Skip to content

Commit 5175496

Browse files
committed
Merge branch 'main' of https://github.com/microsoftdocs/memdocs-pr into 13816763-mde-security-configuration-ga
2 parents b5f0648 + ccc7745 commit 5175496

7 files changed

Lines changed: 20 additions & 17 deletions

File tree

memdocs/configmgr/osd/deploy-use/debug-task-sequence.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Debug a task sequence
33
titleSuffix: Configuration Manager
44
description: Use the task sequence debugging tool to troubleshoot a task sequence.
5-
ms.date: 04/08/2022
5+
ms.date: 05/04/2022
66
ms.prod: configuration-manager
77
ms.technology: configmgr-osd
88
ms.topic: how-to
@@ -91,7 +91,7 @@ The **Task Sequence Variables** window shows the current values for all variable
9191
> [!Note]
9292
> Some task sequence variables are for internal use only, and not listed in the reference documentation.
9393
94-
The task sequence debugger continues to run after a [Restart Computer](../understand/task-sequence-steps.md#BKMK_RestartComputer) step, but you need to recreate any break points. Even though the task sequence may not require it, since the debugger requires user interaction, you need to sign in to Windows to continue. If you don't sign in after one hour to continue debugging, the task sequence fails.
94+
The task sequence debugger continues to run after a [Restart Computer](../understand/task-sequence-steps.md#BKMK_RestartComputer) step. The debugger keeps your break points after restart.<!-- 5012509 --> Even though the task sequence may not require it, since the debugger requires user interaction, you need to sign in to Windows to continue. If you don't sign in after one hour to continue debugging, the task sequence fails.
9595

9696
It also steps into a child task sequence with the [Run Task Sequence](../understand/task-sequence-steps.md#child-task-sequence) step. The debugger window shows the steps of the child task sequence along with the main task sequence.
9797

memdocs/configmgr/tenant-attach/prerequisites.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -40,6 +40,8 @@ Microsoft Endpoint Manager is an integrated solution for managing all of your de
4040
- Tenant sync to Intune
4141
- Device sync to Intune
4242
- Device actions in the Microsoft Endpoint Manager admin center
43+
44+
- The geographic location of the Azure tenant and the service connection point should be the same.
4345

4446
- At least one Intune license for you as the administrator to access the Microsoft Endpoint Manager admin center. <!--10254915-->
4547

memdocs/intune/protect/includes/security-config-mgt-prerequisites.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -142,7 +142,12 @@ Microsoft Defender for Endpoint supports several options to onboard devices. For
142142

143143
## Co-existence with Microsoft Endpoint Configuration Manager
144144

145-
When using Configuration Manager, the best path for management of security policy is using [Configuration Manager tenant attach](/mem/configmgr/tenant-attach/endpoint-security-get-started). In some environments it may be desired to use Security Management for Microsoft Defender for Endpoint. When using Security Management for Microsoft Defender for Endpoint with Configuration Manager, endpoint security policy should be isolated to a single control plane. Controlling policy through both channels will create the opportunity for conflicts and undesired results.
145+
In some environments it might be desired to use Security Management for Microsoft Defender for Endpoint with [Configuration Manager tenant attach](/mem/configmgr/tenant-attach/endpoint-security-get-started). If you use both, you’ll need to control policy through a single channel, as using more than one channel creates the opportunity for conflicts and undesired results.
146+
147+
To support this, configure the *Manage Security settings using Configuration Manager* toggle to *Off*. Sign in to the [Microsoft 365 Defender portal](https://security.microsoft.com/) and go to **Settings** > **Endpoints** > **Configuration Management** > **Enforcement Scope**:
148+
149+
:::image type="content" source="../media/mde-security-integration/disable-configuration-manager-toggle.png" alt-text="Screen shot of the Defender portal showing the Manage Security settings using Configuration Manager toggle set to Off.":::
150+
146151

147152
## Create Azure AD Groups
148153

memdocs/intune/protect/mde-security-integration.md

Lines changed: 8 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
---
22
# required metadata
33

4-
title: Use Microsoft Defender for Endpoint Security Configuration Management in Microsoft Endpoint manager
4+
title: Use Intune to manage Microsoft Defender for Endpoint Security on devices not enrolled with Microsoft Intune
55
description: Use Intune profiles to manage security settings for Microsoft Defender for Endpoint on devices that register in your Azure Active Directory.
66
keywords:
77
author: brenduns
88
ms.author: brenduns
99
manager: dougeby
10-
ms.date: 04/21/2022
10+
ms.date: 05/04/2022
1111
ms.topic: how-to
1212
ms.service: microsoft-intune
1313
ms.subservice: protect
@@ -46,7 +46,7 @@ This scenario extends the Microsoft Endpoint Manager Endpoint Security surface t
4646

4747
## Monitor status
4848

49-
Status and reports for policies targeted at devices in this channel are available from the policy node under Endpoint security in the Microsoft Endpoint Manager admin center.
49+
Status and reports for policies that target devices in this channel are available from the policy node under Endpoint security in the Microsoft Endpoint Manager admin center.
5050

5151
Drill in to the policy type and then select the policy to view its status. The following policy types support MDE security configuration:
5252

@@ -64,36 +64,32 @@ When you select a policy, you'll see information about the device check-in statu
6464

6565
### Assignment Filters and Security Management for Microsoft Defender for Endpoint
6666

67-
Assignment filters are not supported for devices communicating through the Microsoft Defender for Endpoint channel. While assignment filters can be added to a policy that could be targeted at these devices, the device will ignore assignment filters. For assignment filter support, the device must be enrolled in to Microsoft Endpoint Manager.
67+
Assignment filters aren't supported for devices communicating through the Microsoft Defender for Endpoint channel. While assignment filters can be added to a policy that could be targeted at these devices, the device will ignore assignment filters. For assignment filter support, the device must be enrolled in to Microsoft Endpoint Manager.
6868

6969
### Deleting and removing devices
7070

7171
Devices that are using this flow will be unable to be deleted from the Microsoft Endpoint Manager admin center. The enrollment state is driven from Microsoft Defender for Endpoint, and deleting them from the admin center would only cause them to be removed temporarily. If devices need to be removed from management, they should be removed from the scope of Configuration Management in the Security Center. Once removed, that change will be propagated across services.
7272

7373
### Unable to enable the Security Management for Microsoft Defender for Endpoint workload in Endpoint Security
7474

75-
Most initial provisioning flows are typically completed by an Administrator of both services (such as a Global Administrator). There are some scenarios where Role-based Administration is used to customize the permissions of administrators. Today, those delegated the *Endpoint Security Manager* role may not have the necessary permissions to enable this feature. We will address this in a future release.
76-
77-
### Co-existence with Microsoft Endpoint Configuration Manager
78-
79-
When using Configuration Manager, the best path for management of security policy is using the [Configuration Manager tenant attach](../../configmgr/tenant-attach/endpoint-security-get-started.md). In some environments it may be desired to use Security Management for Microsoft Defender for Endpoint. When using Security Management for Microsoft Defender for Endpoint with Configuration Manager, endpoint security policy should be isolated to a single control plane. Controlling policy through both channels will create the opportunity for conflicts and undesired results.
75+
Most initial provisioning flows are typically completed by an Administrator of both services (such as a Global Administrator). There are some scenarios where Role-based Administration is used to customize the permissions of administrators. Today, individuals who are delegated the *Endpoint Security Manager* role might not have the necessary permissions to enable this feature.
8076

8177
### Active Directory joined devices
8278

83-
Devices that are joined to Active Directory will use their **existing infrastructure** to complete the Hybrid Azure Active Directory join process. While the Defender for Endpoint component will start this process, the join action uses your Federation provider or Azure Active Directory Connect (AAD Connect) to complete the join. Review [Plan your hybrid Azure Active Directory join implementation](/azure/active-directory/devices/hybrid-azuread-join-plan) to learn more about configuring your environment.
79+
Devices that are joined to Active Directory will use their **existing infrastructure** to complete the Hybrid Azure Active Directory join process. While the Defender for Endpoint component will start this process, the join action uses your Federation provider or Azure Active Directory Connect (Azure AD Connect) to complete the join. Review [Plan your hybrid Azure Active Directory join implementation](/azure/active-directory/devices/hybrid-azuread-join-plan) to learn more about configuring your environment.
8480

8581
To troubleshoot Azure Active Directory onboarding issues, see [Troubleshoot Security Configuration Management Azure Active Directory onboarding issues](/microsoft-365/security/defender-endpoint/troubleshoot-security-config-mgt).
8682

8783
### Unsupported security settings
8884

89-
The following security settings are pending deprecation. The Security Management for Microsoft Defender for Endpoint flow does not support these settings:
85+
The following security settings are pending deprecation. The Security Management for Microsoft Defender for Endpoint flow doesn't support these settings:
9086

9187
- Expedite telemetry reporting frequency (under **Endpoint Detection and Response**)
9288
- AllowIntrusionPreventionSystem (under **Antivirus**)
9389

9490
### Managing security configurations on domain controllers
9591

96-
Currently, devices are not supported to complete a Hybrid Join to Azure Active Directory. Since an Azure Active Directory trust is required, domain controllers aren't currently supported. We are looking at ways to add support in the future.
92+
Currently, devices are not supported to complete a Hybrid Join to Azure Active Directory. Since an Azure Active Directory trust is required, domain controllers aren't currently supported. We're looking at ways to add this support.
9793

9894
### Non-persistent VDI environments
9995

18.7 KB
Loading

windows-365/enterprise/create-azure-network-connection.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ To create an ANC, you must:
5252
## Create an ANC
5353

5454
1. Sign in to the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), select **Devices** > **Windows 365** (under **Provisioning**) > **Azure network connection** > **Create**.
55-
2. Depending on the type of ANC you want to create, choose **Azure AD Join (preview)** or **Hybrid Azure AD Join**.
55+
2. Depending on the type of ANC you want to create, choose **Azure AD Join** or **Hybrid Azure AD Join**.
5656
![Screenshot of create connection dropdown](./media/create-azure-network-connection/create-connection-dropdown.png)
5757
3. On the **Network details** page, enter a **Name** for the new connection. The connection name must be unique within the customer tenant.
5858
![Screenshot of Name field](./media/create-azure-network-connection/connection-name.png)

windows-365/enterprise/create-provisioning-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ A few things to keep in mind:
5050
> [!TIP]
5151
> Your provisioning policy name cannot contain the following characters: < > & | " ^
5252
53-
3. On the **General** page, select a join type, followed by the appropriate network. If you select the combination of **Azure AD Join (preview)** and **Microsoft Hosted Network**, you must select a region for Microsoft to host your Cloud PC.
53+
3. On the **General** page, select a join type, followed by the appropriate network. If you select the combination of **Azure AD Join** and **Microsoft Hosted Network**, you must select a region for Microsoft to host your Cloud PC.
5454
4. For **Azure network connection**, select the connection to use for this policy > **Next**.
5555
5. On the **Image** page, for **Image type**, select one of the following options:
5656
- **Gallery image**: Choose **Select** > select an image from the gallery > **Select**. Gallery images are default images provided for your use.

0 commit comments

Comments
 (0)