Skip to content

Commit 564a4b3

Browse files
authored
Merge pull request #6526 from MicrosoftDocs/main
1/12/2021 AM Publish
2 parents 041a06c + b06d3e3 commit 564a4b3

9 files changed

Lines changed: 44 additions & 36 deletions

File tree

memdocs/configmgr/apps/deploy-use/share-applications.md

Lines changed: 6 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Share applications in the Software Center
33
titleSuffix: Configuration Manager
44
description: Share a link to an application in the Software Center in Configuration Manager.
5-
ms.date: 07/31/2017
5+
ms.date: 01/11/2022
66
ms.prod: configuration-manager
77
ms.technology: configmgr-app
88
ms.topic: conceptual
@@ -19,11 +19,9 @@ ms.localizationpriority: medium
1919
You can copy a hyperlink to an application in Software Center using the ![Share](media/share15.png) **Share** button in the Application Details view. You can only share hyperlinks for applications. If the application becomes unavailable, the hyperlink opens a window with an application unavailable message.
2020

2121
1. Choose **Applications**, and then choose the application.
22-
2. Click the ![Share](media/share15.png) **Share** button.
23-
3. Click **Copy** in the window.
24-
4. Paste the URL into an email to share the application.
22+
2. Select the ![Share](media/share15.png) **Share** button.
23+
3. Select **Copy** in the window.
24+
4. Paste the URL into an email to share the application.
2525

26-
> [!TIP]
27-
> To create a link in an Outlook email, press **CTRL** + **K** and then paste the URL.
28-
>
29-
> By default, Outlook shows a security alert for the Software Center protocol when the recipient clicks the link. Prevent this in your environment by adding a trusted protocol key to the registry. For example, `HKCU\Software\Policies\Microsoft\Office\16.0\Common\Security\Trusted Protocols\All Applications\softwarecenter:`
26+
> [!TIP]
27+
> To create a link in an Outlook email, press **CTRL** + **K** and then paste the URL.

memdocs/configmgr/core/misc/doc-test.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,8 +16,7 @@ manager: dougeby
1616

1717
# Doc team test
1818

19-
This article is for testing purposes only. This is for the team only.
20-
19+
This article is for testing purposes only. This is for the team only. Editing done by IDC Team testing only 1/12/2022
2120

2221
## Basic Markdown and GFM
2322

memdocs/configmgr/core/servers/deploy/configure/configure-role-based-administration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -299,7 +299,7 @@ Manage roles and scopes on users:
299299
- [Add-CMSecurityRoleToAdministrativeUser](/powershell/module/configurationmanager/Add-CMSecurityRoleToAdministrativeUser): Add a security role to a user or group.
300300
- [Remove-CMSecurityRoleFromAdministrativeUser](/powershell/module/configurationmanager/Remove-CMSecurityRoleFromAdministrativeUser): Remove the association between a security role and an administrative user.
301301
- [Add-CMSecurityScopeToAdministrativeUser](/powershell/module/configurationmanager/Add-CMSecurityScopeToAdministrativeUser): Add a security scope to a user or group.
302-
- [Remove-CMSecurityScopeFromAdministrativeUser](/powershell/module/configurationmanager/Remove-CMSecurityScopeToAdministrativeUser): Remove the association between a security scope and an administrative user.
302+
- [Remove-CMSecurityScopeFromAdministrativeUser](/powershell/module/configurationmanager/remove-cmsecurityscopefromadministrativeuser): Remove the association between a security scope and an administrative user.
303303

304304
Manage security roles:
305305

memdocs/intune/fundamentals/deployment-guide-platform-android.md

Lines changed: 17 additions & 17 deletions
Large diffs are not rendered by default.

memdocs/intune/protect/actions-for-noncompliance.md

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ keywords:
77
author: brenduns
88
ms.author: brenduns
99
manager: dougeby
10-
ms.date: 10/19/2021
10+
ms.date: 01/12/2022
1111
ms.topic: how-to
1212
ms.service: microsoft-intune
1313
ms.subservice: protect
@@ -130,6 +130,13 @@ When you enable this action:
130130

131131
- When multiple compliance policies include the same compliance conditions, and include the push notification action with the same schedule, Intune sends multiple notifications to the same device on the same day.
132132

133+
> [!NOTE]
134+
> The following actions for noncompliance are not supported for devices that are managed by a [device compliance management partner](../protect/device-compliance-partners.md):
135+
> - Send push notification to end user
136+
> - Remotely lock the noncompliant device
137+
> - Retire the noncompliant device
138+
> - Send push notification to end user
139+
133140
## Before you begin
134141

135142
You can [add actions for noncompliance](#add-actions-for-noncompliance) when you configure device compliance policy, or later by editing the policy. You can add additional actions to each policy to meet your needs. Keep in mind that each compliance policy automatically includes the default action for noncompliance that marks devices as noncompliant, with a schedule set to zero days.

memdocs/intune/protect/includes/security-config-mgt-prerequisites.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -43,6 +43,9 @@ Devices must have access to the following endpoints:
4343
- `login.microsoftonline.com` - For Azure AD registration.
4444
- `*.dm.microsoft.com` - The use of a wildcard supports the cloud-service endpoints that are used for enrollment, check-in, and reporting, and which can change as the service scales.
4545

46+
> [!Note]
47+
> If your organization users Secure Socket Layer (SSL) inspection, the endpoints should be excluded from inspection.
48+
4649
### Supported platforms
4750

4851
Policies for Microsoft Defender for Endpoint security management are supported for the following device platforms:

memdocs/intune/protect/mde-security-integration.md

Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ keywords:
77
author: brenduns
88
ms.author: brenduns
99
manager: dougeby
10-
ms.date: 11/22/2021
10+
ms.date: 01/12/2022
1111
ms.topic: how-to
1212
ms.service: microsoft-intune
1313
ms.subservice: protect
@@ -28,10 +28,7 @@ ms.reviewer: mattcall
2828

2929
---
3030

31-
# Manage Microsoft Defender for Endpoint on devices with Microsoft Endpoint Manager
32-
33-
>[!Note]
34-
> ***This feature is in public preview*** *and will roll out to tenants gradually over the next few weeks. You can confirm your tenant has received this capability when the relevant toggles show in both the Microsoft Endpoint Manager admin center and Microsoft Defender for Endpoint.*
31+
# Manage Microsoft Defender for Endpoint on devices with Microsoft Endpoint Manager (Preview)
3532

3633
With Microsoft Defender for Endpoint (MDE), you can now deploy security configurations from Microsoft Endpoint Manager directly to your onboarded devices without requiring a full Microsoft Endpoint Manager device enrollment. This capability is known as *Security Management for Microsoft Defender for Endpoint*. With this capability, devices that aren’t managed by a Microsoft Endpoint Manager service can receive security configurations for Microsoft Defender directly from Endpoint Manager.
3734

memdocs/intune/protect/quickstart-send-notification.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ keywords:
88
author: Erikre
99
ms.author: erikre
1010
manager: dougeby
11-
ms.date: 12/16/2021
11+
ms.date: 01/12/2022
1212
ms.topic: quickstart
1313
ms.service: microsoft-intune
1414
ms.subservice: protect
@@ -33,6 +33,9 @@ ms.collection: M365-identity-device-management
3333

3434
In this quickstart, you'll use Microsoft Intune to send an email notification to the members of your workforce that have noncompliant devices.
3535

36+
> [!NOTE]
37+
> The remote action to send an email notification is not supported on devices that are managed by a [device compliance partner](../protect/device-compliance-partners.md).
38+
3639
By default, when Intune detects a device that isn't compliant, Intune immediately marks the device as noncompliant. Azure Active Directory (Azure AD) [Conditional Access](/azure/active-directory/active-directory-conditional-access-azure-portal) then blocks the device. When a device isn't compliant, Intune allows you to add actions for noncompliance, which gives you flexibility to decide what to do. For example, you can give users a grace period to be compliant before blocking noncompliant devices.
3740

3841
One action to take when a device doesn't meet compliance is to send email to the devices user. You can also customize an email notification before sending it. Specifically, you can customize the recipients, subject, and message body, including company logo, and contact information. Intune also includes details about the noncompliant device in the email notification.
@@ -43,6 +46,7 @@ If you don't have an Intune subscription, [sign up for a free trial account](../
4346

4447
When using device compliance policies to block devices from corporate resources, Azure AD Conditional Access must be set up. If you've completed the [Create a device compliance policy](quickstart-set-password-length-android.md) quickstart, you're using Azure Active Directory. For more information about Azure AD, see [Conditional Access in Azure Active Directory](/azure/active-directory/active-directory-conditional-access-azure-portal) and [common ways to use Conditional Access with Intune](../protect/conditional-access-intune-common-ways-use.md).
4548

49+
4650
## Sign in to Intune
4751

4852
Sign in to the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431) as a [Global administrator](../fundamentals/users-add.md#types-of-administrators) or an Intune [Service administrator](../fundamentals/users-add.md#types-of-administrators). If you've created an Intune Trial subscription, the account you created the subscription with is the Global administrator.

memdocs/intune/protect/toc.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -113,7 +113,7 @@ items:
113113
href: advanced-threat-protection-manage-android.md
114114
- name: Monitor Defender for Endpoint
115115
href: advanced-threat-protection-monitor.md
116-
- name: MDE Security Configuration Management
116+
- name: MDE Security Configuration Management (Preview)
117117
href: mde-security-integration.md
118118
- name: Firewall rule migration
119119
href: endpoint-security-firewall-rule-tool.md

0 commit comments

Comments
 (0)