Skip to content

Commit 7ac37b0

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/memdocs-pr into ado13055801
2 parents 86ee4be + 8ea321f commit 7ac37b0

51 files changed

Lines changed: 479 additions & 314 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

memdocs/analytics/enroll-configmgr.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -33,10 +33,7 @@ Before you start this tutorial, make sure you have the following prerequisites:
3333
3434
### Licensing Prerequisites
3535

36-
Endpoint analytics is included in the following plans:
37-
38-
- [Enterprise Mobility + Security E3](https://www.microsoftvolumelicensing.com/ProductResults.aspx?doc=Product%20Terms,OST&fid=51) or higher
39-
- [Microsoft 365 Enterprise E3](https://www.microsoft.com/en-us/microsoft-365/enterprise?rtc=1) or higher.
36+
Devices enrolled in Endpoint analytics need a valid license for the use of Microsoft Endpoint Manager. For more information, see [Microsoft Intune licensing](../intune/fundamentals/licenses.md) or [Microsoft Endpoint Configuration Manager licensing](../configmgr/core/understand/learn-more-editions.md).
4037

4138
## Endpoint analytics permissions
4239

memdocs/analytics/enroll-intune.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -43,10 +43,7 @@ To enroll devices to Endpoint analytics, they need to send required functional d
4343

4444
### Licensing Prerequisites
4545

46-
Endpoint analytics is included in the following plans:
47-
48-
- [Enterprise Mobility + Security E3](https://www.microsoftvolumelicensing.com/ProductResults.aspx?doc=Product%20Terms,OST&fid=51) or higher
49-
- [Microsoft 365 Enterprise E3](https://www.microsoft.com/en-us/microsoft-365/enterprise?rtc=1) or higher.
46+
Devices enrolled in Endpoint analytics need a valid license for the use of Microsoft Endpoint Manager. For more information, see [Microsoft Intune licensing](../intune/fundamentals/licenses.md) or [Microsoft Endpoint Configuration Manager licensing](../configmgr/core/understand/learn-more-editions.md).
5047

5148
### Endpoint analytics permissions
5249

memdocs/configmgr/hotfix/2010/5001600.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -16,6 +16,12 @@ ms.localizationpriority: medium
1616
*Applies to: Configuration Manager (current branch, versions 1910 - 2010)*
1717

1818
## Summary of KB5001600
19+
> [!NOTE]
20+
> This update is replaced by the following newer version effective January 21, 2022
21+
>
22+
> [KB 12819689 Connected cache update for Microsoft Endpoint Configuration Manager version 2111](../../hotfix/2111/12819689.md)
23+
>
24+
1925
Due to content delivery network changes, the Microsoft Connected Cache (MCC) server component installation fails when enabled for distribution points *after* **March 5, 2021**.
2026
This component is enabled by selecting the **Enable this distribution point to be used as Microsoft Connected Cache server** option in a distribution point's properties.
2127
After March 5, 2021, once enabled, the component will retry installation three times before stopping.

memdocs/configmgr/hotfix/2111/12709700.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -69,7 +69,7 @@ The following major components are updated to the versions specified:
6969

7070
|Component |Version |
7171
|---|---|
72-
| Site | 5.00.9060.1000 |
72+
| Full Version | 5.00.9068.1008 |
7373
| Configuration Manager console | 5.2111.1052.1700 |
7474
| Client | 5.00.9068.1008 |
7575

Lines changed: 63 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,63 @@
1+
---
2+
title: Connected cache update for Microsoft Endpoint Configuration Manager version 2111
3+
titleSuffix: Configuration Manager
4+
description: Console update for 2111
5+
ms.date: 1/21/2022
6+
ms.prod: configuration-manager
7+
ms.technology: configmgr-core
8+
ms.topic: reference
9+
ms.assetid: 41afa274-7561-4c0e-80af-2d0fe01699ef
10+
author: bhuney
11+
ms.author: brianhun
12+
manager: dougeby
13+
---
14+
15+
# Connected cache update for Microsoft Endpoint Configuration Manager version 2111
16+
17+
*Applies to: Configuration Manager (current branch, version 2111)*
18+
## Summary of KB12819689
19+
20+
An update is available to resolve the following issue with Configuration Manager current branch, version 2111.
21+
22+
- The Microsoft Connected Cache (MCC) feature is not used as expected for Win32 apps deployed through Microsoft Intune in a co-managed environment.
23+
Review of the IntuneManagementExtension.log file shows an internet-based **DownloadURL** value.
24+
The MCC component is enabled by selecting the **Enable this distribution point to be used as Microsoft Connected Cache server** option in a distribution point's properties.
25+
26+
27+
## Update information for Microsoft Endpoint Configuration Manager, version 2111
28+
The following hotfix to resolve this problem is available for download from the Microsoft Download Center:
29+
30+
[Download this hotfix now](https://download.microsoft.com/download/a/3/a/a3af1ea3-79ba-4600-8953-c2a4b6b8b970/DoincInstall.exe).
31+
32+
After you download this hotfix, refer to the following installation instructions.
33+
34+
## Installation instructions
35+
1. Confirm there is not currently an installation of the MCC component in progress. This is done by checking for status message **9522**, generated by the `SMS_DISTRIBUTION_MANAGER` component. The 9522 message indicates that installation is no longer being retried.
36+
2. Copy the new version of `DoincInstall.exe`, version **1.5.5.9002**, to the `{SMSInstallDir}\bin\x64` folder on all site servers, including the Central Administration Site (CAS) if present, and any passive sites.
37+
3. Uncheck the **Enable this distribution point to be used as Microsoft Connected Cache server** option in the affected distribution point’s properties.
38+
4. Wait for the uninstall of MCC to complete on the distribution point. This can be confirmed by looking for a **9152** success status message, combined with the following entry in `distmgr.log`.
39+
```text
40+
Finished waiting for DoincInstall. InvocationState: UninstallCompleted. InvocationExitCode: 0. InvocationMessage: .
41+
```
42+
5. Recheck the **Enable this distribution point to be used as Microsoft Connected Cache server** option for the affected distribution point.
43+
44+
> [!TIP]
45+
> For sites with a large number of distribution points, replace steps 4 - 5 above with the following.
46+
> - Create an empty file named `resetdps.trn` and place it in the `{SMSInstallDir}\inboxes\distmgr.box` folder. This will reinstall all distribution points for that site using the latest version of `DoincInstall.exe` copied in step 3. above.
47+
48+
## Prerequisites
49+
To apply this hotfix, you must be using Microsoft Endpoint Configuration Manager, versions 1910 through versions 2111.
50+
51+
## Restart information
52+
You don't have to restart the computer after you apply this hotfix.
53+
54+
## Hotfix replacement information
55+
This hotfix replaces the following previously released hotfix.
56+
57+
[KB5001600 Microsoft Connected Cache component fails to install on Configuration Manager current branch](../../hotfix/2010/5001600.md)
58+
59+
## File information
60+
File information is available in the downloadable [KB12819689_FileList.txt](https://aka.ms/KB12819689_FileList) text file.
61+
62+
## Release history
63+
- January 21, 2022: Initial hotfix release

memdocs/configmgr/hotfix/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,8 @@ items:
99
href: 2111/12709700.md
1010
- name: KB 12959506 Client update for Configuration Manager 2111
1111
href: 2111/12959506.md
12+
- name: KB 12819689 Connected cache update for Microsoft Endpoint Configuration Manager version 2111
13+
href: 2111/12819689.md
1214
- name: Version 2107
1315
items:
1416
- name: KB 10096997 Summary of changes in 2107

memdocs/intune/apps/app-protection-framework.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ Microsoft recommends the following deployment ring approach for the APP data pro
5252
| Deployment ring | Tenant | Assessment teams | Output | Timeline |
5353
|--------------------|------------------------|-------------------------------------------------------------------|----------------------------------------------------------|----------------------------------------|
5454
| Quality Assurance | Pre-production tenant | Mobile capability owners, Security, Risk Assessment, Privacy, UX | Functional scenario validation, draft documentation | 0-30 days |
55-
| Preview | Production tenant | Mobile capability owners, UX | End user scenario validation, user facing documentation | 7-14 days, post Quality Assurance |
55+
| Preview | Production tenant | Mobile capability owners, UX | End-user scenario validation, user facing documentation | 7-14 days, post Quality Assurance |
5656
| Production | Production tenant | Mobile capability owners, IT help desk | N/A | 7 days to several weeks, post Preview |
5757

5858
As the above table indicates, all changes to the App Protection Policies should be first performed in a pre-production environment to understand the policy setting implications. Once testing is complete, the changes can be moved into production and applied to a subset of production users, generally, the IT department and other applicable groups. And finally, the rollout can be completed to the rest of the mobile user community. Rollout to production may take a longer amount of time depending on the scale of impact regarding the change. If there is no user impact, the change should roll out quickly, whereas, if the change results in user impact, rollout may need to go slower due to the need to communicate changes to the user population.
@@ -106,7 +106,7 @@ The policies in level 1 enforce a reasonable data access level while minimizing
106106

107107
| Setting | Setting description | Value | Platform |
108108
|-----------------|--------------------------------------------------------|-----------------------|----------------------------------------|
109-
| Data Transfer | Backup org data to… | Allow | iOS/iPadOS, Android |
109+
| Data Transfer | Back up org data to… | Allow | iOS/iPadOS, Android |
110110
| Data Transfer | Send org data to other apps | All apps | iOS/iPadOS, Android |
111111
| Data Transfer | Receive data from other apps | All apps | iOS/iPadOS, Android |
112112
| Data Transfer | Restrict cut, copy, and paste between apps | Any app | iOS/iPadOS, Android |
@@ -129,7 +129,7 @@ The policies in level 1 enforce a reasonable data access level while minimizing
129129
| Simple PIN | Allow | iOS/iPadOS, Android | |
130130
| Select Minimum PIN length | 4 | iOS/iPadOS, Android | |
131131
| Touch ID instead of PIN for access (iOS 8+/iPadOS) | Allow | iOS/iPadOS | |
132-
| Fingerprint instead of PIN for access (Android 6.0+) | Allow | Android | |
132+
| Fingerprint instead of PIN for access (Android 9.0+) | Allow | Android | |
133133
| Override biometrics with PIN after timeout | Require | iOS/iPadOS | |
134134
| Override fingerprint with PIN after timeout | Require | Android | |
135135
| Timeout (minutes of activity) | 720 | iOS/iPadOS, Android | |
@@ -149,8 +149,8 @@ The policies in level 1 enforce a reasonable data access level while minimizing
149149
| App conditions | Offline grace period | 720 / Block access (minutes) | iOS/iPadOS, Android | |
150150
| App conditions | Offline grace period | 90 / Wipe data (days) | iOS/iPadOS, Android | |
151151
| Device conditions | Jailbroken/rooted devices | N/A / Block access | iOS/iPadOS, Android | |
152-
| Device conditions | SafetyNet device attestation | Basic integrity and certified devices / Block access | Android | <p>This setting configures Google's SafetyNet Attestation on end user devices. Basic integrity validates the integrity of the device. Rooted devices, emulators, virtual devices, and devices with signs of tampering fail basic integrity. </p><p> Basic integrity and certified devices validates the compatibility of the device with Google's services. Only unmodified devices that have been certified by Google can pass this check.</p> |
153-
| Device conditions | Require threat scan on apps | N/A / Block access | Android | This setting ensures that Google's Verify Apps scan is turned on for end user devices. If configured, the end user will be blocked from access until they turn on Google's app scanning on their Android device. |
152+
| Device conditions | SafetyNet device attestation | Basic integrity and certified devices / Block access | Android | <p>This setting configures Google's SafetyNet Attestation on end-user devices. Basic integrity validates the integrity of the device. Rooted devices, emulators, virtual devices, and devices with signs of tampering fail basic integrity. </p><p> Basic integrity and certified devices validates the compatibility of the device with Google's services. Only unmodified devices that have been certified by Google can pass this check.</p> |
153+
| Device conditions | Require threat scan on apps | N/A / Block access | Android | This setting ensures that Google's Verify Apps scan is turned on for end user devices. If configured, the end-user will be blocked from access until they turn on Google's app scanning on their Android device. |
154154
| Device conditions | Require device lock | N/A / Block access | Android | This setting ensures that Android devices have a device PIN, password, or pattern are set to enable a device lock. This condition does not distinguish between lock options or the complexity. |
155155

156156
#### Level 2 enterprise enhanced data protection
@@ -163,7 +163,7 @@ The policy settings enforced in level 2 include all the policy settings recommen
163163

164164
| Setting | Setting description | Value | Platform | Notes |
165165
|---------------|----------------------------------------------------------|-----------------------------------------------|---------------------------------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
166-
| Data Transfer | Backup org data to… | Block | iOS/iPadOS, Android | |
166+
| Data Transfer | Back up org data to… | Block | iOS/iPadOS, Android | |
167167
| Data Transfer | Send org data to other apps | Policy managed apps | iOS/iPadOS, Android | <p>With iOS/iPadOS, administrators can configure this value to be "Policy managed apps", "Policy managed apps with OS sharing", or "Policy managed apps with Open-In/Share filtering". </p><p>Policy managed apps with OS sharing is available when the device is also enrolled with Intune. This setting allows data transfer to other policy managed apps, as well as file transfers to other apps that have are managed by Intune. </p><p>Policy managed apps with Open-In/Share filtering filters the OS Open-in/Share dialogs to only display policy managed apps. </p><p> For more information, see [iOS app protection policy settings](app-protection-policy-settings-ios.md).</p> |
168168
| Data Transfer | Select apps to exempt | Default / skype;app-settings;calshow;itms;itmss;itms-apps;itms-appss;itms-services; | iOS/iPadOS | |
169169
| Data Transfer | Save copies of org data | Block | iOS/iPadOS, Android | |

0 commit comments

Comments
 (0)