Skip to content

Commit 18926a8

Browse files
author
Angela Fleischmann
authored
Merge pull request #7071 from Erikre/erikre-doc-13875620
Erikre-doc-13875620
2 parents f05b443 + 51148ee commit 18926a8

9 files changed

Lines changed: 17 additions & 17 deletions

memdocs/intune/apps/android-deployment-scenarios-app-protection-work-profiles.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -86,7 +86,7 @@ An Android Enterprise personally-owned work profile includes the following featu
8686

8787
- **Traditional MDM functionality**: Key MDM capabilities, such as app lifecycle management using managed Google Play, is available in any Android Enterprise scenario. Managed Google Play provides a robust experience to install and update apps without any user intervention. IT can also push app configuration settings to organizational apps. It also doesn't require end users to allow installations from unknown sources. Other common MDM activities, such as deploying certificates, configuring WiFi/VPNs, and setting device passcodes are available with Android Enterprise personally-owned work profiles.
8888

89-
- **DLP on the Android Enterprise personally-owned work profile boundary**: With a Android Enterprise personally-owned work profile, DLP policies are enforced at the work profile level, not the app level. For example, copy/paste protection is enforced by the APP settings applied to an app, or enforced by the work profile. When the app is deployed into a work profile, administrators can pause copy/paste protection to the work profile by turning off this policy at the APP level.
89+
- **DLP on the Android Enterprise personally-owned work profile boundary**: With an Android Enterprise personally-owned work profile, DLP policies are enforced at the work profile level, not the app level. For example, copy/paste protection is enforced by the APP settings applied to an app, or enforced by the work profile. When the app is deployed into a work profile, administrators can pause copy/paste protection to the work profile by turning off this policy at the APP level.
9090

9191
## Tips to optimize the work profile experience
9292

memdocs/intune/apps/app-management.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -90,7 +90,7 @@ You can find most app-related information in the **Apps** workload, which you ca
9090

9191
The apps workload provides links to access common app information and functionality.
9292

93-
The top of the App workload navigation menu provide commonly used app details:
93+
The top of the App workload navigation menu provides commonly used app details:
9494
- **Overview**: Select this option to view the tenant name, the MDM authority, the tenant location, the account status, app installation status, and app protection policy status.
9595
- **All apps**: Select this option to display a list of all available apps. You can add additional apps from this page. Additionally, you can see the status of each app, as well as whether each app is assigned. For more information, see [Add apps](apps-add.md) and [Assign apps](apps-deploy.md).
9696
- **Monitor apps**

memdocs/intune/apps/app-protection-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -366,7 +366,7 @@ When dealing with different types of settings, an Intune SDK version requirement
366366
> Note that users targeted with APP policies on non-dedicated devices will not be impacted.
367367
368368
### Microsoft Teams Android devices
369-
The Teams app on [Microsoft Teams Android devices](https://www.microsoft.com/microsoft-teams/across-devices/devices?rtc=2) does not support APP (does not receive policy though the Company Portal app). This means that app protection policy settings will not be applied to Teams on Microsoft Teams Android devices.
369+
The Teams app on [Microsoft Teams Android devices](https://www.microsoft.com/microsoft-teams/across-devices/devices?rtc=2) does not support APP (does not receive policy through the Company Portal app). This means that app protection policy settings will not be applied to Teams on Microsoft Teams Android devices.
370370

371371
### Device biometric authentication
372372
For Android devices that support biometric authentication, you can allow end users to use fingerprint or Face Unlock, depending on what their Android device supports. You can configure whether all biometric types beyond fingerprint can be used to authenticate. Note that fingerprint and Face Unlock are only available for devices manufactured to support these biometric types and are running the correct version of Android. Android 6 and higher is required for fingerprint, and Android 10 and higher is required for Face Unlock.

memdocs/intune/apps/apps-supported-intune-apps.md

Lines changed: 3 additions & 3 deletions
Large diffs are not rendered by default.

memdocs/intune/apps/company-portal-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -199,7 +199,7 @@ If the user does not have the Company Portal app installed, the user will be tak
199199
200200
## Company Portal and Apple Setup Assistant for iOS/iPadOS
201201

202-
For iOS/iPadOS devices running 13.0 and later, when creating an Automated Device Enrollment profile, you can now choose a new authentication method: **Setup Assistant with modern authentication**. This method provides all the security from authenticating with the Company Portal but avoids the issue of leaving end users stuck on a device that they can't use while the Company Portal installs on the device. The user has to authenticate using Azure AD credentials during the setup assistant screens. This will require an additional Azure AD login post-enrollment in in the Company Portal app to gain access to corporate resources protected by Conditional Access and for Intune to assess device compliance. The correct Company Portal version will automatically be sent down as a required app to the device for iOS/iPadOS, which we recommend choosing a VPP token for from the enrollment profile.
202+
For iOS/iPadOS devices running 13.0 and later, when creating an Automated Device Enrollment profile, you can now choose a new authentication method: **Setup Assistant with modern authentication**. This method provides all the security from authenticating with the Company Portal but avoids the issue of leaving end users stuck on a device that they can't use while the Company Portal installs on the device. The user has to authenticate using Azure AD credentials during the setup assistant screens. This will require an additional Azure AD login post-enrollment in the Company Portal app to gain access to corporate resources protected by Conditional Access and for Intune to assess device compliance. The correct Company Portal version will automatically be sent down as a required app to the device for iOS/iPadOS, which we recommend choosing a VPP token for from the enrollment profile.
203203

204204
Enrollment is completed once the user lands on the home screen, and users can freely use the device for resources not protected by Conditional Access. User affinity is established when users complete the additional Azure AD login into the Company Portal app on the device. If the tenant has multi-factor authentication turned on for these devices or users, the users will be asked to complete multi-factor authentication during enrollment during Setup Assistant. Multi-factor authentication is not required, but it is available for this authentication method within Conditional Access if needed.
205205

memdocs/intune/developer/app-sdk-android.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -301,7 +301,7 @@ The tool expects the following parameters.
301301
| `--input` | Yes | A semi-colon delimited list of jar files and directories of class files to modify. This should include all jars/directories that you intend to rewrite. |
302302
| `--output` | Yes | A semi-colon delimited list of jar files and directories to store the modified classes to. There should be one output entry per input entry, and they should be listed in order. |
303303
| `--classpath` | Yes | The build classpath. This may contain both jars and class directories. |
304-
| `--processed` | No | A semi-colon delimited list of jar files and directories containing classes which have already been been processed by a previous invocation of the build tool. |
304+
| `--processed` | No | A semi-colon delimited list of jar files and directories containing classes which have already been processed by a previous invocation of the build tool. |
305305
| `--excludeClasses` | No | A semi-colon delimited list containing the names of the classes that should be excluded from rewriting. |
306306
| `--report` | No | Directory to write an HTML report about modified classes to. If not specified, no report is written. |
307307

@@ -734,7 +734,7 @@ When checking the open policy, the `username` should be the UPN/username/email a
734734
file or cloud service being opened from. `OpenLocation.LOCAL` is not a cloud service location, but may be tagged with
735735
an identity to indicate ownership. When opening a file from local storage, the file owner must always be considered,
736736
because the file owner's save-as policy may or may not permit other users to open the file. For identity-tagged files,
737-
`username` should be the the file owner's identity. For files without an identity tag,
737+
`username` should be the file owner's identity. For files without an identity tag,
738738
`username` should be null.
739739

740740
>[!NOTE]
@@ -1055,7 +1055,7 @@ void registerAuthenticationCallback(MAMServiceAuthenticationCallback callback);
10551055
void updateToken(String upn, String aadId, String resourceId, String token);
10561056
```
10571057

1058-
1. The app must implement the [MAMServiceAuthenticationCallback] interface to allow the SDK to request an AAD token for the given user and resource ID. The callback instance must be provided to the `MAMEnrollmentManager` by calling its registerAuthenticationCallback method. A token may be needed early in the app lifecycle for enrollment retries or app protection policy refresh check-ins, so the the callback must be registered in the `onCreate()` (or `onMAMCreate()`) method of the app's Application subclass.
1058+
1. The app must implement the [MAMServiceAuthenticationCallback] interface to allow the SDK to request an AAD token for the given user and resource ID. The callback instance must be provided to the `MAMEnrollmentManager` by calling its registerAuthenticationCallback method. A token may be needed early in the app lifecycle for enrollment retries or app protection policy refresh check-ins, so the callback must be registered in the `onCreate()` (or `onMAMCreate()`) method of the app's Application subclass.
10591059

10601060
2. The **acquireToken** method should acquire the access token for the requested resource ID for the given user. If it can't acquire the requested token, it should return null.
10611061

@@ -1655,7 +1655,7 @@ a set of **IdentitySwitchOption** values.
16551655
16561656
* `DATA_FROM_INTENT`: Use if requesting an identity switch when data
16571657
from the intent will be displayed in the activity. The opposite of
1658-
`IGNORE_INTENT`. This will cause receive policy for the new
1658+
`IGNORE_INTENT`. This will cause the receive policy for the new
16591659
identity to treat the intent as incoming data.
16601660
16611661
For example: Your app receives an intent containing metadata that
@@ -1789,7 +1789,7 @@ In addition to the app's ability to set the identity, a thread, or a context's i
17891789
final AppIdentitySwitchResultCallback callback);
17901790
```
17911791
1792-
* The **AppIdentitySwitchReason** captures the source of the implicit switch, and can accept the values `CREATE`, `RESUME_CANCELLED`, and `NEW_INTENT`. The `RESUME_CANCELLED` reason is used when activity resume causes PIN, authentication, or other compliance UI to be displayed and the user attempts to cancel out of that UI, generally though use of the back button.
1792+
* The **AppIdentitySwitchReason** captures the source of the implicit switch, and can accept the values `CREATE`, `RESUME_CANCELLED`, and `NEW_INTENT`. The `RESUME_CANCELLED` reason is used when activity resume causes PIN, authentication, or other compliance UI to be displayed and the user attempts to cancel out of that UI, generally through use of the back button.
17931793
17941794
17951795
* The **AppIdentitySwitchResultCallback** is as follows:
@@ -1962,7 +1962,7 @@ Apps that make use of [MAMDataProtectionManager] should implement a receiver for
19621962
enabled when the buffers were protected. An app can remediate this situation by calling
19631963
`MAMDataProtectionManager.unprotect` on all buffers during this notification. It
19641964
is also safe to call protect during this notification if it is desired to preserve identity
1965-
information -- encryption is guaranteed to be disabled during the notification.
1965+
information (encryption is guaranteed to be disabled during the notification).
19661966
19671967
19681968
### Content Providers

memdocs/intune/fundamentals/whats-new-archive.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2219,7 +2219,7 @@ You can require that a Win32 app must restart after a successful install. Also,
22192219
You'll see a new user experience when creating app configuration policies in Intune. This experience provides the same settings and details that you have used previously, however the new experience follows a wizard-like process before adding a policy to Intune. From the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), select **Apps** > **App configuration policies** > **Add**. For more information, see [App configuration policies for Microsoft Intune](../apps/app-configuration-policies-overview.md).
22202220

22212221
#### Intune support for additional Microsoft Edge for Windows 10 deployment channel<!-- 5861774 -->
2222-
Microsoft Intune now support the additional **Stable** deployment channel for the Microsoft Edge (version 77 and later) for Windows 10 app. The **Stable** channel is the recommended channel for deploying Microsoft Edge for Windows 10 broadly in Enterprise environments. This channel updates every six weeks, each release incorporating improvements from the **Beta** channel. In addition to the **Stable** and **Beta** channels, Intune supports a **Dev** channel. For more information, see [Microsoft Edge for Windows 10 - Configure app settings](../apps/apps-windows-edge.md#configure-app-settings).
2222+
Microsoft Intune now supports the additional **Stable** deployment channel for the Microsoft Edge (version 77 and later) for Windows 10 app. The **Stable** channel is the recommended channel for deploying Microsoft Edge for Windows 10 broadly in Enterprise environments. This channel updates every six weeks, each release incorporating improvements from the **Beta** channel. In addition to the **Stable** and **Beta** channels, Intune supports a **Dev** channel. For more information, see [Microsoft Edge for Windows 10 - Configure app settings](../apps/apps-windows-edge.md#configure-app-settings).
22232223

22242224
#### S/MIME support for Microsoft Outlook for iOS<!-- 2669398 -->
22252225
Intune supports delivering S/MIME signing and encryption certificates that can be used with Outlook for iOS on iOS devices. For more information, see [Sensitivity labeling and protection in Outlook for iOS and Android](/exchange/clients-and-mobile-in-exchange-online/outlook-for-ios-and-android/sensitive-labeling-and-protection-outlook-for-ios-android).
@@ -5812,7 +5812,7 @@ The following are the settings administrators can configure:
58125812
- **Resource account**
58135813
- **Active Directory user**
58145814

5815-
Domainname\username or User Principle Name (UPN): [email protected]
5815+
Domainname\username or User Principal Name (UPN): [email protected]
58165816

58175817
- **Password**
58185818

memdocs/intune/protect/endpoint-security-firewall-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -115,7 +115,7 @@ Data is reported through the Windows [DeviceStatus CSP](/windows/client-manageme
115115

116116
- Device name
117117
- Firewall status
118-
- User principle name
118+
- User principal name
119119
- Target (The method of device management)
120120
- Last check in time
121121

memdocs/intune/protect/wandera-mtd-connector-integration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -140,5 +140,5 @@ Activation Profiles to be used with MAM must have Associated User set to the Aut
140140
5. Click **Save** in the upper-right corner of the page.
141141

142142
## Next Steps
143-
- With your Wandera Activation Profiles loaded in RADAR, create client apps in Intune to deploy the Wandera app to Android and iOS/iPadOS devices. The Wandera app config provides essential functionality to compliment the pushed Device configuration profile(s) and is recommended for all deployments. See [Add MTD apps](mtd-apps-ios-app-configuration-policy-add-assign.md) for the procedures and custom details specific to the Wandera apps.
143+
- With your Wandera Activation Profiles loaded in RADAR, create client apps in Intune to deploy the Wandera app to Android and iOS/iPadOS devices. The Wandera app config provides essential functionality to complement the pushed Device configuration profile(s) and is recommended for all deployments. See [Add MTD apps](mtd-apps-ios-app-configuration-policy-add-assign.md) for the procedures and custom details specific to the Wandera apps.
144144
- Now that you have Wandera integrated with Endpoint Manager, you can now tune your configuration, view reports, and deploy more broadly across your fleet of mobile devices. For detailed configuration guides, see the [Support Center Getting Started Guide](https://radar.wandera.com/?return_to=https://wandera.force.com/Customer/s/getting-started) in the Wandera documentation.

0 commit comments

Comments
 (0)