You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: memdocs/intune/enrollment/create-device-platform-restrictions.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -82,7 +82,7 @@ Since Intune supports two Android platforms, it's important to understand how OS
82
82
-**Personally-owned**: Select **Allow** to permit devices to enroll and operate as personal devices.
83
83
-**Device manufacturer** (Android): Enter a comma-separated list of the manufacturers that you want to block.
84
84
-**Allow min/max range** (Android, Windows, iOS/iPadOS): Enter the minimum and maximum OS versions allowed to enroll. Supported version formats include:
85
-
- Windows supports major.minor.build.rev for Windows 10 and Windows 11 only.
85
+
- Windows supports major.minor.build.rev for Windows 10 and Windows 11.
86
86
- Android device administrator and Android Enterprise work profile support major.minor.rev.build.
Copy file name to clipboardExpand all lines: memdocs/intune/protect/endpoint-protection-macos.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ keywords:
7
7
author: brenduns
8
8
ms.author: brenduns
9
9
manager: dougeby
10
-
ms.date: 06/21/2021
10
+
ms.date: 08/15/2022
11
11
ms.topic: reference
12
12
ms.service: microsoft-intune
13
13
ms.subservice: protect
@@ -48,11 +48,11 @@ For more information about Apple FileVault settings, see [FDEFileVault](https://
48
48
-**Not configured** (*default*)
49
49
-**Yes**
50
50
51
-
When *Enable FileVault* is set to *Yes*, a personal recovery key is generated for the device during encryption and the following settings apply to that key:
51
+
When *Enable FileVault* is set to *Yes*, a personal recovery key is generated for the device during encryption, and the following settings apply to that key:
52
52
53
53
-**Escrow location description of personal recovery key**
54
54
55
-
Specify a short message to the user that explains how and where they can retrieve their personal recovery key. This text is inserted into the message the user sees on their signin screen when prompted to enter their personal recovery key if a password is forgotten.
55
+
Specify a short message to the user that explains how and where they can retrieve their personal recovery key. This text is inserted into the message the user sees on their sign-in screen when prompted to enter their personal recovery key if a password is forgotten.
56
56
57
57
-**Personal recovery key rotation**
58
58
@@ -113,12 +113,12 @@ Use the firewall to control connections per-application, rather than per-port. U
113
113
114
114
**Apps allowed**: Configure a list of apps that are allowed to receive incoming connections.
115
115
116
-
-**Add apps by bundle ID**: Enter the [bundle ID](../configuration/bundle-ids-built-in-ios-apps.md) of the app. Apple's web site has a list of [built-in Apple apps](https://support.apple.com/HT208094).
116
+
-**Add apps by bundle ID**: Enter the *bundle ID* of the app. On macOS devices, you can get the bundle ID using the Terminal app and AppleScript: `osascript -e 'id of app "AppName"`. Apple's web site has a list of [built-in Apple apps](https://support.apple.com/HT208094).
117
117
-**Add store app**: Select a store app you previously added in Intune. For more information, see [Add apps to Microsoft Intune](../apps/apps-add.md).
118
118
119
119
**Apps blocked**: Configure a list of apps that have incoming connections blocked.
120
120
121
-
-**Add apps by bundle ID**: Enter the [bundle ID](../configuration/bundle-ids-built-in-ios-apps.md) of the app. Apple's web site has a list of [built-in Apple apps](https://support.apple.com/HT208094).
121
+
-**Add apps by bundle ID**: Enter the *bundle ID* of the app. On macOS devices, you can get the bundle ID using the Terminal app and AppleScript: `osascript -e 'id of app "AppName"`. Apple's web site has a list of [built-in Apple apps](https://support.apple.com/HT208094).
122
122
-**Add store app**: Select a store app you previously added in Intune. For more information, see [Add apps to Microsoft Intune](../apps/apps-add.md).
Copy file name to clipboardExpand all lines: memdocs/intune/protect/includes/security-config-mgt-prerequisites.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -54,6 +54,8 @@ Policies for Microsoft Defender for Endpoint security management are supported f
54
54
- Windows Server 2019 (with [KB5006744](https://support.microsoft.com/topic/october-19-2021-kb5006744-os-build-17763-2268-preview-e043a8a3-901b-4190-bb6b-f5a4137411c0))
55
55
- Windows Server 2022 (with [KB5006745](https://support.microsoft.com/topic/october-26-2021-kb5006745-os-build-20348-320-preview-8ff9319a-19e7-40c7-bbd1-cd70fcca066c))
56
56
57
+
Security management for Microsoft Defender for Endpoint will not work on non-persistent desktops, like Virtual Desktop Infrastructure (VDI) clients or Windows Virtual Desktops (WVD).
58
+
57
59
### Licensing and subscriptions
58
60
59
61
To use security management for Microsoft Defender for Endpoint, you need:
Copy file name to clipboardExpand all lines: memdocs/intune/remote-actions/device-inventory.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -104,7 +104,7 @@ Depending on the carrier used by the devices, not all details might be collected
104
104
|Ethernet MAC|The primary Ethernet MAC address for the device. For macOS devices with no ethernet, the device will report the Wi-Fi MAC address.|macOS|
105
105
|ICCID|The Integrated Circuit Card Identifier, which is a SIM card's unique identification number.|Windows, iOS/iPadOS, Android<br/><br/>ICCID isn't inventoried on Android Enterprise Dedicated, Fully Managed, or Corporate-Owned Work Profile devices.|
106
106
|EID|The eSIM identifier, which is a unique identifier for the embedded SIM (eSIM) for cellular devices that have an eSIM.|iOS/iPadOS|
107
-
|Wi-Fi IPv4 address|The device's IPv4 address.|Android Enterprise fully managed, dedicated and corp-owned work profiles.<br/><br/>**NOTE**: Any change to IPv4 or subnet ID may take up to 8 hours to reflect in MEM portal from the time that network changes on device.|
107
+
|Wi-Fi IPv4 address|The device's IPv4 address.|Windows, Android Enterprise fully managed, dedicated and corp-owned work profiles.<br/><br/>**NOTE**: Any change to IPv4 or subnet ID may take up to 8 hours to reflect in MEM portal from the time that network changes on device.|
108
108
|Wi-Fi subnet ID|The device's subnet ID.|Android Enterprise fully managed, dedicated and corp-owned work profiles.<br/><br/>**NOTE**: Any change to IPv4 or subnet ID may take up to 8 hours to reflect in MEM portal from the time that network changes on device.|
109
109
|Enrolled date|The date and time that the device was enrolled in Intune.|Windows, iOS/iPadOS, Android|
110
110
|Last contact|The date and time that the device last connected to Intune.|Windows, iOS/iPadOS, Android|
0 commit comments