Skip to content

Commit 03d7588

Browse files
committed
Merge branch 'release-intune-2206' of https://github.com/MicrosoftDocs/memdocs-pr into in2205-model-14439211
2 parents e75ab5b + a416d6b commit 03d7588

7 files changed

Lines changed: 67 additions & 29 deletions

memdocs/intune/apps/apps-add-android-for-work.md

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ keywords:
88
author: Erikre
99
ms.author: erikre
1010
manager: dougeby
11-
ms.date: 05/05/2022
11+
ms.date: 06/08/2022
1212
ms.topic: how-to
1313
ms.service: microsoft-intune
1414
ms.subservice: apps
@@ -21,7 +21,7 @@ ms.assetid: 2f6c06bf-e29a-4715-937b-1d2c7cf663d4
2121
#ROBOTS:
2222
#audience:
2323

24-
ms.reviewer: chrisbal
24+
ms.reviewer: ilwu
2525
ms.suite: ems
2626
search.appverid: MET150
2727
#ms.tgt_pltfrm:
@@ -268,7 +268,7 @@ For Managed Google Play apps deployed to Android Enterprise personally-owned wor
268268

269269
## Working with Managed Google Play closed testing tracks
270270

271-
You can distribute a non-production version of a Managed Google Play app to devices enrolled in an Android Enterprise scenario (**Android Enterprise personally-owned work profile (BYOD)**, **Android Enterprise fully managed (COBO)**, **Android Enterprise dedicated devices (COSU)**, and **Android Enterprise corporate-owned work profile (COPE)**) in order to perform testing. In Intune, you can see whether an app has a pre-production build test track published to it, as well as be able to assign that track to Azure Active Directory user groups or device groups. The workflow for assigning a production version to a group that currently exists is the same as assigning a non-production channel. After deployment, the install status of each track will correspond with the track's version number in Managed Google Play. For more information, see [Google Play's closed test tracks for app pre-release testing](https://support.google.com/googleplay/android-developer/answer/3131213).
271+
You can distribute a non-production version of a Managed Google Play app to devices enrolled in an Android Enterprise scenario (**Android Enterprise personally-owned work profile (BYOD)**, **Android Enterprise fully managed (COBO)**, **Android Enterprise dedicated devices enrolled with Azure AD shared mode (aka COSU)**, and **Android Enterprise corporate-owned work profile (COPE)**) in order to perform testing. In Intune, you can see whether an app has a pre-production build test track published to it, as well as be able to assign that track to Azure Active Directory user groups or device groups. The workflow for assigning a production version to a group that currently exists is the same as assigning a non-production channel. After deployment, the install status of each track will correspond with the track's version number in Managed Google Play. For more information, see [Google Play's closed test tracks for app pre-release testing](https://support.google.com/googleplay/android-developer/answer/3131213).
272272

273273
> [!NOTE]
274274
> Required app deployments for non-production app tracks are currently unavilable for devices enrolled in Android Enterprise personally-owned work profile (BYOD).
@@ -285,6 +285,10 @@ When necessary, you can delete Managed Google Play apps from Microsoft Intune. T
285285

286286
You can enable an Android Enterprise system app for [Android Enterprise dedicated devices](../enrollment/android-kiosk-enroll.md) or [fully managed devices](../enrollment/android-fully-managed-enroll.md). For more information about adding an Android Enterprise system app, see [Add Android Enterprise system apps to Microsoft Intune](apps-ae-system.md).
287287

288+
## MAM policies with AE dedicated devices enrolled with Azure AD shared mode
289+
290+
Intune-managed Android Enterprise dedicated devices enrolled with Azure AD shared mode can receive MAM policies and can be targeted separately from other Android enterprise devices. ntune-managed Android Enterprise dedicated devices that are not in Shared Device Mode will continue to be blocked from getting MAM. For more information about Intune-managed Android Enterprise dedicated devices enrolled with Azure AD shared mode, see [Android Enterprise dedicated devices](../fundamentals/deployment-guide-enrollment-android.md#android-enterprise-dedicated-devices).
291+
288292
## Next steps
289293

290294
- [Assign apps to groups](apps-deploy.md)

memdocs/intune/apps/company-portal-app.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ keywords:
88
author: Erikre
99
ms.author: erikre
1010
manager: dougeby
11-
ms.date: 05/23/2022
11+
ms.date: 06/08/2022
1212
ms.topic: how-to
1313
ms.service: microsoft-intune
1414
ms.subservice: apps
@@ -21,7 +21,7 @@ ms.assetid: dec6f258-ee1b-4824-bf66-29053051a1ae
2121
#ROBOTS:
2222
#audience:
2323

24-
ms.reviewer: esthermsft
24+
ms.reviewer: abstarr
2525
ms.suite: ems
2626
search.appverid: MET150
2727
#ms.tgt_pltfrm:
@@ -300,7 +300,7 @@ For more information about notifications, see [Receive a custom notification](..
300300

301301
## Configure feedback settings for Company Portal and Microsoft Intune apps
302302

303-
There are a number of M365 enterprise policies which affect whether feedback must be enabled or disabled for currently logged users. These policies are available via the [Microsoft 365 Apps admin center](https://config.office.com/). In relation to Microsoft Intune, these policies affect feedback and surveys for the Intune Company Portal app and Microsoft Intune app.
303+
There are a number of M365 enterprise policies which affect whether feedback must be enabled or disabled for currently logged users. These policies are available via the [Microsoft 365 Apps admin center](https://config.office.com/). In relation to Microsoft Intune, these policies affect feedback and surveys for the Intune Company Portal app, the Web Company Portal, and Microsoft Intune app.
304304

305305
M365 feedback policies include the following policies:
306306

memdocs/intune/enrollment/android-aosp-corporate-owned-user-associated-enroll.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ keywords:
88
author: Lenewsad
99
ms.author: lanewsad
1010
manager: dougeby
11-
ms.date: 02/10/2022
11+
ms.date: 06/27/2022
1212
ms.topic: how-to
1313
ms.service: microsoft-intune
1414
ms.subservice: enrollment
@@ -81,7 +81,9 @@ Create an enrollment profile to enable enrollment on devices.
8181
4. Select **Next**. Review the details of your profile and then select **Create** to save the profile.
8282

8383
### Access enrollment token
84-
After you create a profile, Intune generates a token that's needed for enrollment. To access the token:
84+
After you create a profile, Intune generates a token that's needed for enrollment. The token appears as a QR code. During device setup, when prompted to, scan the QR code to enroll the device in Intune.
85+
86+
To access the token:
8587

8688
1. Go to **Corporate-owned, user-associated devices**.
8789
2. From the list, select your enrollment profile.
@@ -92,7 +94,7 @@ Another way to find the token is:
9294
2. Locate your profile in the list, and then select the **More** (**...**) menu that's next to it.
9395
3. Select **View enrollment token**.
9496

95-
The token appears as a QR code. During device setup, when prompted to, scan the QR code to enroll the device in Intune.
97+
For devices that can't scan QR codes, you can export the enrollment profile JSON file and QR code image.
9698

9799
> [!IMPORTANT]
98100
>- The QR code will contain any credentials provided in the profile in plain text to allow the device to successfully authenticate with the network. This is required as the user will not be able to join a network from the device.

memdocs/intune/enrollment/macos-enroll.md

Lines changed: 3 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ keywords:
88
author: Lenewsad
99
ms.author: lanewsad
1010
manager: dougeby
11-
ms.date: 03/29/2022
11+
ms.date: 06/27/2022
1212
ms.topic: overview
1313
ms.service: microsoft-intune
1414
ms.subservice: enrollment
@@ -66,13 +66,9 @@ Intune supports the following enrollment methods for company-owned macOS devices
6666
- [Device enrollment manager (DEM)](device-enrollment-manager-enroll.md): Use this method for large-scale deployments and when there are multiple people in your organization who can help with enrollment setup. Someone with device enrollment manager (DEM) permissions can enroll up to 1,000 devices with a single Azure Active Directory account. This method uses the Company Portal app or Microsoft Intune app to enroll devices. You can't use a DEM account to enroll devices via Automated Device Enrollment.
6767
- [Direct enrollment](device-enrollment-direct-enroll-macos.md): Direct enrollment enrolls devices with no user affinity, so this method is best for devices that aren't associated with a single user. This method requires you to have physical access to the Macs you're enrolling.
6868

69-
## Bootstrap tokens (preview)
70-
71-
> [!IMPORTANT]
72-
> This feature is in [public preview](../fundamentals/public-preview.md).
73-
74-
Intune supports the use of bootstrap tokens on enrolled Macs running macOS 10.15 or later. Bootstrap tokens grant volume ownership status to local user and guest accounts, so that non-admin users can approve important operations that an admin would otherwise need to do. Operations such as:
69+
## Bootstrap tokens
7570

71+
Intune supports the use of bootstrap tokens on enrolled Macs running macOS 10.15 or later. Bootstrap tokens grant volume ownership status to local user and guest accounts so that non-admin users can approve important operations that an admin would otherwise need to do. Operations such as:
7672

7773
* User-initiated software updates
7874

memdocs/intune/fundamentals/azure-virtual-desktop-multi-session.md

Lines changed: 18 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ ms.collection:
3333

3434
Azure Virtual Desktop multi-session with Microsoft Intune is now generally available.
3535

36-
You can now use Microsoft Intune to manage Windows 10 or Windows 11 Enterprise multi-session remote desktops in the Microsoft Endpoint Manager admin center just as you can manage a shared Windows 10 or Windows 11 client device. When managing such virtual machines (VMs), you must use device-based configurations. Such configurations require user-less enrollments.
36+
You can now use Microsoft Intune to manage Windows 10 or Windows 11 Enterprise multi-session remote desktops in the Microsoft Endpoint Manager admin center just as you can manage a shared Windows 10 or Windows 11 client device. When managing such virtual machines (VMs), you'll be able to use both device-based and user configuration.
3737

3838
Windows 10 or Windows 11 Enterprise multi-session is a new Remote Desktop Session Host exclusive to [Azure Virtual Desktop](/azure/virtual-desktop/) on Azure. It provides the following benefits:
3939

@@ -45,8 +45,18 @@ You can manage **Windows 10** and **Windows 11 Enterprise multi-session** VMs cr
4545

4646
## Overview
4747

48-
Microsoft Intune only supports managing Windows 10 or Windows 11 Enterprise multi-session with device configurations. This means only [policies defined in the OS scope](/windows/client-management/mdm/policy-configuration-service-provider) and apps configured to install in the system context can be applied to Azure Virtual Desktop multi-session VMs. Additionally, all multi-session configurations must be targeted to devices or device groups. User scope policies aren't supported at this time.
48+
Device configuration support in Microsoft Intune for Windows 10 or Windows 11 Enterprise multi-session is Generally Available (GA). This means [policies defined in the OS scope](/windows/client-management/mdm/policy-configuration-service-provider) and apps configured to install in the system context can be applied to Azure Virtual Desktop multi-session VMs. Additionally, multi-session configurations can be targeted to devices or device groups.
4949

50+
User configuration support in Microsoft Intune for Windows 11 multi-session VMs is in public preview. With this you'll be able to:
51+
52+
- Configure user scope policies using **Settings catalog** and assign to groups of users. You can use the search bar to search all configurations with scope set to "user".
53+
54+
- Configure user certificates and assign to users.
55+
56+
- Configure PowerShell scripts to install in the user context and assign to users.
57+
58+
> [!NOTE]
59+
> User configuration support for Windows 10 multi-session builds will be available later this year.
5060
5161
## Prerequisites
5262

@@ -70,7 +80,7 @@ See [What is Azure Virtual Desktop?](/azure/virtual-desktop/overview#requirement
7080

7181
Windows 10 or Windows 11 Enterprise multi-session VMs are treated as a separate OS edition and some Windows 10 or Windows 11 Enterprise configurations won’t be supported for this edition. Using Microsoft Intune doesn't depend on or interfere with Azure Virtual Desktop management of the same VM.
7282

73-
## Create the device configuration profile
83+
## Create the configuration profile
7484

7585
To configure configuration policies for Windows 10 or Windows 11 Enterprise multi-session VMs, you'll need to use the [Settings catalog](../configuration/settings-catalog.md) in the Microsoft Endpoint Manager admin center.
7686

@@ -95,7 +105,7 @@ Microsoft Intune won't deliver unsupported templates to multi-session devices, a
95105
- **Key**: **OS edition**
96106
- **Operator**: **==**
97107
- **Value**: **Enterprise multi-session**
98-
- Select **Apply**. The filtered list now shows all configuration profile categories that support Windows 10 or Windows 11 Enterprise multi-session. You can see the scope for the policy in parentheses (Device or User). Currently, only device settings are supported for multi-session.
108+
- Select **Apply**. The filtered list now shows all configuration profile categories that support Windows 10 or Windows 11 Enterprise multi-session. The scope for a policy is shown in parantheses. For user scope it shows as (User) and all the rest are policies with device scope.
99109
8. From the filtered list, pick the categories that you want.
100110
- For each category you pick, select the settings that you want to apply to your new configuration profile.
101111
- For each setting, select the value that you want for this configuration profile.
@@ -110,6 +120,7 @@ Windows 10 or Windows 11 Administrative Templates are supported for Windows 10 o
110120

111121
- ADMX-backed policies are supported. Some policies aren't yet available in the Settings catalog.
112122
- ADMX-ingested policies are supported, including Office and Microsoft Edge settings available in Office administrative template files and Microsoft Edge administrative template files. For a complete list of ADMX-ingested policy categories, see [Win32 and Desktop Bridge app policy configuration](/windows/client-management/mdm/win32-and-centennial-app-policy-configuration#overview). Some ADMX ingested settings won't be applicable to Windows 10 or Windows 11 Enterprise multi-session.
123+
- ADMX - ingested policies are not supported for user targetting at this time.
113124

114125
## Compliance and Conditional access
115126

@@ -163,7 +174,9 @@ All Windows 10 or Windows 11 apps can be deployed to Windows 10 or Windows 11 En
163174

164175
## Script deployment
165176

166-
Scripts configured to run in the system context are supported on Windows 10 or Windows 11 Enterprise multi-session. This can be configured under Script settings by setting **Run this script using the logged on credentials** to **No**.
177+
Scripts configured to run in the system context and assigned to devices are supported on Windows 10 or Windows 11 Enterprise multi-session. This can be configured under Script settings by setting **Run this script using the logged on credentials** to **No**.
178+
179+
Scripts configured to run in the user context and assigned to users are supported on Windows 11 Enterprise multi-session. This can be configured under Script settings by setting **Run this script using the logged on credentials** to **Yes**.
167180

168181
## Windows Update for Business
169182

memdocs/intune/protect/endpoint-security.md

Lines changed: 27 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ keywords:
77
author: brenduns
88
ms.author: brenduns
99
manager: dougeby
10-
ms.date: 11/16/2021
10+
ms.date: 06/21/2022
1111
ms.topic: overview
1212
ms.service: microsoft-intune
1313
ms.subservice: protect
@@ -82,7 +82,7 @@ To learn more about using Security tasks, see [Use Intune to remediate vulnerabi
8282

8383
## Use policies to manage device security
8484

85-
As a security admin, use the security policies that are found under *Manage* in the Endpoint security node. With these policies, you can configure device security without the overhead of navigating the larger body and range of settings from device configuration profiles and security baselines.
85+
As a security admin, use the security policies that are found under *Manage* in the Endpoint security node. With these policies, you can configure device security without having to navigate the larger body and range of settings in device configuration profiles or security baselines.
8686

8787
![Manage policies](./media/endpoint-security/endpoint-security-policies.png)
8888

@@ -151,12 +151,18 @@ You can view the following list of permissions in the Microsoft Endpoint Manager
151151

152152
**Permissions:**
153153

154+
- **Android FOTA**
155+
- Read
154156
- **Android for work**
155157
- Read
156158
- **Audit data**
157159
- Read
160+
- **Certificate Connector**
161+
- Read
158162
- **Corporate device identifiers**
159163
- Read
164+
- **Derived Credentials**
165+
- Read
160166
- **Device compliance policies**
161167
- Assign
162168
- Create
@@ -166,6 +172,7 @@ You can view the following list of permissions in the Microsoft Endpoint Manager
166172
- View reports
167173
- **Device configurations**
168174
- Read
175+
- View reports
169176
- **Device enrollment managers**
170177
- Read
171178
- **Endpoint protection reports**
@@ -174,6 +181,8 @@ You can view the following list of permissions in the Microsoft Endpoint Manager
174181
- Read device
175182
- Read profile
176183
- Read token
184+
- **Filters**
185+
- Read
177186
- **Intune data warehouse**
178187
- Read
179188
- **Managed apps**
@@ -183,23 +192,35 @@ You can view the following list of permissions in the Microsoft Endpoint Manager
183192
- Read
184193
- Set primary user
185194
- Update
195+
- View reports
196+
- **Microsoft Defender ATP**
197+
- Read
198+
- **Microsoft Store for Business**
199+
- Read
200+
- **Mobile Threat Defense**
201+
- Modify
202+
- Read
186203
- **Mobile apps**
187204
- Read
188205
- **Organization**
189206
- Read
207+
- **Partner Device Management**
208+
- Read
190209
- **PolicySets**
191210
- Read
192-
- **Remote assistance**
211+
- **Remote assistance connectors**
193212
- Read
213+
- View reports
194214
- **Remote tasks**
195215
- Get FileVault key
196216
- Initiate Configuration Manger action
197-
- Microsoft Defender
198217
- Reboot now
199218
- Remote lock
200219
- Rotate BitLockerKeys (Preview)
201220
- Rotate FileVault key
221+
- Shut down
202222
- Sync devices
223+
- Windows defender
203224
- **Roles**
204225
- Read
205226
- **Security baselines**
@@ -215,6 +236,8 @@ You can view the following list of permissions in the Microsoft Endpoint Manager
215236
- Read
216237
- **Terms and conditions**
217238
- Read
239+
- **Windows Enterprise Certificate**
240+
- Read
218241

219242
## Avoid policy conflicts
220243

0 commit comments

Comments
 (0)