Skip to content

Commit 33dc5d2

Browse files
author
Angela Fleischmann
authored
Merge pull request #7690 from MicrosoftDocs/main
Publish 05/26/2022 3:30 PM PT
2 parents f4d893a + 2807bc8 commit 33dc5d2

2 files changed

Lines changed: 8 additions & 37 deletions

File tree

memdocs/intune/protect/certificates-pfx-configure.md

Lines changed: 6 additions & 35 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ keywords:
55
author: brenduns
66
ms.author: brenduns
77
manager: dougeby
8-
ms.date: 05/03/2022
8+
ms.date: 05/26/2022
99
ms.topic: how-to
1010
ms.service: microsoft-intune
1111
ms.subservice: protect
@@ -128,37 +128,6 @@ To authenticate a device with VPN, WiFi, or other resources, a device needs a ro
128128

129129
For guidance, see [Install and configure the Certificate Connector for Microsoft Intune](certificate-connector-install.md).
130130

131-
<!-- Remainder is deprecated content, now covered by the install of the new certificate connector>
132-
133-
Before you begin, [review requirements for the connector](certificate-connectors.md) and ensure your environment and your Windows server is ready to support the connector.
134-
135-
1. Sign in to the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431).
136-
137-
2. Select **Tenant administration** > **Connectors and tokens** > **Certificate connectors** > **+ Add**.
138-
139-
3. Select *Download the certificate connector software* for the connector for PKCS #12, and save the file to a location you can access from the server where you're going to install the connector.
140-
141-
:::image type="content source="./media/certificates-pfx-configure/download-connector.png" alt-text="Microsoft Intune Connector download.":::
142-
143-
4. After the download completes, sign in to the server and run the installer (PfxCertificateConnectorBootstrapper.exe).
144-
- When you accept the default installation location, the connector installs to `Program Files\Microsoft Intune\PFXCertificateConnector`.
145-
- The connector service runs under the local system account. If a proxy is required for internet access, confirm that the local service account can access the proxy settings on the server.
146-
147-
5. The PFX Certificate Connector for Microsoft Intune opens the **Enrollment** tab after installation. To enable the connection to Intune, **Sign In**, and enter an account with Azure global administrator or Intune administrator permissions. This account must have a license for Intune.
148-
149-
> [!WARNING]
150-
> By default, in Windows Server **IE Enhanced Security Configuration** is set to **On** which can cause issues with the sign-in to Office 365.
151-
152-
6. Select the **CA Account** tab, and then enter credentials for an account that has the Issue and Manage Certificates permission on your issuing Certificate Authority. These credentials will be used to perform certificate issuance and certificate revocation on the Certificate Authority. (Prior to the PFX certificate connector version 6.2008.60.612, these credentials were used only for certificate revocation.)
153-
154-
**Apply** your changes.
155-
156-
7. Close the window.
157-
158-
8. In the Microsoft Endpoint Manager admin center, go back to **Tenant administration** > **Connectors and tokens** > **Certificate connectors**. In a few moments, a green check mark appears and the connection status updates. The connector server can now communicate with Intune.
159-
160-
-->
161-
162131
## Create a trusted certificate profile
163132

164133
1. Sign in to the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431).
@@ -195,9 +164,11 @@ Before you begin, [review requirements for the connector](certificate-connectors
195164

196165
8. Select **Next**.
197166

198-
9. In **Assignments**, select the user or device group(s) that will be assigned the profile. For more granularity, see [Create filters in Microsoft Intune](https://go.microsoft.com/fwlink/?linkid=2150376) and apply them by selecting *Edit filter*. Plan to deploy this certificate profile to the same groups that receive the PKCS certificate profile. For more information on assigning profiles, see [Assign user and device profiles](../configuration/device-profile-assign.md).
167+
9. In **Assignments**, select the user or device group(s) that will be assigned the profile. For more granularity, see [Create filters in Microsoft Intune](https://go.microsoft.com/fwlink/?linkid=2150376) and apply them by selecting *Edit filter*.
199168

200-
Select **Next**.
169+
Plan to deploy this certificate profile to the same groups that receive the PKCS certificate profile, and that recieve a configuration profile like a Wi-Fi profile that makes use of the certificate. For more information on assigning profiles, see [Assign user and device profiles](../configuration/device-profile-assign.md).
170+
171+
Select **Next**.
201172

202173
10. (*Applies to Windows 10/11 only*) In **Applicability Rules**, specify applicability rules to refine the assignment of this profile. You can choose to assign or not assign the profile based on the OS edition or version of a device.
203174

@@ -257,7 +228,7 @@ Before you begin, [review requirements for the connector](certificate-connectors
257228

258229
8. Select **Next**.
259230

260-
9. In **Assignments**, select the user or groups that will receive your profile. Plan to deploy this certificate profile to the same groups that receive the trusted certificate profile. For more information on assigning profiles, see [Assign user and device profiles](../configuration/device-profile-assign.md).
231+
9. In **Assignments**, select the user or groups that will receive your profile. Plan to deploy this certificate profile to the same groups that receive the trusted certificate profile, and that receive a configuration profile like a Wi-Fi profile that makes use of the certificate. For more information on assigning profiles, see [Assign user and device profiles](../configuration/device-profile-assign.md).
261232

262233
Select **Next**.
263234

windows-365/enterprise/rdp-shortpath-public-networks.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ ms.collection: M365-identity-device-management
3030

3131
# Use RDP Shortpath for public networks (preview) with Windows 365 
3232

33-
You can now use Remote Desktop Protocol (RDP) Shortpath for public networks with your Windows 365 Cloud PCs. RPD Shortpath for public networks can provide another connection path for improved Cloud PC connectivity, especially in suboptimal network conditions.
33+
You can now use Remote Desktop Protocol (RDP) Shortpath for public networks with your Windows 365 Cloud PCs. RDP Shortpath for public networks can provide another connection path for improved Cloud PC connectivity, especially in suboptimal network conditions.
3434

3535
## Requirements
3636

@@ -66,7 +66,7 @@ For more information about RDP Shortpath benefits, see [Key benefits](/azure/vir
6666

6767
## RDP Shortpath connection process
6868

69-
When using RPD Shortpath, the connection with the Cloud PC proceeds as follows:
69+
When using RDP Shortpath, the connection with the Cloud PC proceeds as follows:
7070

7171
1. The RDP connection establishes a TCP-based connection using the reverse connect transport through the Gateway (in the same way as it does for connectivity without RDP Shortpath).
7272
2. If RDP Shortpath is enabled on the session host (Cloud PC), the service creates a UDP socket on all viable network interfaces.

0 commit comments

Comments
 (0)