Skip to content

Commit 722d591

Browse files
committed
Merge branch 'main' of https://github.com/microsoftdocs/memdocs-pr into erikre-2210ID-15477561
2 parents e70077a + 4a6793e commit 722d591

9 files changed

Lines changed: 45 additions & 159 deletions

File tree

memdocs/autopilot/autopilot-mbr.md

Lines changed: 8 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,18 +1,14 @@
11
---
22
title: Windows Autopilot motherboard replacement
3-
description: Windows Autopilot deployment Motherboard Replacement (MBR) scenarios
4-
keywords: mdm, setup, windows, windows 10, oobe, manage, deploy, autopilot, ztd, zero-touch, partner, msfb, intune
5-
ms.prod: w10
6-
ms.mktglfcycl: deploy
3+
description: Understand how Windows Autopilot deployments function when you replace the motherboard on a device.
4+
ms.prod: windows-client
5+
ms.technology: itpro-deploy
76
ms.localizationpriority: medium
8-
ms.sitesec: library
9-
ms.pagetype: deploy
10-
audience: itpro
117
author: aczechowski
128
ms.author: aaroncz
139
ms.reviewer: jubaptis
1410
manager: dougeby
15-
ms.date: 10/10/2021
11+
ms.date: 09/23/2022
1612
ms.collection: M365-modern-desktop
1713
ms.topic: how-to
1814
---
@@ -24,17 +20,17 @@ ms.topic: how-to
2420
- Windows 11
2521
- Windows 10
2622

27-
This document offers guidance for Windows Autopilot device repair scenarios that Microsoft partners can use in Motherboard Replacement (MBR) situations, and other servicing scenarios.
23+
This document offers guidance for Windows Autopilot device repair scenarios that Microsoft partners can use in motherboard replacement (MBR) situations, and other servicing scenarios.
2824

2925
Repairing Autopilot enrolled devices is complex, as it tries to balance OEM requirements with Windows Autopilot requirements. Specifically, OEM requirements include strict uniqueness across motherboards, MAC addresses, and so on. Windows Autopilot requires strict uniqueness at the hardware hash level for each device to enable successful registration. The hardware hash doesn't always accommodate all the OEM hardware component requirements. So these requirements are sometimes at odds, causing issues with some repair scenarios. The hardware hash is also known as the hardware ID.
3026

31-
**Motherboard Replacement (MBR)**
27+
Starting in the September 2022 release of Intune (2209), if a motherboard is replaced on an Autopilot registered device, and it goes back to the same tenant without an OS reset, Autopilot will attempt to register the new hardware components. In Intune, you'll see the profile status **Fix pending**. If the OEM resets the OS, you need to re-register the device. If the new hardware components are registered, the device status goes back to the assigned profile. If it's not, you'll see the profile status **Attention required**.
3228

3329
If a motherboard replacement is needed on a Windows Autopilot device, the following process is recommended:
3430

35-
1. [Deregister the device](#deregister-the-autopilot-device-from-the-autopilot-program) from Windows Autopilot
31+
1. If the device isn't going back to the original tenant, [deregister it from Windows Autopilot](#deregister-the-autopilot-device-from-the-autopilot-program). If it's going back to the same tenant, you don't need to deregister it.
3632
2. [Replace the motherboard](#replace-the-motherboard)
37-
3. [Capture a new device ID (4K HH)](#capture-a-new-autopilot-device-id-4k-hh-from-the-device)
33+
3. If the device needs to be re-registered because of a re-image or will be used by a new tenant, [capture a new device ID (4K HH)](#capture-a-new-autopilot-device-id-4k-hh-from-the-device).
3834
4. [Reregister the device](#reregister-the-repaired-device-using-the-new-device-id) with Windows Autopilot
3935
5. [Reset the device](#reset-the-device)
4036
6. [Return the device](#return-the-repaired-device-to-the-customer)

memdocs/autopilot/registration-overview.md

Lines changed: 12 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,9 @@
11
---
22
title: Windows Autopilot registration overview
33
description: Overview of Windows Autopilot device registration
4-
keywords: mdm, setup, windows, windows 10, oobe, manage, deploy, autopilot, ztd, zero-touch, partner, msfb, intune
5-
ms.prod: w10
6-
ms.mktglfcycl: deploy
4+
ms.prod: windows-client
5+
ms.technology: itpro-deploy
76
ms.localizationpriority: medium
8-
ms.sitesec: library
9-
ms.pagetype: deploy
10-
audience: itpro
117
author: aczechowski
128
ms.author: aaroncz
139
ms.reviewer: jubaptis
@@ -44,6 +40,16 @@ Registration can also be performed within your organization by collecting the ha
4440
- [Automatic registration](automatic-registration.md)
4541
- [Manual registration](manual-registration.md)
4642

43+
When you register an Autopilot device, it automatically creates an Azure AD object. The Autopilot deployment process needs this object to identify the device before the user signs in. If you delete this object, the device can fail to enroll through Autopilot. If the device is registered and not enrolled after 180 days, you'll need to re-register the device to complete a successful deployment.
44+
45+
> [!NOTE]
46+
> Don't register to Autopilot the following types of devices:
47+
>
48+
> - [Azure AD registered](/azure/active-directory/devices/concept-azure-ad-register), also known as "workplace joined"
49+
> - [Intune MDM-only enrollment](/mem/intune/enrollment/windows-enrollment-methods#user-self-enrollment-in-intune)
50+
>
51+
> These options are intended for users to join personally-owned devices to their organization's network.
52+
4753
Once a device is registered in Autopilot if a profile is not assigned, it will receive the default Autopilot profile. If you do not want a device to go through Autopilot, you must remove the Autopilot registration.
4854

4955
## Terms

memdocs/autopilot/windows-autopilot-whats-new.md

Lines changed: 10 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -4,11 +4,11 @@ description: News and resources about the latest updates and past versions of Wi
44
ms.prod: w10
55
ms.technology: windows
66
ms.localizationpriority: medium
7-
author: aczechowski
8-
ms.author: aaroncz
9-
manager: dougeby
7+
author: frankroj
8+
ms.author: frankroj
9+
manager: aczechowski
1010
ms.reviewer: jubaptis
11-
ms.date: 08/02/2022
11+
ms.date: 09/22/2022
1212
ms.collection:
1313
- M365-modern-desktop
1414
- highpri
@@ -17,6 +17,12 @@ ms.topic: article
1717

1818
# Windows Autopilot: What's new
1919

20+
## Autopilot automatic device diagnostics collection
21+
<!--1895390-->
22+
Starting with Intune 2209, Intune will automatically capture diagnostics when devices experience a failure during the Autopilot process on Windows 10 version 1909 or later and with Windows 11. When logs are finished processing on a failed device, they will be automatically captured and uploaded to Intune. Diagnostics and logs may include user identifiable information such as user name or device name. If the logs are not available in Intune, check if the device is powered-on and has access to the internet. Diagnostics are available for 28 days before they are removed.
23+
24+
For more information, see [Collect diagnostics from a Windows device](../intune/remote-actions/collect-diagnostics.md).
25+
2026
## Updates to Autopilot device targeting infrastructure
2127

2228
With Intune 2208 we are updating the Autopilot infrastructure to ensure that the profiles and applications assigned are consistently ready when the devices are deployed. This change reduces the amount of data that needs to be synchronized per-Autopilot device and leverages device lifecycle change events to reduce the amount of time that it takes to recover from device resets for Azure AD and Hybrid Azure AD joined devices. No action is needed to enable this change, it will be rolling out to all clients starting August 2022.

memdocs/intune/enrollment/enrollment-notifications.md

Lines changed: 0 additions & 126 deletions
This file was deleted.
Binary file not shown.

memdocs/intune/enrollment/toc.yml

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -46,8 +46,6 @@ items:
4646
- name: Require multi-factor authentication
4747
href: multi-factor-authentication.md
4848
displayName: mfa; multifactor
49-
- name: Set up enrollment notifications
50-
href: enrollment-notifications.md
5149
- name: Set up Windows enrollment
5250
items:
5351
- name: Windows enrollment methods
@@ -69,7 +67,7 @@ items:
6967
displayName: wpj
7068
- name: Connect Intune to Android Enterprise
7169
href: connect-intune-android-enterprise.md
72-
- name: Android personally-owned work profile enrollment
70+
- name: Android personally owned work profile enrollment
7371
href: android-work-profile-enroll.md
7472
- name: Android Enterprise dedicated device enrollment
7573
href: android-kiosk-enroll.md
@@ -89,7 +87,7 @@ items:
8987
href: android-enterprise-overview.md
9088
- name: Enroll Android Enterprise corporate-owned work profile devices
9189
href: android-corporate-owned-work-profile-enroll.md
92-
- name: Move device administrator devices to personally-owned work profile management
90+
- name: Move device administrator devices to personally owned work profile management
9391
href: android-move-device-admin-work-profile.md
9492
- name: Samsung Knox Mobile Enrollment
9593
href: android-samsung-knox-mobile-enroll.md
@@ -104,7 +102,7 @@ items:
104102
href: device-enrollment-restrictions.md
105103
- name: Set app configuration policies
106104
href: android-app-configuration-policies.md
107-
- name: Android personally-owned work profile security settings
105+
- name: Android personally owned work profile security settings
108106
href: android-work-profile-security-settings.md
109107
- name: Android fully managed-security settings
110108
href: android-fully-managed-security-settings.md
@@ -176,4 +174,4 @@ items:
176174
- name: Troubleshoot Windows auto-enrollment
177175
href: /troubleshoot/mem/intune/troubleshoot-windows-auto-enrollment
178176
- name: Troubleshoot Android device enrollment
179-
href: /troubleshoot/mem/intune/troubleshoot-android-enrollment
177+
href: /troubleshoot/mem/intune/troubleshoot-android-enrollment

memdocs/intune/fundamentals/multi-admin-approval.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,9 @@ ms.collection:
2929

3030
# Use Access policies to require multiple administrative approvals
3131

32+
> [!NOTE]
33+
> This feature is delayed and is not yet available. We'll remove this note when this feature begins to roll out to tenants.
34+
3235
*This feature is in Public Preview*
3336

3437
To help protect against a compromised administrative account, use Intune *access policies* to require that a second administrative account is used to approve a change before the change is applied. This capability is known as multiple administrative approval (MAA).

memdocs/intune/fundamentals/whats-new.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -141,7 +141,7 @@ Applies to:
141141
#### Device Firmware Configuration Interface (DFCI) now supports Acer devices<!-- 15240661 -->
142142
For Windows 10/11 devices, you can create a DFCI profile to manage UEFI (BIOS) settings (**Devices** > **Configuration profiles** > **Create profile** > **Windows 10 and later** for platform > **Templates** > **Device Firmware Configuration Interface** for profile type).
143143

144-
New Acer devices running Windows 10/11 will be enabled for DFCI starting Fall 2022. So, admins can create DFCI profiles to manage the BIOS and then deploy the profiles to these Acer devices.
144+
New Acer devices running Windows 10/11 will be enabled for DFCI in later 2022. So, admins can create DFCI profiles to manage the BIOS and then deploy the profiles to these Acer devices.
145145

146146
Contact your device vendor or device manufacturer to ensure you get eligible devices.
147147

@@ -236,7 +236,10 @@ For more information about protected apps, see [Microsoft Intune protected apps]
236236

237237
### Tenant administration
238238

239-
#### Access policies for Multiple Administrator Approval in public preview<!--9348867 -->
239+
#### Access policies for Multiple Administrator Approval in public preview<!--9348867 -->
240+
> [!NOTE]
241+
> This feature is delayed and is not yet available. We'll remove this note when this feature begins to roll out to tenants.
242+
240243
In public preview, you can use Intune *access policies* to require that a second Administrator Approval account be used to approve a change before the change is applied. This capability is known as multiple Administrator Approval (MAA).
241244

242245
You create an access policy to protect a type of resource, like App deployments. Each access policy also includes a group of users who are *approvers* for the changes protected by the policy. When a resource like an app deployment configuration is protected by an access policy, any changes that are made to the deployment, including creating, deleting or modifying an existing deployment won't apply until a member of the approvers group for that access policy reviews and approves that change.

memdocs/intune/protect/microsoft-tunnel-conditional-access.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -39,14 +39,14 @@ Before you can configure Conditional Access policies for the tunnel, you must en
3939

4040
2. Download the PowerShell script named **mst-ca-provisioning.ps1** from aka.ms/mst-ca-provisioning.
4141

42-
3. Using credentials that have the Azure Role permissions [equivalent to **Application Administrator**](/azure/active-directory/users-groups-roles/directory-assign-admin-roles#application-administrator-permissions), run the script from any location in your environment, to provision your tenant.
42+
3. Using credentials that have the Azure Role permissions [equivalent to **Global Administrator**](/azure/active-directory/roles/permissions-reference#global-administrator), run the script from any location in your environment, to provision your tenant.
4343

44-
The script modifies your tenant by creating a service principle with the following details:
44+
The script modifies your tenant by creating a service principal with the following details:
4545

4646
- App ID: 3678c9e9-9681-447a-974d-d19f668fcd88
4747
- Name: Microsoft Tunnel Gateway
4848

49-
The addition of this service principle is required so you can select the tunnel cloud app while configuring Conditional Access policies. It's also possible to use Graph to add the service principle information to your tenant.
49+
The addition of this service principal is required so you can select the tunnel cloud app while configuring Conditional Access policies. It's also possible to use Graph to add the service principal information to your tenant.
5050

5151
4. After the script completes, you can use your normal process to create Conditional Access policies.
5252

0 commit comments

Comments
 (0)