Skip to content

Commit 0033420

Browse files
committed
Merge branch 'main' into release-cm2203-cb
2 parents a54675d + b1e0ecc commit 0033420

36 files changed

Lines changed: 460 additions & 77 deletions

.openpublishing.redirection.json

Lines changed: 11 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -924,15 +924,20 @@
924924
"redirect_document_id": false
925925
},
926926
{
927-
"source_path": "windows-365/end-user-access-cloud-pc.md",
928-
"redirect_url":"/windows-365/enterprise/end-user-access-cloud-pc",
927+
"source_path": "windows-365/enterprise/end-user-access-cloud-pc.md",
928+
"redirect_url":"windows-365/end-user-access-cloud-pc",
929929
"redirect_document_id": false
930930
},
931931
{
932-
"source_path": "windows-365/end-user-hardware-requirements.md",
933-
"redirect_url":"/windows-365/enterprise/end-user-hardware-requirements",
932+
"source_path": "windows-365/enterprise/end-user-hardware-requirements.md",
933+
"redirect_url":"windows-365/end-user-hardware-requirements",
934934
"redirect_document_id": false
935-
},
935+
},
936+
{
937+
"source_path": "windows-365/business/get-users-started.md",
938+
"redirect_url":"/windows-365/get-users-started",
939+
"redirect_document_id": false
940+
},
936941
{
937942
"source_path": "windows-365/get-cloud-pc-audit-logs-using-powershell.md",
938943
"redirect_url":"/windows-365/enterprise/get-cloud-pc-audit-logs-using-powershell",
@@ -1094,4 +1099,4 @@
10941099
"redirect_document_id": true
10951100
}
10961101
]
1097-
}
1102+
}
18.8 KB
Loading
226 KB
Loading
31.2 KB
Loading
Lines changed: 94 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,94 @@
1+
---
2+
# required metadata
3+
4+
title: Premium add-ons for Microsoft Intune
5+
titleSuffix: Microsoft Intune
6+
description: When you purchase licenses for Premium add-ons for Microsoft Intune, you expand the capabilities for device management with Microsoft Endpoint Manager.
7+
keywords:
8+
author: smbhardwaj
9+
ms.author: smbhardwaj
10+
manager: dougeby
11+
ms.date: 04/05/2022
12+
ms.topic: conceptual
13+
ms.service: microsoft-intune
14+
ms.subservice: fundamentals
15+
ms.localizationpriority: high
16+
17+
# optional metadata
18+
19+
#ROBOTS:
20+
#audience:
21+
22+
ms.reviewer: aanavath
23+
ms.suite: ems
24+
search.appverid: MET150
25+
#ms.tgt_pltfrm:
26+
ms.custom: intune-azure
27+
ms.collection:
28+
- M365-identity-device-management
29+
- highpri
30+
---
31+
32+
# Use Premium add-ons capabilities with Intune
33+
34+
Microsoft Endpoint Manager now offers Premium add-ons. You can find premium add-ons in Intune under **Tenant administration** > **Premium add-ons**. The **Summary** blade shows all premium add-ons that have been released, a short description, and the status of the add-on. You can view the status of each add-on as either **Active** or **Available for trial or purchase**.
35+
36+
Licenses for the Premium add-ons can be added for an additional cost to the licensing options that include Microsoft Endpoint Manager or Intune.
37+
38+
Global and Billing administrators can use the **Premium add-ons** page from the [Microsoft 365 admin center](https://admin.microsoft.com) to start a free trial or purchase licenses for each Premium add-on.
39+
40+
> [!NOTE]
41+
Premium add-ons are currently not supported in Sovereign clouds.
42+
43+
## What add-ons capabilities are available
44+
45+
The following Premium add-ons are available:
46+
47+
- [Remote help](..\remote-actions\remote-help.md)
48+
49+
## What happens when you try/buy the Premium add-ons capability
50+
51+
Global and Billing administrators can choose to start free trials or purchase licenses for Premium add-ons through the [Microsoft 365 admin center](https://admin.microsoft.com).
52+
53+
Starting a free trial gives you a 90-day period to use the Premium add-on capability without any charge. Trials can be up to 250 users per tenant. At the end of the trial period, there's a 30-day grace period. After this point, you'll be unable to use the Premium add-on capability in Endpoint Manager for users within your tenant unless you've purchased the appropriate licenses. There's a one-time limit to start a trial for each tenant.
54+
55+
Purchasing licenses lets you use the Premium add-on capability in your tenant for the duration in which the licenses are active on your tenant based on the option selected during the Billing process.
56+
57+
## How to try or buy the premium add-ons capability
58+
59+
Premium add-on capabilities are disabled in [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431) unless you are in the free trial period or have purchased licenses. Global and Billing administrators can choose to start a free trial or purchase licenses for Premium add-ons through the [Microsoft 365 admin center](https://admin.microsoft.com).
60+
61+
Administrators who aren't Global or Billing administrators can still see the status of their tenant's Premium add-ons trial or active licenses in the centralized Premium add-on page in Endpoint Manager (but can't start a free trial or purchase licenses).
62+
63+
### How to start a trial through the Microsoft 365 admin center
64+
65+
1. Navigate to **Tenant administration** > **Premium add-ons** as a Global or Billing administrator.
66+
2. Find the Premium add-on to start a trial. For add-ons that say **Available for trial or purchase** in their status, you don't have a free trial started or any licenses purchased for those add-ons.
67+
3. Click **View details** and see the details. :::image type="content" source="./media/premium-add-ons/remote-help-details.png" alt-text="Remote help details.":::
68+
4. Click the **To try or buy, go to Purchase services** link to navigate to the Microsoft 365 Admin Center. A new tab opens on the **Product details** page for the relevant Premium add-on. :::image type="content" source="./media/premium-add-ons/remote-help-product-details.png" alt-text="Remote help product details.":::
69+
5. In the Microsoft 365 Admin Center, follow the prompts to **Start free trial** and confirm your order. :::image type="content" source="./media/premium-add-ons/confirm-order.png" alt-text="Confirm order.":::
70+
6. Navigate to **Tenant administration** > **Premium add-ons** and see that the Premium add-on capability you added is now **Active**.
71+
72+
### How to purchase premium add-ons
73+
74+
Licenses for Premium add-ons can be purchased just as you would purchase Intune licenses through the following ways:
75+
76+
- web direct purchase in the Microsoft 365 Admin Center
77+
- Microsoft Volume License Servicing Center (VLSC)
78+
- existing relationships with Microsoft partners/resellers
79+
80+
After you buy licenses via any source, the licenses are available in your Tenant and the status of the Premium add-ons capability will update accordingly.
81+
82+
## How to assign licenses
83+
84+
For information on how to assign licenses in Microsoft Endpoint Manager admin center, see [Assign Microsoft Intune licenses](licenses-assign.md)
85+
86+
## Monitor license use
87+
88+
Each of the Premium add-ons might have their own requirements for how many licenses need to be purchased.
89+
90+
- [Remote help](..\remote-actions\remote-help.md)
91+
92+
## Next steps
93+
94+
Learn about [Remote help](..\remote-actions\remote-help.md).

memdocs/intune/fundamentals/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -214,6 +214,8 @@ items:
214214
href: filters-reports-troubleshoot.md
215215
- name: Use policy sets
216216
href: ../fundamentals/policy-sets.md
217+
- name: Premium add-ons
218+
href: premium-add-ons.md
217219
- name: Developer guidance
218220
href: ../developer/index.yml
219221
- name: Get help and support

memdocs/intune/fundamentals/whats-new.md

Lines changed: 13 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ keywords:
77
author: Erikre
88
ms.author: erikre
99
manager: dougeby
10-
ms.date: 03/25/2022
10+
ms.date: 04/05/2022
1111
ms.topic: conceptual
1212
ms.service: microsoft-intune
1313
ms.subservice: fundamentals
@@ -60,6 +60,18 @@ You can use RSS to be notified when this page is updated. For more information,
6060
### Scripts
6161
-->
6262

63+
## Week of April 4, 2022
64+
65+
### Device management
66+
67+
#### Microsoft Endpoint Manager premium add-ons<!-- 12953253 -->
68+
69+
Microsoft Endpoint Manager is introducing a new centralized experience to help IT admins identify premium add-on capabilities. These capabilities can be added for an additional licensing cost available for Microsoft Endpoint Manager using Intune. The first premium add-on is Remote Help.
70+
71+
You can find premium add-ons in Intune under **Tenant administration** > **Premium add-ons**. The **Summary** blade shows all premium add-ons that have been released, a short description, and the status of the add-on. You can view the status of each add-on as either **Active** or **Available for trial or purchase**. The premium add-ons capability can be used by Global and Billing administrators to start trials or purchase licenses for premium add-ons.
72+
73+
For more information about Premium add-ons, see [Use Premium add-ons capabilities with Intune](../fundamentals/premium-add-ons.md).
74+
6375
## Week of March 28, 2022
6476

6577
### App management

memdocs/intune/protect/app-based-conditional-access-intune.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -67,7 +67,7 @@ In this example, the admin has applied app protection policies to the Outlook ap
6767

6868
1. The user tries to authenticate to Azure AD from the Outlook app.
6969

70-
2. The user gets redirected to the app store to install a broker app when trying to authenticate for the first time. The broker app can be either the Microsoft Authenticator for iOS, or the Microsoft Company portal for Android devices.
70+
2. The user gets redirected to the app store to install a broker app when trying to authenticate for the first time. The broker app can be the Microsoft Authenticator for iOS, or either the Microsoft Authenticator or Microsoft Company portal for Android devices.
7171

7272
If users try to use a native e-mail app, they'll be redirected to the app store to then install the Outlook app.
7373

memdocs/intune/protect/conditional-access-integrate-jamf.md

Lines changed: 19 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -49,6 +49,7 @@ You need the following to configure Conditional Access with Jamf Pro:
4949

5050
- Jamf Pro 10.1.0 or later
5151
- Microsoft Intune and Microsoft AAD Premium P1 licenses (recommended Microsoft Enterprise Mobility + Security license bundle)
52+
- Global admin role in Azure Active Directory.
5253
- A user with Microsoft Intune Integration privileges in Jamf Pro
5354
- [Company Portal app for macOS](https://aka.ms/macoscompanyportal)
5455
- macOS devices with OS X 10.12 Yosemite or later
@@ -107,12 +108,19 @@ To connect Intune with Jamf Pro:
107108
8. Next, we will add permissions to update device attributes. At the top left of the **API permissions** page, select **Add a permission** to add a new permission.
108109

109110
9. On the **Request API permissions** page, select **Intune**, and then select **Application permissions**. Select only the check box for **update_device_attributes** and save the new permission.
111+
10. Under **Microsoft Graph**, select **Application permissions**, then select **Application.Read.All**.
110112

111-
10. Next, grant admin consent for this app by selecting **Grant admin consent for _\<your tenant>_** in the top left of the **API permissions** page. You may need to re-authenticate your account in the new window and grant the application access by following the prompts.
113+
11. Select **Add permissions**.
112114

113-
11. Refresh the page by click on the **Refresh** button at the top of the page. Confirm that admin consent has been granted for the **update_device_attributes** permission.
115+
12. Navigate to **APIs my organization uses**. Search for and select **Windows Azure Active Directory**. Select **Application permissions**, and then select **Application.Read.All**.
114116

115-
12. After the app is registered successfully, the API permissions should only contain one permission called **update_device_attributes** and should appear as follows:
117+
13. Select **Add permissions**.
118+
119+
14. Next, grant admin consent for this app by selecting **Grant admin consent for _\<your tenant>_** in the top left of the **API permissions** page. You may need to re-authenticate your account in the new window and grant the application access by following the prompts.
120+
121+
15. Refresh the page by selecting **Refresh** at the top of the page. Confirm that admin consent has been granted for the **update_device_attributes** permission.
122+
123+
16. After the app is registered successfully, the API permissions should only contain one permission called **update_device_attributes** and should appear as follows:
116124

117125
![Successful permissions](./media/conditional-access-integrate-jamf/sucessfull-app-registration.png)
118126

@@ -135,10 +143,14 @@ The app registration process in Azure AD is complete.
135143

136144
1. Activate the connection in the Jamf Pro console:
137145

138-
1. Open the Jamf Pro console and navigate to **Global Management** > **Conditional Access**. Click the **Edit** button on the **macOS Intune Integration** tab.
139-
2. Select the check box for **Enable Intune Integration for macOS**.
140-
3. Provide the required information about your Azure tenant, including **Location**, **Domain name**, the **Application ID**, and the value for the *client secret* that you saved when you created the app in Azure AD.
141-
4. Select **Save**. Jamf Pro tests your settings and verifies your success.
146+
1. Open the Jamf Pro console and navigate to **Global Management** > **Conditional Access**. Select **Edit** on the **macOS Intune Integration** tab.
147+
2. Select the check box for **Enable Intune Integration for macOS**. When this setting is enabled, Jamf Pro sends inventory updates to Microsoft Intune. Clear the selection if you want to disable the connection but save your configuration.
148+
3. Select **Manual** under **Connection type**.
149+
4. From the **Sovereign Cloud** pop-up menu, select the location of your Sovereign Cloud from Microsoft.
150+
5. Select **Open administrator consent URL** and follow the onscreen instructions to allow the Jamf Native macOS Connector app to be added to your Azure AD tenant.
151+
6. Add the **Azure AD Tenant Name** from Microsoft Azure.
152+
7. Add the **Application ID** and **Client Secret** (previously called Application Key) for the Jamf Pro application from Microsoft Azure.
153+
8. Select **Save**. Jamf Pro tests your settings and verifies your success.
142154

143155
Return to the **Partner device management** page in Intune to complete the configuration.
144156

memdocs/intune/protect/mde-security-integration.md

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ keywords:
77
author: brenduns
88
ms.author: brenduns
99
manager: dougeby
10-
ms.date: 01/12/2022
10+
ms.date: 04/05/2022
1111
ms.topic: how-to
1212
ms.service: microsoft-intune
1313
ms.subservice: protect
@@ -46,7 +46,7 @@ This scenario extends the Microsoft Endpoint Manager Endpoint Security surface t
4646

4747
## Monitor status
4848

49-
Status and reports for MDE policies are available from the policy node under Endpoint security in the Microsoft Endpoint Manager admin center.
49+
Status and reports for policies targeted at devices in this channel are available from the policy node under Endpoint security in the Microsoft Endpoint Manager admin center.
5050

5151
Drill in to the policy type, Antivirus or Firewall, and then select the policy to view its status. Policies for MDE have a *Policy type* of either *Microsoft Defender Antivirus (Preview)* or *Microsoft Defender Firewall (Preview)*.
5252

@@ -58,6 +58,10 @@ When you select a policy, you'll see information about the device check-in statu
5858

5959
## Known limitations and considerations
6060

61+
### Assignment Filters and Security Management for Microsoft Defender for Endpoint
62+
63+
Assignment filters are not supported for devices communicating through the Microsoft Defender for Endpoint channel. While assignment filters can be added to a policy that could be targeted at these devices, the device will ignore assignment filters. For assignment filter support, the device must be enrolled in to Microsoft Endpoint Manager.
64+
6165
### Co-existence with Microsoft Endpoint Configuration Manager
6266

6367
When using Configuration Manager, the best path for management of security policy is using the [Configuration Manager tenant attach](../../configmgr/tenant-attach/endpoint-security-get-started.md). In some environments it may be desired to use Security Management for Microsoft Defender for Endpoint. When using Security Management for Microsoft Defender for Endpoint with Configuration Manager, endpoint security policy should be isolated to a single control plane. Controlling policy through both channels will create the opportunity for conflicts and undesired results.
@@ -76,7 +80,7 @@ The following security settings are pending deprecation. The Security Management
7680
- AllowOnAccessProtection (under **Antivirus**)
7781
- AllowIntrusionPreventionSystem (under **Antivirus**)
7882

79-
### Managing Security Configurations on domain controllers
83+
### Managing security configurations on domain controllers
8084

8185
Currently, devices are not supported to complete a Hybrid Join to Azure Active Directory. Since an Azure Active Directory trust is required, domain controllers aren't currently supported. We are looking at ways to add support in the future.
8286

0 commit comments

Comments
 (0)