Skip to content

Commit 128d883

Browse files
authored
Merge pull request #7867 from MicrosoftDocs/main
Publish 06/22/2022, 10:30 AM
2 parents ef13ca5 + 8634a8f commit 128d883

4 files changed

Lines changed: 35 additions & 21 deletions

File tree

memdocs/autopilot/windows-autopilot-hybrid.md

Lines changed: 20 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ keywords:
88
author: ErikjeMS
99
ms.author: erikje
1010
manager: dougeby
11-
ms.date: 06/07/2021
11+
ms.date: 06/22/2021
1212
ms.topic: how-to
1313
ms.service: microsoft-intune
1414
ms.subservice: enrollment
@@ -113,12 +113,23 @@ The organizational unit that's granted the rights to create computers must match
113113

114114
## Install the Intune Connector
115115

116-
The Intune Connector for Active Directory must be installed on a computer that's running Windows Server 2016 or later. The computer must also have access to the internet and your Active Directory. To increase scale and availability, you can install multiple connectors in your environment. We recommend installing the Connector on a server that's not running any other Intune connectors. Each connector must be able to create computer objects in any domain that you want to support.
116+
### Before you begin
117117

118-
> [!NOTE]
119-
> If your organization has multiple domains and you install multiple Intune Connectors, you must use a service account that's able to create computer objects in all domains, even if you plan to implement hybrid Azure AD join only for a specific domain. If these are untrusted domains, you must uninstall the connectors from domains in which you don't want to use Windows Autopilot. Otherwise, with multiple connectors across multiple domains, all connectors must be able to create computer objects in all domains.
118+
- The Intune Connector for Active Directory must be installed on a computer that's running Windows Server 2016 or later.
119+
- The computer must have access to the internet and your Active Directory.
120+
- To increase scale and availability, you can install multiple connectors in your environment. We recommend installing the Connector on a server that's not running any other Intune connectors. Each connector must be able to create computer objects in any domain that you want to support.
121+
122+
- If your organization has multiple domains and you install multiple Intune Connectors, you must use a service account that can create computer objects in all domains, even if you plan to implement hybrid Azure AD join only for a specific domain. If these are untrusted domains, you must uninstall the connectors from domains in which you don't want to use Windows Autopilot. Otherwise, with multiple connectors across multiple domains, all connectors must be able to create computer objects in all domains.
123+
124+
This connector service account must have the following permissions:
125+
126+
- **[Log on as a service](/system-center/scsm/enable-service-log-on-sm)**
127+
- Must be part of the **Domain user** group
128+
- Must be a member of the local **Administrators** group on the Windows server that hosts the connector
129+
130+
- The Intune Connector requires the [same endpoints as Intune](../intune/fundamentals/intune-endpoints.md).
120131

121-
The Intune Connector requires the [same endpoints as Intune](../intune/fundamentals/intune-endpoints.md).
132+
### Install steps
122133

123134
1. Turn off IE Enhanced Security Configuration. By default Windows Server has Internet Explorer Enhanced Security Configuration turned on. If you're unable to sign in to the Intune Connector for Active Directory, then turn off IE Enhanced Security Configuration for the Administrator. [How To Turn Off Internet Explorer Enhanced Security Configuration](/archive/blogs/chenley/how-to-turn-off-internet-explorer-enhanced-security-configuration).
124135
2. In the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), select **Devices** > **Windows** > **Windows enrollment** > **Intune Connector for Active Directory** > **Add**.
@@ -131,13 +142,10 @@ The Intune Connector requires the [same endpoints as Intune](../intune/fundament
131142
8. Go to **Devices** > **Windows** > **Windows enrollment** > **Intune Connector for Active Directory**, and then confirm that the connection status is **Active**.
132143

133144
> [!NOTE]
134-
> The Global administrator role is a temporary requirement at the time of installation.
135-
136-
> [!NOTE]
137-
> After you sign in to the Connector, it might take a couple of minutes to appear in the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431). It appears only if it can successfully communicate with the Intune service.
138-
139-
> [!NOTE]
140-
> Inactive Intune connectors will still appear in the Intune Connectors blade and will automatically be cleaned up after 30 days.
145+
>
146+
> - The Global administrator role is a temporary requirement at the time of installation.
147+
> - After you sign in to the Connector, it can take several minutes to appear in the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431). It appears only if it can successfully communicate with the Intune service.
148+
> - Inactive Intune connectors still appear in the Intune Connectors blade and will automatically be cleaned up after 30 days.
141149
142150
### Configure web proxy settings
143151

memdocs/intune/enrollment/device-enrollment-shared-ipad.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -128,7 +128,7 @@ The following are known limitations when working with shared iPads:
128128

129129
- **Disabled settings and system apps:** Shared iPads provide users access to a limited number of settings and system apps. For more information on what settings and apps are disabled on Shared iPads. For more information, see [Shared iPad and Managed Apple IDs](https://support.apple.com/guide/mdm/shared-ipad-and-managed-apple-ids-mdm9992c9a34/web).
130130
- **App Store installations are disabled:** The App Store is available by default on Shared iPad. But app installation is disabled for App Store apps when a device is set up as a Shared iPad. It is recommended that you disable App Store using configuration profiles in Intune.
131-
- **Company Portal and available apps are not supported:** Intune Company Portal app, the Intune Company Portal website are not supported on Shared iPads. Apps must be assigned as “required” to device groups containing the Shared iPad to install. Available apps are supported on Shared iPad.
131+
- **Company Portal and available apps are not supported:** Intune Company Portal app and the Intune Company Portal website are not supported on Shared iPad. Apps must be assigned as _required_ to device groups containing the Shared iPad to install. Available apps are not supported on Shared iPad.
132132
- **Passcode complexity cannot be managed on Shared iPad:** The passcode complexity for Shared iPad is a complex 8 character alphanumeric and cannot be changed in Apple Business Manager. The passcode complexity and length settings available in device configuration profile do not apply to Shared iPads. The MDM administrator can set the grace period – a number of minutes during which the user can unlock the iPad without a passcode.
133133
- **Unsupported scenarios:** Some Intune scenarios are not supported on Shared iPads, namely, app-based and device-based Conditional Access, app protection policies and compliance policies.
134134
- **Wallpaper is not supported:** Setting a wallpaper image is currently not supported on Shared iPad. For more information on wallpaper, see [iOS/iPadOS Device Features](../configuration/ios-device-features-settings.md#wallpaper).

memdocs/intune/fundamentals/role-based-access-control.md

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ For advice and suggestions about Intune RBAC, you can check out this series of f
4141
## Roles
4242
A role defines the set of permissions granted to users assigned to that role.
4343
You can use both the built-in and custom roles. Built-in roles cover some common Intune scenarios. You can [create your own custom roles](create-custom-role.md) with the exact set of permissions you need. Several Azure Active Directory roles have permissions to Intune.
44-
To see a role, choose **Intune** > **Tenant administration** > **Roles** > **All roles** > choose a role. You'll can manage the role on the following pages:
44+
To see a role, choose **Endpoint Manager** > **Tenant administration** > **Roles** > **All roles** > choose a role. You can manage the role on the following pages:
4545

4646
- **Properties**: The name, description, permissions, and scope tags for the role.
4747
- **Assignments**: A list of [role assignments](assign-role.md) defining which users have access to which users/devices. A role can have multiple assignments, and a user can be in multiple assignments.
@@ -54,11 +54,14 @@ You can assign built-in roles to groups without further configuration. You can't
5454

5555
- **Application Manager**: Manages mobile and managed applications, can read device information and can view device configuration profiles.
5656
- **Endpoint Security Manager**: Manages security and compliance features, such as security baselines, device compliance, conditional access, and Microsoft Defender for Endpoint.
57-
- **Help Desk Operator**: Performs remote tasks on users and devices, and can assign applications or policies to users or devices.
58-
- **Intune Role Administrator**: Manages custom Intune roles and adds assignments for built-in Intune roles. It's the only Intune role that can assign permissions to Administrators.
59-
- **Policy and Profile Manager**: Manages compliance policy, configuration profiles, Apple enrollment, corporate device identifiers, and security baselines.
6057
- **Read Only Operator**: Views user, device, enrollment, configuration, and application information. Can't make changes to Intune.
6158
- **School Administrator**: Manages Windows 10 devices in [Intune for Education](introduction-intune-education.md).
59+
- **Policy and Profile Manager**: Manages compliance policy, configuration profiles, Apple enrollment, corporate device identifiers, and security baselines.
60+
- **Help Desk Operator**: Performs remote tasks on users and devices, and can assign applications or policies to users or devices.
61+
- **Intune Role Administrator**: Manages custom Intune roles and adds assignments for built-in Intune roles. It's the only Intune role that can assign permissions to Administrators.
62+
- **Cloud PC Administrator**: A Cloud PC Administrator has read and write access to all Cloud PC features located within the Cloud PC blade.
63+
- **Cloud PC Reader**: A Cloud PC Reader has read access to all Cloud PC features located within the Cloud PC blade.
64+
6265

6366
### Custom roles
6467
You can create your own roles with custom permissions. For more information about custom roles, see [Create a custom role](create-custom-role.md).

memdocs/intune/protect/compliance-custom-script.md

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ The discovery script:
3535

3636
- Is added to Intune before you create a compliance policy. After it's added, it will be available to select when you create a compliance policy with custom settings.
3737
- Runs on a device that receives the compliance policy. The script evaluates the conditions of the JSON file you upload to the same policy.
38-
- Identifies one or more settings, as defined in the JSON, and returns a list of discovered values for those settings. A single script can be assigned to each policy, and supports discovery of multiple settings.
38+
- Identifies one or more settings, as defined in the JSON, and returns a list of discovered values for those settings. A single script can be assigned to each policy, and supports discovery of multiple settings.
3939
- Must be compressed to output results in one line. For example: `$hash = @{ ModelName = "Dell"; BiosVersion = "1.24"; TPMChipPresent = $true}`
4040
- Must include the following line at the end of the script: `return $hash | ConvertTo-Json -Compress`
4141

@@ -44,14 +44,17 @@ The discovery script:
4444
The following is a sample PowerShell script.
4545

4646
```powershell
47-
$hash = @{ ModelName = "Dell"; BiosVersion = "1.24"; TPMChipPresent = $true}
47+
$WMI_ComputerSystem = Get-WMIObject -class Win32_ComputerSystem
48+
$WMI_BIOS = Get-WMIObject -class Win32_BIOS
49+
$TPM = Get-Tpm
50+
51+
$hash = @{ ModelName = $WMI_ComputerSystem.Model; BiosVersion = $WMI_BIOS.SMBIOSBIOSVersion; TPMChipPresent = $TPM.TPMPresent}
4852
return $hash | ConvertTo-Json -Compress
4953
```
5054

5155
The following is the output of the sample script:
5256

5357
```
54-
PS C:\Users\apervaiz\Documents> .\sample.ps1
5558
{"ModelName": "Dell","BiosVersion": 1.24,"TPMChipPresent": true}
5659
```
5760

@@ -72,4 +75,4 @@ PS C:\Users\apervaiz\Documents> .\sample.ps1
7275

7376
- [Use custom compliance settings](../protect/compliance-use-custom-settings.md)
7477
- [Create a JSON for custom compliance](../protect/compliance-custom-json.md)
75-
- [Create a compliance policy](../protect/create-compliance-policy.md)
78+
- [Create a compliance policy](../protect/create-compliance-policy.md)

0 commit comments

Comments
 (0)