Skip to content

Commit 75b0c38

Browse files
Merge pull request #8400 from Brenduns/1504002-win-8-1-deprecation-notice
1504002 win 8 1 deprecation notice - Batch 1
2 parents f3b08f5 + 056489f commit 75b0c38

7 files changed

Lines changed: 12 additions & 1 deletion

memdocs/intune/includes/tenant-attach-antivirus-prerequisites.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -33,3 +33,5 @@ Manage [Antivirus settings for Configuration Manager devices](../protect/antivir
3333
- Windows 11 and later (x86, x64, ARM64)
3434
- Windows Server 2012 R2 (x64), starting in Configuration Manager version 2010 <!--8763780, 8740844-->
3535
- Windows Server 2016 and later (x64)
36+
37+
[!INCLUDE [windows-phone-81-windows-10-mobile-support](../includes/windows-phone-81-windows-10-mobile-support.md)]

memdocs/intune/includes/tenant-attach-edr-prerequisites.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -33,3 +33,5 @@ Manage [Endpoint detection and response policy settings for Configuration Manage
3333
- Windows 11 and later (x86, x64, ARM64)
3434
- Windows Server 2012 R2 (x64), starting in Configuration Manager version 2010
3535
- Windows Server 2016 and later(x64)
36+
37+
[!INCLUDE [windows-phone-81-windows-10-mobile-support](../includes/windows-phone-81-windows-10-mobile-support.md)]

memdocs/intune/protect/certificate-connectors.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -319,7 +319,7 @@ Version **6.2101.13.0**. This new connector version adds [improvements for loggi
319319
320320
- Requires .NET Framework version 4.7.2
321321
- Replaces the use of the *Microsoft Intune Connector* for use with PKCS certificate profiles. The *PFX Certificate Connector* is now the only connector required to use PKCS #12 or Imported PFX certificates.
322-
- Adds support for using PKCS certificate profiles with all supported platforms except Windows 8.1.
322+
- Adds support for using PKCS certificate profiles with all supported platforms
323323
- Adds support for certificate revocation for Outlook S/MIME.
324324
325325
#### November 18, 2019

memdocs/intune/protect/certificates-configure.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -147,6 +147,9 @@ When you use a third-party (non-Microsoft) Certification Authority (CA):
147147
- ***Note 1*** - Beginning with Android 11, trusted certificate profiles can no longer install the trusted root certificate on devices that are enrolled as *Android device administrator*. This limitation doesn't apply to Samsung Knox. For more information, see [Trusted certificate profiles for Android device administrator](certificates-trusted-root.md#trusted-certificate-profiles-for-android-device-administrator).
148148
- ***Note 2*** - This profile is supported for [Windows Enterprise multi-session remote desktops](../fundamentals/azure-virtual-desktop-multi-session.md).
149149

150+
[!INCLUDE [windows-phone-81-windows-10-mobile-support](../includes/windows-phone-81-windows-10-mobile-support.md)]
151+
152+
150153
## Next steps
151154

152155
More resources

memdocs/intune/protect/certificates-profile-scep.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -39,6 +39,7 @@ Devices that run Android Enterprise might require a PIN before SCEP can provisio
3939
>
4040
> For more information about this limitation, see [Trusted certificate profiles for Android device administrator](../protect/certificates-trusted-root.md#trusted-certificate-profiles-for-android-device-administrator).
4141
42+
[!INCLUDE [windows-phone-81-windows-10-mobile-support](../includes/windows-phone-81-windows-10-mobile-support.md)]
4243
> [!TIP]
4344
> *SCEP certificate* profiles are supported for [Windows Enterprise multi-session remote desktops](../fundamentals/azure-virtual-desktop-multi-session.md).
4445

memdocs/intune/protect/certificates-trusted-root.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -127,6 +127,8 @@ After naming the certificate, it can be saved.
127127
- **User certificate store - Intermediate**
128128

129129
![Create a profile and upload a trusted certificate](./media/certificates-trusted-root/certificates-configure-profile-fill.png)
130+
131+
[!INCLUDE [windows-phone-81-windows-10-mobile-support](../includes/windows-phone-81-windows-10-mobile-support.md)]
130132

131133
8. Select **Next**.
132134

memdocs/intune/protect/compliance-policy-create-windows-8-1.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,7 @@ ms.collection: M365-identity-device-management
2929
# Device Compliance settings for Windows 8.1 in Intune
3030

3131
[!INCLUDE [windows-phone-81-windows-10-mobile-support](../includes/windows-phone-81-windows-10-mobile-support.md)]
32+
3233
This article lists and describes the different compliance settings you can configure on Windows 8.1 devices in Intune. As part of your mobile device management (MDM) solution, use these settings to block simple passwords, set a minimum and maximum OS version, and more.
3334

3435
This feature applies to:

0 commit comments

Comments
 (0)