Skip to content

Commit 5e4ade7

Browse files
authored
Merge pull request #7095 from Brenduns/kpi-improvement-tasks
Content improvement KPI work - various
2 parents b45c535 + d518791 commit 5e4ade7

3 files changed

Lines changed: 14 additions & 15 deletions

File tree

memdocs/intune/fundamentals/tenant-status.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,12 +3,12 @@
33

44
title: Microsoft Intune Tenant Status page
55
titleSuffix: Microsoft Intune
6-
description: Use the Intune Tenant Status page to view important tenant details
6+
description: If you use Microsoft Intune, use the Tenant Status page to view details about your tenant, the status of Intune connectors you've configured, view recent service health incidents and advisories.
77
keywords:
88
author: brenduns
99
ms.author: brenduns
1010
manager: dougeby
11-
ms.date: 08/17/2021
11+
ms.date: 03/23/2022
1212
ms.topic: conceptual
1313
ms.service: microsoft-intune
1414
ms.subservice: fundamentals

memdocs/intune/protect/endpoint-protection-windows-10.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,12 @@
11
---
22
# required metadata
3-
title: Settings you can deploy with Intune to protect managed Windows devices
4-
description: On Windows 10 or Windows 11 devices, configure endpoint protection settings to enable Microsoft Defender features, including Application Guard, Firewall, SmartScreen, encryption and BitLocker, Exploit Guard, Application Control, Security Center, and security on local devices in Microsoft Intune.
5-
keywords:
3+
title: Windows 10/11 settings you can deploy with Microsoft Intune to protect managed Windows devices
4+
description: Use Microsoft Intune endpoint protection profiles to manage settings that help protect your enrolled Windows 10 and 11 devices.
65
author: brenduns
76
ms.author: brenduns
87
manager: dougeby
98
ms.date: 02/03/2022
10-
ms.topic: conceptual
9+
ms.topic: reference
1110
ms.service: microsoft-intune
1211

1312
# optional metadata

memdocs/intune/protect/software-updates-ios.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -2,12 +2,12 @@
22
# required metadata
33

44
title: Configure iOS/iPadOS software update policies in Microsoft Intune
5-
description: In Microsoft Intune, create or add a configuration policy to restrict when software updates automatically install on iOS/iPadOS devices. You can choose the date and time when updates aren't installed. You can also assign this policy to groups, users, or devices, and check for any installation failures.
5+
description: Use Microsoft Intune to manage system updates for supervised iOS/iPadOS devices.
66
keywords:
77
author: brenduns
88
ms.author: brenduns
99
manager: dougeby
10-
ms.date: 06/15/2021
10+
ms.date: 03/23/2022
1111
ms.topic: how-to
1212
ms.service: microsoft-intune
1313
ms.subservice: protect
@@ -30,18 +30,18 @@ ms.collection:
3030

3131
# Add iOS/iPadOS software update policies in Intune
3232

33-
Software update policies apply to supervised iOS/iPadOS devices to install OS updates. [Supervised devices](../enrollment/device-enrollment-program-enroll-ios.md#what-is-supervised-mode) are devices that enrolled using either Apple Business Manager or Apple School Manager.
34-
35-
When configuring a policy to deploy updates, you can:
36-
37-
- Choose to deploy the *latest update* that's available, or choose to deploy an older update by the update version number if you don't want to deploy the latest update. If you choose to deploy an older update, you must also set a Device Configuration policy to restrict visibility of software updates.
38-
- Specify a schedule that determines when the update installs. Schedules can be as simple as installing updates the next time that the device checks in, or creating date and time ranges during which updates can install or are blocked from installing.
33+
Use Microsoft Intune device configuration profiles to manage software updates for iOS/iPad devices that enrolled as supervised devices. [Supervised devices](../enrollment/device-enrollment-program-enroll-ios.md#what-is-supervised-mode) are devices that enrolled using either Apple Business Manager or Apple School Manager.
3934

4035
This feature applies to:
4136

4237
- iOS 10.3 and later (supervised)
4338
- iPadOS 13.0 and later (supervised)
4439

40+
When configuring a policy to deploy updates, you can:
41+
42+
- Choose to deploy the *latest update* that's available, or choose to deploy an older update, based on the update version number. If you choose to deploy an older update, you must also set a Device Configuration policy to restrict visibility of software updates.
43+
- Specify a schedule that determines when the update installs. Schedules can be as simple as installing updates the next time that the device checks in, or creating date and time ranges during which updates can install or are blocked from installing.
44+
4545
By default, devices check in with Intune about every 8 hours. If an update is available through an update policy, the device downloads the update. The device then installs the update upon next check-in within your schedule configuration. Profiles don't prevent users from updating the OS manually. Users can be prevented from updating the OS manually with a Device Configuration policy to restrict visibility of software updates.
4646

4747
> [!NOTE]
@@ -87,7 +87,7 @@ Consider testing to assess the impact of OS updates on the app you are running i
8787
If you don't configure times to start or end, the configuration results in no restriction and updates can install at any time.
8888

8989
> [!NOTE]
90-
> You can configure settings in [Device Restrictions](../configuration/device-restrictions-ios.md#general) to hide an update from device users for a period of time on your supervised iOS/iPadOS devices. A restriction period can give you time to test an update before its visible to users to install. After the device restriction period expires, the update becomes visible to users. Users can then choose to install it, or your Software update policies might automatically install it soon after.
90+
> You can configure settings in [Device Restrictions](../configuration/device-restrictions-ios.md#general) to hide an update from device users for a period of time on your supervised iOS/iPadOS devices. A restriction period can give you time to test an update before it's visible to users to install. After the device restriction period expires, the update becomes visible to users. Users can then choose to install it, or your Software update policies might automatically install it soon after.
9191
>
9292
> When you use a device restriction to hide an update, review your software update policies to ensure they wont schedule the install of the update before that restriction period ends. Software update policies install updates based on their own schedule, regardless of the update being hidden or visible to the device user.
9393

0 commit comments

Comments
 (0)