Skip to content

Commit 14e9f61

Browse files
authored
Merge pull request #7997 from MicrosoftDocs/main
merge main to live Wednesday 10:30
2 parents 8a80c20 + d404dac commit 14e9f61

15 files changed

Lines changed: 136 additions & 150 deletions

memdocs/autopilot/existing-devices.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -258,7 +258,7 @@ After you save the file, move it to a location for a Microsoft Endpoint Configur
258258
- _Limiting collection_: **All Systems**
259259

260260
> [!NOTE]
261-
> You can optionally choose to use an alternative collection for the limiting collection. The device to be upgraded must be running the Configuration Manaber client in the collection that you select.
261+
> You can optionally choose to use an alternative collection for the limiting collection. The device to be upgraded must be running the Configuration Manager client in the collection that you select.
262262
263263
1. On the **Membership Rules** page, select **Add Rule**. Specify either a direct or query-based collection rule to add the target Windows 8.1 devices to the new collection.
264264

memdocs/autopilot/oem-registration.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,8 @@
11
---
22
title: Windows Autopilot OEM registration process
33
description: How OEMs add devices to Windows Autopilot
4-
keywords: mdm, setup, windows, windows 10, oobe, manage, deploy, autopilot, ztd, zero-touch, partner, msfb, intune
54
ms.prod: w10
6-
ms.mktglfcycl: deploy
75
ms.localizationpriority: medium
8-
ms.sitesec: library
9-
ms.pagetype: deploy
10-
audience: itpro
116
author: aczechowski
127
ms.author: aaroncz
138
ms.reviewer: jubaptis
@@ -36,6 +31,10 @@ When you purchase devices from an OEM, that OEM can automatically register the d
3631
3732
OEMs must follow [device guidelines](autopilot-device-guidelines.md) for Windows Autopilot devices.
3833

34+
### Service data
35+
36+
Windows Autopilot is managed and maintained by Microsoft. This service provides the backend database that associates hardware hashes with customer tenants. When an OEM registers devices for a customer, they are writing that data to this database and not directly to the customer's tenant. No permissions to the customer's tenant are granted or required for OEMs to register devices on the customer's behalf.
37+
3938
### Customer consent
4039

4140
Before an OEM can register devices for an organization, the organization must grant the OEM permission to do so. The OEM begins this process with approval granted by an Azure AD global administrator from your organization. For more information see [OEM authorization](registration-auth.md#oem-authorization).

memdocs/configmgr/core/servers/manage/updates.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,6 @@ The following supported versions of Configuration Manager are currently availabl
5959
| [**2111**](../../plan-design/changes/whats-new-in-version-2111.md)<br /> (5.00.9068) | December 1, 2021 | June 1, 2023 | No | Yes |
6060
| [**2107**](../../plan-design/changes/whats-new-in-version-2107.md)<br /> (5.00.9058) | August 2, 2021 | February 2, 2023 | No | Yes |
6161
| [**2103**](../../plan-design/changes/whats-new-in-version-2103.md)<br /> (5.00.9049) | April 5, 2021 | October 5, 2022 | Yes<sup>[Note 1](#bkmk_note1)</sup> | Yes |
62-
| [**2010**](../../plan-design/changes/whats-new-in-version-2010.md)<br /> (5.00.9040) | November 30, 2020 | May 30, 2022 | No | Yes |
6362

6463

6564
> [!NOTE]
@@ -84,6 +83,7 @@ The following table lists historical versions of Configuration Manager current b
8483

8584
| Version | Availability date | Support end date | Baseline | In-console update |
8685
|----------------------------------|-------------------|--------------------|----------|-------------------|
86+
| **2010** <br /> (5.00.9040) | November 30, 2020 | May 30, 2022 | No | Yes |
8787
| **2006** <br /> (5.00.9012) | August 11, 2020 | February 11, 2022 | No | Yes |
8888
| **2002** <br /> (5.00.8968) | April 1, 2020 | October 1, 2021 | Yes | Yes |
8989
| **1910** <br /> (5.00.8913) | November 29, 2019 | May 29, 2021 | No | Yes |

memdocs/configmgr/protect/deploy-use/defender-advanced-threat-protection.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ Microsoft Defender for Endpoint's cloud-based portal is [Microsoft Defender Secu
3232
You can onboard the following operating systems:
3333

3434
- Windows 8.1
35-
- Windows 10, version 1607 or later
35+
- Windows 10, version 1709 or later
3636
- Windows 11
3737
- Windows Server 2012 R2
3838
- Windows Server 2016

memdocs/configmgr/sum/deploy-use/third-party-software-updates.md

Lines changed: 48 additions & 48 deletions
Large diffs are not rendered by default.

memdocs/intune/configuration/device-restrictions-android-for-work.md

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ keywords:
77
author: MandiOhlinger
88
ms.author: mandia
99
manager: dougeby
10-
ms.date: 06/21/2022
10+
ms.date: 07/12/2022
1111
ms.topic: conceptual
1212
ms.service: microsoft-intune
1313
ms.subservice: configuration
@@ -515,7 +515,13 @@ End of comment -->
515515
- **Wi-Fi only**: Updates are installed only when the device is connected to a Wi-Fi network.
516516
- **Always**: Updates are installed when they're available.
517517

518-
- **Allow access to all apps in Google Play store**: When set to **Allow**, users get access to all apps in Google Play store. They can't access [client apps](../apps/apps-add-android-for-work.md) that aren't assigned to them. For more information on excluding users and groups from specific apps, see [Include and exclude app assignments](../apps/apps-inc-exl-assignments.md).
518+
- **Allow access to all apps in Google Play store**: When set to **Allow**:
519+
520+
- Users get access to all apps in the Google Play store.
521+
- Users can't use apps that are explicitly targeted with uninstall.
522+
- Users can't use apps that are added to a blocklist on the personal profile of corporate-owned devices with a work profile.
523+
524+
For more information on excluding users and groups from specific apps, see [Include and exclude app assignments](../apps/apps-inc-exl-assignments.md).
519525

520526
When set to **Not configured** (default), Intune doesn't change or update this setting. By default, the OS might:
521527

memdocs/intune/enrollment/apple-mdm-push-certificate-get.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ keywords:
88
author: Lenewsad
99
ms.author: lanewsad
1010
manager: dougeby
11-
ms.date: 07/11/2022
11+
ms.date: 07/12/2022
1212
ms.topic: how-to
1313
ms.service: microsoft-intune
1414
ms.subservice: enrollment
@@ -51,7 +51,7 @@ Sign in to the [Microsoft Endpoint Manager admin center](https://go.microsoft.co
5151
### Step 1. Grant Microsoft permission to send user and device information to Apple
5252
Select **I agree.** to give Microsoft permission to send data to Apple.
5353

54-
![The Configure MDM Push Certificate screen with MDM Push not set up.](./media/apple-mdm-push-certificate-get/create-mdm-push-certificate.png)
54+
:::image type="content" source="./media/apple-mdm-push-certificate-get/create-mdm-push-certificate.png" alt-text="Screenshof of the Configure MDM Push Certificate screen with MDM Push not set up.":::
5555

5656
### Step 2. Download the Intune certificate signing request required to create an Apple MDM push certificate
5757
Select **Download your CSR** to download and save the request file locally. The file is used to request a trust relationship certificate from the Apple Push Certificates Portal.

memdocs/intune/enrollment/device-enrollment-manager-enroll.md

Lines changed: 13 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ keywords:
88
author: Lenewsad
99
ms.author: lanewsad
1010
manager: dougeby
11-
ms.date: 05/10/2022
11+
ms.date: 07/12/2022
1212
ms.topic: how-to
1313
ms.service: microsoft-intune
1414
ms.subservice: enrollment
@@ -59,7 +59,18 @@ These Azure AD roles can manage device enrollment managers:
5959
* Global Administrator
6060
* Intune Service Administrator role in Azure AD
6161

62-
They can add and delete device enrollment managers, and view all DEM users in the Microsoft Endpoint Manager admin center.
62+
People assigned these roles can add and delete device enrollment managers, and view all DEM users in the Microsoft Endpoint Manager admin center.
63+
64+
## Add a device enrollment manager
65+
66+
1. Sign in to the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431).
67+
2. Select **Devices** > **Enroll devices**.
68+
3. Select **Device enrollment managers**.
69+
4. Select **Add**.
70+
3. In the **User name** field, enter the user principal name of the user you're adding.
71+
6. Select **Add**. The new device enrollment manager is added to the list of DEM users.
72+
73+
To remove someone as a device enrollment manager, select their name in the list and then choose **Delete**.
6374

6475
## Limitations
6576

@@ -97,20 +108,4 @@ Only the local device appears in the Company Portal app or Company Portal websit
97108
### Number of accounts
98109
There's a limit of 150 DEM accounts in Microsoft Intune.
99110

100-
## Add a device enrollment manager
101-
102-
1. Sign in to the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), choose **Devices** > **Enroll devices** > **Device enrollment managers**.
103-
104-
2. Select **Add**.
105-
106-
3. On the **Add User** blade, enter a user principal name for the DEM user, and select **Add**. The DEM user is added to the list of DEM users.
107-
108-
109-
## Remove device enrollment manager permissions
110-
111-
Removing a device enrollment manager doesn't affect enrolled devices.
112-
113-
### To remove a device enrollment manager
114111

115-
1. Sign in to the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), choose **Devices** > **Enroll devices** > **Device enrollment managers**.
116-
2. On the **Device enrollment managers** blade, select the DEM user, and select **Delete**.

memdocs/intune/enrollment/device-group-mapping.md

Lines changed: 33 additions & 47 deletions
Original file line numberDiff line numberDiff line change
@@ -33,65 +33,51 @@ ms.collection: M365-identity-device-management
3333

3434
[!INCLUDE [azure_portal](../includes/azure_portal.md)]
3535

36-
To make managing devices easier, you can use Microsoft Intune device categories to automatically add devices to groups based on categories that you define.
36+
Device categories allow you to easily manage and group devices in Microsoft Intune. Create a category, such as *sales* or *accounting*, and Intune automatically add all devices that fall within that category to the corresponding device group in Intune.
3737

38-
Device categories use the following workflow:
39-
1. Create categories that users can choose from when they enroll their device.
40-
2. When users of iOS/iPadOS and Android devices enroll a device, they must choose a category from the list of categories you configured. To assign a category to a Windows device, users must use the Company Portal website.
41-
3. You can then deploy policies and apps to these groups.
38+
To enable categories in your tenant, you must create a category in the Microsoft Endpoint Manager admin center and set up dynamic Azure Active Directory (Azure AD) security groups.
39+
40+
This article describes how to configure and edit device categories.
4241

43-
You can create any device categories you want. For example:
44-
- Point-of-sale device
45-
- Demonstration device
46-
- Sales
47-
- Accounting
48-
- Manager
42+
## Configure device categories
4943

50-
## How to configure device categories
44+
You must be a Global Administrator or Intune Administrator to perform these steps.
5145

52-
You need to be a Global Administrator or Intune Administrator to perform these steps.
53-
54-
### Step 1: Create device categories in Intune
46+
### Step 1: Create device category in Intune
5547
1. Sign in to the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431).
56-
2. Choose **Devices** > **Device categories** > **Create device category** to add a new category.
57-
3. On the **Create device category** pane, enter a **Name** for the new category, and an optional **Description**.
58-
4. When you are done, select **Create**. You can see the new category in the list of categories.
59-
60-
You'll use the device category name when you create Azure Active Directory (Azure AD) security groups in step 2.
61-
62-
### Step 2: Create Azure Active Directory security groups
63-
In this step, you'll create dynamic groups in the Azure portal, based on the device category and device category name.
64-
65-
To continue, refer to [Using attributes to create advanced rules](/azure/active-directory/users-groups-roles/groups-dynamic-membership#using-attributes-to-create-rules-for-device-objects) in the Azure AD documentation.
66-
67-
Use the information in this section to create a device group with an advanced rule, by using the **deviceCategory** attribute. For example: **device.deviceCategory -eq** "*the device category name you got from the Azure portal*".
48+
2. Choose **Devices** > **Device categories**.
49+
3. Select **Create device category** to add a new category.
50+
4. Enter the name of the new category, such as `HR` and an optional description.
51+
5. Select **Next**.
52+
6. Optionally, assign a scope tag, like `US-NC IT Team` or `JohnGlenn_ITDepartment`, to limit management of the category to specific IT groups. For more information about scope tags, see [Use RBAC and scope tags for distributed IT](../fundamentals/scope-tags.md).
53+
7. Select **Next**.
54+
8. Select **Create**. The new category is added to your **Device categories** list.
6855

69-
After you configure device groups, and users enroll their device, they are presented with a list of the categories you configured. After they choose a category and finish enrollment, their device is added to the Active Directory security group that corresponds with the category they chose.
56+
You'll use the device category name when you create Azure Active Directory (Azure AD) security groups in the next step.
7057

71-
### View the categories of devices that you manage
58+
### Step 2: Create Azure AD security groups
7259

73-
1. Sign in to the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), choose **Devices** > **All devices**.
60+
To enable automatic grouping, you must create a dynamic group using attribute-based rules in Azure AD. For instructions, see [Using attributes to create advanced rules](/azure/active-directory/users-groups-roles/groups-dynamic-membership#using-attributes-to-create-rules-for-device-objects) in the Azure AD documentation. Create an advanced rule for your group using the **deviceCategory** attribute and the category name you created in [Step 1](device-group-mapping.md#step-1-create-device category-in-Intune) of this article.
7461

75-
2. In the list of devices, examine the **Device category** column.
62+
For example, to create a rule that automatically groups devices belonging in the HR category, use the following rule syntax: `device.deviceCategory -eq "HR"`
7663

77-
If the **Device category** column isn't shown, select **Columns** > **Category** > **Apply**.
64+
### View categories of all devices
65+
Sign in to the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431) and go to **Devices** > **All devices** for a list of all devices. The **Device category** column shows the category assigned to each device.
66+
67+
If the **Device category** column isn't visible in the table, select **Columns** and then choose **Category** > **Apply**.
7868

79-
### Change the category of a device
69+
When you delete a category, devices assigned to it appear as **Unassigned**.
8070

81-
1. Sign in to the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), choose **Devices** > **All devices** > choose the device you want > **Properties**.
82-
2. On the next blade, you can change the **Device category** of the selected device to any of the category names you previously configured.
71+
### Change the category of a device
72+
If you edit a category, be sure to update any Azure AD security groups that reference the category in their rules.
8373

84-
## After you configure device groups
85-
86-
When users of iOS/iPadOS and Android devices enroll their device, they must choose a category from the list of categories you configured. After they choose a category and finish enrollment, their device is added to the Intune device group, or the Active Directory security group that corresponds with the category they chose.
87-
88-
Windows users should use the Company Portal website or the Company Portal app to select a category.
89-
90-
Regardless of platform, your users can always go to portal.manage.microsoft.com after enrolling the device. Have the user access the Company Portal website, and go to **My Devices**. The user can choose an enrolled device listed on the page, and then select a category.
91-
92-
After choosing a category, the device is automatically added to the corresponding group you created. If a device is already enrolled before you configure categories, the user sees a notification about the device on the Company Portal website. This lets the user know to select a category the next time they access the Company Portal app on iOS/iPadOS or Android.
74+
1. Sign in to the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431).
75+
2. Select **Devices** > **All devices**.
76+
3. Select a device.
77+
4. On the device details page, select **Properties**.
78+
5. Change your selection in the **Device category** field.
9379

94-
## Further information
95-
- You can edit a device category in the Azure portal, but you must manually update any Azure AD security groups that reference this category.
80+
## Best practices
81+
Device categories are supported on devices running Android, iOS/iPadOS, or Windows. People with Windows devices must use the Company Portal website to select their category. Regardless of platform, any device user can sign in to portal.manage.microsoft.com at anytime and go to **My devices** to select a category.
9682

97-
- If you delete a category, devices assigned to it display the category name **Unassigned**.
83+
If an iOS/iPadOS or Android device is already enrolled before you configure categories, the user will receive a notification about the device on the Company Portal website. The notification informs them that they need to select a category the next time they're in the Company Portal app.

memdocs/intune/enrollment/enrollment-report-company-portal-abandon.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
11
---
22
# required metadata
33

4-
title: Incomplete user enrollments report in Intune
4+
title: Incomplete user enrollments report overview
55
titleSuffix: Microsoft Intune
6-
description: Learn about the Incomplete user enrollments report.
6+
description: Learn about the incomplete user enrollments report generated by Microsoft Intune.
77
keywords:
88
author: Lenewsad
99
ms.author: lanewsad
@@ -33,7 +33,7 @@ ms.collection: M365-identity-device-management
3333

3434
This report tells you where in the Company Portal enrollment process users are not completing the enrollment process.
3535

36-
To see the report, choose **Intune** > **Device enrollment** > **Incomplete user enrollments**.
36+
To see the report, sign in to the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431). Then select **Devices** > **Monitor* > **Incomplete user enrollments**.
3737

3838
Using this information, you can update your onboarding documents to help users complete enrollment. For example, if many users are quitting at the Terms of Use, you might investigate that area and make it more intuitive for users.
3939

@@ -74,7 +74,7 @@ The line graph shows the daily incomplete enrollments for each of the four core
7474

7575
### User abandonment actions
7676

77-
The following tables show the list of user actions that qualify as prompting an incomplete enrollment. To see examples of enrollment screens, you can watch the [iOS](https://channel9.msdn.com/Series/IntuneEnrollment/iOS-Enrollment) and [Android](https://channel9.msdn.com/Series/IntuneEnrollment/Android-Enrollment) enrollment videos.
77+
The following tables list the user actions that indicate enrollment is incomplete.
7878

7979

8080
#### Setup checklist section

0 commit comments

Comments
 (0)