Skip to content

Commit 2d2d5d0

Browse files
authored
Merge pull request #6198 from MicrosoftDocs/main
11/22/2021 PM Publish
2 parents 90a4e21 + 88d034e commit 2d2d5d0

53 files changed

Lines changed: 218 additions & 101 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

memdocs/configmgr/core/plan-design/configs/support-for-windows-11.md

Lines changed: 20 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Support for Windows 11
33
titleSuffix: Configuration Manager
44
description: Learn about the Windows 11 versions that are supported as clients with Configuration Manager.
5-
ms.date: 11/08/2021
5+
ms.date: 11/22/2021
66
ms.prod: configuration-manager
77
ms.technology: configmgr-core
88
ms.topic: conceptual
@@ -131,6 +131,25 @@ Use one of the following options to work around this issue:
131131

132132
- Add users to the authentication exclusion list. For more information, see [Configure SMS Provider authentication](../security/configure-security.md#sms-provider-authentication).
133133

134+
### Offline servicing
135+
136+
<!-- 12661534 -->
137+
138+
When you [apply software updates to an image](../../../osd/get-started/manage-operating-system-images.md#apply-software-updates-to-an-image) for Windows 11, the process will fail. You'll see errors similar to the following entries in the offline servicing log file, `OfflineServicingMgr.log`:
139+
140+
```log
141+
InstallUpdate returned code 0x8007007b
142+
Failed to install update with ID 16787962 on the image. ErrorCode = 123
143+
```
144+
145+
This issue is because DISM doesn't support the `.cab` files.
146+
147+
To work around this issue, you can manually service the image:
148+
149+
1. Download the update directly from the Microsoft Update Catalog. For example, `https://www.catalog.update.microsoft.com/Search.aspx?q=KB5007215`
150+
1. Use DISM to manually inject the downloaded `.msu` update file into the Windows 11 image. For more information, see [Add updates to a Windows image](/windows-hardware/manufacture/desktop/servicing-the-image-with-windows-updates-sxs).
151+
1. Manually update the image file in the package source. Then update it on distribution points.
152+
134153
## Next steps
135154

136155
[Support for the Windows ADK](support-for-windows-adk.md)

memdocs/intune/apps/android-deployment-scenarios-app-protection-work-profiles.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,9 @@ ms.reviewer: chrisbal
2424
ms.suite: ems
2525
search.appverid: MET150
2626
#ms.tgt_pltfrm:
27-
ms.custom: OS=Android;intune-azure;workProfilesUpdate
27+
ms.collection:
28+
- Android
29+
ms.custom: intune-azure;workProfilesUpdate
2830

2931
---
3032

memdocs/intune/apps/app-configuration-managed-home-screen-app.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,8 +25,10 @@ ms.reviewer: chmaguir
2525
ms.suite: ems
2626
search.appverid: MET150
2727
#ms.tgt_pltfrm:
28-
ms.custom: OS=Android;intune-azure
29-
ms.collection: M365-identity-device-management
28+
ms.collection:
29+
- M365-identity-device-management
30+
- Android
31+
ms.custom: intune-azure
3032
---
3133

3234
# Configure the Microsoft Managed Home Screen app for Android Enterprise

memdocs/intune/apps/app-configuration-policies-outlook.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22,8 +22,10 @@ ms.reviewer: smithre4
2222
ms.suite: ems
2323
search.appverid: MET150
2424
#ms.tgt_pltfrm:
25-
ms.custom: OS=Android;intune-azure
26-
ms.collection: M365-identity-device-management
25+
ms.collection:
26+
- M365-identity-device-management
27+
- Android
28+
ms.custom: intune-azure
2729
---
2830

2931
# Manage messaging collaboration access by using Outlook for iOS and Android with Microsoft Intune

memdocs/intune/apps/app-configuration-policies-use-android.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,8 +26,10 @@ ms.reviewer: chrisbal
2626
ms.suite: ems
2727
search.appverid: MET150
2828
#ms.tgt_pltfrm:
29-
ms.custom: OS=Android;intune-azure
30-
ms.collection: M365-identity-device-management
29+
ms.collection:
30+
- M365-identity-device-management
31+
- Android
32+
ms.custom: intune-azure
3133
---
3234

3335
# Add app configuration policies for managed Android Enterprise devices

memdocs/intune/apps/app-configuration-policies-use-ios.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,8 +25,10 @@ ms.reviewer: manchen
2525
ms.suite: ems
2626
search.appverid: MET150
2727
#ms.tgt_pltfrm:
28-
ms.custom: OS=iOS/iPadOS;intune-azure
29-
ms.collection: M365-identity-device-management
28+
ms.custom: intune-azure
29+
ms.collection:
30+
- M365-identity-device-management
31+
- iOS/iPadOS
3032
---
3133

3234
# Add app configuration policies for managed iOS/iPadOS devices

memdocs/intune/apps/app-configuration-vpn-ae.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,8 +25,9 @@ ms.reviewer: tycast
2525
ms.suite: ems
2626
search.appverid: MET150
2727
#ms.tgt_pltfrm:
28-
ms.custom: OS=Android;
29-
ms.collection: M365-identity-device-management
28+
ms.collection:
29+
- M365-identity-device-management
30+
- Android
3031
---
3132

3233
# Use a VPN and per-app VPN policy on Android Enterprise devices in Microsoft Intune

memdocs/intune/apps/app-protection-policies-configure-windows-10.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,8 +25,10 @@ ms.reviewer: scottduf
2525
ms.suite: ems
2626
search.appverid: MET150
2727
#ms.tgt_pltfrm:
28-
ms.custom: OS=Windows;seodec18
29-
ms.collection: M365-identity-device-management
28+
ms.custom: seodec18
29+
ms.collection:
30+
- M365-identity-device-management
31+
- Windows
3032
---
3133

3234
# Get ready for Windows Information Protection in Windows 10/11

memdocs/intune/apps/app-protection-policy-settings-android.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,8 +25,10 @@ ms.reviewer: demerson
2525
ms.suite: ems
2626
search.appverid: MET150
2727
#ms.tgt_pltfrm:
28-
ms.custom: OS=Android;intune-azure
29-
ms.collection: M365-identity-device-management
28+
ms.collection:
29+
- M365-identity-device-management
30+
- Android
31+
ms.custom: intune-azure
3032
---
3133
# Android app protection policy settings in Microsoft Intune
3234
This article describes the app protection policy settings for Android devices. The policy settings that are described can be [configured](app-protection-policies.md) for an app protection policy on the **Settings** pane in the portal.

memdocs/intune/apps/app-provisioning-profile-ios.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,8 +25,10 @@ ms.reviewer: manchen
2525
ms.suite: ems
2626
search.appverid: MET150
2727
#ms.tgt_pltfrm:
28-
ms.custom: OS=iOS/iPadOS;intune-azure
29-
ms.collection: M365-identity-device-management
28+
ms.custom: intune-azure
29+
ms.collection:
30+
- M365-identity-device-management
31+
- iOS/iPadOS
3032
---
3133

3234
# Use iOS app provisioning profiles to prevent your apps from expiring

0 commit comments

Comments
 (0)