Skip to content

Commit 24f03fc

Browse files
authored
Merge pull request #6885 from MicrosoftDocs/main
Publish Intune 2202 release
2 parents cfc7d63 + 6e6d41f commit 24f03fc

17 files changed

Lines changed: 230 additions & 114 deletions

memdocs/analytics/work-from-anywhere.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Work from anywhere report in Endpoint analytics
33
titleSuffix: Microsoft Endpoint Manager
44
description: The Work from anywhere report in Endpoint analytics provides insights to help your end users be productive from anywhere.
5-
ms.date: 11/15/2021
5+
ms.date: 02/23/2022
66
ms.prod: configuration-manager
77
ms.technology: configmgr-analytics
88
ms.topic: conceptual
@@ -72,6 +72,8 @@ Cloud identity provides users with many productivity benefits including device-w
7272

7373
Cloud provisioning provides a simpler initial provisioning experience for Windows PCs than the native experience. It reduces the number of screens in the Out Of Box Experience (OOBE) and provides defaults, to ensure the device is correctly provisioning from the factory or on reset. The **Cloud provisioning** metric measures the percentage of machines that are either Windows 365 Cloud PCs or Windows Intune devices that are both registered and have a deployment profile created for Autopilot. The recommended remediation actions are to register and create deployment profiles for existing devices in Windows Autopilot using Microsoft [Intune](../autopilot/enrollment-autopilot.md).
7474

75+
> [!NOTE]
76+
> Cloud provisioned devices that aren't enrolled into Endpoint analytics won't be populated.
7577
7678
:::image type="content" source="media/8668496-cloud-provisioning.png" alt-text="Screenshot of the cloud provisioning tab showing the device list" lightbox="media/8668496-cloud-provisioning.png":::
7779

memdocs/configmgr/core/servers/deploy/configure/configure-discovery-methods.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -280,7 +280,7 @@ To enable discovery on an existing **Cloud Management** Azure service:
280280
1. In the **Discovery** tab, check the box to **Enable Azure Active Directory Group Discovery**, then select **Settings**.
281281
1. Select **Add** under the **Discovery Scopes** tab.
282282
- You can modify the **Polling Schedule** in the other tab.
283-
1. Select one or more user groups. You can **Search** by name and choose if you want to see **Security groups only**.
283+
1. Select one or more user groups. You can **Search** by name.
284284
- You'll be prompted to sign in to Azure when you select **Search** the first time.
285285
1. Select **OK** when you finish selecting groups.
286286
1. Once discovery finishes running, you can browse your Azure AD user groups in the **Users** node.

memdocs/configmgr/core/servers/deploy/install/command-line-options-for-setup.md

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -43,6 +43,16 @@ Disable user input during setup, but display the setup wizard. Only use this opt
4343

4444
Run a site reset. This action resets the database and service accounts for the site. For more information, see [Run a site reset](../../manage/modify-your-infrastructure.md#bkmk_reset).
4545

46+
## `/SQLMOVE`
47+
48+
Move the site database. This action moves the site database to a new instance of SQL Server on the same computer, or to a different computer that runs a supported version of SQL Server. For more information, see [Modify the site database configuration](../../manage/modify-your-infrastructure.md#bkmk_dbconfig).
49+
50+
Provide the SQL server name, database name and instance name in the following format:
51+
52+
`/SQLMOVE <SQL Server FQDN>:<Database Name>:<SSB Port>`
53+
54+
`/SQLMOVE <SQL Server FQDN>:<InstanceName>\<Database Name>:<SSB Port>`
55+
4656
## `/TESTDBUPGRADE`
4757

4858
Run a test on a backup of the site database to make sure that the database can upgrade.

memdocs/configmgr/core/servers/deploy/install/command-line-script-file.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -105,6 +105,7 @@ Include the following keys in the `SQLConfigOptions` section to install a site:
105105
| `SQLSSBPort` | No | Port number | The SQL Server Service Broker (SSB) port. By default, SSB uses TCP port 4022. |
106106
| `SQLDataFilePath` | No | Local directory path | An alternate location to create the database .mdb file. |
107107
| `SQLLogFilePath` | No | Local directory path | An alternate location to create the database .ldf log file. |
108+
| `AGBackupShare` | No | Network share path | The network location for sharing database backups when creating the site database in an Availability Group. The backup share is only needed if automatic seeding is not set. |
108109

109110
### `CloudConnectorOptions` section for site install
110111

memdocs/intune/configuration/group-policy-analytics.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ author: MandiOhlinger
88

99
ms.author: mandia
1010
manager: dougeby
11-
ms.date: 02/03/2022
11+
ms.date: 02/23/2022
1212
ms.topic: how-to
1313
ms.service: microsoft-intune
1414
ms.subservice: configuration
@@ -140,11 +140,14 @@ Currently, the Group Policy analytics (preview) tool only supports non-ADMX sett
140140

141141
- **Ready for migration**: The policy has a matching setting in Intune, and is ready to be migrated to Intune.
142142
- **Not supported**: The policy doesn't have a matching setting. Typically, policy settings that show this status aren't exposed to MDM providers, including Intune.
143-
- **Deprecated**: The policy may apply to older Windows versions, and no longer used in Windows 10/11.
143+
- **Deprecated**: The policy may apply to older Windows versions, older Microsoft Edge versions, and more policies that aren't used anymore.
144+
145+
> [!NOTE]
146+
> When the Microsoft Intune product team updates the mapping logic, your imported GPOs are automatically updated. You don't need to reimport your GPOs.
144147
145148
3. Select the **Reports** tab > **Group policy migration readiness**. In this report, you can:
146149

147-
- See the number of settings in your GPO that can be configure in a device configuration profile. It also shows if the settings can be in a custom profile, aren't supported, or are deprecated.
150+
- See the number of settings in your GPO that can be configured in a device configuration profile. It also shows if the settings can be in a custom profile, aren't supported, or are deprecated.
148151
- Filter the report output using the **Migration Readiness**, **Profile type**, and **CSP Name** filters.
149152
- Select **Generate report** or **Generate again** to get current data.
150153
- See the list of settings in your GPO.

memdocs/intune/configuration/settings-catalog.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ keywords:
77
author: MandiOhlinger
88
ms.author: mandia
99
manager: dougeby
10-
ms.date: 02/03/2022
10+
ms.date: 02/23/2022
1111
ms.topic: how-to
1212
ms.service: microsoft-intune
1313
ms.subservice: configuration
@@ -39,6 +39,7 @@ This feature applies to:
3939

4040
- **macOS**
4141

42+
- **Configure device settings**. Device settings that are directly generated from Apple Profile-Specific Payload Keys are continually being added. To learn more about these keys, see, [Profile-Specific Payload Keys](https://developer.apple.com/documentation/devicemanagement/profile-specific_payload_keys) (opens Apple's website).
4243
- **Configure Microsoft Edge version 77 and newer**. Previously, you had to [use a property list (plist) file](/deployedge/configure-microsoft-edge-on-mac) (opens another Microsoft website). For a list of the settings you can configure, see [Microsoft Edge - Policies](/DeployEdge/microsoft-edge-policies) (opens another Microsoft website). Be sure macOS is listed as a supported platform. If some settings aren't available in the settings catalog, then it's recommended to continue using the [preference file](preference-file-settings-macos.md).
4344
- **Configure Microsoft Defender for Endpoint**. Previously, you had to [use a property list (plist) file](/microsoft-365/security/defender-endpoint/mac-install-with-intune) (opens another Microsoft website). For a list of the settings you can configure, see [Set preferences for Microsoft Defender for Endpoint on macOS](/microsoft-365/security/defender-endpoint/mac-preferences) (opens another Microsoft website). Be sure macOS is listed as a supported platform. If some settings aren't available in the settings catalog, then it's recommended to continue using the [preference file](preference-file-settings-macos.md).
4445

@@ -188,7 +189,7 @@ When you create the policy, you have two policy types: **Settings catalog** and
188189

189190
The **Templates** include a logical group of settings, such as device restrictions, kiosk, and more. Use this option if you want to use these groupings to configure your settings.
190191

191-
For Windows, the **Settings catalog** lists all the available settings. If you want to see all the available Firewall settings, or all the available BitLocker settings, then use this option. Also, use this option if you're looking for specific settings.
192+
The **Settings catalog** lists all the available settings. If you want to see all the available Firewall settings, or all the available BitLocker settings, then use this option. Also, use this option if you're looking for specific settings.
192193

193194
## Next steps
194195

0 commit comments

Comments
 (0)