You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: memdocs/intune/configuration/device-restrictions-windows-10.md
+6-4Lines changed: 6 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ keywords:
7
7
author: MandiOhlinger
8
8
ms.author: mandia
9
9
manager: dougeby
10
-
ms.date: 06/04/2021
10
+
ms.date: 07/19/2021
11
11
ms.topic: reference
12
12
ms.service: microsoft-intune
13
13
ms.subservice: configuration
@@ -1120,11 +1120,13 @@ These settings use the [defender policy CSP](/windows/client-management/mdm/poli
1120
1120
-**Detect potentially unwanted applications**: This feature identifies and blocks potentially unwanted applications (PUA) from downloading and installing in your network. These applications aren't considered viruses, malware, or other types of threats. But, they can run actions on endpoints that might affect their performance or use. Choose the level of protection when Windows detects PUAs. Your options:
1121
1121
1122
1122
-**Not configured** (default): Intune doesn't change or update this setting. By default, Microsoft Defender might disable this feature.
1123
-
-**Off**: PUA Protection off.
1123
+
-**Off** or **Disabled**: PUA Protection off.
1124
1124
-**Enable**: Microsoft Defender detects PUAs, and detected items are blocked. These items show in history along with other threats.
1125
1125
-**Audit**: Microsoft Defender detects PUAs, but takes no action. You can review information about the applications Microsoft Defender would take action against. For example, search for events created by Microsoft Defender in the Event Viewer.
1126
1126
1127
-
For more information about potentially unwanted apps, see [Detect and block potentially unwanted applications](/windows/security/threat-protection/microsoft-defender-antivirus/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus).
1127
+
In **Endpoint Security** > **Antivirus** > **Microsoft Defender Antivirus** > **Remediation**, this setting is called **Action to take on potentially unwanted applications**.
1128
+
1129
+
For more information about potentially unwanted apps, see [Detect and block potentially unwanted applications](/windows/security/threat-protection/microsoft-defender-antivirus/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus).
@@ -1264,4 +1266,4 @@ These settings use the [power policy CSP](/windows/client-management/mdm/policy-
1264
1266
1265
1267
For additional technical details on each setting and what editions of Windows are supported, see [Windows 10 Policy CSP Reference](/windows/client-management/mdm/policy-configuration-service-provider)
1266
1268
1267
-
[Assign the profile](device-profile-assign.md), and [monitor its status](device-profile-monitor.md).
1269
+
[Assign the profile](device-profile-assign.md), and [monitor its status](device-profile-monitor.md).
Copy file name to clipboardExpand all lines: memdocs/intune/fundamentals/common-scenarios.md
+7-9Lines changed: 7 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -36,10 +36,8 @@ The needs around enterprise mobility are dynamically evolving, and Microsoft's a
36
36
37
37
Following are short introductions to the six most common scenarios that rely on Intune, accompanied with links to more information about how to plan and deploy each of them.
38
38
39
-
>[!NOTE]
40
-
>
39
+
> [!NOTE]
41
40
> - Want to know how Microsoft IT uses Intune to give corporate access on mobile devices, while also keeping corporate data protected? Check out the [IT Showcase Library](https://www.microsoft.com/itshowcase), and search for "Intune".
42
-
>
43
41
> - The [Microsoft Security and Compliance blogs](https://techcommunity.microsoft.com/t5/microsoft-security-and/bg-p/MicrosoftSecurityandCompliance) are a great resource. You can filter on areas that interest you, including Enterprise Mobility + Security, data loss prevention, identity & access management, and more.
44
42
45
43
## Protecting your on-premises email and data so it can be safely accessed by mobile devices
@@ -62,29 +60,29 @@ Intune and Microsoft Enterprise Mobility + Security provide a uniquely integrate
62
60
63
61
The Office mobile apps in their respective app stores are ready to go with data containment policies that you can configure via Intune. This enables you to prevent data from being shared with apps (for example, with native email apps) and storage locations (for example, Dropbox) that aren't managed by IT. All this functionality is built into Microsoft 365 and EMS. You don't have to deploy additional infrastructure to get this value.
64
62
65
-
A common Microsoft 365 deployment practice is to require devices to enroll into management if they need to be fully set up with corporate apps, certs, Wi-Fi, or VPN configurations, a common scenario for corporate-owned devices.
63
+
A common Microsoft 365 deployment practice is to require devices to enroll into management if they need to be fully set up with corporate apps, certs, Wi-Fi, or VPN configurations, a common scenario for corporate-owned devices.
66
64
67
-
However, if your user simply needs to access corporate email and documents, which is often the case for personally owned devices, then you can require the user to use the Office mobile apps (to which you have applied [app protection policies](../apps/app-protection-policies.md) and skip enrolling the device altogether.
65
+
However, if your user simply needs to access corporate email and documents, which is often the case for personally owned devices, then you can require the user to use the Office mobile apps (to which you have applied [app protection policies](../apps/app-protection-policies.md)) and skip enrolling the device altogether.
68
66
69
67
Either way, the Microsoft 365 data will be secured by policies you've defined.
70
68
71
69
<!-- Learn more about how to plan and deploy Intune to help secure Microsoft 365 email and data. -->
72
70
73
71
## Offer a bring your own device program to all employees
74
72
75
-
Bring your own device (BYOD) continues to grow in popularity among organizations as a means to reduce hardware expenditures or increase mobile productivity choices for employees. Just about everyone has a personal phone these days so why put another one in their pocket? The main challenge has always been to convince employees to enroll their personal device into management, as they are fearful of what their IT department will be able to see and do with their device.
73
+
Bring your own device (BYOD) continues to grow in popularity among organizations as a means to reduce hardware expenditures or increase mobile productivity choices for employees. Just about everyone has a personal phone these days so why put another one in their pocket? The main challenge has always been to convince employees to enroll their personal device into management, as they are fearful of what their IT department will be able to see and do with their device.
76
74
77
-
When device enrollment is not a viable option, Intune offers an alternative BYOD approach of simply [managing the apps that contain corporate data](../apps/app-protection-policies.md). Intune protects the corporate data even if the app in question accesses both corporate and personal data, as is the case for Office mobile apps.
75
+
When device enrollment is not a viable option, Intune offers an alternative BYOD approach of simply [managing the apps that contain corporate data](../apps/app-protection-policies.md). Intune protects the corporate data even if the app in question accesses both corporate and personal data, as is the case for Office mobile apps.
78
76
79
77
As an administrator, you can require users to access Microsoft 365 from the Office mobile apps and configure the apps with policies that keep the data protected (such as encrypting it, protecting it with a pin, and so on). These app protection policies prevent data loss from unmanaged apps and storage locations -- inside or outside of those apps. For example, the policies prevent a user from copying text from a corporate email profile into a consumer email profile even if both profiles are configured within Outlook Mobile. Similar configurations can be deployed for other services and applications that are required by your BYOD users.
80
78
81
79
<!-- Learn more about how to plan and deploy Intune to support BYOD.-->
82
80
83
81
## Issue corporate-owned phones to your employees
84
82
85
-
Many employees are mobile these days, making productivity on mobile devices an imperative to be competitive. These employees need seamless access to all corporate apps and data, at any time, wherever they are. You need to ensure that corporate data is secure and administrative costs are low.
83
+
Many employees are mobile these days, making productivity on mobile devices an imperative to be competitive. These employees need seamless access to all corporate apps and data, at any time, wherever they are. You need to ensure that corporate data is secure and administrative costs are low.
86
84
87
-
Intune offers [bulk provisioning and management solutions](../enrollment/device-enrollment.md) that are integrated with the major corporate device management platforms on the market today, including the Apple Device Enrollment Program and the Samsung Knox mobile security platform. Centralized authoring of device configurations with Intune helps make provisioning of corporate devices something that can be highly automated.
85
+
Intune offers [bulk provisioning and management solutions](../enrollment/device-enrollment.md) that are integrated with the major corporate device management platforms on the market today, including the Apple Device Enrollment Program and the Samsung Knox mobile security platform. Centralized authoring of device configurations with Intune helps make provisioning of corporate devices something that can be highly automated.
88
86
89
87
Picture this: hand an employee an unopened iPhone box. The employee powers it on and is walked through a corporate-branded setup flow where they must authenticate themselves. The iPhone is seamlessly configured with [security policies](../configuration/device-profiles.md).
Copy file name to clipboardExpand all lines: memdocs/intune/fundamentals/filters.md
+11-2Lines changed: 11 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ keywords:
7
7
author: MandiOhlinger
8
8
ms.author: mandia
9
9
manager: dougeby
10
-
ms.date: 05/10/2021
10
+
ms.date: 07/19/2021
11
11
ms.topic: conceptual
12
12
ms.service: microsoft-intune
13
13
ms.subservice: fundamentals
@@ -163,7 +163,16 @@ After the filter is created, it's ready to use when assigning your apps or polic
163
163
:::image type="content" source="./media/filters/edit-compliance-policy-assignment.png" alt-text="Select a policy or profile, and edit the assignment in Microsoft Endpoint Manager and Microsoft Intune.":::
164
164
165
165
3. Assign your policy to a users group or a devices group.
166
-
4. Select **Edit filter**. You can choose to **include filtered devices** or **exclude filtered devices**. A list of filters that match the policy platform is shown.
166
+
4. Select **Edit filter**. Your options:
167
+
168
+
-**Do not apply a filter**: All targeted users or devices recieve the app or policy without filtering.
169
+
-**Include filtered devices in assignment**: Devices that match the filter conditions recieve the app or policy. Devices that don't match the filter conditions don't receive the app or policy.
170
+
171
+
A list of filters that match the policy platform is shown.
172
+
173
+
-**Exclude filtered devices in assignment**: Devices that match the filter conditions don't recieve the app or policy. Devices that don't match the filter conditions receive the app or policy.
174
+
175
+
A list of filters that match the policy platform is shown.
Copy file name to clipboardExpand all lines: memdocs/intune/protect/windows-10-expedite-updates.md
+6-2Lines changed: 6 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ keywords:
7
7
author: brenduns
8
8
ms.author: brenduns
9
9
manager: dougeby
10
-
ms.date: 07/12/2021
10
+
ms.date: 07/19/2021
11
11
ms.topic: how-to
12
12
ms.service: microsoft-intune
13
13
ms.subservice: protect
@@ -54,7 +54,7 @@ The actual time that a device starts to update depends on the device being onlin
54
54
> [!IMPORTANT]
55
55
> In some scenarios, Windows Update can install an update that is more recent than the update you specify in expedite update policy. For more information about this scenario, see [About installing the latest applicable update](#identify-the-latest-applicable-update), later in this article.
56
56
57
-
- Expedite update policies ignore and override any quality [update deferral periods](/windows/client-management/mdm/policy-csp-update#update-deferqualityupdatesperiodindays) for the update version you deploy. You can configure quality updates deferrals by using Intune [Widows 10 update rings](../protect/windows-10-update-rings.md) and the setting for **Quality update deferral period**.
57
+
- Expedite update policies ignore and override any quality [update deferral periods](/windows/client-management/mdm/policy-csp-update#update-deferqualityupdatesperiodindays) for the update version you deploy. You can configure quality updates deferrals by using Intune [Windows 10 update rings](../protect/windows-10-update-rings.md) and the setting for **Quality update deferral period**.
58
58
59
59
- When a restart is required to complete installation of the update, the policy helps to manage the restart. In the policy, you can configure a period that users have to restart a device before the policy forces an automatic restart. Users can also choose to schedule the restart or let the device try to find the best time outside of the devices *Active Hours*. Before reaching the restart deadline, the device displays notifications to alert device users about the deadline and includes options to schedule the restart.
60
60
@@ -142,6 +142,10 @@ Group Policy settings override mobile device management policies, and the follow
142
142
-**DeferFeatureUpdates** - Select when Preview Builds and Feature Updates are received.
143
143
-**Disable Dual Scan** - Don't allow update deferral policies to cause scans against Windows Update.
144
144
145
+
**Enable Windows Health Monitoring**:
146
+
147
+
Before you can monitor results and update status for expedited updates, your Intune tenant must enable [Windows Health Monitoring](../configuration/windows-health-monitoring.md). While configuring Windows Health Monitoring, be sure to set the **Scope** to **Windows updates**.
148
+
145
149
## Create and assign an expedited quality update
146
150
147
151
1. Sign in to the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431).
0 commit comments