Skip to content

Commit 26407c8

Browse files
authored
Merge pull request #8259 from MicrosoftDocs/main
3:30 PM publish, 8/15/2022
2 parents fd0623a + 5949c95 commit 26407c8

4 files changed

Lines changed: 9 additions & 7 deletions

File tree

memdocs/intune/enrollment/create-device-platform-restrictions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -82,7 +82,7 @@ Since Intune supports two Android platforms, it's important to understand how OS
8282
- **Personally-owned**: Select **Allow** to permit devices to enroll and operate as personal devices.
8383
- **Device manufacturer** (Android): Enter a comma-separated list of the manufacturers that you want to block.
8484
- **Allow min/max range** (Android, Windows, iOS/iPadOS): Enter the minimum and maximum OS versions allowed to enroll. Supported version formats include:
85-
- Windows supports major.minor.build.rev for Windows 10 and Windows 11 only.
85+
- Windows supports major.minor.build.rev for Windows 10 and Windows 11.
8686
- Android device administrator and Android Enterprise work profile support major.minor.rev.build.
8787
- iOS/iPadOS supports major.minor.rev.
8888

memdocs/intune/protect/endpoint-protection-macos.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ keywords:
77
author: brenduns
88
ms.author: brenduns
99
manager: dougeby
10-
ms.date: 06/21/2021
10+
ms.date: 08/15/2022
1111
ms.topic: reference
1212
ms.service: microsoft-intune
1313
ms.subservice: protect
@@ -48,11 +48,11 @@ For more information about Apple FileVault settings, see [FDEFileVault](https://
4848
- **Not configured** (*default*)
4949
- **Yes**
5050

51-
When *Enable FileVault* is set to *Yes*, a personal recovery key is generated for the device during encryption and the following settings apply to that key:
51+
When *Enable FileVault* is set to *Yes*, a personal recovery key is generated for the device during encryption, and the following settings apply to that key:
5252

5353
- **Escrow location description of personal recovery key**
5454

55-
Specify a short message to the user that explains how and where they can retrieve their personal recovery key. This text is inserted into the message the user sees on their sign in screen when prompted to enter their personal recovery key if a password is forgotten.
55+
Specify a short message to the user that explains how and where they can retrieve their personal recovery key. This text is inserted into the message the user sees on their sign-in screen when prompted to enter their personal recovery key if a password is forgotten.
5656

5757
- **Personal recovery key rotation**
5858

@@ -113,12 +113,12 @@ Use the firewall to control connections per-application, rather than per-port. U
113113

114114
**Apps allowed**: Configure a list of apps that are allowed to receive incoming connections.
115115

116-
- **Add apps by bundle ID**: Enter the [bundle ID](../configuration/bundle-ids-built-in-ios-apps.md) of the app. Apple's web site has a list of [built-in Apple apps](https://support.apple.com/HT208094).
116+
- **Add apps by bundle ID**: Enter the *bundle ID* of the app. On macOS devices, you can get the bundle ID using the Terminal app and AppleScript: `osascript -e 'id of app "AppName"`. Apple's web site has a list of [built-in Apple apps](https://support.apple.com/HT208094).
117117
- **Add store app**: Select a store app you previously added in Intune. For more information, see [Add apps to Microsoft Intune](../apps/apps-add.md).
118118

119119
**Apps blocked**: Configure a list of apps that have incoming connections blocked.
120120

121-
- **Add apps by bundle ID**: Enter the [bundle ID](../configuration/bundle-ids-built-in-ios-apps.md) of the app. Apple's web site has a list of [built-in Apple apps](https://support.apple.com/HT208094).
121+
- **Add apps by bundle ID**: Enter the *bundle ID* of the app. On macOS devices, you can get the bundle ID using the Terminal app and AppleScript: `osascript -e 'id of app "AppName"`. Apple's web site has a list of [built-in Apple apps](https://support.apple.com/HT208094).
122122
- **Add store app**: Select a store app you previously added in Intune. For more information, see [Add apps to Microsoft Intune](../apps/apps-add.md).
123123

124124
- **Enable stealth mode**

memdocs/intune/protect/includes/security-config-mgt-prerequisites.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -54,6 +54,8 @@ Policies for Microsoft Defender for Endpoint security management are supported f
5454
- Windows Server 2019 (with [KB5006744](https://support.microsoft.com/topic/october-19-2021-kb5006744-os-build-17763-2268-preview-e043a8a3-901b-4190-bb6b-f5a4137411c0))
5555
- Windows Server 2022 (with [KB5006745](https://support.microsoft.com/topic/october-26-2021-kb5006745-os-build-20348-320-preview-8ff9319a-19e7-40c7-bbd1-cd70fcca066c))
5656

57+
Security management for Microsoft Defender for Endpoint will not work on non-persistent desktops, like Virtual Desktop Infrastructure (VDI) clients or Windows Virtual Desktops (WVD).
58+
5759
### Licensing and subscriptions
5860

5961
To use security management for Microsoft Defender for Endpoint, you need:

memdocs/intune/remote-actions/device-inventory.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -104,7 +104,7 @@ Depending on the carrier used by the devices, not all details might be collected
104104
|Ethernet MAC|The primary Ethernet MAC address for the device. For macOS devices with no ethernet, the device will report the Wi-Fi MAC address.|macOS|
105105
|ICCID|The Integrated Circuit Card Identifier, which is a SIM card's unique identification number.|Windows, iOS/iPadOS, Android<br/><br/>ICCID isn't inventoried on Android Enterprise Dedicated, Fully Managed, or Corporate-Owned Work Profile devices.|
106106
|EID|The eSIM identifier, which is a unique identifier for the embedded SIM (eSIM) for cellular devices that have an eSIM.|iOS/iPadOS|
107-
|Wi-Fi IPv4 address|The device's IPv4 address.|Android Enterprise fully managed, dedicated and corp-owned work profiles.<br/><br/>**NOTE**: Any change to IPv4 or subnet ID may take up to 8 hours to reflect in MEM portal from the time that network changes on device.|
107+
|Wi-Fi IPv4 address|The device's IPv4 address.|Windows, Android Enterprise fully managed, dedicated and corp-owned work profiles.<br/><br/>**NOTE**: Any change to IPv4 or subnet ID may take up to 8 hours to reflect in MEM portal from the time that network changes on device.|
108108
|Wi-Fi subnet ID|The device's subnet ID.|Android Enterprise fully managed, dedicated and corp-owned work profiles.<br/><br/>**NOTE**: Any change to IPv4 or subnet ID may take up to 8 hours to reflect in MEM portal from the time that network changes on device.|
109109
|Enrolled date|The date and time that the device was enrolled in Intune.|Windows, iOS/iPadOS, Android|
110110
|Last contact|The date and time that the device last connected to Intune.|Windows, iOS/iPadOS, Android|

0 commit comments

Comments
 (0)