Skip to content

Commit 3c725db

Browse files
authored
Merge branch 'main' into EnrollmentRestrctionsGuide
2 parents d2e7168 + a166675 commit 3c725db

9 files changed

Lines changed: 140 additions & 16 deletions

File tree

memdocs/autopilot/autopilot-mbr.md

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -180,10 +180,6 @@ To reregister an Autopilot device from Intune, an IT Admin would:
180180
2. Navigate to Device enrollment > Windows enrollment > Devices > Import.
181181
3. Click the **Import** button to upload a csv file containing the device ID of the device to be reregistered. The device ID was the 4K HH captured by the PowerShell script or OA3 tool described previously in this document.
182182

183-
The following video provides a good overview of how to (re)register devices via MSfB.<br>
184-
185-
> [!VIDEO https://www.youtube.com/embed/IpLIZU_j7Z0]
186-
187183
### Reregister from MPC
188184

189185
To reregister an Autopilot device from MPC, an OEM or CSP would:

memdocs/intune/enrollment/toc.yml

Lines changed: 11 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -31,14 +31,23 @@ items:
3131
displayName: COD
3232
- name: Incomplete user enrollment report
3333
href: enrollment-report-company-portal-abandon.md
34-
- name: Restrictions
35-
href: enrollment-restrictions-set.md
3634
- name: Terms and conditions
3735
href: terms-and-conditions-create.md
3836
- name: Intune and Azure AD device limits
3937
href: device-limit-intune-azure.md
4038
- name: How-to guides
4139
items:
40+
- name: Set enrollment restrictions
41+
href: enrollment-restrictions-set.md
42+
- name: Add device enrollment manager
43+
href: device-enrollment-manager-enroll.md
44+
- name: Configure device categories
45+
href: device-group-mapping.md
46+
- name: Get Apple MDM push certificate
47+
href: apple-mdm-push-certificate-get.md
48+
- name: Require multi-factor authentication
49+
href: multi-factor-authentication.md
50+
displayName: mfa; multifactor
4251
- name: Set up Windows enrollment
4352
items:
4453
- name: Windows enrollment methods

memdocs/intune/fundamentals/filters-device-properties.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ keywords:
77
author: MandiOhlinger
88
ms.author: mandia
99
manager: dougeby
10-
ms.date: 02/10/2022
10+
ms.date: 08/08/2022
1111
ms.topic: conceptual
1212
ms.service: microsoft-intune
1313
ms.subservice: fundamentals
@@ -39,6 +39,8 @@ This article describes the different [device properties](#device-properties) and
3939

4040
## Device properties
4141

42+
You can use the following device properties in your filter rules:
43+
4244
- **Device Name**: Create a filter rule based on the Intune device name property. Enter a string value for the device's full name (using `-eq`, `-ne`, `-in`, `-notIn` operators), or partial value (using `-startswith`, `-contains`, `-notcontains` operators).
4345

4446
Examples:

windows-365/enterprise/TOC.yml

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -29,8 +29,12 @@ items:
2929
href: customer-permissions.md
3030
- name: Device configuration with MEM
3131
href: device-configuration.md
32-
- name: Encryption
33-
href: encryption.md
32+
- name: Security
33+
items:
34+
- name: Windows 365 security
35+
href: security.md
36+
- name: Encryption
37+
href: encryption.md
3438
- name: Privacy and personal data
3539
href: privacy-personal-data.md
3640
- name: How-to guides

windows-365/enterprise/known-issues-enterprise.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -53,6 +53,13 @@ Upgrading an existing Cloud PC from Windows 10 to Windows 11 using the Settings
5353
1. Edit the related provisioning policy to change the gallery image to Windows 11.
5454
2. Reprovision the Cloud PC.
5555

56+
## In-place Windows updgrade may change computer name
57+
58+
Upgrading an existing Cloud PC between release versions of Windows 10 to Windows 11 may cause the computer name to be changed to a name with a prefix of "pps" while leaving the Intune device name unchanged.
59+
60+
**Troubleshooting steps**: Find and manage the Cloud PC in Microsoft Endpoint Manager by using the unchanged Intune device name, either through the **Devices > All devices** list or the **Devices > Windows 365 > All Cloud PCs** list.
61+
62+
5663
## Windows 365 provisioning fails<!--38483005-->
5764

5865
Windows 365 provisioning failures may occur because both:

windows-365/enterprise/report-remoting-connection.md

Lines changed: 8 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ keywords:
77
author: ErikjeMS
88
ms.author: erikje
99
manager: dougeby
10-
ms.date: 08/30/2021
10+
ms.date: 08/08/2022
1111
ms.topic: overview
1212
ms.service: cloudpc
1313
ms.subservice:
@@ -57,13 +57,13 @@ The **Remoting connection** tab lists the following information:
5757
- Average = 100-200 milliseconds
5858
- Poor = more than 200 milliseconds
5959

60-
**Sign in time (sec)** is the total time users take to connect to the Cloud PC. Times are given for the most recent sign in time (p95 (Last)) and the Median sign in time. The times for the ratings are:
60+
**Sign in time (sec)** is the time taken for traffic from users' devices to reach Cloud PC and return. This metric is an indicator of the quality of the connection and can be used to determine the user’s experience. Values displayed are for the median time of the most recent reading of the metric’s 95th percentile value (p95 (Last)). A rating is provided for these values based on the criteria below. The times for the ratings are:
6161

6262
- Good = 0-30 seconds
6363
- Average = 30-60 seconds
6464
- Poor = more than 60 seconds
6565

66-
**Insights and recommendations** suggests actions that you can take to improve your scores.
66+
**Insights and recommendations** provide information about the actions that you can take to improve scores for specific Cloud PCs that have poor or average ratings.
6767

6868
![Screenshot of using the remoting connection tab](./media/report-remoting-connection/remoting-connection-tab.png)
6969

@@ -75,13 +75,16 @@ You can review the **Round trip time** and **Sign in time** for each Cloud PC mo
7575

7676
## Device performance tab
7777

78-
You can review the **Round trip time** and **Sign in time** for each Cloud PC device in your organization.
78+
You can review a list of the **Round trip time** and **Sign in time** values for all the Cloud PC devices in your organization.
7979

8080
![Screenshot of using the device performance tab](./media/report-remoting-connection/device-performance-tab.png)
8181

8282
## Device history
8383

84-
When you select on a particular device in one of the reports, you'll see specific information for that device.
84+
Select a device in one of the reports to see a daily aggregate bar chart for that device over the last 14 days. Days that have no values are excluded from the chart. Hover over individual days to see values at the bottom of the chart.
85+
86+
> [!NOTE]
87+
> There may be days when users have signed in but the graph does not display a value. This is caused by the method the graph uses to calculate some edge cases than can result in incorrect data.
8588
8689
![Screenshot of using the device history](./media/report-remoting-connection/device-history.png)
8790

windows-365/enterprise/requirements.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ Windows 365 manages the capacity and availability of underlying Azure resources
8181
- US Central
8282
- US East
8383
- US East 2
84-
- US West 2
84+
- US West 2 (Restricted, contact support)
8585
- US West 3
8686
- US South central
8787
- Asia Southeast

windows-365/enterprise/security.md

Lines changed: 94 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,94 @@
1+
---
2+
# required metadata
3+
title: Overview of security concepts in Windows 365
4+
titleSuffix:
5+
description: Learn about security concepts in Windows 365.
6+
keywords:
7+
author: ErikjeMS
8+
ms.author: erikje
9+
manager: dougeby
10+
ms.date: 07/20/2022
11+
ms.topic: overview
12+
ms.service: cloudpc
13+
ms.subservice:
14+
ms.localizationpriority: high
15+
ms.technology:
16+
ms.assetid:
17+
18+
# optional metadata
19+
20+
#ROBOTS:
21+
#audience:
22+
23+
ms.reviewer: chrimo
24+
ms.suite: ems
25+
search.appverid:
26+
#ms.tgt_pltfrm:
27+
ms.custom: intune-azure; get-started
28+
ms.collection: M365-identity-device-management
29+
---
30+
31+
# Windows 365 security
32+
33+
Windows 365 provides an end-to-end connection flow for users to do their work effectively and securely. Windows 365 is built with [Zero Trust](/security/zero-trust/zero-trust-overview) in mind, providing the foundation for you to implement controls to better secure your environment across the 6 pillars of Zero Trust. You can implement Zero Trust controls for the following categories:
34+
35+
- Securing the access to the Cloud PC
36+
- This aligns with securing the **Identity**, where you can place additional measures on who can access the Cloud PC and under which conditions.
37+
- Securing the Cloud PC device itself
38+
- This aligns with securing the **Endpoint**, where you can place additional measures on the Cloud PC devices since that is the device being used to access organizational data.
39+
- Securing the Cloud PC data and other data available while using the Cloud PC
40+
- This aligns with securing the **Data**, where you can place additional measures on the data itself or on how the Cloud PC user access the data.
41+
42+
Take a look at the sections below to better understand the components and features available to you to secure your Cloud PC environment.
43+
44+
## Secure Cloud PC access
45+
46+
The first consideration for securing your environment is to secure access to the Cloud PC.
47+
48+
As described in [identity and authentication](/windows-365/enterprise/identity-authentication#authentication), there are two authentication challenges to access the Cloud PC:
49+
50+
- The Windows 365 service.
51+
- The Cloud PC.
52+
53+
The primary control for securing access is by using Azure Active Directory (Azure AD) Conditional Access to conditionally grant access to the Windows 365 service. To secure access to the Cloud PC, see [set conditional access policies](/windows-365/enterprise/set-conditional-access-policies).
54+
55+
## Secure Cloud PC devices
56+
57+
The second consideration for securing your environment is to secure the Cloud PC device itself.
58+
59+
### Security features enabled by default
60+
61+
All new Cloud PCs have the following security components enabled by default:
62+
63+
- **vTPM**: Short for virtual Trusted Platform Module, a vTPM provides Cloud PCs their own dedicate TPM instance that acts as a secure vault for keys and measurements. For more information, see [vTPM](/azure/virtual-machines/trusted-launch#vtpm).
64+
- **Secure Boot**: Secure Boot is a feature that will prevent the Windows operating system from booting if untrusted rootkits or boot kits are installed on the machine. For more information, see [secure boot](/azure/virtual-machines/trusted-launch#secure-boot).
65+
66+
With both security components enabled, Windows 365 supports enabling the following Windows security features:
67+
68+
- Hypervisor Code Integrity (HVCI)
69+
- [Microsoft Defender Credential Guard](/windows/security/identity-protection/credential-guard/credential-guard-manage)
70+
71+
### Security features requiring specific Cloud PC SKUs or configuration
72+
73+
The following security components are enabled by default on specific Cloud PC SKUs or configurations:
74+
75+
- **Virtualization-based workloads**
76+
- **Description**: Virtualization-based workloads typically require the Windows device to enable the Hyper-V feature and run the workloads in an isolated space, to protect the Windows OS from any security threats.
77+
- **Security features supported**:
78+
- [Microsoft Defender Application Guard](/windows/security/threat-protection/microsoft-defender-application-guard/md-app-guard-overview)
79+
- [Windows Sandbox](/windows/security/threat-protection/windows-sandbox/windows-sandbox-overview)
80+
- **Required configuration**: Cloud PC must have 8 vCPU and 32 GB RAM. See [set up virtualization-based workloads support](nested-virtualization.md#requirements) for more information.
81+
82+
## Secure Cloud PC data
83+
84+
The third consideration for securing your environment is to secure the Cloud PC data and other data that is made available by using the Cloud PC.
85+
86+
### Security of Cloud PC data
87+
88+
The data of the Cloud PC data itself is secured through encryption. For more details, see [data encryption in Windows 365](/windows-365/enterprise/encryption).
89+
90+
### Security of data available on the Cloud PC
91+
92+
Securing the data available to users on their Cloud PCs should be no different than securing the data available to users on work-assigned Windows PCs, with the caveat that the Cloud PC is being accessed through Remote Desktop Protocol (RDP).
93+
94+
To manage RDP features available to the user during their Cloud PC connection, see [manage RDP device redirections for Cloud PCs](/windows-365/enterprise/manage-rdp-device-redirections).

windows-365/enterprise/whats-new.md

Lines changed: 10 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ keywords:
77
author: ErikjeMS
88
ms.author: erikje
99
manager: dougeby
10-
ms.date: 08/04/2022
10+
ms.date: 08/08/2022
1111
ms.topic: reference
1212
ms.service: cloudpc
1313
ms.subservice:
@@ -48,6 +48,15 @@ Learn what new features are available in Windows 365 Enterprise.
4848
### End user experience
4949
-->
5050

51+
<!-- ########################## -->
52+
## Week of August 8, 2022
53+
54+
### Documentation
55+
56+
#### New documentation article: Windows 365 security
57+
58+
We’ve published a new help documentation article. For more information, see [Windows 365 security](security.md).
59+
5160
<!-- ########################## -->
5261
## Week of July 25, 2022
5362

0 commit comments

Comments
 (0)