Skip to content

Commit 2368377

Browse files
authored
Merge pull request #8409 from MicrosoftDocs/main
Publish main to live on 9/12 @ 10:30 am
2 parents 5f6f400 + a329450 commit 2368377

5 files changed

Lines changed: 5 additions & 10 deletions

File tree

memdocs/intune/protect/certificates-profile-scep.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -130,7 +130,7 @@ Devices that run Android Enterprise might require a PIN before SCEP can provisio
130130
- **CN={{UserName}}**: The user name of the user, such as janedoe.
131131
- **CN={{UserPrincipalName}}**: The user principal name of the user, such as [email protected].
132132
- **CN={{AAD_Device_ID}}**: An ID assigned when you register a device in Azure Active Directory (AD). This ID is typically used to authenticate with Azure AD.
133-
- **CN={{DeviceId}}**: An ID assigned when you enroll a device in Intune. *(not supported on Android Enterprise for Fully Managed, Dedicated, and Corporate-Owned Work Profile)*
133+
- **CN={{DeviceId}}**: An ID assigned when you enroll a device in Intune.
134134
- **CN={{SERIALNUMBER}}**: The unique serial number (SN) typically used by the manufacturer to identify a device.
135135
- **CN={{IMEINumber}}**: The International Mobile Equipment Identity (IMEI) unique number used to identify a mobile phone.
136136
- **CN={{OnPrem_Distinguished_Name}}**: A sequence of relative distinguished names separated by comma, such as *CN=Jane Doe,OU=UserAccounts,DC=corp,DC=contoso,DC=com*.
@@ -156,7 +156,7 @@ Devices that run Android Enterprise might require a PIN before SCEP can provisio
156156
Format options for the Subject name format include the following variables:
157157

158158
- **{{AAD_Device_ID}}** or **{{AzureADDeviceId}}** - Either variable can be used to identify a device by its Azure AD ID.
159-
- **{{DeviceId}}** - The Intune device ID *(not supported on Android Enterprise for Fully Managed, Dedicated, and Corporate-Owned Work Profile)*
159+
- **{{DeviceId}}** - The Intune device ID
160160
- **{{Device_Serial}}**
161161
- **{{Device_IMEI}}**
162162
- **{{SerialNumber}}**

memdocs/intune/protect/includes/security-config-mgt-prerequisites.md

Lines changed: 2 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: include file
44
author: brenduns
55
ms.service: microsoft-intune
66
ms.author: brenduns
7-
ms.date: 05/12/2022
7+
ms.date: 09/12/2022
88
ms.topic: include
99
---
1010
## Prerequisites
@@ -123,13 +123,8 @@ To support Microsoft Defender for Endpoint security configuration management thr
123123
> [!TIP]
124124
> Use pilot mode and the proper device tags to test and validate your rollout on a small number of devices. Without using pilot mode, any device that falls into the scope configured will automatically be enrolled.
125125
126-
1. Make sure the relevant users have permissions to manage endpoint security settings in Microsoft Endpoint Manager or grant those permissions by configuring a role in the Microsoft 365 Defender portal. Go to **Settings** > **Roles** > **Add item**:
127-
:::image type="content" source="../media/mde-security-integration/add-role-in-mde.png" alt-text="Create a new role in the Defender portal.":::
128-
> [!TIP]
129-
> You can modify existing roles and add the necessary permissions versus creating additional roles in Microsoft Defender for Endpoint
130-
1. When configuring the role, add users and be sure to select **Manage endpoint security settings in Microsoft Endpoint Manager**:
126+
1. Make sure the relevant users have permissions to manage endpoint security settings in Microsoft Endpoint Manager. If not already provided, request for your IT administrator to grant applicable users the Microsoft Endpoint Manager’s **Endpoint Security Manager** [built-in RBAC role](/mem/intune/fundamentals/role-based-access-control).
131127

132-
:::image type="content" source="../media/mde-security-integration/add-role.png" alt-text="Grant users permissions to manage settings.":::
133128
1. Sign in to the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431).
134129
1. Select **Endpoint security** > **Microsoft Defender for Endpoint**, and set **Allow Microsoft Defender for Endpoint to enforce Endpoint Security Configurations** to **On**.
135130

Binary file not shown.
-65.3 KB
Binary file not shown.

windows-365/enterprise/health-checks.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,7 @@ Every failed ANC or success with warning error state includes the technical deta
6464
- **First party app permissions exist on Azure virtual network**: Sufficient permissions exist on the Azure vNet.
6565
- **Environment and configuration is ready**: Underlying infrastructure is ready for provisioning to succeed.
6666
- **Intune enrollment restrictions allow Windows enrollment**: Verify that Intune enrollment restrictions are configured to allow Windows enrollment.
67-
- **Localization language package readiness**: Verify that the operating system and Microsoft 365 language packages can install. Also verify that the localization package download link is reachable.
67+
- **Localization language package readiness**: Verify that the operating system and Microsoft 365 language packages are reachable. Also verify that the localization package download link is reachable.
6868

6969
<!-- ########################## -->
7070
## Next steps

0 commit comments

Comments
 (0)