Skip to content

Commit 351473f

Browse files
committed
Merge branch 'main' into release-cm2206-tp
2 parents c4cb5d4 + b45092b commit 351473f

5 files changed

Lines changed: 5 additions & 5 deletions

File tree

memdocs/intune/protect/advanced-threat-protection-configure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -218,7 +218,7 @@ Further, for devices that run iOS/iPadOS (in Supervised Mode), the Defender for
218218
4. For **Platform**, select **iOS/iPadOS**
219219
5. For **Profile type**, select **Custom**, and then select **Create**.
220220
6. On the **Basics** page, enter a *Name* and *Description* (optional) for the profile, then choose **Next**.
221-
7. Enter a *Configuration profile name*, and select a file to .mobileconfig file to Upload.
221+
7. Enter a *Configuration profile name*, and select a `.mobileconfig` file to Upload.
222222
8. Select **Next** to open the **Scope tags** page. Scope tags are optional. Select **Next** to continue.
223223
9. On the **Assignments** page, select the groups that will receive this profile. For this scenario, it's a best practice to target **All Devices**. For more information on assigning profiles, see [Assign user and device profiles](../configuration/device-profile-assign.md).
224224

memdocs/intune/protect/compliance-custom-script.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ Before you can use [custom settings for compliance](../protect/compliance-use-cu
3333

3434
The discovery script:
3535

36-
- Is added to Intune before you create a compliance policy. After its added, it will be available to select when you create a compliance policy with custom settings.
36+
- Is added to Intune before you create a compliance policy. After it's added, it will be available to select when you create a compliance policy with custom settings.
3737
- Runs on a device that receives the compliance policy. The script evaluates the conditions of the JSON file you upload to the same policy.
3838
- Identifies one or more settings, as defined in the JSON, and returns a list of discovered values for those settings. A single script can be assigned to each policy, and supports discovery of multiple settings.
3939
- Must be compressed to output results in one line. For example: `$hash = @{ ModelName = "Dell"; BiosVersion = "1.24"; TPMChipPresent = $true}`

memdocs/intune/protect/privacy-data-store-process.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ After Intune [collects the data](privacy-data-collect.md), Intune follows the Da
3939

4040
Microsoft offers and operates Intune services in many regions worldwide. Intune respects the storage location elections made by the administrator for Customer Data.
4141

42-
For more information, see [Data Center Locations](/microsoft-365/enterprise/o365-data-locations?view=o365-worldwide#data-center-locations&preserve-view=true)
42+
For more information, see [Data Center Locations](/microsoft-365/enterprise/o365-data-locations?view=o365-worldwide#data-center-locations&preserve-view=true).
4343

4444
### Data residency option
4545

windows-365/enterprise/digital-forensics.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ ms.collection: M365-identity-device-management
3030

3131
# Digital forensics and Windows 365 Enterprise Cloud PCs
3232

33-
Just like physical devices, Windows 365 Enterprise Cloud PCs can be deployed, secured, and managed using [Microsoft Endpoint Manager](/mem/endpoint-manager-overview. As part of PC ownership, you may be asked to submit Cloud PCs to internal or third parties to perform digital forensics. Digital forensics is the science that addresses the recovery and investigation of digital data to support criminal investigations or civil proceedings.
33+
Just like physical devices, Windows 365 Enterprise Cloud PCs can be deployed, secured, and managed using [Microsoft Endpoint Manager](/mem/endpoint-manager-overview). As part of PC ownership, you may be asked to submit Cloud PCs to internal or third parties to perform digital forensics. Digital forensics is the science that addresses the recovery and investigation of digital data to support criminal investigations or civil proceedings.
3434

3535
To support these forensics, Windows 365 offers the ability to [place a Cloud PC under review](place-cloud-pc-under-review.md). This action will securely save a snapshot of the Cloud PC to the customer’s Azure Storage Account. When transferred to that account, the customer has complete ownership of the snapshot.
3636

windows-365/enterprise/place-cloud-pc-under-review.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ After setting up an Azure storage account with permissions as explained above, y
5959
1. Sign in to the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431) and select  **Devices** > **All Devices** > choose a device.
6060
![Screenshot of choose a device](./media/place-cloud-pc-under-review/choose-device.png)
6161

62-
2. Select the ellipses (****) > **Place cloud PC under review (Preview)**.)
62+
2. Select the ellipses (****) > **Place cloud PC under review (Preview)**.
6363
![Screenshot of place a Cloud PC under review](./media/place-cloud-pc-under-review/place-cloud-pc-under-review.png)
6464

6565
3. Select the Azure subscription and the Azure storage account to which the Windows 365 service was given **Storage Account Contributor** permissions.

0 commit comments

Comments
 (0)