardened UNC Paths** Baseline default: *Enabled* @@ -145,13 +158,13 @@ The settings in this baseline are taken from the **version 23H2** of the Group P | `\\*\SYSVOL` | RequireMutualAuthentication=1,RequireIntegrity=1 | | `\\*\NETLOGON` | RequireMutualAuthentication=1,RequireIntegrity=1 | -### Network > Windows Connection Manager +#### Network > Windows Connection Manager - **Prohibit connection to non-domain networks when connected to domain authenticated network** Baseline default: *Enabled* [Learn more](/windows/client-management/mdm/policy-csp-windowsconnectionmanager?WT.mc_id=Portal-fx#prohitconnectiontonondomainnetworkswhenconnectedtodomainauthenticatednetwork) -### Printers +#### Printers - **Configure Redirection Guard** Baseline default: *Enabled* @@ -191,13 +204,13 @@ The settings in this baseline are taken from the **version 23H2** of the Group P - **Manage processing of Queue-specific files: (Device)** Baseline default: *Limit Queue-specific files to Color profiles* -### Start Menu and Taskbar > Notifications +#### Start Menu and Taskbar > Notifications - **Turn off toast notifications on the lock screen (User)** Baseline default: *Enabled* [Learn more](/windows/client-management/mdm/policy-csp-admx-wpn?WT.mc_id=Portal-fx#nolockscreentoastnotification) -### System > Credentials Delegation +#### System > Credentials Delegation - **Encryption Oracle Remediation** Baseline default: *Enabled* @@ -209,7 +222,7 @@ The settings in this baseline are taken from the **version 23H2** of the Group P Baseline default: *Enabled* [Learn more](/windows/client-management/mdm/policy-csp-credentialsdelegation?WT.mc_id=Portal-fx#remotehostallowsdelegationofnonexportablecredentials) -### System > Device Installation > Device Installation Restrictions +#### System > Device Installation > Device Installation Restrictions - **Prevent installation of devices using drivers that match these device setup classes** Baseline default: *Enabled* @@ -219,7 +232,7 @@ The settings in this baseline are taken from the **version 23H2** of the Group P - **Prevented Classes** Baseline default: *{d48179be-ec20-11d1-b6b8-00c04fa372a7}* -### System > Early Launch Antimalware +#### System > Early Launch Antimalware - **Boot-Start Driver Initialization Policy** Baseline default: *Enabled* @@ -227,7 +240,7 @@ The settings in this baseline are taken from the **version 23H2** of the Group P - **Choose the boot-start drivers that can be initialized:** Baseline default: *Good, unknown and bad but critical* -### System > Group Policy +#### System > Group Policy - **Configure registry policy processing** Baseline default: *Enabled* @@ -237,7 +250,7 @@ The settings in this baseline are taken from the **version 23H2** of the Group P - **Process even if the Group Policy objects have not changed (Device)** Baseline default: *True* -### System > Internet Communication Management > Internet Communication settings +#### System > Internet Communication Management > Internet Communication settings - **Turn off downloading of print drivers** Baseline default: *Enabled* @@ -247,13 +260,13 @@ The settings in this baseline are taken from the **version 23H2** of the Group P Baseline default: *Enabled* [Learn more](/windows/client-management/mdm/policy-csp-connectivity?WT.mc_id=Portal-fx#disableinternetdownloadforwebpublishingandonlineorderingwizards) -### System > Local Security Authority +#### System > Local Security Authority - **Allow Custom SSPs and APs to be loaded into LSASS** Baseline default: *Disabled* [Learn more](/windows/client-management/mdm/policy-csp-lsa#allowcustomsspsaps) -### System > Power Management > Sleep Settings +#### System > Power Management > Sleep Settings - **Allow standby states (S1-S3) when sleeping (on battery)** Baseline default: *Disabled* @@ -271,13 +284,13 @@ The settings in this baseline are taken from the **version 23H2** of the Group P Baseline default: *Enabled* [Learn more](/windows/client-management/mdm/policy-csp-power?WT.mc_id=Portal-fx#requirepasswordwhencomputerwakespluggedin) -### System > Remote Assistance +#### System > Remote Assistance - **Configure Solicited Remote Assistance** Baseline default: *Disabled* [Learn more](/windows/client-management/mdm/policy-csp-remoteassistance?WT.mc_id=Portal-fx#solicitedremoteassistance) -### System > Remote Procedure Call +#### System > Remote Procedure Call - **Restrict Unauthenticated RPC clients** Baseline default: *Enabled* @@ -285,13 +298,13 @@ The settings in this baseline are taken from the **version 23H2** of the Group P - **RPC Runtime Unauthenticated Client Restriction to Apply:** Baseline default: *Authenticated* -### Windows Components > App runtime +#### Windows Components > App runtime - **Allow Microsoft accounts to be optional** Baseline default: *Enabled* [Learn more](/windows/client-management/mdm/policy-csp-appruntime?WT.mc_id=Portal-fx#allowmicrosoftaccountstobeoptional) -### Windows Components > AutoPlay Policies +#### Windows Components > AutoPlay Policies - **Disallow Autoplay for non-volume devices** Baseline default: *Enabled* @@ -309,13 +322,13 @@ The settings in this baseline are taken from the **version 23H2** of the Group P - **Turn off Autoplay on:** Baseline default: *All drives* -### Windows Components > BitLocker Drive Encryption > Fixed Data Drives +#### Windows Components > BitLocker Drive Encryption > Fixed Data Drives - **Deny write access to fixed drives not protected by BitLocker** Baseline default: *Disabled* [Learn more](/windows/client-management/mdm/bitlocker-csp?WT.mc_id=Portal-fx#fixeddrivesrequireencryption) -### Windows Components > BitLocker Drive Encryption > Removable Data Drives +#### Windows Components > BitLocker Drive Encryption > Removable Data Drives - **Deny write access to removable drives not protected by BitLocker** Baseline default: *Enabled* @@ -323,13 +336,13 @@ The settings in this baseline are taken from the **version 23H2** of the Group P - **Do not allow write access to devices configured in another organization** Baseline default: *False* -### Windows Components > Credential User Interface +#### Windows Components > Credential User Interface - **Enumerate administrator accounts on elevation** Baseline default: *Disabled* [Learn more](/windows/client-management/mdm/policy-csp-credentialsui?WT.mc_id=Portal-fx#enumerateadministrators) -### Windows Components > Event Log Service > Application +#### Windows Components > Event Log Service > Application - **Specify the maximum log file size (KB)** Baseline default: *Enabled* @@ -337,7 +350,7 @@ The settings in this baseline are taken from the **version 23H2** of the Group P - **Maximum Log Size (KB)** Baseline default: *32768* -### Windows Components > Event Log Service > Security +#### Windows Components > Event Log Service > Security - **Specify the maximum log file size (KB)** Baseline default: *Enabled* @@ -345,7 +358,7 @@ The settings in this baseline are taken from the **version 23H2** of the Group P - **Maximum Log Size (KB)** Baseline default: *196608* -### Windows Components > Event Log Service > System +#### Windows Components > Event Log Service > System - **Specify the maximum log file size (KB)** Baseline default: *Enabled* @@ -353,7 +366,7 @@ The settings in this baseline are taken from the **version 23H2** of the Group P - **Maximum Log Size (KB)** Baseline default: *32768* -### Windows Components > File Explorer +#### Windows Components > File Explorer - **Configure Windows Defender SmartScreen** Baseline default: *Enabled* @@ -369,7 +382,7 @@ The settings in this baseline are taken from the **version 23H2** of the Group P Baseline default: *Disabled* [Learn more](/windows/client-management/mdm/policy-csp-fileexplorer?WT.mc_id=Portal-fx#turnoffheapterminationoncorruption) -### Windows Components > Internet Explorer > Internet Control Panel > Advanced Page +#### Windows Components > Internet Explorer > Internet Control Panel > Advanced Page - **Allow software to run or install even if the signature is invalid** Baseline default: *Disabled* @@ -401,13 +414,13 @@ The settings in this baseline are taken from the **version 23H2** of the Group P Baseline default: *Enabled* [Learn more](/windows/client-management/mdm/policy-csp-internetexplorer?WT.mc_id=Portal-fx#allowenhancedprotectedmode) -### Windows Components > Internet Explorer > Internet Control Panel +#### Windows Components > Internet Explorer > Internet Control Panel - **Prevent ignoring certificate errors** Baseline default: *Enabled* [Learn more](/windows/client-management/mdm/policy-csp-internetexplorer?WT.mc_id=Portal-fx#disableignoringcertificateerrors) -### Windows Components > Internet Explorer > Internet Control Panel > Security Page > Internet Zone +#### Windows Components > Internet Explorer > Internet Control Panel > Security Page > Internet Zone - **Access data sources across domains** Baseline default: *Enabled* @@ -595,7 +608,7 @@ The settings in this baseline are taken from the **version 23H2** of the Group P - **Web sites in less privileged Web content zones can navigate into this zone** Baseline default: *Disable* -### Windows Components > Internet Explorer > Internet Control Panel > Security Page +#### Windows Components > Internet Explorer > Internet Control Panel > Security Page - **Intranet Sites: Include all network paths (UNCs)** Baseline default: *Disabled* @@ -605,7 +618,7 @@ The settings in this baseline are taken from the **version 23H2** of the Group P Baseline default: *Enabled* [Learn more](/windows/client-management/mdm/policy-csp-internetexplorer?WT.mc_id=Portal-fx#allowcertificateaddressmismatchwarning) -### Windows Components > Internet Explorer > Internet Control Panel > Security Page > Intranet Zone +#### Windows Components > Internet Explorer > Internet Control Panel > Security Page > Intranet Zone - **Don't run antimalware programs against ActiveX controls** Baseline default: *Enabled* @@ -625,7 +638,7 @@ The settings in this baseline are taken from the **version 23H2** of the Group P - **Java permissions** Baseline default: *High safety* -### Windows Components > Internet Explorer > Internet Control Panel > Security Page > Local Machine Zone +#### Windows Components > Internet Explorer > Internet Control Panel > Security Page > Local Machine Zone - **Don't run antimalware programs against ActiveX controls** Baseline default: *Enabled* @@ -639,7 +652,7 @@ The settings in this baseline are taken from the **version 23H2** of the Group P - **Java permissions** Baseline default: *Disable Java* -### Windows Components > Internet Explorer > Internet Control Panel > Security Page > Locked-Down Internet Zone +#### Windows Components > Internet Explorer > Internet Control Panel > Security Page > Locked-Down Internet Zone - **Turn on SmartScreen Filter scan** Baseline default: *Enabled* @@ -647,7 +660,7 @@ The settings in this baseline are taken from the **version 23H2** of the Group P - **Use SmartScreen Filter** Baseline default: *Enable* -### Windows Components > Internet Explorer > Internet Control Panel > Security Page > Locked-Down Intranet Zone +#### Windows Components > Internet Explorer > Internet Control Panel > Security Page > Locked-Down Intranet Zone - **Java permissions** Baseline default: *Enabled* @@ -655,7 +668,7 @@ The settings in this baseline are taken from the **version 23H2** of the Group P - **Java permissions** Baseline default: *Disable Java* -### Windows Components > Internet Explorer > Internet Control Panel > Security Page > Locked-Down Local Machine Zone +#### Windows Components > Internet Explorer > Internet Control Panel > Security Page > Locked-Down Local Machine Zone - **Java permissions** Baseline default: *Enabled* @@ -663,7 +676,7 @@ The settings in this baseline are taken from the **version 23H2** of the Group P - **Java permissions** Baseline default: *Disable Java* -### Windows Components > Internet Explorer > Internet Control Panel > Security Page > Locked-Down Restricted Sites Zone +#### Windows Components > Internet Explorer > Internet Control Panel > Security Page > Locked-Down Restricted Sites Zone - **Java permissions** Baseline default: *Enabled* @@ -677,7 +690,7 @@ The settings in this baseline are taken from the **version 23H2** of the Group P - **Use SmartScreen Filter** Baseline default: *Enable* -### Windows Components > Internet Explorer > Internet Control Panel > Security Page > Locked-Down Trusted Sites Zone +#### Windows Components > Internet Explorer > Internet Control Panel > Security Page > Locked-Down Trusted Sites Zone - **Java permissions** Baseline default: *Enabled* @@ -685,7 +698,7 @@ The settings in this baseline are taken from the **version 23H2** of the Group P - **Java permissions** Baseline default: *Disable Java* -### Windows Components > Internet Explorer > Internet Control Panel > Security Page > Restricted Sites Zone +#### Windows Components > Internet Explorer > Internet Control Panel > Security Page > Restricted Sites Zone - **Access data sources across domains** Baseline default: *Enabled* @@ -921,7 +934,7 @@ The settings in this baseline are taken from the **version 23H2** of the Group P - **Web sites in less privileged Web content zones can navigate into this zone** Baseline default: *Disable* -### Windows Components > Internet Explorer > Internet Control Panel > Security Page > Trusted Sites Zone +#### Windows Components > Internet Explorer > Internet Control Panel > Security Page > Trusted Sites Zone - **Don't run antimalware programs against ActiveX controls** Baseline default: *Enabled* @@ -941,7 +954,7 @@ The settings in this baseline are taken from the **version 23H2** of the Group P - **Java permissions** Baseline default: *High safety* -### Windows Components > Internet Explorer +#### Windows Components > Internet Explorer - **Prevent bypassing SmartScreen Filter warnings** Baseline default: *Enabled* @@ -989,7 +1002,7 @@ The settings in this baseline are taken from the **version 23H2** of the Group P Baseline default: *Disabled* [Learn more](/windows/client-management/mdm/policy-csp-internetexplorer?WT.mc_id=Portal-fx#allowautocomplete) -### Windows Components > Internet Explorer > Security Features > Add-on Management +#### Windows Components > Internet Explorer > Security Features > Add-on Management - **Remove "Run this time" button for outdated ActiveX controls in Internet Explorer** Baseline default: *Enabled* @@ -999,7 +1012,7 @@ The settings in this baseline are taken from the **version 23H2** of the Group P Baseline default: *Disabled* [Learn more](/windows/client-management/mdm/policy-csp-internetexplorer?WT.mc_id=Portal-fx#donotblockoutdatedactivexcontrols) -### Windows Components > Internet Explorer > Security Features +#### Windows Components > Internet Explorer > Security Features - **Allow fallback to SSL 3.0 (Internet Explorer)** Baseline default: *Enabled* @@ -1007,91 +1020,91 @@ The settings in this baseline are taken from the **version 23H2** of the Group P - **Allow insecure fallback for:** Baseline default: *No Sites* -### Windows Components > Internet Explorer > Security Features > Consistent Mime Handling +#### Windows Components > Internet Explorer > Security Features > Consistent Mime Handling - **Internet Explorer Processes** Baseline default: *Enabled* [Learn more](/windows/client-management/mdm/policy-csp-internetexplorer?WT.mc_id=Portal-fx#consistentmimehandlinginternetexplorerprocesses) -### Windows Components > Internet Explorer > Security Features > Mime Sniffing Safety Feature +#### Windows Components > Internet Explorer > Security Features > Mime Sniffing Safety Feature - **Internet Explorer Processes** Baseline default: *Enabled* [Learn more](/windows/client-management/mdm/policy-csp-internetexplorer?WT.mc_id=Portal-fx#mimesniffingsafetyfeatureinternetexplorerprocesses) -### Windows Components > Internet Explorer > Security Features > MK Protocol Security Restriction +#### Windows Components > Internet Explorer > Security Features > MK Protocol Security Restriction - **Internet Explorer Processes** Baseline default: *Enabled* [Learn more](/windows/client-management/mdm/policy-csp-internetexplorer?WT.mc_id=Portal-fx#mkprotocolsecurityrestrictioninternetexplorerprocesses) -### Windows Components > Internet Explorer > Security Features > Notification bar +#### Windows Components > Internet Explorer > Security Features > Notification bar - **Internet Explorer Processes** Baseline default: *Enabled* [Learn more](/windows/client-management/mdm/policy-csp-internetexplorer?WT.mc_id=Portal-fx#notificationbarinternetexplorerprocesses) -### Windows Components > Internet Explorer > Security Features > Protection From Zone Elevation +#### Windows Components > Internet Explorer > Security Features > Protection From Zone Elevation - **Internet Explorer Processes** Baseline default: *Enabled* [Learn more](/windows/client-management/mdm/policy-csp-internetexplorer?WT.mc_id=Portal-fx#protectionfromzoneelevationinternetexplorerprocesses) -### Windows Components > Internet Explorer > Security Features > Restrict ActiveX Install +#### Windows Components > Internet Explorer > Security Features > Restrict ActiveX Install - **Internet Explorer Processes** Baseline default: *Enabled* [Learn more](/windows/client-management/mdm/policy-csp-internetexplorer?WT.mc_id=Portal-fx#restrictactivexinstallinternetexplorerprocesses) -### Windows Components > Internet Explorer > Security Features > Restrict File Download +#### Windows Components > Internet Explorer > Security Features > Restrict File Download - **Internet Explorer Processes** Baseline default: *Enabled* [Learn more](/windows/client-management/mdm/policy-csp-internetexplorer?WT.mc_id=Portal-fx#restrictfiledownloadinternetexplorerprocesses) -### Windows Components > Internet Explorer > Security Features > Scripted Window Security Restrictions +#### Windows Components > Internet Explorer > Security Features > Scripted Window Security Restrictions - **Internet Explorer Processes** Baseline default: *Enabled* [Learn more](/windows/client-management/mdm/policy-csp-internetexplorer?WT.mc_id=Portal-fx#scriptedwindowsecurityrestrictionsinternetexplorerprocesses) -### Windows Components > Microsoft Defender Antivirus > MAPS +#### Windows Components > Microsoft Defender Antivirus > MAPS - **Configure the 'Block at First Sight' feature** Baseline default: *Enabled* [Learn more](/windows/client-management/mdm/policy-csp-admx-microsoftdefenderantivirus?WT.mc_id=Portal-fx#disableblockatfirstseen) -### Windows Components > Microsoft Defender Antivirus > Real-time Protection +#### Windows Components > Microsoft Defender Antivirus > Real-time Protection - **Turn on process scanning whenever real-time protection is enabled** Baseline default: *Enabled* [Learn more](/windows/client-management/mdm/policy-csp-admx-microsoftdefenderantivirus?WT.mc_id=Portal-fx#realtimeprotection-disablescanonrealtimeenable) -### Windows Components > Microsoft Defender Antivirus > Scan +#### Windows Components > Microsoft Defender Antivirus > Scan - **Scan packed executables** Baseline default: *Enabled* [Learn more](/windows/client-management/mdm/policy-csp-admx-microsoftdefenderantivirus?WT.mc_id=Portal-fx#scan-disablepackedexescanning) -### Windows Components > Microsoft Defender Antivirus +#### Windows Components > Microsoft Defender Antivirus - **Turn off routine remediation** Baseline default: *Disabled* [Learn more](/windows/client-management/mdm/policy-csp-admx-microsoftdefenderantivirus?WT.mc_id=Portal-fx#disableroutinelytakingaction) -### Windows Components > Remote Desktop Services > Remote Desktop Connection Client +#### Windows Components > Remote Desktop Services > Remote Desktop Connection Client - **Do not allow passwords to be saved** Baseline default: *Enabled* [Learn more](/windows/client-management/mdm/policy-csp-remotedesktopservices?WT.mc_id=Portal-fx#donotallowpasswordsaving) -### Windows Components > Remote Desktop Services > Remote Desktop Session Host > Device and Resource Redirection +#### Windows Components > Remote Desktop Services > Remote Desktop Session Host > Device and Resource Redirection - **Do not allow drive redirection** Baseline default: *Enabled* [Learn more](/windows/client-management/mdm/policy-csp-remotedesktopservices?WT.mc_id=Portal-fx#donotallowdriveredirection) -### Windows Components > Remote Desktop Services > Remote Desktop Session Host > Security +#### Windows Components > Remote Desktop Services > Remote Desktop Session Host > Security - **Always prompt for password upon connection** Baseline default: *Enabled* @@ -1107,13 +1120,13 @@ The settings in this baseline are taken from the **version 23H2** of the Group P - **Encryption Level** Baseline default: *High Level* -### Windows Components > RSS Feeds +#### Windows Components > RSS Feeds - **Prevent downloading of enclosures** Baseline default: *Enabled* [Learn more](/windows/client-management/mdm/policy-csp-internetexplorer?WT.mc_id=Portal-fx#disableenclosuredownloading) -### Windows Components > Windows Logon Options +#### Windows Components > Windows Logon Options - **Enable MPR notifications for the system** Baseline default: *Disabled* @@ -1123,7 +1136,7 @@ The settings in this baseline are taken from the **version 23H2** of the Group P Baseline default: *Disabled* [Learn more](/windows/client-management/mdm/policy-csp-windowslogon?WT.mc_id=Portal-fx#allowautomaticrestartsignon) -### Windows Components > Windows PowerShell +#### Windows Components > Windows PowerShell - **Turn on PowerShell Script Block Logging** Baseline default: *Enabled* @@ -1131,7 +1144,7 @@ The settings in this baseline are taken from the **version 23H2** of the Group P - **Log script block invocation start / stop events:** Baseline default: *False* -### Windows Components > Windows Remote Management (WinRM) > WinRM Client +#### Windows Components > Windows Remote Management (WinRM) > WinRM Client - **Allow Basic authentication** Baseline default: *Disabled* @@ -1145,7 +1158,7 @@ The settings in this baseline are taken from the **version 23H2** of the Group P Baseline default: *Enabled* [Learn more](/windows/client-management/mdm/policy-csp-remotemanagement?WT.mc_id=Portal-fx#disallowdigestauthentication) -### Windows Components > Windows Remote Management (WinRM) > WinRM Service +#### Windows Components > Windows Remote Management (WinRM) > WinRM Service - **Allow Basic authentication** Baseline default: *Disabled* @@ -1159,7 +1172,7 @@ The settings in this baseline are taken from the **version 23H2** of the Group P Baseline default: *Enabled* [Learn more](/windows/client-management/mdm/policy-csp-remotemanagement?WT.mc_id=Portal-fx#disallowstoringofrunascredentials) -## Auditing +### Auditing - **Account Logon Audit Credential Validation** Baseline default: *Success+ Failure* @@ -1253,7 +1266,7 @@ The settings in this baseline are taken from the **version 23H2** of the Group P Baseline default: *Success+ Failure* [Learn more](/windows/client-management/mdm/policy-csp-Audit?WT.mc_id=Portal-fx#system_auditsystemintegrity) -## Browser +### Browser - **Allow Password Manager** Baseline default: *Block* @@ -1275,13 +1288,13 @@ The settings in this baseline are taken from the **version 23H2** of the Group P Baseline default: *Enabled* [Learn more](/windows/client-management/mdm/policy-csp-Browser?WT.mc_id=Portal-fx#preventsmartscreenpromptoverrideforfiles) -## Data Protection +### Data Protection - **Allow Direct Memory Access** Baseline default: *Block* [Learn more](/windows/client-management/mdm/policy-csp-dataprotection?WT.mc_id=Portal-fx#allowdirectmemoryaccess) -## Defender +### Defender - **Allow Archive Scanning** Baseline default: *Allowed. Scans the archive files.* @@ -1385,7 +1398,7 @@ The settings in this baseline are taken from the **version 23H2** of the Group P Baseline default: *Send all samples automatically.* [Learn more](/windows/client-management/mdm/policy-csp-defender?WT.mc_id=Portal-fx#submitsamplesconsent) -## Device Guard +### Device Guard - **Configure System Guard Launch** Baseline default: *Unmanaged Enables Secure Launch if supported by hardware* @@ -1403,7 +1416,7 @@ The settings in this baseline are taken from the **version 23H2** of the Group P Baseline default: *Turns on VBS with Secure Boot.* [Learn more](/windows/client-management/mdm/policy-csp-deviceguard?WT.mc_id=Portal-fx#requireplatformsecurityfeatures) -## Device Lock +### Device Lock - **Device Password Enabled** Baseline default: *Enabled* @@ -1417,13 +1430,13 @@ The settings in this baseline are taken from the **version 23H2** of the Group P Value: *14* [Learn more](/windows/client-management/mdm/policy-csp-devicelock?WT.mc_id=Portal-fx#mindevicepasswordlength) -## Dma Guard +### Dma Guard - **Device Enumeration Policy** Baseline default: *Block all (Most restrictive)* [Learn more](/windows/client-management/mdm/policy-csp-dmaguard?WT.mc_id=Portal-fx#deviceenumerationpolicy) -## Experience +### Experience - **Allow Windows Spotlight (User)** Baseline default: *Allow* @@ -1435,7 +1448,7 @@ The settings in this baseline are taken from the **version 23H2** of the Group P Baseline default: *Block* [Learn more](/windows/client-management/mdm/policy-csp-Experience?WT.mc_id=Portal-fx#allowthirdpartysuggestionsinwindowsspotlight) -## Firewall +### Firewall - **Enable Domain Network Firewall** Baseline default: *True* @@ -1509,13 +1522,13 @@ The settings in this baseline are taken from the **version 23H2** of the Group P Baseline default: *False* [Learn more](/windows/client-management/mdm/firewall-csp?WT.mc_id=Portal-fx#mdmstorepublicprofileallowlocalipsecpolicymerge) -## Lanman Workstation +### Lanman Workstation - **Enable Insecure Guest Logons** Baseline default: *Disabled* [Learn more](/windows/client-management/mdm/policy-csp-LanmanWorkstation?WT.mc_id=Portal-fx#enableinsecureguestlogons) -## Local Policies Security Options +### Local Policies Security Options - **Accounts Limit Local Account Use Of Blank Passwords To Console Logon Only** Baseline default: *Enabled* @@ -1603,14 +1616,14 @@ The settings in this baseline are taken from the **version 23H2** of the Group P Baseline default: *Enabled* [Learn more](/windows/client-management/mdm/policy-csp-LocalPoliciesSecurityOptions?WT.mc_id=Portal-fx#useraccountcontrol_virtualizefileandregistrywritefailurestoperuserlocations) -## Local Security Authority +### Local Security Authority - **Configure Lsa Protected Process** Baseline default: *Enabled with UEFI lock. LSA will run as protected process and this configuration is UEFI locked.* [Learn more](/windows/client-management/mdm/policy-csp-lsa#configurelsaprotectedprocess) -## Microsoft App Store +### Microsoft App Store - **Allow Game DVR** Baseline default: *Block* @@ -1624,9 +1637,9 @@ The settings in this baseline are taken from the **version 23H2** of the Group P Baseline default: *Disabled* [Learn more](/windows/client-management/mdm/policy-csp-ApplicationManagement?WT.mc_id=Portal-fx#msialwaysinstallwithelevatedprivileges) -## Microsoft Edge +### Microsoft Edge -### SmartScreen settings +#### SmartScreen settings - **Configure Microsoft Defender SmartScreen** Baseline default: *Enabled* @@ -1634,19 +1647,19 @@ The settings in this baseline are taken from the **version 23H2** of the Group P - **Prevent bypassing Microsoft Defender SmartScreen prompts for sites** Baseline default: *Enabled* -## Privacy +### Privacy - **Let Apps Activate With Voice Above Lock** Baseline default: *Force deny. Windows apps cannot be activated by voice while the screen is locked, and users cannot change it.* [Learn more](/windows/client-management/mdm/policy-csp-Privacy?WT.mc_id=Portal-fx#letappsactivatewithvoiceabovelock) -## Search +### Search - **Allow Indexing Encrypted Stores Or Items** Baseline default: *Block* [Learn more](/windows/client-management/mdm/policy-csp-Search?WT.mc_id=Portal-fx#allowindexingencryptedstoresoritems) -## Smart Screen +### Smart Screen - **Enable Smart Screen In Shell** Baseline default: *Enabled* @@ -1656,7 +1669,7 @@ The settings in this baseline are taken from the **version 23H2** of the Group P Baseline default: *Enabled* [Learn more](/windows/client-management/mdm/policy-csp-smartscreen?WT.mc_id=Portal-fx#preventoverrideforfilesinshell) -### Enhanced Phishing Protection +#### Enhanced Phishing Protection - **Notify Malicious** Baseline default: *Enabled* @@ -1670,7 +1683,7 @@ The settings in this baseline are taken from the **version 23H2** of the Group P - **Service Enabled** Baseline default: *Enabled* -## System Services +### System Services - **Configure Xbox Accessory Management Service Startup Mode** Baseline default: *Disabled* @@ -1688,13 +1701,13 @@ The settings in this baseline are taken from the **version 23H2** of the Group P Baseline default: *Disabled* [Learn more](/windows/client-management/mdm/policy-csp-SystemServices?WT.mc_id=Portal-fx#configurexboxlivenetworkingservicestartupmode) -## Task Scheduler +### Task Scheduler - **Enable Xbox Game Save Task** Baseline default: *Disabled* [Learn more](/windows/client-management/mdm/policy-csp-TaskScheduler?WT.mc_id=Portal-fx#enablexboxgamesavetask) -## User Rights +### User Rights - **Access From Network** Baseline default: *Configured* @@ -1781,13 +1794,13 @@ The settings in this baseline are taken from the **version 23H2** of the Group P Value: *Administrators* (*S-1-5-32-544) [Learn more](/windows/client-management/mdm/policy-csp-UserRights?WT.mc_id=Portal-fx#takeownership) -## Virtualization Based Technology +### Virtualization Based Technology - **Hypervisor Enforced Code Integrity** Baseline default: *(Enabled with UEFI lock) Turns on Hypervisor-Protected Code Integrity with UEFI lock.* [Learn more](/windows/client-management/mdm/policy-csp-VirtualizationBasedTechnology?WT.mc_id=Portal-fx#hypervisorenforcedcodeintegrity) -## Wi-Fi Settings +### Wi-Fi Settings - **Allow Auto Connect To Wi Fi Sense Hotspots** Baseline default: *Block* @@ -1797,19 +1810,19 @@ The settings in this baseline are taken from the **version 23H2** of the Group P Baseline default: *Block* [Learn more](/windows/client-management/mdm/policy-csp-wifi?WT.mc_id=Portal-fx#allowinternetsharing) -## Windows Hello For Business +### Windows Hello For Business - **Facial Features Use Enhanced Anti Spoofing** Baseline default: *true* [Learn more](/windows/client-management/mdm/PassportForWork-csp/?WT.mc_id=Portal-fx#devicebiometricsfacialfeaturesuseenhancedantispoofing) -## Windows Ink Workspace +### Windows Ink Workspace - **Allow Windows Ink Workspace** Baseline default: *Ink workspace is enabled (feature is turned on), but the user cannot access it above the lock screen.* [Learn more](/windows/client-management/mdm/policy-csp-WindowsInkWorkspace?WT.mc_id=Portal-fx#allowwindowsinkworkspace) -## LAPS +### LAPS - **Backup Directory** Baseline default: *Backup the password to Azure AD only* @@ -1822,7 +1835,7 @@ The settings in this baseline are taken from the **version 23H2** of the Group P ::: zone pivot="mdm-august-2020,mdm-december-2020,mdm-november-2021" -## Above Lock +### Above Lock - **Voice activate apps from locked screen**: Baseline default: *Disabled* @@ -1832,7 +1845,7 @@ The settings in this baseline are taken from the **version 23H2** of the Group P Baseline default: *Yes* [Learn More](/windows/client-management/mdm/policy-csp-abovelock#abovelock-allowtoasts) -## App Runtime +### App Runtime - **Microsoft accounts optional for Microsoft store apps**: Baseline default: *Enabled* @@ -1841,7 +1854,7 @@ The settings in this baseline are taken from the **version 23H2** of the Group P ::: zone-end ::: zone pivot="mdm-august-2020,mdm-december-2020,mdm-november-2021" -## Application Management +### Application Management - **Block app installations with elevated privileges**: Baseline default: *Yes* @@ -1855,7 +1868,7 @@ The settings in this baseline are taken from the **version 23H2** of the Group P Baseline default: *Yes* [Learn more](/windows/client-management/mdm/policy-csp-applicationmanagement#applicationmanagement-allowgamedvr) -## Audit +### Audit Audit settings configure the events that are generated for the conditions of the setting. @@ -1931,7 +1944,7 @@ Audit settings configure the events that are generated for the conditions of the - **System Audit System Integrity (Device)**: Baseline default: *Success and Failure* -## Auto Play +### Auto Play - **Auto play default auto run behavior**: Baseline default: *Do not execute* @@ -1945,7 +1958,7 @@ Audit settings configure the events that are generated for the conditions of the Baseline default: *Enabled* [Learn more](/windows/client-management/mdm/policy-csp-autoplay#autoplay-disallowautoplayfornonvolumedevices) -## BitLocker +### BitLocker - **BitLocker removable drive policy**: Baseline default: *Configure* @@ -1955,7 +1968,7 @@ Audit settings configure the events that are generated for the conditions of the Baseline default: *Yes* [Learn more](https://go.microsoft.com/fwlink/?linkid=872540) -## Browser +### Browser - **Block Password Manager**: Baseline default: *Yes* @@ -1977,7 +1990,7 @@ Audit settings configure the events that are generated for the conditions of the Baseline default: *Yes* [Learn more](https://go.microsoft.com/fwlink/?linkid=2067126) -## Connectivity +### Connectivity - **Configure secure access to UNC paths**: Baseline default: *Configure Windows to only allow access to the specified UNC paths after fulfilling additional security requirements* @@ -1994,25 +2007,25 @@ Audit settings configure the events that are generated for the conditions of the Baseline default: *Enabled* [Learn more](https://go.microsoft.com/fwlink/?linkid=2067136) -## Credentials Delegation +### Credentials Delegation - **Remote host delegation of non-exportable credentials**: Baseline default: *Enabled* [Learn more](https://go.microsoft.com/fwlink/?linkid=2067103) -## Credentials UI +### Credentials UI - **Enumerate administrators**: Baseline default: *Disabled* [Learn more](https://go.microsoft.com/fwlink/?linkid=2067021) -## Data Protection +### Data Protection - **Block direct memory access**: Baseline default: Yes [Learn more](https://go.microsoft.com/fwlink/?linkid=2067031) -## Device Guard +### Device Guard - **Virtualization based security**: Baseline default: *Enable VBS with secure boot* @@ -2028,7 +2041,7 @@ Audit settings configure the events that are generated for the conditions of the Baseline default: *Enable with UEFI lock* [Learn more](https://go.microsoft.com/fwlink/?linkid=872424) -## Device Installation +### Device Installation - **Block hardware device installation by setup classes**: Baseline default: *Yes* @@ -2063,7 +2076,7 @@ Audit settings configure the events that are generated for the conditions of the - **Hardware device identifiers that are blocked**: Baseline default: *No default configuration* -## Device Lock +### Device Lock - **Require password**: Baseline default: *Yes* @@ -2109,12 +2122,12 @@ Audit settings configure the events that are generated for the conditions of the Baseline default: *Enabled* [Learn more](https://go.microsoft.com/fwlink/?linkid=2067105) -## DMA Guard +### DMA Guard - **Enumeration of external devices incompatible with Kernel DMA Protection**: Baseline default: *Block all* -## Event Log Service +### Event Log Service - **Application log maximum file size in KB**: Baseline default: *32768* @@ -2128,7 +2141,7 @@ Audit settings configure the events that are generated for the conditions of the Baseline default: *196608* [Learn more](https://go.microsoft.com/fwlink/?linkid=2067042) -## Experience +### Experience - **Block Windows Spotlight**: Baseline default: *Yes* @@ -2145,7 +2158,7 @@ Audit settings configure the events that are generated for the conditions of the ::: zone-end ::: zone pivot="mdm-august-2020" -## Exploit Guard +### Exploit Guard - **Upload XML**: Baseline default: *Sample xml is provided* @@ -2154,7 +2167,7 @@ Audit settings configure the events that are generated for the conditions of the ::: zone-end ::: zone pivot="mdm-august-2020,mdm-december-2020,mdm-november-2021" -## File Explorer +### File Explorer - **Block data execution prevention**: Baseline default: *Disabled* @@ -2164,7 +2177,7 @@ Audit settings configure the events that are generated for the conditions of the Baseline default: *Disabled* [Learn more](https://go.microsoft.com/fwlink/?linkid=2067107) -## Firewall +### Firewall For more information, see [2.2.2 FW_PROFILE_TYPE](https://go.microsoft.com/fwlink/?linkid=2066796) in the Windows Protocols documentation. @@ -2236,7 +2249,7 @@ For more information, see [2.2.2 FW_PROFILE_TYPE](https://go.microsoft.com/fwlin Baseline default: *Yes* [Learn more](https://go.microsoft.com/fwlink/?linkid=872567) -## Internet Explorer +### Internet Explorer - **Internet Explorer encryption support**: @@ -2711,7 +2724,7 @@ For more information, see [2.2.2 FW_PROFILE_TYPE](https://go.microsoft.com/fwlin Baseline default: *Disabled* [Learn more](/windows/client-management/mdm/policy-csp-internetexplorer#allowautocomplete) -## Local Policies Security Options +### Local Policies Security Options - **Block remote logon with blank password**: @@ -2801,7 +2814,7 @@ For more information, see [2.2.2 FW_PROFILE_TYPE](https://go.microsoft.com/fwlin ::: zone-end ::: zone pivot="mdm-december-2020,mdm-november-2021" -## Microsoft Defender +### Microsoft Defender - **Block Adobe Reader from creating child processes**: Baseline default: *Enable* @@ -3018,7 +3031,7 @@ For more information, see [2.2.2 FW_PROFILE_TYPE](https://go.microsoft.com/fwlin ::: zone-end ::: zone pivot="mdm-august-2020,mdm-december-2020,mdm-november-2021" -## MS Security Guide +### MS Security Guide - **SMB v1 client driver start configuration**: Baseline default: *Disabled driver* @@ -3040,7 +3053,7 @@ For more information, see [2.2.2 FW_PROFILE_TYPE](https://go.microsoft.com/fwlin Baseline default: *Disabled* [Learn more](https://go.microsoft.com/fwlink/?linkid=2067193) -## MSS Legacy +### MSS Legacy - **Network IPv6 source routing protection level**: Baseline default: *Highest protection* @@ -3058,7 +3071,7 @@ For more information, see [2.2.2 FW_PROFILE_TYPE](https://go.microsoft.com/fwlin Baseline default: *Disabled* [Learn more](https://go.microsoft.com/fwlink/?linkid=2067326) -## Power +### Power - **Require password on wake while on battery**: Baseline default: *Enabled* @@ -3076,13 +3089,13 @@ For more information, see [2.2.2 FW_PROFILE_TYPE](https://go.microsoft.com/fwlin Baseline default: *Disabled* [Learn more](https://go.microsoft.com/fwlink/?linkid=2067196) -## Remote Assistance +### Remote Assistance - **Remote Assistance solicited**: Baseline default: *Disable Remote Assistance* [Learn more](https://go.microsoft.com/fwlink/?linkid=2067198) -## Remote Desktop Services +### Remote Desktop Services - **Remote desktop services client connection encryption level**: Baseline default: *High* @@ -3103,7 +3116,7 @@ For more information, see [2.2.2 FW_PROFILE_TYPE](https://go.microsoft.com/fwlin Baseline default: *Enabled* [Learn more](https://go.microsoft.com/fwlink/?linkid=2067248) -## Remote Management +### Remote Management - **Block client digest authentication**: Baseline default: *Enabled* @@ -3129,19 +3142,19 @@ For more information, see [2.2.2 FW_PROFILE_TYPE](https://go.microsoft.com/fwlin Baseline default: *Disabled* [Learn more](https://go.microsoft.com/fwlink/?linkid=2067226) -## Remote Procedure Call +### Remote Procedure Call - **RPC unauthenticated client options**: Baseline default: *Authenticated* [Learn more](https://go.microsoft.com/fwlink/?linkid=2067225) -## Search +### Search - **Disable indexing encrypted items**: Baseline default: *Yes* [Learn more](https://go.microsoft.com/fwlink/?linkid=2067303) -## Smart Screen +### Smart Screen - **Turn on Windows SmartScreen** Baseline default: *Yes* @@ -3151,13 +3164,13 @@ For more information, see [2.2.2 FW_PROFILE_TYPE](https://go.microsoft.com/fwlin Baseline default: *Yes* [Learn more](https://go.microsoft.com/fwlink/?linkid=872783) -## System +### System - **System boot start driver initialization**: Baseline default: *Good unknown and bad critical* [Learn more](https://go.microsoft.com/fwlink/?linkid=2067307) -## Wi-Fi +### Wi-Fi - **Block Automatically connecting to Wi-Fi hotspots**: Baseline default: *Yes* @@ -3167,19 +3180,19 @@ For more information, see [2.2.2 FW_PROFILE_TYPE](https://go.microsoft.com/fwlin Baseline default: *Yes* [Learn more](https://go.microsoft.com/fwlink/?linkid=2067327) -## Windows Connection Manager +### Windows Connection Manager - **Block connection to non-domain networks**: Baseline default: *Enabled* [Learn more](https://go.microsoft.com/fwlink/?linkid=2067323) -## Windows Ink Workspace +### Windows Ink Workspace - **Ink Workspace**: Baseline default: *Enabled* [Learn more](https://go.microsoft.com/fwlink/?linkid=2067241) -## Windows PowerShell +### Windows PowerShell - **PowerShell script block logging**: Baseline default: *Enabled* diff --git a/memdocs/intune/protect/security-baseline-settings-windows-365.md b/memdocs/intune/protect/security-baseline-settings-windows-365.md index d1527ba5f08..393de6a40de 100644 --- a/memdocs/intune/protect/security-baseline-settings-windows-365.md +++ b/memdocs/intune/protect/security-baseline-settings-windows-365.md @@ -35,33 +35,38 @@ zone_pivot_groups: windows-365-versions - win365-nov21 > November 2021 --> -# List of the settings in the Windows 365 Cloud PC security baseline in Intune +# Windows 365 Cloud PC security baseline settings reference for Microsoft Intune -This article is a reference for the settings that are available in the Windows 365 Cloud PC security baseline that you can deploy with Microsoft Intune. +TThis article is a reference for the settings that are available in the Windows 365 Cloud PC security baseline for Microsoft Intune. -For each setting we list the baselines default configuration, which is also the recommended configuration for that setting provided by the relevant security team. Because products and the security landscape evolve, the recommended defaults in one baseline version might not match the defaults you find in later versions of the same baseline. Different baseline types, like the *MDM security* and the *Defender for Endpoint* baselines, could also set different defaults. +## About this reference article -When the Intune UI includes a *Learn more* link for a setting, we include that here as well. Use that link to view the settings *policy configuration service provider* (CSP) or relevant content that explains the settings operation. +Each security baseline is a group of preconfigured Windows settings that help you apply and enforce granular security settings that the relevant security teams recommend. You can also customize each baseline you deploy to enforce only those settings and values you require. When you create a security baseline profile in Intune, you're creating a template that consists of multiple device configuration settings. -When a new version of a baseline becomes available, it replaces the previous version. Profiles instances that you’ve created prior to the availability of a new version: +The details that display in this article are based on baseline version you select at the top of the article. For each version, this article displays: + +- A list of each setting with its configuration as found in the default instance of that baseline version. +- When available, a link to the underlying configuration service provider (CSP) documentation or other related content from the relevant product group that provides context and possibly additional details for a settings use. + +When a new version of a baseline becomes available, it replaces the previous version. Profile instances that you’ve created prior to the availability of a new version: - Become read-only. You can continue to use those profiles but can't edit them to change their configuration. -- Can be updated to the latest version. After you update a profile to the current baseline version, you can edit the profile to modify settings. +- Can be updated to the current version. After you update a profile to the current baseline version, you can edit the profile to modify settings. To learn more about using security baselines, see: - -- [Use security baselines](security-baselines.md) -- [Manage security baselines](security-baselines-configure.md) +- [Use security baselines](../protect/security-baselines.md) +- [Change the baseline version for a profile](../protect/security-baselines-configure.md#update-baselines-that-use-the-previous-format) +- [Manage security baselines](../protect/security-baselines-configure.md) ::: zone pivot="win365-24h1" -**Windows 365 Cloud PC security baseline version 24H1**: +## Windows 365 Cloud PC security baseline version 24H1 The settings in this baseline apply to Windows devices managed through Intune. When available, the setting name links to the source Configuration Service Provider (CSP), and then displays that settings default configuration in the baseline. -## Administrative Templates +### Administrative Templates -### Control Panel > Personalization +#### Control Panel > Personalization - **Prevent enabling lock screen camera** Baseline default: *Enabled* @@ -71,7 +76,7 @@ The settings in this baseline apply to Windows devices managed through Intune. W Baseline default: *Enabled* [Learn more](/windows/client-management/mdm/policy-csp-devicelock?WT.mc_id=Portal-fx#preventlockscreenslideshow) -### MS Security Guide +#### MS Security Guide - **Apply UAC restrictions to local accounts on network logons** Baseline default: *Enabled* @@ -96,7 +101,7 @@ The settings in this baseline apply to Windows devices managed through Intune. W Baseline default: *Disabled* [Learn more](/windows/client-management/mdm/policy-csp-mssecurityguide?WT.mc_id=Portal-fx#wdigestauthentication) -### MSS (Legacy) +#### MSS (Legacy) - **MSS: (DisableIPSourceRouting IPv6) IP source routing protection level (protects against packet spoofing)** Baseline default: *Enabled* @@ -120,19 +125,19 @@ The settings in this baseline apply to Windows devices managed through Intune. W Baseline default: *Enabled* [Learn more](/windows/client-management/mdm/policy-csp-msslegacy?WT.mc_id=Portal-fx#allowthecomputertoignorenetbiosnamereleaserequestsexceptfromwinsservers) -### Network > DNS Client +#### Network > DNS Client - **Turn off multicast name resolution** Baseline default: *Enabled* [Learn more](/windows/client-management/mdm/policy-csp-admx-dnsclient?WT.mc_id=Portal-fx#turn_off_multicast) -### Network > Network Connections +#### Network > Network Connections - **Prohibit use of Internet Connection Sharing on your DNS domain network** Baseline default: *Enabled* [Learn more](/windows/client-management/mdm/policy-csp-admx-networkconnections?WT.mc_id=Portal-fx#nc-showsharedaccessui) -### Network > Network Provider +#### Network > Network Provider - **Hardened UNC Paths** Baseline default: *Enabled* @@ -145,19 +150,19 @@ The settings in this baseline apply to Windows devices managed through Intune. W | `\\*\SYSVOL` | RequireMutualAuthentication=1,RequireIntegrity=1 | | `\\*\NETLOGON` | RequireMutualAuthentication=1,RequireIntegrity=1 | -### Network > Windows Connection Manager +#### Network > Windows Connection Manager - **Prohibit connection to non-domain networks when connected to domain authenticated network** Baseline default: *Enabled* [Learn more](/windows/client-management/mdm/policy-csp-windowsconnectionmanager?WT.mc_id=Portal-fx#prohitconnectiontonondomainnetworkswhenconnectedtodomainauthenticatednetwork) -### Start Menu and Taskbar > Notifications +#### Start Menu and Taskbar > Notifications - **Turn off toast notifications on the lock screen (User)** Baseline default: *Enabled* [Learn more](/windows/client-management/mdm/policy-csp-admx-wpn?WT.mc_id=Portal-fx#nolockscreentoastnotification) -### System > Credentials Delegation +#### System > Credentials Delegation - **Encryption Oracle Remediation** Baseline default: *Enabled* @@ -169,7 +174,7 @@ The settings in this baseline apply to Windows devices managed through Intune. W Baseline default: *Enabled* [Learn more](/windows/client-management/mdm/policy-csp-credentialsdelegation?WT.mc_id=Portal-fx#remotehostallowsdelegationofnonexportablecredentials) -### System > Device Installation > Device Installation Restrictions +#### System > Device Installation > Device Installation Restrictions - **Prevent installation of devices using drivers that match these device setup classes** Baseline default: *Enabled* @@ -180,7 +185,7 @@ The settings in this baseline apply to Windows devices managed through Intune. W - **Also apply to matching devices that are already installed** Baseline default: *True* -### System > Early Launch Antimalware +#### System > Early Launch Antimalware - **Boot-Start Driver Initialization Policy** Baseline default: *Enabled* @@ -188,7 +193,7 @@ The settings in this baseline apply to Windows devices managed through Intune. W - **Choose the boot-start drivers that can be initialized:** Baseline default: *Good, unknown and bad but critical* -### System > Group Policy +#### System > Group Policy - **Configure registry policy processing** Baseline default: *Enabled* @@ -199,7 +204,7 @@ The settings in this baseline apply to Windows devices managed through Intune. W - **Process even if the Group Policy objects have not changed (Device)** Baseline default: *True* -### System > Internet Communication Management > Internet Communication settings +#### System > Internet Communication Management > Internet Communication settings - **Turn off downloading of print drivers over HTTP** Baseline default: *Enabled* @@ -209,13 +214,13 @@ The settings in this baseline apply to Windows devices managed through Intune. W Baseline default: *Enabled* [Learn more](/windows/client-management/mdm/policy-csp-connectivity?WT.mc_id=Portal-fx#disableinternetdownloadforwebpublishingandonlineorderingwizards) -### System > Remote Assistance +#### System > Remote Assistance - **Configure Solicited Remote Assistance** Baseline default: *Disabled* [Learn more](/windows/client-management/mdm/policy-csp-remoteassistance?WT.mc_id=Portal-fx#solicitedremoteassistance) -### System > Remote Procedure Call +#### System > Remote Procedure Call - **Restrict Unauthenticated RPC clients** Baseline default: *Enabled* @@ -223,13 +228,13 @@ The settings in this baseline apply to Windows devices managed through Intune. W - **RPC Runtime Unauthenticated Client Restriction to Apply:** Baseline default: *Authenticated* -### Windows Components > App runtime +#### Windows Components > App runtime - **Allow Microsoft accounts to be optional** Baseline default: *Enabled* [Learn more](/windows/client-management/mdm/policy-csp-appruntime?WT.mc_id=Portal-fx#allowmicrosoftaccountstobeoptional) -### Windows Components > AutoPlay Policies +#### Windows Components > AutoPlay Policies - **Disallow Autoplay for non-volume devices** Baseline default: *Enabled* @@ -247,13 +252,13 @@ The settings in this baseline apply to Windows devices managed through Intune. W - **Turn off Autoplay on:** Baseline default: *All drives* -### Windows Components > Credential User Interface +#### Windows Components > Credential User Interface - **Enumerate administrator accounts on elevation** Baseline default: *Disabled* [Learn more](/windows/client-management/mdm/policy-csp-credentialsui?WT.mc_id=Portal-fx#enumerateadministrators) -### Windows Components > Event Log Service > Application +#### Windows Components > Event Log Service > Application - **Specify the maximum log file size (KB)** Baseline default: *Enabled* @@ -261,7 +266,7 @@ The settings in this baseline apply to Windows devices managed through Intune. W - **Maximum Log Size (KB)** Baseline default: *32768* -### Windows Components > Event Log Service > Security +#### Windows Components > Event Log Service > Security - **Specify the maximum log file size (KB)** Baseline default: *Enabled* @@ -269,7 +274,7 @@ The settings in this baseline apply to Windows devices managed through Intune. W - **Maximum Log Size (KB)** Baseline default: *196608* -### Windows Components > Event Log Service > System +#### Windows Components > Event Log Service > System - **Specify the maximum log file size (KB)** Baseline default: *Enabled* @@ -277,7 +282,7 @@ The settings in this baseline apply to Windows devices managed through Intune. W - **Maximum Log Size (KB)** Baseline default: *32768* -### Windows Components > File Explorer +#### Windows Components > File Explorer - **Configure Windows Defender SmartScreen** Baseline default: *Enabled* @@ -293,7 +298,7 @@ The settings in this baseline apply to Windows devices managed through Intune. W Baseline default: *Disabled* [Learn more](/windows/client-management/mdm/policy-csp-fileexplorer?WT.mc_id=Portal-fx#turnoffheapterminationoncorruption) -### Windows Components > Internet Explorer > Internet Control Panel > Advanced Page +#### Windows Components > Internet Explorer > Internet Control Panel > Advanced Page - **Allow software to run or install even if the signature is invalid** Baseline default: *Disabled* @@ -325,13 +330,13 @@ The settings in this baseline apply to Windows devices managed through Intune. W Baseline default: *Enabled* [Learn more](/windows/client-management/mdm/policy-csp-internetexplorer?WT.mc_id=Portal-fx#allowenhancedprotectedmode) -### Windows Components > Internet Explorer > Internet Control Panel +#### Windows Components > Internet Explorer > Internet Control Panel - **Prevent ignoring certificate errors** Baseline default: *Enabled* [Learn more](/windows/client-management/mdm/policy-csp-internetexplorer?WT.mc_id=Portal-fx#disableignoringcertificateerrors) -### Windows Components > Internet Explorer > Internet Control Panel > Security Page > Internet Zone +#### Windows Components > Internet Explorer > Internet Control Panel > Security Page > Internet Zone - **Access data sources across domains** Baseline default: *Enabled* @@ -525,7 +530,7 @@ The settings in this baseline apply to Windows devices managed through Intune. W - **Web sites in less privileged Web content zones can navigate into this zone** Baseline default: *Disable* -### Windows Components > Internet Explorer > Internet Control Panel > Security Page +#### Windows Components > Internet Explorer > Internet Control Panel > Security Page - **Intranet Sites: Include all network paths (UNCs)** Baseline default: *Disabled* @@ -535,7 +540,7 @@ The settings in this baseline apply to Windows devices managed through Intune. W Baseline default: *Enabled* [Learn more](/windows/client-management/mdm/policy-csp-internetexplorer?WT.mc_id=Portal-fx#allowcertificateaddressmismatchwarning) -### Windows Components > Internet Explorer > Internet Control Panel > Security Page > Intranet Zone +#### Windows Components > Internet Explorer > Internet Control Panel > Security Page > Intranet Zone - **Don't run antimalware programs against ActiveX controls** Baseline default: *Enabled* @@ -555,7 +560,7 @@ The settings in this baseline apply to Windows devices managed through Intune. W - **Java permissions** Baseline default: *High safety* -### Windows Components > Internet Explorer > Internet Control Panel > Security Page > Local Machine Zone +#### Windows Components > Internet Explorer > Internet Control Panel > Security Page > Local Machine Zone - **Don't run antimalware programs against ActiveX controls** Baseline default: *Enabled* @@ -569,7 +574,7 @@ The settings in this baseline apply to Windows devices managed through Intune. W - **Java permissions** Baseline default: *Disable Java* -### Windows Components > Internet Explorer > Internet Control Panel > Security Page > Locked-Down Internet Zone +#### Windows Components > Internet Explorer > Internet Control Panel > Security Page > Locked-Down Internet Zone - **Turn on SmartScreen Filter scan** Baseline default: *Enabled* @@ -577,7 +582,7 @@ The settings in this baseline apply to Windows devices managed through Intune. W - **Use SmartScreen Filter** Baseline default: *Enable* -### Windows Components > Internet Explorer > Internet Control Panel > Security Page > Locked-Down Intranet Zone +#### Windows Components > Internet Explorer > Internet Control Panel > Security Page > Locked-Down Intranet Zone - **Java permissions** Baseline default: *Enabled* @@ -585,7 +590,7 @@ The settings in this baseline apply to Windows devices managed through Intune. W - **Java permissions** Baseline default: *Disable Java* -### Windows Components > Internet Explorer > Internet Control Panel > Security Page > Locked-Down Local Machine Zone +#### Windows Components > Internet Explorer > Internet Control Panel > Security Page > Locked-Down Local Machine Zone - **Java permissions** Baseline default: *Enabled* @@ -593,7 +598,7 @@ The settings in this baseline apply to Windows devices managed through Intune. W - **Java permissions** Baseline default: *Disable Java* -### Windows Components > Internet Explorer > Internet Control Panel > Security Page > Locked-Down Restricted Sites Zone +#### Windows Components > Internet Explorer > Internet Control Panel > Security Page > Locked-Down Restricted Sites Zone - **Java permissions** Baseline default: *Enabled* @@ -608,7 +613,7 @@ The settings in this baseline apply to Windows devices managed through Intune. W - **Use SmartScreen Filter** Baseline default: *Enable* -### Windows Components > Internet Explorer > Internet Control Panel > Security Page > Locked-Down Trusted Sites Zone +#### Windows Components > Internet Explorer > Internet Control Panel > Security Page > Locked-Down Trusted Sites Zone - **Java permissions** Baseline default: *Enabled* @@ -616,7 +621,7 @@ The settings in this baseline apply to Windows devices managed through Intune. W - **Java permissions** Baseline default: *Disable Java* -### Windows Components > Internet Explorer > Internet Control Panel > Security Page > Restricted Sites Zone +#### Windows Components > Internet Explorer > Internet Control Panel > Security Page > Restricted Sites Zone - **Access data sources across domains** Baseline default: *Enabled* @@ -855,7 +860,7 @@ The settings in this baseline apply to Windows devices managed through Intune. W - **Web sites in less privileged Web content zones can navigate into this zone** Baseline default: *Disable* -### Windows Components > Internet Explorer > Internet Control Panel > Security Page > Trusted Sites Zone +#### Windows Components > Internet Explorer > Internet Control Panel > Security Page > Trusted Sites Zone - **Don't run antimalware programs against ActiveX controls** Baseline default: *Enabled* @@ -875,7 +880,7 @@ The settings in this baseline apply to Windows devices managed through Intune. W - **Java permissions** Baseline default: *High safety* -### Windows Components > Internet Explorer +#### Windows Components > Internet Explorer - **Prevent bypassing SmartScreen Filter warnings** Baseline default: *Enabled* @@ -923,7 +928,7 @@ The settings in this baseline apply to Windows devices managed through Intune. W Baseline default: *Disabled* [Learn more](/windows/client-management/mdm/policy-csp-internetexplorer?WT.mc_id=Portal-fx#allowautocomplete) -### Windows Components > Internet Explorer > Security Features > Add-on Management +#### Windows Components > Internet Explorer > Security Features > Add-on Management - **Remove "Run this time" button for outdated ActiveX controls in Internet Explorer** Baseline default: *Enabled* @@ -933,7 +938,7 @@ The settings in this baseline apply to Windows devices managed through Intune. W Baseline default: *Disabled* [Learn more](/windows/client-management/mdm/policy-csp-internetexplorer?WT.mc_id=Portal-fx#donotblockoutdatedactivexcontrols) -### Windows Components > Internet Explorer > Security Features +#### Windows Components > Internet Explorer > Security Features - **Allow fallback to SSL 3.0 (Internet Explorer)** Baseline default: *Enabled* @@ -941,91 +946,91 @@ The settings in this baseline apply to Windows devices managed through Intune. W - **Allow insecure fallback for:** Baseline default: *No Sites* -### Windows Components > Internet Explorer > Security Features > Consistent Mime Handling +#### Windows Components > Internet Explorer > Security Features > Consistent Mime Handling - **Internet Explorer Processes** Baseline default: *Enabled* [Learn more](/windows/client-management/mdm/policy-csp-internetexplorer?WT.mc_id=Portal-fx#consistentmimehandlinginternetexplorerprocesses) -### Windows Components > Internet Explorer > Security Features > Mime Sniffing Safety Feature +#### Windows Components > Internet Explorer > Security Features > Mime Sniffing Safety Feature - **Internet Explorer Processes** Baseline default: *Enabled* [Learn more](/windows/client-management/mdm/policy-csp-internetexplorer?WT.mc_id=Portal-fx#mimesniffingsafetyfeatureinternetexplorerprocesses) -### Windows Components > Internet Explorer > Security Features > MK Protocol Security Restriction +#### Windows Components > Internet Explorer > Security Features > MK Protocol Security Restriction - **Internet Explorer Processes** Baseline default: *Enabled* [Learn more](/windows/client-management/mdm/policy-csp-internetexplorer?WT.mc_id=Portal-fx#mkprotocolsecurityrestrictioninternetexplorerprocesses) -### Windows Components > Internet Explorer > Security Features > Notification bar +#### Windows Components > Internet Explorer > Security Features > Notification bar - **Internet Explorer Processes** Baseline default: *Enabled* [Learn more](/windows/client-management/mdm/policy-csp-internetexplorer?WT.mc_id=Portal-fx#notificationbarinternetexplorerprocesses) -### Windows Components > Internet Explorer > Security Features > Protection From Zone Elevation +#### Windows Components > Internet Explorer > Security Features > Protection From Zone Elevation - **Internet Explorer Processes** Baseline default: *Enabled* [Learn more](/windows/client-management/mdm/policy-csp-internetexplorer?WT.mc_id=Portal-fx#protectionfromzoneelevationinternetexplorerprocesses) -### Windows Components > Internet Explorer > Security Features > Restrict ActiveX Install +#### Windows Components > Internet Explorer > Security Features > Restrict ActiveX Install - **Internet Explorer Processes** Baseline default: *Enabled* [Learn more](/windows/client-management/mdm/policy-csp-internetexplorer?WT.mc_id=Portal-fx#restrictactivexinstallinternetexplorerprocesses) -### Windows Components > Internet Explorer > Security Features > Restrict File Download +#### Windows Components > Internet Explorer > Security Features > Restrict File Download - **Internet Explorer Processes** Baseline default: *Enabled* [Learn more](/windows/client-management/mdm/policy-csp-internetexplorer?WT.mc_id=Portal-fx#restrictfiledownloadinternetexplorerprocesses) -### Windows Components > Internet Explorer > Security Features > Scripted Window Security Restrictions +#### Windows Components > Internet Explorer > Security Features > Scripted Window Security Restrictions - **Internet Explorer Processes** Baseline default: *Enabled* [Learn more](/windows/client-management/mdm/policy-csp-internetexplorer?WT.mc_id=Portal-fx#scriptedwindowsecurityrestrictionsinternetexplorerprocesses) -### Windows Components > Microsoft Defender Antivirus > MAPS +#### Windows Components > Microsoft Defender Antivirus > MAPS - **Configure the 'Block at First Sight' feature** Baseline default: *Enabled* [Learn more](/windows/client-management/mdm/policy-csp-admx-microsoftdefenderantivirus?WT.mc_id=Portal-fx#disableblockatfirstseen) -### Windows Components > Microsoft Defender Antivirus > Real-time Protection +#### Windows Components > Microsoft Defender Antivirus > Real-time Protection - **Turn on process scanning whenever real-time protection is enabled** Baseline default: *Enabled* [Learn more](/windows/client-management/mdm/policy-csp-admx-microsoftdefenderantivirus?WT.mc_id=Portal-fx#realtimeprotection-disablescanonrealtimeenable) -### Windows Components > Microsoft Defender Antivirus > Scan +#### Windows Components > Microsoft Defender Antivirus > Scan - **Scan packed executables** Baseline default: *Enabled* [Learn more](/windows/client-management/mdm/policy-csp-admx-microsoftdefenderantivirus?WT.mc_id=Portal-fx#scan-disablepackedexescanning) -### Windows Components > Microsoft Defender Antivirus +#### Windows Components > Microsoft Defender Antivirus - **Turn off routine remediation** Baseline default: *Disabled* [Learn more](/windows/client-management/mdm/policy-csp-admx-microsoftdefenderantivirus?WT.mc_id=Portal-fx#disableroutinelytakingaction) -### Windows Components > Remote Desktop Services > Remote Desktop Connection Client +#### Windows Components > Remote Desktop Services > Remote Desktop Connection Client - **Do not allow passwords to be saved** Baseline default: *Enabled* [Learn more](/windows/client-management/mdm/policy-csp-remotedesktopservices?WT.mc_id=Portal-fx#donotallowpasswordsaving) -### Windows Components > Remote Desktop Services > Remote Desktop Session Host > Device and Resource Redirection +#### Windows Components > Remote Desktop Services > Remote Desktop Session Host > Device and Resource Redirection - **Do not allow drive redirection** Baseline default: *Enabled* [Learn more](/windows/client-management/mdm/policy-csp-remotedesktopservices?WT.mc_id=Portal-fx#donotallowdriveredirection) -### Windows Components > Remote Desktop Services > Remote Desktop Session Host > Security +#### Windows Components > Remote Desktop Services > Remote Desktop Session Host > Security - **Always prompt for password upon connection** Baseline default: *Enabled* @@ -1041,19 +1046,19 @@ The settings in this baseline apply to Windows devices managed through Intune. W - **Encryption Level** Baseline default: *High Level* -### Windows Components > RSS Feeds +#### Windows Components > RSS Feeds - **Prevent downloading of enclosures** Baseline default: *Enabled* [Learn more](/windows/client-management/mdm/policy-csp-internetexplorer?WT.mc_id=Portal-fx#disableenclosuredownloading) -### Windows Components > Windows Logon Options +#### Windows Components > Windows Logon Options - **Sign-in and lock last interactive user automatically after a restart** Baseline default: *Disabled* [Learn more](/windows/client-management/mdm/policy-csp-windowslogon?WT.mc_id=Portal-fx#allowautomaticrestartsignon) -### Windows Components > Windows PowerShell +#### Windows Components > Windows PowerShell - **Turn on PowerShell Script Block Logging** Baseline default: *Enabled* @@ -1061,7 +1066,7 @@ The settings in this baseline apply to Windows devices managed through Intune. W - **Log script block invocation start / stop events:** Baseline default: *False* -### Windows Components > Windows Remote Management (WinRM) > WinRM Client +#### Windows Components > Windows Remote Management (WinRM) > WinRM Client - **Allow Basic authentication** Baseline default: *Disabled* @@ -1075,7 +1080,7 @@ The settings in this baseline apply to Windows devices managed through Intune. W Baseline default: *Enabled* [Learn more](/windows/client-management/mdm/policy-csp-remotemanagement?WT.mc_id=Portal-fx#disallowdigestauthentication) -### Windows Components > Windows Remote Management (WinRM) > WinRM Service +#### Windows Components > Windows Remote Management (WinRM) > WinRM Service - **Allow Basic authentication** Baseline default: *Disabled* @@ -1089,7 +1094,7 @@ The settings in this baseline apply to Windows devices managed through Intune. W Baseline default: *Enabled* [Learn more](/windows/client-management/mdm/policy-csp-remotemanagement?WT.mc_id=Portal-fx#disallowstoringofrunascredentials) -## Auditing +### Auditing - **Account Logon Audit Credential Validation** Baseline default: *Success+ Failure* @@ -1183,13 +1188,13 @@ The settings in this baseline apply to Windows devices managed through Intune. W Baseline default: *Success+ Failure* [Learn more](/windows/client-management/mdm/policy-csp-Audit?WT.mc_id=Portal-fx#system_auditsystemintegrity) -## Data Protection +### Data Protection - **Allow Direct Memory Access** Baseline default: *Block* [Learn more](/windows/client-management/mdm/policy-csp-dataprotection?WT.mc_id=Portal-fx#allowdirectmemoryaccess) -## Defender +### Defender - **Allow Archive Scanning** Baseline default: *Allowed. Scans the archive files.* @@ -1304,7 +1309,7 @@ The settings in this baseline apply to Windows devices managed through Intune. W Baseline default: *Send all samples automatically.* [Learn more](/windows/client-management/mdm/policy-csp-defender?WT.mc_id=Portal-fx#submitsamplesconsent) -## Device Guard +### Device Guard - **Configure System Guard Launch** Baseline default: *Unmanaged Enables Secure Launch if supported by hardware* @@ -1322,7 +1327,7 @@ The settings in this baseline apply to Windows devices managed through Intune. W Baseline default: *Turns on VBS with Secure Boot.* [Learn more](/windows/client-management/mdm/policy-csp-deviceguard?WT.mc_id=Portal-fx#requireplatformsecurityfeatures) -## Device Lock +### Device Lock - **Device Password Enabled** Baseline default: *Enabled* @@ -1338,13 +1343,13 @@ The settings in this baseline apply to Windows devices managed through Intune. W Value: *14* [Learn more](/windows/client-management/mdm/policy-csp-devicelock?WT.mc_id=Portal-fx#mindevicepasswordlength) -## Dma Guard +### Dma Guard - **Device Enumeration Policy** Baseline default: *Block all (Most restrictive)* [Learn more](/windows/client-management/mdm/policy-csp-dmaguard?WT.mc_id=Portal-fx#deviceenumerationpolicy) -## Experience +### Experience - **Allow Windows Spotlight (User)** Baseline default: *Allow* @@ -1358,7 +1363,7 @@ The settings in this baseline apply to Windows devices managed through Intune. W Baseline default: *Block* [Learn more](/windows/client-management/mdm/policy-csp-Experience?WT.mc_id=Portal-fx#allowthirdpartysuggestionsinwindowsspotlight) -## Firewall +### Firewall - **Enable Domain Network Firewall** Baseline default: *True* @@ -1455,19 +1460,19 @@ The settings in this baseline apply to Windows devices managed through Intune. W Baseline default: *False* [Learn more](/windows/client-management/mdm/firewall-csp?WT.mc_id=Portal-fx#mdmstorepublicprofileallowlocalipsecpolicymerge) -## Lanman Workstation +### Lanman Workstation - **Enable Insecure Guest Logons** Baseline default: *Disabled* [Learn more](/windows/client-management/mdm/policy-csp-LanmanWorkstation?WT.mc_id=Portal-fx#enableinsecureguestlogons) -## Local Security Authority +### Local Security Authority - **Configure Lsa Protected Process** Baseline default: *Enabled with UEFI lock. LSA will run as protected process and this configuration is UEFI locked.* [Learn more](/windows/client-management/mdm/policy-csp-lsa#configurelsaprotectedprocess) -## Microsoft App Store +### Microsoft App Store - **Allow Game DVR** Baseline default: *Block* @@ -1481,9 +1486,9 @@ The settings in this baseline apply to Windows devices managed through Intune. W Baseline default: *Disabled* [Learn more](/windows/client-management/mdm/policy-csp-ApplicationManagement?WT.mc_id=Portal-fx#msialwaysinstallwithelevatedprivileges) -## Microsoft Edge +### Microsoft Edge -### Content settings +#### Content settings - **Default Adobe Flash setting** Baseline default: *Disabled* @@ -1503,7 +1508,7 @@ The settings in this baseline apply to Windows devices managed through Intune. W - **Minimum TLS version enabled (User)** Baseline default: *TLS 1.2* -### SmartScreen settings +#### SmartScreen settings - **Configure Microsoft Defender SmartScreen** Baseline default: *Enabled* @@ -1511,19 +1516,19 @@ The settings in this baseline apply to Windows devices managed through Intune. W - **Prevent bypassing Microsoft Defender SmartScreen prompts for sites** Baseline default: *Enabled* -## Privacy +### Privacy - **Let Apps Activate With Voice Above Lock** Baseline default: *Force deny. Windows apps cannot be activated by voice while the screen is locked, and users cannot change it.* [Learn more](/windows/client-management/mdm/policy-csp-Privacy?WT.mc_id=Portal-fx#letappsactivatewithvoiceabovelock) -## Search +### Search - **Allow Indexing Encrypted Stores Or Items** Baseline default: *Block* [Learn more](/windows/client-management/mdm/policy-csp-Search?WT.mc_id=Portal-fx#allowindexingencryptedstoresoritems) -## Smart Screen +### Smart Screen - **Enable Smart Screen In Shell** Baseline default: *Enabled* @@ -1533,7 +1538,7 @@ The settings in this baseline apply to Windows devices managed through Intune. W Baseline default: *Enabled* [Learn more](/windows/client-management/mdm/policy-csp-smartscreen?WT.mc_id=Portal-fx#preventoverrideforfilesinshell) -### Enhanced Phishing Protection +#### Enhanced Phishing Protection - **Notify Malicious** Baseline default: *Enabled* @@ -1547,7 +1552,7 @@ The settings in this baseline apply to Windows devices managed through Intune. W - **Service Enabled** Baseline default: *Enabled* -## User Rights +### User Rights - **Access From Network** Baseline default: *Configured* @@ -1659,19 +1664,19 @@ The settings in this baseline apply to Windows devices managed through Intune. W - `*S-1-5-32-544` [Learn more](/windows/client-management/mdm/policy-csp-UserRights?WT.mc_id=Portal-fx#takeownership) -## Virtualization Based Technology +### Virtualization Based Technology - **Hypervisor Enforced Code Integrity** Baseline default: *(Enabled with UEFI lock) Turns on Hypervisor-Protected Code Integrity with UEFI lock.* [Learn more](/windows/client-management/mdm/policy-csp-VirtualizationBasedTechnology?WT.mc_id=Portal-fx#hypervisorenforcedcodeintegrity) -## Windows Ink Workspace +### Windows Ink Workspace - **Allow Windows Ink Workspace** Baseline default: *Ink workspace is enabled (feature is turned on), but the user cannot access it above the lock screen.* [Learn more](/windows/client-management/mdm/policy-csp-WindowsInkWorkspace?WT.mc_id=Portal-fx#allowwindowsinkworkspace) -## Local Policies Security Options +### Local Policies Security Options - **Accounts Limit Local Account Use Of Blank Passwords To Console Logon Only** Baseline default: *Enabled* @@ -1762,9 +1767,9 @@ The settings in this baseline apply to Windows devices managed through Intune. W ::: zone pivot="win365-nov21" -**Windows 365 Cloud PC security baseline November 2021**: +## Windows 365 Cloud PC security baseline November 2021 -## Above Lock +### Above Lock - **Voice activate apps from locked screen**: Baseline default: *Disabled* @@ -1774,13 +1779,13 @@ The settings in this baseline apply to Windows devices managed through Intune. W Baseline default: *Yes* [Learn more](https://go.microsoft.com/fwlink/?linkid=2067101) -## App Runtime +### App Runtime - **Microsoft accounts optional for Microsoft store apps**: Baseline default: *Enabled* [Learn more](https://go.microsoft.com/fwlink/?linkid=2067104) -## Application management +### Application management - **Block app installations with elevated privileges**: Baseline default: *Yes* @@ -1794,7 +1799,7 @@ The settings in this baseline apply to Windows devices managed through Intune. W Baseline default: *Yes* [Learn more](https://go.microsoft.com/fwlink/?linkid=2067056) -## Attack Surface Reduction Rules +### Attack Surface Reduction Rules For general information, see [Learn about attack surface reduction rules](/microsoft-365/security/defender-endpoint/attack-surface-reduction?view=o365-worldwide&preserve-view=true). @@ -1846,7 +1851,7 @@ For general information, see [Learn about attack surface reduction rules](/micro Baseline default: *Block* [Learn more](https://go.microsoft.com/fwlink/?linkid=872980) -## Audit +### Audit Audit settings configure the events that are generated for the conditions of the setting. @@ -1922,7 +1927,7 @@ Audit settings configure the events that are generated for the conditions of the - **System Audit System Integrity (Device)**: Baseline default: *Success and Failure* -## Auto Play +### Auto Play - **Auto play default auto run behavior**: Baseline default: *Do not execute* @@ -1936,7 +1941,7 @@ Audit settings configure the events that are generated for the conditions of the Baseline default: *Enabled* [Learn more](https://go.microsoft.com/fwlink/?linkid=2067106) -## Browser +### Browser - **Block Password Manager**: Baseline default: *Yes* @@ -1958,7 +1963,7 @@ Audit settings configure the events that are generated for the conditions of the Baseline default: *Yes* [Learn more](https://go.microsoft.com/fwlink/?linkid=2067126) -## Connectivity +### Connectivity - **Configure secure access to UNC paths**: Baseline default: *Configure Windows to only allow access to the specified UNC paths after fulfilling additional security requirements* @@ -1975,19 +1980,19 @@ Audit settings configure the events that are generated for the conditions of the Baseline default: *Enabled* [Learn more](https://go.microsoft.com/fwlink/?linkid=2067136) -## Credentials Delegation +### Credentials Delegation - **Remote host delegation of non-exportable credentials**: Baseline default: *Enabled* [Learn more](https://go.microsoft.com/fwlink/?linkid=2067103) -## Credentials UI +### Credentials UI - **Enumerate administrators**: Baseline default: *Disabled* [Learn more](https://go.microsoft.com/fwlink/?linkid=2067021) -## Device Guard +### Device Guard - **Virtualization based security**: Baseline default: *Enable VBS with secure boot* @@ -2003,7 +2008,7 @@ Audit settings configure the events that are generated for the conditions of the Baseline default: *Enable with UEFI lock* [Learn more](https://go.microsoft.com/fwlink/?linkid=872424) -## Device Installation +### Device Installation - **Block hardware device installation by setup classes** Baseline default: *Yes* @@ -2013,12 +2018,12 @@ Audit settings configure the events that are generated for the conditions of the - **Block list** *Not configured by default. Manually add one or more Identifiers.* -## DMA Guard +### DMA Guard - **Enumeration of external devices incompatible with Kernel DMA Protection** Baseline default: *Block all* -## Event Log Service +### Event Log Service - **Application log maximum file size in KB** Baseline default: *32768* @@ -2032,13 +2037,13 @@ Audit settings configure the events that are generated for the conditions of the Baseline default: *196608* [Learn more](https://go.microsoft.com/fwlink/?linkid=2067042) -## Experience +### Experience - **Block Windows Spotlight** Baseline default: *Yes* [Learn more](https://go.microsoft.com/fwlink/?linkid=2067037) -## File Explorer +### File Explorer - **Block data execution prevention** Baseline default: *Disabled* @@ -2048,7 +2053,7 @@ Audit settings configure the events that are generated for the conditions of the Baseline default: *Disabled* [Learn more](https://go.microsoft.com/fwlink/?linkid=2067107) -## Firewall +### Firewall For more information, see [2.2.2 FW_PROFILE_TYPE](https://go.microsoft.com/fwlink/?linkid=2066796) in the Windows Protocols documentation. @@ -2120,7 +2125,7 @@ For more information, see [2.2.2 FW_PROFILE_TYPE](https://go.microsoft.com/fwlin Baseline default: *Yes* [Learn more](https://go.microsoft.com/fwlink/?linkid=872567) -## Internet Explorer +### Internet Explorer View the full list of [Internet Explorer CSPs](/windows/client-management/mdm/policy-csp-internetexplorer). @@ -2596,7 +2601,7 @@ View the full list of [Internet Explorer CSPs](/windows/client-management/mdm/po Baseline default: *Disabled* [Learn more](https://go.microsoft.com/fwlink/?linkid=2067122) -## Local Policies Security Options +### Local Policies Security Options - **Block remote logon with blank password** Baseline default: *Yes* @@ -2682,7 +2687,7 @@ View the full list of [Internet Explorer CSPs](/windows/client-management/mdm/po Baseline default: *Yes* [Learn more](https://go.microsoft.com/fwlink/?linkid=2067321) -## Microsoft Defender +### Microsoft Defender - **Turn on real-time protection** Baseline default: *Yes* @@ -2730,7 +2735,7 @@ View the full list of [Internet Explorer CSPs](/windows/client-management/mdm/po Baseline default: *Yes* [Learn more](https://go.microsoft.com/fwlink/?linkid=2113937) -## Microsoft Defender Antivirus Exclusions +### Microsoft Defender Antivirus Exclusions > [!WARNING] > **Defining exclusions lowers the protection offered by Microsoft Defender Antivirus**. Always evaluate the risks that are associated with implementing exclusions. Only exclude files you know aren't malicious. @@ -2746,7 +2751,7 @@ View the full list of [Internet Explorer CSPs](/windows/client-management/mdm/po - **Defender Files And Folders To Exclude** Baseline default: *Not configured by default. Manually add one or more entries.* -## Microsoft Edge +### Microsoft Edge - **Control which extensions cannot be installed** Baseline default: *Enabled* @@ -2796,7 +2801,7 @@ View the full list of [Internet Explorer CSPs](/windows/client-management/mdm/po - **Supported authentication schemes** Baseline defaults: Two items: *NTLM* and *Negotiate* -## MS Security Guide +### MS Security Guide - **SMB v1 client driver start configuration** Baseline default: *Disable driver* @@ -2818,7 +2823,7 @@ View the full list of [Internet Explorer CSPs](/windows/client-management/mdm/po Baseline default: *Disabled* [Learn more](https://go.microsoft.com/fwlink/?linkid=2067193) -## MSS Legacy +### MSS Legacy - **Network IPv6 source routing protection level** Baseline default: *Highest protection* @@ -2836,13 +2841,13 @@ View the full list of [Internet Explorer CSPs](/windows/client-management/mdm/po Baseline default: *Disabled* [Learn more](https://go.microsoft.com/fwlink/?linkid=2067326) -## Remote Assistance +### Remote Assistance - **Remote Assistance solicited** Baseline default: *Disable Remote Assistance* [Learn more](https://go.microsoft.com/fwlink/?linkid=2067198) -## Remote Desktop Services +### Remote Desktop Services - **Remote desktop services client connection encryption level** Baseline default: *High* @@ -2863,7 +2868,7 @@ View the full list of [Internet Explorer CSPs](/windows/client-management/mdm/po Baseline default: *Enabled* [Learn more](https://go.microsoft.com/fwlink/?linkid=2067248) -## Remote Management +### Remote Management - **Block client digest authentication** Baseline default: *Enabled* @@ -2889,19 +2894,19 @@ View the full list of [Internet Explorer CSPs](/windows/client-management/mdm/po Baseline default: *Disabled* [Learn more](https://go.microsoft.com/fwlink/?linkid=2067226) -## Remote Procedure Call +### Remote Procedure Call - **RPC unauthenticated client options** Baseline default: *Authenticated* [Learn more](https://go.microsoft.com/fwlink/?linkid=2067225) -## Search +### Search - **Disable indexing encrypted items** Baseline default: *Yes* [Learn more](https://go.microsoft.com/fwlink/?linkid=2067303) -## Smart Screen +### Smart Screen - **Turn on Windows SmartScreen** Baseline default: *Yes* @@ -2911,31 +2916,31 @@ View the full list of [Internet Explorer CSPs](/windows/client-management/mdm/po Baseline default: *Yes* [Learn more](https://go.microsoft.com/fwlink/?linkid=872783) -## System +### System - **System boot start driver initialization** Baseline default: *Good unknown and bad critical* [Learn more](https://go.microsoft.com/fwlink/?linkid=2067307) -## Windows Connection Manager +### Windows Connection Manager - **Block connection to non-domain networks** Baseline default: *Enabled* [Learn more](https://go.microsoft.com/fwlink/?linkid=2067323) -## Windows Ink Workspace +### Windows Ink Workspace - **Ink Workspace** Baseline default: *Enabled* [Learn more](https://go.microsoft.com/fwlink/?linkid=2067241) -## Windows PowerShell +### Windows PowerShell - **PowerShell script block logging** Baseline default: *Enabled* [Learn more](https://go.microsoft.com/fwlink/?linkid=2067330) -## Windows Security +### Windows Security - **Enable tamper protection to prevent Microsoft Defender being disabled** Baseline default: *Enable* diff --git a/memdocs/intune/protect/security-baseline-v2-edge-settings.md b/memdocs/intune/protect/security-baseline-v2-edge-settings.md index f61d7cb1fd1..3e3f94367fe 100644 --- a/memdocs/intune/protect/security-baseline-v2-edge-settings.md +++ b/memdocs/intune/protect/security-baseline-v2-edge-settings.md @@ -55,13 +55,12 @@ If you use a security baseline for Microsoft Edge version 85 or earlier, see [Li ## About this reference article -Each security baseline is a group of preconfigured Windows settings that help you apply and enforce granular security settings that the relevant security teams recommend. You can also customize each baseline you deploy to enforce only those settings and values you require. When you create a security baseline profile in Intune, you're creating a template that consists of multiple device configuration profiles. +Each security baseline is a group of preconfigured Windows settings that help you apply and enforce granular security settings that the relevant security teams recommend. You can also customize each baseline you deploy to enforce only those settings and values you require. When you create a security baseline profile in Intune, you're creating a template that consists of multiple device configuration settings. The details that are displayed in this article are based on baseline version that is selected at the top of the article. For each selection, this article displays: -- A list of each setting in that baseline version. -- The default configuration of each setting in that baseline version. -- When available, a link to the underlying configuration service provider (CSP) documentation, or other related content from the relevant product group that provides context and possibly additional details for the settings use. +- A list of each setting with its configuration as found in the default instance of that baseline version. +- When available, a link to the underlying configuration service provider (CSP) documentation or other related content from the relevant product group that provides context and possibly additional details for a settings use. When a new version of a baseline becomes available, it replaces the previous version. Profile instances that you’ve created prior to the availability of a new version: @@ -74,13 +73,12 @@ When a new version of a baseline becomes available, it replaces the previous ver To learn more about using security baselines, see: - [Use security baselines](../protect/security-baselines.md) -- [Manage security baselines](../protect/security-baselines-configure.md). - -## Microsoft Edge +- [Change the baseline version for a profile](../protect/security-baselines-configure.md#update-baselines-that-use-the-previous-format) +- [Manage security baselines](../protect/security-baselines-configure.md) ::: zone pivot="edge-v117" -**Microsoft Edge baseline for November 2023 (Edge version 117)** +## Microsoft Edge baseline for November 2023 (Edge version 117) For information about the most recent baseline versions and settings from Microsoft, including versions of this baseline that might not be available through Intune, download the [Microsoft Security Compliance Toolkit](https://www.microsoft.com/download/details.aspx?id=55319) from the Microsoft Download Center. @@ -111,7 +109,7 @@ For information about the most recent baseline versions and settings from Micros - **Specifies whether SharedArrayBuffers can be used in a non cross-origin-isolated context** Baseline default: *Disabled* -**Extensions**: +### Extensions - **Control which extensions cannot be installed** Baseline default: *Enabled* @@ -119,7 +117,7 @@ For information about the most recent baseline versions and settings from Micros - **Extension IDs the user should be prevented from installing (or * for all) (Device)** Baseline default: *\** -**HTTP authentication**: +### HTTP authentication - **Allow Basic authentication for HTTP** Baseline default: *Disabled* @@ -128,17 +126,17 @@ For information about the most recent baseline versions and settings from Micros Baseline default: *Enabled* [Learn more](/deployedge/microsoft-edge-policies#authschemes) -**Native Messaging**: +### Native Messaging - **Allow user-level native messaging hosts (installed without admin permissions)** Baseline default: *Disabled* -**Private Network Request Settings**: +### Private Network Request Settings - **Specifies whether to allow insecure websites to make requests to more-private network endpoints** Baseline default: *Disabled* -**SmartScreen settings**: +### SmartScreen settings - **Configure Microsoft Defender SmartScreen** Baseline default: *Enabled* @@ -161,7 +159,7 @@ For information about the most recent baseline versions and settings from Micros ::: zone-end ::: zone pivot="edge-v112" -**Microsoft Edge baseline for May 2023 (Edge version 112)** +## Microsoft Edge baseline for May 2023 (Edge version 112) For information about the most recent baseline versions and settings from Microsoft, including versions of this baseline that might not be available through Intune, download the [Microsoft Security Compliance Toolkit](https://www.microsoft.com/download/details.aspx?id=55319) from the Microsoft Download Center. @@ -195,7 +193,7 @@ For information about the most recent baseline versions and settings from Micros - **Specifies whether SharedArrayBuffers can be used in a non cross-origin-isolated context** Baseline default: *Disabled* -**Extensions**: +### Extensions - **Control which extensions cannot be installed** Baseline default: *Enabled* @@ -203,7 +201,7 @@ For information about the most recent baseline versions and settings from Micros - **Extension IDs the user should be prevented from installing (or * for all) (Device)** Baseline default: *\** -**HTTP authentication**: +### HTTP authentication - **Allow Basic authentication for HTTP** Baseline default: *Disabled* @@ -215,23 +213,23 @@ For information about the most recent baseline versions and settings from Micros - **Supported authentication schemes (Device)** Baseline default: *ntlm,negotiate* -**Native Messaging**: +### Native Messaging - **Allow user-level native messaging hosts (installed without admin permissions)** Baseline default: *Disabled* -**Password manager and protection**: +### Password manager and protection - **Enable saving passwords to the password manager** Baseline default: *Disabled* [Learn more](/windows/client-management/mdm/policy-csp-browser#browser-allowpasswordmanager) -**Private Network Request Settings**: +### Private Network Request Settings - **Specifies whether to allow insecure websites to make requests to more-private network endpoints** Baseline default: *Disabled* -**SmartScreen settings**: +### SmartScreen settings - **Configure Microsoft Defender SmartScreen** Baseline default: *Enabled* diff --git a/memdocs/intune/protect/security-baseline-v2-office-settings.md b/memdocs/intune/protect/security-baseline-v2-office-settings.md index 2417c6ae4e1..cd4395a10a8 100644 --- a/memdocs/intune/protect/security-baseline-v2-office-settings.md +++ b/memdocs/intune/protect/security-baseline-v2-office-settings.md @@ -7,7 +7,7 @@ description: View a list of the settings in the Microsoft Intune security baseli author: brenduns ms.author: brenduns manager: dougeby -ms.date: 09/13/2024 +ms.date: 01/09/2025 ms.topic: reference ms.service: microsoft-intune ms.subservice: protect @@ -52,27 +52,26 @@ This article is a reference for the settings that are available in the Microsoft ## About this reference article -Each security baseline is a group of preconfigured settings that help you apply and enforce granular security settings that the relevant security teams recommend. You can also customize each baseline you deploy to enforce only those settings and values you require. When you create a security baseline profile in Intune, you're creating a template that consists of multiple device configuration profiles. +Each security baseline is a group of preconfigured Windows settings that help you apply and enforce granular security settings that the relevant security teams recommend. You can also customize each baseline you deploy to enforce only those settings and values you require. When you create a security baseline profile in Intune, you're creating a template that consists of multiple device configuration settings. -The details that are displayed in this article are based on baseline version that is selected at the top of the article. For each selection, this article displays: +The details that display in this article are based on baseline version you select at the top of the article. For each version, this article displays: -- A list of each setting in that baseline version. -- The default configuration of each setting in that baseline version. -- When available, a link to the underlying configuration service provider (CSP) documentation, or other related content from the relevant product group that provides context and possibly additional details for the settings use. +- A list of each setting with its configuration as found in the default instance of that baseline version. +- When available, a link to the underlying configuration service provider (CSP) documentation or other related content from the relevant product group that provides context and possibly additional details for a settings use. When a new version of a baseline becomes available, it replaces the previous version. Profile instances that you’ve created prior to the availability of a new version: - Become read-only. You can continue to use those profiles but can't edit them to change their configuration. -- Can be updated to the latest version. After you update a profile to the current baseline version, you can edit the profile to modify settings. +- Can be updated to the current version. After you update a profile to the current baseline version, you can edit the profile to modify settings. To learn more about using security baselines, see: - - [Use security baselines](../protect/security-baselines.md) -- [Manage security baselines](../protect/security-baselines-configure.md). +- [Change the baseline version for a profile](../protect/security-baselines-configure.md#update-baselines-that-use-the-previous-format) +- [Manage security baselines](../protect/security-baselines-configure.md) ::: zone pivot="office-may-2023" -**Microsoft 365 Apps for Enterprise security baseline for May 2023** +## Microsoft 365 Apps for Enterprise security baseline for May 2023 This baseline version was first made available in May of 2023. It was replaced by the Baseline *Version 2306* @@ -81,7 +80,7 @@ For more information about the following settings that are included in this base ::: zone-end ::: zone pivot="v2306" -**Microsoft 365 Apps for Enterprise for security baseline version 2306** +## Microsoft 365 Apps for Enterprise for security baseline version 2306 This baseline version was first made available in November 2023, and replaces the *May 2023* version. @@ -90,9 +89,9 @@ For more information about the following settings that are included in this base ::: zone-end ::: zone pivot="office-may-2023,v2306" -## Administrative Templates +### Administrative Templates -*MS Security Guide* +### MS Security Guide - **Block Flash activation in Office documents** Baseline default: *Enabled* @@ -130,11 +129,9 @@ For more information about the following settings that are included in this base - **Word: (Device)** Baseline default: *69632* +### Microsoft Access 2016 - -## Microsoft Access 2016 - -*Application Settings > Security > Trust Center* +#### Application Settings > Security > Trust Center - **Block macros from running in Office files from the Internet (User)** Baseline default: *Enabled* @@ -156,29 +153,29 @@ For more information about the following settings that are included in this base Baseline default: *Enabled* - Baseline default: *Disable all with notification* -*Application Settings > Security > Trust Center > Trusted Locations* +#### Application Settings > Security > Trust Center > Trusted Locations - **Allow Trusted Locations on the network (User)** Baseline default: *Disabled* ### Microsoft Excel 2016 -*Data Recovery* +#### Data Recovery - **Do not show data extraction options when opening corrupt workbooks (User)** Baseline default: *Enabled* -*Excel Options > Advanced* +#### Excel Options > Advanced - **Ask to update automatic links (User)** Baseline default: *Enabled* -*Excel Options > Advanced > General* +#### Excel Options > Advanced > General - **Load pictures from Web pages not created in Excel (User)** Baseline default: *Disabled* -*Excel Options > Save* +#### Excel Options > Save - **Disable AutoRepublish (User)** Baseline default: *Enabled* @@ -186,7 +183,7 @@ For more information about the following settings that are included in this base - **Do not show AutoRepublish warning alert (User)** Baseline default: *Disabled* -*Excel Options > Security* +#### Excel Options > Security - **Force file extension to match file type (User)** Baseline default: *Enabled* @@ -203,7 +200,7 @@ For more information about the following settings that are included in this base Baseline default: *Enabled* - Baseline default: *Disable all with notification* -*Excel Options > Security > Trust Center* +#### Excel Options > Security > Trust Center ::: zone-end ::: zone pivot="v2306" @@ -239,7 +236,7 @@ For more information about the following settings that are included in this base Baseline default: *Enabled* - Baseline default: *Disable all except digitally signed macros* -*Excel Options > Security > Trust Center > External Content* +#### Excel Options > Security > Trust Center > External Content - **Always prevent untrusted Microsoft Query files from opening (User)** Baseline default: *Enabled* @@ -257,7 +254,7 @@ For more information about the following settings that are included in this base ::: zone-end ::: zone pivot="office-may-2023,v2306" -*Excel Options > Security > Trust Center > File Block Settings* +#### Excel Options > Security > Trust Center > File Block Settings - **dBase III / IV files (User)** Baseline default: *Enabled* @@ -328,7 +325,7 @@ For more information about the following settings that are included in this base - **File block setting: (User)** Baseline default: *Open/Save blocked, use open policy* -*Excel Options > Security > Trust Center > Protected View* +#### Excel Options > Security > Trust Center > Protected View - **Always open untrusted database files in Protected View (User)** Baseline default: *Enabled* @@ -348,12 +345,12 @@ For more information about the following settings that are included in this base - **Turn off Protected View for attachments opened from Outlook (User)** Baseline default: *Disabled* -*Excel Options > Security > Trust Center > Trusted Locations* +#### Excel Options > Security > Trust Center > Trusted Locations - **Allow Trusted Locations on the network (User)** Baseline default: *Disabled* -## Microsoft Lync Feature Policies +### Microsoft Lync Feature Policies - **Configure SIP security mode** Baseline default: *Enabled* @@ -361,9 +358,9 @@ For more information about the following settings that are included in this base - **Disable HTTP fallback for SIP connection** Baseline default: *Enabled* -## Microsoft Office 2016 +### Microsoft Office 2016 -*Customize* +#### Customize - **Disable UI extending from documents and templates (User)** Baseline default: *Enabled* @@ -395,7 +392,7 @@ For more information about the following settings that are included in this base - **Disallow in Visio (User)** Baseline default: *True* -*Security Settings* +#### Security Settings - **ActiveX Control Initialization (User)** Baseline default: *Enabled* @@ -467,24 +464,24 @@ For more information about the following settings that are included in this base - **Protect document metadata for rights managed Office Open XML Files (User)** Baseline default: *Enabled* -*Security Settings > Trust Center* +#### Security Settings > Trust Center - **Allow mix of policy and user locations (User)** Baseline default: *Disabled* -*Server Settings* +#### Server Settings - **Disable the Office client from polling the SharePoint Server for published links (User)** Baseline default: *Enabled* -*Smart Documents (Word, Excel)* +#### Smart Documents (Word, Excel) - **Disable Smart Document's use of manifests (User)** Baseline default: *Enabled* -## Microsoft Office 2016 (Machine) +### Microsoft Office 2016 (Machine) -*Security Settings > IE Security* +#### Security Settings > IE Security - **Add-on Management** Baseline default: *Enabled* @@ -1071,9 +1068,9 @@ For more information about the following settings that are included in this base - **spDesign.exe (Device)** Baseline default: *True* -## Microsoft Outlook 2016 +### Microsoft Outlook 2016 -*Security > Security Form Settings* +#### Security > Security Form Settings The "Outlook Security Mode" policy controls how security settings in Outlook are enforced. To manage any of the dependent Outlook security policies using Microsoft Intune, Office cloud policy service, or Group policy this policy must be enabled and the Outlook Security Policy dropdown set to "Use Outlook Security Group Policy". @@ -1195,9 +1192,9 @@ The "Outlook Security Mode" policy controls how security settings in Outlook are - **Guard behavior: (User) Baseline default: *Automatically Deny* -## Microsoft PowerPoint 2016 +### Microsoft PowerPoint 2016 -*PowerPoint Options > Security* +#### PowerPoint Options > Security ::: zone-end ::: zone pivot="v2306" @@ -1224,7 +1221,7 @@ The "Outlook Security Mode" policy controls how security settings in Outlook are - **Turn off file validation (User)** Baseline default: *Disabled* -*PowerPoint Options > Security > Trust Center* +#### PowerPoint Options > Security > Trust Center - **Block macros from running in Office files from the Internet (User**) Baseline default: *Enabled* @@ -1248,7 +1245,7 @@ The "Outlook Security Mode" policy controls how security settings in Outlook are Baseline default: *Enabled* - Baseline default: *Disable all except digitally signed macros* -*PowerPoint Options > Security > Trust Center > File Block Settings* +#### PowerPoint Options > Security > Trust Center > File Block Settings - **PowerPoint 97-2003 presentations, shows, templates and add-in files (User)** Baseline default: *Enabled* @@ -1259,7 +1256,7 @@ The "Outlook Security Mode" policy controls how security settings in Outlook are Baseline default: *Enabled* - Baseline default: *Blocked files are not opened* -*PowerPoint Options > Security > Trust Center > Protected View* +#### PowerPoint Options > Security > Trust Center > Protected View - **Do not open files from the Internet zone in Protected View (User)** Baseline default: *Disabled* @@ -1277,14 +1274,14 @@ The "Outlook Security Mode" policy controls how security settings in Outlook are - **Turn off Protected View for attachments opened from Outlook (User)** Baseline default: *Disabled* -*PowerPoint Options > Security > Trust Center > Trusted Locations* +#### PowerPoint Options > Security > Trust Center > Trusted Locations - **Allow Trusted Locations on the network (User)** Baseline default: *Disabled* -## Microsoft Project 2016 +### Microsoft Project 2016 -*Project Options > Security > Trust Center* +#### Project Options > Security > Trust Center - **Allow Trusted Locations on the network (User)** Baseline default: *Disabled* @@ -1308,15 +1305,15 @@ The "Outlook Security Mode" policy controls how security settings in Outlook are Baseline default: *Enabled* - Baseline default: *Disable all except digitally signed macros* -## Microsoft Publisher 2016 +### Microsoft Publisher 2016 -*Security* +#### Security - **Publisher Automation Security Level (User)** Baseline default: *Enabled* - Baseline default: *By UI (prompted)* -*Security > Trust Center* +#### Security > Trust Center ::: zone-end ::: zone pivot="v2306" @@ -1341,9 +1338,9 @@ The "Outlook Security Mode" policy controls how security settings in Outlook are Baseline default: *Enabled* - Baseline default: *Disable all except digitally signed macros* -## Microsoft Visio 2016 +### Microsoft Visio 2016 -*Visio Options > Security > Trust Center* +#### Visio Options > Security > Trust Center - **Allow Trusted Locations on the network (User)** Baseline default: *Disabled* @@ -1370,7 +1367,7 @@ The "Outlook Security Mode" policy controls how security settings in Outlook are Baseline default: *Enabled* - Baseline default: *Disable all except digitally signed macros* -*Visio Options > Security > Trust Center > File Block Settings* +#### Visio Options > Security > Trust Center > File Block Settings - **Visio 2000-2002 Binary Drawings, Templates and Stencils (User)** Baseline default: *Enabled* @@ -1387,9 +1384,9 @@ The "Outlook Security Mode" policy controls how security settings in Outlook are - **File block setting: (User)** Baseline default: *Open/Save blocked* -## Microsoft Word 2016 +### Microsoft Word 2016 -*Word Options > Security > Trust Center* +#### Word Options > Security > Trust Center - **Block macros from running in Office files from the Internet (User)** Baseline default: *Enabled* @@ -1420,7 +1417,7 @@ The "Outlook Security Mode" policy controls how security settings in Outlook are Baseline default: *Enabled* - Baseline default: *Disable all except digitally signed macros* -*Word Options > Security > Trust Center > File Block Settings* +#### Word Options > Security > Trust Center > File Block Settings - **Set default file block behavior (User)** Baseline default: *Enabled* @@ -1466,7 +1463,7 @@ The "Outlook Security Mode" policy controls how security settings in Outlook are - **File block setting: (User)** Baseline default: *Open/Save blocked, use open policy* -*Word Options > Security > Trust Center > Protected View* +#### Word Options > Security > Trust Center > Protected View - **Do not open files from the Internet zone in Protected View (User)** Baseline default: *Disabled* @@ -1485,12 +1482,12 @@ The "Outlook Security Mode" policy controls how security settings in Outlook are - **Turn off Protected View for attachments opened from Outlook (User)** Baseline default: *Disabled* -*Word Options > Security* +#### Word Options > Security - **Turn off file validation (User)** Baseline default: *Disabled* -*Word Options > Security > Trust Center > Trusted Locations* +#### Word Options > Security > Trust Center > Trusted Locations - **Allow Trusted Locations on the network (User)** Baseline default: *Disabled* diff --git a/memdocs/intune/protect/security-baselines.md b/memdocs/intune/protect/security-baselines.md index d5336636fdf..b52ddc11695 100644 --- a/memdocs/intune/protect/security-baselines.md +++ b/memdocs/intune/protect/security-baselines.md @@ -138,7 +138,7 @@ You can view the list of available baselines in the [Microsoft Intune admin cent To view more information about the baseline versions you use, select a baseline type, like *Security Baseline for Windows 10 and later* to open its *Profiles* pane, and then select **Versions**. Intune displays details about the versions of that baseline that are in use by your profiles. The details include the most recent and current baseline version. You can select a single version to view deeper details about the profiles that use that version. -You can choose to [change of the version](../protect/security-baselines-configure.md#update-a-profile-to-the-latest-version) of a baseline that's in use with a given profile. When you change the version, you don't have to create a new baseline profile to take advantage of updated versions. Instead you can select a baseline profile and use the built-in option to change the instance version for that profile to a new one. +You can choose to [change the version](../protect/security-baselines-configure.md#update-a-profile-to-the-latest-version) of a baseline that's in use with a given profile. When you change the version, you don't have to create a new baseline profile to take advantage of updated versions. Instead you can select a baseline profile and use the built-in option to change the instance version for that profile to a new one. ## Avoid conflicts @@ -177,7 +177,7 @@ Migrating from on-premises Active Directory group policies to a pure cloud solut ### Where can I find details about using or configuring the settings that are available in a security baseline? -Each security baseline manages device configurations by applying the options found in a configuration service provider on a device. For example, settings that apply to Microsoft Defender are taken from th Microsoft Defender CSP. Because Intune is a configuration vehicle for those options and doesn’t determine their functionality or scope, the CSP documentation owns the content for how to configure each option. +Each security baseline manages device configurations by applying the options found in a configuration service provider on a device. For example, settings that apply to Microsoft Defender are taken from the Microsoft Defender CSP. Because Intune is a configuration vehicle for those options and doesn’t determine their functionality or scope, the CSP documentation owns the content for how to configure each option. Within the Intune security baseline policy UI, Intune provides information text that is taken from the source CSP and provides a link to that CSP. In some cases, the CSP might be part of a larger content set that includes proactive guidance that remains beyond the scope of Intune to include or duplicate in our content. However, Intune does document the list of settings in each security baseline version and its default configuration. diff --git a/memdocs/intune/protect/tutorial-protect-email-on-enrolled-devices.md b/memdocs/intune/protect/tutorial-protect-email-on-enrolled-devices.md index 91c680daea5..bb72ec2e80f 100644 --- a/memdocs/intune/protect/tutorial-protect-email-on-enrolled-devices.md +++ b/memdocs/intune/protect/tutorial-protect-email-on-enrolled-devices.md @@ -210,7 +210,7 @@ When the test policies are no longer needed, you can remove them. 3. In the **Policy name** list, select the context menu (**...**) for your test policy, and then select **Delete**. Select **OK** to confirm. -4. Select **Endpoint security** > **Conditional access** > **policies**. +4. Select **Endpoint security** > **Conditional Access** > **policies**. 5. In the **Policy name** list, select the context menu (**...**) for your test policy, and then select **Delete**. Select **Yes** to confirm. diff --git a/memdocs/intune/protect/tutorial-protect-email-on-unmanaged-devices.md b/memdocs/intune/protect/tutorial-protect-email-on-unmanaged-devices.md index 39e63e69c80..04fc7b38015 100644 --- a/memdocs/intune/protect/tutorial-protect-email-on-unmanaged-devices.md +++ b/memdocs/intune/protect/tutorial-protect-email-on-unmanaged-devices.md @@ -134,13 +134,13 @@ When you configure Conditional Access policies in the Microsoft Intune admin cen 1. Sign in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431). -2. Select **Endpoint security** >**Conditional access** > **Create new policy**. +2. Select **Endpoint security** >**Conditional Access** > **Create new policy**. 3. For **Name**, enter **Test policy for modern auth clients**. 4. Under **Assignments**, for *Users*, select **0 users and groups selected**. On the **Include** tab, select **All users**. The value for *Users* updates to *All users*. - :::image type="content" source="./media/tutorial-protect-email-on-unmanaged-devices/conditional-access-users.png" alt-text="Begin configuration of the conditional access policy."::: + :::image type="content" source="./media/tutorial-protect-email-on-unmanaged-devices/conditional-access-users.png" alt-text="Begin configuration of the Conditional Access policy."::: 5. Under **Assignments**, for *Target resources*, select **No target resources selected**. Ensure that *Select what this policy applies to* is set to **Cloud apps**. Because we want to protect Microsoft 365 Exchange Online email, select it by following these steps: @@ -258,7 +258,7 @@ When the test policies are no longer needed, you can remove them. 3. In the **Policy name** list, select the context menu (**...**) for your test policy, and then select **Delete**. Select **OK** to confirm. -4. Go to **Endpoint security** > **Conditional access** > Policies. +4. Go to **Endpoint security** > **Conditional Access** > Policies. 5. In the **Policy Name** list, select the context menu (**...**) for each of your test policies, and then select **Delete**. Select **Yes** to confirm. diff --git a/memdocs/intune/protect/windows-10-expedite-updates.md b/memdocs/intune/protect/windows-10-expedite-updates.md index 613935ba975..316d56e4617 100644 --- a/memdocs/intune/protect/windows-10-expedite-updates.md +++ b/memdocs/intune/protect/windows-10-expedite-updates.md @@ -111,7 +111,11 @@ Only update builds that are generally available are supported. Preview builds, i - Be configured to get Quality Updates directly from the Windows Update service. -- Have the *Update Health Tools* installed, which are installed with [KB 4023057 - Update for Windows 10 Update Service components](https://support.microsoft.com/topic/kb4023057-update-for-windows-10-update-service-components-fccad0ca-dc10-2e46-9ed1-7e392450fb3a). To confirm the presence of the Update Health Tools on a device: +- Have the *Update Health Tools* installed, which are installed with [KB 4023057 - Update for Windows 10 Update Service components](https://support.microsoft.com/topic/kb4023057-update-for-windows-10-update-service-components-fccad0ca-dc10-2e46-9ed1-7e392450fb3a). +> [!NOTE] +> Windows 11, version 23H2 and above do not require *Update Health Tools*, this is applicable only to Windows 11, version 22H2 and below. + +To confirm the presence of the Update Health Tools on a device: - Look for the folder **C:\Program Files\Microsoft Update Health Tools** or review *Add Remove Programs* for **Microsoft Update Health Tools**. - As an Admin, run the following PowerShell script: diff --git a/memdocs/intune/protect/windows-laps-overview.md b/memdocs/intune/protect/windows-laps-overview.md index 91ba7eb3b3f..a3e144eb869 100644 --- a/memdocs/intune/protect/windows-laps-overview.md +++ b/memdocs/intune/protect/windows-laps-overview.md @@ -6,7 +6,7 @@ keywords: author: brenduns ms.author: brenduns manager: dougeby -ms.date: 06/13/2024 +ms.date: 12/02/2024 ms.topic: how-to ms.service: microsoft-intune ms.subservice: protect @@ -71,7 +71,7 @@ The following are requirements for Intune to support Windows LAPS in your tenant - **Intune subscription** - *Microsoft Intune Plan 1*, which is the basic Intune subscription. You can also use Windows LAPS with a free trial subscription for Intune. - **Microsoft Entra ID** – *Microsoft Entra ID Free*, which is the free version of Microsoft Entra ID that’s included when you subscribe to Intune. With Microsoft Entra ID Free, you can use all the features of LAPS. - + ### Active Directory support Intune policy for Windows LAPS can configure a device to back up a local administrator account and password to one of the following Directory types: @@ -116,13 +116,13 @@ Intune policy for Windows LAPS is supported for GCC High environments. To manage LAPS, an account must have sufficient role-based access control (RBAC) permissions to complete a desired task. The following are the available tasks with their required permissions: -- **Create and access LAPS policy** – To work with and view LAPS policies, your account must be assigned sufficient permissions from the Intune RBAC category for **Security baselines**. By default, these are included in the built-in role **Endpoint Security Manager**. To use custom roles, ensure the custom role includes the rights from the *Security baselines* category. +- **Create and access LAPS policy** – To work with and view LAPS policies, your account must be assigned sufficient permissions from the Intune RBAC category for **Security baselines**. By default, these are included in the Intune built-in role **Endpoint Security Manager**. To use custom roles, ensure the custom role includes the rights from the *Security baselines* category. - **Rotate local Administrator password** – To use the Intune admin center to view or rotate a devices local admin account password, your account must be assigned the following Intune permissions: - Managed devices: **Read** - Organization: **Read** - - Remote tasks: **Rotate Local Admin Password** + - Remote tasks: **Rotate Local Admin Password** - **Retrieve local Administrator password** – To view password details, your account must have one of the following Microsoft Entra permissions: @@ -133,7 +133,7 @@ To manage LAPS, an account must have sufficient role-based access control (RBAC) - **View Microsoft Entra audit logs and events** – To view details about LAPS policies and recent device actions such as password rotation events, your account must permissions equivalent to the built-in Intune role **Read Only Operator**. -For more information, see [Role-based access control for Microsoft Intune](../fundamentals/role-based-access-control.md). +For more information about Intune's built-in roles and custom roles, see [Role-based access control for Microsoft Intune](../fundamentals/role-based-access-control.md). ## LAPS Architecture diff --git a/memdocs/intune/protect/windows-update-compatibility-reports.md b/memdocs/intune/protect/windows-update-compatibility-reports.md index 6ac796a0e5d..f09cff001f1 100644 --- a/memdocs/intune/protect/windows-update-compatibility-reports.md +++ b/memdocs/intune/protect/windows-update-compatibility-reports.md @@ -7,7 +7,7 @@ keywords: author: Smritib17 ms.author: smbhardwaj manager: dougeby -ms.date: 10/05/2023 +ms.date: 11/27/2024 ms.topic: how-to ms.service: microsoft-intune ms.subservice: protect @@ -33,11 +33,11 @@ ms.collection: # App and driver compatibility reports for Windows updates -With Intune, you can deploy updates to Windows 10/11 devices by using policies for [Update rings for Windows 10 and later](../protect/windows-10-update-rings.md) and [Feature updates for Windows 10 and later](../protect/windows-10-feature-updates.md). To help prepare for update deployments, Intune offers integrated reports to help you understand compatibility risks that might impact your devices during or after an update: +With Intune, you can deploy updates to Windows 10/11 devices by using policies for [Update rings for Windows 10 and later](../protect/windows-10-update-rings.md) and [Feature updates for Windows 10 and later](../protect/windows-10-feature-updates.md). To help prepare for update deployments, Intune offers integrated reports to help you understand compatibility risks that might affect your devices during or after an update: - **Windows feature update device readiness report** - This report provides per-device information about compatibility risks that are associated with an upgrade or update to a chosen version of Windows. -- **Windows feature update compatibility risks report** - This report provides a summary view of the top compatibility risks across your organization for a chosen version of Windows. You can use this report to understand which compatibility risks impact the greatest number of devices in your organization. +- **Windows feature update compatibility risks report** - This report provides a summary view of the top compatibility risks across your organization for a chosen version of Windows. You can use this report to understand which compatibility risks affect the greatest number of devices in your organization. To use these reports, you must first ensure that prerequisites are met and that devices are properly configured for data collection. @@ -125,12 +125,12 @@ The following applies to **Readiness status**: - **Upgraded** - The device is already running a version of Windows equal to or greater than the target OS version. - **Unknown** - A readiness status couldn't be determined. Ensure that the device is properly configured to send Windows diagnostic data. -For more information about the compatibility risks that impact a specific device, select the device name to open the details flyout. The tabs on the details flyout include: +For more information about the compatibility risks that affect a specific device, select the device name to open the details flyout. The tabs on the details flyout include: - **Overview** - A summary of device properties that can be used to identify the device, and an overview of the compatibility risks impacting the device. - **Applications** - A table of applications with compatibility risks that are installed on the device. - **Drivers** - A table of drivers with compatibility risks that are installed on the device. -- **Other** - A table of compatibility risks that might impact this device, but aren't associated with applications or drivers. Compatibility risks associated with device configurations and settings, such as some [Safeguard holds](/windows/deployment/update/safeguard-holds), fall into this category. +- **Other** - A table of compatibility risks that might affect this device, but aren't associated with applications or drivers. Compatibility risks associated with device configurations and settings, such as some [Safeguard holds](/windows/deployment/update/safeguard-holds), fall into this category. ## Use the Windows feature update compatibility risks report @@ -147,7 +147,7 @@ To use this report: - Select **Select Target OS** and choose the version of Windows you plan to deploy. - Optionally select **Asset type** and **Risk status** to refine the report. - - Select **Generate report**. This process can take several minutes. You are notified when report generation is complete. + - Select **Generate report**. This process can take several minutes. You're notified when report generation is complete. [![Screen shot of the Windows feature update compatibility risks report.](./media/windows-update-compatibility-reports/compatibility-risks-report.png)](./media/windows-update-compatibility-reports/compatibility-risks-report.png#lightbox) @@ -162,7 +162,7 @@ The following columns are available in this report: - **Asset version** - The version of the asset with a compatibility risk. - **Affected devices** - The number of enrolled devices that might be impacted by this compatibility risk. - **Risk status** - A summary of the severity of the compatibility risk. Most compatibility risks are either **Medium risk** if they might block the upgrade. -- **Issue** - A description of the compatibility risk that has been identified. +- **Issue** - A description of the identified compatibility risk. For more information about a specific compatibility risk, including which devices are potentially impacted, select the number in the **Affected devices** column to open the details flyout. The tabs on the details flyout include: @@ -187,7 +187,7 @@ In both the cases, after you upgrade Windows, you can't use the app. #### Blocking upgrade -Windows detected blocking issues, and can't remove the application during upgrade. It might not work on the new OS version. Before you upgrade, remove the application, reinstall and test it on the new OS version. +Windows detected blocking issues, and can't remove the application during upgrade. It might not work on the new OS version. Before you upgrade, remove the application, reinstall, and test it on the new OS version. #### Blocking upgrade, but can be reinstalled after upgrading @@ -249,7 +249,7 @@ The data source for these reports is [Windows diagnostic data](/windows/privacy/ ### Exported csv files display numerical values -When report data is exported to a .csv file, the exported data doesn't use the friendly names you're used to seeing in the online reports. Use the information below to map the data in the exported file into the meaning of the value: +When report data is exported to a .csv file, the exported data doesn't use the friendly names you're used to seeing in the online reports. Use the information in the following section to map the data in the exported file into the meaning of the value: #### Windows feature update device readiness report diff --git a/memdocs/intune/protect/windows-update-for-business-configure.md b/memdocs/intune/protect/windows-update-for-business-configure.md index e3a0d78f2f1..73cb209adf7 100644 --- a/memdocs/intune/protect/windows-update-for-business-configure.md +++ b/memdocs/intune/protect/windows-update-for-business-configure.md @@ -7,7 +7,7 @@ keywords: author: Smritib17 ms.author: smbhardwaj manager: dougeby -ms.date: 08/30/2023 +ms.date: 11/27/2024 ms.topic: overview ms.service: microsoft-intune ms.subservice: protect @@ -36,7 +36,7 @@ Use Microsoft Intune to manage the install of Windows 10/11 software updates fro By using Windows Update for Business, you simplify the update management experience. You don't need to approve individual updates for groups of devices and can manage risk in your environments by configuring an update rollout strategy. With Intune, you can [configure update settings](windows-update-settings.md) on devices and configure deferral of update installation. You can also prevent devices from installing features from new Windows versions to help keep them stable, while allowing those devices to continue installing updates for quality and security. -Intune stores only the update policy assignments, not the updates themselves. When you save a policy, Intune passes the configuration details to Windows Update, which then determines which updates will be offered to each device. Devices access Windows Update directly for the updates. +Intune stores only the update policy assignments, not the updates themselves. When you save a policy, Intune passes the configuration details to Windows Update, which then determines which of these updates are offered to each device. Devices access Windows Update directly for the updates. Learn more about Windows [*feature* and *quality* updates](/windows/deployment/update/get-started-updates-channels-tools#types-of-updates) in the Windows documentation. @@ -46,13 +46,13 @@ Intune provides the following policy types to manage updates, which you assign t - **Update rings for Windows 10 and later**: This policy is a collection of settings that configures when devices that run Windows 10 and Windows 11 updates get installed. Update ring policies are supported for devices that run Windows 10 version 1607 or later, and Windows 11. For more information, see [Update rings policy](../protect/windows-10-update-rings.md). -- **Feature updates for Windows 10 and later**: Use [Feature updates](../protect/windows-10-feature-updates.md) policy updates devices to the Windows version you specify, and then freezes the feature set version on those devices. This version freeze remains in place until you choose to update them to a later Windows version. While the feature version remains static, devices can continue to install quality and security updates that are available for their feature version. +- **Feature updates for Windows 10 and later**: The [Feature updates](../protect/windows-10-feature-updates.md) policy updates devices to the Windows version that you specify, and then freezes the feature set version on those devices. This version freeze remains in place until you choose to update them to a later Windows version. While the feature version remains static, devices can continue to install quality and security updates that are available for their feature version. You can also use Feature updates policy to [upgrade your devices that run Windows 10 to Windows 11](../protect/windows-10-feature-updates.md#upgrade-devices-to-windows-11). -- **Quality updates for Windows 10 and later**: With Quality updates for Windows 10 and later, also referred to as Expedited updates, you can expedite the install of the most recent Windows 10 and Windows 11 security updates as quickly as possible on devices you manage with Microsoft Intune. Expedited install is accomplished without the need to pause or edit your existing monthly servicing policies. For more information, see [Expedite updates policy](../protect/windows-10-expedite-updates.md). +- **Quality updates for Windows 10 and later**: With Quality updates for Windows 10 and later, also referred to as Expedited updates, you can expedite the install of the most recent Windows 10 and Windows 11 security updates on devices that you manage with Microsoft Intune. Expedited install is accomplished without the need to pause or edit your existing monthly servicing policies. For more information, see [Expedite updates policy](../protect/windows-10-expedite-updates.md). -- **Driver updates for Windows 10 and later**: With Windows Driver Update Management in Microsoft Intune, you can review, approve for deployment and pause deployments of driver updates for your managed Windows 10 and Windows 11 devices. Your policies can automatically install the newest recommended driver for you, or wait for an admin to manually approve drivers before they are installed. Intune and the Windows Update for Business (WUfB) deployment service (DS) take care of the heavy lifting to identify the applicable driver updates for devices that are assigned a driver updates policy. For more information, see [Driver updates policy](../protect/windows-driver-updates-policy.md). +- **Driver updates for Windows 10 and later**: With Windows Driver Update Management in Microsoft Intune, you can review, approve for deployment and pause deployments of driver updates for your managed Windows 10 and Windows 11 devices. Your policies can automatically install the newest recommended driver for you, or wait for an admin to manually approve drivers before they're installed. Intune and the Windows Update for Business (WUfB) deployment service (DS) take care of the heavy lifting to identify the applicable driver updates for devices that are assigned a driver updates policy. For more information, see [Driver updates policy](../protect/windows-driver-updates-policy.md). ## Policy limitations for Workplace Joined devices @@ -78,7 +78,6 @@ If you support WPJ devices with Intune, the following information can help you u | **Reports - Summary count of devices**:
                                  - Feature updates
                                  - Quality updates | WUfB reports | WUfB reports | | **Reports – Detailed status**:
                                  - Per Update | WUfB reports | Yes, in Intune | - ## Move from update ring deferrals to feature updates policy When using Intune to manage Windows updates, it's possible to use both *update rings* policy with update deferrals, and *feature updates* policy to manage the updates you want to install on devices. If you're using feature updates, we recommend you end use of deferrals as configured in your update rings policy. Combining update ring deferrals with feature updates policy can create complexity that might delay update installations. You can continue to use the user experience settings from update rings, as they don't create issues when combined with feature updates policy. @@ -103,9 +102,9 @@ Use the following process to ensure Windows Update has processed your feature up After the saved policy is assigned to devices, it will take a few minutes for Windows Update to process the policy. -2. View the [Windows 10 feature updates (Organizational)](../protect/windows-update-reports.md#use-the-windows-10-feature-updates-organizational-report) report for the feature update policy, and verify devices have a state of **OfferReady** before you proceed. Once all devices show **OfferReady**, Windows Update has completed processing the policy. +2. View the [Windows 10 feature updates (Organizational)](../protect/windows-update-reports.md#use-the-windows-10-feature-updates-organizational-report) report for the feature update policy, and verify devices have a state of **OfferReady** before you proceed. Once all devices show **OfferReady**, Windows Update has completed processing the policy. -3. After devices are verified to be in the **OfferReady** state you can safely reconfigure the [Windows 10 and later update ring policy](../protect/windows-10-update-rings.md) for that same set of devices to change the setting **Feature update deferral period (days)** to a value of **0**. +3. After devices are verified to be in the **OfferReady** state you can safely reconfigure the [Windows 10 and later update ring policy](../protect/windows-10-update-rings.md), for that same set of devices to change the setting **Feature update deferral period (days)** to a value of **0**. ## Reporting on updates diff --git a/memdocs/intune/remote-actions/collect-diagnostics.md b/memdocs/intune/remote-actions/collect-diagnostics.md index 5dad0d2b000..118525c200d 100644 --- a/memdocs/intune/remote-actions/collect-diagnostics.md +++ b/memdocs/intune/remote-actions/collect-diagnostics.md @@ -32,19 +32,40 @@ ms.collection: # Collect diagnostics from an Intune managed device -The **Collect diagnostics** remote action lets you collect and download managed device logs without interrupting the user. Only nonuser locations and file types are accessed. +The **Collect diagnostics** remote action lets you collect and download managed device diagnostics without interrupting the user. Only nonuser locations and file types are accessed. > [!NOTE] -> Intune App Protection logs are available to download from the diagnostics tab in the **Troubleshooting** pane. However, M365 remote application logs are only available to their specific support engineers. +> Intune App Protection logs are available to download from the diagnostics tab in the **Troubleshooting** pane. However, M365 remote application diagnostics are only available to their specific support engineers. +> +> Devices do not have to be managed by MDM (Mobile device mangement) to have Intune app protection or M365 app diagnostics collected, only managed by an Intune app protection policy. > > The data is stored in Microsoft support systems and isn't subject to Intune data management policies or protections. Some applications might collect and store data using systems other than Intune. ## Collect diagnostics for Microsoft 365 remote applications -The Microsoft 365 remote application diagnostics allows Intune admins to request Intune app protection logs and Microsoft 365 application logs (where applicable) directly from the Intune console. Admins can find this report in the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) by selecting **Troubleshooting + support** > **Troubleshoot** > *select a user* > **Summary** > *App protection**. This feature is exclusive to applications that are under Intune app protection management. If supported, the application specific logs are gathered and stored within dedicated storage solutions for each application. +The Microsoft 365 remote application diagnostics allows Intune admins to request Intune app protection diagnostics and Microsoft 365 application diagnostics (where applicable) directly from the Intune console. Admins can find this report in the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) by selecting **Troubleshooting + support** > **Troubleshoot** > *select a user* > **Summary** > *App protection**. This feature is exclusive to applications that are under Intune app protection management. If supported, the application specific logs are gathered and stored within dedicated storage solutions for each application. +Applications with support for M365 application diagnostics: + +- Outlook iOS/Android +- Teams iOS/Android +- OneDrive iOS/Android +- Microsoft Edge iOS/Android +- Microsoft Word iOS +- Microsoft Excel iOS +- Microsoft PowerPoint iOS +- OneNote iOS +- Microsoft 365 (Office) iOS + ### Collect diagnostics from a M365 Application +Requirements to collect diagnostics from an M365 application: + +1. Sign in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431). +2. Navigate to **Tenant administration** > **Device diagnostics** > Make sure the 3rd setting is enabled. +3. Create and deploy an Intune App Protection policy to a user, more information [here](../apps/app-protection-policies.md). +4. Confirm the application has been managed by Intune App Protection policy. This can be checked locally on the device and/or loading the user into the Intune Troubleshooting Pane and opening the App Protection summary page. + To use the *Collect diagnostics* action: 1. Sign in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) @@ -64,7 +85,7 @@ To download diagnostics: 2. On the **Summary** page, select the **Diagnostics** page and download the diagnostics. > [!IMPORTANT] -> For Android devices, if the Company Portal isn't signed in by the user, logs will not be available for download in the Intune portal. Diagnostic uploads exceeding 50 diagnostics or 4MB in diagnostic data cannot be downloaded directly from the Intune portal. For access to larger diagnostic uploads, reach out to [Microsoft Intune support](/mem/get-support). +> Diagnostic uploads exceeding 50 diagnostics or 4MB in diagnostic data cannot be downloaded directly from the Intune portal. For access to larger diagnostic uploads, reach out to [Microsoft Intune support](/mem/get-support). Diagnostics take approximately 30 minutes to be delivered from an end user's device. The user may be required to close and reopen the app if prompted for a pin when opening the app for the diagnostics request to prompt. diff --git a/memdocs/intune/remote-actions/device-inventory.md b/memdocs/intune/remote-actions/device-inventory.md index 4ae88d5a78b..7a8aec55ecc 100644 --- a/memdocs/intune/remote-actions/device-inventory.md +++ b/memdocs/intune/remote-actions/device-inventory.md @@ -7,7 +7,7 @@ keywords: author: Smritib17 ms.author: smbhardwaj manager: dougeby -ms.date: 10/27/2023 +ms.date: 01/14/2025 ms.topic: how-to ms.service: microsoft-intune ms.subservice: remote-actions @@ -47,8 +47,8 @@ This article shows you how to view all your devices, and their properties in the - [Remote lock](device-remote-lock.md) - [Sync](device-sync.md) - [Reset passcode](device-passcode-reset.md) - - [Restart](device-restart.md) - - [Fresh Start](device-fresh-start.md) (Windows only) + - [Restart](device-restart.md) + - [Fresh Start](device-fresh-start.md) (Windows 10/11) - [Autopilot reset](/windows/deployment/windows-autopilot/windows-autopilot-reset#reset-devices-with-remote-windows-autopilot-reset) (Windows only) - [Quick scan](../configuration/device-restrictions-windows-10.md) (Windows 10 only) - [Full scan](../configuration/device-restrictions-windows-10.md) (Windows 10 only) @@ -73,7 +73,7 @@ Depending on the carrier used by the devices, not all details might be collected > Hardware and Software inventory is refreshed in the Intune service every 7 days, starting from the date of enrolment. > [!NOTE] -> Hardware device details are currently not supported for Linux devices. +> Hardware device details are currently not supported for Linux devices. |Detail|Description|Platform| |--------------|----------------------|----| @@ -81,7 +81,7 @@ Depending on the carrier used by the devices, not all details might be collected |Management name|An easily recognizable device name used only in the Intune admin center. Changing this name does not change the device name or the name in the Company Portal. For more information on how to change the device name, see [Rename a device with Microsoft Intune](device-rename.md).|Windows, macOS, iOS, Android

                                  NOTE: Management names won't automatically populate for Android Enterprise dedicated, fully managed, and corporate-owned with work profile devices that were enrolled before November 2021. However, the admin may still edit the management name.| |UDID|The device's Unique Device identifier.|macOS, iOS| |Intune Device ID|A GUID that uniquely identifies the device.|Windows, macOS, iOS, Android| -|Serial number|The device's serial number from the manufacturer.|Windows, macOS, iOS, iPadOS, Android

                                  Intune doesn't display serial number for Android personally owned work profile devices running Android 12 and newer.| +|Serial number|The device's serial number from the manufacturer.|Windows, macOS, iOS, iPadOS, Android

                                  NOTE: Intune might not be able to display the serial number for personally owned work profile devices running Android 12 and newer due to platform limitations.| |Shared device|If **Yes**, the device is shared by more than one user.|Windows, iOS| |User approved enrollment|If **Yes**, then the device has user approved enrollment that lets admins manage certain security settings on the device.|Windows, iOS| |Operating system|The operating system used on the device.|Windows, macOS, iOS, Android| @@ -96,8 +96,8 @@ Depending on the carrier used by the devices, not all details might be collected | PowerPrecision Battery Charge Cycles Consumed | Number of full charge cycles consumed as determined by Zebra (PowerPrecision batteries only). | Android | | Last Battery Check-in | Date of last check-in for battery last found in the device as determined by Zebra (PowerPrecision and PowerPrecision+ batteries only). | Android | | Battery Serial Number | Serial number of the battery pack last found in the device as determined by Zebra (PowerPrecision and PowerPrecision+ batteries only). | Android | -|IMEI|The device's International Mobile Equipment Identity.|Windows, iOS/iPadOS, Android

                                  NOTE: Intune doesn't display IMEI for Android personally owned work profile devices running Android 12 and newer| -|MEID|The device's mobile equipment identifier.|Windows, iOS/iPadOS, Android

                                  NOTE: Intune doesn't display MEID for Android personally owned work profile devices running Android 12 and newer| +|IMEI|The device's International Mobile Equipment Identity.|Windows, iOS/iPadOS, Android

                                  NOTE: Intune might not be able to display IMEI for personally owned work profile devices running Android 12 and newer due to platform limitations.| +|MEID|The device's mobile equipment identifier.|Windows, iOS/iPadOS, Android

                                  NOTE: Intune might not be able to display MEID for personally owned work profile devices running Android 12 and newer due to platform limitations.| |Manufacturer|The manufacturer of the device.|Windows, macOS, iOS/iPadOS, Android| |Model|The model of the device.|Windows, macOS, iOS/iPadOS, Android| |Phone number|The phone number assigned to the device.|Windows, iOS/iPadOS, Android

                                  NOTE: Reporting for phone number isn't supported for Android Enterprise corporate-owned work profile devices. For Android Enterprise fully managed and dedicated devices, reporting for phone number is supported; however, certain SIM cards won't write the data and therefore the phone number isn't reported in such cases.| @@ -105,7 +105,7 @@ Depending on the carrier used by the devices, not all details might be collected |Cellular technology|The radio system used by the device.|Windows, iOS/iPadOS, Android| |Wi-Fi MAC|The device's Media Access Control address.|Windows, macOS, iOS/iPadOS, Android

                                  **NOTE**: As of October 2021, Intune doesn't display Wi-Fi MAC addresses for newly enrolled personally owned work profile devices and devices managed with device administrator running Android 9 and later. | |Ethernet MAC|The primary Ethernet MAC address for the device. For macOS devices with no ethernet, the device reports the Wi-Fi MAC address.|macOS| -|ICCID|The Integrated Circuit Card Identifier, which is a SIM card's unique identification number.|Windows, iOS/iPadOS, Android

                                  ICCID isn't inventoried on Android Enterprise Dedicated, Fully Managed, or Corporate-Owned Work Profile devices.| +|ICCID|The Integrated Circuit Card Identifier, which is a SIM card's unique identification number.|Windows, iOS/iPadOS, Android BYOD, Android Enterprise Dedicated, Android Fully Managed

                                  **Note**:Reporting for ICCID isn't supported for Android Enterprise corporate-owned work profile devices. For Android Enterprise fully managed and dedicated devices, reporting for ICCID is supported; however, certain SIM cards won't write the data and therefore the ICCID isn't reported in such cases.| |EID|The eSIM identifier, which is a unique identifier for the embedded SIM (eSIM) for cellular devices that have an eSIM.|iOS/iPadOS| |Wi-Fi IPv4 address|The device's IPv4 address.|Windows, Android Enterprise fully managed, dedicated and corp-owned work profiles.

                                  **NOTE**: Any change to IPv4 or subnet ID may take up to 8 hours to reflect in Intune admin center from the time that network changes on device.| |Wi-Fi subnet ID|The device's subnet ID.|Android Enterprise fully managed, dedicated and corp-owned work profiles.

                                  **NOTE**: Any change to IPv4 or subnet ID may take up to 8 hours to reflect in Intune admin center from the time that network changes on device.| @@ -125,13 +125,13 @@ Depending on the carrier used by the devices, not all details might be collected > [!NOTE] > -- For Windows 10 devices that are registered with [Windows Autopilot service](/autopilot/add-devices), Enrolled date displays the time when devices were registered with Autopilot instead of the time when they were enrolled. -- For Android Enterprise corporate-owned work profile devices, reporting for phone number is not supported. For Android Enterprise fully managed and dedicated devices, reporting for phone number is supported; however, certain SIM cards will not write the data and therefore the phone number won't get reported in those cases. -- For multi-SIM iOS/iPadOS devices, Intune has no control over which SIM data is assigned to the Service Subscription slots on the device for the ICCID, IMEI, MEID, and Phone number values. Intune only reports the first available values received from the device in the following order: - - CT Subscription Slot One - - CT Subscription Slot Two - - Top-level ICCID, IMEI, MEID, and Phone number properties (deprecated) - + > - For Windows 10 devices that are registered with [Windows Autopilot service](/autopilot/add-devices), Enrolled date displays the time when devices were registered with Autopilot instead of the time when they were enrolled. + > - For Android Enterprise corporate-owned work profile devices, reporting for phone number is not supported. For Android Enterprise fully managed and dedicated devices, reporting for phone number is supported; however, certain SIM cards will not write the data and therefore the phone number won't get reported in those cases. + > - For multi-SIM iOS/iPadOS devices, Intune has no control over which SIM data is assigned to the Service Subscription slots on the device for the ICCID, IMEI, MEID, and Phone number values. Intune only reports the first available values received from the device in the following order: + > - CT Subscription Slot One + > - CT Subscription Slot Two + > - Top-level ICCID, IMEI, MEID, and Phone number properties (deprecated) + ## Next steps See what else you can do to [manage your devices](device-management.md) with Intune. diff --git a/memdocs/intune/remote-actions/device-locate.md b/memdocs/intune/remote-actions/device-locate.md index 4d7d081bce2..e325a91e655 100644 --- a/memdocs/intune/remote-actions/device-locate.md +++ b/memdocs/intune/remote-actions/device-locate.md @@ -69,6 +69,9 @@ You need to enable Windows location services in Windows Out of Box Experience (O - Windows Holographic for Business - Windows Phone +> [!NOTE] +> The locate device capability (excluding the lost device sound alert) is not supported on GCC High environments. + ## Locate a lost or stolen device 1. Sign in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431). diff --git a/memdocs/intune/remote-actions/device-management.md b/memdocs/intune/remote-actions/device-management.md index 22fe7967a19..993ab0cb676 100644 --- a/memdocs/intune/remote-actions/device-management.md +++ b/memdocs/intune/remote-actions/device-management.md @@ -74,7 +74,7 @@ This article shows you how to see the available remote actions, and lists some o - **By platform**: View lists of devices by the specific platform. - **Enrollment**: Opens the enrollment page and lists the different enrollment options for each platform. - - **Configuration**, **Compliance**, **Conditional access**: These options let you create new policies and view & update existing policies. + - **Configuration**, **Compliance**, **Conditional Access**: These options let you create new policies and view & update existing policies. - **Device cleanup rules**: Automatically removes inactive devices from Intune. For more information, go to [Automatically delete devices with cleanup rules](devices-wipe.md#delete-devices-from-the-intune-admin-center). - **Device categories**: Create [device categories](../enrollment/device-group-mapping.md) to help organize devices and build dynamic device groups. - **Help and Support** provides a shortcut on troubleshooting tips, requesting support, or checking the status of Intune. diff --git a/memdocs/intune/remote-actions/devices-wipe.md b/memdocs/intune/remote-actions/devices-wipe.md index 1abf5f91df7..af131aa55e5 100644 --- a/memdocs/intune/remote-actions/devices-wipe.md +++ b/memdocs/intune/remote-actions/devices-wipe.md @@ -43,7 +43,7 @@ The **Wipe** device action restores a device to its factory default settings. Th |**Wipe**| Checked | No | Wipes all MDM Policies. Keeps user accounts and data. Resets user settings back to default. Resets the operating system to its default state and settings.| > [!NOTE] -> The Wipe action is not available for iOS/iPadOS devices enrolled with User Enrollment. To create a User Enrollment profile: [Set up iOS/iPadOS and iPadOS User Enrollment](../enrollment/ios-user-enrollment.md) +> The Wipe action is not available for iOS/iPadOS devices enrolled using Account Driven Apple User Enrollment. To create an Account Driven Apple User Enrollment profile, see [Set up iOS/iPadOS and iPadOS Account driven Apple User Enrollment](../enrollment/apple-account-driven-user-enrollment.md). > [!NOTE] > By design, Zebra has defined the Wipe action on any Android Zebra device to only remove corporate data from devices, and not perform a factory reset. @@ -270,12 +270,15 @@ If you want to completely remove an Apple automated device enrollment (ADE) devi 1. Sign in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431). 2. Choose **Devices** > **All devices** > choose the device > **Retire**. -3. Visit [business.apple.com](http://business.apple.com) and search for the device by its serial number. -4. Select the device, and then select **Release from Organization**. +3. Visit [business.apple.com](http://business.apple.com), go to the **Devices** section, and search for the device by its serial number. +4. Select the device, open the **...** menu, and then select **Release from Organization**. -5. Check **I understand this cannot be undone**, and then select **Release**. +5. Check **I understand this cannot be undone**, and then select **Continue**. - ![Screenshot for Apple reassign](./media/devices-wipe/apple-reassign.png) + ![Screenshot for Apple reassign](./media/devices-wipe/ade-release-device.png) + +> [!NOTE] +> In some cases, the iOS device must be restored with iTunes to apply this change. Please find further instructions from Apple [here](https://support.apple.com/guide/itunes/restore-to-factory-settings-itnsdb1fe305/windows). ## Device states diff --git a/memdocs/intune/remote-actions/media/devices-wipe/ade-release-device.png b/memdocs/intune/remote-actions/media/devices-wipe/ade-release-device.png new file mode 100644 index 00000000000..cfe3295a072 Binary files /dev/null and b/memdocs/intune/remote-actions/media/devices-wipe/ade-release-device.png differ diff --git a/memdocs/intune/remote-actions/media/devices-wipe/apple-reassign.png b/memdocs/intune/remote-actions/media/devices-wipe/apple-reassign.png deleted file mode 100644 index 6f852126ca2..00000000000 Binary files a/memdocs/intune/remote-actions/media/devices-wipe/apple-reassign.png and /dev/null differ diff --git a/memdocs/intune/remote-actions/remove-apps-config.md b/memdocs/intune/remote-actions/remove-apps-config.md index aa3f0a01449..ce491bedcb0 100644 --- a/memdocs/intune/remote-actions/remove-apps-config.md +++ b/memdocs/intune/remote-actions/remove-apps-config.md @@ -102,7 +102,10 @@ This action aims to resolve the issues that customers face outside of Intune and ## Permissions for Remove apps and configurations -**Permissions**: To use the **Remove apps and configuration** device action, you require a role based permission known as **Remote tasks: Change assignments**. Set the Permission to **yes** to enable the action. With the permission set to **Yes**, IT admins can initiate a **Change Assignments** action. +**Permissions**: To use the **Remove apps and configuration** device action, you require the following permissions: + + - **Organization: Read** permission is needed. + - **Remote tasks: Change assignments**. Set the Permission to **yes** to enable the action. With the permission set to **Yes**, IT admins can initiate a **Change Assignments** action. The administrator can: diff --git a/memdocs/intune/toc.yml b/memdocs/intune/toc.yml index 6850eb4bfd6..9b3a7ab276a 100644 --- a/memdocs/intune/toc.yml +++ b/memdocs/intune/toc.yml @@ -34,7 +34,7 @@ items: - name: What's new in the app UI href: ./fundamentals/whats-new-app-ui.md - name: Features in development - href: ./fundamentals/in-development.md + href: ./fundamentals/in-development.md - name: Important notices href: ./fundamentals/whats-new.md#notices - name: Public preview @@ -44,7 +44,7 @@ items: items: - name: Walkthrough Intune admin center href: ./fundamentals/tutorial-walkthrough-endpoint-manager.md - displayName: trial, free + displayName: trial, free - name: Try Intune tasks items: - name: Overview @@ -55,51 +55,41 @@ items: - name: Step 2 - Create a user and assign a license href: ./fundamentals/quickstart-create-user.md - name: Step 3 - Create a group - href: ./fundamentals/quickstart-create-group.md + href: ./fundamentals/quickstart-create-group.md - name: Step 4 - Set up automatic enrollment href: ./enrollment/quickstart-setup-auto-enrollment.md - name: Step 5 - Enroll your Windows device href: ./enrollment/quickstart-enroll-windows-device.md - name: Step 6 - Create a device compliance policy - href: ./protect/quickstart-set-password-length-android.md + href: ./protect/quickstart-set-password-length-android.md - name: Step 7 - Send notifications to noncompliant devices - href: ./protect/quickstart-send-notification.md + href: ./protect/quickstart-send-notification.md - name: Step 8 - Add and assign an app - href: ./apps/quickstart-add-assign-app.md + href: ./apps/quickstart-add-assign-app.md - name: Step 9 - Create and assign an app protection policy - href: ./apps/quickstart-create-assign-app-policy.md + href: ./apps/quickstart-create-assign-app-policy.md - name: Step 10 - Create and assign a custom role - href: ./fundamentals/quickstart-create-custom-role.md + href: ./fundamentals/quickstart-create-custom-role.md - name: Step 11 - Create a device profile - href: ./configuration/quickstart-email-profile.md + href: ./configuration/quickstart-email-profile.md - name: Try Intune scenarios items: - name: Protect email on managed devices href: ./protect/tutorial-protect-email-on-enrolled-devices.md - name: Protect email on unmanaged devices href: ./protect/tutorial-protect-email-on-unmanaged-devices.md - - name: Configure Slack to use Intune + - name: Configure Slack to use Intune href: ./apps/tutorial-configure-slack-enterprise-grid.md - - name: Set up just in time (JIT) registration - href: ./enrollment/set-up-just-in-time-registration.md + - name: Set up just in time (JIT) registration + href: ./enrollment/set-up-just-in-time-registration.md - - name: Use automated device enrollment to enroll iOS/iPadOS devices + - name: Use automated device enrollment to enroll iOS/iPadOS devices href: ./enrollment/tutorial-use-device-enrollment-program-enroll-ios.md - name: Create an ADMX template href: ./configuration/tutorial-walkthrough-administrative-templates.md - displayName: admx, administrative template, gpo, windows + displayName: admx, administrative template, gpo, windows - - name: Microsoft Copilot + Intune - items: - - name: Copilot in Intune - href: ./copilot/copilot-intune-overview.md - - name: Troubleshoot a device using Copilot - href: ./copilot/copilot-devices.md - - name: FAQ - href: ./copilot/copilot-intune-faq.md - - name: Intune plugin in Copilot for Security - href: ./copilot/security-copilot.md - name: Plan items: - name: Planning guide @@ -115,7 +105,7 @@ items: href: ./fundamentals/supported-devices-browsers.md - name: Android Open Source Project Supported Devices displayName: software updates, android open source project, supported devices - href: ./fundamentals/android-os-project-supported-devices.md + href: ./fundamentals/android-os-project-supported-devices.md - name: Software updates planning guides items: - name: BYOD and personal devices @@ -146,17 +136,17 @@ items: href: ./fundamentals/china.md - name: Migrate to Intune - items: + items: - name: Move to Intune displayName: help, get started, migrate, mdm, mam, android, ios, ipados, macos, windows href: ./fundamentals/deployment-guide-intune-setup.md - name: Migrate from Basic Mobility and Security - items: + items: - name: Move from Microsoft 365 device management displayName: migrate, mdm, office, windows href: ./fundamentals/migrate-to-intune.md - name: Policy mapping - items: + items: - name: Access requirements policy mapping displayName: migrate, mdm, office, windows href: ./fundamentals/policy-map-access-requirements.md @@ -189,6 +179,71 @@ items: - name: Step 5 - Enroll devices displayName: deployment, mdm, android, ios, ipados, macos, windows href: ./fundamentals/deployment-guide-enroll.md + - name: Microsoft Copilot + Intune + items: + - name: Copilot in Intune + href: ./copilot/copilot-intune-overview.md + - name: Troubleshoot a device using Copilot + href: ./copilot/copilot-devices.md + - name: FAQ + href: ./copilot/copilot-intune-faq.md + - name: Intune plugin in Security Copilot + href: ./copilot/security-copilot.md + + - name: Endpoint analytics + items: + - name: Overview + items: + - name: What is Endpoint analytics? + href: ../analytics/overview.md + - name: Concepts + items: + - name: Scores, baselines, and insights + href: ../analytics/scores.md + - name: How to guides + items: + - name: Enroll Intune devices + href: ../analytics/enroll-intune.md + - name: Enroll Configuration Manager devices + href: ../analytics/enroll-configmgr.md + - name: Manage settings + href: ../analytics/settings.md + - name: Reports + items: + - name: Startup performance + href: ../analytics/startup-performance.md + - name: Restart frequency + href: ../analytics/restart-frequency.md + - name: Application reliability + href: ../analytics/app-reliability.md + - name: Work from anywhere + href: ../analytics/work-from-anywhere.md + - name: Endpoint analytics in Microsoft Adoption Score + href: ../analytics/adoption-score.md + - name: Intune Advanced Analytics + items: + - name: What is Advanced Analytics? + href: ../analytics/advanced-endpoint-analytics.md + - name: Anomaly detection + href: ../analytics/anomaly-detection.md + - name: Enhanced device timeline + href: ../analytics/enhanced-device-timeline.md + - name: Device scopes + href: ../analytics/device-scopes.md + - name: Device query + href: ../analytics/device-query.md + - name: Data platform schema + href: ../analytics/data-platform-schema.md + - name: Battery health + href: ../analytics/battery-health.md + - name: Resource Performance + href: ../analytics/resource-performance-report.md + - name: Get support + href: ../analytics/get-support.md + - name: Data collection + href: ../analytics/data-collection.md + - name: Troubleshoot + href: ../analytics/troubleshoot.md - name: How-to guides items: @@ -203,18 +258,18 @@ items: - name: Add groups href: ./fundamentals/groups-add.md - name: Manage Intune licenses - items: + items: - name: Determine license needs href: ./fundamentals/licenses.md - name: Assign licenses href: ./fundamentals/licenses-assign.md - name: Allow access to unlicensed admins - href: ./fundamentals/unlicensed-admins.md + href: ./fundamentals/unlicensed-admins.md - name: Set the MDM authority href: ./fundamentals/mdm-authority-set.md - name: Configure multiple admin approvals href: ./fundamentals/multi-admin-approval.md - + - name: Manage roles items: - name: Role-based access control @@ -224,41 +279,41 @@ items: - name: Create a custom role href: ./fundamentals/create-custom-role.md - name: Use scope tags to determine what admins can see - href: ./fundamentals/scope-tags.md + href: ./fundamentals/scope-tags.md - name: Distributed IT environment with many admins in the same Intune tenant href: ./fundamentals/intune-scale-guidelines.md - name: Built-in roles permissions reference - href: ./fundamentals/role-based-access-control-reference.md + href: ./fundamentals/role-based-access-control-reference.md - name: Manage apps items: - name: App management overview - href: ./apps/app-management.md - - name: MAM for unenrolled devices + href: ./apps/app-management.md + - name: MAM for unenrolled devices href: ./fundamentals/deployment-guide-enrollment-mamwe.md displayName: mobile application management, mam-we, mamwe - name: App solutions items: - name: Purchase and add apps for Microsoft Intune - items: + items: - name: Overview href: /microsoft-365/solutions/apps-guide-overview?toc=%2Fmem%2Fintune%2Ftoc.json&bc=%2Fmem%2Fintune%2Fbreadcrumb%2Ftoc.json displayName: purchase, buy, app, license - name: Understand app types items: - - name: App types overview + - name: App types overview href: /microsoft-365/solutions/apps-type-overview?toc=%2Fmem%2Fintune%2Ftoc.json&bc=%2Fmem%2Fintune%2Fbreadcrumb%2Ftoc.json - - name: Understand store apps + - name: Understand store apps href: /microsoft-365/solutions/apps-type-store?toc=%2Fmem%2Fintune%2Ftoc.json&bc=%2Fmem%2Fintune%2Fbreadcrumb%2Ftoc.json - - name: Understand line-of-business apps + - name: Understand line-of-business apps href: /microsoft-365/solutions/apps-type-lob?toc=%2Fmem%2Fintune%2Ftoc.json&bc=%2Fmem%2Fintune%2Fbreadcrumb%2Ftoc.json - - name: Understand built-in apps - href: /microsoft-365/solutions/apps-type-built-in?toc=%2Fmem%2Fintune%2Ftoc.json&bc=%2Fmem%2Fintune%2Fbreadcrumb%2Ftoc.json + - name: Understand built-in apps + href: /microsoft-365/solutions/apps-type-built-in?toc=%2Fmem%2Fintune%2Ftoc.json&bc=%2Fmem%2Fintune%2Fbreadcrumb%2Ftoc.json - name: Understand web apps href: /microsoft-365/solutions/apps-type-web?toc=%2Fmem%2Fintune%2Ftoc.json&bc=%2Fmem%2Fintune%2Fbreadcrumb%2Ftoc.json - name: Understand Microsoft apps - href: /microsoft-365/solutions/apps-type-microsoft?toc=%2Fmem%2Fintune%2Ftoc.json&bc=%2Fmem%2Fintune%2Fbreadcrumb%2Ftoc.json + href: /microsoft-365/solutions/apps-type-microsoft?toc=%2Fmem%2Fintune%2Ftoc.json&bc=%2Fmem%2Fintune%2Fbreadcrumb%2Ftoc.json - name: Understand app purchases items: - name: Purchase apps overview @@ -286,10 +341,10 @@ items: - name: Step 4. Add apps to Intune href: /microsoft-365/solutions/apps-add-step-4?toc=%2Fmem%2Fintune%2Ftoc.json&bc=%2Fmem%2Fintune%2Fbreadcrumb%2Ftoc.json - name: Step 5. Manage apps and licenses - href: /microsoft-365/solutions/apps-add-step-5?toc=%2Fmem%2Fintune%2Ftoc.json&bc=%2Fmem%2Fintune%2Fbreadcrumb%2Ftoc.json + href: /microsoft-365/solutions/apps-add-step-5?toc=%2Fmem%2Fintune%2Ftoc.json&bc=%2Fmem%2Fintune%2Fbreadcrumb%2Ftoc.json - name: Configure apps using Microsoft Intune - items: + items: - name: Overview href: /microsoft-365/solutions/apps-config-overview?toc=%2Fmem%2Fintune%2Ftoc.json&bc=%2Fmem%2Fintune%2Fbreadcrumb%2Ftoc.json displayName: configure, app, apps, channel @@ -304,23 +359,23 @@ items: - name: Step 5. Configure Microsoft Teams href: /microsoft-365/solutions/apps-config-step-5?toc=%2Fmem%2Fintune%2Ftoc.json&bc=%2Fmem%2Fintune%2Fbreadcrumb%2Ftoc.json - name: Step 6. Configure other apps - href: /microsoft-365/solutions/apps-config-step-6?toc=%2Fmem%2Fintune%2Ftoc.json&bc=%2Fmem%2Fintune%2Fbreadcrumb%2Ftoc.json + href: /microsoft-365/solutions/apps-config-step-6?toc=%2Fmem%2Fintune%2Ftoc.json&bc=%2Fmem%2Fintune%2Fbreadcrumb%2Ftoc.json - name: Step 7. Verify app configuration - href: /microsoft-365/solutions/apps-config-step-7?toc=%2Fmem%2Fintune%2Ftoc.json&bc=%2Fmem%2Fintune%2Fbreadcrumb%2Ftoc.json + href: /microsoft-365/solutions/apps-config-step-7?toc=%2Fmem%2Fintune%2Ftoc.json&bc=%2Fmem%2Fintune%2Fbreadcrumb%2Ftoc.json - name: Secure and protect apps using Microsoft Intune - items: + items: - name: Overview href: /microsoft-365/solutions/apps-protect-overview?toc=%2Fmem%2Fintune%2Ftoc.json&bc=%2Fmem%2Fintune%2Fbreadcrumb%2Ftoc.json displayName: secure, protect, app, apps, conditional, launch, framework, basic, enhanced, high - name: Understand app data protection href: /microsoft-365/solutions/apps-protect-data-protection?toc=%2Fmem%2Fintune%2Ftoc.json&bc=%2Fmem%2Fintune%2Fbreadcrumb%2Ftoc.json - name: Understand app protection access requirements - href: /microsoft-365/solutions/apps-protect-access-requirements?toc=%2Fmem%2Fintune%2Ftoc.json&bc=%2Fmem%2Fintune%2Fbreadcrumb%2Ftoc.json + href: /microsoft-365/solutions/apps-protect-access-requirements?toc=%2Fmem%2Fintune%2Ftoc.json&bc=%2Fmem%2Fintune%2Fbreadcrumb%2Ftoc.json - name: Understand app protection conditional launch - href: /microsoft-365/solutions/apps-protect-conditional-launch?toc=%2Fmem%2Fintune%2Ftoc.json&bc=%2Fmem%2Fintune%2Fbreadcrumb%2Ftoc.json + href: /microsoft-365/solutions/apps-protect-conditional-launch?toc=%2Fmem%2Fintune%2Ftoc.json&bc=%2Fmem%2Fintune%2Fbreadcrumb%2Ftoc.json - name: Understand app protection health checks - href: /microsoft-365/solutions/apps-protect-health-checks?toc=%2Fmem%2Fintune%2Ftoc.json&bc=%2Fmem%2Fintune%2Fbreadcrumb%2Ftoc.json + href: /microsoft-365/solutions/apps-protect-health-checks?toc=%2Fmem%2Fintune%2Ftoc.json&bc=%2Fmem%2Fintune%2Fbreadcrumb%2Ftoc.json - name: Use the app protection framework items: - name: App protection framework overview @@ -334,12 +389,12 @@ items: - name: Step 4. Understand app protection delivery href: /microsoft-365/solutions/apps-protect-step-4?toc=%2Fmem%2Fintune%2Ftoc.json&bc=%2Fmem%2Fintune%2Fbreadcrumb%2Ftoc.json - name: Step 5. Verify and monitor app protection - href: /microsoft-365/solutions/apps-protect-step-5?toc=%2Fmem%2Fintune%2Ftoc.json&bc=%2Fmem%2Fintune%2Fbreadcrumb%2Ftoc.json + href: /microsoft-365/solutions/apps-protect-step-5?toc=%2Fmem%2Fintune%2Ftoc.json&bc=%2Fmem%2Fintune%2Fbreadcrumb%2Ftoc.json - name: Step 6. Use app protection actions href: /microsoft-365/solutions/apps-protect-step-6?toc=%2Fmem%2Fintune%2Ftoc.json&bc=%2Fmem%2Fintune%2Fbreadcrumb%2Ftoc.json - name: Assign and deploy apps using Microsoft Intune - items: + items: - name: Overview href: /microsoft-365/solutions/apps-assign-overview?toc=%2Fmem%2Fintune%2Ftoc.json&bc=%2Fmem%2Fintune%2Fbreadcrumb%2Ftoc.json displayName: assign, deploy, app, apps, monitor, troubleshoot @@ -350,9 +405,9 @@ items: - name: Understand app deployment href: /microsoft-365/solutions/apps-assign-deployment?toc=%2Fmem%2Fintune%2Ftoc.json&bc=%2Fmem%2Fintune%2Fbreadcrumb%2Ftoc.json - name: Assign apps to your organization - items: - - name: Assign apps overview - href: /microsoft-365/solutions/apps-assign-steps-overview?toc=%2Fmem%2Fintune%2Ftoc.json&bc=%2Fmem%2Fintune%2Fbreadcrumb%2Ftoc.json + items: + - name: Assign apps overview + href: /microsoft-365/solutions/apps-assign-steps-overview?toc=%2Fmem%2Fintune%2Ftoc.json&bc=%2Fmem%2Fintune%2Fbreadcrumb%2Ftoc.json - name: Step 1. Confirm users, devices, or groups href: /microsoft-365/solutions/apps-assign-step-1?toc=%2Fmem%2Fintune%2Ftoc.json&bc=%2Fmem%2Fintune%2Fbreadcrumb%2Ftoc.json - name: Step 2. Assign apps to users, devices, or groups @@ -363,10 +418,10 @@ items: href: /microsoft-365/solutions/apps-assign-step-4?toc=%2Fmem%2Fintune%2Ftoc.json&bc=%2Fmem%2Fintune%2Fbreadcrumb%2Ftoc.json - name: Secure your corporate data using Edge for Business - items: + items: - name: Overview href: ./apps/mamedge-overview.md - - name: Step 1. Create Microsoft Entra conditional access + - name: Step 1. Create Microsoft Entra Conditional Access href: ./apps/mamedge-1-mamca.md - name: Step 2. Create an app protection policy href: ./apps/mamedge-2-app.md @@ -390,14 +445,14 @@ items: href: ./apps/manage-without-gms.md - name: Data protection for Windows MAM href: ./apps/protect-mam-windows.md - displayName: Windows MAM + displayName: Windows MAM - name: MAM FAQ href: ./apps/mam-faq.yml - displayName: MAM - + displayName: MAM + - name: How-to guides items: - - name: Add apps + - name: Add apps items: - name: Add apps overview href: ./apps/apps-add.md @@ -442,7 +497,7 @@ items: - name: Enterprise App Management overview href: ./apps/apps-enterprise-app-management.md - name: Add an Enterprise App Catalog app (Win32) - href: ./apps/apps-add-enterprise-app.md + href: ./apps/apps-add-enterprise-app.md - name: macOS LOB apps href: ./apps/lob-apps-macos.md - name: macOS app management @@ -450,10 +505,10 @@ items: - name: Intune management agent for macOS href: ./apps/lob-apps-macos-agent.md - name: Add a macOS DMG app - href: ./apps/lob-apps-macos-dmg.md + href: ./apps/lob-apps-macos-dmg.md - name: Add an unmanaged macOS PKG app href: ./apps/macos-unmanaged-pkg.md - displayName: unmanaged, pkg + displayName: unmanaged, pkg - name: Win32 app management items: - name: Win32 app management overview @@ -477,11 +532,11 @@ items: - name: Company Portal app - Download href: ./apps/store-apps-company-portal-app.md - name: Company Portal app - macOS - href: ./apps/apps-company-portal-macos.md + href: ./apps/apps-company-portal-macos.md - name: Microsoft Edge for Windows 10 href: ./apps/apps-windows-edge.md - name: Microsoft Edge for macOS - href: ./apps/apps-edge-macos.md + href: ./apps/apps-edge-macos.md - name: Microsoft Defender for Endpoint for macOS href: ./apps/apps-advanced-threat-protection-macos.md - name: PowerShell scripts @@ -489,7 +544,7 @@ items: - name: macOS shell scripts href: ./apps/macos-shell-scripts.md - name: Get the app bundle ID - href: ./apps/get-app-bundle-id-intune-admin-center.md + href: ./apps/get-app-bundle-id-intune-admin-center.md - name: Assign apps items: - name: Assign apps to groups @@ -530,7 +585,7 @@ items: - name: Configure Microsoft Edge for iOS/Android href: ./apps/manage-microsoft-edge.md - name: Configure Microsoft Edge for Windows - href: ./apps/manage-microsoft-edge-windows.md + href: ./apps/manage-microsoft-edge-windows.md - name: Configure Office href: ./apps/manage-microsoft-office.md - name: Configure Outlook @@ -540,7 +595,7 @@ items: - name: Configure Google Chrome for Android href: ./apps/apps-configure-chrome-android.md - name: VPN and per-app VPN on Android Enterprise - href: ./apps/app-configuration-vpn-ae.md + href: ./apps/app-configuration-vpn-ae.md - name: Volume-purchased apps and books items: - name: Volume-purchased overview @@ -571,7 +626,7 @@ items: - name: iOS settings href: ./apps/app-protection-policy-settings-ios.md - name: Windows settings - href: ./apps/app-protection-policy-settings-windows.md + href: ./apps/app-protection-policy-settings-windows.md - name: Conditional launch href: ./apps/app-protection-policies-access-actions.md - name: Data transfer exceptions @@ -593,9 +648,9 @@ items: - name: Review app protection logs href: ./apps/app-protection-policy-settings-log.md - name: Policies for Office apps - href: ./apps/app-office-policies.md + href: ./apps/app-office-policies.md - name: Quiet time policies - href: ./apps/apps-quiet-time-policies.md + href: ./apps/apps-quiet-time-policies.md - name: Troubleshoot items: - name: Help users troubleshoot problems @@ -615,46 +670,46 @@ items: items: - name: Device protection overview href: ./protect/device-protect.md - displayName: compliant; noncompliant; mfa + displayName: compliant; noncompliant; mfa - - name: How-to guides + - name: How-to guides items: - name: Use compliance rules to protect resources items: - name: Compliance overview - href: ./protect/device-compliance-get-started.md + href: ./protect/device-compliance-get-started.md - name: Create a policy href: ./protect/create-compliance-policy.md - name: Custom compliance settings - href: ./protect/compliance-use-custom-settings.md - items: + href: ./protect/compliance-use-custom-settings.md + items: - name: JSON for custom settings - href: ./protect/compliance-custom-json.md + href: ./protect/compliance-custom-json.md - name: PowerShell script for custom settings - href: ./protect/compliance-custom-script.md - - name: Windows Subsystem for Linux - href: ./protect/compliance-wsl.md + href: ./protect/compliance-custom-script.md + - name: Windows Subsystem for Linux + href: ./protect/compliance-wsl.md - name: Actions for noncompliance href: ./protect/actions-for-noncompliance.md - name: Monitor device compliance href: ./protect/compliance-policy-monitor.md - name: Device compliance partners - href: ./protect/device-compliance-partners.md + href: ./protect/device-compliance-partners.md - name: Endpoint security href: ./protect/endpoint-security.md items: - name: Manage devices href: ./protect/endpoint-security-manage-devices.md - name: Security baselines - items: + items: - name: Security baselines overview href: ./protect/security-baselines.md - - name: Manage security baselines - href: ./protect/security-baselines-configure.md + - name: Manage security baselines + href: ./protect/security-baselines-configure.md - name: Monitor your baselines href: ./protect/security-baselines-monitor.md - name: Security tasks - href: ./protect/atp-manage-vulnerabilities.md + href: ./protect/atp-manage-vulnerabilities.md - name: Security policy items: - name: Manage security policies @@ -678,7 +733,7 @@ items: - name: Microsoft Defender for Endpoint items: - name: Microsoft Defender for Endpoint - href: ./protect/advanced-threat-protection.md + href: ./protect/advanced-threat-protection.md - name: Configure Defender for Endpoint href: ./protect/advanced-threat-protection-configure.md - name: Android web protection @@ -736,11 +791,11 @@ items: - name: Microsoft Tunnel for MAM items: - name: Microsoft Tunnel for MAM Overview - href: ./protect/microsoft-tunnel-mam.md + href: ./protect/microsoft-tunnel-mam.md - name: MAM Tunnel for Android - href: ./protect/microsoft-tunnel-mam-android.md + href: ./protect/microsoft-tunnel-mam-android.md - name: MAM Tunnel for iOS - href: ./protect/microsoft-tunnel-mam-ios.md + href: ./protect/microsoft-tunnel-mam-ios.md - name: Monitor Microsoft Tunnel href: ./protect/microsoft-tunnel-monitor.md - name: Upgrade Microsoft Tunnel @@ -803,14 +858,14 @@ items: - name: Enable MTD for enrolled devices href: ./protect/mtd-connector-enable.md - name: MTD apps - items: + items: - name: Set up Better Mobile href: ./protect/better-mobile-threat-defense-connector.md items: - name: Better Mobile and Intune integration href: ./protect/better-mobile-mtd-connector-integration.md displayName: sso - - name: Set up BlackBerry Protect Mobile + - name: Set up BlackBerry Protect Mobile href: ./protect/blackberry-mobile-threat-defense-connector.md items: - name: BlackBerry and Intune integration @@ -839,7 +894,7 @@ items: href: ./protect/trellix-mobile-threat-defense-connector.md items: - name: Trellix Mobile Security and Intune integration - href: ./protect/trellix-mtd-connector-integration.md + href: ./protect/trellix-mtd-connector-integration.md - name: Set up Pradeo href: ./protect/pradeo-mobile-threat-defense-connector.md items: @@ -864,38 +919,38 @@ items: href: ./protect/trend-micro-mobile-threat-defense-connector.md items: - name: Trend Micro Mobile Security as a Service and Intune integration - href: ./protect/trend-micro-mtd-connector-integration.md + href: ./protect/trend-micro-mtd-connector-integration.md - name: Set up Zimperium href: ./protect/zimperium-mobile-threat-defense-connector.md items: - name: Zimperium and Intune integration - href: ./protect/zimperium-mtd-connector-integration.md + href: ./protect/zimperium-mtd-connector-integration.md - name: Network access control href: ./protect/network-access-control-integrate.md - - name: Microsoft Cloud PKI + - name: Microsoft Cloud PKI items: - - name: Microsoft Cloud PKI overview + - name: Microsoft Cloud PKI overview href: ./protect/microsoft-cloud-pki-overview.md - displayName: RBAC, requirements - - name: PKI fundamentals - href: ./protect/microsoft-cloud-pki-fundamentals.md - - name: Configure and deploy - items: - - name: Deployment overview - href: ./protect/microsoft-cloud-pki-deployment.md - - name: Configure root and issuing CA for Cloud PKI - href: ./protect/microsoft-cloud-pki-configure-ca.md + displayName: RBAC, requirements + - name: PKI fundamentals + href: ./protect/microsoft-cloud-pki-fundamentals.md + - name: Configure and deploy + items: + - name: Deployment overview + href: ./protect/microsoft-cloud-pki-deployment.md + - name: Configure root and issuing CA for Cloud PKI + href: ./protect/microsoft-cloud-pki-configure-ca.md displayName: root, certification, authority, ca, issuing, BYO - - name: Configure bring your own CA for Cloud PKI - href: ./protect/microsoft-cloud-pki-configure-byoca.md - - name: Monitor issued certificates - href: ./protect/microsoft-cloud-pki-monitor.md - - name: Get audit logs - href: ./protect/microsoft-cloud-pki-audit-logs.md - - name: Pause, revoke, and delete CA - href: ./protect/microsoft-cloud-pki-delete.md - - name: Certificates - items: + - name: Configure bring your own CA for Cloud PKI + href: ./protect/microsoft-cloud-pki-configure-byoca.md + - name: Monitor issued certificates + href: ./protect/microsoft-cloud-pki-monitor.md + - name: Get audit logs + href: ./protect/microsoft-cloud-pki-audit-logs.md + - name: Pause, revoke, and delete CA + href: ./protect/microsoft-cloud-pki-delete.md + - name: Certificates + items: - name: Use certificates for authentication href: ./protect/certificates-configure.md - name: Trusted certificate profiles @@ -908,11 +963,11 @@ items: href: ./protect/certificate-connector-prerequisites.md - name: Install the connector href: ./protect/certificate-connector-install.md - - name: SCEP + - name: SCEP items: - name: SCEP infrastructure href: ./protect/certificates-scep-configure.md - displayName: ksp + displayName: ksp - name: SCEP certificate profiles href: ./protect/certificates-profile-scep.md - name: Use third-party certificate authority with SCEP @@ -931,7 +986,7 @@ items: href: ./protect/certificates-digicert-configure.md displayName: ca; pkcs; pki; ra; registration authority - name: Remove SCEP or PKCS certificates - href: ./protect/remove-certificates.md + href: ./protect/remove-certificates.md - name: Derived credentials href: ./protect/derived-credentials.md - name: Software updates @@ -941,16 +996,16 @@ items: - name: Android FOTA update href: ./protect/fota-updates-android.md - name: Zebra LG OTA Integration - href: ./protect/zebra-lifeguard-ota-integration.md + href: ./protect/zebra-lifeguard-ota-integration.md - name: iOS/iPadOS & macOS updates items: - name: Managed software updates (DDM) displayName: ddm - href: ./protect/managed-software-updates-ios-macos.md + href: ./protect/managed-software-updates-ios-macos.md - name: iOS/iPadOS update policies href: ./protect/software-updates-ios.md - name: macOS update policies - href: ./protect/software-updates-macos.md + href: ./protect/software-updates-macos.md - name: Windows updates items: - name: Use Windows Update for Business @@ -962,7 +1017,7 @@ items: - name: Expedite updates policy href: ./protect/windows-10-expedite-updates.md - name: Windows driver updates - items: + items: - name: Driver updates overview href: ./protect/windows-driver-updates-overview.md - name: Driver updates policy @@ -972,7 +1027,7 @@ items: - name: Windows Update compatibility reports href: ./protect/windows-update-compatibility-reports.md - name: Windows Update reports - href: ./protect/windows-update-reports.md + href: ./protect/windows-update-reports.md - name: Troubleshoot items: - name: Troubleshoot policies and profiles @@ -1001,7 +1056,7 @@ items: items: - name: Troubleshoot Exchange connectors href: /troubleshoot/mem/intune/troubleshoot-exchange-connector - - name: Common errors + - name: Common errors href: /troubleshoot/mem/intune/troubleshoot-exchange-connector-common-errors - name: Troubleshoot BitLocker policies href: /troubleshoot/mem/intune/troubleshoot-bitlocker-policies @@ -1014,8 +1069,8 @@ items: - name: Compliance policy settings items: - name: Compliance settings - Android device administrator - href: ./protect/compliance-policy-create-android.md - - name: Compliance settings - Android (AOSP) + href: ./protect/compliance-policy-create-android.md + - name: Compliance settings - Android (AOSP) href: ./protect/compliance-policy-create-android-aosp.md - name: Compliance settings - Android Enterprise href: ./protect/compliance-policy-create-android-for-work.md @@ -1048,21 +1103,21 @@ items: displayName: AWA; Add Work Account - name: Firewall policy settings href: ./protect/endpoint-security-firewall-profile-settings.md - - name: Tenant attach Firewall settings + - name: Tenant attach Firewall settings href: ./protect/endpoint-security-firewall-profile-settings-tenant-attach.md - name: Endpoint detection and response profile settings - href: ./protect/endpoint-security-edr-profile-settings.md + href: ./protect/endpoint-security-edr-profile-settings.md - name: Attack surface reduction profile settings href: ./protect/endpoint-security-asr-profile-settings.md - name: Account protection profile settings href: ./protect/endpoint-security-account-protection-profile-settings.md - name: Security baseline settings - items: + items: - name: Windows 10 MDM baseline settings href: ./protect/security-baseline-settings-mdm-all.md - - name: Microsoft Defender for Endpoint baseline settings + - name: Microsoft Defender for Endpoint baseline settings href: ./protect/security-baseline-settings-defender.md - - name: Microsoft 365 Apps for Enterprise baseline settings (Office) + - name: Microsoft 365 Apps for Enterprise baseline settings (Office) href: ./protect/security-baseline-v2-office-settings.md - name: Microsoft Edge baseline settings (version 112 and higher) href: ./protect/security-baseline-v2-edge-settings.md @@ -1079,8 +1134,8 @@ items: - name: Software update errors href: ./protect/software-update-agent-error-codes.md - name: Deprecated certificate connectors - href: ./protect/certificate-connectors.md - - name: Scenario implementation guides + href: ./protect/certificate-connectors.md + - name: Scenario implementation guides items: - name: Protect Exchange Online href: ./protect/exchange-online-protect.md @@ -1114,6 +1169,9 @@ items: - name: Universal Print policy displayName: printers, gpo, admx, windows href: ./configuration/settings-catalog-printer-provisioning.md + - name: Properties catalog + displayName: windows + href: ./configuration/properties-catalog.md - name: Custom settings & scripts items: - name: Create custom profiles @@ -1259,7 +1317,7 @@ items: displayName: trusted sites, ipv4, ipv6, range - name: Windows health monitoring href: ./configuration/windows-health-monitoring.md - displayName: endpoint analytics, microsoft productivity score + displayName: endpoint analytics, microsoft productivity score - name: Education Take a Test app displayName: windows href: ./configuration/education-settings-configure.md @@ -1271,10 +1329,16 @@ items: - name: eSIM bulk activation with activation codes (import CSV) href: ./configuration/esim-device-configuration.md - - name: Configuration profile settings lists + - name: Settings catalog lists + items: + - name: Apple + displayName: ios, ipados, macos + href: ./configuration/apple-settings-catalog-configurations.md + + - name: Device Configuration template settings lists items: - name: Android device administrator - items: + items: - name: Custom (OMA-URI) items: - name: Custom settings @@ -1295,11 +1359,11 @@ items: - name: Wi-Fi displayName: wifi, wireless, android, device administrator, da href: ./configuration/wi-fi-settings-android.md - - name: Android (AOSP) - items: + - name: Android (AOSP) + items: - name: Device restrictions displayName: android, aosp - href: ./configuration/device-restrictions-android-aosp.md + href: ./configuration/device-restrictions-android-aosp.md - name: Wi-Fi displayName: wifi, wireless, android, aosp href: ./configuration/wi-fi-settings-android-aosp.md @@ -1435,7 +1499,7 @@ items: href: ./configuration/kiosk-settings-holographic.md - name: Shared multi-user device displayName: windows holographic, hololens - href: ./configuration/shared-user-device-settings-windows-holographic.md + href: ./configuration/shared-user-device-settings-windows-holographic.md - name: Windows 8.1 items: - name: Device restrictions @@ -1446,7 +1510,7 @@ items: href: ./configuration/vpn-settings-windows-8-1.md - name: Assign and deploy policies - items: + items: - name: Assign policies to users & groups displayName: deploy, push, android, ios, ipados, macos, windows href: ./configuration/device-profile-assign.md @@ -1490,119 +1554,119 @@ items: displayName: android, ios, ipados, macos, windows href: /troubleshoot/mem/intune/troubleshoot-policies-in-microsoft-intune - - name: Enroll devices in Microsoft Intune + - name: Enroll devices in Microsoft Intune items: - - name: Device enrollment overview - href: ./fundamentals/deployment-guide-enrollment.md + - name: Device enrollment overview + href: ./fundamentals/deployment-guide-enrollment.md displayName: COD; BYOD; DEM; ADE; USB-SA; USB-Direct; co-management; GPO - - name: Configure enrollment features + - name: Configure enrollment features items: - - name: Get Apple MDM push certificate + - name: Get Apple MDM push certificate href: ./enrollment/apple-mdm-push-certificate-get.md - displayName: digital; certificates; notifications; token; PEM; automated device enrollment; user enrollment; device enrollment - - name: Configure Chrome Enterprise connector - href: ./enrollment/chrome-enterprise-connector-configure.md - displayName: chrome os; connector; device management; google admin + displayName: digital; certificates; notifications; token; PEM; automated device enrollment; user enrollment; device enrollment + - name: Configure Chrome Enterprise connector + href: ./enrollment/chrome-enterprise-connector-configure.md + displayName: chrome os; connector; device management; google admin - name: Add corporate identifiers href: ./enrollment/corporate-identifiers-add.md - displayName: COD; corporate owned; IMEI; device ownership; serial - - name: Add device enrollment manager - href: ./enrollment/device-enrollment-manager-enroll.md + displayName: COD; corporate owned; IMEI; device ownership; serial + - name: Add device enrollment manager + href: ./enrollment/device-enrollment-manager-enroll.md displayName: DEM; bulk enrollment; company portal; Azure AD; join; limitations - - name: Add device categories + - name: Add device categories href: ./enrollment/device-group-mapping.md - displayName: group; category; categorize; security group; - - name: Require multifactor authentication - href: ./enrollment/multi-factor-authentication.md - displayName: multi-factor; enrollment; MFA; verification; conditional access - - name: Create terms and conditions policy + displayName: group; category; categorize; security group; + - name: Require multifactor authentication + href: ./enrollment/multi-factor-authentication.md + displayName: multi-factor; enrollment; MFA; verification; Conditional Access + - name: Create terms and conditions policy href: ./enrollment/terms-and-conditions-create.md - displayName: intune; enrollment; terms and conditions; policy - - name: Set up enrollment notifications + displayName: intune; enrollment; terms and conditions; policy + - name: Set up enrollment notifications href: ./enrollment/enrollment-notifications.md - - name: Set up enrollment time grouping + - name: Set up enrollment time grouping href: ./enrollment/enrollment-time-grouping.md - displayName: enrollment time grouping; security groups; Entra + displayName: enrollment time grouping; security groups; Entra - name: Configure device enrollment restrictions - items: - - name: Overview - href: ./enrollment/enrollment-restrictions-set.md - - name: Intune device limits vs. Microsoft Entra device limits - href: ./enrollment/device-limit-intune-azure.md - - name: Create device platform restrictions - href: ./enrollment/create-device-platform-restrictions.md - - name: Create device limit restrictions - href: ./enrollment/create-device-limit-restrictions.md - + items: + - name: Overview + href: ./enrollment/enrollment-restrictions-set.md + - name: Intune device limits vs. Microsoft Entra device limits + href: ./enrollment/device-limit-intune-azure.md + - name: Create device platform restrictions + href: ./enrollment/create-device-platform-restrictions.md + - name: Create device limit restrictions + href: ./enrollment/create-device-limit-restrictions.md + - name: Set up Windows enrollment - items: - - name: Get started with Windows enrollment + items: + - name: Get started with Windows enrollment href: ./fundamentals/deployment-guide-enrollment-windows.md - - name: Enrollment solutions - items: - - name: Set up automatic enrollment + - name: Enrollment solutions + items: + - name: Set up automatic enrollment href: ./enrollment/windows-enroll.md - - name: Set up bulk enrollment and workplace join - href: ./enrollment/windows-bulk-enroll.md - - name: Enrollment configurations + - name: Set up bulk enrollment and workplace join + href: ./enrollment/windows-bulk-enroll.md + - name: Enrollment configurations items: - - name: Create and validate CNAME records + - name: Create and validate CNAME records href: ./enrollment/windows-enrollment-create-cname.md - - name: Set up Intune Connector for Active Directory - href: ./enrollment/autopilot-hybrid-connector-proxy.md + - name: Set up Intune Connector for Active Directory + href: /autopilot/windows-autopilot-hybrid - name: Set up Enrollment Status Page href: ./enrollment/windows-enrollment-status.md - name: Set up Windows Enrollment Attestation - href: ./enrollment/windows-enrollment-attestation.md - + href: ./enrollment/windows-enrollment-attestation.md + - name: Set up Android enrollment items: - - name: Get started with Android enrollment + - name: Get started with Android enrollment href: ./fundamentals/deployment-guide-enrollment-android.md displayName: COBO - - name: Android Enterprise enrollment solutions + - name: Android Enterprise enrollment solutions items: - - name: Prerequisite - Connect Intune to Android Enterprise + - name: Prerequisite - Connect Intune to Android Enterprise href: ./enrollment/connect-intune-android-enterprise.md - - name: Device staging overview + - name: Device staging overview href: ./enrollment/device-staging-overview.md - displayName: COBO; staged enrollment + displayName: COBO; staged enrollment - name: Set up work profile management - items: - - name: Overview + items: + - name: Overview href: ./enrollment/android-enterprise-overview.md - - name: Work profile for personal devices + - name: Work profile for personal devices href: ./enrollment/android-work-profile-enroll.md - - name: Work profile for corporate-owned devices - href: ./enrollment/android-corporate-owned-work-profile-enroll.md + - name: Work profile for corporate-owned devices + href: ./enrollment/android-corporate-owned-work-profile-enroll.md - name: Set up enrollment for dedicated devices href: ./enrollment/android-kiosk-enroll.md - - name: Set up enrollment for fully managed devices + - name: Set up enrollment for fully managed devices href: ./enrollment/android-fully-managed-enroll.md - - name: Enroll corporate-owned devices - href: ./enrollment/android-dedicated-devices-fully-managed-enroll.md - - name: AOSP enrollment solutions - items: + - name: Enroll corporate-owned devices + href: ./enrollment/android-dedicated-devices-fully-managed-enroll.md + - name: AOSP enrollment solutions + items: - name: Enroll corporate-owned, userless devices - href: ./enrollment/android-aosp-corporate-owned-userless-enroll.md + href: ./enrollment/android-aosp-corporate-owned-userless-enroll.md - name: Enroll corporate-owned, user-associated devices - href: ./enrollment/android-aosp-corporate-owned-user-associated-enroll.md - - name: Android device administrator solutions - items: - - name: Set up enrollment for Android device administrator + href: ./enrollment/android-aosp-corporate-owned-user-associated-enroll.md + - name: Android device administrator solutions + items: + - name: Set up enrollment for Android device administrator href: ./enrollment/android-enroll-device-administrator.md - - name: Move to Android Enterprise work profile management - href: ./enrollment/android-move-device-admin-work-profile.md - - name: Move to mobile application management without enrollment - href: ./enrollment/move-to-android-mobile-application-management.md - - name: Samsung Knox enrollment solutions - items: - - name: Use Samsung Knox Mobile Enrollment - href: ./enrollment/android-samsung-knox-mobile-enroll.md + - name: Move to Android Enterprise work profile management + href: ./enrollment/android-move-device-admin-work-profile.md + - name: Move to mobile application management without enrollment + href: ./enrollment/move-to-android-mobile-application-management.md + - name: Samsung Knox enrollment solutions + items: + - name: Use Samsung Knox Mobile Enrollment + href: ./enrollment/android-samsung-knox-mobile-enroll.md - name: Set up iOS/iPadOS enrollment items: - - name: Get started with iOS/iPadOS enrollment + - name: Get started with iOS/iPadOS enrollment href: ./fundamentals/deployment-guide-enrollment-ios-ipados.md - name: Enrollment solutions items: @@ -1610,65 +1674,74 @@ items: href: ./enrollment/apple-configurator-enroll-ios.md - name: Set up Apple Automated Device Enrollment items: - - name: Set up Automated Device Enrollment + - name: Set up Automated Device Enrollment href: ./enrollment/device-enrollment-program-enroll-ios.md - - name: Choose enrollment authentication method + - name: Choose enrollment authentication method href: ./enrollment/automated-device-enrollment-authentication.md - - name: Set up enrollment for shared device mode + - name: Set up enrollment for shared device mode href: ./enrollment/automated-device-enrollment-shared-device-mode.md - displayName: devices, frontline worker, automated device enrollment + displayName: devices, frontline worker, automated device enrollment - name: Walkthrough - Set up enrollment with Apple School Manager - href: ./enrollment/apple-school-manager-set-up-ios.md + items: + - name: Prerequisites + href: ./enrollment/apple-school-manager-set-up-ios.md + - name: Step 1 - Get an Apple token and assign devices + href: ./enrollment/apple-school-manager-step-1.md + - name: Step 2 - Create an Apple enrollment profile + href: ./enrollment/apple-school-manager-step-2.md + - name: Step 3 - Sync managed devices + href: ./enrollment/apple-school-manager-step-3.md + - name: Set up Apple device enrollment - items: - - name: Overview - href: ./enrollment/ios-device-enrollment.md - - name: Set up web based device enrollment - href: ./enrollment/web-based-device-enrollment-ios.md + items: + - name: Overview + href: ./enrollment/ios-device-enrollment.md + - name: Set up web based device enrollment + href: ./enrollment/web-based-device-enrollment-ios.md - name: Set up Apple user enrollment items: - - name: Overview - href: ./enrollment/ios-user-enrollment-supported-actions.md - - name: Set up account driven user enrollment - href: ./enrollment/apple-account-driven-user-enrollment.md - - name: Set up user enrollment with Company Portal - href: ./enrollment/apple-user-enrollment-with-company-portal.md - - name: Set up Shared iPad + - name: Overview + href: ./enrollment/ios-user-enrollment-supported-actions.md + - name: Set up account driven user enrollment + href: ./enrollment/apple-account-driven-user-enrollment.md + - name: Set up user enrollment with Company Portal + href: ./enrollment/apple-user-enrollment-with-company-portal.md + - name: Set up Shared iPad items: - name: Overview of shared device solutions href: ./enrollment/device-enrollment-shared-ios.md - name: Set up Shared iPad - href: ./enrollment/device-enrollment-shared-ipad.md - - name: Enrollment configurations - items: - - name: Back up and restore for Automated Device Enrollment - href: ./enrollment/backup-restore-ios.md - - - - name: Set up Linux enrollment + href: ./enrollment/device-enrollment-shared-ipad.md + - name: Enrollment configurations + items: + - name: Back up and restore for Automated Device Enrollment + href: ./enrollment/backup-restore-ios.md + + + - name: Set up Linux enrollment items: - - name: Get started with Linux enrollment + - name: Get started with Linux enrollment href: ./fundamentals/deployment-guide-enrollment-linux.md - - name: Intune user help documentation - href: ./user-help/enroll-device-linux.md + - name: Intune user help documentation + href: ./user-help/enroll-device-linux.md - name: Set up macOS enrollment items: - - name: Get started with Mac enrollment + - name: Get started with Mac enrollment href: ./fundamentals/deployment-guide-enrollment-macos.md - - name: Enrollment solutions - items: + - name: Enrollment solutions + items: - name: Set up automated device enrollment for macOS href: ./enrollment/device-enrollment-program-enroll-macos.md - - name: Set up Direct Enrollment for macOS - href: ./enrollment/device-enrollment-direct-enroll-macos.md - - name: Enrollment configurations - items: - - name: Configure enrollment settings - href: ./enrollment/macos-enroll.md + - name: Set up Direct Enrollment for macOS + href: ./enrollment/device-enrollment-direct-enroll-macos.md + - name: Enrollment configurations + items: + - name: Configure enrollment settings + href: ./enrollment/macos-enroll.md - name: Troubleshoot enrollment items: - name: Get incomplete user enrollment report - href: ./enrollment/enrollment-report-company-portal-abandon.md + href: ./enrollment/enrollment-report-company-portal-abandon.md - name: Troubleshoot device enrollment href: /troubleshoot/mem/intune/troubleshoot-device-enrollment-in-intune - name: Troubleshoot iOS/iPadOS device enrollment @@ -1678,7 +1751,7 @@ items: - name: Troubleshoot Windows auto-enrollment href: /troubleshoot/mem/intune/troubleshoot-windows-auto-enrollment - name: Troubleshoot Android device enrollment - href: /troubleshoot/mem/intune/troubleshoot-android-enrollment + href: /troubleshoot/mem/intune/troubleshoot-android-enrollment - name: Use Intune Suite add-ons href: ./fundamentals/intune-add-ons.md @@ -1749,9 +1822,9 @@ items: - name: Collect diagnostics href: ./remote-actions/collect-diagnostics.md - name: Remove apps and configuration - href: ./remote-actions/remove-apps-config.md + href: ./remote-actions/remove-apps-config.md - name: Pause config refresh - href: ./remote-actions/pause-config-refresh.md + href: ./remote-actions/pause-config-refresh.md - name: Bulk device actions href: ./remote-actions/bulk-device-actions.md - name: Troubleshooting @@ -1768,22 +1841,20 @@ items: - name: Export reports using Graph href: ./fundamentals/reports-export-graph-apis.md - name: Intune reports and properties using Graph - href: ./fundamentals/reports-export-graph-available-reports.md + href: ./fundamentals/reports-export-graph-available-reports.md - name: Use the Intune Data Warehouse - href: ./developer/reports-nav-create-intune-reports.md - - name: Monitor + href: ./developer/reports-nav-create-intune-reports.md + - name: Monitor items: - name: Audit logs for Intune activities href: ./fundamentals/monitor-audit-logs.md - name: Review logs with Azure Monitor href: ./fundamentals/review-logs-using-azure-monitor.md - name: Device configuration profile status - href: ./configuration/device-profile-monitor.md - - name: Endpoint analytics - href: ../analytics/ + href: ./configuration/device-profile-monitor.md - name: Industry guides - items: + items: - name: Education items: - name: What is Intune for Education @@ -1812,9 +1883,9 @@ items: - name: Configure policies href: ./industry/education/tutorial-school-deployment/configure-device-settings.md - name: Configure applications - href: ./industry/education/tutorial-school-deployment/configure-device-apps.md + href: ./industry/education/tutorial-school-deployment/configure-device-apps.md - name: 4. Deploy devices - items: + items: - name: Overview href: ./industry/education/tutorial-school-deployment/enroll-overview.md - name: Windows @@ -1834,11 +1905,11 @@ items: - name: Bulk enrollment with Apple Configurator href: ./industry/education/tutorial-school-deployment/enroll-ios-apple-configurator.md - name: 5. Manage devices - items: + items: - name: Overview href: ./industry/education/tutorial-school-deployment/manage-overview.md - name: Management functionalities for Surface devices - href: ./industry/education/tutorial-school-deployment/manage-surface-devices.md + href: ./industry/education/tutorial-school-deployment/manage-surface-devices.md - name: Reset and wipe devices href: ./industry/education/tutorial-school-deployment/reset-wipe.md - name: Avoid policy conflicts @@ -1846,7 +1917,7 @@ items: - name: 6. Troubleshoot and get help href: ./industry/education/tutorial-school-deployment/troubleshoot-overview.md - name: 7. Common Education configuration - items: + items: - name: Overview href: ./industry/education/tutorial-school-deployment/common-config-overview.md - name: Intune policies for Windows in Education @@ -1891,9 +1962,9 @@ items: - name: Windows platform guide href: ./fundamentals/deployment-guide-platform-windows.md - name: Android, Android Enterprise platform guide - href: ./fundamentals/deployment-guide-platform-android.md + href: ./fundamentals/deployment-guide-platform-android.md - name: iOS/iPadOS platform guide - href: ./fundamentals/deployment-guide-platform-ios-ipados.md + href: ./fundamentals/deployment-guide-platform-ios-ipados.md - name: macOS platform guide href: ./fundamentals/deployment-guide-platform-macos.md - name: Linux platform guide @@ -1906,7 +1977,7 @@ items: href: ./fundamentals/surface-management-portal.md - name: Scenario-based guidance - items: + items: - name: Manage operating system versions href: ./fundamentals/manage-os-versions.md - name: Frontline worker (FLW) device management @@ -1924,13 +1995,13 @@ items: displayName: kiosk, multi-app, single-app href: ../solutions/frontline-worker/frontline-worker-overview-windows.md - name: Guided scenarios - items: + items: - name: Guided scenarios overview - href: ./fundamentals/guided-scenarios-overview.md - - name: Deploy Microsoft Edge for Mobile - href: ./fundamentals/guided-scenarios-edge.md + href: ./fundamentals/guided-scenarios-overview.md + - name: Deploy Microsoft Edge for Mobile + href: ./fundamentals/guided-scenarios-edge.md - name: Cloud-managed Modern Desktop - href: ./fundamentals/guided-scenarios-cloud-managed-pc.md + href: ./fundamentals/guided-scenarios-cloud-managed-pc.md - name: Secure Microsoft Office mobile apps href: ./fundamentals/guided-scenarios-office-mobile.md - name: Windows 10/11 in cloud configuration @@ -1974,24 +2045,24 @@ items: - name: App solutions items: - name: Purchase and add apps for Microsoft Intune - items: + items: - name: Overview href: /microsoft-365/solutions/apps-guide-overview?toc=%2Fmem%2Fintune%2Ftoc.json&bc=%2Fmem%2Fintune%2Fbreadcrumb%2Ftoc.json displayName: purchase, buy, app, license - name: Understand app types items: - - name: App types overview + - name: App types overview href: /microsoft-365/solutions/apps-type-overview?toc=%2Fmem%2Fintune%2Ftoc.json&bc=%2Fmem%2Fintune%2Fbreadcrumb%2Ftoc.json - - name: Understand store apps + - name: Understand store apps href: /microsoft-365/solutions/apps-type-store?toc=%2Fmem%2Fintune%2Ftoc.json&bc=%2Fmem%2Fintune%2Fbreadcrumb%2Ftoc.json - - name: Understand line-of-business apps + - name: Understand line-of-business apps href: /microsoft-365/solutions/apps-type-lob?toc=%2Fmem%2Fintune%2Ftoc.json&bc=%2Fmem%2Fintune%2Fbreadcrumb%2Ftoc.json - - name: Understand built-in apps - href: /microsoft-365/solutions/apps-type-built-in?toc=%2Fmem%2Fintune%2Ftoc.json&bc=%2Fmem%2Fintune%2Fbreadcrumb%2Ftoc.json + - name: Understand built-in apps + href: /microsoft-365/solutions/apps-type-built-in?toc=%2Fmem%2Fintune%2Ftoc.json&bc=%2Fmem%2Fintune%2Fbreadcrumb%2Ftoc.json - name: Understand web apps href: /microsoft-365/solutions/apps-type-web?toc=%2Fmem%2Fintune%2Ftoc.json&bc=%2Fmem%2Fintune%2Fbreadcrumb%2Ftoc.json - name: Understand Microsoft apps - href: /microsoft-365/solutions/apps-type-microsoft?toc=%2Fmem%2Fintune%2Ftoc.json&bc=%2Fmem%2Fintune%2Fbreadcrumb%2Ftoc.json + href: /microsoft-365/solutions/apps-type-microsoft?toc=%2Fmem%2Fintune%2Ftoc.json&bc=%2Fmem%2Fintune%2Fbreadcrumb%2Ftoc.json - name: Understand app purchases items: - name: Purchase apps overview @@ -2019,10 +2090,10 @@ items: - name: Step 4. Add apps to Intune href: /microsoft-365/solutions/apps-add-step-4?toc=%2Fmem%2Fintune%2Ftoc.json&bc=%2Fmem%2Fintune%2Fbreadcrumb%2Ftoc.json - name: Step 5. Manage apps and licenses - href: /microsoft-365/solutions/apps-add-step-5?toc=%2Fmem%2Fintune%2Ftoc.json&bc=%2Fmem%2Fintune%2Fbreadcrumb%2Ftoc.json + href: /microsoft-365/solutions/apps-add-step-5?toc=%2Fmem%2Fintune%2Ftoc.json&bc=%2Fmem%2Fintune%2Fbreadcrumb%2Ftoc.json - name: Configure apps using Microsoft Intune - items: + items: - name: Overview href: /microsoft-365/solutions/apps-config-overview?toc=%2Fmem%2Fintune%2Ftoc.json&bc=%2Fmem%2Fintune%2Fbreadcrumb%2Ftoc.json displayName: configure, app, apps, channel @@ -2037,23 +2108,23 @@ items: - name: Step 5. Configure Microsoft Teams href: /microsoft-365/solutions/apps-config-step-5?toc=%2Fmem%2Fintune%2Ftoc.json&bc=%2Fmem%2Fintune%2Fbreadcrumb%2Ftoc.json - name: Step 6. Configure other apps - href: /microsoft-365/solutions/apps-config-step-6?toc=%2Fmem%2Fintune%2Ftoc.json&bc=%2Fmem%2Fintune%2Fbreadcrumb%2Ftoc.json + href: /microsoft-365/solutions/apps-config-step-6?toc=%2Fmem%2Fintune%2Ftoc.json&bc=%2Fmem%2Fintune%2Fbreadcrumb%2Ftoc.json - name: Step 7. Verify app configuration - href: /microsoft-365/solutions/apps-config-step-7?toc=%2Fmem%2Fintune%2Ftoc.json&bc=%2Fmem%2Fintune%2Fbreadcrumb%2Ftoc.json + href: /microsoft-365/solutions/apps-config-step-7?toc=%2Fmem%2Fintune%2Ftoc.json&bc=%2Fmem%2Fintune%2Fbreadcrumb%2Ftoc.json - name: Secure and protect apps using Microsoft Intune - items: + items: - name: Overview href: /microsoft-365/solutions/apps-protect-overview?toc=%2Fmem%2Fintune%2Ftoc.json&bc=%2Fmem%2Fintune%2Fbreadcrumb%2Ftoc.json displayName: secure, protect, app, apps, conditional, launch, framework, basic, enhanced, high - name: Understand app data protection href: /microsoft-365/solutions/apps-protect-data-protection?toc=%2Fmem%2Fintune%2Ftoc.json&bc=%2Fmem%2Fintune%2Fbreadcrumb%2Ftoc.json - name: Understand app protection access requirements - href: /microsoft-365/solutions/apps-protect-access-requirements?toc=%2Fmem%2Fintune%2Ftoc.json&bc=%2Fmem%2Fintune%2Fbreadcrumb%2Ftoc.json + href: /microsoft-365/solutions/apps-protect-access-requirements?toc=%2Fmem%2Fintune%2Ftoc.json&bc=%2Fmem%2Fintune%2Fbreadcrumb%2Ftoc.json - name: Understand app protection conditional launch - href: /microsoft-365/solutions/apps-protect-conditional-launch?toc=%2Fmem%2Fintune%2Ftoc.json&bc=%2Fmem%2Fintune%2Fbreadcrumb%2Ftoc.json + href: /microsoft-365/solutions/apps-protect-conditional-launch?toc=%2Fmem%2Fintune%2Ftoc.json&bc=%2Fmem%2Fintune%2Fbreadcrumb%2Ftoc.json - name: Understand app protection health checks - href: /microsoft-365/solutions/apps-protect-health-checks?toc=%2Fmem%2Fintune%2Ftoc.json&bc=%2Fmem%2Fintune%2Fbreadcrumb%2Ftoc.json + href: /microsoft-365/solutions/apps-protect-health-checks?toc=%2Fmem%2Fintune%2Ftoc.json&bc=%2Fmem%2Fintune%2Fbreadcrumb%2Ftoc.json - name: Use the app protection framework items: - name: App protection framework overview @@ -2067,12 +2138,12 @@ items: - name: Step 4. Understand app protection delivery href: /microsoft-365/solutions/apps-protect-step-4?toc=%2Fmem%2Fintune%2Ftoc.json&bc=%2Fmem%2Fintune%2Fbreadcrumb%2Ftoc.json - name: Step 5. Verify and monitor app protection - href: /microsoft-365/solutions/apps-protect-step-5?toc=%2Fmem%2Fintune%2Ftoc.json&bc=%2Fmem%2Fintune%2Fbreadcrumb%2Ftoc.json + href: /microsoft-365/solutions/apps-protect-step-5?toc=%2Fmem%2Fintune%2Ftoc.json&bc=%2Fmem%2Fintune%2Fbreadcrumb%2Ftoc.json - name: Step 6. Use app protection actions href: /microsoft-365/solutions/apps-protect-step-6?toc=%2Fmem%2Fintune%2Ftoc.json&bc=%2Fmem%2Fintune%2Fbreadcrumb%2Ftoc.json - name: Assign and deploy apps using Microsoft Intune - items: + items: - name: Overview href: /microsoft-365/solutions/apps-assign-overview?toc=%2Fmem%2Fintune%2Ftoc.json&bc=%2Fmem%2Fintune%2Fbreadcrumb%2Ftoc.json displayName: assign, deploy, app, apps, monitor, troubleshoot @@ -2083,9 +2154,9 @@ items: - name: Understand app deployment href: /microsoft-365/solutions/apps-assign-deployment?toc=%2Fmem%2Fintune%2Ftoc.json&bc=%2Fmem%2Fintune%2Fbreadcrumb%2Ftoc.json - name: Assign apps to your organization - items: - - name: Assign apps overview - href: /microsoft-365/solutions/apps-assign-steps-overview?toc=%2Fmem%2Fintune%2Ftoc.json&bc=%2Fmem%2Fintune%2Fbreadcrumb%2Ftoc.json + items: + - name: Assign apps overview + href: /microsoft-365/solutions/apps-assign-steps-overview?toc=%2Fmem%2Fintune%2Ftoc.json&bc=%2Fmem%2Fintune%2Fbreadcrumb%2Ftoc.json - name: Step 1. Confirm users, devices, or groups href: /microsoft-365/solutions/apps-assign-step-1?toc=%2Fmem%2Fintune%2Ftoc.json&bc=%2Fmem%2Fintune%2Fbreadcrumb%2Ftoc.json - name: Step 2. Assign apps to users, devices, or groups @@ -2094,12 +2165,12 @@ items: href: /microsoft-365/solutions/apps-assign-step-3?toc=%2Fmem%2Fintune%2Ftoc.json&bc=%2Fmem%2Fintune%2Fbreadcrumb%2Ftoc.json - name: Step 4. Troubleshoot app deployment issues href: /microsoft-365/solutions/apps-assign-step-4?toc=%2Fmem%2Fintune%2Ftoc.json&bc=%2Fmem%2Fintune%2Fbreadcrumb%2Ftoc.json - + - name: Secure your corporate data using Edge for Business - items: + items: - name: Overview href: ./apps/mamedge-overview.md - - name: Step 1. Create Microsoft Entra conditional access + - name: Step 1. Create Microsoft Entra Conditional Access href: ./apps/mamedge-1-mamca.md - name: Step 2. Create an app protection policy href: ./apps/mamedge-2-app.md @@ -2121,7 +2192,7 @@ items: - name: Intune API reference href: /graph/api/resources/intune-graph-overview - name: Graph APIs used to configure devices - href: ./developer/graph-apis-used-by-intune-device-configuration-windows.md + href: ./developer/graph-apis-used-by-intune-device-configuration-windows.md - name: Use PowerShell cmdlets to automate actions href: https://github.com/Microsoft/Intune-PowerShell-SDK/ - name: Protect apps with Intune App SDK @@ -2132,7 +2203,7 @@ items: - name: Prepare LOB apps for app protection href: ./developer/apps-prepare-mobile-application-management.md - name: LOB app versioning - href: ./developer/apps-lob-app-versioning.md + href: ./developer/apps-lob-app-versioning.md - name: App Wrapping Tool for iOS href: ./developer/app-wrapper-prepare-ios.md - name: Intune App SDK for iOS @@ -2176,9 +2247,9 @@ items: href: ./developer/app-sdk-android-appendix.md - name: Intune App SDK Xamarin Bindings href: ./developer/app-sdk-xamarin.md - - name: Microsoft Tunnel for MAM SDK + - name: Microsoft Tunnel for MAM SDK items: - - name: Microsoft Tunnel for MAM iOS SDK + - name: Microsoft Tunnel for MAM iOS SDK href: ./developer/tunnel-mam-ios-sdk.md - name: Microsoft Tunnel for MAM iOS Xamarin Bindings SDK href: ./developer/mam-tunnel-ios-xamarin-bindings.md @@ -2199,14 +2270,14 @@ items: - name: Data Warehouse API endpoint href: ./developer/reports-api-url.md - name: Data Warehouse application-only authentication - href: ./developer/data-warehouse-app-only-auth.md + href: ./developer/data-warehouse-app-only-auth.md - name: Data Warehouse data model href: ./developer/reports-ref-data-model.md items: - name: Data Warehouse collections - href: ./developer/intune-data-warehouse-collections.md + href: ./developer/intune-data-warehouse-collections.md - name: Data Warehouse collections (beta) - items: + items: - name: User lifetime representation in the Intune Data Warehouse href: ./developer/reports-ref-user-timeline.md - name: Reference for application entities @@ -2228,9 +2299,12 @@ items: - name: Move your Intune Data Warehouse account data href: ./developer/data-warehouse-account-move.md - - name: Privacy and personal data - href: ./protect/privacy-personal-data.md + - name: Privacy, compliance, and personal data items: + - name: Privacy and personal data + href: ./protect/privacy-personal-data.md + - name: Compliance in Intune + href: ./fundamentals/compliance-in-intune.md - name: Optional diagnostic data in client apps href: ./protect/client-apps-optional-data.md - name: Data collection @@ -2250,7 +2324,7 @@ items: href: ./protect/data-intune-sends-to-google.md - name: Data Intune sends to Zebra href: ./protect/data-intune-sends-to-zebra.md - - name: Enable Windows diagnostic data + - name: Enable Windows diagnostic data href: ./protect/data-enable-windows-data.md - name: Information shared from Jamf Pro to Intune href: ./protect/data-jamf-sends-to-intune.md @@ -2278,11 +2352,11 @@ items: - name: Remote Help on macOS href: ./fundamentals/remote-help-macos.md - name: Remote Help Web App - href: ./fundamentals/remote-help-webapp.md + href: ./fundamentals/remote-help-webapp.md - name: Remote Help on Android - href: ./fundamentals/remote-help-android.md + href: ./fundamentals/remote-help-android.md - name: Troubleshooting Remote Help on Android - href: ./fundamentals/remote-help-android-troubleshoot.md + href: ./fundamentals/remote-help-android-troubleshoot.md - name: Remediations items: - name: Use Remediations diff --git a/memdocs/intune/user-help/check-compliance-microsoft-intune-app-android.md b/memdocs/intune/user-help/check-compliance-microsoft-intune-app-android.md index b19f384f57f..043031deb9e 100644 --- a/memdocs/intune/user-help/check-compliance-microsoft-intune-app-android.md +++ b/memdocs/intune/user-help/check-compliance-microsoft-intune-app-android.md @@ -7,7 +7,7 @@ keywords: author: lenewsad ms.author: lanewsad manager: dougeby -ms.date: 08/01/2023 +ms.date: 01/27/2025 ms.topic: end-user-help ms.service: microsoft-intune ms.subservice: end-user diff --git a/memdocs/intune/user-help/check-compliance-on-your-device-android.md b/memdocs/intune/user-help/check-compliance-on-your-device-android.md index 9573fed2198..30933108a6c 100644 --- a/memdocs/intune/user-help/check-compliance-on-your-device-android.md +++ b/memdocs/intune/user-help/check-compliance-on-your-device-android.md @@ -7,7 +7,7 @@ keywords: author: lenewsad ms.author: lanewsad manager: dougeby -ms.date: 07/01/2024 +ms.date: 01/27/2025 ms.topic: end-user-help ms.service: microsoft-intune ms.subservice: end-user diff --git a/memdocs/intune/user-help/check-status-linux.md b/memdocs/intune/user-help/check-status-linux.md index 3119602cb36..7a99e30eb57 100644 --- a/memdocs/intune/user-help/check-status-linux.md +++ b/memdocs/intune/user-help/check-status-linux.md @@ -20,7 +20,7 @@ searchScope: ROBOTS: #audience: -ms.reviewer: ilwu +ms.reviewer: arnab ms.suite: ems #ms.tgt_pltfrm: ms.custom: intune-enduser @@ -44,11 +44,11 @@ The Intune app routinely checks in with your device to verify that it complies w There are three statuses in the Intune app: - * **Compliant** – Your device meets your organization’s requirements. It should have access to work or school resources. + * **Compliant** – Your device meets your organization's requirements. It should have access to work or school resources. * **Checking status** – Intune is checking the device settings. - * **Not compliant** – Your device doesn't meet your organization’s requirements. It may be restricted from accessing work or school resources. Additional action is needed from you to update your settings. + * **Not compliant** – Your device doesn't meet your organization's requirements. It may be restricted from accessing work or school resources. Additional action is needed from you to update your settings. ## View compliance issues @@ -65,21 +65,21 @@ The app shows you the following information: * The action required, such as *Upgrade your operating system*. - * The reason for noncompliance, such as *This device’s operating system is not supported*. + * The reason for noncompliance, such as *This device's operating system is not supported*. * The **How to resolve this** link that, when available, points to a help article on learn.microsoft.com. ### Operating system and version -When OS and version requirements are enforced, devices running Linux flavors or versions that aren't supported are marked as noncompliant. To resolve this issue, upgrade to or install a version that’s supported by your organization. +When OS and version requirements are enforced, devices running Linux flavors or versions that aren't supported are marked as noncompliant. To resolve this issue, upgrade to or install a version that's supported by your organization. -Contact your support person for more information about your organization’s OS requirements. +Contact your support person for more information about your organization's OS requirements. ### Password complexity -When password complexity requirements are enforced, devices with weak passwords are marked as noncompliant. To resolve this issue, update your device password so that it meets your organization’s requirements for length and quality. +When password complexity requirements are enforced, devices with weak passwords are marked as noncompliant. To resolve this issue, update your device password so that it meets your organization's requirements for length and quality. ### Device encryption -When encryption requirements are enforced, devices that aren’t encrypted are marked as noncompliant. To resolve this issue, encrypt the local data on your device in accordance with your organization’s encryption policies. +When encryption requirements are enforced, devices that aren't encrypted are marked as noncompliant. To resolve this issue, encrypt the local data on your device in accordance with your organization's encryption policies. Not all filesystem partitions need to be encrypted: diff --git a/memdocs/intune/user-help/enroll-android-device-disa-purebred.md b/memdocs/intune/user-help/enroll-android-device-disa-purebred.md index c6ea0db4792..e79822ebefc 100644 --- a/memdocs/intune/user-help/enroll-android-device-disa-purebred.md +++ b/memdocs/intune/user-help/enroll-android-device-disa-purebred.md @@ -34,14 +34,14 @@ ms.collection: Enroll your device with the Microsoft Intune app to gain secure, mobile access to your work email, files, and apps. After your device is enrolled, it becomes *managed*, which means your organization can assign policies and apps to the device through a mobile device management (MDM) provider, such as Microsoft Intune. -During enrollment, you'll also install a derived credential on your device. Your organization might require you to use the derived credential as an authentication method when accessing resources, or for signing and encrypting emails. +During enrollment, you also install a derived credential on your device. Your organization might require you to use the derived credential as an authentication method when accessing resources, or for signing and encrypting emails. You likely need to set up a derived credential if you use a smart card to: * Sign in to school or work apps, Wi-Fi, and virtual private networks (VPN) * Sign and encrypt school or work emails using S/MIME certificates -In this article, you will: +In this article, you learn how to: * Enroll a mobile Android device with the Intune app * Set up your smart card by installing a derived credential from your organization's derived credential provider, [DISA Purebred](https://public.cyber.mil/pki-pke/purebred/) @@ -67,43 +67,34 @@ To complete enrollment, you must have: * The Microsoft Intune app installed on your device * The Purebred app installed on your device (App should automatically install shortly after device setup. If it doesn't, contact your IT support person.) -You'll also need to contact a Purebred agent or representative during setup. +You must also contact a Purebred agent or representative during setup. ## Enroll device 1. Turn on your new or factory-reset device. -2. On the **Welcome** screen, select your language. If you've been instructed to enroll with a QR code or NFC, follow the step below that matches the method. +2. On the **Welcome** screen, select your language. If you were instructed to enroll with a QR code or NFC, complete the step that matches the method: * NFC: Tap your NFC-supported device against a programmer device to connect to your organization's network. Follow the onscreen prompts. When you reach the screen for Chrome's Terms of Service, continue to step 5. * QR code: Complete the steps in [QR code enrollment](#qr-code-enrollment). - If you've been instructed to use another method, continue to step 3. + If you were instructed to use another method, continue to step 3. 3. Connect to Wi-Fi and tap **NEXT**. Follow the step that matches your enrollment method. * Token: When you get to the Google sign-in screen, complete the steps in [Token enrollment](#token-enrollment). - * Google Zero Touch: After you connect to Wi-Fi, your device will be recognized by your organization. Continue to step 4 and follow the onscreen prompts until setup is complete. - - ![Example image of Google terms screen that you see if you're using Google Zero Touch, highlighting Accept & Continue button.](./media/enroll-android-device-disa-purebred/google-zero-touch-intune-app-01.png) + * Google Zero Touch: After you connect to Wi-Fi, your organization can recognize your device. Continue to step 4 and follow the onscreen prompts until setup is complete. 4. Review Google's terms. Then tap **ACCEPT & CONTINUE**. - ![Example image of Google terms screen, highlighting Accept & Continue button.](./media/enroll-android-device-disa-purebred/fully-managed-intune-app-04.png) - -5. Review Chrome's Terms of Service. Then tap **ACCEPT & CONTINUE**. - - ![Example image of Chrome Terms of Service screen, highlighting Accept & Continue button.](./media/enroll-android-device-disa-purebred/fully-managed-intune-app-06.png) +5. Review Chrome's Terms of Service. Then tap **ACCEPT & CONTINUE**. 6. On the sign-in screen, tap **Sign-in options** and then **Sign in from another device**. 7. Write down the onscreen code. -8. Switch to your smart card-enabled device and go to the web address that's shown on your screen. +8. Switch to your smart card-enabled device and go to the web address that appears on your screen. -9. Enter the code you previously wrote down. - - > [!div class="mx-imgBorder"] - > ![Screenshot of the Company Portal website "Enter code" prompt.](./media/enroll-android-device-disa-purebred/enter-code-intercede.png) +9. Enter the code you previously wrote down. 10. Insert your smart card to sign in. @@ -111,112 +102,96 @@ You'll also need to contact a Purebred agent or representative during setup. 12. Depending on your organization's requirements, you might be prompted to update settings, such as screen lock or encryption. If you see these prompts, tap **SET** and follow the onscreen instructions. - ![Example image of Set up your work phone screen, highlighting Set button.](./media/enroll-android-device-disa-purebred/fully-managed-intune-app-10.png) - 13. To install work apps on your device, tap **INSTALL**. After installation is complete, tap **NEXT**. - - ![Example image of Set up your work phone screen, highlighting Install button.](./media/enroll-android-device-disa-purebred/fully-managed-intune-app-11.png) - 14. Tap **START** to open the Microsoft Intune app. - ![Example image of Set up your work phone screen, highlighting Start button.](./media/enroll-android-device-disa-purebred/fully-managed-intune-app-17.png) - 15. Return to the Intune app on your mobile device and follow the onscreen instructions until enrollment is done. - ![Example image of Set up access, register your device screen, highlighting Done button.](./media/enroll-android-device-disa-purebred/fully-managed-intune-app-19.png) - 16. Continue to the [set up your smart card](enroll-android-device-disa-purebred.md#set-up-smart-card) section in this article to finish setting up your device. ### QR code enrollment -In this section, you'll scan your company-provided QR code. When you're done, we'll redirect you back to the device enrollment steps. +In this section, you scan your company-provided QR code. When you're done, we'll redirect you back to the device enrollment steps. 1. On the **Welcome** screen, tap the screen five times to start QR code setup. - - ![Example image of device setup Welcome screen, highlighting instructions to tap screen.](./media/enroll-android-device-disa-purebred/qr-code-intune-app-01.png) - 2. Follow any onscreen instructions to connect to Wi-Fi. -3. If your device doesn't have a QR code scanner, the setup screens will show the progress as a scanner is installed. Wait for installation to complete. -4. When prompted, scan the enrollment profile QR code that your organization gave you. -5. Return to [Enroll device](#enroll-device), step 4 to continue setup. +3. If your device doesn't have a QR code scanner, the setup screens show the installation progress as a scanner installs. Wait for installation to complete. +4. Scan the enrollment profile QR code that your organization gave you. +5. Return to [Enroll device](#enroll-device) > step 4 to continue setup. ### Token enrollment -In this section, you'll enter your company-provided token. When you're done, we'll redirect you back to the device enrollment steps. - -1. On the Google sign-in screen, in the **Email or phone** box, type **afw#setup**. Tap **Next**. +In this section, you enter your company-provided token. When you're done, we'll redirect you back to the device enrollment steps. - ![Example image of Google sign-in screen, showing that "afw#setup" is typed into field.](./media/enroll-android-device-disa-purebred/token-intune-app-01.png) +1. On the Google sign-in screen, in the **Email or phone** box, type **afw#setup**. Tap **Next**. -2. Choose **Install** for the **Android Device Policy** app. Continue through the installation. Depending on your device, you might need to review and accept additional terms. +2. Choose **Install** for the **Android Device Policy** app. Continue through the installation. Depending on your device, you might need to review and accept other terms. 3. On the **Enroll this device** screen, select **Next**. 4. Select **Enter code**. -5. On the **Scan or enter code** screen, type in the code that your organization gave you. Then click **Next**. - - ![Example image of Scan or enter code screen, highlighting Next button.](./media/enroll-android-device-disa-purebred/token-intune-app-04.png) +5. On the **Scan or enter code** screen, type in the code that your organization gave you. Then click **Next**. -6. Return to [Enroll device](#enroll-device), step 4 to continue setup. +6. Return to [Enroll device](#enroll-device) > step 4 to continue setup. ## Set up smart card > [!NOTE] -> The Purebred app is required to complete these steps and will automatically install on your device after enrollment. If you still don't have the app after waiting a short while, contact your IT support person. +> The Purebred app is required to complete these steps and automatically installs on your device after enrollment. If you still don't have the app after waiting a short while, contact your IT support person. -1. After enrollment is complete, the Intune app will notify you to set up your smart card. Tap the notification. If you don't get a notification, check your email. +1. After enrollment is complete, the Intune app prompts you to set up your smart card via a notification. Tap the notification. If you don't get a notification, check your email. > [!div class="mx-imgBorder"] > ![Screenshot of the Intune app push notification on device home screen.](./media/enroll-android-device-disa-purebred/action-required-in-app-android.png) 2. On the **Set up smart card** screen: - 1. Tap the link to your organization's setup instructions and review them. If your organization doesn't provide additional instructions, you'll be sent to this article. + 1. Tap the link to your organization's setup instructions and review them. If your organization doesn't provide other instructions, you're sent to this article. 2. Tap **BEGIN**. > [!div class="mx-imgBorder"] > ![Screenshot of the Intune app, Set up smart card screen.](./media/enroll-android-device-disa-purebred/smart-card-open-disa-purebred-android.png) -3. On the **Get certificates** screen, tap **LAUNCH PUREBRED** to open the Purebred app. (The app should have been installed automatically on your device. If you don't have it, contact your support person.) +3. On the **Get certificates** screen, tap **LAUNCH PUREBRED** to open the Purebred app. (The app should be on your device already, because it installs automatically. If you don't have it, contact your support person.) > [!div class="mx-imgBorder"] > ![Screenshot of the Intune app prompt to open DISA Purebred app.](./media/enroll-android-device-disa-purebred/open-app-prompt-disa-purbred-android.png) -4. The Purebred app might need additional permissions from you in order to run properly. Tap **Allow** or **Allow all the time** when prompted. For more information about why these permissions are required, speak with your support person or Purebred agent. +4. The Purebred app might need other permissions from you in order to run properly. Tap **Allow** or **Allow all the time** when prompted. For more information about why these permissions are required, speak with your support person or Purebred agent. 5. Once you're in the Purebred app, work with your organization's Purebred agent to download and install the certificates you need to access work or school resources. > [!IMPORTANT] > During this process, tap **OK** or **Install** when prompted. Don't change the names of any certificate authorities (CAs) or certificates that you're prompted to install. -6. After installation is complete, you'll receive a notification that your certificates are ready. Tap the notification to return to the Intune app. +6. After installation is complete, you receive a notification that your certificates are ready. Tap the notification to return to the Intune app. > [!div class="mx-imgBorder"] - > ![Screenshot of the "Allow access to certificates" screen](./media/enroll-android-device-disa-purebred/certificates-ready-prompt-disa-purbred-android.png) + > ![Screenshot of the Allow access to certificates screen](./media/enroll-android-device-disa-purebred/certificates-ready-prompt-disa-purbred-android.png) -7. From the **Allow access to certificates** screen, you'll give the Intune app permission to access the derived credential you got from DISA Purebred. This step ensures that your organization can verify your identity whenever you access protected work or school resources. +7. From the **Allow access to certificates** screen, give the Intune app permission to access the derived credential you got from DISA Purebred. This step ensures that your organization can verify your identity whenever you access protected work or school resources. 1. Tap **NEXT**. > [!div class="mx-imgBorder"] - > ![Screenshot of the "Certificates are ready" prompt](./media/enroll-android-device-disa-purebred/certificates-access-disa-purbred-android.png) + > ![Screenshot of the Certificates are ready prompt](./media/enroll-android-device-disa-purebred/certificates-access-disa-purbred-android.png) 2. When you're prompted to **Choose certificate**, don't change the selection. The correct certificate is already selected, so just tap **Select** or **OK**. > [!div class="mx-imgBorder"] - > ![Screenshot of the "Choose certificate" prompt](./media/enroll-android-device-disa-purebred/choose-certificates-prompt-disa-purbred-android.png) + > ![Screenshot of the Choose certificate prompt](./media/enroll-android-device-disa-purebred/choose-certificates-prompt-disa-purbred-android.png) 3. Your derived credential is made up of multiple certificates, so you might see the **Choose certificate** prompt multiple times. Repeat the previous step until no more prompts appear. -8. Once all of the certificates are processed, wait for the Intune app to finish setting up your device. You'll know setup is complete when you see the **You're all set!** screen. +8. Once all of the certificates are processed, wait for the Intune app to finish setting up your device. You know setup is complete when you see the **You're all set!** screen. > [!div class="mx-imgBorder"] - > ![Screenshot of the "You're all set" screen](./media/enroll-android-device-disa-purebred/all-set-android.png) + > ![Screenshot of the You're all set screen](./media/enroll-android-device-disa-purebred/all-set-android.png) ## Next steps -After enrollment is complete, you'll have access to work resources, such as email, Wi-Fi, and any apps that your organization makes available. For more information about how to get, search for, install, and uninstall apps in the Intune app see: +After enrollment is complete, you have access to work resources, such as email, Wi-Fi, and any apps that your organization makes available. For more information about how to get, search for, install, and uninstall apps in the Intune app see: * [Use managed apps on your device](use-managed-apps-on-your-device-android.md) * [Manage apps from the Company Portal website](manage-apps-cpweb.md) diff --git a/memdocs/intune/user-help/enroll-android-device-entrust-datacard.md b/memdocs/intune/user-help/enroll-android-device-entrust-datacard.md index 69d12312246..6a4b23a8fa6 100644 --- a/memdocs/intune/user-help/enroll-android-device-entrust-datacard.md +++ b/memdocs/intune/user-help/enroll-android-device-entrust-datacard.md @@ -34,7 +34,7 @@ ms.collection: Enroll your device with the Microsoft Intune app to gain secure, mobile access to your work or school mail, files, and apps. After your device is enrolled, it becomes *managed*, meaning your organization can assign policies and apps to the device through a mobile device management (MDM) provider, such as Microsoft Intune. -During enrollment, you'll also install a derived credential on your device. Your organization might require you to use the derived credential as an authentication method when accessing resources, or for signing and encrypting emails. +During enrollment, you also install a derived credential on your device. Your organization might require you to use the derived credential as an authentication method when accessing resources, or for signing and encrypting emails. You likely need to set up a derived credential if you use a smart card to: @@ -48,7 +48,7 @@ In this article, you will: ## What are derived credentials? -A derived credential is a certificate that's derived from your smart card credentials and installed on your device. It grants you remote access to work resources, while preventing unauthorized users from accessing sensitive information. +A derived credential is a certificate derived from your smart card credentials and installed on your device. It grants you remote access to work resources, while preventing unauthorized users from accessing sensitive information. Derived credentials are used to: @@ -69,107 +69,83 @@ Derived credentials are an implementation of the National Institute of Standards ## Enroll device 1. Turn on your new or factory-reset device. -2. On the **Welcome** screen, select your language. If you've been instructed to enroll with a QR code or NFC, follow the step below that matches the method. +2. On the **Welcome** screen, select your language. If your organizations instructed you to enroll with a QR code or near-field communication (NFC), follow the step that matches the method. * NFC: Tap your NFC-supported device against a programmer device to connect to your organization's network. Follow the onscreen prompts. When you reach the screen for Chrome's Terms of Service, continue to step 5. * QR code: Complete the steps in [QR code enrollment](#qr-code-enrollment). - If you've been instructed to use another method, continue to step 3. + If your organization instructed you to use another method, continue to step 3. 3. Connect to Wi-Fi and tap **NEXT**. Follow the step that matches your enrollment method. * Token: When you get to the Google sign-in screen, complete the steps in [Token enrollment](#token-enrollment). - * Google Zero Touch: After you connect to Wi-Fi, your device will be recognized by your organization. Continue to step 4 and follow the onscreen prompts until setup is complete. - - ![Example image of Google terms screen that you see if you're using Google Zero Touch, highlighting Accept & Continue button.](./media/enroll-android-device-disa-purebred/google-zero-touch-intune-app-01.png) - + * Google Zero Touch: After you connect to Wi-Fi, your organization can recognize your device. Continue to step 4 and follow the onscreen prompts until setup is complete. + 4. Review Google's terms. Then tap **ACCEPT & CONTINUE**. - ![Example image of Google terms screen, highlighting Accept & Continue button.](./media/enroll-android-device-disa-purebred/fully-managed-intune-app-04.png) - 5. Review Chrome's Terms of Service. Then tap **ACCEPT & CONTINUE**. - ![Example image of Chrome Terms of Service screen, highlighting Accept & Continue button.](./media/enroll-android-device-disa-purebred/fully-managed-intune-app-06.png) - 6. On the sign-in screen, tap **Sign-in options** and then **Sign in from another device**. 7. Write down the onscreen code. -8. Switch to your smart card-enabled device and go to the web address that's shown on your screen. - -9. Enter the code you previously wrote down. +8. Switch to your smart card-enabled device and go to the web address shown on your screen. - > [!div class="mx-imgBorder"] - > ![Screenshot of the Company Portal website "Enter code" prompt.](./media/enroll-android-device-disa-purebred/enter-code-intercede.png) +9. Enter the code you previously wrote down. 10. Insert your smart card to sign in. 11. On the sign-in screen, select your work or school account. Then switch back to your mobile device. -12. Depending on your organization's requirements, you might be prompted to update settings, such as screen lock or encryption. If you see these prompts, tap **SET** and follow the onscreen instructions. - - ![Example image of Set up your work phone screen, highlighting Set button.](./media/enroll-android-device-disa-purebred/fully-managed-intune-app-10.png) - -13. To install work apps on your device, tap **INSTALL**. After installation is complete, tap **NEXT**. +12. Depending on your organization's requirements, you might be prompted to update settings, such as screen lock or encryption. If you see these prompts, tap **SET** and follow the onscreen instructions. - ![Example image of Set up your work phone screen, highlighting Install button.](./media/enroll-android-device-disa-purebred/fully-managed-intune-app-11.png) +13. To install work apps on your device, tap **INSTALL**. After installation is complete, tap **NEXT**. 14. Tap **START** to open the Microsoft Intune app. - ![Example image of Set up your work phone screen, highlighting Start button.](./media/enroll-android-device-disa-purebred/fully-managed-intune-app-17.png) - -15. Return to the Intune app on your mobile device and follow the onscreen instructions until enrollment is done. - - ![Example image of Set up access, register your device screen, highlighting Done button.](./media/enroll-android-device-disa-purebred/fully-managed-intune-app-19.png) +15. Return to the Intune app on your mobile device and follow the onscreen instructions until enrollment is done. 16. Continue to the [set up your smart card](enroll-android-device-entrust-datacard.md#set-up-smart-card) section in this article to finish setting up your device. ### QR code enrollment -In this section, you'll scan your company-provided QR code. When you're done, we'll redirect you back to the device enrollment steps. +In this section, you scan your company-provided QR code. When you're done, we'll redirect you back to the device enrollment steps. 1. On the **Welcome** screen, tap the screen five times to start QR code setup. - - ![Example image of device setup Welcome screen, highlighting instructions to tap screen.](./media/enroll-android-device-disa-purebred/qr-code-intune-app-01.png) - 2. Follow any onscreen instructions to connect to Wi-Fi. -3. If your device doesn't have a QR code scanner, the setup screens will show the progress as a scanner is installed. Wait for installation to complete. +3. If your device doesn't have a QR code scanner, a scanner automatically installs. Wait for installation to complete. 4. When prompted, scan the enrollment profile QR code that your organization gave you. -5. Return to [Enroll device](#enroll-device), step 4 to continue setup. +5. Return to [Step 4: Enroll device](#enroll-device) to continue setup. ### Token enrollment -In this section, you'll enter your company-provided token. When you're done, we'll redirect you back to the device enrollment steps. - -1. On the Google sign-in screen, in the **Email or phone** box, type **afw#setup**. Then tap **Next**. - - ![Example image of Google sign-in screen, showing that "afw#setup" is typed into field.](./media/enroll-android-device-disa-purebred/token-intune-app-01.png) +In this section, you enter your company-provided token. When you're done, we'll redirect you back to the device enrollment steps. -2. Choose **Install** for the **Android Device Policy** app. Continue through the installation. Depending on your device, you might need to review and accept additional terms. +1. On the Google sign-in screen, in the **Email or phone** box, type **afw#setup**. Then tap **Next**. -3. On the **Enroll this device** screen, select **Next**. +2. Choose **Install** for the **Android Device Policy** app. Continue through the installation. Depending on your device, you might need to review and accept other terms. -4. Select **Enter code**. +3. On the **Enroll this device** screen, tap **Next**. -5. On the **Scan or enter code** screen, type in the code that your organization gave you. Then click **Next**. +4. Tap **Enter code**. - ![Example image of Scan or enter code screen, highlighting Next button.](./media/enroll-android-device-disa-purebred/token-intune-app-04.png) +5. On the **Scan or enter code** screen, enter the code that your organization gave you. Then tap **Next**. -6. Return to [Enroll device](#enroll-device), step 4 to continue setup. +6. Return to [Step 4: Enroll device](#enroll-device) to continue setup. ## Set up smart card -1. After enrollment is complete, the Intune app will notify you to set up your smart card. Tap the notification. If you don't get a notification, check your email. +1. After enrollment is complete, the Intune app prompts you to set up your smart card via notification. Tap the notification. If you don't get a notification, check your email. > [!div class="mx-imgBorder"] - > ![Example screenshot of the Company Portal push notification on device home screen.](./media/enroll-android-device-disa-purebred/action-required-in-app-android.png) + > ![Screenshot of the Intune app push notification on device home screen.](./media/enroll-android-device-disa-purebred/action-required-in-app-android.png) 2. On the **Set up smart card** screen: - 1. Tap the link to your organization's setup instructions. If your organization doesn't provide additional instructions, you'll be sent to this article. + 1. Tap the link to your organization's instructions. If your organization doesn't provide more instruction, you are sent to this article. 2. Tap **BEGIN**. > [!div class="mx-imgBorder"] - > ![Example screenshot of the Company Portal Set up mobile smart card access screen.](./media/enroll-android-device-entrust-datacard/smart-card-open-entrust-android.png) + > ![Screenshot of the Intune app Set up mobile smart card access screen.](./media/enroll-android-device-entrust-datacard/smart-card-open-entrust-android.png) 3. Switch to your smart card-enabled device and open IdentityGuard. @@ -179,46 +155,46 @@ In this section, you'll enter your company-provided token. When you're done, we' 6. Enter your smart card PIN. -7. You'll be asked to choose from a list of actions. Select the one that lets you enroll for a derived mobile smart credential. The link or button might say **I'd like to enroll for a derived mobile smart card credential.** +7. Choose from the list of actions. Select the one that lets you enroll for a derived mobile smart credential. The link or button might say **I'd like to enroll for a derived mobile smart card credential.** -8. Select that you've successfully downloaded and installed the smart credential-enabled application. Then continue to the next screen. +8. Select the option that says you successfully downloaded and installed the smart credential-enabled application. Then continue to the next screen. 9. Enter information about your derived smart card credential: 1. For the identity name, enter any name, such as *Entrust Derived Cred*. 2. In the dropdown menu, select **Entrust IdentityGuard Mobile Smart Credential**. - 3. Continue to the next screen. You'll see a QR code with a numerical password under it. + 3. Continue to the next screen. The screen shows a QR code with a numerical password under it. 10. Return to your Android device. On the Intune app > **Get QR code** screen, tap **NEXT**. > [!div class="mx-imgBorder"] - > ![Example screenshot of the Company Portal Get QR code screen.](./media/enroll-android-device-entrust-datacard/get-qr-code-entrust-android.png) + > ![Screenshot of the Intune app Get QR code screen.](./media/enroll-android-device-entrust-datacard/get-qr-code-entrust-android.png) 11. If you're prompted to allow the Intune app to use your camera, tap **Allow**. -12. Scan the image of the QR code that's on your smart card-enabled device. +12. Scan the image of the QR code shown on your smart card-enabled device. 13. On the **Password required** screen, enter the password that appears under the QR code. > [!div class="mx-imgBorder"] - > ![Example screenshot of the Company Portal "Password required" screen.](./media/enroll-android-device-entrust-datacard/password-required-entrust-android.png) + > ![Screenshot of the Intune app Password required screen.](./media/enroll-android-device-entrust-datacard/password-required-entrust-android.png) -14. The Intune app will start downloading and installing the certificates needed to access work or school resources. Depending on your internet connection, this process might take some time. Don't close the app during this time. +14. The Intune app starts downloading and installing the certificates needed to access work or school resources. Depending on your internet connection, this process could take some time. Don't close the app during this time. > [!div class="mx-imgBorder"] - > ![Example screenshot of the Company Portal "Downloading and installing certificates" screen](./media/enroll-android-device-entrust-datacard/install-certificates-entrust-android.png) + > ![Screenshot of the Intune app Downloading and installing certificates screen.](./media/enroll-android-device-entrust-datacard/install-certificates-entrust-android.png) -15. Once all of the certificates are processed, wait for the Intune app to finish setting up your device. You'll know setup is complete when you see the **You're all set!** screen. +15. Once all of the certificates are processed, wait for the Intune app to finish setting up your device. Setup is complete when you see the **You're all set!** screen. > [!div class="mx-imgBorder"] - > ![Example screenshot of the "You're all set" screen](./media/enroll-android-device-disa-purebred/all-set-android.png) + > ![Screenshot of the Intune app You're all set screen.](./media/enroll-android-device-disa-purebred/all-set-android.png) ## Next steps -After enrollment is complete, you'll have access to work resources, such as email, Wi-Fi, and any apps that your organization makes available. For more information about how to get, search for, install, and uninstall apps in the Intune app see: +After enrollment is complete, you have access to work resources, such as email, Wi-Fi, and any apps that your organization makes available. For more information about how to get, search for, install, and uninstall apps in the Intune app see: * [Use managed apps on your device](use-managed-apps-on-your-device-android.md) * [Manage apps from the Company Portal website](manage-apps-cpweb.md) -Still need help? Contact your company support. For contact information, check the [Company Portal website](https://go.microsoft.com/fwlink/?linkid=2010980). \ No newline at end of file +Still need help? Contact your company support. For contact information, check the [ website](https://go.microsoft.com/fwlink/?linkid=2010980). diff --git a/memdocs/intune/user-help/enroll-device-android-company-portal.md b/memdocs/intune/user-help/enroll-device-android-company-portal.md index 031f4f6ad7f..929d93a2c50 100644 --- a/memdocs/intune/user-help/enroll-device-android-company-portal.md +++ b/memdocs/intune/user-help/enroll-device-android-company-portal.md @@ -7,7 +7,7 @@ keywords: author: lenewsad ms.author: lanewsad manager: dougeby -ms.date: 10/21/2024 +ms.date: 11/13/2024 ms.topic: end-user-help ms.service: microsoft-intune ms.subservice: end-user @@ -29,9 +29,7 @@ ms.collection: --- # Enroll your device with Company Portal -Enroll your personal or corporate-owned Android device with Intune Company Portal to get secure access to company email, apps, and data. - - +Enroll your personal or corporate-owned Android device with Intune Company Portal to get secure access to company email, apps, and data. ## Prerequisites The Intune Company Portal app supports devices running Android 8.0 and later, including devices secured by Samsung Knox Standard 2.4 and later. To learn how to update your Android device to meet requirements, see [Check & update your Android version](https://support.google.com/android/answer/7680439). @@ -39,7 +37,7 @@ The Intune Company Portal app supports devices running Android 8.0 and later, in > [!VIDEO https://www.youtube.com/embed/k0Q_sGLSx6o] > [!NOTE] -> Samsung Knox is a type of security that certain Samsung devices use for additional protection outside of what native Android provides. To check if you have a Samsung Knox device, go to **Settings** > **About device**. If you don't see **Knox version** listed there, you have a native Android device. +> Samsung Knox is a type of security that certain Samsung devices use for additional protection outside of what native Android provides. To check if you have a Samsung Knox device, go to **Settings** > **About device**. If you don't see the **Knox version** listed there, you have a native Android device. ## Install Company Portal app Install the Intune Company Portal app [from Google Play](https://play.google.com/store/apps/details?id=com.microsoft.windowsintune.companyportal). See [Install Company Portal app in People's Republic of China](install-company-portal-android-china.md) for a list of stores that offer the app in People's Republic of China. @@ -48,34 +46,33 @@ Install the Intune Company Portal app [from Google Play](https://play.google.com 2. Search for and install **Intune Company Portal**. - ![android-search-company-portal](./media/enroll-device-android-company-portal/android-search-company-portal-2101.png) - 3. When prompted about app permissions, tap **ACCEPT**. ## Enroll device During enrollment, you might be asked to choose a category that best describes how you use your device. Company Portal uses your answer to check for work and school apps relevant to you. -1. Open the Company Portal app and sign in with your work or school account. If prompted to, review notification permissions for Company Portal. You can adjust notification permissions anytime in the Settings app. +1. Open the Company Portal app and sign in with your work or school account. Review notification permissions for Company Portal as they pop up. You can adjust notification permissions anytime in the Settings app. 2. If you're prompted to accept your organization's terms and conditions, tap **ACCEPT ALL**. - ![Example image of the Company Portal, Terms screen, highlighting "Accept all" button.](./media/enroll-device-android-company-portal/accept-terms-1911.png) + ![Screenshot of the Company Portal, Terms screen, highlighting "Accept all" button.](./media/enroll-device-android-company-portal/accept-terms-1911.png) 3. Review what your organization can and can't see. Then tap **CONTINUE**. - ![Example image of Company Portal, We care about your privacy screen, highlighting the Continue button.](./media/enroll-device-android-company-portal/android-privacy-screen-1911.png) + ![Screenshot of Company Portal, We care about your privacy screen, highlighting the Continue button.](./media/enroll-device-android-company-portal/android-privacy-screen-1911.png) + 4. Review what to expect in the upcoming steps. Then tap **NEXT**. - ![Example image of Company Portal, What's next screen, highlighting the Next button.](./media/enroll-device-android-company-portal/android-whats-next-1911.png) + ![Screenshot of Company Portal, What's next screen, highlighting the Next button.](./media/enroll-device-android-company-portal/android-whats-next-1911.png) -5. Depending on your version of Android, you might be prompted to allow access to certain parts of your device. These prompts are required by Google and not controlled by Microsoft. +5. Depending on your version of Android, you might be prompted to allow access to certain parts of your device. These prompts are a Google requirement and not controlled by Microsoft. Tap **Allow** for the following permissions: - * **Allow Company Portal to make and manage phone calls**: This permission enables your device to share its international mobile station equipment identity (IMEI) number with Intune, your organization's device management provider. It's safe to allow this permission. Microsoft will never make or manage phone calls. - * **Allow Company Portal to access your contacts**: This permission lets the Company Portal app create, use, and manage your work account. It's safe to allow this permission. Microsoft will never access your contacts. + * **Allow Company Portal to make and manage phone calls**: This permission enables your device to share its international mobile station equipment identity (IMEI) number with Intune, your organization's device management provider. It's safe to allow this permission. Microsoft never makes or manages phone calls. + * **Allow Company Portal to access your contacts**: This permission lets the Company Portal app create, use, and manage your work account. It's safe to allow this permission. Microsoft never accesses your contacts. If you deny permission, you'll be prompted again the next time you sign in to Company Portal. To turn off these messages, select **Never ask again**. To manage app permissions, go to the Settings app > **Apps** > **Company Portal** > **Permissions** > **Phone**. @@ -83,31 +80,29 @@ During enrollment, you might be asked to choose a category that best describes h Company Portal needs device administrator permissions to securely manage your device. Activating the app lets your organization identify possible security issues, such as repeated failed attempts to unlock your device, and respond appropriately. - ![Example image of the Activate device administrator screen, highlighting the activate button.](./media/enroll-device-android-company-portal/activate-device-administrator-1911.png) + ![Screenshot of the Activate device administrator screen, highlighting the activate button.](./media/enroll-device-android-company-portal/activate-device-administrator-1911.png) > [!NOTE] > Microsoft does not control the messaging on this screen. We understand that its phrasing can seem somewhat drastic. Company Portal can't specify which restrictions and access are relevant to your organization. If you have questions about how your organization uses the app, contact your IT support person. Go to the [Company Portal website](https://go.microsoft.com/fwlink/?linkid=2010980) to find your organization's contact information. -7. Your device begins enrolling. If you're using a Samsung Knox device, you'll be prompted to review and acknowledge the ELM Agent privacy policy first. - - ![Example image of the Samsung Knox privacy policy screen that appears during enrollment.](./media/enroll-device-android-company-portal/and-enroll-7-knox-privacy-policy.png) +7. Your device begins enrolling. Review and acknowledge the ELM Agent privacy policy if Company Portal prompts for it. 8. On the **Company Access Setup** screen, check that your device is enrolled. Then tap **CONTINUE**. - ![Example image of Company Portal, Company Access Setup screen, showing Get your device managed is complete.](./media/enroll-device-android-company-portal/update-settings-1911.png) + ![Screenshot of Company Portal, Company Access Setup screen, showing Get your device managed is complete.](./media/enroll-device-android-company-portal/update-settings-1911.png) 9. Your organization might require you to update your device settings. Tap **RESOLVE** to adjust a setting. When you're done updating settings, tap **CONTINUE**. - ![Example image of Company Portal, Update device settings, highlighting Resolve and Continue buttons.](./media/enroll-device-android-company-portal/resolve-settings-1911.png) + ![Screenshot of Company Portal, Update device settings, highlighting Resolve and Continue buttons.](./media/enroll-device-android-company-portal/resolve-settings-1911.png) 10. When setup is complete, tap **DONE**. - ![Example image of Company Portal, Company Access Setup screen, showing completed setup and highlighting Done button.](./media/enroll-device-android-company-portal/android-enrollment-done-1911.png) + ![Screenshot of Company Portal, Company Access Setup screen, showing completed setup and highlighting Done button.](./media/enroll-device-android-company-portal/android-enrollment-done-1911.png) ## Next steps -Before you try to install a school or work app, modify device settings to allow app installations from unknown sources. If you don't make this change on your device, apps installations will be blocked. Open the **Settings** app on your device. Then go to **Security and privacy** > **Install unknown apps**. +Before you try to install a school or work app, modify device settings to allow app installations from unknown sources. If you don't make this change on your device, Company Portal blocks app installations. Open the **Settings** app on your device. Then go to **Security and privacy** > **Install unknown apps**. If you get an error while you try to enroll your device in Intune, you can [email your company support](send-logs-to-your-it-admin-by-email-android.md). diff --git a/memdocs/intune/user-help/enroll-device-android-microsoft-intune-app.md b/memdocs/intune/user-help/enroll-device-android-microsoft-intune-app.md index 4450ed089c9..96816b190d8 100644 --- a/memdocs/intune/user-help/enroll-device-android-microsoft-intune-app.md +++ b/memdocs/intune/user-help/enroll-device-android-microsoft-intune-app.md @@ -62,9 +62,7 @@ Complete these steps to set up and enroll your device. 1. Review the terms from Google. Then tap **ACCEPT & CONTINUE**. -1. Review Chrome's Terms of Service. Then tap **ACCEPT & CONTINUE**. - - ![Example image of Chrome Terms of Service screen, highlighting Accept & Continue button.](./media/enroll-android-device-disa-purebred/fully-managed-intune-app-06.png) +1. Review Chrome's Terms of Service. Then tap **ACCEPT & CONTINUE**. 1. On the sign in screens, sign in with your work or school account. @@ -81,8 +79,6 @@ Complete these steps to set up and enroll your device. 1. When you see the message that your device is ready, tap **DONE**. - ![Example image of Set up your work phone screen, highlighting Done button.](./media/enroll-device-android-microsoft-intune-app/fully-managed-intune-app-18.png) - If you have trouble accessing your organization's resources, you might need to update other settings on your device. Sign in to the Microsoft Intune app to check for required updates. diff --git a/memdocs/intune/user-help/enroll-device-android-work-profile.md b/memdocs/intune/user-help/enroll-device-android-work-profile.md index e4e10cd77bb..85f8c6e5b3c 100644 --- a/memdocs/intune/user-help/enroll-device-android-work-profile.md +++ b/memdocs/intune/user-help/enroll-device-android-work-profile.md @@ -7,7 +7,7 @@ keywords: author: lenewsad ms.author: lanewsad manager: dougeby -ms.date: 07/01/2024 +ms.date: 11/13/2024 ms.topic: end-user-help ms.service: microsoft-intune ms.subservice: end-user @@ -46,7 +46,7 @@ This article describes how to enroll your device using the Intune Company Portal [Install the Intune Company Portal app from Google Play](https://play.google.com/store/apps/details?id=com.microsoft.windowsintune.companyportal). The Company Portal app is used to enroll and manage your device, install work apps, and get IT support. ## Enroll device -Make sure you're signed in to the primary user account on your device. Work profile enrollment is not supported on secondary user accounts. +Make sure you're signed in to the primary user account on your device. Work profile enrollment isn't supported on secondary user accounts. 1. Open the Intune Company Portal app and sign in with your work or school account. @@ -56,7 +56,7 @@ Make sure you're signed in to the primary user account on your device. Work prof 3. On the privacy information screen, review the list of items that your organization can and can't see on your device. Then tap **CONTINUE**. - ![Screenshot of Company Portal, We care about your privacy screen, highlighting the Continue button.](./media/enroll-device-android-company-portal/android-privacy-screen-1911.png) + ![Screenshot of Company Portal's We care about your privacy screen, highlighting the Continue button.](./media/enroll-device-android-company-portal/android-privacy-screen-1911.png) 4. Review the Google terms for creating a work profile. Accept the terms to continue. The appearance of this screen varies based on OS version. @@ -73,7 +73,7 @@ Make sure you're signed in to the primary user account on your device. Work prof > [!div class="mx-imgBorder"] > ![Screenshot of Company Portal highlighting the Next button.](./media/enroll-device-android-work-profile/work-profile-setup-next-2307.png) -7. On the **Company Access Setup** screen, confirm that the profile has been created. Then tap **CONTINUE** to proceed to the next enrollment task. +7. On the **Company Access Setup** screen, confirm that you created the profile. Then tap **CONTINUE** to proceed to the next enrollment task. > [!div class="mx-imgBorder"] > ![Screenshot of Company Access Setup showing work profile is created.](./media/enroll-device-android-work-profile/work-profile-complete-1911.png) @@ -84,22 +84,22 @@ Make sure you're signed in to the primary user account on your device. Work prof > [!div class="mx-imgBorder"] > ![Screenshot of Company Access Setup showing work profile is active.](./media/enroll-device-android-work-profile/work-profile-active-1911.png) -10. In the Company Portal app, review the list of settings your organization requires. Update the settings on your device if necessary. Tap **RESOLVE** to open the setting on your device. After you're done updating settings, tap **CONFIRM DEVICE SETTINGS**. +10. In the Company Portal app, review the list of settings your organization requires. Update the settings on your device if necessary. Tap **RESOLVE** to open the setting on your device. After you're done updating settings, tap **CONFIRM DEVICE SETTINGS**. > [!div class="mx-imgBorder"] - > ![Screenshot of Company Portal, Update device settings screen highlighting the RESOLVE button and CONFIRM DEVICE SETTINGS button.](./media/enroll-device-android-work-profile/confirm-device-settings-work-profile-2307.png) + > ![Screenshot of Company Portal's Update device settings screen highlighting the RESOLVE button and CONFIRM DEVICE SETTINGS button.](./media/enroll-device-android-work-profile/confirm-device-settings-work-profile-2307.png) -11. When setup and enrollment are complete, you are sent back to the setup list, where you should see a green checkmark next to each enrollment task. Tap **DONE**. +11. When setup and enrollment are complete, you're sent back to the setup list, where you should see a green checkmark next to each enrollment task. Tap **DONE**. - ![Example image of Company Portal, Company Access Setup screen, showing completed setup and highlighting Done button.](./media/enroll-device-android-work-profile/work-profile-done-1911.png) + ![Screenshot of Company Portal's Company Access Setup screen, showing completed setup and highlighting Done button.](./media/enroll-device-android-work-profile/work-profile-done-1911.png) 12. Optionally, when prompted to view suggested work apps in Google Play Store, tap **OPEN**. If you're not ready to install apps, you can do it later by going to the Play Store app in your work profile. - ![Example image of Company Portal prompt to open badged version of Google Play.](./media/enroll-device-android-work-profile/get-apps-banner-android-2005.png) + ![Screenshot of Company Portal prompt to open badged version of Google Play.](./media/enroll-device-android-work-profile/get-apps-banner-android-2005.png) You can also access available apps from the Company Portal menu > **Get Apps**. - ![Example image of Company Portal menu, highlighting Get Apps link.](./media/enroll-device-android-work-profile/updated-drawer-android-2005.png) + ![Screenshot of the Company Portal menu, highlighting the Get Apps link.](./media/enroll-device-android-work-profile/updated-drawer-android-2005.png) ## Android Enterprise availability diff --git a/memdocs/intune/user-help/enroll-device-linux.md b/memdocs/intune/user-help/enroll-device-linux.md index 1f2146f788e..4c32be27764 100644 --- a/memdocs/intune/user-help/enroll-device-linux.md +++ b/memdocs/intune/user-help/enroll-device-linux.md @@ -7,7 +7,7 @@ keywords: author: lenewsad ms.author: lanewsad manager: dougeby -ms.date: 05/15/2024 +ms.date: 11/04/2024 ms.topic: end-user-help ms.service: microsoft-intune ms.subservice: end-user @@ -20,7 +20,7 @@ searchScope: ROBOTS: #audience: -ms.reviewer: ilwu +ms.reviewer: arnab ms.suite: ems #ms.tgt_pltfrm: ms.custom: intune-enduser @@ -34,11 +34,12 @@ ms.collection: Enroll a Linux device in Microsoft Intune to get secure access to work or school resources in Microsoft Edge. This article describes how to enroll and register a work or school-provided device on your organization's network. ## System requirements -Enrollment is supported on the following versions of Linux: -* Ubuntu Desktop 22.04 or 20.04 LTS (physical or Hyper-V machine with x86/64 CPUs) +Enrollment is supported on the following versions of Linux: + +* Ubuntu Desktop 24.04, 22.04 or 20.04 LTS (physical or Hyper-V machine with x86/64 CPUs) * RedHat Enterprise Linux 8 -* RedHat Enterprise Linux 9 +* RedHat Enterprise Linux 9 Devices must be configured with a GNOME graphical desktop environment, which is automatically included with Ubuntu Desktop 22.04 and 20.04 LTS. diff --git a/memdocs/intune/user-help/microsoft-intune-app-linux.md b/memdocs/intune/user-help/microsoft-intune-app-linux.md index 7ab06b3410e..3949bae04ee 100644 --- a/memdocs/intune/user-help/microsoft-intune-app-linux.md +++ b/memdocs/intune/user-help/microsoft-intune-app-linux.md @@ -7,7 +7,7 @@ keywords: author: lenewsad ms.author: lanewsad manager: dougeby -ms.date: 08/27/2024 +ms.date: 11/04/2024 ms.topic: end-user-help ms.service: microsoft-intune ms.subservice: end-user @@ -20,7 +20,7 @@ searchScope: ROBOTS: #audience: -ms.reviewer: ilwu +ms.reviewer: arnab ms.suite: ems #ms.tgt_pltfrm: ms.custom: intune-enduser @@ -35,11 +35,12 @@ This article describes how to install, update, and remove the Microsoft Intune a The Microsoft Intune app package is available at [https://packages.microsoft.com/](https://packages.microsoft.com/). For more information about how to use, install, and configure Linux software packages for Microsoft products, see [Linux Software Repository for Microsoft Products](/windows-server/administration/linux-package-repository-for-microsoft-software). ## Requirements + The Microsoft Intune app is supported with the following operating systems: - - Ubuntu Desktop 22.04 or 20.04 LTS (physical or Hyper-V machine with x86/64 CPUs) + - Ubuntu Desktop 24.04, 22.04 or 20.04 LTS (physical or Hyper-V machine with x86/64 CPUs) - RedHat Enterprise Linux 8 - - RedHat Enterprise Linux 9 + - RedHat Enterprise Linux 9 ## Install Microsoft Intune app for Ubuntu Desktop Run the following commands in a command line to manually install the Microsoft Intune app and its dependencies on your device. @@ -52,32 +53,26 @@ Run the following commands in a command line to manually install the Microsoft I 2. Install the Microsoft package signing key. - For Ubuntu 20.04: + ```bash + curl https://packages.microsoft.com/keys/microsoft.asc | gpg --dearmor > microsoft.gpg + sudo install -o root -g root -m 644 microsoft.gpg /usr/share/keyrings/ + rm microsoft.gpg + ``` - ```bash - curl https://packages.microsoft.com/keys/microsoft.asc | gpg --dearmor > microsoft.gpg - sudo install -o root -g root -m 644 microsoft.gpg /usr/share/keyrings/ - sudo sh -c 'echo "deb [arch=amd64 signed-by=/usr/share/keyrings/microsoft.gpg] https://packages.microsoft.com/ubuntu/20.04/prod focal main" > /etc/apt/sources.list.d/microsoft-ubuntu-focal-prod.list' - sudo rm microsoft.gpg - ``` - - For Ubuntu 22.04: +3. Add and update Microsoft Linux Repository to the system repository list. - ```bash - curl https://packages.microsoft.com/keys/microsoft.asc | gpg --dearmor > microsoft.gpg - sudo install -o root -g root -m 644 microsoft.gpg /usr/share/keyrings/ - sudo sh -c 'echo "deb [arch=amd64 signed-by=/usr/share/keyrings/microsoft.gpg] https://packages.microsoft.com/ubuntu/22.04/prod jammy main" > /etc/apt/sources.list.d/microsoft-ubuntu-jammy-prod.list' - sudo rm microsoft.gpg - ``` + ```bash + sudo sh -c 'echo "deb [arch=amd64 signed-by=/usr/share/keyrings/microsoft.gpg] https://packages.microsoft.com/ubuntu/$(lsb_release -rs)/prod $(lsb_release -cs) main" >> /etc/apt/sources.list.d/microsoft-ubuntu-$(lsb_release -cs)-prod.list' + sudo apt update + ``` -3. Install the Intune app. +4. Install the Intune app. ```bash - sudo apt update sudo apt install intune-portal ``` -4. Reboot your device. +5. Reboot your device. ### Update app for Ubuntu Desktop The Microsoft Intune app automatically updates when updates become available in Software Updater. Run the following commands to update the app manually. diff --git a/memdocs/intune/user-help/move-to-new-device-management-setup.md b/memdocs/intune/user-help/move-to-new-device-management-setup.md index 715fb4849c9..c86bf6992d1 100644 --- a/memdocs/intune/user-help/move-to-new-device-management-setup.md +++ b/memdocs/intune/user-help/move-to-new-device-management-setup.md @@ -8,7 +8,7 @@ keywords: author: lenewsad ms.author: lanewsad manager: dougeby -ms.date: 07/01/2024 +ms.date: 01/27/2025 ms.topic: end-user-help ms.service: microsoft-intune ms.subservice: end-user diff --git a/memdocs/intune/user-help/set-up-migrate-iphone-for-work.md b/memdocs/intune/user-help/set-up-migrate-iphone-for-work.md index 8a77d9abc1d..6c6501b708d 100644 --- a/memdocs/intune/user-help/set-up-migrate-iphone-for-work.md +++ b/memdocs/intune/user-help/set-up-migrate-iphone-for-work.md @@ -89,7 +89,7 @@ Set up your new iPhone. Complete these steps on your new iPhone unless otherwise 4. Initiate the device enrollment workflow: 1. On your new device, open a productivity app, such as Microsoft Teams, and sign in with your work account. 2. Complete the MFA requirements or passwordless authentication using Authenticator on your old phone. - 3. You'll get blocked by conditional access and prompted to enroll your new device. + 3. You'll get blocked by Conditional Access and prompted to enroll your new device. ## Step 3: Device enrollment When you open a productivity app, such as Microsoft Teams, and sign in with your work account, you'll be prompted to install the Company Portal app for iOS and enroll your device. Complete these steps to finish setting up your device for work. diff --git a/memdocs/intune/user-help/set-up-mobile-threat-defense.md b/memdocs/intune/user-help/set-up-mobile-threat-defense.md index ef82f76b8f4..ceb07e7f0b7 100644 --- a/memdocs/intune/user-help/set-up-mobile-threat-defense.md +++ b/memdocs/intune/user-help/set-up-mobile-threat-defense.md @@ -7,7 +7,7 @@ keywords: author: lenewsad ms.author: lanewsad manager: dougeby -ms.date: 06/27/2024 +ms.date: 01/27/2025 ms.topic: end-user-help ms.service: microsoft-intune ms.subservice: end-user diff --git a/memdocs/intune/user-help/sign-in-to-the-company-portal.md b/memdocs/intune/user-help/sign-in-to-the-company-portal.md index 47c1548cbfd..112787f6d40 100644 --- a/memdocs/intune/user-help/sign-in-to-the-company-portal.md +++ b/memdocs/intune/user-help/sign-in-to-the-company-portal.md @@ -7,7 +7,7 @@ keywords: author: lenewsad ms.author: lanewsad manager: dougeby -ms.date: 06/27/2024 +ms.date: 01/27/2025 ms.topic: end-user-help ms.service: microsoft-intune ms.subservice: end-user diff --git a/memdocs/intune/user-help/use-managed-apps-on-your-device-android.md b/memdocs/intune/user-help/use-managed-apps-on-your-device-android.md index 77a1fe37dcb..b62a120aef0 100644 --- a/memdocs/intune/user-help/use-managed-apps-on-your-device-android.md +++ b/memdocs/intune/user-help/use-managed-apps-on-your-device-android.md @@ -7,7 +7,7 @@ keywords: author: lenewsad ms.author: lanewsad manager: dougeby -ms.date: 06/27/2024 +ms.date: 01/27/2025 ms.topic: end-user-help ms.service: microsoft-intune ms.subservice: end-user diff --git a/memdocs/intune/user-help/use-managed-devices-to-get-work-done.md b/memdocs/intune/user-help/use-managed-devices-to-get-work-done.md index 3225616f27e..79a1abcfa72 100644 --- a/memdocs/intune/user-help/use-managed-devices-to-get-work-done.md +++ b/memdocs/intune/user-help/use-managed-devices-to-get-work-done.md @@ -6,7 +6,7 @@ keywords: author: lenewsad ms.author: lanewsad manager: dougeby -ms.date: 04/08/2024 +ms.date: 01/27/2025 ms.topic: end-user-help ms.localizationpriority: high ms.service: microsoft-intune diff --git a/memdocs/intune/user-help/what-info-can-your-company-see-when-you-enroll-your-device-in-intune.md b/memdocs/intune/user-help/what-info-can-your-company-see-when-you-enroll-your-device-in-intune.md index b33a93509dc..6c83ff20fc5 100644 --- a/memdocs/intune/user-help/what-info-can-your-company-see-when-you-enroll-your-device-in-intune.md +++ b/memdocs/intune/user-help/what-info-can-your-company-see-when-you-enroll-your-device-in-intune.md @@ -7,7 +7,7 @@ keywords: author: lenewsad ms.author: lanewsad manager: dougeby -ms.date: 04/24/2024 +ms.date: 01/27/2025 ms.topic: end-user-help ms.service: microsoft-intune ms.subservice: end-user diff --git a/memdocs/intune/user-help/why-enroll-android-device.md b/memdocs/intune/user-help/why-enroll-android-device.md index 5e8e11817f6..9ef0500b347 100644 --- a/memdocs/intune/user-help/why-enroll-android-device.md +++ b/memdocs/intune/user-help/why-enroll-android-device.md @@ -7,7 +7,7 @@ keywords: author: lenewsad ms.author: lanewsad manager: dougeby -ms.date: 05/15/2024 +ms.date: 01/27/2025 ms.topic: end-user-help ms.service: microsoft-intune ms.subservice: end-user diff --git a/memdocs/solutions/cloud-native-endpoints/azure-ad-joined-hybrid-azure-ad-joined.md b/memdocs/solutions/cloud-native-endpoints/azure-ad-joined-hybrid-azure-ad-joined.md index 326ec4a3ef9..44d5421d3b1 100644 --- a/memdocs/solutions/cloud-native-endpoints/azure-ad-joined-hybrid-azure-ad-joined.md +++ b/memdocs/solutions/cloud-native-endpoints/azure-ad-joined-hybrid-azure-ad-joined.md @@ -75,7 +75,7 @@ To join Windows endpoints to Microsoft Entra, you have some options: ### Organization IT benefits -- Using conditional access, you can allow or restrict access to organization resources that meet, or don't meet your requirements. +- Using Conditional Access, you can allow or restrict access to organization resources that meet, or don't meet your requirements. - Settings and work data roam through enterprise compliant clouds. No personal Microsoft accounts, like Hotmail are used, and can be blocked. - Using Windows Hello for Business, you can reduce the risk of credential theft. @@ -171,13 +171,13 @@ Microsoft Intune, which is a 100% cloud solution, can manage Windows client devi The [High level planning guide to move to cloud-native endpoints: Intune features you should know](cloud-native-endpoints-planning-guide.md#intune-features-you-should-know) lists some of these features. [What is Intune](../../intune/fundamentals/what-is-intune.md) is also a good resource. -On Hybrid Microsoft Entra Join endpoints, you can use on-premises group policies objects (GPO) or Intune to control policy settings. It's possible to also use a combination of GPO and Intune, but this combination adds administrative overhead and complexity. If you enable [co-management](../../configmgr/comanage/overview.md) (Intune (cloud) + Configuration Manager (on-premises)), then you can use some Microsoft Entra features, such as conditional access. +On Hybrid Microsoft Entra Join endpoints, you can use on-premises group policies objects (GPO) or Intune to control policy settings. It's possible to also use a combination of GPO and Intune, but this combination adds administrative overhead and complexity. If you enable [co-management](../../configmgr/comanage/overview.md) (Intune (cloud) + Configuration Manager (on-premises)), then you can use some Microsoft Entra features, such as Conditional Access. For some guidance, go to [Deployment guide: Setup or move to Microsoft Intune](../../intune/fundamentals/deployment-guide-intune-setup.md). -#### What device join states are required for device compliance and/or conditional access? +#### What device join states are required for device compliance and/or Conditional Access? -Both Hybrid Microsoft Entra Join and Microsoft Entra Join endpoints support [compliance policies](../../intune/protect/device-compliance-get-started.md) and [conditional access](../../intune/protect/conditional-access.md) when managed by Intune or co-managed by Intune and Configuration Manager. +Both Hybrid Microsoft Entra Join and Microsoft Entra Join endpoints support [compliance policies](../../intune/protect/device-compliance-get-started.md) and [Conditional Access](../../intune/protect/conditional-access.md) when managed by Intune or co-managed by Intune and Configuration Manager. #### Are there limitations for Hybrid Microsoft Entra Join? diff --git a/memdocs/solutions/cloud-native-endpoints/cloud-native-endpoints-planning-guide.md b/memdocs/solutions/cloud-native-endpoints/cloud-native-endpoints-planning-guide.md index 07a27c70f00..da54d069531 100644 --- a/memdocs/solutions/cloud-native-endpoints/cloud-native-endpoints-planning-guide.md +++ b/memdocs/solutions/cloud-native-endpoints/cloud-native-endpoints-planning-guide.md @@ -6,10 +6,9 @@ titleSuffix: Microsoft Intune description: To support hybrid and remote workers, convert or migrate your workloads to support cloud-native endpoints. This planning guide focuses on deploying apps and updates with Intune, moving from Group Policy Objects, and using Windows Autopilot. keywords: author: MandiOhlinger - ms.author: mandia manager: dougeby -ms.date: 01/09/2024 +ms.date: 01/08/2025 ms.topic: conceptual ms.service: microsoft-intune ms.subservice: @@ -143,7 +142,7 @@ Your exact workloads, details, and how to update the workloads for cloud-native - Traditional policy enforcement using group policy isn't possible with cloud-native endpoints. Instead, you can use Intune to create policies to configure many settings, including built-in features like the [Settings Catalog](../../intune/configuration/settings-catalog.md) and [administrative templates](../../intune/configuration/administrative-templates-windows.md). - [Group Policy analytics in Intune](../../intune/configuration/group-policy-analytics.md) can analyze your on-premises GPOs, see if those same settings are supported in the cloud, and create a policy using those settings. + You can reference and analyze existing GPOs using [Group Policy analytics in Intune](../../intune/configuration/group-policy-analytics.md), which allows you to see if settings within your GPOs are supported in the cloud. Group Policy analytics also allows you to create Intune policies from GPOs, if that's the right step for your organization. In general, we recommend that customers implement policies that conform to their requirements, instead of directly migrating existing GPOs to Intune. When you create policies based off your requirements, then you rationalize, optimize, and streamline your Intune policies. - If you have existing policies that issue certificates, manage BitLocker, and provide endpoint protection, then you need to create new policies in Intune or Configuration Manager (with a [CMG](../../configmgr/core/clients/manage/cmg/overview.md) and [co-management](../../configmgr/comanage/how-to-prepare-win10.md)). diff --git a/memdocs/solutions/end-to-end-guides/macos-endpoints-get-started.md b/memdocs/solutions/end-to-end-guides/macos-endpoints-get-started.md index 3c64045cf8c..061232f7df4 100644 --- a/memdocs/solutions/end-to-end-guides/macos-endpoints-get-started.md +++ b/memdocs/solutions/end-to-end-guides/macos-endpoints-get-started.md @@ -565,7 +565,7 @@ In [Phase 1 - Set up your environment](#phase-1---set-up-your-environment), you If you're deploying the VPP version of OneDrive, then enter `com.microsoft.OneDrive-Mac.FinderSync`. - During Microsoft OneDrive configuration, end users are prompted to allow sync icons by enabling the Finder Sync extension. There's a sample script that can configure the finder extension for the user. For more information on the script, go to the [GitHub - Microsoft Intune Shell samples](https://github.com/microsoft/shell-intune-samples/blob/master/macOS/Config/EnableOneDriveFinderSync/EnableOneDriveFinderSync.sh). + During Microsoft OneDrive configuration, end users are prompted to allow sync icons by enabling the Finder Sync extension. There's a sample script that can configure the finder extension for the user. For more information on the script, go to the [GitHub - Microsoft Intune Shell samples](https://github.com/microsoft/shell-intune-samples/blob/master/macOS/Config/Enable%20OneDrive%20Finder%20Sync/EnableOneDriveFinderSync.sh). ### Device Configuration diff --git a/windows-365/TOC.yml b/windows-365/TOC.yml index f047f545a2a..3ceeb9b8788 100644 --- a/windows-365/TOC.yml +++ b/windows-365/TOC.yml @@ -15,6 +15,8 @@ items: href: public-preview.md - name: Windows 365 privacy and data href: enterprise/privacy-personal-data.md +- name: Compliance overview + href: compliance-overview.md - name: Cloud PC feature support with RDP href: /azure/virtual-desktop/compare-remote-desktop-clients?pivots=windows-365 - name: What if my subscription expires? diff --git a/windows-365/breadcrumb/toc.yml b/windows-365/breadcrumb/toc.yml index 857cd0644db..bc41a493e04 100644 --- a/windows-365/breadcrumb/toc.yml +++ b/windows-365/breadcrumb/toc.yml @@ -25,4 +25,6 @@ items: - name: Windows 365 tocHref: /azure/virtual-desktop/ topicHref: /windows-365/enterprise/index - \ No newline at end of file + - name: Windows 365 Link + tocHref: /windows-365/link/ + topicHref: /windows-365/link/index \ No newline at end of file diff --git a/windows-365/business-continuity-disaster-recovery.md b/windows-365/business-continuity-disaster-recovery.md index 029605ee5dd..f9f5b181fe1 100644 --- a/windows-365/business-continuity-disaster-recovery.md +++ b/windows-365/business-continuity-disaster-recovery.md @@ -10,7 +10,7 @@ manager: dougeby ms.date: 08/28/2024 ms.topic: overview ms.service: windows-365 -ms.subservice: +ms.subservice: windows-365-business ms.localizationpriority: high ms.assetid: diff --git a/windows-365/business/TOC.yml b/windows-365/business/TOC.yml index 93968802c2d..14d1d44b87e 100644 --- a/windows-365/business/TOC.yml +++ b/windows-365/business/TOC.yml @@ -39,13 +39,7 @@ items: href: restore-overview.md - name: Identity and access management items: - - name: Set conditional access policies + - name: Set Conditional Access policies href: set-conditional-access-policies.md - name: Configure single sign-on href: configure-single-sign-on.md -- name: Troubleshoot - items: - - name: Troubleshooting - href: troubleshoot-windows-365-business.md - - name: Known issues - href: known-issues.md diff --git a/windows-365/business/add-user-assign-licenses.md b/windows-365/business/add-user-assign-licenses.md index 4cb6db510cc..8a29118d96f 100644 --- a/windows-365/business/add-user-assign-licenses.md +++ b/windows-365/business/add-user-assign-licenses.md @@ -10,7 +10,7 @@ manager: dougeby ms.date: 06/16/2023 ms.topic: how-to ms.service: windows-365 -ms.subservice: +ms.subservice: windows-365-business ms.localizationpriority: high ms.assetid: diff --git a/windows-365/business/apps-install-admin.md b/windows-365/business/apps-install-admin.md index 4a09e5dfe92..d0f04fe9b9f 100644 --- a/windows-365/business/apps-install-admin.md +++ b/windows-365/business/apps-install-admin.md @@ -10,7 +10,7 @@ ms.date: 09/26/2024 audience: Admin ms.topic: how-to ms.service: windows-365 -ms.subservice: +ms.subservice: windows-365-business ms.localizationpriority: high ms.assetid: diff --git a/windows-365/business/apps-install.md b/windows-365/business/apps-install.md index 817f2bef314..1c721bdd394 100644 --- a/windows-365/business/apps-install.md +++ b/windows-365/business/apps-install.md @@ -10,7 +10,7 @@ ms.date: 05/20/2024 audience: Admin ms.topic: how-to ms.service: windows-365 -ms.subservice: +ms.subservice: windows-365-business ms.localizationpriority: high ms.assetid: diff --git a/windows-365/business/assign-unassign-license.md b/windows-365/business/assign-unassign-license.md index 94c918765f5..d5d9513ed90 100644 --- a/windows-365/business/assign-unassign-license.md +++ b/windows-365/business/assign-unassign-license.md @@ -10,7 +10,7 @@ manager: dougeby ms.date: 09/24/2024 ms.topic: how-to ms.service: windows-365 -ms.subservice: +ms.subservice: windows-365-business ms.localizationpriority: high ms.assetid: diff --git a/windows-365/business/change-organization-default-settings.md b/windows-365/business/change-organization-default-settings.md index 1a7d17ce3d6..090838177f6 100644 --- a/windows-365/business/change-organization-default-settings.md +++ b/windows-365/business/change-organization-default-settings.md @@ -10,7 +10,7 @@ manager: dougeby ms.date: 02/21/2024 ms.topic: how-to ms.service: windows-365 -ms.subservice: +ms.subservice: windows-365-business ms.localizationpriority: high ms.assetid: diff --git a/windows-365/business/cloud-pc-location.md b/windows-365/business/cloud-pc-location.md index ba5273854b5..8a7a0588862 100644 --- a/windows-365/business/cloud-pc-location.md +++ b/windows-365/business/cloud-pc-location.md @@ -10,7 +10,7 @@ ms.date: 08/28/2024 audience: Admin ms.topic: article ms.service: windows-365 -ms.subservice: +ms.subservice: windows-365-business ms.localizationpriority: high ms.assetid: diff --git a/windows-365/business/configure-single-sign-on.md b/windows-365/business/configure-single-sign-on.md index a1b97cdb29c..cedec00d7f1 100644 --- a/windows-365/business/configure-single-sign-on.md +++ b/windows-365/business/configure-single-sign-on.md @@ -10,7 +10,7 @@ manager: dougeby ms.date: 03/27/2024 ms.topic: how-to ms.service: windows-365 -ms.subservice: +ms.subservice: windows-365-business ms.localizationpriority: high ms.assetid: @@ -39,7 +39,7 @@ To enable SSO using Microsoft Entra ID authentication, there are four tasks you 1. Configure the target device groups. -1. Review your conditional access policies. +1. Review your Conditional Access policies. 1. Configure your organizational settings to enable SSO. @@ -53,7 +53,7 @@ When SSO is enabled, users sign in to Windows using a Microsoft Entra ID authent - Users benefit from a single sign-on experience and can reconnect without authentication prompt when allowed. - Users can sign back into their session using passwordless authentication like FIDO keys. -- Conditional access policies, including multifactor authentication and sign-in frequency, are re-evaluated when the user reconnects to their session. +- Conditional Access policies, including multifactor authentication and sign-in frequency, are re-evaluated when the user reconnects to their session. ## Prerequisites @@ -186,9 +186,9 @@ To configure the service principal, use the [Microsoft Graph PowerShell SDK](/po Remove-MgServicePrincipalRemoteDesktopSecurityConfigurationTargetDeviceGroup -ServicePrincipalId $WCLspId -TargetDeviceGroupId "" ``` -## Review your conditional access policies +## Review your Conditional Access policies -When SSO is turned on, a new Microsoft Entra ID app is introduced to authenticate users to the Cloud PC. If you have conditional access policies that apply when accessing Windows 365, review the recommendations to [set conditional access policies](set-conditional-access-policies.md) for Windows 365 to make sure users have the desired experience and to secure your environment. +When SSO is turned on, a new Microsoft Entra ID app is introduced to authenticate users to the Cloud PC. If you have Conditional Access policies that apply when accessing Windows 365, review the recommendations to [set Conditional Access policies](set-conditional-access-policies.md) for Windows 365 to make sure users have the desired experience and to secure your environment. ## Turn on SSO for all Cloud PCs in your account diff --git a/windows-365/business/device-management.md b/windows-365/business/device-management.md index 9f1403438fb..8ea72eeb1c8 100644 --- a/windows-365/business/device-management.md +++ b/windows-365/business/device-management.md @@ -10,7 +10,7 @@ ms.date: 08/28/2024 audience: Admin ms.topic: how-to ms.service: windows-365 -ms.subservice: +ms.subservice: windows-365-business ms.localizationpriority: high ms.assetid: diff --git a/windows-365/business/get-started-windows-365-business.md b/windows-365/business/get-started-windows-365-business.md index 20384f662a6..b0efc479cbf 100644 --- a/windows-365/business/get-started-windows-365-business.md +++ b/windows-365/business/get-started-windows-365-business.md @@ -10,7 +10,7 @@ ms.date: 03/27/2024 audience: Admin ms.topic: how-to ms.service: windows-365 -ms.subservice: +ms.subservice: windows-365-business ms.localizationpriority: high ms.assetid: diff --git a/windows-365/business/in-development.md b/windows-365/business/in-development.md index fb9d55a8a59..6e2b6a3b77c 100644 --- a/windows-365/business/in-development.md +++ b/windows-365/business/in-development.md @@ -7,7 +7,7 @@ keywords: author: ErikjeMS ms.author: erikje manager: dougeby -ms.date: 09/25/2024 +ms.date: 12/13/2024 ms.topic: conceptual ms.service: windows-365 @@ -22,6 +22,7 @@ search.appverid: MET150 ms.collection: - M365-identity-device-management - tier2 +ms.subservice: windows-365-business --- # In development for Windows 365 Business @@ -50,11 +51,7 @@ To help in your readiness and planning, this page lists Windows 365 Business upd --> -## Device management - -### Upgrade Cloud PCs to more storage, RAM, and CPU - -By using the upcoming Resize action, you'll be able to upgrade Cloud PCs to more storage, RAM, and CPU. + ## Monitor and troubleshoot @@ -64,11 +61,7 @@ By using the upcoming Resize action, you'll be able to upgrade Cloud PCs to more End users will be able to manually run connectivity checks on their Cloud PCs from [windows365.microsoft.com](https://windows365.microsoft.com). -## Security - -### Single sign-on (public preview) - -Windows 365 Business will support single sign-on for new and existing Cloud PCs. You'll be able to turn on single sign-on in **Organizational settings**. When turned on, users no longer have to sign in to the operating system. + ## Next steps diff --git a/windows-365/business/index.yml b/windows-365/business/index.yml index 840a6f7cf57..e7a371dc4ca 100644 --- a/windows-365/business/index.yml +++ b/windows-365/business/index.yml @@ -11,6 +11,7 @@ metadata: manager: dougeby ms.date: 05/14/2024 ms.collection: essentials-navigation + ms.subservice: windows-365-business highlightedContent: items: diff --git a/windows-365/business/known-issues.md b/windows-365/business/known-issues.md deleted file mode 100644 index 38acf8bc5a8..00000000000 --- a/windows-365/business/known-issues.md +++ /dev/null @@ -1,100 +0,0 @@ ---- -title: Known issues for Windows 365 Business Cloud PC -description: Learn about known issues for Windows 365 Business. -f1.keywords: -- NOCSH -ms.author: erikje -author: ErikjeMS -manager: dougeby -ms.date: 08/28/2024 -audience: Admin -ms.topic: troubleshooting -ms.service: windows-365 -ms.subservice: -ms.localizationpriority: high -ms.assetid: - -# optional metadata - -#ROBOTS: -#audience: - -ms.reviewer: ivivano -ms.suite: ems -search.appverid: MET150 -#ms.tgt_pltfrm: -ms.custom: get-started -ms.collection: -- M365-identity-device-management -- tier2 ---- - -# Known issues: Windows 365 Business - -The following items are known issues for Windows 365 Business. - -## Microsoft 365 Business Standard not activating on Cloud PCs - -If a user tries to use a Microsoft 365 Business Standard license on their Cloud PC, they might see the following error: - -``Account Issue: The products we found in your account cannot be used to activate Office in shared computer scenarios.`` - -### Troubleshooting steps - -The user should uninstall the version of Office installed on their Cloud PC and install a new copy from Office.com. - -## Some websites might display the wrong language - -Some websites that are accessed from a Cloud PC use its IP address to determine how content is displayed. Therefore, users might see content based on where the Cloud PC was created, instead of content based on where the user is located. - -### Troubleshooting steps - -There are two workarounds for this issue: - -#### Change language/locale in URLs - -Users can manually change their language/locale in the URL for most websites. - -For example, in the following URL, change the language/locale from `en-us` to `fr-fr` to get the French version: - -Before: `https://learn.microsoft.com/en-us/microsoft-365/admin/setup/get-started-windows-365-business` - -After: `https://learn.microsoft.com/fr-fr/microsoft-365/admin/setup/get-started-windows-365-business` - -#### Set search engine location - -Users can manually set their internet search engine's location. For example, on Bing.com users can visit the **Settings** menu (in the top-right corner of the site) to manually set the Language, Country/Region, and Location. - -## Microsoft Narrator screen reader not turned on - -When users sign into their Cloud PCs from windows365.microsoft.com, the Microsoft Narrator screen reader isn't turned on. - -### Troubleshooting steps - -To turn on Narrator when accessing your Cloud PC from the web interface: - -1. Go to [Windows 365](https://windows365.microsoft.com/). - -2. Sign into your Cloud PC. - -3. On your keyboard, press Alt+F3+Ctrl+Enter. - -## Sending outbound email messages using port 25 isn't supported - -Sending outbound email messages directly on port 25 from a Windows 365 Business Cloud PC isn't supported. Communication over port TCP/25 is blocked at the Windows 365 Business network layer for security reasons. - -### Troubleshooting steps - -If your email service uses Simple Mail Transfer Protocol (SMTP) for your email client application, you can use their web interface, if available. - -Or you can ask your email service provider for help with configuring their email client app to use secure SMTP over Transport Layer Security (TLS), which uses a different port. - -## Virtual Private Network support - -Because of the many Virtual Private Network (VPN) solutions available, Microsoft can't confirm which services work with Windows 365 Business. If you need more information, consult with your VPN provider. For organizations that have advanced networking needs, Windows 365 Enterprise is recommended. For more information, see [Network requirements](../enterprise/requirements-network.md). - -[!INCLUDE [Missing start menu and taskbar when using iPad and the Remote Desktop app to access a Cloud PC](../includes/known-issues.md)] - -## Next steps - -[Troubleshoot Windows 365 Business Cloud PC setup issues](troubleshoot-windows-365-business.md) diff --git a/windows-365/business/remotely-manage-business-cloud-pcs.md b/windows-365/business/remotely-manage-business-cloud-pcs.md index 44e5a866fec..72d1106514d 100644 --- a/windows-365/business/remotely-manage-business-cloud-pcs.md +++ b/windows-365/business/remotely-manage-business-cloud-pcs.md @@ -10,7 +10,7 @@ manager: dougeby ms.date: 03/27/2024 ms.topic: how-to ms.service: windows-365 -ms.subservice: +ms.subservice: windows-365-business ms.localizationpriority: high ms.assetid: diff --git a/windows-365/business/reset-user-password.md b/windows-365/business/reset-user-password.md index 6f9c7adeab2..81affa69867 100644 --- a/windows-365/business/reset-user-password.md +++ b/windows-365/business/reset-user-password.md @@ -10,7 +10,7 @@ manager: dougeby ms.date: 09/24/2024 ms.topic: how-to ms.service: windows-365 -ms.subservice: +ms.subservice: windows-365-business ms.localizationpriority: high ms.assetid: diff --git a/windows-365/business/resize-cloud-pc.md b/windows-365/business/resize-cloud-pc.md index 01fe58cad8e..cd27454f3ed 100644 --- a/windows-365/business/resize-cloud-pc.md +++ b/windows-365/business/resize-cloud-pc.md @@ -10,7 +10,7 @@ manager: dougeby ms.date: 10/01/2024 ms.topic: how-to ms.service: windows-365 -ms.subservice: +ms.subservice: windows-365-business ms.localizationpriority: high ms.assetid: diff --git a/windows-365/business/restore-overview.md b/windows-365/business/restore-overview.md index 125f0571d85..d0c44adcf94 100644 --- a/windows-365/business/restore-overview.md +++ b/windows-365/business/restore-overview.md @@ -10,7 +10,7 @@ manager: dougeby ms.date: 08/28/2024 ms.topic: conceptual ms.service: windows-365 -ms.subservice: +ms.subservice: windows-365-business ms.localizationpriority: high ms.assetid: diff --git a/windows-365/business/set-conditional-access-policies.md b/windows-365/business/set-conditional-access-policies.md index 2cb033ed0a3..cb258e421ee 100644 --- a/windows-365/business/set-conditional-access-policies.md +++ b/windows-365/business/set-conditional-access-policies.md @@ -1,8 +1,8 @@ --- # required metadata -title: Set conditional access policies for Windows 365 Business +title: Set Conditional Access policies for Windows 365 Business titleSuffix: -description: Learn how to set conditional access policies for Windows 365 Business. +description: Learn how to set Conditional Access policies for Windows 365 Business. keywords: author: ErikjeMS ms.author: erikje @@ -10,7 +10,7 @@ manager: dougeby ms.date: 07/26/2024 ms.topic: how-to ms.service: windows-365 -ms.subservice: +ms.subservice: windows-365-business ms.localizationpriority: high ms.assetid: @@ -29,7 +29,7 @@ ms.collection: - tier2 --- -# Set conditional access policies for Windows 365 Business +# Set Conditional Access policies for Windows 365 Business Conditional Access is the protection of regulated content in a system by requiring certain criteria to be met before granting access to the content. Conditional Access policies at their simplest are if-then statements. If a user wants to access a resource, then they must complete an action. For example, a payroll manager wants to access the payroll application and is required to perform multi-factor authentication (MFA) to do so. @@ -51,7 +51,7 @@ Conditional Access policies aren't set for your tenant by default. You can targ No matter which method you use, the policies will be enforced on the Cloud PC End-user portal and the connection to the Cloud PC. -1. Sign in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), select **Endpoint security** > **Conditional access** > **Create new policy**. +1. Sign in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), select **Endpoint security** > **Conditional Access** > **Create new policy**. 1. Provide a **Name** for your specific Conditional Access policy. 1. Under **Users**, select **0 users and groups selected**. 1. Under the **Include** tab, select **Select users and groups** and check **Users and groups**. If the new pane doesn't open automatically, select **0 users and groups selected**. @@ -63,13 +63,13 @@ No matter which method you use, the policies will be enforced on the Cloud PC En - **Azure Virtual Desktop** (app ID 9cdead84-a844-4324-93f2-b2e6bb768d07). This app may also appear as **Windows Virtual Desktop**. This app is used to authenticate to the Azure Virtual Desktop Gateway during the connection and when the client sends diagnostic information to the service. - **Microsoft Remote Desktop** (app ID a4a365df-50f1-4397-bc59-1a1564b8bb9c) and **Windows Cloud Login** (app ID 270efc09-cd0d-444b-a71f-39af4910ec45). These apps are only needed when you [configure single sign-on](configure-single-sign-on.md) in your environment. These apps are used to authenticate users to the Cloud PC. - It's recommended to match conditional access policies between these apps. This ensures that the policy applies to the Cloud PC End-user portal, the connection to the Gateway and the Cloud PC for a consistent experience. If you want to exclude apps, you must also choose all of these apps. + It's recommended to match Conditional Access policies between these apps. This ensures that the policy applies to the Cloud PC End-user portal, the connection to the Gateway and the Cloud PC for a consistent experience. If you want to exclude apps, you must also choose all of these apps. > [!IMPORTANT] > With single sign-on enabled, authentication to the Cloud PC uses the **Microsoft Remote Desktop** Entra ID app today. An upcoming change will transition the authentication to the **Windows Cloud Login** Entra ID app. To ensure a smooth transition, you need to add both Entra ID apps to your CA policies. > [!NOTE] - > If you don't see the Windows Cloud Login app when configuring your conditional access policy, use the steps below to create the app. You must have Owner or Contributor permissions on the subscription to make these changes: + > If you don't see the Windows Cloud Login app when configuring your Conditional Access policy, use the steps below to create the app. You must have Owner or Contributor permissions on the subscription to make these changes: > > 1. Sign into the [Azure Portal](https://portal.azure.com). > 1. Select **Subscriptions** from the list of Azure Services. @@ -77,7 +77,7 @@ No matter which method you use, the policies will be enforced on the Cloud PC En > 1. Select **Resource providers** then select **Microsoft.DesktopVirtualization**. > 1. Select **Register** at the top. > - > After the resource provider is registered, the Windows Cloud Login app appears in the conditional access policy configuration when selecting apps to apply the policy to. If you aren't using Azure Virtual Desktop, you can unregister the Microsoft.DesktopVirtualization resource provider after the Windows Cloud Login app is available. + > After the resource provider is registered, the Windows Cloud Login app appears in the Conditional Access policy configuration when selecting apps to apply the policy to. If you aren't using Azure Virtual Desktop, you can unregister the Microsoft.DesktopVirtualization resource provider after the Windows Cloud Login app is available. 1. If you want to fine-tune your policy, under **Grant**, choose **0 controls selected**. 1. In the **Grant** pane, choose the grant or block access options that you want to apply to all objects assigned to this policy, then select **Select**. 1. If you want to test your policy first, under **Enable policy**, select **Report-only**. If you set it to **On**, the policy will be applied as soon as you create it. diff --git a/windows-365/business/troubleshoot-windows-365-business.md b/windows-365/business/troubleshoot-windows-365-business.md deleted file mode 100644 index 4ca144a4364..00000000000 --- a/windows-365/business/troubleshoot-windows-365-business.md +++ /dev/null @@ -1,104 +0,0 @@ ---- -title: Troubleshoot Windows 365 Business Cloud PC setup issues -description: Troubleshoot issues in Windows 365 Business. -f1.keywords: -- NOCSH -ms.author: erikje -author: ErikjeMS -manager: dougeby -ms.date: 06/15/2023 -audience: Admin -ms.topic: article -ms.service: windows-365 -ms.subservice: -ms.localizationpriority: high -ms.assetid: - -# optional metadata - -#ROBOTS: -#audience: - -ms.reviewer: ivivano -ms.suite: ems -search.appverid: MET150 -#ms.tgt_pltfrm: -ms.custom: intune-azure; get-started -ms.collection: -- M365-identity-device-management -- tier2 ---- - -# Troubleshoot Windows 365 Business Cloud PC setup issues - -If your users get the “Setup failed” error, or if setup takes longer than 90 minutes after you assign them a license, use the steps in this article to resolve the issue. - -> [!IMPORTANT] -> You must be a Global admin to do most of the tasks described in this article. If other admin roles can be used for a specific procedure, they are noted before the procedure. If you don’t have permission to log in to or access parts of the Azure portal, contact your IT admin. For more information about Azure rules, see [Microsoft Entra built-in roles](/azure/active-directory/roles/permissions-reference). To learn more about the Azure portal, see [Azure portal overview](/azure/azure-portal/azure-portal-overview). - - -## Make sure MDM authority configuration is set up correctly - -It’s possible that the setup failure is caused by the MDM authority configuration in your environment. If so, you have two paths to follow, depending on whether you plan to use Microsoft Intune to manage the Cloud PCs. - -- If you use or plan to use Microsoft Intune for your Cloud PCs, follow the steps in [Path A: Make sure the Mobility (MDM and MAM) settings are correctly configured](#path-a-use-microsoft-intune-to-manage-your-cloud-pcs). -- If you don’t plan to use Microsoft Intune to manage your Cloud PCs, follow steps in [Path B: Turn off automatic MDM enrollment](#path-b-turn-off-automatic-mdm-enrollment-and-intune-enrollment-in-organization-settings). - -### Path A. Use Microsoft Intune to manage your Cloud PCs - -If you already use Microsoft Intune, or plan to use it to manage your Windows 365 Cloud PCs, make sure that your **Mobility (MDM and MAM)** settings in Microsoft Entra ID are correctly configured. - -1. In the Azure portal, go to the [Microsoft Entra Overview](https://go.microsoft.com/fwlink/p/?linkid=516942) page. -2. In the left nav, under **Manage**, select **Mobility (MDM and MAM)**, then select **Microsoft Intune**. -3. On the **Configure** page, next to **MDM user scope**, select **Some** or **All**, then select **Save**. -4. In the left nav, under **Manage**, select **Mobility (MDM and MAM)**, select **Microsoft Intune Enrollment**, then repeat step 3. - -If the automatic enrollment of new Cloud PCs into Microsoft Intune setting is turned on, users may see their Cloud PCs fail to complete their setup in the Windows 365 home page. This failure can be caused by various settings on your tenant. Consult the following table for how to troubleshoot these issues. - -| Error | Troubleshooting steps | -| --- | --- | -| To complete the setup, ask your administrator to resolve the following: - Update policy settings in Microsoft Intune to enroll this device. | Check the Intune settings you may have previously set on your tenant. For more, see [Troubleshoot policies and profiles](/troubleshoot/mem/intune/device-configuration/troubleshoot-policies-in-microsoft-intune). Once the issue has been fixed, either you or the user can reset the Cloud PC. | -| To complete the setup, ask your administrator to resolve the following: - Remove restrictions preventing Intune from allowing Windows enrollment.| You may have set up enrollment restrictions on your Intune tenant. For more information, see [Enrollment restrictions overview](/mem/intune/enrollment/enrollment-restrictions-set). Once the restrictions have been removed, either you or the user can reset the Cloud PC. | -| To complete the setup, ask your administrator to resolve the following:- Correct the configuration of the Mobile Device Management discovery URL in Intune.| Confirm that the MDM discovery URL is the default for Intune. Follow steps 1-4 to set it in [Configure automatic MDM enrollment](/mem/intune/enrollment/windows-enroll#configure-automatic-mdm-enrollment). Once the MDM discovery URL has been set to the default, either you or the user can reset the Cloud PC. | - -Users who are assigned a Cloud PC must have an Intune license assigned to them to receive user policies. The CloudPCBPRT system account doesn't need to be assigned an Intune license. - -> [!IMPORTANT] -> To assign licenses, you must be a Global or Licensing admin, or have a role with licensing permissions. - -1. In the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/p/?linkid=2169290), select **Users** > **All Users**. -2. In the **All users** list, select a user. -3. On the user **Profile** page, select **Licenses**. -4. On the **Licenses** page, select **Assignments**. -5. Find **Intune**, select the checkbox, then select **Save**. The user account now has the permissions needed to use the service and enroll devices. -6. Go to [Reset your Cloud PCs](#reset-your-cloud-pcs). - -### Path B. Turn off automatic MDM enrollment and Intune enrollment in Organization Settings - -If you don’t plan to use Microsoft Intune for your Cloud PC management, you must turn off automatic MDM enrollment and uncheck Enroll new Cloud PCs in Microsoft Intune in Organization Settings. - -> [!IMPORTANT] -> If you’re not the MDM administrator, don’t use either of the following procedures without first consulting with your IT admin. Only follow these procedures if Cloud PCs aren’t being set up. Any configuration changes could impact your management environment. If you need help, [contact Intune support](/mem/get-support). - - - -#### Use the Microsoft Entra portal to turn off automatic Intune enrollment - -1. In the Azure portal, go to the [Microsoft Entra Overview](https://go.microsoft.com/fwlink/p/?linkid=516942) page. -2. In the left nav, under **Manage**, select **Mobility (MDM and MAM)**, then select **Microsoft Intune**. -3. On the **Configure** page, you'll see one of two things. If you have a Microsoft Entra ID P1 or P2 subscription, select **None** next to MDM user scope, then select **Save**. If you don't have a Microsoft Entra ID P1 or P2 subscription, select **Disable**. -4. In the left nav, under **Manage**, select **Mobility (MDM and MAM)**, select **Microsoft Intune Enrollment**. -5. Go to [Reset your Cloud PCs](#reset-your-cloud-pcs). - -#### Turn off the automatic enrollment of newly created Cloud PCs - -1. In the [Windows 365 home page](https://windows365.microsoft.com), go to **Your organization's Cloud PCs", then select **Update organization settings**. -2. On the right-hand side, scroll down to **Microsoft Intune** and unselect the **Enroll new Cloud PCs in Microsoft Intune** checkbox. -3. Click Save at the bottom. - -## Reset your Cloud PCs - -After you complete the troubleshooting steps in this article, your users must restart their Cloud PC setup. Tell all Cloud PC users who saw the “Setup failed” error to use the following steps to reset their Cloud PCs. - -1. On the [Windows 365 home page](https://windows365.microsoft.com), select the gear icon for any Cloud PC that has the “Setup failed” status, then select **Reset**. This action restarts the setup process. -2. After the reset, if the “Setup failed” error still displays, and you skipped [Make sure MDM authority configuration is set up correctly](#make-sure-mdm-authority-configuration-is-set-up-correctly), complete that step, then reset the CloudPC again. Otherwise, in the left nav, select **New support request** to open a support ticket. diff --git a/windows-365/business/whats-new.md b/windows-365/business/whats-new.md index e8a56f9e8da..83c6b4d270c 100644 --- a/windows-365/business/whats-new.md +++ b/windows-365/business/whats-new.md @@ -10,7 +10,7 @@ manager: dougeby ms.date: 07/31/2024 ms.topic: conceptual ms.service: windows-365 -ms.subservice: +ms.subservice: windows-365-business ms.localizationpriority: high ms.assetid: diff --git a/windows-365/business/windows-365-business-sizing.md b/windows-365/business/windows-365-business-sizing.md index ce0b7d1fbe7..38f6ba5e066 100644 --- a/windows-365/business/windows-365-business-sizing.md +++ b/windows-365/business/windows-365-business-sizing.md @@ -10,7 +10,7 @@ ms.date: 08/28/2024 audience: Admin ms.topic: article ms.service: windows-365 -ms.subservice: +ms.subservice: windows-365-business ms.localizationpriority: high ms.assetid: diff --git a/windows-365/compliance-overview.md b/windows-365/compliance-overview.md new file mode 100644 index 00000000000..757e7d2083e --- /dev/null +++ b/windows-365/compliance-overview.md @@ -0,0 +1,87 @@ +--- +title: Compliance in Windows 365 +author: erikjeMS +ms.author: erikje +manager: dougeby +audience: ITPro +ms.topic: conceptual +ms.service: windows-365 +ms.collection: + - tier1 + - essentials-compliance +ms.localizationpriority: medium +description: Learn about compliance certifications, dependencies, and features in Windows 365 supporting data protection and regulatory requirements. +ms.date: 12/9/2024 +--- + +# Compliance in Windows 365 + +Windows 365 supports compliance features to help organizations meet national, regional, and industry-specific regulations. Windows 365 align with Microsoft's commitment to data protection, privacy, and compliance, offering tools to help secure and manage data effectively. + +## Shared responsibility model + +Microsoft ensures that Windows 365 complies with various industry standards and regulatory frameworks. However, customers are responsible for implementing their data protection and compliance strategies to align with their specific organizational requirements. + +## Compliance certifications + +Windows 365 are covered under several compliance certifications and regulatory standards. The following table provides a sample of the key certifications that are covered: + +| Certification or Standard | Description | Applicability | +|---------------------------|-------------|---------------| +| [GDPR](/compliance/regulatory/gdpr) | EU General Data Protection Regulation for data privacy | European Union | +| [ISO 27001](/compliance/regulatory/offering-iso-27001) | International standard for information security management | Global | +| [HIPAA](/compliance/regulatory/offering-hipaa-hitech) | U.S. Health Insurance Portability and Accountability Act | United States | + +> [!NOTE] +> Windows 365 helps your organization meet regulatory compliance standards. Windows 365 supports additional certifications, such as [ISO 22301](/compliance/regulatory/offering-iso-22301), [ISO/IEC 27017](/compliance/regulatory/offering-iso-27017), [ISO/IEC 27018](/compliance/regulatory/offering-iso-27018), and [ISO/IEC 27701](/compliance/regulatory/offering-iso-27701). + +For additional certifications, visit [Microsoft Compliance Offerings](/compliance/regulatory/offering-home). + +## Compliance dependencies + +Windows 365 leverages other Microsoft services for compliance, including: + +- [Microsoft Purview](/purview/purview): A suite of data governance and compliance tools. +- [Microsoft Entra ID](/entra/fundamentals/whatis): Identity and access management, formerly known as Azure Active Directory (Azure AD). +- [Microsoft Purview Compliance Manager](/purview/compliance-manager): Tools for managing compliance across your organization. +- [Microsoft Intune](/mem): Enforces device compliance and Conditional Access policies to protect access to Windows 365 Cloud PCs. + +## Microsoft Intune capabilities for compliance + +Microsoft Intune helps enforce compliance policies and protect organizational data specifically for Windows 365: + +- **Conditional Access**: Ensures only compliant devices running Windows 365 can access sensitive data. See [Conditional Access](/mem/intune/protect/conditional-access). +- **Device Compliance Enforcement**: Enforces device compliance policies to meet organizational security requirements. See [Device Compliance Policies](/mem/intune/protect/device-compliance-get-started). + +For more information about Intune compliance capabilities, visit the [Microsoft Intune documentation](/mem). + +## Data location and encryption + +Windows 365 supports compliance with data residency requirements by supporting Microsoft Cloud's regional and global data storage policies. These policies include: + +- Data location: Data is stored in Microsoft-managed data centers. For more information, see [Windows 365 data storage](enterprise/privacy-personal-data.md#windows-365-data-storage). +- Encryption: Data is encrypted at rest and in transit. For more information, see [Data encryption in Windows 365](enterprise/encryption.md). + +## Compliance features + +Windows 365 includes several compliance features that help organizations meet regulatory requirements, manage data lifecycles, and protect sensitive information. These features are designed to ensure your organization can effectively monitor, classify, and safeguard its data while maintaining compliance with industry standards. + +### Data lifecycle management + +Windows 365 supports data lifecycle management through retention policies and labels. These features help organizations retain or delete data based on compliance requirements. For setup instructions, see [How long is customer data and customer content stored?](enterprise/privacy-personal-data.md#how-long-is-customer-data-and-customer-content-stored) + +### Auditing and reporting + +Microsoft Purview supports auditing and reporting for Windows 365. IT administrators can monitor data usage and ensure adherence to organizational compliance policies. For more information, visit the [Microsoft Purview Customer Key for Windows 365 Cloud PCs](enterprise/purview-customer-key.md). + +### Privacy controls + +Windows 365 includes privacy controls to manage data collection, storage, and sharing: + +For details about privacy, see [Privacy, customer data, and customer content in Windows 365](enterprise/privacy-personal-data.md). + +## Related articles + +- [Microsoft Privacy Statement](https://privacy.microsoft.com/privacystatement) +- [Microsoft Trust Center](https://www.microsoft.com/trust-center) +- [Microsoft Purview compliance portal](https://compliance.microsoft.com/) diff --git a/windows-365/end-user-access-cloud-pc.md b/windows-365/end-user-access-cloud-pc.md index 16e4e1aeba7..330bf46d79d 100644 --- a/windows-365/end-user-access-cloud-pc.md +++ b/windows-365/end-user-access-cloud-pc.md @@ -33,7 +33,7 @@ ms.collection: Users can access their Cloud PCs in accordance with the matrix below: -| Windows 365 Edition | [Windows 365 app](https://support.microsoft.com/topic/cbb0d4d5-69d4-4f00-b050-6dc7a02d02d0) | [windows365.microsoft.com](https://Windows365.microsoft.com) web client | [Microsoft Remote Desktop](#remote-desktop) | [LG Web OS](#lg-webos-23) | +| Windows 365 Edition | [Windows App](/windows-app/overview) | [windows365.microsoft.com](https://Windows365.microsoft.com) web client | [Microsoft Remote Desktop](#remote-desktop) | [LG Web OS](#lg-webos-23) | |--|--|--|--|--| | Windows 365 Business | X | X | X | X | | Windows 365 Enterprise | X | X | X | X | diff --git a/windows-365/end-user-hardware-requirements.md b/windows-365/end-user-hardware-requirements.md index c5472287fca..3b9721bef17 100644 --- a/windows-365/end-user-hardware-requirements.md +++ b/windows-365/end-user-hardware-requirements.md @@ -37,10 +37,6 @@ To access their Cloud PC, an end-user's hardware must meet certain requirements. For more information about the requirements of running and using Windows App, see [Get started with Windows App](/windows-app/get-started-connect-devices-desktops-apps). -## Windows 365 app - -For information about the requirements for running the Windows 365 app, see the [Windows 365 end user documentation](https://support.microsoft.com/topic/cbb0d4d5-69d4-4f00-b050-6dc7a02d02d0 ). - ## Microsoft Remote Desktop client for Windows Downloads available for: diff --git a/windows-365/enterprise/TOC.yml b/windows-365/enterprise/TOC.yml index aa21e6ee8c8..7f0499979bd 100644 --- a/windows-365/enterprise/TOC.yml +++ b/windows-365/enterprise/TOC.yml @@ -181,7 +181,7 @@ items: href: forensic-evidence-set-up.md - name: Identity and access management items: - - name: Set conditional access policies + - name: Set Conditional Access policies href: set-conditional-access-policies.md - name: Configure single sign-on href: configure-single-sign-on.md @@ -223,6 +223,8 @@ items: href: rdp-shortpath-private-networks.md - name: Reprovision a Cloud PC href: reprovision-cloud-pc.md + - name: Bulk reprovision Frontline Cloud PCs + href: frontline-shared-bulk-reprovision.md - name: Windows 365 Switch href: windows-365-switch-overview.md - name: Resize a Cloud PC @@ -299,38 +301,17 @@ items: href: ../end-user-access-cloud-pc.md - name: Troubleshoot items: - - name: Troubleshooting - href: troubleshooting.md - - name: Known issues - href: known-issues-enterprise.md - - name: Azure network connections - href: troubleshoot-azure-network-connection.md - - name: Azure network connection health checklist - href: health-checks.md - - name: Connectivity health checks - href: health-checks-connectivity.md - - name: Remote Desktop client - href: /azure/virtual-desktop/troubleshoot-client?context=/windows-365/context/pr-context - - name: Connection errors - href: connection-errors.md - - name: Provisioning errors - href: provisioning-errors.md - - name: Partner connectors - href: troubleshoot-partner-connector.md - - name: Windows 365 app - href: troubleshoot-windows-365-app.md - - name: Windows 365 Boot - href: troubleshoot-windows-365-boot.md - - name: Windows 365 Boot known issues - href: windows-365-boot-known-issues.md - - name: Windows 365 Switch known issues - href: windows-365-switch-known-issues.md + - name: Troubleshooting + href: troubleshooting.md + - name: Connectivity health checks + href: health-checks-connectivity.md + - name: Remote Desktop client + href: /azure/virtual-desktop/troubleshoot-client?context=/windows-365/context/pr-context - name: Reference items: - - name: Get audit logs by using PowerShell - href: get-cloud-pc-audit-logs-using-powershell.md - - name: Business continuity and disaster recovery - href: business-continuity-disaster-recovery.md - - name: Windows 365 Graph APIs - href: permission-scopes.md - + - name: Get audit logs by using PowerShell + href: get-cloud-pc-audit-logs-using-powershell.md + - name: Business continuity and disaster recovery + href: business-continuity-disaster-recovery.md + - name: Windows 365 Graph APIs + href: permission-scopes.md diff --git a/windows-365/enterprise/alerts.md b/windows-365/enterprise/alerts.md index 05a6ebe2e55..b2acbc4d330 100644 --- a/windows-365/enterprise/alerts.md +++ b/windows-365/enterprise/alerts.md @@ -31,13 +31,15 @@ ms.collection: # Alerts in Windows 365 -The Windows 365 Alerts system notifies you when specific events occur in your Cloud PC environment, like connection, provisioning, or image upload failures. By default, these alerts appear in the Microsoft Intune admin center as pop-up notifications (you can also turn on email notifications). You can customize the built-in alert rules: +The Windows 365 Alerts system notifies you when specific events occur in your Cloud PC environment, like connection, provisioning, or image upload failures. There are also alerts to notify you when you've reached or passed the maximum concurrency threshold for Windows 365 Frontline Cloud PCs. By default, alerts appear in the Microsoft Intune admin center as pop-up notifications (you can also turn on email notifications). You can customize the built-in alert rules: - Set conditions and thresholds for triggering alerts. - Define the severity of alerts. - Turn each alert rule on or off. - Configure each alert to notify you in the console and/or by email. +If emails are turned on, when an alert rule is triggered, one email is sent to the designated email address. After the alert is resolved, if it's triggered again, anohter emila is sent to the designated address. + ## Requirements To see alerts, your account must meet the following requirements: diff --git a/windows-365/enterprise/architecture.md b/windows-365/enterprise/architecture.md index 924fde7b5e0..34d1937f44c 100644 --- a/windows-365/enterprise/architecture.md +++ b/windows-365/enterprise/architecture.md @@ -107,7 +107,7 @@ Microsoft Entra ID provides user authentication and authorization for both the W - cookie persistence for the Windows 365 web portal - device compliance controls -For more information on how to use Microsoft Entra Conditional Access with Windows 365, see [Set conditional access policies](set-conditional-access-policies.md). +For more information on how to use Microsoft Entra Conditional Access with Windows 365, see [Set Conditional Access policies](set-conditional-access-policies.md). ### Active Directory Domain Services diff --git a/windows-365/enterprise/assign-licenses.md b/windows-365/enterprise/assign-licenses.md index 9140b46e0a9..6a662eb4e23 100644 --- a/windows-365/enterprise/assign-licenses.md +++ b/windows-365/enterprise/assign-licenses.md @@ -7,7 +7,7 @@ keywords: author: ErikjeMS ms.author: erikje manager: dougeby -ms.date: 07/24/2024 +ms.date: 10/15/2024 ms.topic: how-to ms.service: windows-365 ms.subservice: windows-365-enterprise @@ -32,7 +32,11 @@ ms.collection: # Assign licenses -Before a user can use a Cloud PC, you must assign a [Windows 365 license](https://www.microsoft.com/windows-365/all-pricing) to that user. You can assign the licenses using either of these methods: +[Windows 365 licenses](https://www.microsoft.com/windows-365/all-pricing) must be assigned before users can use a Cloud PC. + +## Windows 365 Enterprise + +Before a user can use a Cloud PC, you must assign a [Windows 365 license](https://www.microsoft.com/windows-365/all-pricing) to that user. You can assign the licenses using any of these methods: - Microsoft 365 admin center for individual users. For steps on how to use admin center to assign licenses, see [Assign licenses to users](/microsoft-365/admin/manage/assign-licenses-to-users). - [Microsoft Entra admin center](https://aad.portal.azure.com/) for group license assignments. For more information about group license assignments, see [Assign licenses to users by group membership in Microsoft Entra ID](/azure/active-directory/enterprise-users/licensing-groups-assign). @@ -40,8 +44,8 @@ Before a user can use a Cloud PC, you must assign a [Windows 365 license](https: ## Windows 365 Frontline -This article doesn't apply to Windows 365 Frontline. Windows 365 Frontline licenses are managed directly in provisioning policies when assigning users in a targeted Microsoft Entra group. +Licenses for Windows 365 Frontline are assigned to your tenant and shared across Cloud PCs provisioned in dedicated mode and shared mode. The licenses are assigned by selecting a Microsoft Entra group during the [creation of provisioning policies](create-provisioning-policy.md). -## Next steps +## Next steps [Create Azure network connection](create-azure-network-connection.md). diff --git a/windows-365/enterprise/assign-users-as-local-admin.md b/windows-365/enterprise/assign-users-as-local-admin.md index 094e4dc8273..441e9d49c39 100644 --- a/windows-365/enterprise/assign-users-as-local-admin.md +++ b/windows-365/enterprise/assign-users-as-local-admin.md @@ -37,15 +37,17 @@ The **User settings** page lets IT administrators manage the following settings - **Enable local admin**: If enabled, each user in the assigned groups is elevated to a local administrator of each of their own Cloud PCs. These permissions apply at the user level. - **Enable users to reset their Cloud PCs**: If enabled, a **Reset** option is shown in the Windows App and portal for users in the assigned groups. Resetting wipes and reprovisions the Cloud PC, deleting all user data and apps. - **Allow user to initiate restore service**: If enabled, each user in the assigned groups can restore their own Cloud PCs to any available backup version. +- **Cross region disaster recovery configuration (optional)**: Lets you protect Cloud PCs during regional outages. For more information, see [Cross region disaster recovery](cross-region-disaster-recovery.md). When managing settings, keep the following points in mind: - The settings can be applied before or after a Cloud PC is assigned. - Changes to the settings take effect when the user logs on. If the user is currently logged on, they must sign out and then sign in again to see the change. +- User settings don't apply to Windows 365 Frontline Cloud PCs in shared mode. ## Add a new setting -1. Sign in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), select **Devices** > **Windows 365** (under **Provisioning**) > **...** > **User Settings** > **Add**. +1. Sign in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), select **Devices** > **Windows 365** (under **Device onboarding**) > **...** > **User Settings** > **Add**. ![Screenshot of add user setting](./media/assign-users-as-local-admin/user-settings.png) 2. Under **Settings**, enter a **Name** for the setting. 3. Select the boxes for the settings that you want to enable for the users. diff --git a/windows-365/enterprise/azure-network-connections.md b/windows-365/enterprise/azure-network-connections.md index 54e0de3dff1..c37e00ca169 100644 --- a/windows-365/enterprise/azure-network-connections.md +++ b/windows-365/enterprise/azure-network-connections.md @@ -123,7 +123,7 @@ After completing either of these operations, you can delete the ANC. ## Maximum Azure network connections -Each tenant has a limit of 10 Azure network connections. If your organization needs more than 10 Azure network connections, contact support. +Each tenant has a limit of 50 Azure network connections. If your organization needs more than 50 Azure network connections, contact support. ## Inactive ANCs diff --git a/windows-365/enterprise/configure-single-sign-on.md b/windows-365/enterprise/configure-single-sign-on.md index c33e04e0370..d20d54f4b1e 100644 --- a/windows-365/enterprise/configure-single-sign-on.md +++ b/windows-365/enterprise/configure-single-sign-on.md @@ -38,8 +38,9 @@ For information on using passwordless authentication within the session, see [In To get started, following the steps to [Configure single sign-on](/azure/virtual-desktop/configure-single-sign-on) for Azure Virtual Desktop with the following caveats: - If the Kerberos Server object isn't present for Microsoft Entra hybrid joined provisioning policies, a new error appears in your Azure Network Connection (ANC) [health check for single sign-on](health-checks.md#supported-checks). -- If you have conditional access policies that apply when accessing Windows 365, review the recommendations to [set conditional access policies](set-conditional-access-policies.md) for Windows 365 to make sure users have the expected experience. +- If you have Conditional Access policies that apply when accessing Windows 365, review the recommendations to [set Conditional Access policies](set-conditional-access-policies.md) for Windows 365 to make sure users have the expected experience. - SSO can be enabled on any provisioning policies. You can find the **Use Microsoft Entra single sign-on** option under the **Join type** on the **General** page. This can be done when [creating a new provisioning policy](create-provisioning-policy.md#continue-creating-a-provisioning-policy) or when [editing an existing provisioning policy](edit-provisioning-policy.md), with an option to apply SSO to existing Cloud PCs. +- When provisioning Frontline Cloud PCs in shared mode, [hide the consent prompt](/azure/virtual-desktop/configure-single-sign-on#hide-the-consent-prompt-dialog) so that users don't see it with each shared device. You can use a dynamic device group based on the provisioning policy name to scope this configuration. ## Next steps diff --git a/windows-365/enterprise/connection-errors.md b/windows-365/enterprise/connection-errors.md deleted file mode 100644 index b4e43cf1156..00000000000 --- a/windows-365/enterprise/connection-errors.md +++ /dev/null @@ -1,119 +0,0 @@ ---- -# required metadata -title: Troubleshoot connection errors -titleSuffix: -description: Troubleshoot connection errors in Windows 365. -keywords: -author: ErikjeMS -ms.author: erikje -manager: dougeby -ms.date: 05/09/2023 -ms.topic: conceptual -ms.service: windows-365 -ms.subservice: windows-365-enterprise -ms.localizationpriority: high -ms.assetid: - -# optional metadata - -#ROBOTS: -#audience: - -ms.reviewer: traceyadams -ms.suite: ems -search.appverid: MET150 -#ms.tgt_pltfrm: -ms.custom: intune-azure; get-started -ms.collection: -- M365-identity-device-management -- tier2 ---- - -# Troubleshoot Cloud PC connection errors - -The following errors can occur when connecting to a Cloud PC. - - - -## Errors when connecting to a Microsoft Entra joined Cloud PC - -### The logon attempt failed -**Potential cause #1**: Either the Cloud PC or the user's physical device denied PKU2U protocol requests. The PKU2U protocol is only triggered in the following cases: - -- The Cloud PC is Microsoft Entra joined. -- The user is connecting from the Windows desktop client. -- The user's physical device is Microsoft Entra registered, Microsoft Entra joined, or Microsoft Entra hybrid joined to the same organization as the Cloud PC. - -**Possible solution**: Turn on PKU2U protocol requests on both the Cloud PC and the user's physical device: - -1. [Create a filter for all Cloud PCs](create-filter.md#create-a-filter-for-all-cloud-pcs). -2. Create a device configuration policy [using the settings catalog](/mem/intune/configuration/settings-catalog). -3. On the **Configuration settings** page, search for and select **Network Security Allow PKU2U Authentication Requests** > **Allow**. -![Screenshot with the **Network Security Allow PKU2U Authentication Requests** set to **Allow**.](./media/connection-errors/allow-pku2u.png) -5. On the **Assignments** page, select **Add all devices** > **Edit filter** > **Include filtered devices in assignment** > select the filter you created for all Cloud PCs. -6. On the **Assignments** page, also select a Microsoft Entra group containing the user or the user's physical device. -7. Complete the creation of the device configuration policy. - -If you only manage the user's physical device through Group Policy or you don't manage the user's physical device, you (or the user) can manage this setting through the [allow PKU2U authentication requests to this computer to use online identities](/windows/security/threat-protection/security-policy-settings/network-security-allow-pku2u-authentication-requests-to-this-computer-to-use-online-identities) policy. - -**Potential cause #2**: [Per-user multi-factor authentication](/azure/active-directory/authentication/howto-mfa-userstates) is turned on for the user account. Because it blocks sign-in, per-user multi-factor authentication isn't supported for users connecting to Microsoft Entra joined Cloud PCs. - -**Possible solution**: [Remove per-user multi-factor authentication](/azure/active-directory/devices/howto-vm-sign-in-azure-ad-windows#mfa-sign-in-method-required) for all users connecting to Cloud PCs. Then, [set a Microsoft Entra Conditional Access policy](set-conditional-access-policies.md) and assign it to the appropriate users. - -## Specific connection errors - -### We couldn't connect because there are currently no available resources - -**Potential cause**: There may be a resource issue on your Cloud PC. - -**Possible solution**: Sign in to [windows365.microsoft.com](https://windows365.microsoft.com) > select the cog icon next to the Cloud PC > **Restart**. - -### We couldn't connect to the gateway because of an error. If this keeps happening, ask your admin or tech support for help. - -**Potential cause**: This error can be caused by network configuration settings, like: - -- Custom DNS Settings -- Network Virtual Appliance blocking -- Network Security group configuration -- Resource Locks -- Blocks on required endpoints - -**Possible solution**: Review the settings and confirm that they aren’t interfering with connections. - -### The remote PC ended your session. If this keeps happening, contact your network administrator for assistance. Error code: 0x3 - -**Potential cause**: This error can occur when the Cloud PC’s processor is over-utilized. - -**Possible solution**: If the issue persists, sign in to [windows365.microsoft.com](https://windows365.microsoft.com) > select the cog icon next to the Cloud PC > **Restart**. - -## Other connection error causes - -Some other possible causes for Cloud PC connection failures include: - -### Out-of-date third-party VPN client versions - -**Possible solution**: Update VPN clients to the most up-to-date versions. - - - -### Signing in to the Cloud PC with Microsoft Entra ID-only user accounts - -**Possible solution**: Windows 365 is currently a Microsoft Entra hybrid join device, requiring users to sign in with their on-premises Active Directory account. - -### Using a client PC with Remote Credential Guard enabled - -**Possible solution**: Remote Credential Guard requires connectivity to the on-premises Active Directory Domain Controller on the client PC used to access the Cloud PC. This connection is only possible using a VPN solution. Using a KDC proxy isn't currently available for Windows 365. - -## Other troubleshooting steps - -### Move the Cloud PC to a new organizational unit (OU) with no group policies - -Connection problems may be caused by settings delivered by group policies. To test this possible cause, you can move the Cloud PC to a separate OU that’s blocked from receiving group policies. - -### On-premises Group Policy Objects (GPO) may affect a Cloud PC's provisioning or behavior - -Settings delivered by group policies may cause connection problems. To test this problem, you can move the Cloud PC to a separate OU that's blocked from receiving group policies. - -## Next steps - -[Review other troubleshooting steps](troubleshooting.md) diff --git a/windows-365/enterprise/create-azure-network-connection.md b/windows-365/enterprise/create-azure-network-connection.md index fdc0e74ec34..159f23996e1 100644 --- a/windows-365/enterprise/create-azure-network-connection.md +++ b/windows-365/enterprise/create-azure-network-connection.md @@ -7,7 +7,7 @@ keywords: author: ErikjeMS ms.author: erikje manager: dougeby -ms.date: 10/30/2024 +ms.date: 11/19/2024 ms.topic: how-to ms.service: windows-365 ms.subservice: windows-365-enterprise @@ -33,7 +33,7 @@ ms.collection: [Azure network connections](azure-network-connections.md) (ANC) let you provision Cloud PCs that are attached to a virtual network that you manage. -You can have up to 10 ANCs per tenant. +You can have up to 50 ANCs per tenant. As part of the connection process, the Windows 365 service is granted the following permissions: @@ -55,8 +55,6 @@ To create an ANC, you must meet these requirements: When planning your ANC VNets with ExpressRoute as the on-premises connectivity model, refer to [Azure’s documentation on VM limits](/azure/expressroute/expressroute-about-virtual-network-gateways#performance-results). For the ExpressRoute Gateway SKU, make sure that you have the correct sized Gateway for the number of Cloud PCs planned within the VNet. Exceeding this limit could cause instability in your connectivity. -******* - ## Create an ANC 1. Sign in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), select **Devices** > **Windows 365** (under **Provisioning**) > **Azure network connection** > **Create**. @@ -69,7 +67,13 @@ When planning your ANC VNets with ExpressRoute as the on-premises connectivity m ![Screenshot of Name field](./media/create-azure-network-connection/connection-name.png) 4. Select a **Subscription** and **Resource group** for the new connection. Create a new resource group to contain your Cloud PC resources. Optionally, you can instead select an existing resource group in the list (which grant Windows 365 permissions to the existing resource group). If you don’t have a [healthy ANC](health-checks.md), you can't proceed. -5. Select a **Virtual network** and **Subnet**. +5. Select a **Virtual network** and **Subnet**. When selecting a vNET: + + - To maintain a stable and performant connection, make sure the vNET is in the region closest to the Windows 365 users. + - Make sure there are enough IP addresses in the vNET subnet to accommodate all required Cloud PCs. Also, consider future growth and [resizing](resize-cloud-pc.md) needs. + - Make sure the vNET has line of sight to a domain controller. This line of sight is required for initial provisioning and successful sign in for hybrid joined Cloud PCs. + - Make sure all [required endpoints](requirements-network.md) are allowed through the vNET and aren't blocked by any firewall, proxy, or Software Gateways. + 6. Select **Next**. 7. For hybrid Microsoft Entra join ANCs, on the **AD domain** page, provide the following information: diff --git a/windows-365/enterprise/create-filter.md b/windows-365/enterprise/create-filter.md index f5711e28855..7e539f6d702 100644 --- a/windows-365/enterprise/create-filter.md +++ b/windows-365/enterprise/create-filter.md @@ -48,7 +48,7 @@ In these steps, you’ll use the Model device property to create the filter. 3. On the **Rules** page, enter the following: 1. **Property** = "model (Model)" 2. **Operator** = "Contains" - 3. **Value** = "Cloud PC". To create a filter for all GPU Cloud PCs, choose "GPU" here instead. + 3. **Value** = "Cloud PC". To create a filter for all GPU Cloud PCs, choose "GPU". To create a filter for Frontline Cloud PCs, select "Cloud PC Frontline". 4. To validate that it works, select **Preview**. 5. On the **Scope tags** page, select any desired scope tags to apply, then select **Next**. 6. On the **Review + create** page, select **Create**. diff --git a/windows-365/enterprise/create-manual-restore-point.md b/windows-365/enterprise/create-manual-restore-point.md index a2340a8a136..6ad5d628679 100644 --- a/windows-365/enterprise/create-manual-restore-point.md +++ b/windows-365/enterprise/create-manual-restore-point.md @@ -7,7 +7,7 @@ keywords: author: ErikjeMS ms.author: erikje manager: dougeby -ms.date: 06/24/2024 +ms.date: 12/04/2024 ms.topic: conceptual ms.service: windows-365 ms.subservice: windows-365-enterprise @@ -35,8 +35,9 @@ Cloud PC [restore points](restore-overview.md) can be manually created both sing ## Create a single manual restore point -1. Sign in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) > **Devices** > **All devices** > select a device > **Restore points**. -1. Select **Create Restore Points** > **Yes**. +1. Sign in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) > **Devices** > **All devices** > select a device > **Restore points** > **Create restore points**. +2. (Optiona) If you want to share the restore point to a storage account, select **Create new restore point for share**. If you do, you must also select a **Subscription**, **Storage account**, and **[Access tier](/azure/storage/blobs/access-tiers-overview)**. +3. Select **Create Restore Points** > **Yes**. The new restore point will be created. It may take up to an hour or more for the new restore point to appear in the list of restore points. If a restore point already exists for this Cloud PC it will be overwritten by the new restore point. @@ -45,8 +46,13 @@ The new restore point will be created. It may take up to an hour or more for the 1. Sign in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) > **Devices** > **All devices** > **Bulk Device Actions**. ![Screenshot of bulk device actions.](./media/restore-bulk/bulk-device-actions.png) 1. On the **Basics** page, select the following options: - 1. **OS**: Windows - 1. **Device action**: Create Cloud PC manual restore point + - **OS**: Windows + - **Device type**: Cloud PCs + - **Device action**: Create restore points +3. (Optional) If you want to share the restore point to a storage account, select **Create new restore point for share**. Then select the following options: + - **Subscription**: One of your Azure subscriptions. + - **Storage account** + - **Access tier** 1. Select **Next**. 1. On the **Devices** page, choose **Select devices to include**. 1. In the **Select devices**, choose the Cloud PCs that you want to create manual restore points for > **Select** > **Next**. @@ -54,6 +60,8 @@ The new restore point will be created. It may take up to an hour or more for the The new restore points will be created. It may take up to an hour or more for the new restore points to appear in the list of restore points. If any of the selected Cloud PCs already have a restore point, the existing restore points will be overwritten. +You can bulk create restore points on up to 5,000 Cloud PCs at once. + ## Next steps diff --git a/windows-365/enterprise/create-provisioning-policy.md b/windows-365/enterprise/create-provisioning-policy.md index 0f43fa8055a..a925ac994ec 100644 --- a/windows-365/enterprise/create-provisioning-policy.md +++ b/windows-365/enterprise/create-provisioning-policy.md @@ -34,7 +34,7 @@ ms.collection: Cloud PCs are created and assigned to users based on provisioning policies. These policies hold key provisioning rules and settings that let the Windows 365 service set up and configure the right Cloud PCs for your users. After provisioning policies are created and assigned to the Microsoft Entra user security groups or Microsoft 365 Groups, the Windows 365 service: -1. Checks for appropriate licensing for each user. +1. Checks for appropriate licensing. 2. Configures the Cloud PCs accordingly. A few things to keep in mind: @@ -44,10 +44,15 @@ A few things to keep in mind: - If a user in an assigned group doesn’t have a Cloud PC license assigned, Windows 365 won’t provision their Cloud PC. - For each Cloud PC license assigned to a user, only one provisioning policy is used to set up and configure the Cloud PC. The Windows 365 service always uses the first assigned policy to provision the Cloud PC. -- Windows 365 Frontline +- Windows 365 Frontline in dedicated mode - If you have more users in your Microsoft Entra user group than the number of Cloud PCs available for the selected size, some users might not receive their Cloud PC. - - If you remove users from your Microsoft Entra user group, their Cloud PC is automatically moved into a grace period. + - If you remove users from your Microsoft Entra user group, their Cloud PC is automatically moved into a [grace period](device-management-overview.md#column-details) . + +- Windows 365 Frontline in shared mode + + - If you remove users from your Microsoft Entra user group, the user loses access to the Cloud PC. + - If you remove the Microsoft Entra user group from the assignment, the Cloud PCs are automatically deprovisioned. ## Create a provisioning policy @@ -62,10 +67,13 @@ A few things to keep in mind: 3. On the **General** page, select a **License type**: - **Enterprise**: Provision Cloud PCs for Windows 365 Enterprise. - **Frontline**: Provision Cloud PCs for [Windows 365 Frontline](introduction-windows-365-frontline.md). -4. On the **General** page, select a **Join type**: +4. If you choose **Frontline**, you must also select a **Frontline type**: + - **Dedicated**: Provision Cloud PCs in dedicated mode. + - **Shared**: Provision Cloud PCs in shared mode. +5. On the **General** page, select a **Join type**: - **Microsoft Entra Join**: You have two options for **Network**: - **Microsoft hosted network**: Select a **Geography** where you want your Cloud PCs provisioned. Then, for [**Region**](requirements.md#supported-azure-regions-for-cloud-pc-provisioning), you can select: - - **Automatic (Recommended)**: The Windows 365 service automatically chooses a region within the selected geography at the time of provisioning. Microsoft strongly recommends using the **Automatic** option. This automation decreases the chance of provisioning failure. + - **Automatic (Recommended)** (*not supported for Frontline in shared mode*): The Windows 365 service automatically chooses a region within the selected geography at the time of provisioning. Microsoft strongly recommends using the **Automatic** option. This automation decreases the chance of provisioning failure. - A specific region: This option makes sure that your Cloud PCs are only provisioned in the region that you choose. - **Azure network connection**: Select an ANC to use for this policy. - **Hybrid Microsoft Entra join**: You must select an ANC to use for this policy. @@ -85,9 +93,13 @@ To select an ANC, follow these steps: As long as the first ANC in the list is **Healthy**, it's always used for provisioning Cloud PCs using this policy. If the first ANC isn't healthy, the policy uses the next ANC in the list that is healthy. +> [!NOTE] +> +>For Frontline in shared mode, the ANC must be in the same region. + ### Continue creating a provisioning policy -1. On the **General** page, you can check the box so that your users **Use Microsoft Entra single sign-on**. +1. On the **General** page, you can check the box so that your users **Use Microsoft Entra single sign-on**. If you want to make sure that users aren't prompted each time they connect to a Frontline in shared Cloud PC, see [Hide consent prompt dialog](/azure/virtual-desktop/configure-single-sign-on#hide-the-consent-prompt-dialog). 2. Select **Next**. 3. On the **Image** page, for **Image type**, select one of the following options: - **Gallery image**: Choose **Select** > select an image from the gallery > **Select**. Gallery images are default images provided for your use. @@ -95,36 +107,47 @@ To select an ANC, follow these steps: 4. Select **Next**. 5. On the **Configuration** page, under **Windows settings**, choose a **Language & Region**. The selected language pack is installed on Cloud PCs provisioned with this policy. 6. Optional. Select **Apply device name template** to create a Cloud PC naming template to use when naming all Cloud PCs that are provisioned with this policy. This naming template updates the NETBIOS name and doesn't affect the display name of the Cloud PC. When creating the template, follow these rules: - - Names must be between 5 and 15 characters. - - Names can contain letters, numbers, and hyphens. - - Names can't include blank spaces or underscores. - - Optional. Use the %USERNAME:X% macro to add the first X letters of the username. - - Required. Use the %RAND:Y% macro to add a random string of characters, where Y equals the number of characters to add. Y must be 5 or more. Names must contain a randomized string. - - Examples of custom naming templates: - - - %RAND:5% - - ABC-%RAND:5% - - ABC-%USERNAME:5%-%RAND:5% + - Enterprise and Frontline dedicated mode + - Names must be between 5 and 15 characters. + - Names can contain letters, numbers, and hyphens. + - Names can't include blank spaces or underscores. + - Optional. Use the %USERNAME:X% macro to add the first X letters of the username. + - Required. Use the %RAND:Y% macro to add a random string of characters, where Y equals the number of characters to add. Y must be 5 or more. Names must contain a randomized string. + - Frontline in shared mode + - Names must be exactly 15 characters. + - Names can contain letters, numbers, and hyphens. + - Names can't include blank spaces or underscores. + - Prefix must be 7 or less characters. + - Required. Use the %RAND:Y% macro to add a random string of characters, where Y equals the number of characters to add. Y must be 8 or more. Names must contain a randomized string. + + Example of custom naming templates: + + - ABCDEF-%RAND:8% + 7. Optional. Under **Additional services**, choose a service to be installed on Cloud PCs provisioned with this policy: - - **Windows Autopatch** is a cloud service that automates updates for Windows, Microsoft 365 Apps for enterprise, Microsoft Edge, and Microsoft Teams on both physical and virtual devices. For more information, see [What is What is Windows Autopatch?](/windows/deployment/windows-autopatch/overview/windows-autopatch-overview) and the [Windows Autopatch FAQ](https://go.microsoft.com/fwlink/?linkid=2200228). + - **Windows Autopatch** is a cloud service that automates updates for Windows, Microsoft 365 Apps for enterprise, Microsoft Edge, and Microsoft Teams on both physical and virtual devices. For more information, see [What is What is Windows Autopatch?](/windows/deployment/windows-autopatch/overview/windows-autopatch-overview) and the [Windows Autopatch FAQ](https://go.microsoft.com/fwlink/?linkid=2200228). The Windows Autopatch option isn't available for Frontline in shared mode. - If you already have Windows Autopatch configured to manage your cloud PCs, this option replaces the existing policy. This replacement might disrupt any dynamic distribution that is already configured in Autopatch. - When this option is selected, the system assigns devices to a new ring as the last ring of the Autopatch group. - To manually enable dynamic distribution for your Cloud PCs, modify your Autopatch Groups dynamic distribution list to include the Entra ID group to which your Cloud PCs are being added. - **None**. Manage and update Cloud PCs manually. 8. Select **Next**. 9. On the **Assignments** page, choose **Select groups** > choose the groups you want this policy assigned to > **Select**. Nested groups aren't currently supported. -10. For Windows 365 Frontline, you must also select a Cloud PC size for each group in the policy. Choose **Select one** > select a size under **Available sizes** > **Select**. After you select a size for each group, select **Next**. -11. On the **Review + create** page, select **Create**. If you used Microsoft Entra hybrid join as the join type, it can take up to 60 minutes for the policy creation process to complete. The time depends on when the Microsoft Entra Connect sync last happened. +10. For Windows 365 Frontline dedicated mode, you must also select a Cloud PC size for each group in the policy. Choose **Select one** > select a size under **Available sizes** > **Select**. After you select a size for each group, select **Next**. +11. For Windows 365 Frontline in shared mode you must also: + 1. Choose **Select one** > select a size under **Available sizes** > **Select**. + 2. Type in a **Friendly name** > select a **Cloud PC number** > **Next**. +12. On the **Review + create** page, select **Create**. If you used Microsoft Entra hybrid join as the join type, it can take up to 60 minutes for the policy creation process to complete. The time depends on when the Microsoft Entra Connect sync last happened. -After the provisioning policy is created and assigned, Windows 365 automatically starts to provision Cloud PCs and assigns them to users in the assigned groups. +After the provisioning policy is created and assigned, Windows 365 automatically starts to provision Cloud PCs. -### Windows 365 Frontline +### Windows 365 Frontline in dedicated mode Microsoft Entra group members don't receive Cloud PCs if the number of users in the Microsoft Entra user group exceeds the maximum number of Cloud PCs allowed to be provisioned (based on the number of purchased licenses). Admins can confirm the list of members who received Cloud PCs by reviewing the **Provisioning policy** > choose the policy > review the users in the groups under **Assignments**. +Windows 365 Frontline licenses are for both Frontline Cloud PCs in dedicated mode and shared mode. Frontline Cloud PCs in dedicated mode are prioritized over shared mode when you add licenses. + ## Next steps diff --git a/windows-365/enterprise/cross-region-disaster-recovery-set-up.md b/windows-365/enterprise/cross-region-disaster-recovery-set-up.md index 6fb6d480972..335e1e5ed11 100644 --- a/windows-365/enterprise/cross-region-disaster-recovery-set-up.md +++ b/windows-365/enterprise/cross-region-disaster-recovery-set-up.md @@ -51,7 +51,8 @@ ms.collection: When configuring a backup location, consider things like data sovereignty and geographic distance between the user and the Cloud PC backup location. The greater the distance between your backup Cloud PC and your user’s connect location increases network latency and impacts performance. Full copies of your Cloud PCs are kept in the backup location, including all data stored on the Cloud PC disk. 6. Select **Next**. -7. On the **Assignments** page, add the groups that you want this user setting applied to. All Cloud PCs associated with a user share the same cross region disaster recovery settings. +1. On the **Assignments** page, add the groups containing users that you want this user setting applied to. All Cloud PCs associated with a user will share the same cross region disaster recovery settings. + 8. On the **Review + create** page, select **Create**. After you finish this configuration, the first backup of the Cloud PC may take several days. To see the current state of backups, check the [Cross region disaster recovery report](cross-region-disaster-recovery-report.md). After the first backup, the recovery point objective (RPO) will be the same as for point-in-time restore plus a few minutes to replicate across regions. diff --git a/windows-365/enterprise/delete-provisioning-policy.md b/windows-365/enterprise/delete-provisioning-policy.md index 653aeb8a7e9..594e94d181b 100644 --- a/windows-365/enterprise/delete-provisioning-policy.md +++ b/windows-365/enterprise/delete-provisioning-policy.md @@ -31,12 +31,14 @@ ms.collection: # Delete provisioning policies from Cloud PCs -Only a provisioning policy that has no assignments can be deleted. You can remove assignments by following the steps in [Edit provisioning policy](edit-provisioning-policy.md). After completing those steps, follow the steps below to delete a provisioning policy. - -1. Sign in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) > **Devices** > **Windows 365** (under **Provisioning**) > **Provisioning policies**. +1. **Only a provisioning policy that has no assignments can be deleted**. Therefore, you must first remove assignments. You can remove assignments by following the steps in [Edit provisioning policy](edit-provisioning-policy.md). After completing those steps, follow the steps below to delete a provisioning policy. +2. Sign in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) > **Devices** > **Windows 365** (under **Provisioning**) > **Provisioning policies**. ![Screenshot of delete policy](./media/delete-provisioning-policy/delete-policy.png) -2. Select the ellipses (**…**) next to the policy you want to delete > **Delete**. -3. Select **Confirm** when asked to delete the policy. +3. Make sure that **Assigned** is **No**. If **Assigned** state is **Yes**, select the provisioning policy and remove assignments. + + For Windows 365 Enterprise and Windows 365 Frontline in dedicated mode, if you remove the assignments, the Cloud PCs move into the [grace period](device-management-overview.md) state. +4. Select the ellipses (**…**) next to the policy you want to delete > **Delete**. +5. Select **Confirm** when asked to delete the policy. ## Next steps diff --git a/windows-365/enterprise/deploy-security-baselines.md b/windows-365/enterprise/deploy-security-baselines.md index 73594dd74db..175ee49381b 100644 --- a/windows-365/enterprise/deploy-security-baselines.md +++ b/windows-365/enterprise/deploy-security-baselines.md @@ -62,4 +62,4 @@ For more information, see [Use security baselines to configure Windows devices i For a detailed list of the 24H1 settings, see [Settings list for the Windows 365 Cloud PC security baseline in Intune](/mem/intune/protect/security-baseline-settings-windows-365?pivots=win365-24h1). -[Set conditional access policies](set-conditional-access-policies.md). +[Set Conditional Access policies](set-conditional-access-policies.md). diff --git a/windows-365/enterprise/device-images.md b/windows-365/enterprise/device-images.md index 8c0316c5132..1f134085050 100644 --- a/windows-365/enterprise/device-images.md +++ b/windows-365/enterprise/device-images.md @@ -105,7 +105,8 @@ For more information on creating such a custom image, see [Create a managed imag A custom image can be created using [any of the images mentioned previously as a starting point](https://azuremarketplace.microsoft.com/marketplace/apps/microsoftwindowsdesktop.windows-ent-cpc). For example, you can start with one of those images and then install more applications and make more configuration changes. > [!NOTE] -> For custom images with Teams application, follow the instructions detailed in [Create a Cloud PC custom image that supports Microsoft Teams](create-custom-image-support-teams.md) to configure optimizations that are needed. +> For custom images with Teams application, follow the instructions detailed in [Create a Cloud PC custom image that supports Microsoft Teams](create-custom-image-support-teams.md) to configure optimizations that are needed. +> Images with disk encryption sets aren't supported. For more information about adding a device image to Windows 365, see [Add and delete custom device images](add-device-images.md). diff --git a/windows-365/enterprise/digital-forensics.md b/windows-365/enterprise/digital-forensics.md index 3e4ea0e53b4..2ebe1d2c3ee 100644 --- a/windows-365/enterprise/digital-forensics.md +++ b/windows-365/enterprise/digital-forensics.md @@ -49,8 +49,8 @@ You may have to place a Cloud PC under review for any of these scenarios: In response to legal requests for data stored on a Cloud PC, admins must attest that digital evidence they provide demonstrates a valid Chain of Custody (CoC) throughout the evidence acquisition, preservation, and access process. For this reason, admins should make sure to support adequate: -- Access control. For more information about just-in-time access management, see [Best practices for Azure RBAC](/azure/role-based-access-control/best-practices) and [Start using Privileged Identity Managmement](/entra/id-governance/privileged-identity-management/pim-getting-started). -- Data protection and integrity. Only the virtual network in the dedicated subscription containing the snapshot has access to the storage account and key vault that archives the evidence. For more information, see [Microsoft Purview Customer Key for Windows 365 Cloud PCs](/enterprise/purview-customer-key) +- Access control. For more information about just-in-time access management, see [Best practices for Azure RBAC](/azure/role-based-access-control/best-practices) and [Start using Privileged Identity Management](/entra/id-governance/privileged-identity-management/pim-getting-started). +- Data protection and integrity. Only the virtual network in the dedicated subscription containing the snapshot has access to the storage account and key vault that archives the evidence. For more information, see [Microsoft Purview Customer Key for Windows 365 Cloud PCs](/windows-365/enterprise/purview-customer-key) - Monitoring and alerting. For more information, see [Alert on privileged Azure role assignment](/azure/role-based-access-control/role-assignments-alert) - Logging and auditing, separation of duties. Only the small list of admins with access to the storage account can grant investigators temporary access (that was recorded and approved) to the evidence. diff --git a/windows-365/enterprise/edit-provisioning-policy.md b/windows-365/enterprise/edit-provisioning-policy.md index ea2415e3b30..0b4370fee97 100644 --- a/windows-365/enterprise/edit-provisioning-policy.md +++ b/windows-365/enterprise/edit-provisioning-policy.md @@ -7,7 +7,7 @@ keywords: author: ErikjeMS ms.author: erikje manager: dougeby -ms.date: 06/27/2024 +ms.date: 12/04/2024 ms.topic: how-to ms.service: windows-365 ms.subservice: windows-365-enterprise @@ -37,7 +37,7 @@ You can update provisioning policies to change assignments or key attributes, li ![Screenshot of edit policy](./media/edit-provisioning-policy/edit-policy.png) 2. On the policy page, you can edit the **General** information, **Image**, and **Assignments** by selecting **Edit** next to each header. -If you change the network, image, region or single sign-on configuration in a provisioning policy, no change will occur for previously provisioned Cloud PCs. Newly provisioned Cloud PCs will honor the changes in your provisioning policy. To change the network or image of previously provisioned Cloud PCs to align with the changes, you must reprovision those Cloud PCs. To change the region or single sign-on of previously provisioned Cloud PCs to align with the changes, you must [apply the current configuration](#apply-the-current-configuration). +If you change the network, image, region or single sign-on configuration in a provisioning policy, no change will occur for previously provisioned Cloud PCs. Newly provisioned or reprovisioned Cloud PCs will honor the changes in your provisioning policy. To change the network or image of previously provisioned Cloud PCs to align with the changes, you must reprovision those Cloud PCs. To change the region or single sign-on of previously provisioned Cloud PCs to align with the changes, you must apply the current configuration. If you edit the name of the provisioning policy in the **General** information, the following will occur: @@ -48,14 +48,20 @@ If you edit the name of the provisioning policy in the **General** information, - **Operator** = Equals - **Value** = \ -If you assign new users to the provisioning policy, and these users have a valid Cloud PC license, provisioning will automatically occur. If you remove users from the provisioning policy assignment, the [grace period](device-management-overview.md#column-details) will be triggered. +If you assign new users to the provisioning policy, and these users have a valid Cloud PC license, provisioning automatically occurs. -## Apply the current configuration +If you remove users from the provisioning policy assignment: + +- The [grace period](device-management-overview.md#column-details) is triggered for Enterprise Cloud PCs. +- Frontline Cloud PCs in dedicated mode are immediately deprovisioned. +- Frontline Cloud PCs in shared mode remain unchanged. + +## Apply the current configuration for Enterprise and Frontline in dedicated mode To apply a configuration change to existing Cloud PCs: 1. Modify and save the changes to an existing provisioning policy. -2. From the policy page, select **Apply current configuration**. +2. From the policy page, select **Apply this configuration**. 3. Select the configuration change to apply to existing Cloud PCs from the available list including: 1. Region. 2. Single sign-on. @@ -63,8 +69,21 @@ To apply a configuration change to existing Cloud PCs: >[!Important] > ->- When applying a new region, Cloud PCs will be shutdown during the application process. Users will be disconnected and any unsaved work will be lost. ->- When applying single sign-on, Cloud PCs deployed before April 2023 will be shutdown during the application process. As this operation takes time, applying SSO to a large number of Cloud PCs can restart the VMs over a long period of time and will not complete immediately. +>- When you apply a new region, Cloud PCs are shutdown during the application process for the targeted Cloud PCs. Users are disconnected and any unsaved work is lost. +>- When you apply single sign-on, Cloud PCs deployed before April 2023 are shutdown during the application process. As this operation takes time, applying SSO to a large number of Cloud PCs can restart the VMs over a long period of time and won't complete immediately. + +## Apply the current configuration for Frontline in shared mode + +To apply a configuration to existing Cloud PCs: + +1. Modify and save the changes to an existing provisioning policy. +2. From the policy page, select **Reprovision**. +3. Select the percentage of Cloud PCs that you want to make sure is available for user connections. +4. Select **Continue**. + +>[!Important] +> +>When you apply a new configuration, Cloud PCs are shutdown during the application process. Users won't be disconnected if the Cloud PC is in use. Cloud PCs wait for the user to disconnect before reprovisioning. ## Next steps diff --git a/windows-365/enterprise/frontline-shared-bulk-reprovision.md b/windows-365/enterprise/frontline-shared-bulk-reprovision.md new file mode 100644 index 00000000000..cec035dec70 --- /dev/null +++ b/windows-365/enterprise/frontline-shared-bulk-reprovision.md @@ -0,0 +1,57 @@ +--- +# required metadata +title: Bulk reprovision Windows 365 Frontline Cloud PCs in shared mode +titleSuffix: +description: Learn how to bulk reprovision Windows 365 Frontline Cloud PCs in shared mode +keywords: +author: ErikjeMS +ms.author: erikje +manager: dougeby +ms.date: 10/19/2024 +ms.topic: how-to +ms.service: windows-365 +ms.subservice: windows-365-enterprise +ms.localizationpriority: high +ms.assetid: + +# optional metadata + +#ROBOTS: +#audience: + +ms.reviewer: gkomatsu +ms.suite: ems +search.appverid: MET150 +#ms.tgt_pltfrm: +ms.custom: intune-azure; get-started +ms.collection: +- M365-identity-device-management +- tier2 +--- + +# Bulk reprovision Windows 365 Frontline Cloud PCs in shared mode + +Windows 365 Frontline Cloud PCs created in shared mode can be reprovisioned in bulk. Any data saved to individual Cloud PCs is removed. + +Using bulk actions to reprovision multiple Cloud PCs at a time can help you: + +- Apply new configurations. For example, apply a new image. +- Revert all Frontline Cloud PCs in shared mode to a known configuration. This action can help minimize configuration discrepancies that might across your pool of available shared Cloud PCs. Such discrepancies might arise over time when different policies or updates are applied to individual systems. + +## Bulk reprovision Frontline Cloud PCs in shared mode + +1. Sign in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), select **Devices** > **Windows 365** (under **Device onboarding**) > **Provisioning policies**. +2. Select a provisioning policy for Frontline Cloud PCs. +3. Select **Reprovision**. +4. In the **Would you like to continue** > **Keep a percentage of devices available** box, type the percentage of the devices you want to keep available during the reprovisioning action. If you set a value more than 0%, reprovisioning rolls out over all the Cloud PCs and always keeps that percentage of Cloud PCs available for use. + + When choosing the percentage, consider the following information: + - The percentage you set is the number of Cloud PCs that remain available while the rest of the Cloud PCs are reprovisioned. After a number of Cloud PCs equal to the percentage are reprovisioned (and available for use), the previously set aside Cloud PCs start reprovisinoing. + - The Cloud PCs don't reprovision while users are still signed in. To force disconnection of users, start the reprovision, type 0%, then use the **Restart** remote action on each Cloud PC. + - The minimum number of devices that will be reprovisioned is one. For example, if you have one Cloud PC and you specify 99%, that one device will still be reprovisioned, even though the closest whole number is one Cloud PC to be available. + - The system rounds down to the nearest whole number. For example, if the total number of Cloud PCs is 150 and you keep 27% available, the result is 40.5 Cloud PCs. This number is rounded down to keep 40 Cloud PCs available at a time. + + +## Next steps + +[Remotely manage Windows 365 Cloud PCs](remotely-manage-cloud-pc.md). diff --git a/windows-365/enterprise/gpu-cloud-pc.md b/windows-365/enterprise/gpu-cloud-pc.md index ea56bb9f8fc..cfcfc995a96 100644 --- a/windows-365/enterprise/gpu-cloud-pc.md +++ b/windows-365/enterprise/gpu-cloud-pc.md @@ -33,7 +33,7 @@ ms.collection: Windows 365 offers GPU-enabled Cloud PCs that are suitable for graphics intense workloads that need to be performance optimized. These offerings can help with graphic design, image and video rendering, 3D modeling, and data processing and visualization applications that require a GPU to perform. -Three GPU offerings are available for Window 365 Enterprise (including FedRamp) and Windows 365 Frontline Cloud PCs: +Three GPU offerings are available for Window 365 Enterprise (including FedRamp) and Windows 365 Frontline Cloud PCs in dedicated mode: | GPU offering | Minimum specs | Powered by | Intended for | | --- | --- | diff --git a/windows-365/enterprise/health-checks.md b/windows-365/enterprise/health-checks.md deleted file mode 100644 index 18591c09fab..00000000000 --- a/windows-365/enterprise/health-checks.md +++ /dev/null @@ -1,78 +0,0 @@ ---- -# required metadata -title: Azure network connection health checks in Windows 365 -titleSuffix: -description: Learn about the health checks that are automatically run on Azure network connections. -keywords: -author: ErikjeMS -ms.author: erikje -manager: dougeby -ms.date: 10/30/2024 -ms.topic: how-to -ms.service: windows-365 -ms.subservice: windows-365-enterprise -ms.localizationpriority: high -ms.assetid: - -# optional metadata - -#ROBOTS: -#audience: - -ms.reviewer: mattsha -ms.suite: ems -search.appverid: MET150 -#ms.tgt_pltfrm: -ms.custom: intune-azure; get-started -ms.collection: -- M365-identity-device-management -- tier2 ---- - -# Azure network connections health checks - -A unique feature of Windows 365 is the Azure network connection (ANC) health checks. The health checks are periodically run to make sure that - -- Cloud PC provisioning is successful. -- End-user Cloud PC experiences are optimal. - -## Azure network connection status - -In the **Azure network connection** tab, every ANC created displays a status. This status helps you determine if new Cloud PCs can be expected to provision successfully, and that existing end-users are having an optimal Cloud PC experience. - -Statuses include: - -- **Running checks**: The health checks are currently running. The ANC list view automatically refreshes every five minutes. Wait for the checks to complete before attempting to assign it to a provisioning policy. -- **Checks successful**: All health checks passed. The ANC is ready for use. -- **Checks successful with warnings**: All critical health checks passed. However at least one noncritical check may have issues. An example of a check that may trigger this state is the Microsoft Entra hybrid join sync check. Microsoft Entra hybrid join sync can take up to 90 minutes. Therefore, we check much of the Microsoft Entra hybrid join sync service but can’t confirm that the device sync succeeded until later. Provisioning policies can use ANCs with this status. -- **Checks failed**: One or more required checks failed. An ANC can’t be used if it's in a failed state. Resolve the underlying issue and Retry the health checks. -- **Inactive**: The ANC is inactive and health checks are paused. Reactivate the ANC to restart the health checks. After the health checks are passed, the ANC is ready for use. - -## Status error details - -Every failed ANC or success with warning error state includes the technical details behind the failure. Select the **View details** link for each failed check to view more information on the failure. After you fix the underlying issue, **Retry** the health check to rerun the tests. To retry the health check, you must: - -- Have the [Intune Administrator](/azure/active-directory/roles/permissions-reference#intune-administrator) or [Windows 365 Administrator](/azure/active-directory/roles/permissions-reference) role. - -## Supported checks - -- **DNS can resolve Active Directory domain**: Resolve the provided Active Directory domain name. -- **Active directory domain join**: A domain join using the credentials, domain, and OU provided. -- **Endpoint connectivity**: Connectivity to the required [URL/endpoints](requirements-network.md). -- **Microsoft Entra device sync (warning)**: Device ID sync is enabled on the Microsoft Entra tenant, and the computer object is being synced within 90 minutes. -- **Azure subnet IP address usage**: Sufficient IP addresses are available in the provided Azure subnet. -- **Azure tenant readiness**: The defined Azure subscription is enabled and ready for use. No Azure policy restrictions are blocking Windows 365 resources from being created. -- **Azure virtual network readiness**: The defined vNet is in a Windows 365 supported region. -- **First party app permissions exist on Azure subscription**: Sufficient permissions exist on the Azure subscription. -- **First party app permissions exist on Azure resource group**: Sufficient permissions exist on the Azure resource group. -- **First party app permissions exist on Azure virtual network**: Sufficient permissions exist on the Azure vNet. -- **Environment and configuration is ready**: Underlying infrastructure is ready for provisioning to succeed. -- **Intune enrollment restrictions allow Windows enrollment**: Verify that Intune enrollment restrictions are configured to allow Windows enrollment. -- **Localization language package readiness**: Verify that the operating system and Microsoft 365 language packages are reachable. Also verify that the localization package download link is reachable. -- **UDP connection check**: Network configuration allows the use of UDP direct connection (STUN). -- **Single sign-on configuration**: Determine if the network is properly configured for [single sign-on](identity-authentication.md#single-sign-on-sso) to Microsoft Entra hybrid joined Cloud PCs by ensuring a Kerberos Server object exists. - - -## Next steps - -[Learn more about Azure network connections](azure-network-connections.md). diff --git a/windows-365/enterprise/identity-authentication.md b/windows-365/enterprise/identity-authentication.md index bd36d73aa95..00cef96eb47 100644 --- a/windows-365/enterprise/identity-authentication.md +++ b/windows-365/enterprise/identity-authentication.md @@ -104,7 +104,7 @@ To access the Windows 365 service, users must first authenticate to the service #### Multifactor authentication -Follow the instructions in [Set conditional access policies](set-conditional-access-policies.md) to learn how to enforce Microsoft Entra multifactor authentication for your Cloud PCs. That article also tells you how to configure how often your users are prompted to enter their credentials. +Follow the instructions in [Set Conditional Access policies](set-conditional-access-policies.md) to learn how to enforce Microsoft Entra multifactor authentication for your Cloud PCs. That article also tells you how to configure how often your users are prompted to enter their credentials. #### Passwordless authentication diff --git a/windows-365/enterprise/in-development.md b/windows-365/enterprise/in-development.md index 9e764f6baff..308776cce9e 100644 --- a/windows-365/enterprise/in-development.md +++ b/windows-365/enterprise/in-development.md @@ -7,7 +7,7 @@ keywords: author: ErikjeMS ms.author: erikje manager: dougeby -ms.date: 10/02/2024 +ms.date: 12/12/2024 ms.topic: conceptual ms.service: windows-365 @@ -54,15 +54,7 @@ To help in your readiness and planning, this page lists Windows 365 updates and --> -## Device management - -### Cloud PC gallery images update to Microsoft Teams 2.1 - -In a future update, Windows 365 Cloud PC gallery images with Microsoft 365 applications will be updated to use Microsoft Teams 2.1. These images include: - -- Windows 11 Enterprise + Microsoft 365 Apps 21H2 -- Windows 10 Enterprise + Microsoft 365 Apps 22H2 -- Windows 10 Enterprise + Microsoft 365 Apps 21H2 + @@ -86,7 +78,15 @@ End users will be able to manually run connectivity checks on their Cloud PCs fr The remoting connection report will be retired on December 31st, 2024. After this date, refer to the [Cloud PC connection quality report](report-cloud-pc-connection-quality.md). - +## Provisioning + +### Windows 365 support for Spain Central region + +Windows 365 Enterprise will support the Spain Central region. For more information, see [Supported Azure regions for Cloud PC provisioning](requirements.md?tabs=enterprise%2Cent#supported-azure-regions-for-cloud-pc-provisioning). + +### Windows 365 support for Mexico Central region + +Windows 365 Enterprise will support the Mexico Central region. For more information, see [Supported Azure regions for Cloud PC provisioning](requirements.md?tabs=enterprise%2Cent#supported-azure-regions-for-cloud-pc-provisioning). @@ -95,7 +95,15 @@ The remoting connection report will be retired on December 31st, 2024. After thi ## Windows 365 app--> - +## Windows 365 Frontline + +### Concurrency buffer usage alert + +You’ll be able to set up a new alert to monitor concurrency buffer usage for Windows 365 Frontline in dedicated mode. + +### More precise Windows 365 Frontline concurrency control + +In a future update, you'll be able to allocate concurrent sessions for Windows 365 Frontline Cloud PCs in dedicated mode for each Microsoft Entra group assigned in the provisioning policy. This lets you reserve sessions to specific groups so sessions won't be consumed by other groups, and help you control your maximum concurrency limits. ## Next steps diff --git a/windows-365/enterprise/index.yml b/windows-365/enterprise/index.yml index 2b7edbbb6f8..5fef3f2c623 100644 --- a/windows-365/enterprise/index.yml +++ b/windows-365/enterprise/index.yml @@ -90,7 +90,7 @@ conceptualContent: text: Deploy security baselines - url: set-conditional-access-policies.md itemType: how-to-guide - text: Set conditional access policies + text: Set Conditional Access policies footerLink: url: security-guidelines.md text: See more diff --git a/windows-365/enterprise/introduction-windows-365-frontline.md b/windows-365/enterprise/introduction-windows-365-frontline.md index 07f000728f3..1892035645f 100644 --- a/windows-365/enterprise/introduction-windows-365-frontline.md +++ b/windows-365/enterprise/introduction-windows-365-frontline.md @@ -7,7 +7,7 @@ keywords: author: ErikjeMS ms.author: erikje manager: dougeby -ms.date: 07/31/2024 +ms.date: 10/11/2024 ms.topic: overview ms.service: windows-365 ms.subservice: windows-365-enterprise @@ -31,27 +31,75 @@ ms.collection: # What is Windows 365 Frontline? -Windows 365 Frontline is a version of [Windows 365](../overview.md) that helps organizations save costs by providing a single license to provision three Cloud PC virtual machines. Each license: +Windows 365 Frontline is a version of [Windows 365](../overview.md) that helps organizations save costs by letting them provision a Cloud PC that can be used by multiple users with a single license. -- Lets you provision up to three Cloud PCs. +Windows 365 Frontline is currently only available for Azure Global Cloud. + +Frontline Cloud PCs can't be accessed directly from Remote Desktop app. Instead, you must use Windows App if you want to access your Frontline Cloud PC. You can find [Windows App](/windows-app/overview) at the [Microsoft Store](https://apps.microsoft.com/detail/9n1f85v9t8bn?ocid=pdpshare&hl=en-us&gl=US) or access [windows.cloud.microsoft](https://windows.cloud.microsoft) with your browser. + +> [!NOTE] +> Frontline Cloud PC in shared mode is only accessible using Windows App. + +Windows 365 Frontline has two different modes: dedicated mode and shared mode. + +## Windows 365 Frontline in dedicated mode + +A single license: + +- Lets you provision up to three Cloud PCs that can be used nonconcurrently, each assigned to a single user. - Provides one concurrent session. -Windows 365 Frontline is designed specifically for workers who don't need 24/7 access to their dedicated Cloud PCs. This system better supports organizations that are more elastic and distributed, working across various devices. Frontline Cloud PCs can be helpful for users who are: +Windows 365 Frontline dedicated mode is designed specifically for workers who need a dedicated Cloud PC but don't need 24/7 access. This system better supports organizations that are more elastic and distributed, working across various devices. Frontline Cloud PCs in dedicated mode can be helpful for users who are: - On a rotation schedule. - Working across time zones and regions. - Part-time workers. - Contingent staff. -The maximum number of active Windows 365 Frontline Cloud PC sessions in your organization is equal to the number of Windows 365 Frontline licenses that you purchased. For example, if you purchase 10 licenses, up to 30 Cloud PCs can be provisioned. Ten of those Cloud PCs can be active at a given time. The active sessions are managed automatically. When a user signs off from their Cloud PC, the session is released for another user to start using their Cloud PC. A concurrency buffer exists to exceed the maximum a limited number of times per day. For more information, see [Exceeding the maximum concurrency limit ](#exceeding-the-maximum-concurrency-limit). +The maximum number of active Windows 365 Frontline Cloud PC sessions in your organization is equal to the number of Windows 365 Frontline licenses that you purchased. For example, if you purchase 10 licenses, up to 30 Cloud PCs can be provisioned in dedicated mode. Ten of those Cloud PCs can be active at a given time. The active sessions are managed automatically. When a user signs off from their Cloud PC, the session is released for another user to start using their Cloud PC. A concurrency buffer exists to exceed the maximum a limited number of times per day. For more information, see [Exceeding the maximum concurrency limit ](#exceeding-the-maximum-concurrency-limit). -Windows 365 Frontline is currently only available for Azure Global Cloud. +> [!NOTE] +> +> Windows 365 Frontline Cloud PCs in dedicated mode will automatically power off after the user signs off from the Cloud PC, and will be powered on when the user attempts to connect. It may take more time for the user to connect when the Cloud PC is being powered on. This connection time does not include executing logon scripts set by organizations. +> After the user sign off, the Cloud PC remains powered on for two hours. If the user attempts to reconnect while the Cloud PC is powered on, the connection time will be same as Windows 365 Enterprise Cloud PCs. + +## Windows 365 Frontline in shared mode (preview) + +A single license: + +- Lets you provision one Cloud PC that can be shared noncurrently among a group of users. +- Provides one concurrent session. + +> [!NOTE] +> During [public preview](../public-preview.md), we are evaluating the potential limits for assigned users for shared Cloud PCs. More information will be shared at general availability. + +Windows 365 Frontline in shared mode is designed specifically for workers who + +- Require access to a Cloud PC to perform specialized tasks for a short time during their work day. +- Don't require data persistence. + +Frontline Cloud PCs in shared mode can be helpful for users who are: -Frontline Cloud PCs can't be accessed directly from Remote Desktop app. Instead, you must use the Windows 365 web portal if you want to access your Frontline Cloud PC. +- Customer-facing workers. +- External contractors. + +The maximum number of active Windows 365 Frontline Cloud PC sessions in your organization is equal to the number of Windows 365 Frontline licenses that you set up for a specific group. For example, if you assign 10 Windows 365 Frontline shared licenses, 10 Cloud PCs can be provisioned for the group. Only a single user can connect to a shared Cloud PC at a given time. When a user signs out from the Cloud PC, all user data is deleted and the Cloud PC is released for another user to start using. Concurrency buffer doesn't exist for a Frontline Cloud PC in shared mode. + +> [!NOTE] +> +> During public preview, only data stored in User Profiles is deleted. Any data stored outside of user profiles persists and can be accessed by other users who connect to the Cloud PC. ## Licensing -To use Windows 365 Frontline, you must be licensed for: +Windows 365 Frontline licenses can be purchased through the Microsoft 365 admin center. You can confirm your license quantities under **Billing - Your Products**. + +Windows 365 Frontline licenses are pooled licenses applied at the tenant level, not assigned directly to users. The Microsoft 365 admin center shows Windows 365 Frontline licenses as assigned to zero users. To see how many licenses are being used, use the Windows 365 [utilization report](report-cloud-pc-utilization.md). + +Windows 365 Frontline is a separate product and isn't governed by the Microsoft 365 F1/F3 license eligibility conditions. + +### Windows 365 Frontline licensing + +To use Windows 365 Frontline, each user must be licensed for: - Windows 11 Enterprise or Windows 10 Enterprise - Microsoft Intune @@ -67,12 +115,6 @@ In addition to being available independently, Windows Enterprise, Intune, and Mi - Microsoft 365 Business Premium - Microsoft 365 Education Student Use Benefit subscriptions -Windows 365 Frontline licenses can be purchased through the Microsoft 365 admin center. You can confirm your license quantities under **Billing - Your Products**. - -Windows 365 Frontline licenses are pooled licenses applied at the tenant level, not assigned directly to users. The Microsoft 365 admin center shows Windows 365 Frontline licenses as assigned to zero users. To see how many licenses are being used, use the Windows 365 [utilization report](report-cloud-pc-utilization.md). - -Windows 365 Frontline is a separate product and isn't governed by the Microsoft 365 F1/F3 license eligibility conditions. - ## Managing Windows 365 Frontline Cloud PCs Windows 365 Frontline Cloud PCs can be managed using Microsoft Intune, alongside other Cloud PCs and devices in your tenant. Windows 365 Frontline supports: @@ -89,7 +131,7 @@ You can view your Cloud PCs on two pages: - **All devices**: Turn on the **Model** column to differentiate between Frontline Cloud PCs and others. - **All Cloud PCs**: This list can be filtered to show only Frontline Cloud PCs using the **PC type** filter. -When inactive, Cloud PCs are in a powered off state. You can confirm the power state of the Cloud PC in **Overview** page for a device. +When inactive, Windows 365 Frontline Cloud PCs in dedicated mode are in a powered off state. You can confirm the power state of the Cloud PC in **Overview** page for a device. For the best user experience, make sure to: @@ -98,7 +140,7 @@ For the best user experience, make sure to: ## Exceeding the maximum concurrency limit -Windows 365 Frontline includes a concurrency buffer to let a tenant temporarily exceed the maximum concurrency limit for Windows 365 Frontline Cloud PCs. +Windows 365 Frontline in dedicated mode includes a concurrency buffer to let a tenant temporarily exceed the maximum concurrency limit for Windows 365 Frontline Cloud PCs. For example, when workers overlap during a shift change, a previous worker might need to finish up something before signing off. Or, an incoming worker might need to start a few minutes early. The concurrency buffer is intended to allow for such rare and brief over usage to make sure workers aren’t impacted by unforeseen lockouts. @@ -110,7 +152,7 @@ Excessive use of the concurrency buffer temporarily blocks its further use for t - On four or more occasions within a 24-hour period, the concurrency buffer is used for more than one hour. -While temporarily blocked, you can still use your Windows 365 Frontline Cloud PCs up to the maximum concurrency limit. +While temporarily blocked, you can still use your Windows 365 Frontline Cloud PCs in dedicated mode up to the maximum concurrency limit. ### Permanent blocks @@ -122,7 +164,7 @@ To unblock your tenant, open a ticket with support from the Intune portal. ### Monitor the concurrency buffer -You can monitor the use of concurrency buffer with the Frontline connection hourly report. You can use the Frontline concurrency alert to receive alerts each time the concurrency buffer is activated. The concurrency buffer doesn't apply to GPU-enabled Cloud PCs. +You can monitor the use of concurrency buffer with the Frontline connection hourly report. You can use the Frontline concurrency alert to receive alerts each time the concurrency buffer is activated. The concurrency buffer doesn't apply to GPU-enabled Cloud PCs and Frontline Cloud PCs in shared mode. ## Features not yet supported Windows 365 Frontline @@ -130,6 +172,19 @@ The following features aren't yet supported for Windows 365 Frontline. - Resize a Cloud PC remote action - [Move a Cloud PC](move-cloud-pc.md) +- Cross region disaster recovery + +Windows 365 Frontline in shared mode can only be provisioned in the following Azure regions: + +- Australia East +- Canada Central +- North Europe +- Central India +- Japan East +- UK South +- Central US +- East US +- East US 2 ## Next steps diff --git a/windows-365/enterprise/introduction-windows-365-government.md b/windows-365/enterprise/introduction-windows-365-government.md index b68851734ca..415c88452a9 100644 --- a/windows-365/enterprise/introduction-windows-365-government.md +++ b/windows-365/enterprise/introduction-windows-365-government.md @@ -49,7 +49,6 @@ The following features aren't yet supported for Windows 365 GCC or GCC High. - Unified dashboard - Windows 365 Security baseline -- RDP Shortpath for public networks - Windows 365 System based alerting on Microsoft Intune for Cloud PCs - User initiated feedback in End User Portal and Windows 365 Web Client - Citrix HDX Plus for Windows 365 @@ -68,7 +67,10 @@ The following features aren't yet supported for Windows 365 GCC or GCC High. - [Support for Omnissa Horizon clients and the Blast protocol](set-up-omnissa-horizon.md) - [Microsoft Purview Customer Key](purview-customer-key.md) - [HP Anyware for Windows 365](hp-anyware-set-up.md) -- Bulk Troubleshoot action +- RDP Shortpath for public networks via TURN +- Windows 365 Link +- Configure client device redirection for Windows App on iOS/iPadOS/Android using Intune +- Intune scope tags ## Next steps diff --git a/windows-365/enterprise/known-issues-enterprise.md b/windows-365/enterprise/known-issues-enterprise.md deleted file mode 100644 index 8edc0ee451f..00000000000 --- a/windows-365/enterprise/known-issues-enterprise.md +++ /dev/null @@ -1,254 +0,0 @@ ---- -title: Known issues for Windows 365 Enterprise and Frontline -description: Learn about known issues for Windows 365 Enterprise. -keywords: -ms.author: erikje -author: ErikjeMS -manager: dougeby -ms.date: 7/09/2024 -audience: Admin -ms.topic: troubleshooting -ms.service: windows-365 -ms.subservice: windows-365-enterprise -ms.localizationpriority: high -ms.assetid: - -# optional metadata - -#ROBOTS: -#audience: - -ms.reviewer: ivivano -ms.suite: ems -search.appverid: MET150 -#ms.tgt_pltfrm: -ms.custom: get-started -ms.collection: -- M365-identity-device-management -- tier2 ---- - -# Known issues: Windows 365 Enterprise and Frontline - -The following items are known issues for Windows 365 Enterprise. - -## First-time Cloud PC sign-in triggers Impossible Travel Location alert - -When using Conditional Access, a user who signs in to a Cloud PC for the first time might trigger an impossible travel location alert. - -**Troubleshooting steps**: [Follow these steps to investigate risk](/entra/id-protection/howto-identity-protection-investigate-risk) to verify that the activity matches the expected behavior for the user, based on their physical location and the location of the Cloud PC. - -## Watermarking support in Windows 365 - -Watermarking support is configured on session hosts and enforced by the Remote Desktop client. The settings for Watermarking support can be configured via Group Policy (GPO) or the Intune Settings Catalog. The default for the QR code embedded content setting doesn't allow administrators to look up device information from leaked images for Cloud PCs. - -**Troubleshooting steps**: Ensure that the QR code embedded content setting is configured to **Device ID** either in the GPO or in the Intune Settings Catalog for the Intune Configuration profile used to configure Watermarking support. - -For more information, see [Administrative template for Azure Virtual Desktop](/azure/virtual-desktop/administrative-template?tabs=intune#configure-the-administrative-template). - -[!INCLUDE [Missing start menu and taskbar when using iPad and the Remote Desktop app to access a Cloud PC](../includes/known-issues.md)] - -## In-place Windows upgrade may change computer name - -Upgrading an existing Cloud PC between release versions of Windows 10 to Windows 11 may cause the computer name to be changed to a name with a prefix of "pps" while leaving the Intune device name unchanged. - -**Troubleshooting steps**: Find and manage the Cloud PC in Microsoft Intune by using the unchanged Intune device name, either through the **Devices > All devices** list or the **Devices > Windows 365 > All Cloud PCs** list. - -## Windows 365 provisioning fails - -Windows 365 provisioning failures may occur because both: - -- the Desired State Configuration (DSC) extension isn't signed and -- the PowerShell Execution policy is set to Allsigned in the Group Policy Object (GPO) - -**Troubleshooting steps**: - -1. Did the Azure network connection (ANC) fail with the following error: `"An internal error occurred. The virtual machine deployment timed out."`? -2. If yes, review the related GPO. Is PowerShell Execution set to AllSigned? -3. If it is, either remove the GPO or reset the PowerShell Execution to Unrestricted. -4. Retry the ANC health check. If the check succeeds, retry provisioning. - -## Cloud PC reports as not compliant for compliance policy - -The following device compliance settings report as **Not applicable** when being evaluated for a Cloud PC: - -- **Trusted Platform Module (TPM)** -- **Require encryption of data storage on device.** - -The following device compliance settings may report as **Not Compliant** when being evaluated for a Cloud PC: - -- **Require BitLocker** -- **Require Secure Boot to be enabled on the device.** Cloud PC support for [Secure boot](/windows-hardware/design/device-experiences/oem-secure-boot) functionality is now available to all customers. - -**Troubleshooting steps to enable secure boot on the Cloud PC**: - -1. [Reprovision](reprovision-cloud-pc.md) the specific Cloud PC. - -**Troubleshooting steps to remove not compliant settings**: - -1. [Create a filter for all Cloud PCs](create-filter.md#create-a-filter-for-all-cloud-pcs). -2. For any existing device compliance policies that both evaluate to a Cloud PC and contain either of the **Not Compliant** settings, use this new filter to exclude Cloud PCs from the policy assignment. -3. Create a new device compliance policy without either of the **Not Compliant** settings and use this new filter to include Cloud PCs for the policy assignment. - -## Single sign-on users see a dialog to allow remote desktop connection during the connection attempt - -When enabling single sign-on, a prompt appears to authenticate to Microsoft Entra ID and allow the Remote Desktop connection when launching a connection to a new Cloud PC. Microsoft Entra remembers up to 15 devices for 30 days before prompting again. If you see this dialog, select **Yes** to connect. - -To prevent this dialog from being shown, you can create a pre-consented device group. Follow the instructions to [configure a target device group](/azure/virtual-desktop/configure-single-sign-on#configure-the-target-device-groups) to get started. - - - -## Single sign-on user connections are being denied through Microsoft Entra Conditional Access - -**Possible cause**: To log in through single sign-on, the remote desktop client requests an access token to the **Microsoft Remote Desktop** app in Microsoft Entra, which may be the cause of the failed connection. - -**Troubleshooting**: To [troubleshoot sign-in problems](/azure/active-directory/conditional-access/troubleshoot-conditional-access), follow the steps. - -## Single sign-on users are immediately disconnected when the Cloud PC locks - -When single sign-on isn't used, users can see the Cloud PC lock screen and enter credentials to unlock their Windows session. However, when single sign-on is used, the Cloud PC fully disconnects the session so that: - -1. Users can use passwordless authentication to unlock their Cloud PC. -2. Conditional Access policies and multifactor authentication can be enforced when unlocking the Cloud PC. - - - -## Single sign-on users aren't asked to reauthenticate to Microsoft Entra ID when connecting from an unmanaged device - -When using single sign-on, all authentication behavior (including supported credential types and sign-in frequency) is driven through Microsoft Entra ID. - -**Troubleshooting**: To enforce periodic reauthentication through Microsoft Entra ID, create a Conditional Access policy using the [sign-in frequency control](set-conditional-access-policies.md#configure-sign-in-frequency). - -## I don’t see the Cloud PC reports on the Intune admin center Devices > Overview page - -If you turned on the **Use Devices preview** setting in the Intune admin center, the **Cloud PC performance (preview)** tab, **Cloud PCs with connection quality issues** report, and **Cloud PCs with low utilization** report aren't on the **Overview** page. - -**Troubleshooting steps**: Turn off the **Use Devices preview** toggle in the upper right corner of the **Devices** > **Overview** page. - -## Cloud PC is stuck in a restart loop after a restore or resize action - -**Possible cause**: This issue might occur for Cloud PCs provisioned before July 2022 that use either: - -- MSFT Attack Surface Reduction rules (for example, Manage attack surface reduction settings with endpoint security policies in Microsoft Intune | Microsoft Learn), or -- Third party solutions that block the install language script execution during the post-provisioning process. - -Cloud PCs provisioned after July 2022 don’t encounter this issue. - -**Troubleshooting steps**: Determine the root cause: - -1. Search the Windows Event log. If the system shows the following reboot event (1074), continue to step 2. - - ``` - The process C:\WINDOWS\system32\wbem\wmiprvse.exe () has initiated the restart of computer on behalf of user NT AUTHORITY\SYSTEM for the following reason: Application: Maintenance (Planned) - Reason Code: 0x80040001 - Shutdown Type: restart - Comment: DSC is restarting the computer. - ``` - -2. Run `Get-DscConfigurationStatus` in an elevated command window. If the result shows a reboot pending for a job, continue to step 3. -3. Run `Get-DscConfiguration` in an elevated command window. If the results show the DSC that installs the language, continue to the **Resolution** section. - -**Resolution**: To stop the restart loop, try either of these options: - -- Remove the ASR policies, or switch policies to Audit mode, and then apply the new policies to the Cloud PC. -- In an elevated command window, run the following command to reboot the job: - - `Remove-DSCConfiguration -Stage Pending,Current,Previous -Verbose` - -## Cloud PC connection issues for GCC High government customers - -Some GCC High government customers whose resources are deployed to `microsoft.us`` environments may encounter issues connecting to their Cloud PC using web clients or the Safari browser. - -**Possible cause**: The issue occurs when the web client or the Safari browser blocks third-party cookies. Third-party cookies are cookies set by a domain other than the one you're visiting. - -For GCC High customers with resources deployed to `microsoft.us` environments, the `microsoft.us` cookies are considered third-party cookies by the web client or the Safari browser. This consideration is because the web client/Safari browser uses the Cloud PC’s domain name, which is different from `microsoft.us`, to determine the first-party domain. If the web client/Safari browser blocks third-party cookies, it prevents the `microsoft.us` cookies from: - -- being stored. -- used for authentication and authorization. - -As a result, you can’t connect to your Cloud PC session. - -**Troubleshooting steps**: Allow third-party cookies from `microsoft.us` in your: - -- Web client or Safari browser settings, or -- Group Policy. - -This change lets the web client/Safari browser store and use the `microsoft.us` cookies for connecting to your Cloud PC session. - -## Windows Security reports Memory Integrity is off. Your device may be vulnerable. - -Windows Security reports *Memory Integrity is off. Your device may be vulnerable.* - -In the Cloud PC's Windows Systems Information, you might also see that the Virtualization-based security (VBS) row shows **Enabled but not running**. - -This issue can be caused when nested virtualization is turned *ON*. When nested virtualization is turned on it requires a running nested hypervisor, which inhibits Direct Memory Access Protections. DMA protections are required when running VBS. - -**Troubleshooting steps**: - -Make sure that: - -- Nested virtualization turned *OFF* for the Cloud PC. -- Policies have VBS enabled with DMA protection. - -Another option is to not require DMA for VBS because they're incompatible with each other. - -## Teams isn’t enforcing screen capture protection - -When screen capture protection is enabled, Teams on Windows 365 Cloud PCs isn’t enforcing screen capture protection. - -**Troubleshooting steps**: - -- Confirm that the WebRTC version is up-to-date. -- Confirm that the screen capture protection policy is configured correctly to have client and server selected: - - 1. Sign in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), select **Devices** > **Configuration** > choose the policy. - 2. Under **Configuration settings**, make sure the following is chosen: **Windows Components** > **Remote Desktop Services** > **Remote Desktop Session Host** > **Azure Virtual Desktop**: - - **Enable screen capture protection** = Enable - - **Screen Capture Protection Options** = Block screen capture on client and server - -## Windows 365 scope tags and nested groups - -Windows 365 doesn't support nested security groups. If you apply a scope tag to the top of a nested security group, Cloud PCs in inner nested groups aren't assigned scope tags. - -**Troubleshooting steps**: - -Apply the scope tag individually to each group in the nested security group. - -## Windows 365 doesn't support editing of scope tags for individual Cloud PCs - -Windows 365 user interface and Graph API don't support editing of scope tags for individual Cloud PCs. - -**Troubleshooting steps**: - -Edit scope tags for individual Cloud PCs on Intune's **All Devices** blade to sync the scope tag associations to the Windows 365 service. - -## Scope tags for custom images can't be edited - -Scope tags applied to custom images can't be edited or directly added by top-level admins. - -**Troubleshooting steps**: - -When scoped admins create custom images, those custom images are tagged with the same scope tags that are associated with the scoped admin. - -For example, if an admin scoped with the scope tag “Scope Tag A” creates a custom image, the created custom image is automatically tagged with “Scope Tag A”. - -## WebRTC Redirector Service missing from latest Windows 365 Cloud PC gallery images - -The May 21, 2024 updates for Cloud PC gallery images are missing the WebRTC Redirector Service. Without this component, Teams media redirection doesn't work. - -This applies to the following gallery images: - -- Windows 11 23H2 with Microsoft 365 apps -- Windows 11 22H2 with Microsoft 365 apps - -**Troubleshooting steps** - -For newly provisioned Cloud PCs, verify WebRTC is available. If it’s not, you can use either of the following options: - -- To add the WebRTC Redirector Service app to the list of apps to install by default onto Cloud PCs, follow the steps: [Add Microsoft 365 Apps to Windows 10/11 devices with Microsoft Intune](/mem/intune/apps/apps-add-office365). - -- To add the WebRTC Redirector Service app to an individual Cloud PC, follow the steps: [install the Remote Desktop WebRTC Redirector Service](/azure/virtual-desktop/teams-on-avd#install-the-remote-desktop-webrtc-redirector-service). To get the most up-to-date installer, use this link: [https://aka.ms/msrdcwebrtcsvc/msi]( https://aka.ms/msrdcwebrtcsvc/msi). - -## Next steps - -[Troubleshoot Windows 365 Enterprise Cloud PC](troubleshooting.md) diff --git a/windows-365/enterprise/media/connection-errors/allow-pku2u.png b/windows-365/enterprise/media/connection-errors/allow-pku2u.png deleted file mode 100644 index c578ba58dfa..00000000000 Binary files a/windows-365/enterprise/media/connection-errors/allow-pku2u.png and /dev/null differ diff --git a/windows-365/enterprise/media/troubleshoot-windows-365-app/azure-virtual-desktop.png b/windows-365/enterprise/media/troubleshoot-windows-365-app/azure-virtual-desktop.png deleted file mode 100644 index ddd05964f6a..00000000000 Binary files a/windows-365/enterprise/media/troubleshoot-windows-365-app/azure-virtual-desktop.png and /dev/null differ diff --git a/windows-365/enterprise/media/troubleshoot-windows-365-boot/connection-issue.png b/windows-365/enterprise/media/troubleshoot-windows-365-boot/connection-issue.png deleted file mode 100644 index 4bf37a856e8..00000000000 Binary files a/windows-365/enterprise/media/troubleshoot-windows-365-boot/connection-issue.png and /dev/null differ diff --git a/windows-365/enterprise/media/troubleshoot-windows-365-boot/something-went-wrong.png b/windows-365/enterprise/media/troubleshoot-windows-365-boot/something-went-wrong.png deleted file mode 100644 index 9c997a426e3..00000000000 Binary files a/windows-365/enterprise/media/troubleshoot-windows-365-boot/something-went-wrong.png and /dev/null differ diff --git a/windows-365/enterprise/move-cloud-pc.md b/windows-365/enterprise/move-cloud-pc.md index 174dcfd3348..8e1d1fd1c83 100644 --- a/windows-365/enterprise/move-cloud-pc.md +++ b/windows-365/enterprise/move-cloud-pc.md @@ -7,7 +7,7 @@ keywords: author: ErikjeMS ms.author: erikje manager: dougeby -ms.date: 07/25/2024 +ms.date: 12/06/2024 ms.topic: how-to ms.service: windows-365 ms.subservice: windows-365-enterprise @@ -31,45 +31,47 @@ ms.collection: # Move a Cloud PC -By editing a provisioning policy, you can move existing Cloud PCs from their current region or Azure network connection (ANC) to a new one. +By editing a provisioning policy, you can move some or all existing Cloud PCs in a policy from: -The best time to perform moves is over the weekend to make sure the impact to users is minimized. Cloud PCs are shut down during the move process, so you should notify your users before the move so that they can save their work and sign out. +- One region to another single region. +- One Azure network connection (ANC) to another ANC. +- A Microsoft hosted network to an ANC and vice versa. -New Cloud PCs created by the edited provisioning policy are assigned to the new region or ANC. +## Bulk move all Cloud PCs in a policy -## Move a Cloud PC +[!INCLUDE [Move a Cloud PC first steps](../includes/move-cloud-pc-steps.md)] +6. In the **Apply this configuration to existing Cloud PCs** box, select **Region or Azure network connections for all devices** > **Apply**. -1. Sign in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), select **Devices** > **Windows 365** (under **Provisioning**) > **Provisioning policies** > select a policy. -2. Under **General**, select **Edit**. -3. Under **Join type details**, make changes depending on the original type: - - - For **Hybrid Microsoft Entra Join**, change the ANC\*. - - For **Microsoft Entra Join**: +\* The domain defined in the new ANC must match that of the Cloud PCs that you want to move. The domain used in the original ANC must be reachable from the new ANC. - - You can change **Network** type from ANC to Microsoft hosted network, or vice versa. - - If a **Microsoft hosted network** is used, change the **Geography** and/or **Region**. - - If an **Azure network connection** is used, change the ANC\*. +All Cloud PCs provisioned after these changes are created in the new region. -4. Select **Next** > **Update**. -5. When ready to move the existing Cloud PCs, select **Apply region change to existing Cloud PCs**. +## Move a subset of Cloud PCs -\* The domain defined in the new ANC must match that of the Cloud PCs that you want to move. The domain used in the original ANC must be reachable from the new ANC. +[!INCLUDE [Move a Cloud PC first steps](../includes/move-cloud-pc-steps.md)] +6. In the **Apply this configuration to existing Cloud PCs** box, select **Region or Azure network connections for select devices (preview)** > **Apply**. +7. Under **Select devices (preview)**, select the devices that you want to move. You can move up to 100 devices at a time. +8. Choose **Select** > **Continue**. -All Cloud PCs provisioned after these changes are created in the new region. +## Best practices -## Move process +The best time to perform moves is over the weekend to make sure the impact to users is minimized. Cloud PCs are shut down and inaccessible for up to several hours during the move process. You should notify your users before the move so that they can save their work and sign out. + +When moving many devices to a new region, start with a few non-critical Cloud PCs and check for success before moving the critical Cloud PCs. + +You can track the status of moving Cloud PCs with the [Cloud PC actions report](report-cloud-pc-actions.md). + +New Cloud PCs created by the edited provisioning policy are assigned to the new region or ANC. -1. All Cloud PCs in the move are backed up before being moved to the new region. This backup, which can take some time, can begin while the user is signed in and active. -2. After the backup is complete, the Cloud PC is shut down. -3. The Cloud PC is moved. During this time, which can take several hours, the Cloud PC is inaccessible. +## Other move operations - - During the move, you can view the status in the **All Cloud PCs** list. The move is complete when the status indicates **Provisioned**. +Cloud PCs can't be moved from one provisioning policy to another. -4. After the move is complete, users can sign in. +You can't move some Cloud PCs to one region and other Cloud PCs to another region in the same policy edit operation. -If an error occurs, you retry the move. +You can't move Cloud PCs from one virtual network or subnet to another using the edit provisioning policy method. To make VNet/subnet changes, create a new ANC with the updated vNet/subnet and then move the Cloud PCs to the new ANC. ## Next steps -[Manage your Cloud PCs](device-management-overview.md). +[Manage your Cloud PCs](device-management-overview.md). \ No newline at end of file diff --git a/windows-365/enterprise/place-cloud-pc-under-review.md b/windows-365/enterprise/place-cloud-pc-under-review.md index 40ca3c342b5..8fe802efed0 100644 --- a/windows-365/enterprise/place-cloud-pc-under-review.md +++ b/windows-365/enterprise/place-cloud-pc-under-review.md @@ -52,7 +52,7 @@ As part of the process to place Cloud PCs under review, Windows 365 requires the 2. Configure the storage account with the following settings; - **Instance details** - **Region**: Same region as CloudPC suggested for performance. There is no restriction on which region. - - **Performance**: **Premium** + - **Performance**: **Premium** (supports only hot [access tier](/azure/storage/blobs/access-tiers-overview)) or **Standard** (supports all access tiers). - **Premium account type**: **Page blobs** - **Security** - Minimum TLS version: **Version 1.2** @@ -73,7 +73,7 @@ After setting up an Azure storage account with permissions as explained above, y 2. Select the ellipses (**…**) > **Place cloud PC under review**. ![Screenshot of place a Cloud PC under review](./media/place-cloud-pc-under-review/place-cloud-pc-under-review.png) -3. Select the Azure subscription and the Azure storage account to which the Windows 365 service was given **Storage Account Contributor** and **Storage Blob Data Contributor** permissions. +3. Select the **Subscription**, **Storage account**, and **Access tier** to which the Windows 365 service was given **Storage Account Contributor** and **Storage Blob Data Contributor** permissions. Under **Access during review**, if you choose - **Block Access**, the Cloud PC will be immediately powered off so the user cannot access the Cloud PC, and then the snapshot will be created. This is useful in cases where you may want to contain a security threat by shutting the Cloud PC down, and then performing analysis of the snapshot later in an isolated environment. @@ -93,7 +93,6 @@ Sign in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/? You can also use Intune’s bulk device actions to place multiple Cloud PCs under review at the same time. For more information, see [Use bulk device actions]( /mem/intune/remote-actions/bulk-device-actions). - > [!NOTE] > Up to 10 Cloud PCs can be placed under review simultaneously. When more than 10 are placed under review at once, requests are queued and timeouts may increase if the request remains in the queue for too long. If you experience timeouts, it is recommended you stagger the requests to allow sufficient time for previous requests to complete first. Completion times will depend on the size of the Cloud PC disk as well as the location and type of your Azure Storage account. diff --git a/windows-365/enterprise/planning-guide.md b/windows-365/enterprise/planning-guide.md index 2a99ce89d7f..8894b5ea7dc 100644 --- a/windows-365/enterprise/planning-guide.md +++ b/windows-365/enterprise/planning-guide.md @@ -62,9 +62,9 @@ You’ll manage your Cloud PC devices by using the [Microsoft Intune admin cente ## Inventory your environment -All users [connect to a Cloud PC](../end-user-access-cloud-pc.md) through a Remote Desktop Client or a supported browser. This connection lets users access their Cloud PC from a wide range of devices. +All users [connect to a Cloud PC](../end-user-access-cloud-pc.md) through a Windows App client or a supported browser. This connection lets users access their Cloud PC from a wide range of devices. -**Task**: For each use case, determine how your end users will connect to their Cloud PC. Determine which platforms they'll use to connect. Will they use a browser or a Remote Desktop Client to connect? +**Task**: For each use case, determine how your end users will connect to their Cloud PC. Determine which platforms they'll use to connect. Will they use a browser or a Windows App client to connect? For information on connectivity requirements and supported configurations, see [Requirements](requirements.md). diff --git a/windows-365/enterprise/provisioning-errors.md b/windows-365/enterprise/provisioning-errors.md deleted file mode 100644 index e2453e87bac..00000000000 --- a/windows-365/enterprise/provisioning-errors.md +++ /dev/null @@ -1,193 +0,0 @@ ---- -# required metadata -title: Troubleshoot provisioning errors -titleSuffix: -description: Troubleshoot provisioning errors in Windows 365. -keywords: -author: ErikjeMS -ms.author: erikje -manager: dougeby -ms.date: 09/13/2024 -ms.topic: how-to -ms.service: windows-365 -ms.subservice: windows-365-enterprise -ms.localizationpriority: high -ms.assetid: - -# optional metadata - -#ROBOTS: -#audience: - -ms.reviewer: mattsha -ms.suite: ems -search.appverid: MET150 -#ms.tgt_pltfrm: -ms.custom: intune-azure; get-started -ms.collection: -- M365-identity-device-management -- tier2 ---- - -# Troubleshoot provisioning errors - -The following errors can occur during Cloud PC provisioning. - - - -## Microsoft Entra ID service connection point (SCP) misconfigured - -The service connection point (SCP) is used by your Cloud PCs to discover your Microsoft Entra tenant information. You must configure your SCPs by using Microsoft Entra Connect for each forest you plan to join Cloud PCs to. - -If the SCP configuration doesn't exist, or can't be discovered by using the vNet declared, provisioning will fail. - -To understand more about the SCP and learn how to configure it, see the [Microsoft Entra documentation](/azure/active-directory/devices/hybrid-azuread-join-managed-domains). - -**Suggested test**: Confirm with your identity team that the SCP exists for all target forests. - -## Azure network connection isn’t healthy - -Cloud PC provisioning is blocked if the associated ANC isn’t healthy. - -The ANC refreshes every 6 hours. Provisioning will fail if the ANC refresh fails while provisioning is under way. - -**Suggested test**: Make sure that the ANC is healthy and retry the provisioning. - -## Disk allocation error - -Windows 365 provisioned the Cloud PC but didn’t allocate the full OS storage according to what the user should have received based on their assigned Windows 365 license. As a result, the user can’t see or use the full storage that they were assigned. - -**Suggested test**: Retry provisioning. - -## Domain join failed - -Windows 365 failed to join the Cloud PC to your on-premises Active Directory (AD) domain. Many factors can cause this failure. - -- Makes sure that the AD domain, organizational unit (OU), and credentials in the associated Azure network connection (ANC) are correct. -- Make sure that the domain join user has sufficient permissions to perform the domain join. -- Make sure that the vNet and subnet can reach a domain controller correctly. - -JsonADDomainExtension is the Azure function used to perform this domain join. Make sure that everything required for this domain join to be successful is in place. - -**Suggested test**: Attach an Azure VM to the configured vNet and perform a domain join using the credentials provided. - - - -## Microsoft Entra hybrid join failed - -Windows 365 doesn’t perform any Microsoft Entra hybrid join function for the customer. Microsoft Entra hybrid join must be configured and healthy as a prerequisite for Cloud PC. - -If provisioning fails because of Microsoft Entra hybrid join, it’s likely because of an insufficient sync period configured in your AD Sync service. Make sure that Microsoft Entra Connect is configured to sync the AD computer objects every 30 minutes, and no more than 60 minutes. This step times out if the Microsoft Entra object doesn’t appear within 90 minutes. - -Another factor to consider is your on-premises AD replication time. Make sure that the domain controller being used for Windows 365 is replicated fast enough to make it into Microsoft Entra ID within this five hour timeout window. - -If your organization uses Active Directory Federation Services (ADFS), this registration process is optimized and may result in Cloud PC provisioning completing faster than a Microsoft Entra Connect sync might. - -**Suggested test**: Check to see that the AD object: - -- Appears in the correct OU. -- Is successfully synced to Microsoft Entra ID before provisioning times out. - -## Intune enrollment failed - -Windows 365 performs a device-based MDM enrollment into Intune. - -If Intune enrollment is failing, make sure that: - -- All of the required Intune endpoints are available on the vNet of your Cloud PCs. -- There are no MDM enrollment restrictions on the tenant. Windows corporate device enrollment is allowed in custom and default policies. -- The Intune tenant is active and healthy. -- If co-managing Cloud PCs with Intune and Configuration Manager, ensure that the Cloud PC OU isn't targeted for client push installation. Instead deploy the Configuration Manager agent from Intune. For more information, see Configuration Manager [client installation methods](/mem/configmgr/core/clients/deploy/plan/client-installation-methods#microsoft-intune-mdm-installation). - -**Suggested test**: Attempt an Intune enrollment using a test device or VM. - -## License not found - -While a provisioning is in progress, someone removed the user’s Windows 365 license - -**Suggested test**: Make sure that the user has a valid license associated. - -## Local administrator permissions error - -Windows 365 provisioned the Cloud PC but didn’t grant the user local administrator permissions as defined by a User Settings policy. As a result, the user won’t isn't an administrator on their Cloud PC. So, they can’t make system-level changes or install apps on the system-level context. - -**Suggested test**: Retry provisioning or create a new User Settings policy. - -## Microsoft Teams optimization error - -Windows 365 provisioned the Cloud PC. However, it didn’t configure the Cloud PC to use Microsoft Teams in the mode optimized for running on a remote VM. This optimization doesn't install Microsoft Teams and all components. It only sets the configuration that takes effect if you do install Microsoft Teams on the Cloud PC. If this optimization isn't set and Microsoft Teams is installed on this device, Microsoft Teams doesn't run in the optimized mode for remote connections. - -**Suggested test**: Retry provisioning. - -## Not enough IP addresses available - -When providing a subnet to the ANC, make sure that there are more than sufficient IP addresses. - -Every Cloud PC provisioning process uses one of the IP addresses provided in the range. - -If a provisioning fails, it's retried a total of three times. Each time, a new vNic and IP address is allocated. These IP addresses will be released in a matter of hours, but this allocation can cause issues if the address space is too narrow. - -**Suggested test**: Check the vNet for available IP addresses, and make sure that there are more than enough IPs available for the retry process to succeed. - -## Provisioning policy not found - -While a provisioning is in progress, someone deleted the provisioning policy. - -**Suggested test**: Make sure that the provisioning policy is available and assigned to the correct user group. - -## Request disallowed by policy - -Windows 365 uses the customer provided vNet to perform a vNic ingestion from the Cloud PC into the customer’s vNet. Sometimes an enterprise implements an Azure Policy to restrict certain Azure objects being created. Make sure that there are no Azure policies that may restrict Windows 365 from creating Azure objects on your behalf. - -**Suggested test**: View **Policy** in the Azure portal and look for any policy events that would stop the Windows 365 service from provisioning the Cloud PC. - -## Start Menu power icons error - -Windows 365 provisioned the Cloud PC but didn’t hide the shutdown and restart icons in the Start Menu. As a result, the user sees the shutdown and restart icons in the Start Menu. If the user ends their Cloud PC connection by selecting the shutdown icon, they may need to restart the Cloud PC from the Cloud PC portal before connecting again. - -**Suggested test**: Retry provisioning or create a device configuration policy to [hide the shut down button](/windows/client-management/mdm/policy-csp-start#start-hideshutdown) and to [hide the restart button](/windows/client-management/mdm/policy-csp-start#start-hiderestart). - -## Supported Azure regions for Cloud PCs not listed in provisioning user interface - -If a specific region isn't listed in the Cloud PC provisioning user interface (UI), but is listed in the [Windows 365 requirements documentation](requirements.md), Windows 365 might expand in a new region. If your networking infrastructure is in such a region, select **New support request** to open a support ticket for evaluation. - -## Time zone redirection error - -Windows 365 provisioned the Cloud PC but didn’t configure time zone redirection. As a result, the user doesn't see their local time reflected when connected to their Cloud PC. Instead, they see the standard UTC time. - -**Suggested test**: Retry provisioning or create a Group Policy Object with the Allow time zone redirection group policy configured. To learn more about the policy, download the [Group Policy Settings Reference Spreadsheet](https://www.microsoft.com/download/101451). - -## User not found - -While a provisioning is in progress, someone deleted the associated user. - -**Suggested test**: Make sure that the assigned user account is valid. - -## Windows reset error - -Windows 365 provisioned the Cloud PC but didn’t disable the built-in Windows reset option. As a result, the user can manually trigger the built-in Windows reset option under Settings. The Cloud PC will never successfully complete the reset, which makes the Cloud PC unusable. - -**Suggested test**: Retry provisioning. - -## Blocking High Risk Ports: One or more high risk ports couldn’t be disabled - -Windows 365 provisioned the Cloud PC but was unable to block all high-risk ports based on Microsoft security standards. Windows 365 disables high risk ports used for the management of resources or unsecure/unencrypted data transmission and shouldn't be exposed to the internet by default. - -If you are seeing this error, some factors to consider are: - -- Sometimes an enterprise will implement an Intune group policy that enables one of these ports by default. -- Make sure that there are no Intune policies that may override Windows 365's default of disabling these high-risk ports. - -**Suggested test**: Try any of these solutions: - -- Retry provisioning. -- If the device is Intune-enrolled, you can apply Intune policy to disable the ports. -- The user can also disable the ports manually by adding a local firewall rule onto their device. For a list of high risk ports that are recommended for blocking, please see [Security admin rules in Azure Virtual Network Manager](/azure/virtual-network-manager/concept-security-admins#protect-high-risk-ports). - -## Other provisioning failures - -If you encounter other provisioning errors not covered above, make sure all the [required endpoints](requirements-network.md?tabs=enterprise%2Cent#allow-network-connectivity) are allowed on the VNet used for your ANC and any gateway device. - - -## Next steps -[Troubleshooting](troubleshooting.md). diff --git a/windows-365/enterprise/provisioning.md b/windows-365/enterprise/provisioning.md index 24e72c888bf..636c85c1b9c 100644 --- a/windows-365/enterprise/provisioning.md +++ b/windows-365/enterprise/provisioning.md @@ -109,6 +109,8 @@ When a Cloud PC is reprovisioned, the Cloud PC is deleted and recreated as a new The Cloud PC will be reprovisioned to the current configured settings in the provisioning policy that is targeting the user's Microsoft Entra group. If the image referenced by the policy has changed, or if any other changes to the policy have been made, the reprovisioned Cloud PC uses the new settings. +[!INCLUDE [Reprovision a Frontline shared Cloud PC](../includes/reprovision-frontline-shared-cloud-pc.md)] + For more information, see [Reprovision a Cloud PC](reprovision-cloud-pc.md). ## Users with multiple Windows 365 licenses diff --git a/windows-365/enterprise/remotely-manage-cloud-pc.md b/windows-365/enterprise/remotely-manage-cloud-pc.md index e660aff646e..7ede0f0de7b 100644 --- a/windows-365/enterprise/remotely-manage-cloud-pc.md +++ b/windows-365/enterprise/remotely-manage-cloud-pc.md @@ -31,7 +31,7 @@ ms.collection: # Remotely manage Windows 365 devices -You can remotely manage Cloud PCs in Intune just like any other managed device. For more information, see [Remotely run device actions with Intune](/mem/intune/remote-actions/). +You can remotely manage Cloud PCs in Intune just like any other managed device. For more information, see [Use remote actions to manage devices using Intune](/mem/intune/remote-actions/device-management). Cloud PCs support the following remote management actions: @@ -57,9 +57,15 @@ Cloud PCs support the following remote management actions: You can run remote actions for up to 5,000 Cloud PCs at a time. For more information about bulk actions, see [Use bulk device actions](/mem/intune/remote-actions/bulk-device-actions). +Within the Intune portal, you can get to the bulk actions tab by going to **Devices**> **All devices** > **Bulk device actions**. + ## Windows 365 Frontline Cloud PCs -Frontline Cloud PCs support remote actions like Enterprise Cloud PCs. One difference is that a Frontline Cloud PC power state is determined by the end user. When a Frontline Cloud PC is on, remote actions are started immediately. If a Frontline Cloud PC is powered off, remote actions start as soon as the Cloud PC is powered on. When a Cloud PC is powered on, it uses a license that others can't use. When the Cloud PC is powered off, the license is freed up so others can use it. +Frontline Cloud PCs support remote actions like Enterprise Cloud PCs. + +### End user's power state + +One difference is that a Frontline Cloud PC power state is determined by the end user. When a Frontline Cloud PC is on, remote actions are started immediately. If a Frontline Cloud PC is powered off, remote actions start as soon as the Cloud PC is powered on. When a Cloud PC is powered on, it uses a license that others can't use. When the Cloud PC is powered off, the license is freed up so others can use it. You can view the power state for Frontline Cloud PCs in the Intune portal on the devices **Properties** page. @@ -75,7 +81,9 @@ You can also power on and power off Frontline Cloud PCs in bulk to help with: - Make sure Cloud PCs are on for an incoming shift. - Manage concurrency limits. -Within the Intune portal, you can get to the bulk actions tab by going to **Devices**> **All devices** > **Bulk device actions**. +### Bulk reprovision Frontline Cloud PCs in shared mode + +[!INCLUDE [Reprovision a Frontline shared Cloud PC](../includes/reprovision-frontline-shared-cloud-pc.md)] ## Next steps diff --git a/windows-365/enterprise/report-cloud-pc-connection-quality.md b/windows-365/enterprise/report-cloud-pc-connection-quality.md index f5006b63761..875146645b5 100644 --- a/windows-365/enterprise/report-cloud-pc-connection-quality.md +++ b/windows-365/enterprise/report-cloud-pc-connection-quality.md @@ -51,6 +51,7 @@ The device list shows the individual Cloud PCs with the following columns: - **Client IP address** - **Protocol for most recent (or current) connection** - **UDP Utilization average over date range** +- **Device type**: The type of Cloud PC based on the offering (Enterprise, Frontline dedicated, Frontline shared). Each row in the report gives links to the specific Cloud PC where you can find greater detail regarding the devices connection history and related performance. diff --git a/windows-365/enterprise/report-cloud-pc-utilization.md b/windows-365/enterprise/report-cloud-pc-utilization.md index 2358d38d482..3bc0b9693f8 100644 --- a/windows-365/enterprise/report-cloud-pc-utilization.md +++ b/windows-365/enterprise/report-cloud-pc-utilization.md @@ -55,11 +55,12 @@ The report shows the following tenant data aggregated for the last four weeks: - **No active time connected**: Zero hours. - List of individual Cloud PCs with the following columns: - **Device name** - - **Primary user UPN**: The user's identifier in Active Directory in the form of an email address. + - **User UPN**: The user's identifier in Active Directory in the form of an email address. - **PC type** - **Time connected**: The total hours that the user has been connected to the Cloud PC over the last four weeks. - **Date last connected**: The date when the user most recently connected to their Cloud PC (within the last 60 days). If the user isn't currently connected to the Cloud PC, this date is the sign out time. If the user is connected to the Cloud PC, this date is the most recent connection time. - **Date created**: The date the Cloud PC was created. + - **Device type**: The type of Cloud PC based on the offering (Enterprise, Frontline dedicated, Frontline shared). ### Filters diff --git a/windows-365/enterprise/report-cloud-pcs-not-available.md b/windows-365/enterprise/report-cloud-pcs-not-available.md index 021a70a8027..c9ad2fa3e63 100644 --- a/windows-365/enterprise/report-cloud-pcs-not-available.md +++ b/windows-365/enterprise/report-cloud-pcs-not-available.md @@ -7,8 +7,8 @@ keywords: author: ErikjeMS ms.author: erikje manager: dougeby -ms.date: 10/18/2024 -ms.topic: overview +ms.date: 12/18/2024 +ms.topic: how-to ms.service: windows-365 ms.subservice: windows-365-enterprise ms.localizationpriority: high @@ -31,7 +31,7 @@ ms.collection: # Cloud PCs that aren't available report -The **Cloud PCs that aren't available** helps Windows 365 administrators identify Cloud PCs that might be currently unavailable. +The **Cloud PCs that aren't available** report helps Windows 365 administrators identify Cloud PCs that might be currently unavailable. This report displays recent conditions up to 5 to 15 minutes ago. Therefore, Cloud PCs in the report might have already recovered since the condition was recorded. Also, Cloud PCs that recently became unavailable might not be in the report. @@ -41,6 +41,8 @@ To get to the **Cloud PCs that aren't available** report, sign in to [Microsoft ![Screenshot of getting to the Cloud PCs that aren't available report](./media/report-cloud-pcs-not-available/view-report-cloud-pcs-not-available.png) +## Data table + The device list shows the individual Cloud PCs with the following columns: - **Device name** @@ -62,9 +64,22 @@ You can use the **Columns** and **Add filter** options to customize the report: You can use the **View details** link to see the recent history of the Cloud PC. You can then cross-reference multiple conditions and timelines to find potential root causes of Cloud PC unavailability. -By using the various columns together, an experienced admin may draw clues to the state of the device and the underlying cause of any problems. For example, a user complains to your help desk that they can't access their Cloud PC. you check this report and see no data in the **Host health** or **System status** columns, the **Device status** is **Provisioned**, and the **Connection error** says **Client Disconnect**. Other Cloud PCs in the same region aren't in the list. This issue is probably specific to this user, possibly something to do with the physical client configuration, network configuration, or network infrastructure. +By using the various columns together, an experienced admin may draw clues to the state of the device and the underlying cause of any problems. For example, a user complains to your help desk that they can't access their Cloud PC. You check this report and see no data in the **Host health** or **System status** columns, the **Device status** is **Provisioned**, and the **Connection error** says **Client Disconnect**. Other Cloud PCs in the same region aren't in the list. This issue is probably specific to this user, possibly something to do with the physical client configuration, network configuration, or network infrastructure. + +## Bulk device actions + +You can use **Bulk device actions** to perform device actions on multiple Cloud PCs at one time. + +1. Optional. Use **Add filters** to filter the table data to see the Cloud PCs that you want to manage. +2. Select the Cloud PCs that you want to manage (maximum of 100,000 Cloud PCs). +3. Select **Bulk device actions** > specific device action. +4. Based on the specific action, complete the subsequent pages. + +The time it takes to complete the actions varies depending on the specific action. ## Next steps [Remoting connection report](report-remoting-connection.md) + +[Remotely manage Windows 365 devices](remotely-manage-cloud-pc.md). diff --git a/windows-365/enterprise/report-connected-frontline-cloud-pcs.md b/windows-365/enterprise/report-connected-frontline-cloud-pcs.md index 05dbe611669..a851fef6617 100644 --- a/windows-365/enterprise/report-connected-frontline-cloud-pcs.md +++ b/windows-365/enterprise/report-connected-frontline-cloud-pcs.md @@ -7,7 +7,7 @@ keywords: author: ErikjeMS ms.author: erikje manager: dougeby -ms.date: 11/04/2024 +ms.date: 11/19/2024 ms.topic: overview ms.service: windows-365 ms.subservice: windows-365-enterprise @@ -29,17 +29,32 @@ ms.collection: - tier2 --- + + # Connected Frontline Cloud PCs report (preview) This report helps you: -- Understand the number of concurrent connections for each Cloud PC size. +- Understand the maximum number of concurrent connections for each Cloud PC license size that you own (maximum concurrency limit). +- See which users are currently connected to their Frontline Cloud PC and see their session length. +- See which users are currently using the concurrency buffer (Frontline Cloud PCs in dedicated mode only). +- Restart Frontline Cloud PCs to get concurrency below the set threshold. - Make sure you have purchased the right number of licenses for your peak usage. -By reviewing the maximum concurrent connections, you can decide if you need to purchase more licenses to ensure your end users aren't blocked from using their Frontline Cloud PCs. - The Connected Frontline Cloud PCs report is in [public preview](..\public-preview.md). +## Maximum concurrency limit + +The maximum concurrency limit is set by the total number of Frontline licenses that you've purchased. If this limit is reached, subsequent users won't be able to connect to their Cloud PCs. + +In such cases, you can do any of the following to unblock users: + +- Restart some Cloud PCs to reduce concurrency. You can use the session length information to help identify which Cloud PCs to Restart. +- Redistribute licenses across the Microsoft Entra group assignment. +- Purchase more licenses. + +If the total number of connections exceeds the maximum concurrency limit, it means that you're using the [concurrency buffer](introduction-windows-365-frontline.md#exceeding-the-maximum-concurrency-limit) (for Frontline Cloud PCs in dedicated mode only). + ## Requirements The following permissions are required to view this report: @@ -51,22 +66,35 @@ To assign these permissions, go to **Tenant administration** > **Roles** > **Cre ## Use the Connected Frontline Cloud PCs report -To get to the **Connected Frontline Cloud PCs** report, sign in to [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), select **Devices** > **Cloud PC performance (preview)** > **View report** (under **Connected Frontline Cloud PCs**) > select a Cloud PC size. +To get to the **Connected Frontline Cloud PCs** report, sign in to [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), select **Reports** > **Cloud PC overview** > **Connected Frontline Cloud PCs (preview)** > select a Cloud PC size. :::image type="content" source="./media/report-connected-frontline-cloud-pcs/view-report.png" alt-text="Screenshot of getting to the Cloud PC utilization report." lightbox="./media/report-connected-frontline-cloud-pcs/view-report.png"::: +If you have provisioned Frontline Cloud PCs in shared mode, the related assignments are displayed under the selected Cloud PC size. + ## Report data +This report is specific to Windows 365 Frontline dedicated and shared mode. It doesn't apply to other Windows 365 plans. If you haven't purchased any Windows 365 Frontline licenses for your tenant, no data is displayed in the report. + +### Concurrent connection history + The report shows the following data aggregated for the last 28 days: - **Current connections**: Number of currently connected Frontline Cloud PCs. +- **Concurrent connection history**: This graph can help you decide if you need to purchase more licenses to increase your concurrency limit. - **Most concurrent connections**: Highest number of connected Frontline Cloud PCs for the filtered range: - Daily for past 7 or 28 days. - Hourly for the past one, three, or seven days. - **Limit**: Maximum concurrency limit, which is equal to the number of licenses purchased. - **Reached concurrency limit**: Warnings for approaching and reaching the maximum concurrency limit. -This report is specific to Windows 365 Frontline and doesn't apply to other Windows 365 plans. If no Windows 365 Frontline licenses have been purchased on your tenant, no data is in the report. +The **Concurrent connection history** chart shows when you reach or exceed the max concurrency limit for your tenant or selected group assignment. If you see the total number of connections exceed the max concurrency limit, you're using your concurrency buffer (Frontline dedicated mode only). For more information, see [Exceeding the maximum concurrency limit](introduction-windows-365-frontline.md#exceeding-the-maximum-concurrency-limit). + +### Connected devices + +To see which users are currently connected, select **Connected**. + +This section shows which Cloud PCs are currently connected. To bring concurrency below the maximum limit, you can restart Cloud PCs to disconnect the user from their session. ## Next steps diff --git a/windows-365/enterprise/reprovision-cloud-pc.md b/windows-365/enterprise/reprovision-cloud-pc.md index 5b30f715780..c226308d374 100644 --- a/windows-365/enterprise/reprovision-cloud-pc.md +++ b/windows-365/enterprise/reprovision-cloud-pc.md @@ -39,7 +39,9 @@ To **Reprovision** a Cloud PC, it must have a status of **Failed** or **Provisio For information on when to use the **Reprovision** action, see [Reprovisioning](provisioning.md#reprovisioning). -## Reprovision a Cloud PC +[!INCLUDE [Reprovision a Frontline shared Cloud PC](../includes/reprovision-frontline-shared-cloud-pc.md)] + +## Reprovision a Cloud PC 1. Sign in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), select **Devices** > **All Devices** > choose a Cloud PC device > **Reprovision**. ![Screenshot of reprovision a Cloud PC](./media/reprovision-cloud-pc/reprovision.png) diff --git a/windows-365/enterprise/requirements.md b/windows-365/enterprise/requirements.md index aedc7dd898a..fd9438fac07 100644 --- a/windows-365/enterprise/requirements.md +++ b/windows-365/enterprise/requirements.md @@ -125,6 +125,8 @@ Windows 365 manages the capacity and availability of underlying Azure resources - Central India - Japan - Japan East +- Middle East + - Israel Central - Norway - Norway East - South Africa diff --git a/windows-365/enterprise/restrict-office-365-cloud-pcs.md b/windows-365/enterprise/restrict-office-365-cloud-pcs.md index bd087454bfd..e94166f5bef 100644 --- a/windows-365/enterprise/restrict-office-365-cloud-pcs.md +++ b/windows-365/enterprise/restrict-office-365-cloud-pcs.md @@ -37,9 +37,9 @@ This article describes how to limit access to Office 365 services. You can use t 1. Create a Microsoft Entra security group to manage which users are controlled by the new policy. Add to this group all the Cloud PC users who will be subjected to the new policy. Only users in this group will be restricted to using Cloud PCs when accessing Office 365 services. If you want to change a user’s access, you can just remove them from this group. -2. Sign in to [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), select **Endpoint security** > **Conditional access** > **Create new policy**. +2. Sign in to [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), select **Endpoint security** > **Conditional Access** > **Create new policy**. - ![Create conditional access policy screen shot](./media/restrict-office-365-cloud-pcs/create-conditional-policy.png) + ![Create Conditional Access policy screen shot](./media/restrict-office-365-cloud-pcs/create-conditional-policy.png) 3. Type a **Name** for your new Conditional Access policy. For example, “Restrict Office 365 access to CPCs”. diff --git a/windows-365/enterprise/role-based-access.md b/windows-365/enterprise/role-based-access.md index 1411704c8f3..a8f3154da22 100644 --- a/windows-365/enterprise/role-based-access.md +++ b/windows-365/enterprise/role-based-access.md @@ -33,7 +33,7 @@ ms.collection: Role-based access control (RBAC) helps you manage who has access to your organization's resources and what they can do with those resources. You can assign roles for your Cloud PCs by using the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431). -When a user with the Subscription Owner or User Access Administrator role creates, edits, or retries an ANC, Windows 365 transparently assigns the required built-in roles the following resources (if tehy're not already assigned): +When a user with the Subscription Owner or User Access Administrator role creates, edits, or retries an ANC, Windows 365 transparently assigns the required built-in roles the following resources (if they're not already assigned): - Azure Subscription - Resource group @@ -171,8 +171,6 @@ For more details about removing a role assignment from an Azure resource, see [R ## Scope tags -Windows 365 support for scope tags is in [public preview](../public-preview.md). - For RBAC, roles are only part of the equation. While roles work well to define a set of permissions, scope tags help define visibility of your organization’s resources. Scope tags are most helpful when organizing your tenant to have users scoped to certain hierarchies, geographical regions, business units, and so on. Use Intune to create and manage scope tags. For more information on how scope tags are created and managed, see [Use role-based access control (RBAC) and scope tags for distributed IT](/mem/intune/fundamentals/scope-tags). @@ -191,23 +189,16 @@ To make sure that both the Intune-owned **All devices** list and Windows 365-own 2. Assign the created scope tag to the dynamic device group. 3. After the Cloud PC is provisioned and enrolled into Intune, both the All Devices list and All Cloud PCs list should display the same Cloud PCs. +If you add new scope tags to a provisioning policy, make sure you also add the scope tags to the Intune dynamic group. This addition make ssure the dynamic group honors the new scope tags. Also, check on any Cloud PCs that may have unique scope tags added to them to make sure they're still there after any updates. + +To make sure that Windows 365 can honor changes to Intune scope tags, this data is synced from Intune. For more information, see [Privacy, customer data, and customer content in Windows 365](/windows-365/enterprise/privacy-personal-data). + To let scoped administrators view which scope tags are assigned to them and the objects within their scope, they must be assigned one of the following roles: - Intune read only - Cloud PC reader/administrator - A custom role with similar permissions. -### Graph API bulk actions and scope tags during the public preview - -For the duration of the scope tags public preview, the following bulk actions don't honor scope tags when called directly from the Graph API: - -- Restore -- Reprovision -- Place Cloud PC under review -- Remove Cloud PC under review -- Share Cloud PC restore point to storage -- Create Cloud PC manual restore point - ## Next steps [Role-based access control (RBAC) with Microsoft Intune](/mem/intune/fundamentals/role-based-access-control). diff --git a/windows-365/enterprise/security.md b/windows-365/enterprise/security.md index f2f46f5b6f3..2adcda27ec7 100644 --- a/windows-365/enterprise/security.md +++ b/windows-365/enterprise/security.md @@ -54,7 +54,7 @@ As described in [identity and authentication](./identity-authentication.md#authe - The Windows 365 service. - The Cloud PC. -The primary control for securing access is by using Microsoft Entra Conditional Access to conditionally grant access to the Windows 365 service. To secure access to the Cloud PC, see [set conditional access policies](./set-conditional-access-policies.md). +The primary control for securing access is by using Microsoft Entra Conditional Access to conditionally grant access to the Windows 365 service. To secure access to the Cloud PC, see [set Conditional Access policies](./set-conditional-access-policies.md). ## Secure Cloud PC devices diff --git a/windows-365/enterprise/set-conditional-access-policies.md b/windows-365/enterprise/set-conditional-access-policies.md index 62acbd9f643..c207ed79385 100644 --- a/windows-365/enterprise/set-conditional-access-policies.md +++ b/windows-365/enterprise/set-conditional-access-policies.md @@ -1,8 +1,8 @@ --- # required metadata -title: Set conditional access policies for Windows 365 +title: Set Conditional Access policies for Windows 365 titleSuffix: -description: Learn how to set conditional access policies for Windows 365. +description: Learn how to set Conditional Access policies for Windows 365. keywords: author: ErikjeMS ms.author: erikje @@ -29,7 +29,7 @@ ms.collection: - tier2 --- -# Set conditional access policies +# Set Conditional Access policies Conditional Access is the protection of regulated content in a system by requiring certain criteria to be met before granting access to the content. Conditional Access policies at their simplest are if-then statements. If a user wants to access a resource, then they must complete an action. For example, a payroll manager wants to access the payroll application and is required to perform multi-factor authentication (MFA) to do so. @@ -51,7 +51,7 @@ Conditional Access policies aren't set for your tenant by default. You can targ No matter which method you use, the policies will be enforced on the Cloud PC End-user portal and the connection to the Cloud PC. -1. Sign in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), select **Endpoint security** > **Conditional access** > **Create new policy**. +1. Sign in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), select **Endpoint security** > **Conditional Access** > **Create new policy**. 2. Provide a **Name** for your specific Conditional Access policy. 3. Under **Users**, select **0 users and groups selected**. 4. Under the **Include** tab, select **Select users and groups** > check **Users and groups** > under **Select**, choose **0 users and groups selected**. @@ -63,13 +63,13 @@ No matter which method you use, the policies will be enforced on the Cloud PC En - **Azure Virtual Desktop** (app ID 9cdead84-a844-4324-93f2-b2e6bb768d07). This app may also appear as **Windows Virtual Desktop**. This app is used to authenticate to the Azure Virtual Desktop Gateway during the connection and when the client sends diagnostic information to the service. - **Microsoft Remote Desktop** (app ID a4a365df-50f1-4397-bc59-1a1564b8bb9c) and **Windows Cloud Login** (app ID 270efc09-cd0d-444b-a71f-39af4910ec45). These apps are only needed when you [configure single sign-on](configure-single-sign-on.md) in a provisioning policy. These apps are used to authenticate users to the Cloud PC. - It's recommended to match conditional access policies between these apps. This ensures that the policy applies to the Cloud PC End-user portal, the connection to the Gateway and the Cloud PC for a consistent experience. If you want to exclude apps, you must also choose all of these apps. + It's recommended to match Conditional Access policies between these apps. This ensures that the policy applies to the Cloud PC End-user portal, the connection to the Gateway and the Cloud PC for a consistent experience. If you want to exclude apps, you must also choose all of these apps. > [!IMPORTANT] > With SSO enabled, authentication to the Cloud PC uses the **Microsoft Remote Desktop** Entra ID app today. An upcoming change will transition the authentication to the **Windows Cloud Login** Entra ID app. To ensure a smooth transition, you need to add both Entra ID apps to your CA policies. > [!NOTE] - > If you don't see the Windows Cloud Login app when configuring your conditional access policy, use the steps below to create the app. You must have Owner or Contributor permissions on the subscription to make these changes: + > If you don't see the Windows Cloud Login app when configuring your Conditional Access policy, use the steps below to create the app. You must have Owner or Contributor permissions on the subscription to make these changes: > > 1. Sign into the [Azure Portal](https://portal.azure.com). > 1. Select **Subscriptions** from the list of Azure Services. @@ -77,7 +77,7 @@ No matter which method you use, the policies will be enforced on the Cloud PC En > 1. Select **Resource providers** then select **Microsoft.DesktopVirtualization**. > 1. Select **Register** at the top. > - > After the resource provider is registered, the Windows Cloud Login app appears in the conditional access policy configuration when selecting apps to apply the policy to. If you aren't using Azure Virtual Desktop, you can unregister the Microsoft.DesktopVirtualization resource provider after the Windows Cloud Login app is available. + > After the resource provider is registered, the Windows Cloud Login app appears in the Conditional Access policy configuration when selecting apps to apply the policy to. If you aren't using Azure Virtual Desktop, you can unregister the Microsoft.DesktopVirtualization resource provider after the Windows Cloud Login app is available. 9. If you want to fine-tune your policy, under **Grant**, choose **0 controls selected**. 10. In the **Grant** pane, choose the grant or block access options that you want to apply to all objects assigned to this policy > **Select**. 11. If you want to test your policy first, under **Enable policy**, select **Report-only**. If you set it to **On**, the policy will be applied as soon as you create it. diff --git a/windows-365/enterprise/share-restore-points-storage.md b/windows-365/enterprise/share-restore-points-storage.md index d1b3f0df0e1..7bbbaa35923 100644 --- a/windows-365/enterprise/share-restore-points-storage.md +++ b/windows-365/enterprise/share-restore-points-storage.md @@ -31,7 +31,7 @@ ms.collection: # Share Cloud PC restore points to an Azure Storage Account -Cloud PC [restore points](restore-overview.md) can be shared to a storage account both singly and in bulk. +Cloud PC [restore points](restore-overview.md) can be shared to a storage account both for single Cloud PCs and in bulk. You might want to share (move or copy) a Cloud PC and its contents to: @@ -42,17 +42,19 @@ You might want to share (move or copy) a Cloud PC and its contents to: ## Share a single restore point -1. Sign in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) > **Devices** > **Windows 365** > **All Cloud PCs** > select a device > **Restore points** > select the ellipses (**...**) > **Share**. -1. In the **Share restore point** area, select a **Subscription** and **Storage account**. -1. Select **Share**. +1. Sign in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) > **Devices** > **Windows 365** > **All Cloud PCs** > select a device > **Restore points** > Fore restore point, select the ellipses (**...**) > **Share**. +2. In the **Share restore point** area, select a **Subscription**, **Storage account**, and **[Access tier](/azure/storage/blobs/access-tiers-overview)**. +3. Select **Share**. A folder is created in the storage account. The folder name is identical to the Cloud PC name. The folder contains a VHD copy of the Cloud PC device disk. +To avoid time out issues, only share up to 3000 restore points to an Azure storage account at the same time. + ## Share multiple restore points in bulk 1. Sign in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) > **Devices** > **All devices** > **Bulk Device Actions**. ![Screenshot of bulk device actions.](./media/restore-bulk/bulk-device-actions.png) -1. On the **Basics** page, select the following options: +2. On the **Basics** page, select the following options: 1. **OS**: Windows 1. **Device action**: Share Cloud PC restore point to storage 1. **Specify date and time**: Choose a date and time. This setting defines the Cloud PC restore point time that you’d like to share. The following options help determine exactly which restore point is used for each of the Cloud PCs you select. @@ -60,7 +62,7 @@ A folder is created in the storage account. The folder name is identical to the - **Before specified date and time**: Share the closest Cloud PC restore point before the date and time you specified. - **After specified date and time**: Share the closest Cloud PC restore point after the date and time you specified. - **Whichever is closest (before or after specified date and time)**: Share the Cloud PC restore point closest to the date and time you specified. -1. Select a **Subscription** and **Storage account** > **Next**. +1. Select a **Subscription**, **Storage account**, and **Access tier** > **Next**. 1. On the **Devices** page, choose **Select devices to include**. 1. In the **Select devices**, choose the Cloud PCs that you want to share restore points for > **Select** > **Next**. 1. On the **Review + create** page, confirm your choices > **Create**. diff --git a/windows-365/enterprise/troubleshoot-azure-network-connection.md b/windows-365/enterprise/troubleshoot-azure-network-connection.md deleted file mode 100644 index ac09deec0ba..00000000000 --- a/windows-365/enterprise/troubleshoot-azure-network-connection.md +++ /dev/null @@ -1,149 +0,0 @@ ---- -# required metadata -title: Troubleshoot Azure network connections -titleSuffix: -description: Troubleshoot Azure network connections in Windows 365. -keywords: -author: ErikjeMS -ms.author: erikje -manager: dougeby -ms.date: 08/22/2024 -ms.topic: troubleshooting -ms.service: windows-365 -ms.subservice: windows-365-enterprise -ms.localizationpriority: high -ms.assetid: - -# optional metadata - -#ROBOTS: -#audience: - -ms.reviewer: ericor -ms.suite: ems -search.appverid: MET150 -#ms.tgt_pltfrm: -ms.custom: intune-azure; get-started -ms.collection: -- M365-identity-device-management -- tier2 ---- - -# Troubleshoot Azure network connections - -The Azure network connection (ANC) periodically checks your environment to make sure that all requirements are met and are in a healthy state. If any check fails, you can see error messages in the Microsoft Intune admin center. This guide contains some further instructions for troubleshooting issues that may cause checks to fail. - -## Active Directory domain join - -When a Cloud PC is provisioned, it’s automatically joined to the provided domain. To test the domain join process, a domain computer object is created in the defined Organizational Unit (OU) with a name similar to "CPC-Hth" every time Windows 365 health checks are run. These computer objects are disabled when the health check is complete. Active Directory domain join failure can occur for many reasons. If the domain join fails, make sure that: - -- The domain join user has sufficient permissions to join the domain provided. -- The domain join user can write to the organizational unit (OU) provided. -- The domain join user isn't restricted in how many computers they can join. For example, the default maximum joins per user is 10 and this maximum can affect Cloud PC provisioning. -- The subnet being used can reach a domain controller. -- You test Add-Computer using the domain join credentials on a VM (virtual machine) connected to the Cloud PC vNet/subnet. -- You troubleshoot domain join failures like any physical computer in your organization. -- If you have a domain name that can be resolved on the internet (like contoso.com), make sure that your DNS servers are configured as internal. Also, make sure that they can resolve Active Directory domain DNS records and not your public domain name. - - - -## Microsoft Entra device Sync - -Before mobile device management (MDM) enrollment can take place during provisioning, a Microsoft Entra ID object must be present for the Cloud PC. This check is intended to make sure that your organizations computer accounts are syncing to Microsoft Entra ID in a timely manner. - -Make sure that your Microsoft Entra computer objects appear in Microsoft Entra ID quickly. We suggest within 30 minutes, and no longer than 60 minutes. If the computer object doesn’t arrive in Microsoft Entra ID within 90 minutes, provisioning fails. - -If provisioning fails, make sure that: - -- The sync period configuration on Microsoft Entra ID is set appropriately. Speak with your identity team to make sure that your directory is syncing fast enough. -- Your Microsoft Entra ID is active and healthy. -- Microsoft Entra Connect is running correctly and there are no issues with the sync server. -- You manually perform an Add-Computer into the OU provided for Cloud PCs. Time how long it takes for that computer object to appear in Microsoft Entra ID. - -## Azure subnet IP address range usage - -As part of the ANC setup, you're required to provide a subnet to which the Cloud PC will connect. For each Cloud PC, provisioning creates a virtual NIC and consumes an IP address from this subnet. - -Make sure that there's sufficient IP Address allocation available for the number of Cloud PCs you expect to provision. Also, plan enough address space for provisioning failures and potential disaster recovery. - -If this check fails, make sure that you: - -- Check the subnet in Azure Virtual Network. It should have enough address space available. -- Make sure there are enough address to handle three provisioning retries, each of which may hold onto the network addresses used for a few hours. -- Remove any unused vNICs. It’s best to use a dedicated subnet for Cloud PCs to make sure that no other services are consuming allocation of IP addresses. -- Expand the subnet to make more addresses available. This can't be completed if there are devices connected. - -During provisioning attempts, it’s important to consider any CanNotDelete locks that may be applied at the resource group level or above. If these locks are present, the network interfaces created in the process aren't automatically deleted. In they aren't automatically deleted, you must manually remove the vNICs before you can retry. - -During provisioning attempts, it’s important to consider any existing locks at the resource group level or above. If these locks are present, the network interfaces created in the process won't be automatically deleted. In the event this occurs, you must manually remove the vNICs before you can retry. - -## Azure tenant readiness - -When checks are performed, we check that the provided Azure subscription is valid and healthy. If it's not valid and healthy, we’re unable to connect Cloud PCs back to your vNet during provisioning. Problems such as billing issues may cause subscriptions to become disabled. - -Many organizations use Azure policies to make sure that resources are only provisioned into certain regions and services. You should make sure that any Azure policies consider the Cloud PC service and the supported regions. - -Sign in to the Azure portal and make sure that the Azure subscription is enabled, valid, and healthy. - -Also, visit the Azure portal and view Policies. Make sure that there are no policies blocking resource creation. - -## Azure virtual network readiness - -When creating an ANC, we block the use of any vNet located in an unsupported region. For a list of supported regions, see [Requirements](requirements.md). - -If this check fails, make sure that the vNet provided is in a region in the supported region list. - -## DNS can resolve Active Directory domain - -For Windows 365 to successfully perform a domain join, the Cloud PCs attached to the vNet provided must be able to resolve internal DNS names. - -This test attempts to resolve the domain name provided. For example, contoso.com or contoso.local. If this test fails, make sure that: - -- The DNS servers in the Azure vNet are correctly configured to an internal DNS server that can successfully resolve the domain name. -- The subnet/vNet is routed correctly so that the Cloud PC can reach the DNS server provided. -- The Cloud PCs/virtual machines in the declared subnet can NSLOOKUP on the DNS server, and it responds with internal names. - -Along with standard the DNS lookup on the supplied domain name, we also check for the existence of _ldap._tcp.yourDomain.com records. This record indicates the DNS server provided is an Active Directory domain controller. The record is a reliable way to confirm that AD domain DNS is reachable. Make sure that these records are accessible through the vNet provided in your Azure network connection. - -## Endpoint connectivity - -During provisioning, Cloud PCs must connect to multiple Microsoft publicly available services. These services include Microsoft Intune, Microsoft Entra ID, and Azure Virtual Desktop. - -You must make sure that all of the [required public endpoints](requirements-network.md#allow-network-connectivity) can be reached from the subnet used by Cloud PCs. - -If this test fails, make sure that: - -- You use the Azure Virtual Network troubleshooting tools to ensure that the provided vNet/subnet can reach the service endpoints listed in the doc. -- The DNS server provided can resolve the external services correctly. -- There's no proxy between the Cloud PC subnet and the internet. -- There are no firewall rules (physical, virtual, or in Windows) that might block required traffic. -- You consider testing the endpoints from a VM on the same subnet declared for Cloud PCs. - -If you aren't using Azure CloudShell, make sure that your PowerShell execution policy is configured to allow Unrestricted scripts. If you use Group Policy to set execution policy, make sure that the Group Policy Object (GPO) targeted at the Organizational Unit (OU) defined in the ANC is configured to allow Unrestricted scripts. For more information, see [Set-ExecutionPolicy](/powershell/module/microsoft.powershell.security/set-executionpolicy). - -## Environment and configuration are ready - -This check is used for many infrastructure related issues that might be related to infrastructure that customers are responsible for. It can include errors such as internal service time outs or errors caused by customers deleting/changing Azure resources while checks are being run. - -We suggest you retry the checks if you encounter this error. If it persists, contact support for help. - -## First party app permissions - -When creating an ANC, the wizard grants a certain level of permissions on the resource group and subscription. These permissions let the service smoothly provision Cloud PCs. - -Azure admins holding such permissions can view and modify these permissions. - -If any of these permissions are revoked, this check fails. Make sure that the following permissions are granted to the Windows 365 application service principal: - -- [Reader](/azure/role-based-access-control/built-in-roles#reader) role on the Azure subscription. -- [Windows365 Network Interface Contributor](/azure/role-based-access-control/built-in-roles#network-contributor) role on the specified resource group. -- [Windows365 Network User](/azure/role-based-access-control/built-in-roles#network-contributor) role on the virtual network. - -The role assignment on the subscription is granted to the Cloud PC service principal. - -Also, make sure that the permissions aren't granted as [classic subscription administrator roles](/azure/role-based-access-control/rbac-and-directory-admin-roles#classic-subscription-administrator-roles) or "Roles (Classic)". This role isn't sufficient. It must be one of the Azure role-based access control built-in roles as listed previously. - - -## Next steps - -[Learn about the ANC health checks](health-checks.md). diff --git a/windows-365/enterprise/troubleshoot-partner-connector.md b/windows-365/enterprise/troubleshoot-partner-connector.md deleted file mode 100644 index efb67d92cf8..00000000000 --- a/windows-365/enterprise/troubleshoot-partner-connector.md +++ /dev/null @@ -1,89 +0,0 @@ ---- -# required metadata -title: Troubleshoot partner connectors for Windows 365 -titleSuffix: -description: Troubleshoot partner connectors for Windows 365. -keywords: -author: ErikjeMS -ms.author: erikje -manager: dougeby -ms.date: 08/01/2024 -ms.topic: troubleshooting -ms.service: windows-365 -ms.subservice: windows-365-enterprise -ms.localizationpriority: high -ms.assetid: - -# optional metadata - -#ROBOTS: -#audience: - -ms.reviewer: aradinger -ms.suite: ems -search.appverid: MET150 -#ms.tgt_pltfrm: -ms.custom: intune-azure; get-started -ms.collection: -- M365-identity-device-management -- tier2 ---- - -# Troubleshoot partner connectors for Windows 365 - -When you turn on a partner connector (Citrix HDX Plus, Omnissa, or HP Anyware) for a user, the partner agent is automatically installed on that user's Cloud PCs. The agent enables the corresponding third party protocol. If this installation runs into a problem, you get an error message in the All Cloud PC list. The description of the error includes advice on how to troubleshoot the error. - -If the partner agent installation fails, the user can still connect to their Cloud PC by using Remote Desktop. - -While troubleshooting errors, make sure that the following steps were successful: - -- The users license state is synchronized from the partner service to Microsoft Intune, including the users Microsoft Entra user ID. - - The prerequisites have been met. - - The partner connector is enabled and healthy in Microsoft Intune. - - The correct permissions have been set for the partner third-party apps in Microsoft Entra ID. - - The Microsoft Entra user is added and discoverable in the Parter Cloud console. -- The partner agent is downloaded on the Cloud PC. - - The Cloud PC can access partner download URL. - - No security policy is blocking PowerShell or any app/agent installation as System. -- The partner Agent is installed. - - Check **Apps & Features** to see if the partner Agent is installed on the Cloud PC. - - Check Windows event viewer (eventvwr.msc) logs to make sure that the agent installation is executed. - - Check installation logs for any failures: - - Citrix: %TEMPsystemdrive%\Windows\Temp\Citrix\XenDesktop Installer. - - Omnissa: - - For installation issues: C:\Windows\Temp\Omnissa_Horizon_Agents_Installer_**.log - - Run this script for collecting the logs for post installation issues: C:\Program Files\Omnissa\Horizon Agents\Horizon Agent\DCT\support.bat - - HP Anyware: - - C:\Teradici\provisioning.log - - Or on the client side, select **Generate support bundle**. -- The Cloud PC is registered into the partner cloud tenant. - - Check the Cloud PC registration status in the partner configuration console. - - If the Cloud PC is unregistered, check the Application sign-in Windows event viewer (eventvwr.msc) for partner service errors and warnings. - -After you find the root cause, remove the assigned license from the partner console and then add the license back in. This removal should trigger a reinstallation of the partner agent. - -If no other solution works, you can [reprovision](reprovision-cloud-pc.md) the Cloud PC to reattempt the enablement. Reprovisioning deletes the Cloud PC and create a brand new one. All data on the original Cloud PC will be lost. Therefore, reprovisioning should be the last resort to resolve the issue. - -## Troubleshoot connection issues - -If you’re having connectivity issues with your partner-provisioned Cloud PC, you may want to test the default RDP-based connectivity. This process is a handy troubleshooting technique to determine if the issue is with the Cloud PC or the partner connectivity. - -### Turn on the RDP protocol - -When the partner protocol is turned on, the Windows 365 remoting protocol remains enabled but inactive. This inactivity means that users trying to connect with the Windows 365 supported Remote Desktop clients (including the HTML5 browser) are blocked by default. Users can only connect by using the partner protocol. Users trying to connect with non-partner clients get a generic error message. - -You can turn on the RDP protocol so users can sign in with RDP to test the Cloud PC connectivity. You can do either of the following to turn on the RDP protocol: - -- [Make a user a local admin](assign-users-as-local-admin.md) on the Cloud PC. -- [Add the user to the Direct Access Users group on the Cloud PC](/windows/client-management/mdm/policy-csp-localusersandgroups?WT.mc_id=Portal-fx). - -After taking either of these steps, you might have to reboot the Cloud PC for the group membership updates to take effect. Afterwards, the user can connect by using either RDP or the partner protocol. - -You can now test the connectivity by using RDP, and raise a support case with the relevant support team if problems persist. - - -## Next steps - -[Learn about Citrix HDX Plus for Windows 365](set-up-citrix.md). -[Learn about HP Anyware for Windows 365](hp-anyware-set-up.md). -[Learn about Omnissa Horizon for Windows 365](set-up-omnissa-horizon.md). diff --git a/windows-365/enterprise/troubleshoot-windows-365-app.md b/windows-365/enterprise/troubleshoot-windows-365-app.md deleted file mode 100644 index 78031acaa38..00000000000 --- a/windows-365/enterprise/troubleshoot-windows-365-app.md +++ /dev/null @@ -1,72 +0,0 @@ ---- -# required metadata -title: Troubleshoot the Windows 365 app. -titleSuffix: -description: Troubleshoot the Windows 365 app. -keywords: -author: ErikjeMS -ms.author: erikje -manager: dougeby -ms.date: 03/28/2024 -ms.topic: how-to -ms.service: windows-365 -ms.subservice: windows-365-enterprise -ms.localizationpriority: high -ms.assetid: - -# optional metadata - -#ROBOTS: -#audience: - -ms.reviewer: chbrinkhoff -ms.suite: ems -search.appverid: MET150 -#ms.tgt_pltfrm: -ms.custom: intune-azure; get-started -ms.collection: -- M365-identity-device-management -- tier2 ---- - -# Troubleshoot the Windows 365 app - -This article describes issues with the Windows 365 app for Windows client and how to fix them. - -## Limitations - -The Windows 365 app doesn't currently support: - -- Windows 11 IoT -- Configuring Remote Desktop Protocol properties. - -## Can't connect to Cloud PC error - -You may get a **Can't connect to Cloud PC** error when you click on the **Connect** button. - -To fix this issue: - -1. Open Windows **Settings** > **Apps** > **Default apps**. -2. Find the **AVD host app** and update the default app for .avd files. -3. Run this command to remove the old Remote Desktop Client cache that could cause this issue: - -```reg delete "HKEY_CLASSES_ROOT\progF3672D4C2FFE4422A53C78C345774E2D" /f``` - -## The Windows 365 app asks to select a new default app - -When the Remote Desktop Client is installed, you'll see a file type association message after trying to connect to your Cloud PC. Make sure to select **Azure Virtual Desktop (HostApp)** to launch the Cloud PC session. - -![Screencap of opening .avd files](./media/troubleshoot-windows-365-app/azure-virtual-desktop.png) - -## Change Cloud PC session from full screen to window mode - -The Windows 365 app supports windowed mode to work more efficiently side-by-side with your local PC. To activate window mode, click on the window mode button in the connection bar. - -## Windows 365 app doesn't show any Cloud PCs - -You might be signed in as the wrong user. You must be signed in with an account that is enrolled with the Microsoft Entra account that has Cloud PCs provisioned. Make sure that you sign in the Windows 365 app with the right user account. - - -## Next steps - -[Learn more about Windows 365 App](https://support.microsoft.com/topic/cbb0d4d5-69d4-4f00-b050-6dc7a02d02d0). diff --git a/windows-365/enterprise/troubleshoot-windows-365-boot.md b/windows-365/enterprise/troubleshoot-windows-365-boot.md deleted file mode 100644 index 48e7ac9b159..00000000000 --- a/windows-365/enterprise/troubleshoot-windows-365-boot.md +++ /dev/null @@ -1,135 +0,0 @@ ---- -# required metadata -title: Troubleshoot Windows 365 Boot -titleSuffix: -description: Troubleshoot Windows 365 Boot. -keywords: -author: ErikjeMS -ms.author: erikje -manager: dougeby -ms.date: 09/26/2024 -ms.topic: troubleshooting -ms.service: windows-365 -ms.subservice: windows-365-enterprise -ms.localizationpriority: high -ms.assetid: - -# optional metadata - -#ROBOTS: -#audience: - -ms.reviewer: elluthra -ms.suite: ems -search.appverid: MET150 -#ms.tgt_pltfrm: -ms.custom: intune-azure; get-started -ms.collection: -- M365-identity-device-management -- tier2 ---- - -# Troubleshoot Windows 365 Boot - -If you encounter problems while setting up or managing Windows 365 Boot devices, check below to find out how to troubleshoot. - -## User can't access the Cloud PC from the Windows 365 Boot physical device - -If the user can't access the Cloud PC from the Windows 365 Boot physical device, try these troubleshooting steps: - -1. Check to see if you can sign in to the Cloud PC from either: - - The browser at windows365.microsoft.com. - - The Windows App on another (non-Windows 365 Boot) device. -2. If a user has more than one Cloud PC, make sure they have selected a default Cloud PC to use each time they sign in. To set this default: - - Navigate to https://windows365.microsoft.com. - - In the card for the Cloud PC you want to set as default, select the ellipses (...) > Settings. - - In the **Integrated experiences** tab, under **Boot to this Cloud PC**, select **Connect while signed into device**. - - Select **Save**. -3. If you can sign into the Cloud PC from the app or web, and a default Cloud PC has been set, then there's an issue with the Windows 365 Boot physical device. In this case, confirm that the physical device is correctly configured and has the requisite software versions. For more information, see [Windows 365 Boot physical device requirements](windows-365-boot-physical-device-requirements.md). -4. Admins can try to manually click on **Device sync** to get the policies delivered faster on the device. Users can try to restart the device. - - -## Physical device registry key configuration - -Confirm that the physical device has been correctly configured to run Windows 365 Boot. Make sure that the following registry keys are set: - -| Registry key name | Registry value name | Registry value | -| --- | --- | --- | -| HKLM\Software\Microsoft\PolicyManager\current\device\CloudDesktop | BootToCloudMode | 1 | -| HKLM\Software\Microsoft\PolicyManager\current\device\WindowsLogon | OverrideShellProgram | 1 | -| HKLM\Software\Microsoft\Windows\CurrentVersion\SharedPC\NodeValues | 18 | 1 | -| HKLM\Software\Microsoft\Windows\CurrentVersion\SharedPC\NodeValues | 01 | 1 | - -## Physical device's versions of Windows 365, Azure Virtual Desktop Apps, and Windows - -Windows 365 Boot requires that the physical device runs specific versions of both Windows 365 and Azure Virtual Desktop (HostApp) apps. To see which versions are installed, run the following PowerShell command in Admin mode: - -```azurepowershell -Get-AppxPackage –AllUsers -name *MicrosoftCorporationII* -``` - -This command shows all the Microsoft-maintained apps (like QuickAssist, Microsoft Family, and so on) on the physical device. In order for Windows 365 Boot to work correctly, confirm the following versions: - -- Windows App version 1.1.162.0 or later. -- Azure Virtual Desktop (HostApp) app version 1.2.4159. or later. - -Windows 365 Boot also requires the latest version of Windows 11. - -## Remove Windows 365 Boot from the physical device - -If you're unable to identify the source of the issue, you can try to removing and re-adding Windows 365 Boot from the physical device. - -### Remove Windows 365 Boot from the physical device - -1. Sign in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) > **Groups** > **All groups**. -2. Select the group for your Windows 365 boot devices > **Members**. -3. Select the physical device > **Remove** > **Yes**. -4. Select **Devices** > **All devices** > select the physical device > **Overview** > **Sync**. - -It takes about 10 minuets for the removal to finalize. After that, the physical device will no longer be set up for Windows 365 Boot. - -### Add Windows 365 Boot back onto the physical device - -1. Sign in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) > **Groups** > **All groups**. -2. Select the group for your Windows 365 boot devices > **Members**. -3. Select **Add members** > select the physical device. -4. Wait about 10 minutes. -5. Select **Devices** > **All devices** > select the physical device > **Overview** > **Sync**. - -The physical device will again be set up for Windows 365 Boot. Retest it to see if it's working. - -## Contact Microsoft support - -If you're still unable to troubleshoot the problem, you can contact Microsoft support. To help expedite a solution, collect logs and session IDs beforehand. - -## Collect local logs - -Windows 365 and Microsoft Entra ID log information is helpful to Microsoft support. Collect it beforehand from the following locations: - -- C:\Users\\{username}\AppData\Local\Temp\DiagOutputDir\Windows365\Logs  -- C:\Users\\{username}\AppData\Local\Temp\DiagOutputDir\RdClientAutoTrace - -Put these logs in a zip file and provide it to the Microsoft support team for further investigation. - -## Windows 365 error and session IDs - -When contacting Microsoft support about Windows 365 Boot issues, make sure to collect relevant IDs to help in the investigation. - -On the physical device, get the CorrelationId, SessionID, or ActivityID. - -### Session ID - -You can find the Windows 365 Session ID in error dialog boxes. For example, the error dialog box that says **Something went wrong**. - -![Screenshot of error dialog box.](./media/troubleshoot-windows-365-boot/something-went-wrong.png) - -### Correlation ID - -You can find the Correlation ID in the interstitial screen displayed during a five-minute timeout. - -![Screenshot of connection issue dialog box.](./media/troubleshoot-windows-365-boot/connection-issue.png) - - -## Next steps - -[Learn about Windows 365 Boot](windows-365-boot-overview.md). diff --git a/windows-365/enterprise/troubleshooting.md b/windows-365/enterprise/troubleshooting.md index b61b9586331..1235c44fded 100644 --- a/windows-365/enterprise/troubleshooting.md +++ b/windows-365/enterprise/troubleshooting.md @@ -45,11 +45,11 @@ For connections using the Remote Desktop client for Windows to access Cloud PCs, After the installation, the optimizations to redirect audio and video to your local Windows endpoint don’t work. The user must close Teams and sign out from or restart the Cloud PC to activate the Optimized status. -## Conditional access +## Conditional Access -Make sure that you apply conditional access policies to both the dedicated Windows 365 cloud app and the Azure Virtual Desktop cloud app. You can apply these policies in the conditional access UI of Microsoft Intune admin center or Microsoft Entra ID. +Make sure that you apply Conditional Access policies to both the dedicated Windows 365 cloud app and the Azure Virtual Desktop cloud app. You can apply these policies in the Conditional Access UI of Microsoft Intune admin center or Microsoft Entra ID. -Any conditional access policy that you apply will affect: +Any Conditional Access policy that you apply will affect: - Access to the end-user web portal - The connection to the Cloud PC from the Remote Desktop apps. diff --git a/windows-365/enterprise/whats-new.md b/windows-365/enterprise/whats-new.md index 00bb7ba8121..074c5702959 100644 --- a/windows-365/enterprise/whats-new.md +++ b/windows-365/enterprise/whats-new.md @@ -7,7 +7,7 @@ keywords: author: ErikjeMS ms.author: erikje manager: dougeby -ms.date: 10/31/2024 +ms.date: 12/18/2024 ms.topic: conceptual ms.service: windows-365 ms.subservice: windows-365-enterprise @@ -55,6 +55,109 @@ For more information about public preview items, see [Public preview in Windows ### Windows 365 app --> + +## Week of December 17, 2024 + + +### Device management + +#### Restore, restart, and troubleshoot actions in the Cloud PCs that aren't available report + +You can now use the **Bulk device actions** command on the **Cloud PCs that aren't available** report to restore, restart, and troubleshoot actions directly from the report. For more information, see [Cloud PCs that aren't available report](report-cloud-pcs-not-available.md). + + +## Week of December 9, 2024 + + +### Device management + +#### Move selected Cloud PCs to a new region + +You can now move selected Cloud PCs to a new region. This is instead of moving all Cloud PCs in a provisioning policy. + + +## Week of December 2, 2024 (Service release 2411) + + +### Device management + +#### Intune scope tags are now generally available + +Windows 365 support for [Intune scope tags](/mem/intune/fundamentals/scope-tags) has moved out of preview and into general availability. For more information, see [Scope tags](role-based-access.md#scope-tags). + +#### Create and share restore points for up to 5,000 Cloud PCs + +You can now bulk create restore points for up to 5,000 Cloud PCs. You can then share the restore points to a specified Azure storage account. For more information, see [Create multiple manual restore points in bulk](create-manual-restore-point.md#create-multiple-manual-restore-points-in-bulk). + + +### Monitor and troubleshoot + +#### Dedicated and shared data on Connected Frontline Cloud PCs report + +The Connected Frontline Cloud PCs report now shows: + +- Separate data for dedicated versus shared Frontline Cloud PCs. +- The user that is currently connected and their session length +- Ability to restart Frontline Cloud PCs to disconnect user from their session and bring concurrency below threshold limits. + +For more information see [Connected Frontline Cloud PCs](report-connected-frontline-cloud-pcs.md). + +#### Cloud PC actions report support for moving Cloud PCs + +You can use the Cloud PC actions report to see the status of moving Cloud PCs to new regions. + +#### Windows 365 Government supports bulk Troubleshoot action + +The Troubleshoot remote action can now be used in bulk with Windows 365 Government. For more information, see [Remotely manage Windows 365 devices](remotely-manage-cloud-pc.md). + + +### Provisioning + +#### Azure network connection limit increased + +The Azure network connection limit for each tenant has been increased. For more information, see [Maximum azure network connections](azure-network-connections.md#maximum-azure-network-connections). + + +### Provisioning + +#### Windows 365 now supports Israel Central + +Windows 365 Enterprise now supports the Israel Central region in the Middle East geography. For more information, see [Supported Azure regions for Cloud PC provisioning](requirements.md?tabs=enterprise%2Cent#supported-azure-regions-for-cloud-pc-provisioning). + + +## Week of November 19, 2024 + + +### Windows 365 Frontline + +#### Windows 365 Frontline in shared mode (preview) + +Windows 365 Frontline in shared mode gives you the ability to provision a collection of Cloud PCs that can be used across multiple users mapped to a Microsoft Entra ID group. One active Cloud PC is permitted per license. For more information, see [Windows 365 Frontline in shared mode](introduction-windows-365-frontline.md#windows-365-frontline-in-shared-mode-preview). + + +### Device management + +#### Configure client device redirection settings for Windows App on iOS/iPadOS/Android using Microsoft Intune + +You can now use Microsoft Intune Mobile Application Management to check for device posture and manage redirections for Windows App on iOS, iPadOS, and Android (preview). You can use Microsoft Intune on both corporate managed and personal devices. + +For more information, see [Configure client device redirection settings for Windows App and the Remote Desktop app using Microsoft Intune](/azure/virtual-desktop/client-device-redirection-intune). + + +### Device security + +#### Support for FIDO devices and passkeys on macOS and iOS + +Windows App and the Remote Desktop app for macOS and iOS now support FIDO devices and passkeys for Microsoft Entra ID sign in on brokered and unbrokered devices. +For more information see [Support for FIDO2 authentication with Microsoft Entra ID](/entra/identity/authentication/concept-fido2-compatibility#native-application-support). + + +### Partners + +#### Use Citrix HDX Plus with Windows 365 Frontline + +You can now use Citrix HDX Plus with Windows 365 Frontline Cloud PCs. + ## Week of October 28, 2024 (Service release 2410) @@ -221,7 +324,7 @@ Uni-directional clipboard support for Cloud PCs has moved out of preview and is To help secure your Windows 365 environment, the inbound port 3389 is now closed by default. -#### Windows 365 support for FAC mixed mode when MMR isn't enabled (preview) +#### Windows 365 support for AVC mixed mode when MMR isn't enabled (preview) Windows 365 now supports AVC mixed mode when MMR is not enabled. @@ -323,7 +426,7 @@ Customers that have Modern Microsoft Cloud Agreements can upgrade their existing #### Single sign-on Windows 365 clients authentication change -Single sign-on for Windows 365 is transitioning to use the Windows Cloud Login Entra ID cloud app for Windows authentication starting with the Windows and Web clients. For more information, see [Set conditional access policies](set-conditional-access-policies.md). +Single sign-on for Windows 365 is transitioning to use the Windows Cloud Login Entra ID cloud app for Windows authentication starting with the Windows and Web clients. For more information, see [Set Conditional Access policies](set-conditional-access-policies.md). ### Monitor and troubleshoot @@ -579,7 +682,7 @@ For more information, see [Microsoft Purview Customer Lockbox](/purview/customer #### New faster sign-in frequency option (preview) -When single sign-on is enabled, selecting the **Conditional access** > **Session** > **Sign-in frequency** > **Every time** option provides a faster reauthentication period of 5-10 minutes depending on the client used. For more information, see [Set conditional access policies](set-conditional-access-policies.md). +When single sign-on is enabled, selecting the **Conditional Access** > **Session** > **Sign-in frequency** > **Every time** option provides a faster reauthentication period of 5-10 minutes depending on the client used. For more information, see [Set Conditional Access policies](set-conditional-access-policies.md). ### Windows 365 Boot diff --git a/windows-365/enterprise/windows-365-boot-known-issues.md b/windows-365/enterprise/windows-365-boot-known-issues.md deleted file mode 100644 index f5fd4858f6f..00000000000 --- a/windows-365/enterprise/windows-365-boot-known-issues.md +++ /dev/null @@ -1,261 +0,0 @@ ---- -# required metadata -title: Windows 365 Boot known issues -titleSuffix: -description: Learn about known issues with Windows 365 Boot, including workarounds and updated fixes. -keywords: -author: ErikjeMS -ms.author: erikje -manager: dougeby -ms.date: 09/26/2024 -ms.topic: troubleshooting -ms.service: windows-365 -ms.subservice: windows-365-enterprise -ms.localizationpriority: high -ms.assetid: - -# optional metadata - -#ROBOTS: -#audience: - -ms.reviewer: elluthra -ms.suite: ems -search.appverid: MET150 -#ms.tgt_pltfrm: -ms.custom: intune-azure; get-started -ms.collection: -- M365-identity-device-management -- tier2 ---- - -# Windows 365 Boot known issues - -This page lists recent known issues with [Windows 365 Boot](windows-365-boot-overview.md). - -## Wi-fi connectivity - -Wi-fi connections that require captive browser-based authentication or consent aren't supported. - -User-based wi-fi profiles that require the user to sign-in to connect to wi-fi aren't supported. New users who never signed in before converting the device to a Windows 365 Boot device can't use the device to connect it to the network. - -## VPN support - -Windows 365 Boot only supports VPN clients that don't require application installation. App-based VPN clients that require users to sign in aren't supported because users can't interact with the VPN client from a Windows 365 Boot device. - -## Exiting the session on sleep or closing the device - -The user isn't completely signed out after closing the laptop lid. When they open the laptop, they see the app trying to disconnect or a black screen. Eventually, it signs the user out from the session. - -## Duplicate dialog boxes for some shortcut and sticky keys - -Duplicate dialog boxes might display for the physical device and the Cloud PC. This issue can happen for: - -- Some shortcut keys, like Win + G or sticky keys. -- Enabling accessibility key settings, like High Contrast, Num Keys, or Toggle Key. - -## Kiosk mode not supported - -Windows 365 Boot isn't currently supported in Kiosk mode on Windows. - -## Restricted access to physical device - -Windows 365 Boot doesn't completely restrict the user from accessing the physical device. For more information, see [Restrict user access to Windows 365 Boot physical device](windows-365-boot-restrict-user-access-physical-device.md). - -## Other sign-in options besides username/password are displayed on the sign-in screen - -Windows 365 Boot is used with the Shared PC configuration service provider (CSP). The primary supported sign-in method is by using username/password. - -**Troubleshooting steps**: - -If you have Windows Hello for Business enabled for the Windows 365 Boot device, you can use Intune to disable it. For more information, see [Enable security keys for Windows sign-in](/azure/active-directory/authentication/howto-authentication-passwordless-security-key-windows#enable-security-keys-for-windows-sign-in). - -If the Windows 365 Boot physical device lets users sign in using a convenience PIN, you can turn it off. For more information, see [AllowPINLogon](/windows/client-management/mdm/policy-csp-credentialproviders#allowpinlogon). - -## Default credential provider is set to Security Key on the sign-in screen - -When the **Use security keys for sign-in** policy setting enabled, it can be configured to be the default credential provider. This policy might result in the user seeing a sign-in for the physical device. - -**Troubleshooting steps**: Check to see if you have this policy setting configured in Intune. For more information on how to check, see [Enable security keys for Windows sign-in](/azure/active-directory/authentication/howto-authentication-passwordless-security-key-windows#enable-security-keys-for-windows-sign-in). - -If it's set, exclude your Windows 365 Boot devices from the policy. - -## Local device has background apps and previous policy configurations that impact the user’s Windows 365 Boot experience - -Windows 365 Boot uses “clean” Windows 11 devices that don't have preconfigured applications or policies assigned to the device. - -**Troubleshooting steps**: Reset the device to a clean state. For more information, see [Windows 365 Boot physical device requirements](windows-365-boot-physical-device-requirements.md). - -## Single sign-on users see a dialog to allow remote desktop connection during the connection attempt - -When using single sign-on, users are prompted to authenticate to Microsoft Entra ID and allow the Remote Desktop connection when launching a connection to a new Cloud PC. Microsoft Entra remembers up to 15 devices for 30 days before prompting again. - -**Troubleshooting steps**: If you see this dialog, select **Yes** to connect. - -## User can't launch the web browser to sign-in to WI-FI network - -Windows 365 Boot is designed for Ethernet connections or WiFi connections managed through the [WiFi CSP](/windows/client-management/mdm/wifi-csp). - -**Troubleshooting steps**: Configure the Windows 365 Boot physical device's Wi-Fi profile through Intune. For more information, see [Add Wi-Fi settings for Windows 10/11 devices in Intune](/mem/intune/configuration/wi-fi-settings-windows). - -## User sees black screen after using Disconnect/Sign-out/Lock command from Cloud PC - -This known issue is under investigation. - -**Troubleshooting steps**: Use the Ctrl-Alt-Del shortcut and select the **Sign out** option. - -## Microsoft Teams calls have poor performance - -**Troubleshooting steps**: Make sure Teams optimizations are used as explained in [Microsoft Teams on Cloud PC](teams-on-cloud-pc.md). - -## Camera access is denied in Cloud PC - -Camera permissions must be granted to the Azure Virtual Desktop (HostApp) application to use your Windows 365 Boot configured device’s camera in Microsoft Teams. - -**Troubleshooting steps**: - -1. [Remove Windows 365 Boot from the physical device](troubleshoot-windows-365-boot.md#remove-windows-365-boot-from-the-physical-device). -2. On the physical device, open **Settings** > **Privacy & Security** > **Camera** > **Let apps access your camera**. -3. Set **Azure Virtual Desktop (HostApp)** to **On**. -4. [Add Windows 365 Boot back onto the physical device](troubleshoot-windows-365-boot.md#add-windows-365-boot-back-onto-the-physical-device). - -## Users can still interact with physical device features like Settings, Task Manager, and Notifications - -Users are currently blocked from accessing most features on their Windows 365 Boot physical devices. However, to assist with troubleshooting, some features aren't blocked. - -**Troubleshooting steps**: To learn how to restrict user access to the physical device, see [Restrict user access to Windows 365 Boot physical device](windows-365-boot-restrict-user-access-physical-device.md). - -## Users are disconnected from Cloud PC after being idle for too long - - Windows 365 Boot physical devices might sign out users because of screen idle policies applied to the physical device or Cloud PC. - -**Troubleshooting steps**: Using an Intune device configuration profile, change or configure the [DeviceLock CSP policy (MaxInactivityTimeDeviceLock)](/windows/client-management/mdm/policy-csp-devicelock?WT.mc_id=Portal-fx#maxinactivitytimedevicelock). Make these changes for both the physical device and the Cloud PC. - -## Users see multiple authentication dialogs despite single sign-on being enabled - -**Troubleshooting steps**: Check the Windows 365 Provisioning policy associated with the Cloud PC to see if single sign-on is enabled. If it isn't, enable single sign-on for the provisioning policy. This policy change requires reprovisioning the Cloud PC. - -Your Conditional Access policies might also be causing other authentication dialogs. For more information, see [Troubleshooting sign-in problems with Conditional Access](/azure/active-directory/conditional-access/troubleshoot-conditional-access). - -When using single sign-on, users are prompted to: - -- Authenticate to Microsoft Entra ID -- Allow the Remote Desktop connection when launching a connection to a new Cloud PC. - -Microsoft Entra remembers up to 15 devices for 30 days before prompting again. - -If you see this dialog, select **Yes** to connect. - -## Users see a black screen after sign-on - -Windows 365 Boot is configured by using the [CloudDesktop CSP](/windows/client-management/mdm/policy-csp-clouddesktop#boottocloudmode). - -**Troubleshooting steps**: If you configured your device for Windows 365 Boot using the [Windows 365 Boot Guided Scenario](windows-365-boot-guide.md): - -1. Sign in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) > **Devices** > **Configuration profiles**. -2. Search for the Device configuration profile that contains “Windows 365 Boot Device Configuration Policy” in its name. -3. Make sure that the “Cloud Desktop” configuration is configured with the **Windows 365 Boot Mode** setting set to **Enable Windows 365 Boot Desktop**. -4. Select **Device assignment status** and make sure that the configuration policy was successfully applied to it. -5. If the check-in status isn't successful, see [Troubleshooting policies and profiles in Microsoft Intune](/troubleshoot/mem/intune/device-configuration/troubleshoot-policies-in-microsoft-intune). - -If the problem persists, reinstall the physical device's operating system as explained in [Windows 365 Boot physical device requirements](windows-365-boot-physical-device-requirements.md). - -## User sees local PC desktop when responding to authentication dialogs - -Windows 365 Boot is configured through the [Windowslogon CSP](/windows/client-management/mdm/policy-csp-windowslogon#overrideshellprogram). - -**Troubleshooting steps**: If you configured your device for Windows 365 Boot using the [Windows 365 Boot Guided Scenario](windows-365-boot-guide.md): - -1. Sign in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) > **Devices** > **Configuration profiles**. -2. Search for the Device configuration profile that contains “Windows 365 Boot Device Configuration Policy” in its name. -3. Make sure that the "Windows Logon" configuration is configured with the **Override Shell Program** setting set to **Apply Lightweight shell**. -4. Select **Device assignment status** and make sure that the configuration policy was successfully applied to it. -5. If the check-in status isn't successful, see [Troubleshooting policies and profiles in Microsoft Intune](/troubleshoot/mem/intune/device-configuration/troubleshoot-policies-in-microsoft-intune). - -If the problem persists, reinstall the physical device's operating system as explained in [Windows 365 Boot physical device requirements](windows-365-boot-physical-device-requirements.md). - -## Error message: Windows 365 can't connect to the resources it uses to run properly - -**Troubleshooting steps**: Check your device’s network connection and try again. If you're using an Azure network connection (ANC) for your Cloud PC, check the ANC status as explained in [Azure network connection status](/windows-365/enterprise/health-checks#azure-network-connection-status). - -For more information, see [Troubleshoot Cloud PC connection errors](/windows-365/enterprise/connection-errors). - -## Error message: Something is preventing you from using the Windows 365 app” error message - -**Troubleshooting steps**: See [Troubleshoot Windows 365 Boot](troubleshoot-windows-365-boot.md). - -## User can't connect to their Cloud PC and continues to wait at the transition screen - -**Troubleshooting steps**: Make sure that the device has applications that support Windows 365 Boot. - -If the applications meet the minimum version requirements, collect diagnostic logs and [contact Microsoft support](troubleshoot-windows-365-boot.md#contact-microsoft-support). - -## Error message: Remote Desktop Gateway server is temporarily unavailable - -**Troubleshooting steps**: This issue might be a transient issue because of network congestion. Try signing in again after waiting some time. If the issue persists, collect diagnostic logs and [contact Microsoft support](troubleshoot-windows-365-boot.md#contact-microsoft-support). - -## Error message: You need to be assigned a Cloud PC - -Windows 365 Boot requires users to have a Windows 365 Cloud PC provisioned for them. - -**Troubleshooting steps**: Create and assign a Windows 365 provisioning policy. For more information, see [Create provisioning policies](/windows-365/enterprise/create-provisioning-policy). - -## When users sign into a device for the first time, they see an error screen - -This error can occur when a device is removed from and then re-enrolled in Windows 365 Boot mode. The original registration hasn't completed uninstallation yet. - -**Troubleshooting steps**: Users should try logging in a second time on the device. In most instances, they should be able to connect to their Windows 365 Cloud PC. If they still see the error screen, contact Microsoft support with the displayed correlation ID. - -## Resources created by the Windows 365 Boot guided scenario are showing as “not applicable” in Intune - -Resources created by the Windows 365 Boot guided scenario can be applied to both: - -- Microsoft Entra joined devices -- Microsoft Entra hybrid joined devices in tenants where certain workloads were switched to Intune. For Microsoft Entra hybrid joined devices, Windows Update policies, device configuration, and client apps workloads must be switched to Intune. - -**Troubleshooting steps**: To determine if your device is Microsoft Entra hybrid joined, see [Using the Azure portal](/azure/active-directory/devices/howto-hybrid-join-verify#using-the-azure-portal). If your device is Microsoft Entra hybrid joined, see [Comanagement workloads](/mem/configmgr/comanage/workloads) to see what workloads are configured in your environment. - -## User can't reset their password on the Windows 365 Boot device - -If the user needs to reset their password, it isn't possible on their Windows 365 Boot device. - -**Troubleshooting steps**: Users should reset their password on another non-windows 365 Boot configured device. - -## The Provider app couldn't be found - -The user tried to connect to their Cloud PC but received the following message: - -``` -Can't connect to Cloud PC from this device -The provider app could not be found. Try signing in from another device. -To resolve this issue here, contact support. -``` - -This occurs in the following scenarios: - -- The provider app was uninstalled. -- The provider app isn't available or installed on the end user's physical device. -- The provider app was installed at the user scope manually prior to the device being set up for Boot. - -**Troubleshooting steps**: The end user can use any of these options: - -- Sign in from another device. -- Wait for the app to install on the physical device. -- Contact the user's IT admin and ask them to push the app to the device. -- If you suspect the app was installed in user scope, use the following steps: - 1. Contact the user's IT admin to remove the device from Boot mode by removing it from the device group. - 2. Uninstall the provider app installed in user scope. - 3. Put the device back to Boot mode device group (the system scope apps should be delivered by Intune if set up through Guided Scenario). - -If the issue persists, contact support. - -## Can't share physical device's local settings screen while using Teams on a Cloud PC - -If the user has a local setting screen (like Local Bluetooth settings) open on their physical device, they can't share their screen on a video call in Teams. - -**Troubleshooting steps**: If the user must share a local settings screen, use a different tool like Quick Assist. - - -## Next steps - -[Troubleshoot Windows 365 Boot](troubleshoot-windows-365-boot.md). diff --git a/windows-365/enterprise/windows-365-switch-known-issues.md b/windows-365/enterprise/windows-365-switch-known-issues.md deleted file mode 100644 index a0df9c3f15f..00000000000 --- a/windows-365/enterprise/windows-365-switch-known-issues.md +++ /dev/null @@ -1,92 +0,0 @@ ---- -# required metadata -title: Windows 365 Switch known issues -titleSuffix: -description: Learn about known issues with Windows 365 Switch, including workarounds and updated fixes. -keywords: -author: ErikjeMS -ms.author: erikje -manager: dougeby -ms.date: 06/27/2024 -ms.topic: troubleshooting -ms.service: windows-365 -ms.subservice: windows-365-enterprise -ms.localizationpriority: high -ms.assetid: - -# optional metadata - -#ROBOTS: -#audience: - -ms.reviewer: elluthra -ms.suite: ems -search.appverid: MET150 -#ms.tgt_pltfrm: -ms.custom: intune-azure; get-started -ms.collection: -- M365-identity-device-management -- tier2 ---- - -# Windows 365 Switch known issues - -This page lists recent known issues with [Windows 365 Switch](windows-365-switch-overview.md). - -## Support for only one Cloud PC - -Currently, Windows 365 Switch only supports one Switch-enabled Cloud PC. The user is automatically signed into the first available Switch-supported Cloud PC from the list of Cloud PCs assigned to the user. Using Switch, the user can choose which Cloud PC to sign in to by selecting the ellipses (...) > choose the Cloud PC > **Add to Task view**. Only one Cloud PC can be added to Task view at a time. If you try to pin multiple Cloud PCs to the Task view, they're added in a stack fashion. For example, if you remove the first Cloud PC you added, the second one takes its place. Because only the first Cloud PC added is displayed in the Task view, it's not recommended to pin more than one Cloud PC to the Task view. - -## Remove or replace stale Cloud PC from task view - -If your task view has a Cloud PC that you can no longer have access, you can remove and replace that Cloud PC. - -**Troubleshooting steps**: - -1. Uninstall [Windows App](/windows-app/overview). -2. Reinstall Windows App. -3. Use Windows App **Add to task view** button on the Cloud PC you want to add. - -## Limited gestures - -Some gestures aren't supported in the Cloud PC, like three finger gestures to change app or four finger gesture to bring up the Task view and show the desktop. These gestures instead get triggered on the physical device. Other than these gestures, all the usual Windows 11 gestures are supported. - -## Bluetooth and hardware settings can't be managed from the Cloud PC - -Cloud PCs lack hardware components like bluetooth adapters. Users can't change it from the Cloud PC Settings app or quick Settings. - -**Troubleshooting steps**: - -Users must switch back to their physical device and change the settings in the Settings app. - -## Reconnect button not working - -If the **Reconnect** option in the disconnect message dialog is used, reconnecting might not work as expected or may result in an unusable Cloud PC session. - -**Troubleshooting steps**: - -Let the disconnect complete and then launch a new connection using Task view. - -## Navigation between sign in prompts and your Cloud PC - -After selecting a Cloud PC from the Task view, users might be prompted to sign in using their account credentials. In some builds of Windows, after providing the credentials, the user might not be returned to the Cloud PC connection. - -**Troubleshooting steps**: - -Select the Task view button for the Cloud PC again. The connection continues in the background. The user should be connected to their Cloud PC within a few minutes. - -## Local PC missing from Cloud PC task view bar - -If the local PC is missing from the Cloud PC's task view bar, the Azure Virtual Desktop (HostApp) might be out of date. - -**Troubleshooting steps**: - -Uninstall and reinstall the Azure Virtual Desktop (HostApp) app from the [Microsoft Store](ms-windows-store://pdp/?productid=9NRNM1N926MN). - - - - - -## Next steps - -[Troubleshooting](troubleshooting.md) diff --git a/windows-365/enterprise/windows-update-frontline-cloud-pc.md b/windows-365/enterprise/windows-update-frontline-cloud-pc.md index 0a5cb901f77..7479ee65a59 100644 --- a/windows-365/enterprise/windows-update-frontline-cloud-pc.md +++ b/windows-365/enterprise/windows-update-frontline-cloud-pc.md @@ -31,7 +31,7 @@ ms.collection: # Configure Windows Update for Windows 365 Frontline Cloud PCs -Windows 365 Frontline Cloud PCs rely on active hours Windows Update policies to make sure that Cloud PCs don't reboot for Windows Update during active usage. The following table lists recommended update configurations for Frontline Cloud PCs. Make sure to use the [Filter function](create-filter.md#create-a-filter-for-all-cloud-pcs) to target the policies only to your Frontline Cloud PCs. +Windows 365 Frontline Cloud PCs rely on active hours Windows Update policies to make sure that Cloud PCs don't reboot for Windows Update during active usage. The following table lists recommended update configurations for Frontline Cloud PCs. Make sure to use the [Filter function](create-filter.md#create-a-filter-for-all-cloud-pcs) or [create a dynamic device group](create-dynamic-device-group-all-cloudpcs.md) to target the policies only to your Frontline Cloud PCs. | Windows Update policy setting | Windows 365 Frontline recommendation | | --- | --- | @@ -57,16 +57,16 @@ Windows 365 Frontline Cloud PCs rely on active hours Windows Update policies to These settings are important to make sure that users aren't disrupted by a Windows Update during their work hours. -## Automatic sync updates for Cloud PCs that haven't been turned on for seven days +## Automatic sync updates for Frontline Cloud PCs in dedicated mode that haven't been connected for seven days -The Windows 365 Service automatically powers on a Windows 365 Frontline Cloud PC if it hasn't been used and powered in the previous seven days. When the Windows 365 Frontline Cloud PC is turned on, the Windows 365 Service: +The Windows 365 Service automatically powers on a Windows 365 Frontline Cloud PC in dedicated mode if it hasn't been used and powered in the previous seven days. When the Windows 365 Frontline Cloud PC is turned on, the Windows 365 Service: - Syncs the Cloud PC with the Windows Update service. - Performs the Windows Update process honoring the Windows Update policy configurations set in Intune. - Keeps the Cloud PC powered on for two hours to make sure that the Windows Update installation can complete. -- Checks for any pending reboots. If there are, the Cloud PC automatically reboots to complete any Windows Update before turning off. +- Checks for any pending reboots. If there are, the Cloud PC automatically reboots to complete any Windows Update before turning off the Cloud PC. -This process lets the user seamlessly start using the Windows 365 Frontline Cloud PC the next time they sign in. +This process lets the user seamlessly start using the Cloud PC the next time they sign in. ## Next steps diff --git a/windows-365/includes/draft-doc.md b/windows-365/includes/draft-doc.md new file mode 100644 index 00000000000..8cefded3611 --- /dev/null +++ b/windows-365/includes/draft-doc.md @@ -0,0 +1,13 @@ +--- +title: include file +description: include file +author: ErikjeMS +ms.service: windows-365 +ms.topic: include +ms.date: 11/11/2022 +ms.author: erikje +ms.custom: include file +--- + +> [!IMPORTANT] +> MICROSOFT CONFIDENTIAL. This is unfinished draft documentation and is subject to significant change. diff --git a/windows-365/includes/move-cloud-pc-steps.md b/windows-365/includes/move-cloud-pc-steps.md new file mode 100644 index 00000000000..33937b6ec00 --- /dev/null +++ b/windows-365/includes/move-cloud-pc-steps.md @@ -0,0 +1,24 @@ +--- +title: include file +description: include file +author: ErikjeMS +ms.service: windows-365 +ms.topic: include +ms.date: 12/06/2024 +ms.author: erikje +ms.custom: include file +--- + +1. Sign in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), select **Devices** > **Windows 365** (under **Provisioning**) > **Provisioning policies** > select a policy. +2. Under **General**, select **Edit**. +3. Under **Join type details**, make changes depending on the original type: + + - For **Hybrid Microsoft Entra Join**, change the ANC\*. + - For **Microsoft Entra Join**: + + - You can change **Network** type from ANC to Microsoft hosted network, or vice versa. + - If a **Microsoft hosted network** is used, change the **Geography** and/or **Region**. + - If an **Azure network connection** is used, change the ANC\*. + +4. Select **Next** > **Update**. +5. When ready to move the existing Cloud PCs, select **Apply this configuration**. diff --git a/windows-365/includes/reprovision-frontline-shared-cloud-pc.md b/windows-365/includes/reprovision-frontline-shared-cloud-pc.md new file mode 100644 index 00000000000..b5f574ef0e5 --- /dev/null +++ b/windows-365/includes/reprovision-frontline-shared-cloud-pc.md @@ -0,0 +1,9 @@ +--- +author: ErikjeMS +ms.author: erikje +ms.date: 10/24/2024 +ms.topic: include +ms.service: windows-365 +--- + +For Frontline Cloud PCs in shared mode, you can [bulk reprovision](/windows-365/enterprise/frontline-shared-bulk-reprovision) all the Cloud PCs in a provisioning policy. Admins can also select the percentage of Cloud PCs that are available for users to connect without being affected by the reprovisioning process. diff --git a/windows-365/includes/what-is-cloud-pc.md b/windows-365/includes/what-is-cloud-pc.md index de33dc7cf2e..c9dac59d38b 100644 --- a/windows-365/includes/what-is-cloud-pc.md +++ b/windows-365/includes/what-is-cloud-pc.md @@ -13,7 +13,7 @@ ms.custom: include file A Cloud PC is a highly available, optimized, and scalable virtual machine providing end users with a rich Windows desktop experience. It’s hosted in the Windows 365 service and is accessible from anywhere, on any device. -End users have a 1:1 relationship with their Cloud PC. It’s their own personal PC in the cloud. Users can connect to their Cloud PC by using [windows365.microsoft.com](https://windows365.microsoft.com/). [Browser and app-based access](/windows-365/end-user-access-cloud-pc) is available for Windows, Mac, iOS, and Android devices. +End users have a 1:1 relationship with their Cloud PC. It’s their own personal PC in the cloud. Users can connect to their Cloud PC by using [windows365.microsoft.com](https://windows365.microsoft.com/). [Browser and app-based access](/windows-365/end-user-access-cloud-pc) is available for Windows, Mac, iOS, and Android devices. Desk-based users can also use [Windows 365 Link](/windows-365/link/) to connect securely to your Windows 365 Cloud PC in seconds. ### Creating a Cloud PC diff --git a/windows-365/index.yml b/windows-365/index.yml index 03480276aae..8f7eebf9a22 100644 --- a/windows-365/index.yml +++ b/windows-365/index.yml @@ -40,6 +40,11 @@ productDirectory: imageSrc: ./media/win365icon.png summary: Learn more about Windows 365 Business url: ./business/index.yml + # Card + - title: Windows 365 Link + imageSrc: ./media/win365icon.png + summary: Learn more about Windows 365 Link + url: ./link/index.yml additionalContent: sections: diff --git a/windows-365/link/TOC.yml b/windows-365/link/TOC.yml new file mode 100644 index 00000000000..01f39fe8de2 --- /dev/null +++ b/windows-365/link/TOC.yml @@ -0,0 +1,43 @@ +items: +- name: Windows 365 Link docs + href: index.yml +- name: Overview + items: + - name: What is Windows 365 Link? + href: overview.md + - name: What's in the box + href: whats-in-the-box.md +- name: Using your Windows 365 Link + items: + - name: First time set up and sign in + href: setup.md + - name: Daily usage + items: + - name: Sign in + href: sign-in.md + - name: Quick settings + href: quick-settings.md + - name: Control-alt-delete menu + href: control-alt-delete.md +- name: Deploying Windows 365 Link + items: + - name: Deployment overview + href: deployment-overview.md + - name: Requirements + href: requirements.md + - name: Join Windows 365 Link to Microsoft Entra + href: join-microsoft-entra.md + - name: Automatically enroll in Intune + href: intune-automatic-enrollment.md + - name: Create Intune filter for Windows 365 Link + href: create-intune-filter.md + - name: Configure enrollment restrictions + href: enrollment-restrictions.md + - name: Configure Conditional Access policies + href: conditional-access-policies.md + - name: Suppress single sign-on prompt + href: single-sign-on-suppress.md +- name: Troubleshooting + items: + - name: Known issues + href: known-issues.md diff --git a/windows-365/link/conditional-access-policies.md b/windows-365/link/conditional-access-policies.md new file mode 100644 index 00000000000..378827f5bb4 --- /dev/null +++ b/windows-365/link/conditional-access-policies.md @@ -0,0 +1,96 @@ +--- +# required metadata +title: Conditional Access policies for Windows 365 Link +titleSuffix: +description: Learn about Conditional Access policies for Windows 365 Link +keywords: +author: ErikjeMS +ms.author: erikje +manager: dougeby +ms.date: 12/13/2024 +ms.topic: overview +ms.service: windows-365-link +ms.subservice: +ms.localizationpriority: high +ms.assetid: + +# optional metadata + +#ROBOTS: +#audience: + +ms.reviewer: sajelaci +ms.suite: ems +search.appverid: MET150 +#ms.tgt_pltfrm: +ms.custom: intune-azure; get-started; intro-hub-or-landing +ms.collection: +- M365-identity-device-management +- tier2 +--- + +# Conditional Access policies for Windows 365 Link + +As part of [setting up your organization's environment to support Windows 365 Link](deployment-overview.md), you must make sure that your Conditional Access policies accommodate both the login through and connection from Windows Cloud PC devices. If Conditional Access is used to protect the resources used to access Windows 365 Cloud PCs as described in [Set conditional access policies for Windows 365](/windows-365/enterprise/set-conditional-access-policies), a separate but matching Conditional Access policy must also be used to protect the user action to register or join devices. + +## Authentication process for Windows 365 Link devices + +1. When the user signs in on the Windows 365 Link interactive **Sign in** screen, their account is authenticated against the device registration service. +2. Windows 365 Link silently authenticates against the other required cloud resources (like Microsoft Graph and the Windows 365 service by using single sign-on (SSO)). + +Windows 365 Cloud PC devices have two distinct stages of authentication: + +- Interactive sign-in: When the user signs in on the Windows 365 Link sign in screen, the device registration service is used to get an authentication token. +- Non-interactive connections: The token obtained from the user sign in is then used to perform non-interactive sign-ins when connecting to other cloud app resources like Windows 365 services. + +Sign-ins from Windows 365 Link devices don't trigger any Conditional Access policies that are targeted to *All resources (formerly cloud apps)* or directly to the *Device Registration Service* resource. Also, the non-interactive connection can't prompt a user to satisfy those requirements. + +If a Conditional Access policy is assigned to any of the Windows 365 resources, then another policy with the same Access control settings must also be applied to the User Actions to Register or join devices. This policy can trigger an interactive sign-in and obtain the claims that are necessary for the connection. + +Without a matching set of policies, the connection is interrupted, and users can't connect to their Cloud PC. + +These activities can be seen in the Entra Conditional Access sign-in logs: + +1. Sign in to the [Microsoft Entra admin center](https://aad.portal.azure.com/) > **Protection** > **Conditional Access** > **Sign-in logs**. +2. On the **User sign-ins (interactive)** tab, use filters to find events from the sign in screen. +3. On the **User sign-ins (non-interactive)** tab, use filters to find events from the connections. + +## Create a Conditional Access policy for interactive sign in + +1. Sign in to the [Microsoft Entra admin center](https://aad.portal.azure.com/) > **Protection** > **Conditional Access** > **Policies** > **What if**. +2. For **User or Workload identity** select a user to test with. +3. For Cloud apps, actions, or authentication context, select **Any cloud app**. +4. For **Select target type** leave **Cloud app** selected. +5. Select **Select apps** then select the following resources, if they're available: + - **Windows 365** (app ID 0af06dc6-e4b5-4f28-818e-e78e62d137a5). + - **Azure Virtual Desktop** (app ID 9cdead84-a844-4324-93f2-b2e6bb768d07). + - **Microsoft Remote Desktop** (app ID a4a365df-50f1-4397-bc59-1a1564b8bb9c). + - **Windows Cloud Login** (app ID 270efc09-cd0d-444b-a71f-39af4910ec45). +6. Select **What If**. + +Review each of the **Policies that will apply** and determine the access controls used to grant access to those resources and session settings. + +You can now create a new Conditional Access policy to [Require MFA for device registration](/entra/identity/conditional-access/policy-all-users-device-registration#create-a-conditional-access-policy) using the same Access controls. + +1. Sign in to the [Microsoft Entra admin center](https://aad.portal.azure.com/) > **Protection** > **Conditional Access** > **Polices** > **New policy** +2. Give your policy a name. Consider using a meaningful standard for policy names. +3. Under **Assignments** > **Users**, select **0 users and groups selected**. +4. Under **Include**, select **All users** or select a group of users who will sign-in through Windows 365 Link devices. +5. Under **Exclude**, select **Users and groups** > select your organization's emergency access or break-glass accounts. +6. Under **Target resources** > **User actions**, select **Register or join devices**. +7. Under **Access controls** > **Grant**, use the same controls found earlier using the What If tool. +8. Under **Access controls** > **Session**, use the same controls found earlier using the What If tool. +9. Confirm your settings and set **Enable policy** to **Report-only**. +10. Select **Create**. +11. After confirming the settings using report-only mode, change the **Enable policy** toggle from **Report-only** to **On**. + +For more information about creating Conditional Access policies for device registration, including potential conflicts, see [Require multifactor authentication for device registration](/entra/identity/conditional-access/policy-all-users-device-registration#create-a-conditional-access-policy). + +For more information about user actions with Conditional Access, see [User actions](/entra/identity/conditional-access/concept-conditional-access-cloud-apps#user-actions). + +For more information about creating Conditional Access policies for resources used for Windows 365, see [Set Conditional Access policies](../enterprise/set-conditional-access-policies.md). + + +## Next steps + +[Suppress single sign-on consent prompt](single-sign-on-suppress.md). diff --git a/windows-365/link/control-alt-delete.md b/windows-365/link/control-alt-delete.md new file mode 100644 index 00000000000..c43ee47bf64 --- /dev/null +++ b/windows-365/link/control-alt-delete.md @@ -0,0 +1,48 @@ +--- +# required metadata +title: Control+Alt+Delete menu for Windows 365 Link +titleSuffix: +description: Learn about the Control-Alt-Delete menu for Windows 365 Link +keywords: +author: ErikjeMS +ms.author: erikje +manager: dougeby +ms.date: 11/19/2024 +ms.topic: overview +ms.service: windows-365-link +ms.subservice: +ms.localizationpriority: high +ms.assetid: + +# optional metadata + +#ROBOTS: +#audience: + +ms.reviewer: sajelaci +ms.suite: ems +search.appverid: MET150 +#ms.tgt_pltfrm: +ms.custom: intune-azure; get-started; intro-hub-or-landing +ms.collection: +- M365-identity-device-management +- tier2 +--- + +# Control + Alt + Delete + +When you press Control + Alt + Delete on your Windows 365 Link, you see the following options: + +| Control | Description | +| --- | --- | +| Lock | Locks the local device similar to Windows key + L. Connection to Windows 365 lasts 15 minutes, making it easy to quickly reconnect to your Cloud PC after you reauthenticate. | +| Sign out | Closes your Windows 365 connection and signs out of device. | +| Task Manager | Opens the Task Manager of your Cloud PC. | +| Connection details | Shows information about the current connection to your Cloud PC. | +| Restore and Troubleshoot | Initiates these processes for your Cloud PC. | +| Quick settings | Opens a small set of essential settings. For details on individual Quick settings, see below. | + + +## Next steps + +[Learn about options in the Quick settings menu](quick-settings.md) diff --git a/windows-365/link/create-intune-filter.md b/windows-365/link/create-intune-filter.md new file mode 100644 index 00000000000..6c1d4420b06 --- /dev/null +++ b/windows-365/link/create-intune-filter.md @@ -0,0 +1,55 @@ +--- +# required metadata +title: Create an Intune filter for Windows 365 Link devices +titleSuffix: +description: Learn how to create an Intune filter for Windows 365 Link devices +keywords: +author: ErikjeMS +ms.author: erikje +manager: dougeby +ms.date: 11/19/2024 +ms.topic: overview +ms.service: windows-365-link +ms.subservice: +ms.localizationpriority: high +ms.assetid: + +# optional metadata + +#ROBOTS: +#audience: + +ms.reviewer: sajelaci +ms.suite: ems +search.appverid: MET150 +#ms.tgt_pltfrm: +ms.custom: intune-azure; get-started; intro-hub-or-landing +ms.collection: +- M365-identity-device-management +- tier2 +--- + +# Create an Intune filter for Windows 365 Link devices + +To help with [setting up your organization's environment to support Windows 365 Link](deployment-overview.md), you can use filters when assigning Intune polices. Such a filter can be used on any policy assignment to include or exclude Windows 365 Link devices. + +To create a filter exclusively including Windows 365 Link devices: + +1. Sign in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) >**Tenant administration** > **Filters** > **Create** > **Managed devices**. +2. Provide a **Filter name**, like *Windows 365 Link devices*, and an optional **Description**. +3. For **Platform**, select **Windows 10 and later** > **Next**. +4. Select the following values: + - **Property**: **operatingSystemSKU (Operating System SKU)**. + - **Operator**: **Equals**. + - **Value**: **WCPC (Windows PC (210))**. +5. Select **Next**. +6. On the **Review + create** page, select **Create**. + +This new filter can now be used on various policy assignments to include or exclude Windows 365 Link devices for [supported Windows workloads](/mem/intune/fundamentals/filters-supported-workloads#windows-1011). + +For more information, see [Use filters when assigning your apps, policies, and profiles in Microsoft Intune](/mem/intune/fundamentals/filters). + + +## Next steps + +[Optimize enrollment restrictions to let Windows 365 Link devices enroll](enrollment-restrictions.md). diff --git a/windows-365/link/deployment-overview.md b/windows-365/link/deployment-overview.md new file mode 100644 index 00000000000..7f9ddcb69c9 --- /dev/null +++ b/windows-365/link/deployment-overview.md @@ -0,0 +1,53 @@ +--- +# required metadata +title: Overview of deploying Windows 365 Link devices +titleSuffix: +description: Learn how to deploy Windows 365 Link devices +keywords: +author: ErikjeMS +ms.author: erikje +manager: dougeby +ms.date: 11/19/2024 +ms.topic: overview +ms.service: windows-365-link +ms.subservice: +ms.localizationpriority: high +ms.assetid: + +# optional metadata + +#ROBOTS: +#audience: + +ms.reviewer: sajelaci +ms.suite: ems +search.appverid: MET150 +#ms.tgt_pltfrm: +ms.custom: intune-azure; get-started; intro-hub-or-landing +ms.collection: +- M365-identity-device-management +- tier2 +--- + +# Windows 365 Link deployment overview + +Before users can use their Windows 365 Link to connect to their Cloud PC provided by their organization, admins must set up the organization's Microsoft Entra ID and Intune environments to join and enroll the device. + +To set up your organization's environment to deploy and manage Windows 365 Link devices, admins must complete the following steps: + +1. [Meet all requirements](requirements.md). +2. [Configure Microsoft Entra Device settings to let users join Windows 365 Link devices to Microsoft Entra](join-microsoft-entra.md). +3. [Configure Microsoft Entra Mobility settings to automatically enroll Windows 365 Link devices in Intune](intune-automatic-enrollment.md). +4. [Create an Intune filter for Windows 365 Link devices](create-intune-filter.md) (optional). +5. [Configure enrollment restrictions to let Windows 365 Link devices enroll](enrollment-restrictions.md). +6. [Validate Conditional Access policies](conditional-access-policies.md). +7. [Suppress single sign-on consent prompt](single-sign-on-suppress.md) (recommended). + +After setting up deployment for your Windows 365 Link devices, you can start [onboarding](onboarding.md) them. + +For more information about managing devices in microsoft Intune, see the [Microsoft Intune documentation](/mem/intune/fundamentals/what-is-intune). + + +## Next steps + +[Make sure your environment meets all requirements](requirements.md). diff --git a/windows-365/link/enrollment-restrictions.md b/windows-365/link/enrollment-restrictions.md new file mode 100644 index 00000000000..cc644f10bcb --- /dev/null +++ b/windows-365/link/enrollment-restrictions.md @@ -0,0 +1,71 @@ +--- +# required metadata +title: Optimize enrollment restrictions for Windows 365 Link devices +titleSuffix: +description: Learn how to optimize enrollment restrictions for Windows 365 Link devices. +keywords: +author: ErikjeMS +ms.author: erikje +manager: dougeby +ms.date: 11/19/2024 +ms.topic: overview +ms.service: windows-365-link +ms.subservice: +ms.localizationpriority: high +ms.assetid: + +# optional metadata + +#ROBOTS: +#audience: + +ms.reviewer: sajelaci +ms.suite: ems +search.appverid: MET150 +#ms.tgt_pltfrm: +ms.custom: intune-azure; get-started; intro-hub-or-landing +ms.collection: +- M365-identity-device-management +- tier2 +--- + +# Configure enrollment restrictions + +While [setting up your organization's environment to support Windows 365 Link](deployment-overview.md), you should make sure that your environment's enrollment restrictions don't block Windows 365 Link devices from enrolling in Intune. + +The first time a user signs in to their Windows 365 Link, the Out of Box Experience (OOBE) joins the device to Microsoft Entra and enrolls it in Microsoft Intune for management. This is the first time the device is introduced to Intune, and thus it's an Unknown device. Because the device is Microsoft Entra joined, Intune sets the ownership to Corporate owned after the Intune enrollment process completes. + +If a [device platform restriction]() blocks personally owned devices, Windows 365 Link devices are prevented from completing Intune enrollment. To avoid this prevention, make sure to allow Windows 365 Link devices to enroll in Intune using one of the following methods: + +- [Use a Device Enrollment Manager to bypass all restrictions](/mem/intune/enrollment/device-enrollment-manager-enroll). +- [Use an operating system SKU filter to let Windows 365 Link devices enroll](#use-an-operating-system-sku-filter-to-let-windows-365-link-devices-enroll-in-intune). +- [Preregister Windows 365 Link devices using corporate identifiers](/mem/intune/enrollment/corporate-identifiers-add#add-windows-corporate-identifiers). + +Windows 365 Link devices don't currently support Autopilot. + +## Use an operating system SKU filter to let Windows 365 Link devices enroll in Intune + +If there's a policy that blocks personally owned Windows devices from enrolling in Intune it also blocks Windows 365 Link devices. You can create another policy with higher priority to allow Windows 365 Link devices to enroll in Intune while still blocking other personally owned Windows devices. + +Follow these steps to create a policy to allow users to enroll Windows 365 Link devices in Intune: + +1. Sign in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) > **Devices** > **Enrollment** > **Windows** > **Device platform restriction** > **Windows restrictions**. +2. Under **Windows restrictions**, select **Create restriction**. +3. On the **Basics** page, type a **Name** (like *Allow enrollment of Windows 365 Link devices*) and an optional **Description** > **Next**. +4. On the **Platform settings** page, set the following options: + - **MDM**: *Allow* + - **Personally owned devices**: *Allow* +5. Select **Next**. +6. On **Scope tags** page, select **Next**. +7. On **Assignments** page, select **Add all users** > **Edit filter**. +8. On the **Filters** pane, select **Include filtered devices in assignment** > **Windows 365 Link** > **Select**. +9. Select **Next**. +10. On the **Review + create** page, select **Create**. +11. On the **Enrollment restrictions** > **Windows restrictions** page, make sure the new policy is above any block policy in priority order. + +For more information about Intune platform enrollment restrictions, see [Create device platform restrictions](/mem/intune/enrollment/create-device-platform-restrictions). + + +## Next steps + +[Suppress single sign-on consent prompt](single-sign-on-suppress.md). diff --git a/windows-365/link/index.yml b/windows-365/link/index.yml new file mode 100644 index 00000000000..1cc3cf1396a --- /dev/null +++ b/windows-365/link/index.yml @@ -0,0 +1,70 @@ +### YamlMime:Hub +title: Windows 365 Link documentation +summary: Official product documentation for Windows 365 Link + +metadata: + services: service + ms.service: windows-365-link + ms.topic: hub-page + author: erikjeMS + ms.author: erikje + manager: dougeby + ms.date: 11/192024 + ms.subservice: + +highlightedContent: + items: + - title: What is Windows 365 Link? + itemType: overview + url: overview.md + - title: Set up your Windows 365 Link + itemType: get-started + url: setup.md + - title: Sign in + itemType: how-to-guide + url: sign-in.md + +conceptualContent: + items: + - title: For administrators + links: + - url: deployment-overview.md + itemType: how-to-guide + text: Deployment overview + - url: requirements.md + itemType: how-to-guide + text: Requirements + footerLink: + url: deployment-overview.md + text: See more + - title: For users + links: + - url: setup.md + itemType: how-to-guide + text: First time set up + - url: setup.md + itemType: how-to-guide + text: Sign in, sign out, lock + footerLink: + url: overview.md + text: See more +additionalContent: + sections: + - title: Additional resources related to Windows 365 Link + items: + - title: Windows 365 + links: + - text: Windows 365 + url: /windows-365/ + - text: Windows 365 Enterprise + url: /windows-365/enterprise/ + - text: Windows 365 Business + url: /windows-365/business/ + - title: Microsoft Intune product family + links: + - text: Microsoft Intune product family documentation + url: /mem/index + - text: Overview of Microsoft Intune family + url: /mem/endpoint-manager-overview + - text: Microsoft Intune blog + url: https://aka.ms/memblog diff --git a/windows-365/link/intune-automatic-enrollment.md b/windows-365/link/intune-automatic-enrollment.md new file mode 100644 index 00000000000..07de67a7756 --- /dev/null +++ b/windows-365/link/intune-automatic-enrollment.md @@ -0,0 +1,60 @@ +--- +# required metadata +title: Automatically enroll Windows 365 Link in Intune +titleSuffix: +description: Learn about automatically enrolling Windows 365 Link in Intune +keywords: +author: ErikjeMS +ms.author: erikje +manager: dougeby +ms.date: 11/19/2024 +ms.topic: overview +ms.service: windows-365-link +ms.subservice: +ms.localizationpriority: high +ms.assetid: + +# optional metadata + +#ROBOTS: +#audience: + +ms.reviewer: sajelaci +ms.suite: ems +search.appverid: MET150 +#ms.tgt_pltfrm: +ms.custom: intune-azure; get-started; intro-hub-or-landing +ms.collection: +- M365-identity-device-management +- tier2 +--- + +# Automatically enroll Windows 365 Link in Intune + +As the second step to [set up your organization's environment to support Windows 365 Link](deployment-overview.md), you must make sure they can be managed by Microsoft Intune. + +After a Windows 365 Link device is [joined to Entra ID](join-microsoft-entra.md), it can be managed with Intune if automatic enrollment is enabled by setting **MDM user scope**. The user must also have the appropriate Microsoft Entra Premium license. Without setting **MDM user scope**, automatic enrollment doesn't occur and Windows 365 Link devices can't be managed by, and don't appear in, Intune. + +To set up automatic enrollment in Intune for Windows 365 Link devices: + +1. Sign in to the [Microsoft Entra admin center](https://aad.portal.azure.com/) > **Show more** > **Settings** > **Mobility**. +2. On the **Mobility (MDM and WIP)** page, select **Microsoft Intune**. +3. On the **Microsoft Intune** page, under **MDM user scope**, select either **All** or **Some**. + + - **All**: All users can automatically enroll their devices in Intune. + - **Some**: Only users in the groups specified in the link under **Groups** can automatically enroll their devices in Intune. Make sure the groups selected are Microsoft Entra user groups that contain the desired users. + +4. If there's more than one application listed on the **Mobility (MDM and WIP)** page, confirm that one of the following is true: + + - Only **Microsoft Intune** has **MDM user scope** set to **All** and each of the other applications are set to **None**. Or, + - Only **Microsoft Intune** has **MDM user scope** set to **Some** and each of the other applications are set to **None**. Or, + - If **Microsoft Intune** has **MDM user scope** set to **Some**, none of the other applications are set to **All**. If any of the other applications are set to **Some**, then no users belong to more than one of the selected groups. + +5. Select **Save**. +6. Sign in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) >**Tenant administration** > **Tenant status** > **Tenant details**. +7. Confirm that **MDM authority** is set to *Microsoft Intune*. + + +## Next steps + +[Create an Intune filter for Windows 365 Link devices](create-intune-filter.md). diff --git a/windows-365/link/join-microsoft-entra.md b/windows-365/link/join-microsoft-entra.md new file mode 100644 index 00000000000..05aac21ef23 --- /dev/null +++ b/windows-365/link/join-microsoft-entra.md @@ -0,0 +1,61 @@ +--- +# required metadata +title: Allow joining Windows 365 Link to Microsoft Entra +titleSuffix: +description: Learn about joining Windows 365 Link to Microsoft Entra +keywords: +author: ErikjeMS +ms.author: erikje +manager: dougeby +ms.date: 11/19/2024 +ms.topic: overview +ms.service: windows-365-link +ms.subservice: +ms.localizationpriority: high +ms.assetid: + +# optional metadata + +#ROBOTS: +#audience: + +ms.reviewer: sajelaci +ms.suite: ems +search.appverid: MET150 +#ms.tgt_pltfrm: +ms.custom: intune-azure; get-started; intro-hub-or-landing +ms.collection: +- M365-identity-device-management +- tier2 +--- + +# Allow joining Windows 365 Link to Microsoft Entra + +As the first step in setting up your organization's environment to support Windows 365 Link, you must allow Windows 365 Link devices to [join Microsoft Entra](/entra/identity/devices/concept-directory-join). + +Before signing in, the user must have permission to join and not be blocked by any Intune device enrollment restrictions. + +The first time the device is powered on, the Out of Box Experience (OOBE): + +1. Prompts the user to sign in. +2. Joins the device to their tenant. + +To set permissions to allow your organization's users to join their Windows 365 Link to Microsoft Entra, follow these steps: + +1. Sign in to the [Microsoft Entra admin center](https://aad.portal.azure.com/) > **Identity** > **Devices** > **Overview** > **Device Settings**. +2. Under **Users may join devices to Microsoft Entra**, select either **All** or **Selected**: + + - **All**: All users can join their devices to Microsoft Entra ID. + - **Selected**: Only users specified under **Selected** can join devices to Microsoft Entra ID. Selected groups must be a Microsoft Entra group that contains user objects. + +3. Make sure that **Maximum number of devices per user** is set to a reasonable value that doesn't prevent users from joining new devices. The default maximum is 50 and applies to all users, including device enrollment managers. +4. Select **Save**. + +For more about configuring device settings for Microsoft Entra ID, see [Configure your device settings](/entra/identity/devices/device-join-plan#configure-your-device-settings). + +For full information about planning your join implementation, see [How to: Plan your Microsoft Entra join implementation](/entra/identity/devices/device-join-plan). + + +## Next steps + +[Enable automatic enrollment](intune-automatic-enrollment.md). \ No newline at end of file diff --git a/windows-365/link/known-issues.md b/windows-365/link/known-issues.md new file mode 100644 index 00000000000..ac80f041ae4 --- /dev/null +++ b/windows-365/link/known-issues.md @@ -0,0 +1,38 @@ +--- +# required metadata +title: Known issues for Windows 365 Link +titleSuffix: +description: Learn about known issues for Windows 365 Link +keywords: +author: ErikjeMS +ms.author: erikje +manager: dougeby +ms.date: 12/04/2024 +ms.topic: overview +ms.service: windows-365-link +ms.subservice: +ms.localizationpriority: high +ms.assetid: + +# optional metadata + +#ROBOTS: +#audience: + +ms.reviewer: sajelaci +ms.suite: ems +search.appverid: MET150 +#ms.tgt_pltfrm: +ms.custom: intune-azure; get-started; intro-hub-or-landing +ms.collection: +- M365-identity-device-management +- tier2 +--- + +# Known issues: Windows 365 Link + +The following items are known issues for Windows 365 Enterprise. + +## Missing or renamed options in Cloud PC Display settings app for Windows 365 Link device + +when connecting to a Cloud PC from a Windows 365 Link device, some options aren't available in the **System** > **Display** app. Instead, you can use **Open additional settings** to adjust arrangement and scale of up to two monitors attached. diff --git a/windows-365/link/media/overview/device-front.png b/windows-365/link/media/overview/device-front.png new file mode 100644 index 00000000000..eae48a9fac2 Binary files /dev/null and b/windows-365/link/media/overview/device-front.png differ diff --git a/windows-365/link/media/quick-settings/accessibility-icon.gif b/windows-365/link/media/quick-settings/accessibility-icon.gif new file mode 100644 index 00000000000..2a8a9f937e8 Binary files /dev/null and b/windows-365/link/media/quick-settings/accessibility-icon.gif differ diff --git a/windows-365/link/media/quick-settings/internet-icon.gif b/windows-365/link/media/quick-settings/internet-icon.gif new file mode 100644 index 00000000000..e32f93bc924 Binary files /dev/null and b/windows-365/link/media/quick-settings/internet-icon.gif differ diff --git a/windows-365/link/media/setup/connect-network.png b/windows-365/link/media/setup/connect-network.png new file mode 100644 index 00000000000..d87a29c8a61 Binary files /dev/null and b/windows-365/link/media/setup/connect-network.png differ diff --git a/windows-365/link/media/setup/email-sign-in.png b/windows-365/link/media/setup/email-sign-in.png new file mode 100644 index 00000000000..16a03ce4086 Binary files /dev/null and b/windows-365/link/media/setup/email-sign-in.png differ diff --git a/windows-365/link/media/whats-in-the-box/device-back.png b/windows-365/link/media/whats-in-the-box/device-back.png new file mode 100644 index 00000000000..11c669b8651 Binary files /dev/null and b/windows-365/link/media/whats-in-the-box/device-back.png differ diff --git a/windows-365/link/media/whats-in-the-box/device-side.png b/windows-365/link/media/whats-in-the-box/device-side.png new file mode 100644 index 00000000000..9049eb48a55 Binary files /dev/null and b/windows-365/link/media/whats-in-the-box/device-side.png differ diff --git a/windows-365/link/onboarding.md b/windows-365/link/onboarding.md new file mode 100644 index 00000000000..10f9fc62975 --- /dev/null +++ b/windows-365/link/onboarding.md @@ -0,0 +1,103 @@ +--- +# required metadata +title: Onboard Windows 365 Link devices into your organization's environment +titleSuffix: +description: Learn about options for onboarding Windows 365 Link devices into your organization's environment. +keywords: +author: ErikjeMS +ms.author: erikje +manager: dougeby +ms.date: 11/19/2024 +ms.topic: overview +ms.service: windows-365-link +ms.subservice: +ms.localizationpriority: high +ms.assetid: + +# optional metadata + +#ROBOTS: +#audience: + +ms.reviewer: sajelaci +ms.suite: ems +search.appverid: MET150 +#ms.tgt_pltfrm: +ms.custom: intune-azure; get-started; intro-hub-or-landing +ms.collection: +- M365-identity-device-management +- tier2 +--- + +# Onboard Windows 365 Link devices to your organization's environment + +After [setting up your organization's environment to support Windows 365 Link](deployment-overview.md), you can decide how you want to onboard the devices to your organization's environment. + +Windows 365 Link devices are designed to be shared. The first time a Windows 365 Link boots it loads the Out of Box Experience (OOBE) to guide a user through a simplified process that joins the device to Entra ID and enrolls into Intune management. After this process completes, the device shows only the sign-in screen for any user to authenticate and connect to their own Cloud PC. + +With the right permissions, a standard user can onboard Windows 365 Link devices using the OOBE process. Alternatively, you can choose to have admins onboard Windows 365 Link devices and complete the onboarding before delivering the devices to users. You can have admins onboard some devices and users onboard others. To help you decide, consider the following recommendations: + +| Considerations | Admin driven onboarding | User driven onboarding | +| --- | --- | --- | +| The device will be used by different users. | Yes | | +| The device will be used by one user. | | Yes | +| Users aren't allowed to join or register devices. | Yes | | +| Devices are shipped directly to users. | | Yes | + +## Admin driven onboarding + +When onboarding devices shared by multiple users, you can use an account that is designated as a [Device Enrollment Manager](/mem/intune/enrollment/device-enrollment-manager-enroll) (DEM). This account doesn't need admin privileges in the tenant but is allowed to enroll up to 1000 devices in Intune. + +A Device Enrollment Manager is still subject to the limit on the number of devices that can be joined to Entra ID. For more information, see [Join Windows 365 Link to Microosft Entra](join-microsoft-entra.md). Consider increasing the **Maximum number of devices per user** to a value you expect a DEM to enroll. + +Using this DEM account on onboard Windows 365 Link devices: + +- Enrolls the Windows 365 Link devices in a shared device mode. +- Bypasses Intune enrollment restrictions for platforms and device limits that may be in place. +- Doesn't require any changes to allow personal Windows devices. +- Doesn't designate a primary user of the device. With no primary user, the Windows 365 Link doesn't appear in a user's list of devices in Intune, Entra, Company Portal, or other places. + +To set up a DEM account to onboard Windows 365 Link devices, follow these steps: + +1. Create an account to use for Windows 365 Link device onboarding. +2. Assign the required licensing (Microsoft Entra Premium, Intune, Windows, and so on ). +3. Make sure the user has permissions to join devices to Microsoft Entra ID. +4. Add the user to the list of Device Enrollment Managers. +5. To validate connectivity, provision a Cloud PC for this DEM account. + +To onboard Windows 365 Link devices using the DEM account, follow these steps: + +1. Power on the Windows 365 Link. +2. Sign in with the DEM account. Follow all the authentication steps to join the device to Microsoft Entra and enroll in Intune. +3. After you're connected to the Cloud PC, disconnect and then restart the Windows 365 Link to install any available updates. +4. Shut down the Windows 365 Link. +5. The Windows 365 Link is now ready for any users in the organization to use with their own Cloud PC. + +## User driven onboarding + +Rather than having an administrative person onboard each Windows 365 Link, users can complete the OOBE to join them to Microsoft Entra and enroll them in Intune. Using this method: + +- The user is designated as the primary user of the device. +- The Windows 365 Link appears in their list of devices (for example, in the Company Portal). +- Any user from the same organization can use the device to connect to their own Cloud PC. + +To use this onboarding method, make sure each user: + +- Has the required licensing (Microsoft Entra Premium, Intune, Windows, and so on). +- Has permissions to join devices to Microsoft Entra IP. +- Doesn't exceed the maximum number of devices that can be joined. +- Isn't blocked from Intune enrollment by any restrictions or device limits. +- Has a Cloud PC provisioned and consented to single sign-on. + +To onboard Windows 365 Link devices using this method, follow these steps: + +1. Deliver the Windows 365 Link to the user. +2. Power on the Windows 365 Link. +3. Sign in with the user's account. Follow all authentication steps to join the device to Microsoft Entra and enrolls it in Intune. +4. After the user connects to their Cloud PC, disconnect and then restart the Windows 365 Link to install any available updates. +5. Shut down the Windows 365 Link. +6. The Windows 365 Link is now ready for any users in the organization to use with their own Cloud PC. + +## Next steps + +For more information about managing devices in Microsoft Intune, see the [Microsoft Intune documentation](/mem/intune/fundamentals/what-is-intune). diff --git a/windows-365/link/overview.md b/windows-365/link/overview.md new file mode 100644 index 00000000000..738544f70f0 --- /dev/null +++ b/windows-365/link/overview.md @@ -0,0 +1,95 @@ +--- +# required metadata +title: What is Windows 365 Link? +titleSuffix: +description: What is Windows 365 Link? +keywords: +author: ErikjeMS +ms.author: erikje +manager: dougeby +ms.date: 11/19/2024 +ms.topic: overview +ms.service: windows-365-link +ms.subservice: +ms.localizationpriority: high +ms.assetid: + +# optional metadata + +#ROBOTS: +#audience: + +ms.reviewer: sajelaci +ms.suite: ems +search.appverid: MET150 +#ms.tgt_pltfrm: +ms.custom: intune-azure; get-started; intro-hub-or-landing +ms.collection: +- M365-identity-device-management +- tier2 +--- + +# What is Windows 365 Link? + +> [!NOTE] +> Windows 365 Link is in ["public preview"](../public-preview.md). Customers who want to participate in the preview and get Windows 365 Link devices for their organization should contact their Microsoft account team. As part of your participation, you can join the Customer Connections Program and Office hours for the latest updates. + +Windows 365 Link is the first Cloud PC hardware device that lets users connect directly to their Cloud PC virtual machine. It’s a full stack, purpose-built solution by Microsoft. When users sign in to their Windows 365 Link, they're connected to their Windows 365 [Cloud PC virtual machine](/windows-365/overview#what-is-a-cloud-pc) through the Windows 365 service. + +![Image of the Windows 365 Link device.](media/overview/device-front.png) + +Admins use Microsoft Intune to manage Windows 365 Link devices alongside other devices. + +## Secure by design + +Windows 365 Link is secure by design, thanks to the following features: + +- Discrete Trusted Platform Model 2.0. +- Secure boot. +- Virtualization-based security. +- Hypervisor-protected Code Integrity. +- BitLocker drive encryption. +- Strict Application Control policy. +- No local user with administrative rights. +- No local data storage. +- No local apps. +- Security baseline policies are enabled by default. +- Microsoft Defender EDR Sensor. + +## Requirements + +Requirements for Windows 365 Link include: + +- Windows 365 Link device. +- Management by your organization using Microsoft Intune. +- [Windows 365 license](https://www.microsoft.com/licensing/product-licensing/windows-365?rtc=1) for your Cloud PC. + +## Device capabilities + +### Media optimizations + +Windows 365 Link supports local redirection of web multimedia content, ensuring a smooth, high-quality experience, just like on a local PC. + +## Unit dimensions + +| Dimension | Units metric | Units imperial | +| --- | --- | --- | +| Length | 120mm | 4.72 inches | +| Width | 120mm | 4.72 inches | +| Height | 30mm | 1.18 inches | +| Weight | 418 grams | 14.75 ounces | + +## Finding the serial number + +The serial number is printed on the bottom of the device below the Microsoft logo. + + +## Next steps + +For information about peripheral ports, software, and box contents, see [What's in the box](whats-in-the-box.md). + +[First time user setup](setup.md). + +[Learn more about Windows 365 Enterprise](../enterprise/overview.md). + +[Read the Windows 365 service description](/office365/servicedescriptions/windows-365-service-description/windows-365-service-description). diff --git a/windows-365/link/quick-settings.md b/windows-365/link/quick-settings.md new file mode 100644 index 00000000000..cb02c6b4c20 --- /dev/null +++ b/windows-365/link/quick-settings.md @@ -0,0 +1,65 @@ +--- +# required metadata +title: Quick settings for Windows 365 Link +titleSuffix: +description: Learn about Quick settings for Windows 365 Link +keywords: +author: ErikjeMS +ms.author: erikje +manager: dougeby +ms.date: 11/19/2024 +ms.topic: overview +ms.service: windows-365-link +ms.subservice: +ms.localizationpriority: high +ms.assetid: + +# optional metadata + +#ROBOTS: +#audience: + +ms.reviewer: sajelaci +ms.suite: ems +search.appverid: MET150 +#ms.tgt_pltfrm: +ms.custom: intune-azure; get-started; intro-hub-or-landing +ms.collection: +- M365-identity-device-management +- tier2 +--- + +# Quick settings + +You can use the quick settings icons in the bottom corner of the **Sign in** screen to access various settings for your Windows 365 Link. There are three different option icons: + +- Internet (![Image of the internet icon.](media/quick-settings/internet-icon.gif)) +- Audio +- Accessibility (![Image of the Accessibility icon.](media/quick-settings/accessibility-icon.gif)) + +## Internet + +To see the internet options, on the **Sign in** screen, select the **Internet** icon (![Image of the internet icon.](media/quick-settings/internet-icon.gif)). You can then select which network you want to use. + +## Audio + +Select audio output device and manage its volume. + +## Quick settings menu + +To see the accessibility options, on the **Sign in** screen, select the **Accessibility** icon (![Image of the Accessibility icon.](media/quick-settings/accessibility-icon.gif)). You can then set the following accessibility options. + +| Control | Description | +| --- | --- | +| Wi-Fi | View and manage Wi-Fi connection. | +| Bluetooth | View and manage Bluetooth devices. You can only add Bluetooth devices after you're authenticated. Not in Out of Box Experience (OOBE)| +| Accessibility | Turn on/off accessibility tools: Magnifier, Contrast themes, Narrator, On-screen keyboard, Sticky keys, and Filter keys. | +| Language | Choose display language used on your Windows 365 Link. | +| Display | Change the scale for you display and set two monitor arrangement. | +| Privacy and Security | View privacy and security settings for your Location, Camera, and microphone. Not in OOBE.| +| Power button | View power management options for the device. | + + +## Next steps + +[Learn about the options in the control + alt + delete meneu](control-alt-delete.md). diff --git a/windows-365/link/requirements.md b/windows-365/link/requirements.md new file mode 100644 index 00000000000..8ac9555ed61 --- /dev/null +++ b/windows-365/link/requirements.md @@ -0,0 +1,91 @@ +--- +# required metadata +title: Requirements for Windows 365 Link +titleSuffix: +description: Learn about the requirements of Windows 365 Link +keywords: +author: ErikjeMS +ms.author: erikje +manager: dougeby +ms.date: 11/19/2024 +ms.topic: overview +ms.service: windows-365-link +ms.subservice: +ms.localizationpriority: high +ms.assetid: + +# optional metadata + +#ROBOTS: +#audience: + +ms.reviewer: sajelaci +ms.suite: ems +search.appverid: MET150 +#ms.tgt_pltfrm: +ms.custom: intune-azure; get-started; intro-hub-or-landing +ms.collection: +- M365-identity-device-management +- tier2 +--- + +# Requirements for Windows 365 Link deployment + +The following lists the requirements to deploy and manage Windows 365 Link devices using Intune. + +## Licensing + +Windows 365 Link is a Windows 365 product and shares the same license requirements. For more information, see [Windows 365 plans and pricing](https://www.microsoft.com/windows-365/enterprise/all-pricing?rtc=1). + +## Microsoft Entra ID requirements + +Windows 365 Link devices must be [Microsoft Entra joined](/entra/identity/devices/concept-directory-join). + +The user who joins the device to Microsoft Entra ID must have permissions to join devices to Microsoft Entra ID. + +Windows 365 Link devices can be used to connect to Cloud PCs that are either Entra joined or Entra hybrid joined. + +Windows 365 Link devices use [automatic enrollment](/mem/intune/enrollment/windows-enroll) in Intune for management by the organization. To use this feature, the user who Entra joins the device must have a Microsoft Entra ID Premium license. + +For more information, see [Join Windows 365 Link to Microsoft Entra](join-microsoft-entra.md). + +## Microsoft Intune requirements + +Windows 365 Link devices enroll for management with Intune during the Out of Box Experience (OOBE). The user performing enrollment must have permission to enroll the devices and comply with any defined Enrollment restrictions. + +Optionally, Windows 365 Link devices can be used with the Intune corporate identifier enrollment feature to pre-upload the serial number, manufacturer, model to ensure only trusted devices go through enrollment. + +For more information, see [Automatically enroll Windows 365 Link in Intune](intune-automatic-enrollment.md). + +## Windows 365 SSO requirements + +Windows 365 Link devices can only be used to connect to Windows 365 Cloud PCs that have Entra ID single sign-on (SSO) enabled. If SSO isn't enabled on the Cloud PC, the user: + +- Gets an error that their Cloud PC doesn't support Entra ID single sign-on +- Can't connect to their Cloud PC. + +To [configure SSO](../enterprise/configure-single-sign-on.md), use either of the following options: + +- Edit an existing provisioning Policy to enable SSO, then apply the change to all Cloud PCs that are associated with the policy. +- Provision new Cloud PCs using a provisioning profile with SSO enabled. + +After SSO is enabled, Windows 365 Link devices can be used to connect to those Cloud PCs. For more information, see [Configure single sign-on for Windows 365 using Microsoft Entra authentication](../enterprise/configure-single-sign-on.md). + +### Conditional Access + +If you're using Conditional Access to protect access to Cloud PC, make sure to include the SSO Cloud App resource in the target resources of those Conditional Access policies. + +Also consider suppressing the SSO Consent Prompt by configuring the SSO on service principals. + +## Microsoft Teams requirements + + Windows 365 Link devices can only use the VDI solution for Teams for media optimizations. These optimizations are pre-installed as part of the Windows 365 Link's operating system. Check the Microsoft Teams PowerShell policy for optimization to ensure that the users signing in to Windows 365 Link devices are in scope for the new VDI policy. + +## Network Requirements + + Windows 365 Link devices have the same network requirements as [Azure Virtual Desktop end user devices](/azure/virtual-desktop/required-fqdn-endpoint?tabs=azure#end-user-devices). + + +## Next steps + +[Join Windows 365 Link devices to Microsoft Entra ID](join-microsoft-entra.md). diff --git a/windows-365/link/setup.md b/windows-365/link/setup.md new file mode 100644 index 00000000000..57b4b831aa7 --- /dev/null +++ b/windows-365/link/setup.md @@ -0,0 +1,65 @@ +--- +# required metadata +title: Set up Windows 365 Link +titleSuffix: +description: Learn how to set up your Windows 365 Link +keywords: +author: ErikjeMS +ms.author: erikje +manager: dougeby +ms.date: 11/19/2024 +ms.topic: overview +ms.service: windows-365-link +ms.subservice: +ms.localizationpriority: high +ms.assetid: + +# optional metadata + +#ROBOTS: +#audience: + +ms.reviewer: sajelaci +ms.suite: ems +search.appverid: MET150 +#ms.tgt_pltfrm: +ms.custom: intune-azure; get-started; intro-hub-or-landing +ms.collection: +- M365-identity-device-management +- tier2 +--- + +# Set up your Windows 365 Link and sign in + +The first time you turn on your Windows 365 Link, you're guided through setting up your device and signing in with a work or school user account. + +## Requirements + +- An available network. +- A work or school account. +- A Windows 365 Cloud PC. + +## First time set up + +Complete the following steps to set up your new device: + +1. Connect a monitor, USB keyboard, and USB mouse (recommended) to the device. +2. Connect the power adaptor to the power port and then into a power outlet. +3. Power on the device. +4. On the **Let's connect you to a network** page, select a network > **Next**. +![Screenshot of network connect page.](media/setup/connect-network.png) +5. On the **Let's set things up for your work or school** page, type your work or school e-mail > **Next** +![Screenshot of e-mail sign in page.](media/setup/email-sign-in.png) +7. Authenticate your account as requested. Your organization defined the authentication method (FIDO2 security key, Passkey (FIDO2), Microsoft Authenticator app, and so on). +8. You're connected to your Cloud PC with all of your context and apps just where you left off. + +You can adjust additional settings prior to sign-in by using [Quick settings](quick-settings.md) in the bottom-right corner. + +When you sign in for the first time, the Windows 365 Link automatically joins Microsoft Entra ID and enrolls the device into Microsoft Intune tenant associated with the account used to sign in. Your organization's admins use Intune to manage both virtual machines and hardware devices, including Windows 365 Link. + + +## Next steps + +[Use Quick Settings to view and manage monitors, languages, network connections, and more](quick-settings.md). + +[Use the Control-Alt-Delete menu to mange manage tasks, connections, sign-out, or lock your Windows 365 Link.](control-alt-delete.md) diff --git a/windows-365/link/sign-in.md b/windows-365/link/sign-in.md new file mode 100644 index 00000000000..bb3e820e5c9 --- /dev/null +++ b/windows-365/link/sign-in.md @@ -0,0 +1,63 @@ +--- +# required metadata +title: Sign in to your Windows 365 Link +titleSuffix: +description: Learn how to sign in, sign our, and lock your Windows 365 Link +keywords: +author: ErikjeMS +ms.author: erikje +manager: dougeby +ms.date: 11/19/2024 +ms.topic: overview +ms.service: windows-365-link +ms.subservice: +ms.localizationpriority: high +ms.assetid: + +# optional metadata + +#ROBOTS: +#audience: + +ms.reviewer: sajelaci +ms.suite: ems +search.appverid: MET150 +#ms.tgt_pltfrm: +ms.custom: intune-azure; get-started; intro-hub-or-landing +ms.collection: +- M365-identity-device-management +- tier2 +--- + +# Sign in to, sign out, or lock your Windows 365 Link + +When you want to use the Windows 365 Link, complete the following steps to sign in: + +1. Power on the Windows 365 Link. +2. On the **Sign in** screen, provide your sign in credentials. The device automatically presents you with the sign-in process configured by your organization (FIDO2 security key, Passkey (FIDO2), Microsoft Authenticator app, and so on). +3. Authenticate your account as requested. +4. You're connected to your Cloud PC with all of your context and apps just where you left off + +## Sign out + +To sign out of your Windows 365 Link: + +1. Press control-alt-delete. +1. Select **Sign out**. + +## Lock or disconnect your Windows 365 Link + +Lock the device by either of these methods: + +- Press the **Windows key + L** on your keyboard. +- Select **Start** > **Power** > **Lock**. +- In your Cloud PC, select start > **Power** > **Disconnect**. + +The Cloud PC connection persists for 15 minutes (default) after sign-out. Your data and account information aren't stored on the Windows 365 Link. If someone else signs into their account on the Windows 365 Link, the previous user's Cloud PC connection is automatically disconnected. + + +## Next steps + +[Use Quick Settings to view and manage monitors, langauages, network connections, and more](quick-settings.md). + +[Use the Control-Alt-Delete menu to mange manage tasks, connections, sign-out, or lock your Windows 365 Link.](control-alt-delete.md) diff --git a/windows-365/link/single-sign-on-suppress.md b/windows-365/link/single-sign-on-suppress.md new file mode 100644 index 00000000000..7b35dd70c02 --- /dev/null +++ b/windows-365/link/single-sign-on-suppress.md @@ -0,0 +1,50 @@ +--- +# required metadata +title: Suppress single sign-on consent prompts for Windows 365 Link +titleSuffix: +description: Learn about suppressing single sign-on consent prompts for Windows 365 Link +keywords: +author: ErikjeMS +ms.author: erikje +manager: dougeby +ms.date: 11/19/2024 +ms.topic: overview +ms.service: windows-365-link +ms.subservice: +ms.localizationpriority: high +ms.assetid: + +# optional metadata + +#ROBOTS: +#audience: + +ms.reviewer: sajelaci +ms.suite: ems +search.appverid: MET150 +#ms.tgt_pltfrm: +ms.custom: intune-azure; get-started; intro-hub-or-landing +ms.collection: +- M365-identity-device-management +- tier2 +--- + +# Suppress single sign-on consent prompts for Windows 365 Link + +As part of [setting up your organization's environment to support Windows 365 Link devices](deployment-overview.md), you should consider suppressing single sign-on consent prompts for your Windows 365 Link devices. The Windows 365 Link connection experience doesn’t currently support interacting with the SSO consent prompt. + +When connecting to a Cloud PC for the first time after single sign-on (SSO) is enabled, users are prompted for consent to allow the connection. They're also prompted every 30 days or after a Cloud PC is reprovisioned. If a connection to a Cloud PC requires SSO consent, the Windows 365 Link connection will fail. This failure necessitates that the user first connect to the Cloud PC from another device or web browser and grant SSO consent before attempting to connect from a Windows 365 Link device again. + +To avoid this this experience, you must suppress the SSO consent prompt by configuring a property on the SSO service principals in Entra ID. + +To suppress the SSO consent prompt, follow these steps: + +1. [Create a dynamic device group for all Cloud PCs](../enterprise/create-dynamic-device-group-all-cloudpcs.md#create-a-dynamic-device-group-for-all-cloud-pcs). +2. [Enable Entra authentication for RDP on the SSO service principal](/azure/virtual-desktop/configure-single-sign-on#enable-microsoft-entra-authentication-for-rdp). +3. [Add the group of Cloud PCs to the Service Principal target](/azure/virtual-desktop/configure-single-sign-on#hide-the-consent-prompt-dialog). + +After the Cloud PCs are in the target group, the users aren't prompted to consent to use SSO. + +## Next steps + +[Onboard Windows 365 Link devices](onboarding.md). diff --git a/windows-365/link/whats-in-the-box.md b/windows-365/link/whats-in-the-box.md new file mode 100644 index 00000000000..ce3368d04d3 --- /dev/null +++ b/windows-365/link/whats-in-the-box.md @@ -0,0 +1,116 @@ +--- +# required metadata +title: Unboxing your Windows 365 Link +titleSuffix: +description: Learn about unboxing your Windows 365 Link. +keywords: +author: ErikjeMS +ms.author: erikje +manager: dougeby +ms.date: 11/19/2024 +ms.topic: overview +ms.service: windows-365-link +ms.subservice: +ms.localizationpriority: high +ms.assetid: + +# optional metadata + +#ROBOTS: +#audience: + +ms.reviewer: sajelaci +ms.suite: ems +search.appverid: MET150 +#ms.tgt_pltfrm: +ms.custom: intune-azure; get-started; +ms.collection: +- M365-identity-device-management +- tier2 +--- + +# What's in the box + +When you unbox your Windows 365 Link, you'll find the following hardware, software, and network and peripheral support. + +## Hardware + +Your box includes: + +- Windows 365 Link device. +- Power adaptor. +- Quick start guide. + +### Ports + +The Windows 365 Link has the following ports: + +#### Front panel + +- USB-A +- 3.5 mm audio jack +- Power button and LED indicator + +![Image of the Windows 365 Link device front.](media/overview/device-front.png) + +#### Back panel + +- USB-C +- Two USB-A +- DisplayPort +- HDMI +- Ethernet +- Power supply + +![Image of the Windows 365 Link device back.](media/whats-in-the-box/device-back.png) + +#### Side panel + +Kensington lock to physically secure the device + +![Image of the Windows 365 Link side back.](media/whats-in-the-box/device-side.png) + +### Power + +**Power supply**: Barrel type, 65 watts. + +**Fan**: None. + +## Monitor support + +Both the HDMI and Display Port support one monitor each, up to 4k in resolution. + +## Peripheral support + +USB and Bluetooth support for: + +- Keyboard +- Mouse +- Headphones +- Camera + +## Software + +The Windows 365 Link comes pre-installed with the Windows CPC operating system. + +Operating system updates occur automatically during off hours. To get these updates, make sure the device is plugged in and powered on (in standby or sleep mode). + +## Wireless support + +- Wi-Fi 6E +- Bluetooth 5.3 + +## Compute and connectivity + +| Component | Details | +| --- | --- | +| Memory | 8 GB LPDDRS | +| Storage | 64 GB UFS | +| Wi-Fi | WiFi 6E | +| Bluetooth | 5.3 | +| USB | USB-C, 2 USB-A | + + +## Next steps + +[First time set up for your Windows 365 Link](setup.md): After unboxing, your Windows 365 Link is brand-new and no users are logged into the device. The device must go through first-time setup, also known as the Out-of-Box Experience (OOBE). Through this setup process, the device is automatically joined to Microsoft Entra and enrolled in Microsoft Intune. diff --git a/windows-365/overview.md b/windows-365/overview.md index 2f6fe3036ad..97b4266abd5 100644 --- a/windows-365/overview.md +++ b/windows-365/overview.md @@ -42,6 +42,10 @@ Windows 365 is available in multiple editions: To learn about the differences between the Business and Enterprise versions, see [Compare Windows 365 Business and Enterprise](business-enterprise-comparison.md). +## Windows 365 Link + +Available now in preview in select markets, Microsoft also offers Windows 365 Link, the first Cloud PC device purpose-built to connect users directly to Windows 365. For more information, see [What is Windows 365 Link?](./link/overview.md). + [!INCLUDE [What is a Cloud PC?](./includes/what-is-cloud-pc.md)] ## Licensing and how to buy