Skip to content

Commit 67e1e79

Browse files
authored
Merge pull request #7337 from MicrosoftDocs/main
merge main to live, 10:30 Tuesday
2 parents 32ff161 + 88428f5 commit 67e1e79

13 files changed

Lines changed: 75 additions & 65 deletions

File tree

memdocs/configmgr/apps/deploy-use/deploy-applications.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -107,7 +107,7 @@ On the **Deployment Settings** page, specify the following information:
107107

108108
- **Allow clients on a metered Internet connection to download content after the installation deadline, which might incur additional costs**: This option is only available for deployments with a purpose of **Required**.
109109

110-
- **Automatically upgrade any superseded version of this application**: The client upgrades any superseded version of the application with the superseding application.
110+
- **Automatically upgrade any superseded versions of this application**: The client upgrades any superseded version of the application with the superseding application.
111111

112112
> [!NOTE]
113113
> This option works regardless of administrator approval. If an administrator already approved the superseded version, they don't need to also approve the superseding version. Approval is only for new requests, not superseding upgrades.<!--515824-->

memdocs/configmgr/core/servers/deploy/configure/boundary-groups-management-points.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ Previously, a common problem occurred when you had a protected management point
2424
> [!NOTE]
2525
> If you enable distribution points in the site default boundary group to fallback, and a management point is collocated on a distribution point, the site also adds that management point to the site default boundary group.<!--VSO 2841292-->
2626
27-
If a client is in a boundary group that with no assigned management point, the site gives the client the entire list of management points. This behavior makes sure that a client always receives a list of management points.
27+
If a client is in a boundary group with no assigned management point, the site gives the client the entire list of management points. This behavior makes sure that a client always receives a list of management points.
2828

2929
> [!TIP]
3030
> If you enable the option to **Prefer cloud-based sources over on-premises sources** then clients will prefer a cloud management gateway (CMG) for both policy and content.

memdocs/configmgr/core/support/support-center.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ Support Center includes Support Center Viewer, a tool that support personnel use
5151

5252
Support Center includes a modern log viewer. This tool replaces CMTrace and provides a customizable interface with support for tabs and dockable windows. It has a fast presentation layer, and can load large log files in seconds.
5353

54-
### Support Center OneTrace (Preview)
54+
### Support Center OneTrace
5555

5656
<!--3555962-->
5757
**OneTrace** is a new log viewer with Support Center. It works similarly to CMTrace, with improvements. For more information, see [Support Center OneTrace](support-center-onetrace.md).

memdocs/configmgr/develop/reference/core/clients/collections/addmembershiprules-method-in-class-sms_collection.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,7 @@
11
---
22
title: "AddMembershipRules Method"
33
titleSuffix: "Configuration Manager"
4+
description: "In Configuration Manager, the AddMembershipRules WMI class method adds multiple new rules to the CollectionRules property of the SMS_Collection Server WMI Class object."
45
ms.date: "09/20/2016"
56
ms.prod: "configuration-manager"
67
ms.technology: configmgr-sdk

memdocs/intune/configuration/edition-upgrade-windows-settings.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
# required metadata
33

44
title: Windows 10 upgrade and S mode settings in Microsoft Intune
5-
description: See a list of all the settings, and what they do when upgrading a Windows 10 edition on a device, or enable S mode on a device using a device configuration profile in Microsoft Intune.
5+
description: See a list of all the settings, and what they do when upgrading a Windows 10 edition on a device, or switch out of S mode on a device using a device configuration profile in Microsoft Intune.
66
keywords:
77
author: MandiOhlinger
88
ms.author: mandia
@@ -33,7 +33,7 @@ ms.collection: M365-identity-device-management
3333
> [!NOTE]
3434
> [!INCLUDE [not-all-settings-are-documented](../includes/not-all-settings-are-documented.md)]
3535
36-
Microsoft Intune includes many settings to help manage and protect your devices. This article describes some of the settings to upgrade Windows client editions, or enable S mode on Windows 10 devices. These settings are created in an upgrade configuration profile in Intune that are pushed or deployed to devices.
36+
Microsoft Intune includes many settings to help manage and protect your devices. This article describes some of the settings to upgrade Windows client editions, or switch out of S mode on Windows 10 devices. These settings are created in an upgrade configuration profile in Intune that are pushed or deployed to devices.
3737

3838
As part of your mobile device management (MDM) solution, use these settings to control the Windows client edition and Window 10 S mode options for your Windows devices.
3939

memdocs/intune/configuration/tutorial-walkthrough-administrative-templates.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -538,7 +538,7 @@ This section uses the following resources. We'll install these resources in this
538538
11. Find the definition ID using the setting display name. Enter:
539539
540540
```powershell
541-
$desiredSettingDefinition = $settingDefinitions.value | ? {$_.DisplayName -Match "Silently sign in users to the OneDrive sync client with their Windows credentials"}
541+
$desiredSettingDefinition = $settingDefinitions.value | ? {$_.DisplayName -Match "Silently sign in users to the OneDrive sync app with their Windows credentials"}
542542
```
543543
544544
12. Configure a setting. Enter:

memdocs/intune/protect/create-conditional-access-intune.md

Lines changed: 46 additions & 52 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
11
---
22
# required metadata
33

4-
title: Set up device-based Conditional Access with Intune
4+
title: Set up device-based Conditional Access policies with Intune
55
titleSuffix: Microsoft Intune
6-
description: Learn how to create a device-based Conditional Access policy based on Microsoft Intune device compliance and mobile app management.
6+
description: Configure a device-based Conditional Access policy that uses device status from a Microsoft Intune device compliance policies.
77
keywords:
88
author: brenduns
99
ms.author: brenduns
1010
manager: dougeby
11-
ms.date: 06/10/2021
11+
ms.date: 04/11/2022
1212
ms.topic: how-to
1313
ms.service: microsoft-intune
1414
ms.subservice: protect
@@ -30,87 +30,81 @@ ms.collection: M365-identity-device-management
3030

3131
# Create a device-based Conditional Access policy
3232

33-
With Intune, enhance Conditional Access in Azure Active Directory by adding mobile device compliance to the access controls. With Intune compliance policy that defines requirements for devices to be compliant, you can use a device's compliance status to either allow or block access to your apps and services. You can do this by creating a Conditional Access policy that uses the setting **Require device to be marked as compliant**.
33+
With Microsoft Intune device compliance policies, your Azure Active Directory (Azure AD) Conditional Access policies can use a devices status to either grant or deny access to your organizations apps and services.
3434

35-
A Conditional Access policy specifies the app or services you want to protect, the conditions under which the apps or services can be accessed, and the users the policy applies to. Although Conditional Access is an Azure AD premium feature, the Conditional Access node you access from *Intune* is the same node as accessed from *Azure AD*.
35+
You can use the Microsoft Endpoint Manager admin center to configure your device-based Conditional Access policies. From within the admin center you have access to the Conditional Access policy UI as found in Azure AD. Use of the Azure AD UI provides access to all the options you would have if you were to configure the policy from within the Azure portal. The policies you create can specify the apps or services you want to protect, the conditions under which the apps or services can be accessed, and the users the policy applies to.
3636

3737
To Create a device-based Conditional Access policy your account must have one of the following permissions in Azure AD:
3838

39-
- Global administrator
40-
- Intune Service administrator
41-
- Conditional Access administrator
39+
- Global administrator
40+
- Intune Service administrator
41+
- Conditional Access administrator
42+
43+
To take advantage of device compliance status, configure Conditional Access policies to **Require device to be marked as compliant**. This option is set while configuring *Grant* access during step 6 of the following procedure.
4244

4345
> [!IMPORTANT]
4446
> Before you set up Conditional Access, you'll need to set up Intune device compliance policies to evaluate devices based on whether they meet specific requirements. See [Get started with device compliance policies in Intune](device-compliance-get-started.md).
4547
46-
## Create Conditional Access policy
48+
## Create the Conditional Access policy
4749

4850
1. Sign in to the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431).
4951

5052
2. Select **Endpoint security** > **Conditional Access** > **Policies** > **New policy**.
5153
:::image type="content" source="./media/create-conditional-access-intune/create-ca.png" alt-text="Create a new Conditional Access policy":::
5254

53-
3. Under **Assignments**, select **Users and groups**.
54-
55-
4. On the **Include** tab, identify the users or groups that this Conditional Access policy applies to. Once you've chosen groups or users to include, use the **Exclude** tab if there are any users, roles, or groups you want to exclude from this policy.
56-
57-
- **All users**: Select this option to apply the policy to all users and groups, including internal and guest users.
58-
59-
- **Select users and groups**: Select this option and specify one or more of the following options:
60-
61-
1. **All guest users**: Select this option to include or exclude external guest users (for example, partners, external collaborators)
62-
63-
2. **Directory roles**: Select one or more Azure AD roles to include or exclude users who are assigned these roles.
64-
65-
3. **Users and groups**: Select this option to search for and select individual users or groups you want include or exclude.
55+
The **New** pane opens, which is the configuration pane from Azure AD. The policy you’re creating is an Azure AD policy for conditional access. To learn more about this pane and Conditional Access policies, see [Conditional Access policy components](/azure/active-directory/conditional-access/concept-conditional-access-policies) in the Azure AD content.
6656

67-
> [!TIP]
68-
> Test the policy against a smaller group of users to make sure it works as expected.
57+
3. Under **Assignments**, select **Users or workload identities** to configure the Identities in the directory that the policy applies to. To learn more, see [Users and groups](/azure/active-directory/conditional-access/concept-conditional-access-users-groups) in the Azure AD documentation.
6958

70-
5. Select **Done**.
59+
- On the **Include** tab, configure the user and groups you want to include.
60+
- Use the **Exclude** tab if there are any users, roles, or groups you want to exclude from this policy.
7161

72-
6. Under **Assignments**, select **Cloud apps or actions**.
62+
> [!TIP]
63+
> Test the policy against a smaller group of users to make sure it works as expected.
7364
74-
7. On the **Include** tab, use available options to identify the apps and services you want to protect with this Conditional Access policy. Then you can use the **Exclude** tab if there are any apps or services you want to exclude from this policy.
65+
4. Next select **Cloud apps or action**, which is also under *Assignments*. Configure this policy to apply to **Cloud apps**.
7566

76-
- **All cloud apps**: Select this option to apply the policy to all apps.
77-
> [!IMPORTANT]
78-
> The Microsoft Azure Management app for access to the Azure portal, and the Microsoft Intune app are included in this list. Be sure to use the **Exclude** tab either here or in the **Users and groups** options to make sure you (or the users or groups you designate) are able to sign in to the Azure portal or Microsoft Endpoint Manager admin center.
67+
- On the **Include** tab, use available options to identify the apps and services you want to protect with this Conditional Access policy.
7968

80-
- **Select apps**: Select this option, choose **Select**, and then use the applications list to search for and select the apps or services you want to protect.
69+
If you choose **Select apps**, select the apps and services you want to protect with this policy.
8170

82-
When ready, select **Done**.
71+
> [!CAUTION]
72+
> If you choose **All cloud apps**, be sure to review the warning, and then **Exclude** from this policy your account or other relevant users and groups that should retain access to use the Azure portal or Microsoft Endpoint Manager admin center after this policy takes effect.
8373
84-
8. Under **Assignments**, select **Conditions**.
74+
- Use the **Exclude** tab if there are any apps or services you want to exclude from this policy.
8575

86-
- **Sign-in risk**: Select *Yes* to use Azure AD Identity Protection sign-in risk detection with this policy, and then choose the sign-in risk levels the policy should apply to.
76+
For more information, see [Cloud apps or actions](/azure/active-directory/conditional-access/concept-conditional-access-cloud-apps) in the Azure AD documentation.
8777

88-
- **Device platforms**: On the **Include** tab, identify the device platforms you want to this Conditional Access policy to apply to. Use the **Exclude** tab to exclude platforms from this policy.
78+
5. Next, configure **Conditions**. Select the signals you want to use as conditions for this policy. Options include:
8979

90-
- **Client apps**: Select *Yes* to specify if the policy should apply to browser apps, mobile apps, and desktop clients.
80+
- User risk
81+
- Sign-in risk
82+
- Device platforms
83+
- Locations
84+
- Client as
85+
- Filter for devices
9186

92-
- **Device state**: The Conditional Access policy will apply to all device states unless you choose Yes and specifically exclude the states Device Hybrid Azure AD joined or Device marked as compliant (or both).
87+
For information about these options, see [Conditions](/azure/active-directory/conditional-access/concept-conditional-access-conditions) in the Azure AD documentation.
9388

94-
> [!TIP]
95-
> If you want to protect both **Modern authentication** clients and **Exchange ActiveSync clients**, create two separate Conditional Access policies, one for each client type. Although Exchange ActiveSync supports modern authentication, the only condition that is supported by Exchange ActiveSync is platform. Other conditions, including multi-factor authentication, are not supported. To effectively protect access to Exchange Online from Exchange ActiveSync, create a Conditional Access policy that specifies the cloud app Microsoft 365 Exchange Online and the client app Exchange ActiveSync with Apply policy only to supported platforms selected.
89+
> [!TIP]
90+
> If you want to protect both **Modern authentication** clients and **Exchange ActiveSync clients**, create two separate Conditional Access policies, one for each client type. Although Exchange ActiveSync supports modern authentication, the only condition that is supported by Exchange ActiveSync is platform. Other conditions, including multi-factor authentication, are not supported. To effectively protect access to Exchange Online from Exchange ActiveSync, create a Conditional Access policy that specifies the cloud app Microsoft 365 Exchange Online and the client app Exchange ActiveSync with Apply policy only to supported platforms selected.
9691
97-
9. Select **Done**.
92+
6. Under **Access controls**, select **Grant** and then one or more requirements. To learn about the options for Grant, see [Grant](/azure/active-directory/conditional-access/concept-conditional-access-grant) in the Azure AD Documentation.
9893

99-
10. Under **Access controls**, select **Grant**. Configure what happens based on the conditions you've set up. You can select from the following options:
94+
- **Block access**: The users specified in this policy will be denied access to the apps or services under the conditions you've specified.
95+
- **Grant access**: The users specified in this policy will be granted access, but you can require any of the following further actions:
96+
- Require multi-factor authentication
97+
- *Require device to be marked as compliant* - This option is required for the policy to use device compliance status.
98+
- Require Hybrid Azure AD joined device
99+
- Require approved client app
100+
- Require app protection policy
101+
- Require password change
100102

101-
- **Block access**: The users specified in this policy will be denied access to the apps under the conditions you've specified.
102-
- **Grant access**: The users specified in this policy will be granted access, but you can require any of the following further actions:
103-
- **Require multi-factor authentication**: The user will need to complete additional security requirements, like a phone call or text.
104-
- **Require device to be marked as compliant**: The device must be Intune compliant. If the device is noncompliant, the user will be given the option to enroll the device in Intune.
105-
- **Require Hybrid Azure AD joined device**: Devices must be Hybrid Azure AD joined.
106-
- **Require approved client app**: The device must use approved client apps.
107-
- **For multiple controls**: Select **Require all the selected controls** so that all of the requirements are enforced when a device attempts to access the app.
108-
109-
:::image type="content" source="./media/create-conditional-access-intune/create-ca-grant-access-settings.png" alt-text="Access controls Grant settings":::
103+
:::image type="content" source="./media/create-conditional-access-intune/create-ca-grant-access-settings.png" alt-text="Screen shot of the configuration surface and options for Grant":::
110104

111-
11. Under **Enable policy**, select **On**.
105+
7. Under **Enable policy**, select **On**. By default, the policy is set to *Report-only*.
112106

113-
12. Select **Create**.
107+
8. Select **Create**.
114108

115109
## Next steps
116110

memdocs/intune/protect/device-compliance-get-started.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -163,7 +163,7 @@ The following table describes how noncompliant settings are managed when a compl
163163
|**Policy setting**| **Platform** |
164164
| --- | ----|
165165
| **PIN or password configuration** | - **Android 4.0 and later**: Quarantined<br>- **Samsung Knox Standard 4.0 and later**: Quarantined<br>- **Android Enterprise**: Quarantined <br> <br>- **iOS 8.0 and later**: Remediated<br>- **macOS 10.11 and later**: Remediated <br> <br>- **Windows 8.1 and later**: Remediated|
166-
| **Device encryption** | - **Android 4.0 and later**: Quarantined<br>- **Samsung Knox Standard 4.0 and later**: Quarantined<br>- **Android Enterprise**: Quarantined<br><br>- **iOS 8.0 and later**: Remediated (by setting PIN)<br>- **macOS 10.11 and later**: Quarantined<br><br>- **Windows 8.1 and later**: Not applicable|
166+
| **Device encryption** | - **Android 4.0 and later**: Quarantined<br>- **Samsung Knox Standard 4.0 and later**: Quarantined<br>- **Android Enterprise**: Quarantined<br><br>- **iOS 8.0 and later**: Remediated (by setting PIN)<br>- **macOS 10.11 and later**: Quarantined<br><br>- **Windows 8.1 and later**: Quarantined|
167167
| **Jailbroken or rooted device** | - **Android 4.0 and later**: Quarantined (not a setting)<br>- **Samsung Knox Standard 4.0 and later**: Quarantined (not a setting)<br>- **Android Enterprise**: Quarantined (not a setting)<br><br>- **iOS 8.0 and later**: Quarantined (not a setting)<br>- **macOS 10.11 and later**: Not applicable<br><br>- **Windows 8.1 and later**: Not applicable |
168168
| **Email profile** | - **Android 4.0 and later**: Not applicable<br>- **Samsung Knox Standard 4.0 and later**: Not applicable<br>- **Android Enterprise**: Not applicable<br><br>- **iOS 8.0 and later**: Quarantined<br>- **macOS 10.11 and later**: Quarantined<br><br>- **Windows 8.1 and later**: Not applicable |
169169
| **Minimum OS version** | - **Android 4.0 and later**: Quarantined<br>- **Samsung Knox Standard 4.0 and later**: Quarantined<br>- **Android Enterprise**: Quarantined<br><br>- **iOS 8.0 and later**: Quarantined<br>- **macOS 10.11 and later**: Quarantined<br><br>- **Windows 8.1 and later**: Quarantined|
13.4 KB
Loading

0 commit comments

Comments
 (0)