Skip to content

Commit 1f73635

Browse files
authored
Merge pull request #8522 from MicrosoftDocs/main
Publish main to live on 9/23 @ 10:30 am
2 parents 9dee27c + 0018be5 commit 1f73635

9 files changed

Lines changed: 18 additions & 11 deletions

File tree

memdocs/configmgr/core/plan-design/changes/deprecated/removed-and-deprecated-cmfeatures.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -84,6 +84,7 @@ The following features are no longer supported. In some cases, they're no longer
8484
|Task sequences: <br /> - OSDPreserveDriveLetter <br /><br /> During an operating system deployment, by default, Windows Setup now determines the best drive letter to use (typically C:). If you want to specify a different drive to use, you can change the location in the Apply Operating System task sequence step. Go to the **Select the location where you want to apply this operating system** setting. Select **Specific logical drive letter** and choose the drive that you want to use. |June 20, 2016 |Version 1606 |
8585
|[Network Access Protection](#network-access-protection) (NAP) - as found in System Center 2012 Configuration Manager|July 10, 2015|Version 1511|
8686
|[Out of Band Management](#out-of-band-management) - as found in System Center 2012 Configuration Manager|October 16, 2015|Version 1511|
87+
|[System Center Configuration Manager Management Pack - for System Center Operations Manager is not available for download |October 16, 2015|Version 1511|
8788

8889
### WINS
8990

memdocs/intune/configuration/settings-catalog-printer-provisioning.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ keywords:
77
author: MandiOhlinger
88
ms.author: mandia
99
manager: dougeby
10-
ms.date: 07/21/2022
10+
ms.date: 09/22/2022
1111
ms.topic: how-to
1212
ms.service: microsoft-intune
1313
ms.subservice: configuration
@@ -38,7 +38,7 @@ Using the settings catalog in Intune, you can create a printer policy, and deplo
3838
This feature applies to:
3939

4040
- Windows 11
41-
- Windows 10 and later
41+
- Windows 10 21H2 with [July 2022 update](https://support.microsoft.com/topic/july-12-2022-kb5015807-os-builds-19042-1826-19043-1826-and-19044-1826-8c8ea8fe-ec83-467d-86fb-a2f48a85eb41) and later
4242

4343
This article shows you how to create a Universal Print policy in Microsoft Intune. To learn more about Universal Print and onboarding, go to [What is Universal Print](/universal-print/fundamentals/universal-print-whatis) and [Set up Universal Print](/universal-print/fundamentals/universal-print-getting-started).
4444

memdocs/intune/fundamentals/deployment-guide-enrollment-android.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -294,7 +294,7 @@ There are some situations when you must use Device Administrator enrollment:
294294
- Android Enterprise requires access to Google services. Google services may not be available because of geography, or because of the device manufacturer. For example:
295295

296296
- There are places where Google services aren’t available, like China. In this situation, use Android device administrator enrollment.
297-
- Some devices are based on Android, but don't have access to Google Services, such as Amazon Fire tablets. In this situation, use Android device administrator enrollment.
297+
- Some devices are based on Android, but don't have access to Google Services, such as Microsoft Teams Android devices and Amazon Fire tablets. In this situation, use Android device administrator enrollment.
298298

299299
- Android OS versions older than 5.0 must use Android device administrator enrollment. Android Enterprise enrollment isn't an option.
300300

memdocs/intune/protect/app-based-conditional-access-intune.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -67,7 +67,7 @@ In this example, the admin has applied app protection policies to the Outlook ap
6767

6868
1. The user tries to authenticate to Azure AD from the Outlook app.
6969

70-
2. The user gets redirected to the app store to install a broker app when trying to authenticate for the first time. The broker app can be the Microsoft Authenticator for iOS, or either the Microsoft Authenticator or Microsoft Company portal for Android devices.
70+
2. The user gets redirected to the app store to install a broker app when trying to authenticate for the first time. The broker app can be the Microsoft Authenticator for iOS, or Microsoft Company portal for Android devices.
7171

7272
If users try to use a native e-mail app, they'll be redirected to the app store to then install the Outlook app.
7373

memdocs/intune/protect/includes/security-config-mgt-prerequisites.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -118,7 +118,8 @@ To support Microsoft Defender for Endpoint security configuration management thr
118118

119119
1. Sign in to [Microsoft 365 Defender portal](https://security.microsoft.com/) and go to **Settings** > **Endpoints** > **Configuration Management** > **Enforcement Scope** and enable the platforms for security settings management:
120120
:::image type="content" source="../media/mde-security-integration/enable-mde-settings-management-defender.png" alt-text="Enable Microsoft Defender for Endpoint settings management in the Microsoft 365 Defender portal.":::
121-
1. Configure Pilot Mode and Configuration Manager authority settings to fit your organization needs:
121+
1. Configure Pilot Mode and Configuration Manager authority settings to fit your organization's needs.
122+
1. Uncheck both **Windows Client devices** and **Windows Server devices** to be able to use Pilot Mode using tagging:
122123
:::image type="content" source="../media/mde-security-integration/pilot-CMAuthority-mde-settings-management-defender.png" alt-text="Configure Pilot mode for Endpoint settings management in the Microsoft 365 Defender portal.":::
123124
> [!TIP]
124125
> Use pilot mode and the proper device tags to test and validate your rollout on a small number of devices. Without using pilot mode, any device that falls into the scope configured will automatically be enrolled.
-4.24 KB
Loading

memdocs/intune/protect/microsoft-tunnel-prerequisites.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -405,15 +405,15 @@ To use the readiness tool:
405405

406406
You can run the script from any Linux server that is on the same network as the server you plan to install, allowing network admins to run it and troubleshoot network issues independently.
407407

408-
2. To validate your network configuration, run the script with the following commands to first set the execute permissions on the script and then to validate the Tunnel can connect to the correct endpoints:
408+
2. To validate your network and Linux configuration, run the script with the following commands to set the execute permissions on the script, to validate the Tunnel can connect to the correct endpoints, and then to check for the presence of utilities that Tunnel uses:
409409

410410
- `sudo chmod +x ./mst-readiness`
411-
- `sudo ./mst-readiness network`
412411

413-
The second command runs the following actions and reports on success or error for both:
412+
- `sudo ./mst-readiness network` - This command runs the following actions and reports on success or error for both:
413+
- Tries to connect to each Microsoft endpoint the tunnel will use.
414+
- Checks that the required ports are open in your firewall.
414415

415-
- Tries to connect to each Microsoft endpoint the tunnel will use.
416-
- Checks that the required ports are open in your firewall.
416+
- `sudo ./mst-readiness utils` - This command validates that utilities that are used by Tunnel like Docker or Podman and ip_tables are available.
417417

418418
3. To validate that the account you’ll use to install Microsoft Tunnel has the required roles and permissions to complete enrollment, run the script with the following command line: `./mst-readiness account`
419419

memdocs/intune/protect/toc.yml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -237,6 +237,11 @@ items:
237237
items:
238238
- name: Symantec and Intune integration
239239
href: skycure-mtd-connector-integration.md
240+
- name: Set up Trend Micro Mobile Security as a Service
241+
href: trend-micro-mobile-threat-defense-connector.md
242+
items:
243+
- name: Trend Micro Mobile Security as a Service and Intune integration
244+
href: trend-micro-mtd-connector-integration.md
240245
- name: Set up Wandera
241246
href: wandera-mtd-connector.md
242247
items:

windows-365/enterprise/in-development.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,7 @@ You'll be able to set up system alerts and automated emails to be notified when
8787
### Cloud PC utilization report<!--40636545-->
8888
A new report will be available for Cloud PCs. The **Cloud PC utilization** report will show how many hours users have been connected to their Cloud PCs. Information for individual Cloud PCs and aggregated data will be shown.
8989

90-
### Cloud PC wit connection quality issues report<!--40636545-->
90+
### Cloud PC with connection quality issues report<!--40636545-->
9191
A new report will be available for Cloud PCs. The **Cloud PCs with connection quality issues** report will show information for round-trip time, available bandwidth, and remoting sign-in time. Information for individual Cloud PCs and aggregated data will be shown.
9292

9393
### Review Cloud PC connectivity health checks and errors in Microsoft Endpoint Manager admin center<!--38469622 -->

0 commit comments

Comments
 (0)