You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: memdocs/autopilot/policy-conflicts.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,7 @@ author: greg-lindsay
13
13
ms.author: greglin
14
14
ms.reviewer: jubaptis
15
15
manager: dougeby
16
-
ms.date: 8/31/2021
16
+
ms.date: 12/08/2021
17
17
ms.collection: M365-modern-desktop
18
18
ms.topic: troubleshooting
19
19
---
@@ -36,7 +36,7 @@ Some policy settings can cause issues in some Windows Autopilot scenarios. These
36
36
|-------|---------------|
37
37
|[AppLocker CSP](/windows/client-management/mdm/applocker-csp)| The AppLocker CSP is not supported in the Enrollment Status Page as it triggers a reboot when a policy is applied or a deletion occurs. |
38
38
|Device restriction / [Password Policy](/windows/client-management/mdm/devicelock-csp)| The out-of-box experience (OOBE) or user desktop autologon can fail when a device reboots during the device Enrollment Status Page (ESP). This failure can occur when certain [DeviceLock policies](/windows/client-management/mdm/policy-csp-devicelock) are applied to a device. Such policies can include:<ul><li>Minimum password length and password complexity</li><li>Any similar group policy settings (including any that disable autologon)</li></ul>This possible failure is especially true for kiosk scenarios where passwords are automatically generated. |
39
-
| Windows Security Baseline / [Administrator elevation prompt behavior](/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions)<br><br>Windows Security Baseline / [Require admin approval mode for administrators](/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions)| More prompts may appear when modifying user account control (UAC) settings during the OOBE using the device Enrollment Status Page (ESP). Increased prompts are more likely if the device reboots after policies are applied. To work around this issue, the policies can be targeted to users instead of devices so that they apply later in the process. |
39
+
| Windows Security Baseline / [Administrator elevation prompt behavior](/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions)<br><br>Windows Security Baseline / [Require admin approval mode for administrators](/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions)<br><br>Windows Security Baseline / [Enable virtualization based security](/windows/client-management/mdm/policy-csp-deviceguard)| These policies require a reboot, as a result more prompts may appear when modifying user account control (UAC) settings during the OOBE using the device Enrollment Status Page (ESP). Increased prompts are more likely if the device reboots after policies are applied. To work around this issue, the policies can be targeted to users instead of devices so that they apply later in the process. |
40
40
| Device restrictions / Cloud and Storage / [Microsoft Account sign-in assistant](../intune/configuration/device-restrictions-windows-10.md#cloud-and-storage)| Setting this policy to "disabled" will disable the Microsoft Sign-in Assistant service (wlidsvc). This service is required by Windows Autopilot to obtain the Windows Autopilot profile. |
41
41
| Registry keys that affect Windows Autopilot for [pre-provisioned deployment](pre-provision.md)<br><br>**Registry path**:<br>`HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Automatic logon`|**Registry key**:<br>If the [AutoAdminLogon](/troubleshoot/windows-server/user-profiles-and-logon/turn-on-automatic-logon) registry key is set to `0` (disabled), this breaks Windows Autopilot pre-provisioning. |
42
42
|[MDM wins over Group Policy](/windows/client-management/mdm/policy-csp-controlpolicyconflict)| This policy allows the IT admin to control which policy will be used when both the MDM policy and its equivalent Group Policy (GP) are set on the device. |
Copy file name to clipboardExpand all lines: memdocs/intune/apps/app-configuration-managed-home-screen-app.md
+4-1Lines changed: 4 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -120,6 +120,7 @@ The following table lists the Managed Home Screen available configuration keys,
120
120
|-|-|-|-|-|
121
121
| Exit lock task mode password | string || Enter a 4-6-digit code to use to temporarily drop out of lock-task mode for troubleshooting. | ✔️ |
122
122
| Enable easy access debug menu | bool | FALSE | Turn this setting to True to access the debug menu from the Managed Settings app or from swipe-down while in Managed Home Screen. The debug menu is currently where the capability to exit kiosk mode lives, and is accessed by clicking the back button about 15 times. Keep this setting set to False to keep the entry point to debug menu only accessible via the back button. | ✔️ |
123
+
| Show device's name on MHS | bool | FALSE | Turn this setting to True to easily view the device's Intune portal "device name" property from the Managed Settings app or from swipe-down while in Managed Home Screen. When using app config, make sure to also include the string property "Device's name," which is auto-populated by Intune with the correct value. | ❌ |
123
124
| Enable MAX inactive time outside of MHS | bool | FALSE | Turn this setting to True to automatically re-launch Managed Home Screen after a set period of inactivity. The timer will only count inactive time and, when configured, will reset each time the user interacts with the device while outside of Managed Home Screen. Use **MAX inactive time outside MHS** to set the inactivity timer. By default, this setting is off. This setting can only be used if **Exit lock task mode password** has been configured. | ❌ |
124
125
| MAX inactive time outside MHS | integer | 180 | Set the maximum amount of inactive time, in seconds, that a user can spend outside of Managed Home Screen before it is automatically re-launched. By default, this configuration is set to 180 seconds. **Enable MAX inactive time outside of MHS** must be set to true to use this setting. | ❌ |
125
126
| Enable MAX time outside MHS | bool | FALSE | Turn this setting to True to automatically re-launch Managed Home Screen after a set period of time has passed. The timer will factor in both inactive and active time spent outside of Managed Home Screen. Use **MAX time outside MHS** to set the inactivity timer. By default, this setting is off. This setting can only be used if **Exit lock task mode password** has been configured. | ❌ |
@@ -135,7 +136,9 @@ The following table lists the Managed Home Screen available configuration keys,
135
136
| Enable show organization logo on sign in page | bool | TRUE | Turn this setting to True to use a company logo that will appear on the sign-in screen and the Session PIN screen. This setting is used with **Organization logo on sign in page** and can only be used if **Enable sign in** has been set to True. | ✔️ |
136
137
| Organization logo on sign in page | string || Allows you to brand your device with a logo of your choice on the Managed Home Screen sign-in screen and Session PIN screen. To use this setting, enter the URL of the image that you want set for the logo. This setting can only be used if **Enable show organization logo on sign in page** and **Enable sign in** have been set to True. | ✔️ |
137
138
| Enable session PIN | bool | FALSE | Turn this setting to True if you want end-users to get prompted to create a local Session PIN after they’ve successfully signed in to Managed Home Screen. The Session PIN prompt will appear before end-user gets access to the home screen, and can be used in conjunction with other features. The Session PIN lasts for the duration of a user’s sign-in, and is cleared upon sign-out. By default, this setting is off. This setting can only be used if **Enable sign in** has been set to True. | ✔️ |
138
-
| Complexity of session PIN | string || Choose whether the local session PIN should be "complex" or "simple". If you choose "complex," end-users will get prompted to create a PIN with alphanumeric characters. If you choose "simple," end-users will only be required to enter a numeric PIN. This setting can only be used if **Enable session PIN** and **Enable sign in** have been set to True. | ✔️ |
139
+
| Complexity of session PIN | string | | Choose whether the local session PIN should be **simple**, **complex**, or **alphanumeric complex**. If you choose **simple**, users will only be required to enter a numeric PIN. If you choose **complex**, users will get prompted to create a PIN with alphanumeric characters and no repeating (444) or ordered sequences (123, 432, 246) are allowed. Evaluation of repeating and sequential patterns begins at three (3) digits/characters. If you choose **alphanumeric complex**, then users will get prompted to create a PIN with alphanumeric characters, and at least one symbol or letter is required. No repeating (444) or ordered sequences (123, 432, 246) are allowed. Evaluation of repeating and sequential patterns begins at three (3) characters. The default value for this setting is one (1), where one (1) means that the user must have at least one character in their Session PIN. This setting can only be used if **Enable session PIN** and **Enable sign in** have been set to True. | ✔️ <p>NOTE: The **alphanumeric complex** option is only available in app config today. |
140
+
| Minimum length for session PIN | string || Define the minimum length a user's session PIN must adhere to. This can be used with any of the complexity values for session PIN. This setting can only be used if **Enable session PIN** and **Enable sign in** have been set to True. | ❌ |
141
+
| Maximum number of attempts for session PIN | string || Define the maximum number of times a user can attempt to enter their session PIN before getting automatically logged out from Managed Home Screen. The default value is zero (0), where zero (0) means the user gets infinite tries. This can be used with any of the complexity values for session PIN. This setting can only be used if **Enable session PIN** and **Enable sign in** have been set to True. | ❌ |
139
142
| Customer facing folder | Bool | FALSE | Use this specification with **Create Managed Folder for grouping apps** to create a folder that can’t be exited without a user entering their Session PIN. This setting can only be used if **Enable session PIN** and **Enable sign in** have been set to True. | ❌ |
140
143
| Require PIN code after returning from screensaver | bool | FALSE | Turn this setting True if you want to require end-users to enter their Session PIN to resume activity on Managed Home Screen after the screensaver has appeared. This setting can only be used if **Enable sign in** has been set to True. | ✔️ |
141
144
| Enable auto sign-out | bool | FALSE | Turn this setting to True to automatically sign current user out of Managed Home Screen after a specified period of inactivity. When used with Azure AD Shared device mode, users will also get signed out of all apps on the device that participate with Azure AD Shared device mode. By default, this setting is turned off. This setting can only be used if **Enable sign in** has been set to True. | ✔️ |
Copy file name to clipboardExpand all lines: memdocs/intune/fundamentals/whats-new.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -98,7 +98,7 @@ This feature is rolling out over the next week and should soon be available for
98
98
#### Enable app update priority for Managed Google Play apps<!-- 7810180 -->
99
99
You can set the update priority of Managed Google Play apps on dedicated, fully managed, and corporate-owned with a work profile Android Enterprise devices. Select **High Priority** to update an app as soon as the developer has published the update, regardless of charge status, Wi-Fi capability, or end user activity on the device. For related information, see [Add Managed Google Play apps to Android Enterprise devices with Intune](..\apps\apps-add-android-for-work.md).
100
100
101
-
#### Clear app data between sessions for Android Enterprise dedicated devices enrolled with shared device mode<!-- 8663319 -->
101
+
#### Clear app data between sessions for Android Enterprise dedicated devices enrolled with shared device mode (public preview)<!-- 8663319 -->
102
102
Using Intune, you can choose to clear app data for applications that have not integrated with Shared device mode to ensure user privacy between sign-in sessions. Users will be required to initiate a sign-out from an application that has integrated with AAD's Shared device mode in order for IT-specified apps to have their data cleared. This functionality will be available for Android Enterprise dedicated devices enrolled with shared device mode on Android 9 or later.
103
103
104
104
#### Export underlying discovered apps list data<!-- 9370255 -->
Copy file name to clipboardExpand all lines: memdocs/intune/remote-actions/remote-help.md
+4-1Lines changed: 4 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ keywords:
7
7
author: brenduns
8
8
ms.author: brenduns
9
9
manager: dougeby
10
-
ms.date: 12/08/2021
10
+
ms.date: 12/09/2021
11
11
ms.topic: how-to
12
12
ms.service: microsoft-intune
13
13
ms.subservice: remote-actions
@@ -40,6 +40,9 @@ Remote help uses Intune role-based access controls (RBAC) to set the level of ac
40
40
41
41
The remote help app is available from Microsoft to install on both devices enrolled with Intune and devices that aren’t enrolled. The app can also be deployed through Intune to your managed devices.
42
42
43
+
> [!NOTE]
44
+
> On 12/08/2021, the remote help installer was renamed from *remotehelp.exe* to *remotehelpinstaller.exe* to resolve issues with silent deployments. Although app functionality hasn't changed, we recommend using the same [*download link*](#download-remote-help) to download the updated version with the renamed installer. The installation command lines in this article have been updated to reflect the new installer file name.
45
+
43
46
## Remote help capabilities and requirements
44
47
45
48
The Remote help app supports the following capabilities:
Copy file name to clipboardExpand all lines: memdocs/intune/user-help/sign-in-to-the-company-portal.md
+3-2Lines changed: 3 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -36,11 +36,12 @@ Microsoft Intune helps organizations manage access to their internal apps, data,
36
36
The app is available for desktop (Windows and macOS) and mobile (Android and iOS) devices. You must have a work or school account through your organization to sign in to the app.
37
37
38
38
## Install app
39
-
Company Portal is available for Android, iOS, macOS, and Windows.
39
+
Intune Company Portal is available for Android, iOS, macOS, and Windows.
40
40
41
41
### Android
42
42
Install Company Portal for Android from these stores:
43
43
44
+
*[Portal AppStore](https://portal.facebook.com/help/467356237073256/)(Opens Portal help documentation)
*[Amazon Appstore for Android](https://www.amazon.com/Microsoft-Corporation-Intune-Company-Portal/dp/B092BCFLBJ/)
46
47
@@ -52,7 +53,7 @@ Google Play Store is not available in People's Republic of China. You can instal
52
53
Install Company Portal for iOS from the [Apple App Store](https://apps.apple.com/app/intune-company-portal/id719171358).
53
54
54
55
### macOS
55
-
Install Company Portal for macOS from [Enroll my Mac](https://go.microsoft.com/fwlink/?linkid=853070.) Selecting this link will immediately download the Company Portal installer package on your device.
56
+
Install Company Portal for macOS from [Enroll my Mac](https://go.microsoft.com/fwlink/?linkid=853070.). Selecting this link will immediately download the Company Portal installer package on your device.
56
57
57
58
### Windows
58
59
Install Company Portal for Windows from the [Microsoft Store](https://www.microsoft.com/p/company-portal/9wzdncrfj3pz?rtc=2&activetab=pivot:overviewtab).
Copy file name to clipboardExpand all lines: windows-365/business/get-started-windows-365-business.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -43,7 +43,7 @@ This article is for people who plan to buy and set up Windows 365 Business for t
43
43
44
44
There are no licensing prerequisites to set up Windows 365 Business.
45
45
46
-
For the best onboarding experience, please refer to the [setup troubleshooting guide](troubleshoot-windows-365-business.md) to make sure your environment preferences are optimized for Windows 365 Business. For example, the guide can help you if you are using multi-factor authentication, Conditional Access policies, or Intune in your environment.
46
+
For the best onboarding experience, please refer to the [setup troubleshooting guide](troubleshoot-windows-365-business.md) to make sure your environment preferences are optimized for Windows 365 Business. For example, the guide can help you if you are using multifactor authentication, Conditional Access policies, or Intune in your environment.
47
47
48
48
## Buy subscriptions
49
49
@@ -122,7 +122,7 @@ While on the Windows 365 home page, users can perform actions on their Cloud PCs
122
122
-**Restart**: Restarts the Cloud PC.
123
123
124
124
-**Reset**: Reset does the following:
125
-
- Reinstalls Windows 10.
125
+
- Reinstalls Windows (with the option to choose between Windows 11 and Windows 10).
### Windows 11 support for newly created Cloud PCs<!--35091970 -->
59
-
60
-
In a future update, Windows 365 Business Cloud PCs will be created with Windows 11 installed by default. Admins will be able to choose between Windows 10 and 11 for their organization's Cloud PCs. On windows365.microsoft.com, users will be able to easily see the difference between their Windows 10 and 11 Cloud PCs.
61
-
62
-
#### Manage Cloud PCs in the Microsoft 365 admin center and windows365.microsoft.com<!--36859306-->
63
-
64
-
You’ll be able to control organization-wide Cloud PC settings and device-level actions in the Microsoft 365 admin center and on windows365.microsoft.com.
56
+
## Upcoming features
65
57
66
-
-**Organizational defaults**: You’ll be able to choose defaults for operating system (Windows 10 or 11) and account type (Standard or Local Administrator).
67
-
-**Device level actions**: You’ll be able to use the following actions on any Cloud PC in your organization: Change account type, Restart, Reset, Rename, and Troubleshoot.
68
-
-**Other management actions**: You’ll be able to create and delete users, reset passwords, and manage licenses for Windows 365 Cloud PCs and Microsoft 365 products.
58
+
Check back here for announcements of upcoming features.
0 commit comments