You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: memdocs/intune/fundamentals/in-development.md
+1-4Lines changed: 1 addition & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -192,10 +192,7 @@ Filters allows you to include or exclude devices in policy or app assignments ba
192
192
New assignment filters in Enrollment Restrictions will let you include or exclude restrictions based on device type. For example, you can allow personal devices, while blocking Windows 10 Home devices, by applying the operatingSystemSKU assignment filter. These filters will be released for public preview with a new configuration experience for enrollment restrictions and supported for Windows and Apple devices, with Android support coming at a later date. For more information about how to use filters, see [Create a filter](../fundamentals/filters.md).
193
193
194
194
<!-- vvvvvvvvvvvvvvvvvvvvvv -->
195
-
## Monitor and troubleshoot
196
-
197
-
### Adding event viewer for Windows 10 diagnostics<!-- 10741116 -->
198
-
We're adding a new event viewer to Windows 10 device diagnostics called Microsoft-Windows-Windows Firewall with Advanced Security/Firewall. The event viewer will assist you in troubleshooting issues with the firewall.
195
+
## Monitor and troubleshoot
199
196
200
197
### Account protection policy changes in Endpoint security<!-- 7492116 -->
Copy file name to clipboardExpand all lines: memdocs/intune/fundamentals/whats-new.md
+10-2Lines changed: 10 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ keywords:
7
7
author: Erikre
8
8
ms.author: erikre
9
9
manager: dougeby
10
-
ms.date: 12/01/2021
10
+
ms.date: 12/07/2021
11
11
ms.topic: conceptual
12
12
ms.service: microsoft-intune
13
13
ms.subservice: fundamentals
@@ -60,7 +60,15 @@ You can use RSS to be notified when this page is updated. For more information,
60
60
### Scripts
61
61
-->
62
62
63
-
## Week of November 22, 2021
63
+
64
+
## Week of December 6, 2021
65
+
66
+
### Monitor and troubleshoot
67
+
68
+
#### New event viewer for Windows 10 diagnostics <!-- 10741116 -->
69
+
We've added a new event viewer to Windows device diagnostics called *Microsoft-Windows-Windows Firewall with Advanced Security/Firewall*. The event viewer can assist you in troubleshooting issues with the firewall. For more information about Windows device diagnostics, see [Collect diagnostics from a Windows device](../remote-actions/collect-diagnostics.md).
Copy file name to clipboardExpand all lines: memdocs/intune/protect/certificate-connector-install.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -101,7 +101,7 @@ Use the following procedure to both configure a new connector and modify a previ
101
101
-**SYSTEM**
102
102
-**Domain user account** – Use any domain user account that is an administrator on the Windows Server.
103
103
104
-
4. On the *Proxy* page, add details for your proxy server if you require a proxy for internet access. For example, *http://proxy.contoso.com*.
104
+
4. On the *Proxy* page, add details for your proxy server if you require a proxy for internet access. For example, `http://proxy.contoso.com`.
105
105
106
106
5. On the *Prerequisites* page, the wizard runs several checks on the server before the configuration can begin. Review and resolve any errors or warnings before you continue.
-[Citrix Endpoint Management - Integrate with Azure AD Conditional Access](https://docs.citrix.com/en-us/citrix-endpoint-management/prepare-to-enroll-devices-and-deliver-resources.html#integrate-with-azure-ad-conditional-access)
-[VMware Workspace ONE UEM](https://docs.vmware.com/en/VMware-Workspace-ONE-UEM/services/Directory_Service_Integration/GUID-800FB831-AA66-4094-8F5A-FA5899A3C70C.html)
Copy file name to clipboardExpand all lines: memdocs/intune/protect/windows-10-feature-updates.md
+12-2Lines changed: 12 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ keywords:
7
7
author: brenduns
8
8
ms.author: brenduns
9
9
manager: dougeby
10
-
ms.date: 10/04/2021
10
+
ms.date: 12/07/2021
11
11
ms.topic: how-to
12
12
ms.service: microsoft-intune
13
13
ms.subservice: protect
@@ -102,7 +102,17 @@ The following are prerequisites for Intune's Feature updates for Windows 10 and
102
102
103
103
- If you co-manage devices with Configuration Manager, feature updates policies might not immediately take effect on devices when you newly configure the [Windows Update policies workload](../../configmgr/comanage/workloads.md#windows-update-policies) to Intune. This delay is temporary but can initially result in devices updating to a later feature update version than is configured in the policy.
104
104
105
-
To prevent this initial delay from impacting your co-managed devices, configure a [Feature updates for Windows 10 and later](../protect/windows-10-feature-updates.md) policy and target the policy to your devices before you configure them for co-management or you shift the Windows Update workload to Intune. You can validate whether a device is enrolled for the feature update profile by checking the [Windows feature update report](../protect/windows-update-compliance-reports.md#use-the-windows-10-and-later-feature-updates-organizational-report) under the Reporting node in the Microsoft Endpoint Management admin console.
105
+
To prevent this initial delay from impacting your co-managed devices:
106
+
107
+
1. Sign in to the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431).
108
+
2. Go to **Devices** > **Windows** > **Feature updates for Windows 10 and later** > **Create profile**.
109
+
3. For **Deployment settings**, enter a meaningful name and a description for the policy. Then, Specify the feature update you want devices to be running.
110
+
4. Complete the policy configuration, including assigning the policy to devices. The policy deploys to devices, though any device that already has the version you’ve selected, or a newer version, won’t be offered the update.
111
+
112
+
Monitor the report for the policy. To do so, go to **Reports** > **Windows Updates** > **Reports** Tab > **Feature Updates report**. Select the policy you created and then generate the report.
113
+
114
+
5. Devices that have a state of *OfferReady* or later, are enrolled for feature updates and protected from updating to anything newer than the update you specified in step 3. See, [Use the Windows 10 and later feature updates (Organizational) report](../protect/windows-update-compliance-reports.md#use-the-windows-10-and-later-feature-updates-organizational-report).
115
+
6. With devices enrolled for updates and protected, you can safely change the *Windows Update policies* workload from Configuration Manager to Intune. See, [Switch workloads to Intune](/configmgr/comanage/how-to-switch-workloads) in the co-management documentation.
106
116
107
117
- When the device checks in to the Windows Update service, the device's group membership is validated against the security groups assigned to the feature updates policy settings for any feature update holds.
Copy file name to clipboardExpand all lines: memdocs/intune/remote-actions/remote-help.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ keywords:
7
7
author: brenduns
8
8
ms.author: brenduns
9
9
manager: dougeby
10
-
ms.date: 12/03/2021
10
+
ms.date: 12/07/2021
11
11
ms.topic: how-to
12
12
ms.service: microsoft-intune
13
13
ms.subservice: remote-actions
@@ -181,7 +181,7 @@ To configure your tenant to support remote help, review and complete the followi
181
181
182
182
2. On the **Settings** tab:
183
183
1. Set **Enable remote help** to **Enabled** to allow use of remote help. By default, this setting is *Enabled*.
184
-
2. Set **Allow remote help to unenrolled devices** to **Enabled** if you want to allow this option. By default, this setting *Not allowed*.
184
+
2. Set **Allow remote help to unenrolled devices** to **Enabled** if you want to allow this option. By default, this setting *Disabled*.
185
185
186
186
3. Select **Save**.
187
187
@@ -232,7 +232,7 @@ To request help, you must reach out to your support staff to request assistance.
232
232
233
233
As a sharer, when you’ve requested help and both you and the helper are ready to start:
234
234
235
-
1. Start the remote help app on the device and sign-in to authenticate to your organization. The device might not need to be enrolled to Intune if your administrator allows you to get help on unenrolled devices.
235
+
1. Start the remote help app on the device and signin to authenticate to your organization. The device might not need to be enrolled to Intune if your administrator allows you to get help on unenrolled devices.
236
236
237
237
2. After signing into the app, get the security code from the individual assisting you and enter that code below *Get Help*, and then select **Submit**.
0 commit comments