Skip to content

Commit 1c260c2

Browse files
authored
Merge pull request #6276 from MicrosoftDocs/main
12/2/2021 PM Publish
2 parents c954026 + da23a06 commit 1c260c2

11 files changed

Lines changed: 262 additions & 20 deletions

File tree

memdocs/configmgr/core/plan-design/changes/whats-new-in-version-2107.md

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -433,19 +433,17 @@ For more information on changes to the Windows PowerShell cmdlets for Configurat
433433

434434
Aside from new features, this release also includes other changes such as bug fixes. For more information, see [Summary of changes in Configuration Manager current branch, version 2107](../../../hotfix/2107/10096997.md).
435435

436-
<!--
437-
The following update rollup (4517869) is available in the console starting on October 1, 2019: [Update rollup for Configuration Manager current branch, version 1906](https://support.microsoft.com/help/4517869).
438-
-->
439436

440-
<!--
437+
The following update rollup (11121541) is available in the console starting on October 27, 2021: [Update rollup for Configuration Manager current branch, version 2107](../../../hotfix/2107/11121541.md).
438+
439+
441440
### Hotfixes
442441

443442
The following additional hotfixes are available to address specific issues:
444443

445444
| ID | Title | Date | In-console |
446445
|---------|---------|---------|---------|
447-
| [9833643](../../../hotfix/2107/9833643.md) | Console update for Microsoft Endpoint Configuration Manager version 2107 | May 11, 2021 | No |
448-
-->
446+
| [12636660](../../../hotfix/2107/12636660.md) | Client update for Microsoft Endpoint Configuration Manager version 2107 | December 2, 2021 | No |
449447

450448
## Next steps
451449

Lines changed: 70 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,70 @@
1+
---
2+
title: Client update for Microsoft Endpoint Configuration Manager version 2107
3+
titleSuffix: Configuration Manager
4+
description: Client update for 2107
5+
ms.date: 12/02/2021
6+
ms.prod: configuration-manager
7+
ms.technology: configmgr-core
8+
ms.topic: reference
9+
ms.assetid: a8e89ce4-e3f6-476e-baad-d11cb1bb70f6
10+
author: bhuney
11+
ms.author: brianhun
12+
manager: dougeby
13+
---
14+
15+
# Update for Microsoft Endpoint Configuration Manager version 2107
16+
17+
*Applies to: Configuration Manager (current branch, version 2107)*
18+
## Summary of KB12636660
19+
20+
An update is available to resolve the following issue with Configuration Manager after installing the [Update rollup for Microsoft Endpoint Configuration Manager version 2107](./11121541.md).
21+
22+
- Clients in untrusted domains do not use the network access account as a fallback authentication method to access content on distribution points. This leads to content download failures when other authentication methods are unavailable.
23+
24+
## Update information for Microsoft Endpoint Configuration Manager, version 2107
25+
The following hotfix to resolve this problem is available for download from the Microsoft Download Center:
26+
27+
[Download this hotfix now](https://configmgrbits.azureedge.net/qfe/2107/KB12636660_9058.1048/CM2107-KB12636660.ConfigMgr.Update.exe).
28+
29+
After you download the hotfix, see the following documentation for installation instructions:
30+
31+
[Use the Update Registration Tool to import hotfixes to Configuration Manager](../../core/servers/manage/use-the-update-registration-tool-to-import-hotfixes.md)
32+
33+
#### Prerequisites
34+
To apply this hotfix, you must have Microsoft Endpoint Configuration Manager, version 2107 installed in addition to the following update:
35+
36+
[KB11121541](./11121541.md) Update rollup for Microsoft Endpoint Configuration Manager version 2107
37+
38+
#### Restart information
39+
This update does not require a computer restart or initiate a site reset.
40+
41+
### Other installation information
42+
After you install this update on a primary site, pre-existing secondary sites must be manually updated. To update a secondary site in the Configuration Manager console, select **Administration** > **Site Configuration** > **Sites** > **Recover Secondary Site**, and then select the secondary site. The primary site then reinstalls that secondary site by using the updated files. Configurations and settings for the secondary site are not affected by this reinstallation. The new, upgraded, and reinstalled secondary sites under that primary site automatically receive this update.
43+
44+
Run the following SQL Server command on the site database to check whether the update version of a secondary site matches that of its parent primary site:
45+
```code
46+
select dbo.fnGetSecondarySiteCMUpdateStatus ('SiteCode_of_secondary_site')
47+
```
48+
If the value 1 is returned, the site is up to date, with all the hotfixes applied on its parent primary site.
49+
50+
If the value 0 is returned, the site has not installed all the fixes that are applied to the primary site, and you should use the **Recover Secondary Site** option to update the secondary site.
51+
52+
## Version information
53+
The following major components are updated to the versions specified:
54+
55+
|Component |Version |
56+
|---|---|
57+
| Configuration Manager client | 5.00.9058.1048 |
58+
59+
## File information
60+
File information is available in the downloadable [KB12636660_FileList.txt](https://aka.ms/KB12636660_FileList) text file.
61+
62+
## Release history
63+
- December 2, 2021: Initial hotfix release
64+
65+
## References
66+
[Updates and servicing for Configuration Manager](../../core/servers/manage/updates.md)
67+
[Network access account](../../core/plan-design/hierarchy/fundamental-concepts-for-content-management.md#network-access-account)
68+
69+
70+

memdocs/configmgr/hotfix/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,8 @@ items:
99
href: 2107/10503003.md
1010
- name: KB 11121541 Update rollup for 2107
1111
href: 2107/11121541.md
12+
- name: KB 12636660 Network access account update
13+
href: 2107/12636660.md
1214
- name: Version 2103
1315
items:
1416
- name: KB 9210721 Summary of changes in 2103

memdocs/intune/apps/apps-company-portal-macos.md

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ keywords:
88
author: Erikre
99
ms.author: erikre
1010
manager: dougeby
11-
ms.date: 08/19/2021
11+
ms.date: 12/02/2021
1212
ms.topic: how-to
1313
ms.service: microsoft-intune
1414
ms.subservice: apps
@@ -52,7 +52,7 @@ You can instruct users to download, install, and sign in to Company Portal for m
5252
> [!NOTE]
5353
> When you download the Intune Company Portal for macOS devices version 2.18.2107 and later, it installs the new universal version of the app that runs natively on Apple Silicon Macs. The same app will install the x64 version of the app on Intel Mac machines.
5454
55-
## Install Company Portal for macOS as a macOS LOB app
55+
## Install Company Portal for macOS as a macOS LOB app
5656

5757
Company Portal for macOS can be downloaded and installed using the [macOS LOB apps](lob-apps-macos.md) feature. The version downloaded is the version that will always be installed and may need to be updated periodically to ensure users get the best experience during initial enrollment.
5858

@@ -75,11 +75,15 @@ Company Portal for macOS can be downloaded and installed using the [macOS Shell
7575
> [!NOTE]
7676
> The script will require Internet access when it runs to download the current version of the Company Portal for macOS.
7777
78-
## Install Company Portal for macOS using the Apple Setup Assistant
78+
## Signing into the Company Portal for macOS when using Setup Assistant with Modern Authentication
7979

8080
For macOS devices running 10.15 and later, when creating an Automated Device Enrollment profile, you can now choose a new authentication method: **Setup Assistant with modern authentication**. The user has to authenticate using Azure AD credentials during the setup assistant screens. This will require an additional Azure AD login post-enrollment in the Company Portal app to gain access to corporate resources protected by Conditional Access and for Intune to assess device compliance. The Company Portal can be installed in any of the three ways documented here for Setup Assistant with modern authentication.
8181

82-
Users must sign into the Company Portal to complete Azure AD authentication and gain access to resources protected by Conditional Access. User affinity is established when users complete the additional Azure AD login into the Company Portal app on the device. If the tenant has multi-factor authentication turned on for these devices or users, the users will be asked to complete multi-factor authentication during enrollment during Setup Assistant. Multi-factor authentication is not required, but it is available for this authentication method within Conditional Access if needed.
82+
Use one of the ways documented above to deploy the macOS Company Portal to the devices enrolling with Setup Assistant with modern authentication so that the end user can authenticate and complete Azure AD registration.
83+
84+
Users must sign into the Company Portal to complete Azure AD authentication and gain access to resources protected by Conditional Access. User affinity is established when users complete the enrollment and reaches the home screen of the macOS device. If the tenant has multi-factor authentication turned on for these devices or users, the users will be asked to complete multi-factor authentication during enrollment during Setup Assistant. Multi-factor authentication is not required, but it is available for this authentication method within Conditional Access if needed.
85+
86+
For more information about configuring Setup Assistant with modern authentication for macOS, see [Create an Apple enrollment profile](../enrollment/device-enrollment-program-enroll-macos.md#create-an-apple-enrollment-profile).
8387

8488
## Next steps
8589
- To learn more about assigning apps, see [Assign apps to groups](apps-deploy.md).

memdocs/intune/fundamentals/reports-export-graph-available-reports.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ keywords:
77
author: Erikre
88
ms.author: erikre
99
manager: dougeby
10-
ms.date: 11/02/2021
10+
ms.date: 12/02/2021
1111
ms.topic: conceptual
1212
ms.service: microsoft-intune
1313
ms.subservice: fundamentals
@@ -665,6 +665,9 @@ The following table contains the possible output when calling the `DevicesWithIn
665665
| ManagementAgents | ManagementAgents |
666666
| CertExpirationDate | CertExpirationDate |
667667
| IsManaged | IsManaged |
668+
| SystemManagementBIOSVersion | SystemManagementBIOSVersion |
669+
| TPMManufacturerId | TPMManufacturerId |
670+
| TPMManufacturerVersion | TPMManufacturerVersion |
668671

669672
You can choose to filter the `DevicesWithInventory` report's output based on the following columns:
670673
- `CreatedDate`

memdocs/intune/protect/certificate-authority-add-scep-overview.md

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -113,6 +113,12 @@ Be sure you have the required permissions to register an Azure AD app. See [Requ
113113
2. Expand **Application** and select the checkbox for **Application.Read.All** (Read all applications).
114114
3. Select **Add permissions** to save this configuration.
115115

116+
1. Select **Add a permission** again.
117+
1. On the *Request API permissions* page, select **Azure Active Directory Graph** > **Application permissions**.
118+
2. Expand **Application** and select the checkbox for **Application.Read.All** (Read all applications).
119+
3. Select **Add permissions** to save this configuration.
120+
121+
<!-- Pending review to replace step 7.c>
116122
1. Use *Microsoft Graph* to add the following permissions to the app:
117123
118124
- **Application.Read.All** (Read all applications).
@@ -121,9 +127,7 @@ Be sure you have the required permissions to register an Azure AD app. See [Requ
121127
122128
> [!NOTE]
123129
> Previously, these permissions were configured by using Azure AD Graph, and available through the App registration UI. Azure AD Graph is now deprecated and will be retired on June 30, 2022. As part of this deprecation path, the capability to add Azure AD Graph permissions to the required permissions for an app registration through the Azure portal is now disabled.
124-
>
125-
> In addition to using the information at [Configure Azure AD Graph permissions](/graph/migrate-azure-ad-graph-configure-permissions) to set permission on the app, we recommend that you follow the [App migration planning checklist](/graph/migrate-azure-ad-graph-planning-checklist) to help you transition your apps to the [Microsoft Graph](/graph/overview) API.
126-
130+
-->
127131
8. Remain on the **API permissions** page, and select **Grant admin consent for** ***\<your tenant>***, and then select **Yes**.
128132

129133
The app registration process in Azure AD is complete.

memdocs/intune/remote-actions/remote-help.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ keywords:
77
author: brenduns
88
ms.author: brenduns
99
manager: dougeby
10-
ms.date: 12/01/2021
10+
ms.date: 12/02/2021
1111
ms.topic: how-to
1212
ms.service: microsoft-intune
1313
ms.subservice: remote-actions
@@ -100,9 +100,10 @@ Both the helper and sharer must be able to reach these endpoints over port 443:
100100

101101
Microsoft logs a small amount of session data to monitor the health of the remote help system. This data includes the following information:
102102

103-
- Start and end time of the session
104-
- Errors arising from remote help itself, such as unexpected disconnections
105-
- Features used inside the app such as view only, annotation, and session pause
103+
- Start and end time of the session. This information is stored on Microsoft servers for 30 days.
104+
- Who helped whom and on what device. This information is stored on Microsoft servers for 30 days.
105+
- Errors arising from remote help itself, such as unexpected disconnections. This information is stored on the sharer's device in the event viewer.
106+
- Features used inside the app such as view only and elevation. This information is stored on Microsoft servers for 30 days.
106107

107108
Remote help logs session details to the Windows Event Logs on the device of both the helper and sharer. Microsoft can't access a session or view any actions or keystrokes that occur in the session. Microsoft cannot access a session or view any actions or keystrokes that occur in the session.
108109

@@ -114,7 +115,7 @@ The helper and sharer both see the following information about the other individ
114115
- First and Last name
115116
- Job title
116117

117-
Microsoft does not store any data about either the sharer or the helper for longer than three days.
118+
Microsoft does not store any data about either the sharer or the helper for longer than 30 days.
118119

119120
## Install and update remote help
120121

windows-365/enterprise/TOC.yml

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,8 @@ items:
2121
href: on-premises-network-connections.md
2222
- name: Device images
2323
href: device-images.md
24+
- name: Lifecycle and operating system end of support
25+
href: end-of-support.md
2426
- name: Device configuration with MEM
2527
href: device-configuration.md
2628
- name: Privacy and personal data
@@ -113,6 +115,8 @@ items:
113115
href: create-custom-image-support-teams.md
114116
- name: App Assure
115117
href: app-assure.md
118+
- name: Optimize Zoom
119+
href: zoom-support.md
116120
- name: Device management
117121
items:
118122
- name: Overview
Lines changed: 60 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,60 @@
1+
---
2+
# required metadata
3+
title: End of support for Windows operating system on Cloud PCs
4+
titleSuffix:
5+
description: Learn about lifecycle policies and end of support for operating systems on Cloud PCs and device images.
6+
keywords:
7+
author: ErikjeMS
8+
ms.author: erikje
9+
manager: dougeby
10+
ms.date: 11/30/2021
11+
ms.topic: how-to
12+
ms.service: cloudpc
13+
ms.subservice:
14+
ms.localizationpriority: high
15+
ms.technology:
16+
ms.assetid:
17+
18+
# optional metadata
19+
20+
#ROBOTS:
21+
#audience:
22+
23+
ms.reviewer: naramkri
24+
ms.suite: ems
25+
search.appverid: MET150
26+
#ms.tgt_pltfrm:
27+
ms.custom: intune-azure; get-started
28+
ms.collection: M365-identity-device-management
29+
---
30+
31+
# Lifecycle policies and end of support for Cloud PC operating systems
32+
33+
Lifecycle policies govern operating system (OS) servicing and support (including end of support). The lifecycle is the time period during which Microsoft supports the OS and releases monthly security updates for it. For more information about lifecycles, see [Lifecycle FAQ - General](/lifecycle/faq/general-lifecycle) and [Lifecycle FAQ - Windows](/lifecycle/faq/windows).
34+
35+
A Windows 365 Cloud PC runs on the Windows OS and follows the [Microsoft Lifecycle Policy](/lifecycle). After the OS on a Cloud PC reaches the end of support, it stops receiving:
36+
37+
- Security updates
38+
- Non-security updates
39+
- Assisted support
40+
41+
## Image status
42+
43+
Windows 365 tracks end of support information in Microsoft Endpoint Manager on the **Provisioning policies** page under **Image status**. This column lets you know if the OS on the image used by each provisioning policy is supported or not.
44+
45+
| Image status | Gallery image | Custom image |
46+
| --- |--- | --- |
47+
| Supported | Cloud PCs created using this policy have a Windows OS that is supported by Microsoft and can receive updates. | Same as gallery image. |
48+
| Warning | OS Support expired less than six months ago. Cloud PCs created using this policy have an OS that isn’t supported. Such Cloud PCs are vulnerable and not receiving security updates. | Cloud PCs created using this policy have an OS that isn’t supported. Such Cloud PCs are vulnerable and not receiving security updates. |
49+
| Unsupported | Cloud PCs created using this policy have a Windows OS that hasn’t been supported for over six months. This policy can no longer be assigned to users. To resolve this issue, update the OS image in the provisioning policy to an image with a supported OS. Existing Cloud PCs previously created with this policy:<br>- Are vulnerable and not receiving security updates.<br>- Can’t be provisioned or reprovisioned. Attempts to provision a Cloud PC from this policy will fail with a **Windows Image out of Support** message. | Not applicable |
50+
51+
These status values for custom images also appear under the **OS support status** column on the **Device images** page.
52+
53+
## Provisioning policies
54+
55+
Starting on the end of support date, gallery images that use the expired OS won’t be selectable for newly created provisioning policies. The images also won’t be available for use when editing existing provisioning policies.
56+
57+
<!-- ########################## -->
58+
## Next steps
59+
60+
To change the device image for a provisioning policy, see [Edit provisioning policies](edit-provisioning-policy.md).

windows-365/enterprise/whats-new.md

Lines changed: 28 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ keywords:
77
author: ErikjeMS
88
ms.author: erikje
99
manager: dougeby
10-
ms.date: 11/03/2021
10+
ms.date: 11/30/2021
1111
ms.topic: reference
1212
ms.service: cloudpc
1313
ms.subservice:
@@ -47,6 +47,33 @@ Learn what new features are available in Windows 365 Enterprise.
4747
### Scripts
4848
-->
4949

50+
<!-- ########################## -->
51+
## Week of November 29, 2021 (Service release 2111)
52+
53+
<!-- vvvvvvvvvvvvvvvvvvvvvv -->
54+
### Device management
55+
56+
#### Operating system end of support status for Cloud PCs<!--36852572 -->
57+
58+
The **Provisioning policies** page has a new column: **Image status**. It tells you if the device image for each provisioning policy uses an operating system (OS) that is supported by Microsoft Windows security and other updates. For more information, see [Lifecycle policies and end of support for Cloud PC OS](end-of-support.md).
59+
60+
#### New documentation article: Optimize Zoom on a Windows 365 Cloud PC<!--37106382-->
61+
62+
We’ve just published a new help documentation article. For more information, see [Optimize Zoom on a Windows 365 Cloud PC](zoom-support.md).
63+
64+
<!-- vvvvvvvvvvvvvvvvvvvvvv -->
65+
### Device security
66+
67+
#### Two new security baseline settings for Windows 11 Cloud PCs<!--36989243 -->
68+
69+
Windows 365 Enterprise now supports the following Windows 11 security baseline settings:
70+
71+
- **Tamper Protection**: Helps protect Cloud PCs from bad actors bypassing security features like anti-virus protection.
72+
73+
- **Script Scanning**: Helps identify possible threats by intercepting scripts and scanning them before they’re run.
74+
75+
For more information about the security baseline updates for Windows 11, see [Windows 11 Security baseline](https://techcommunity.microsoft.com/t5/microsoft-security-baselines/windows-11-security-baseline/ba-p/2810772). For more information about setting security baselines for Cloud PCs, see [Deploy security baselines](deploy-security-baselines.md).
76+
5077
<!-- ########################## -->
5178
## Week of November 1, 2021 (Service release 2110)
5279

0 commit comments

Comments
 (0)