You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: memdocs/autopilot/windows-autopilot-hybrid.md
+20-12Lines changed: 20 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ keywords:
8
8
author: ErikjeMS
9
9
ms.author: erikje
10
10
manager: dougeby
11
-
ms.date: 06/07/2021
11
+
ms.date: 06/22/2021
12
12
ms.topic: how-to
13
13
ms.service: microsoft-intune
14
14
ms.subservice: enrollment
@@ -113,12 +113,23 @@ The organizational unit that's granted the rights to create computers must match
113
113
114
114
## Install the Intune Connector
115
115
116
-
The Intune Connector for Active Directory must be installed on a computer that's running Windows Server 2016 or later. The computer must also have access to the internet and your Active Directory. To increase scale and availability, you can install multiple connectors in your environment. We recommend installing the Connector on a server that's not running any other Intune connectors. Each connector must be able to create computer objects in any domain that you want to support.
116
+
### Before you begin
117
117
118
-
> [!NOTE]
119
-
> If your organization has multiple domains and you install multiple Intune Connectors, you must use a service account that's able to create computer objects in all domains, even if you plan to implement hybrid Azure AD join only for a specific domain. If these are untrusted domains, you must uninstall the connectors from domains in which you don't want to use Windows Autopilot. Otherwise, with multiple connectors across multiple domains, all connectors must be able to create computer objects in all domains.
118
+
- The Intune Connector for Active Directory must be installed on a computer that's running Windows Server 2016 or later.
119
+
- The computer must have access to the internet and your Active Directory.
120
+
- To increase scale and availability, you can install multiple connectors in your environment. We recommend installing the Connector on a server that's not running any other Intune connectors. Each connector must be able to create computer objects in any domain that you want to support.
121
+
122
+
- If your organization has multiple domains and you install multiple Intune Connectors, you must use a service account that can create computer objects in all domains, even if you plan to implement hybrid Azure AD join only for a specific domain. If these are untrusted domains, you must uninstall the connectors from domains in which you don't want to use Windows Autopilot. Otherwise, with multiple connectors across multiple domains, all connectors must be able to create computer objects in all domains.
123
+
124
+
This connector service account must have the following permissions:
125
+
126
+
-**[Log on as a service](/system-center/scsm/enable-service-log-on-sm)**
127
+
- Must be part of the **Domain user** group
128
+
- Must be a member of the local **Administrators** group on the Windows server that hosts the connector
129
+
130
+
- The Intune Connector requires the [same endpoints as Intune](../intune/fundamentals/intune-endpoints.md).
120
131
121
-
The Intune Connector requires the [same endpoints as Intune](../intune/fundamentals/intune-endpoints.md).
132
+
### Install steps
122
133
123
134
1. Turn off IE Enhanced Security Configuration. By default Windows Server has Internet Explorer Enhanced Security Configuration turned on. If you're unable to sign in to the Intune Connector for Active Directory, then turn off IE Enhanced Security Configuration for the Administrator. [How To Turn Off Internet Explorer Enhanced Security Configuration](/archive/blogs/chenley/how-to-turn-off-internet-explorer-enhanced-security-configuration).
124
135
2. In the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), select **Devices** > **Windows** > **Windows enrollment** > **Intune Connector for Active Directory** > **Add**.
@@ -131,13 +142,10 @@ The Intune Connector requires the [same endpoints as Intune](../intune/fundament
131
142
8. Go to **Devices** > **Windows** > **Windows enrollment** > **Intune Connector for Active Directory**, and then confirm that the connection status is **Active**.
132
143
133
144
> [!NOTE]
134
-
> The Global administrator role is a temporary requirement at the time of installation.
135
-
136
-
> [!NOTE]
137
-
> After you sign in to the Connector, it might take a couple of minutes to appear in the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431). It appears only if it can successfully communicate with the Intune service.
138
-
139
-
> [!NOTE]
140
-
> Inactive Intune connectors will still appear in the Intune Connectors blade and will automatically be cleaned up after 30 days.
145
+
>
146
+
> - The Global administrator role is a temporary requirement at the time of installation.
147
+
> - After you sign in to the Connector, it can take several minutes to appear in the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431). It appears only if it can successfully communicate with the Intune service.
148
+
> - Inactive Intune connectors still appear in the Intune Connectors blade and will automatically be cleaned up after 30 days.
Copy file name to clipboardExpand all lines: memdocs/intune/enrollment/device-enrollment-shared-ipad.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -128,7 +128,7 @@ The following are known limitations when working with shared iPads:
128
128
129
129
-**Disabled settings and system apps:** Shared iPads provide users access to a limited number of settings and system apps. For more information on what settings and apps are disabled on Shared iPads. For more information, see [Shared iPad and Managed Apple IDs](https://support.apple.com/guide/mdm/shared-ipad-and-managed-apple-ids-mdm9992c9a34/web).
130
130
-**App Store installations are disabled:** The App Store is available by default on Shared iPad. But app installation is disabled for App Store apps when a device is set up as a Shared iPad. It is recommended that you disable App Store using configuration profiles in Intune.
131
-
-**Company Portal and available apps are not supported:** Intune Company Portal app, the Intune Company Portal website are not supported on Shared iPads. Apps must be assigned as “required” to device groups containing the Shared iPad to install. Available apps are supported on Shared iPad.
131
+
-**Company Portal and available apps are not supported:** Intune Company Portal app and the Intune Company Portal website are not supported on Shared iPad. Apps must be assigned as _required_ to device groups containing the Shared iPad to install. Available apps are not supported on Shared iPad.
132
132
-**Passcode complexity cannot be managed on Shared iPad:** The passcode complexity for Shared iPad is a complex 8 character alphanumeric and cannot be changed in Apple Business Manager. The passcode complexity and length settings available in device configuration profile do not apply to Shared iPads. The MDM administrator can set the grace period – a number of minutes during which the user can unlock the iPad without a passcode.
133
133
-**Unsupported scenarios:** Some Intune scenarios are not supported on Shared iPads, namely, app-based and device-based Conditional Access, app protection policies and compliance policies.
134
134
-**Wallpaper is not supported:** Setting a wallpaper image is currently not supported on Shared iPad. For more information on wallpaper, see [iOS/iPadOS Device Features](../configuration/ios-device-features-settings.md#wallpaper).
Copy file name to clipboardExpand all lines: memdocs/intune/fundamentals/role-based-access-control.md
+7-4Lines changed: 7 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -41,7 +41,7 @@ For advice and suggestions about Intune RBAC, you can check out this series of f
41
41
## Roles
42
42
A role defines the set of permissions granted to users assigned to that role.
43
43
You can use both the built-in and custom roles. Built-in roles cover some common Intune scenarios. You can [create your own custom roles](create-custom-role.md) with the exact set of permissions you need. Several Azure Active Directory roles have permissions to Intune.
44
-
To see a role, choose **Intune** > **Tenant administration** > **Roles** > **All roles** > choose a role. You'll can manage the role on the following pages:
44
+
To see a role, choose **Endpoint Manager** > **Tenant administration** > **Roles** > **All roles** > choose a role. You can manage the role on the following pages:
45
45
46
46
-**Properties**: The name, description, permissions, and scope tags for the role.
47
47
-**Assignments**: A list of [role assignments](assign-role.md) defining which users have access to which users/devices. A role can have multiple assignments, and a user can be in multiple assignments.
@@ -54,11 +54,14 @@ You can assign built-in roles to groups without further configuration. You can't
54
54
55
55
-**Application Manager**: Manages mobile and managed applications, can read device information and can view device configuration profiles.
56
56
-**Endpoint Security Manager**: Manages security and compliance features, such as security baselines, device compliance, conditional access, and Microsoft Defender for Endpoint.
57
-
-**Help Desk Operator**: Performs remote tasks on users and devices, and can assign applications or policies to users or devices.
58
-
-**Intune Role Administrator**: Manages custom Intune roles and adds assignments for built-in Intune roles. It's the only Intune role that can assign permissions to Administrators.
59
-
-**Policy and Profile Manager**: Manages compliance policy, configuration profiles, Apple enrollment, corporate device identifiers, and security baselines.
60
57
-**Read Only Operator**: Views user, device, enrollment, configuration, and application information. Can't make changes to Intune.
61
58
-**School Administrator**: Manages Windows 10 devices in [Intune for Education](introduction-intune-education.md).
59
+
-**Policy and Profile Manager**: Manages compliance policy, configuration profiles, Apple enrollment, corporate device identifiers, and security baselines.
60
+
-**Help Desk Operator**: Performs remote tasks on users and devices, and can assign applications or policies to users or devices.
61
+
-**Intune Role Administrator**: Manages custom Intune roles and adds assignments for built-in Intune roles. It's the only Intune role that can assign permissions to Administrators.
62
+
-**Cloud PC Administrator**: A Cloud PC Administrator has read and write access to all Cloud PC features located within the Cloud PC blade.
63
+
-**Cloud PC Reader**: A Cloud PC Reader has read access to all Cloud PC features located within the Cloud PC blade.
64
+
62
65
63
66
### Custom roles
64
67
You can create your own roles with custom permissions. For more information about custom roles, see [Create a custom role](create-custom-role.md).
Copy file name to clipboardExpand all lines: memdocs/intune/protect/compliance-custom-script.md
+7-4Lines changed: 7 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -35,7 +35,7 @@ The discovery script:
35
35
36
36
- Is added to Intune before you create a compliance policy. After it's added, it will be available to select when you create a compliance policy with custom settings.
37
37
- Runs on a device that receives the compliance policy. The script evaluates the conditions of the JSON file you upload to the same policy.
38
-
- Identifies one or more settings, as defined in the JSON, and returns a list of discovered values for those settings. A single script can be assigned to each policy, and supports discovery of multiple settings.
38
+
- Identifies one or more settings, as defined in the JSON, and returns a list of discovered values for those settings. A single script can be assigned to each policy, and supports discovery of multiple settings.
39
39
- Must be compressed to output results in one line. For example: `$hash = @{ ModelName = "Dell"; BiosVersion = "1.24"; TPMChipPresent = $true}`
40
40
- Must include the following line at the end of the script: `return $hash | ConvertTo-Json -Compress`
0 commit comments