Skip to content

Commit 7bcae2b

Browse files
authored
Merge pull request #7834 from MicrosoftDocs/main
Publish 06/16/2022, 10:30 AM
2 parents 548f725 + f600434 commit 7bcae2b

20 files changed

Lines changed: 335 additions & 377 deletions

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,10 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "memdocs/intune/fundamentals/end-user-mam-apps-android.md",
5+
"redirect_url": "/mem/intune/user-help/use-managed-apps-on-your-device-android",
6+
"redirect_document_id": true
7+
},
38
{
49
"source_path": "memdocs/intune/configuration/vpn-settings-windows-phone-8-1.md",
510
"redirect_url": "https://support.microsoft.com/windows/windows-phone-8-1-end-of-support-faq-7f1ef0aa-0aaf-0747-3724-5c44456778a3",

memdocs/autopilot/add-devices.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -43,6 +43,9 @@ This article provides step-by-step guidance for manual registration. For more in
4343

4444
Device enrollment requires *Intune Administrator* or *Policy and Profile Manager* permissions. You can also create a custom Autopilot device manager role by using [role-based access control](../intune/fundamentals/role-based-access-control.md). Autopilot device management requires only that you enable all permissions under **Enrollment programs**, except for the four token management options.
4545

46+
> [!NOTE]
47+
> In both Intune Administrator and role-based access control methods, the administrative user also requires consent to use the Microsoft Intune PowerShell enterprise application.
48+
4649
## Collect the hardware hash
4750

4851
The following methods are available to harvest a hardware hash from existing devices:

memdocs/autopilot/bitlocker.md

Lines changed: 36 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -1,54 +1,73 @@
11
---
22
title: Setting the BitLocker encryption algorithm for Autopilot devices
33
description: Microsoft Intune provides a comprehensive set of configuration options to manage BitLocker on Windows devices.
4-
keywords: Autopilot, BitLocker, encryption, 256-bit, Windows 10
54
ms.prod: w10
6-
ms.mktglfcycl: deploy
7-
ms.sitesec: library
8-
ms.pagetype: deploy
95
ms.localizationpriority: medium
10-
audience: itpro
116
author: aczechowski
127
ms.author: aaroncz
138
ms.reviewer: jubaptis
149
manager: dougeby
15-
ms.date: 12/16/2020
10+
ms.date: 06/15/2022
1611
ms.collection: M365-modern-desktop
1712
ms.topic: how-to
1813
---
1914

20-
2115
# Setting the BitLocker encryption algorithm for Autopilot devices
2216

2317
**Applies to**
2418

2519
- Windows 11
2620
- Windows 10
2721

28-
With Windows Autopilot, you can configure BitLocker encryption settings to get applied before automatic encryption starts. This configuration makes sure the default encryption algorithm isn't applied automatically. Other BitLocker policies can also be applied before automatic BitLocker encryption begins.
22+
BitLocker [automatically encrypts](/windows-hardware/design/device-experiences/oem-bitlocker#bitlocker-automatic-device-encryption) internal drives during the out of box experience (OOBE) for devices that support [Modern Standby](/windows-hardware/design/device-experiences/modern-standby) or meet the [Hardware Security Testability Specification (HSTI)](/windows-hardware/test/hlk/testref/hardware-security-testability-specification). By default, BitLocker uses XTS-AES 128-bit used space only for automatic encryption.
23+
24+
With Windows Autopilot, you can configure BitLocker encryption settings to apply before automatic encryption starts. This configuration makes sure the default encryption algorithm or type isn't applied automatically. A device that receives these settings after encrypting automatically will need to be decrypted before changing the encryption algorithm.
25+
26+
## Encryption algorithm
27+
28+
The BitLocker encryption algorithm is used when BitLocker is first enabled. During Autopilot, BitLocker will be enabled after the device setup portion of the [enrollment status page](enrollment-status.md). The following encryption algorithms are available:
2929

30-
The BitLocker encryption algorithm is used when BitLocker is first enabled. The algorithm sets the strength for full volume encryption. Available encryption algorithms are: AES-CBC 128-bit, AES-CBC 256-bit, XTS-AES 128-bit, or XTS-AES 256-bit encryption. The default value is XTS-AES 128-bit encryption. See [BitLocker CSP](/windows/client-management/mdm/bitlocker-csp) for information about the recommended encryption algorithms to use.
30+
- AES-CBC 128-bit
31+
- AES-CBC 256-bit
32+
- XTS-AES 128-bit (default)
33+
- XTS-AES 256-bit
34+
35+
For more information about the recommended encryption algorithms to use, see [BitLocker CSP](/windows/client-management/mdm/bitlocker-csp).
3136

3237
To make sure the BitLocker encryption algorithm you want is set before automatic encryption occurs for Autopilot devices:
3338

34-
1. Configure the [encryption method settings](../intune/protect/endpoint-protection-windows-10.md#windows-encryption) in the Windows Endpoint Protection profile to the encryption algorithm you want.
39+
1. Configure the [encryption method settings](../intune/protect/encrypt-devices.md#create-an-endpoint-security-policy-for-bitlocker) in the Endpoint Security disk encryption policy. The settings are available under **Endpoint Security** > **Disk encryption** > **Create policy** > **Platform** = Windows 10 and later, **Profile type** = BitLocker.
40+
3541
2. [Assign the policy](../intune/configuration/device-profile-assign.md) to your Autopilot device group. The encryption policy must be assigned to **devices** in the group, not users.
36-
3. Enable the Autopilot [Enrollment Status Page](enrollment-status.md) (ESP) for these devices. If the ESP isn't enabled, the policy won't apply before encryption starts.
3742

38-
An example of Microsoft Intune Windows Encryption settings is shown below.
43+
3. Enable the Autopilot [enrollment status page](enrollment-status.md) for these devices. If you don't enable this feature, the policy won't apply before encryption starts.
44+
45+
The following image is an example of the Endpoint Security disk encryption settings.
3946

40-
![BitLocker encryption settings.](images/bitlocker-encryption.png)
47+
:::image type="content" source="media/bitlocker/endpoint-security-disk-encryption-policy.png" alt-text="Screenshot example of the Endpoint Security disk encryption settings.":::
4148

42-
A device that is encrypted automatically will need to be decrypted before changing the encryption algorithm.
49+
## Full disk or used space-only encryption
4350

44-
The settings are available under **Device Configuration** > **Profiles** > **Create profile** > **Platform** = Windows 10 and later, Profile type = Endpoint protection > **Configure** > **Windows Encryption** > **BitLocker base settings**, Configure encryption methods = Enable.
51+
There are two types of encryption, full disk or used space-only. The type of encryption is automatically determined by configuration of [silent enablement](../intune/protect/encrypt-devices.md#silently-enable-bitlocker-on-devices) and hardware support for modern standby. You can enforce it by configuring the [SystemDrivesEncryptionType](/windows/client-management/mdm/bitlocker-csp) setting. Like the encryption algorithm, the encryption type is used when BitLocker is first enabled. For more information on the expected encryption type behavior, see [Manage BitLocker policy](../intune/protect/encrypt-devices.md#full-disk-vs-used-space-only-encryption).
4552

46-
It's also recommended to set **Windows Encryption** > **Windows Settings** > **Encrypt** = Require.
53+
To enforce the type of drive encryption used:
54+
55+
1. Configure the **Enforce drive encryption type on operating system drives** setting within the [settings catalog](../intune/configuration/settings-catalog.md). This setting is available in the **Administrative Templates > Windows Components > BitLocker Drive Encryption > Operating System Drives** category from the settings picker.
56+
57+
2. [Assign the policy](../intune/configuration/device-profile-assign.md) to your Autopilot device group. The encryption policy must be assigned to **devices** in the group, not users.
58+
59+
3. Enable the Autopilot [enrollment status page](enrollment-status.md) for these devices. If you don't enable this feature, the policy won't apply before encryption starts.
60+
61+
The following image is an example of the settings catalog profile.
62+
63+
:::image type="content" source="media/bitlocker/settings-catalog-drive-type.png" alt-text="Screenshot example of the BitLocker drive type configuration in the settings catalog.":::
4764

4865
## Requirements
4966

50-
Windows 10, version 1809 or later.
67+
A supported version of Windows 11 or Windows 10.
5168

5269
## Next steps
5370

5471
[BitLocker overview](/windows/security/information-protection/bitlocker/bitlocker-overview)
72+
73+
[Manage BitLocker policy for Windows devices with Intune](../intune/protect/encrypt-devices.md)

memdocs/autopilot/known-issues.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,11 @@ This article describes known issues that can often be resolved by configuration
2828

2929
## Known issues
3030

31-
### `DefaultuserX` profile not deleted
31+
### Autopilot profile not being applied when assigned
32+
33+
In Windows 10 April (KB5011831) release, there is an issue where the Autopilot profile may fail to apply to the device. As a result, any settings made in the profile may not be configured for the user such as device renaming. To resolve this issue, the May (KB5015020) cumulative update needs to be applied to the device.
34+
35+
### DefaultuserX profile not deleted
3236

3337
When you use the [EnableWebSignIn CSP](/windows/client-management/mdm/policy-csp-authentication#authentication-enablewebsignin), the `defaultuserX` profile may not be deleted. This CSP isn't currently supported. It's in preview mode only and not recommended for production purposes at this time.
3438

73.7 KB
Loading
23.3 KB
Loading

memdocs/configmgr/comanage/workloads.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -103,6 +103,9 @@ For more information on the Intune feature, see [Create a device profile in Micr
103103
>
104104
> When you switch the device configuration workload, it also includes policies for the Windows Information Protection feature. Only policies from Intune will apply once the Device Configuration workload is moved to Intune.<!-- 4184095 -->
105105
106+
> [!NOTE]
107+
> In order to tattoo remove Endpoint protection settings, Device Configuration workload also needs to be switched.
108+
106109
## Office Click-to-Run apps
107110

108111
<!--1357841-->

memdocs/configmgr/core/servers/deploy/install/command-line-script-file.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -125,8 +125,8 @@ Include the following keys in the `SABranchOptions` section to install a site:<!
125125

126126
| Key name | Required | Values | Details |
127127
|----------|----------|--------|---------|
128-
| `SAActive` | No | - `0`: You don't have SA<br>- `1`: SA is active | Specify if you have active Software Assurance (SA). For more information, see [Product and licensing FAQ](../../../understand/product-and-licensing-faq.yml). |
129-
| `CurrentBranch` | No | - `0`: Install the LTSB<br>- `1`: Install current branch | Specify whether to use Configuration Manager current branch or long-term servicing branch (LTSB). For more information, see [Which branch of Configuration Manager should I use?](../../../understand/which-branch-should-i-use.md) |
128+
| `SAActive` | Yes | - `0`: You don't have SA<br>- `1`: SA is active | Specify if you have active Software Assurance (SA). For more information, see [Product and licensing FAQ](../../../understand/product-and-licensing-faq.yml). |
129+
| `CurrentBranch` | Yes | - `0`: Install the LTSB<br>- `1`: Install current branch | Specify whether to use Configuration Manager current branch or long-term servicing branch (LTSB). For more information, see [Which branch of Configuration Manager should I use?](../../../understand/which-branch-should-i-use.md) |
130130
| `SAExpiration` | No | Date | The date when SA expires, used as a convenient reminder of that date. For more information, see [Licensing and branches](../../../understand/learn-more-editions.md). |
131131

132132
### `HierarchyExpansionOption` section for site expansion

memdocs/intune/apps/app-configuration-policies-outlook.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ The Outlook for iOS and Android app is designed to enable users in your organiza
3535
The richest and broadest protection capabilities for Microsoft 365 data are available when you subscribe to the Enterprise Mobility + Security suite, which includes Microsoft Intune and Azure Active Directory Premium features, such as conditional access. At a minimum, you will want to deploy a conditional access policy that allows connectivity to Outlook for iOS and Android from mobile devices and an Intune app protection policy that ensures the collaboration experience is protected.
3636

3737
## Apply Conditional Access
38-
Organizations can use use Azure AD Conditional Access policies to ensure that users can only access work or school content using Outlook for iOS and Android. To do this, you will need a conditional access policy that targets all potential users. These policies are described in [Conditional Access: Require approved client apps or app protection policy](/azure/active-directory/conditional-access/howto-policy-approved-app-or-app-protection).
38+
Organizations can use Azure AD Conditional Access policies to ensure that users can only access work or school content using Outlook for iOS and Android. To do this, you will need a conditional access policy that targets all potential users. These policies are described in [Conditional Access: Require approved client apps or app protection policy](/azure/active-directory/conditional-access/howto-policy-approved-app-or-app-protection).
3939

4040
1. Follow the steps in [Require approved client apps or app protection policy with mobile devices](/azure/active-directory/conditional-access/howto-policy-approved-app-or-app-protection#require-approved-client-apps-or-app-protection-policy-with-mobile-devices). This policy allows Outlook for iOS and Android, but blocks OAuth and basic authentication capable Exchange ActiveSync mobile clients from connecting to Exchange Online.
4141

@@ -65,18 +65,18 @@ To see the specific recommendations for each configuration level and the minimum
6565

6666
Regardless of whether the device is enrolled in a unified endpoint management (UEM) solution, an Intune app protection policy needs to be created for both iOS and Android apps, using the steps in [How to create and assign app protection policies](app-protection-policies.md). These policies, at a minimum, must meet the following conditions:
6767

68-
1. They include all Microsoft 365 mobile applications, such as Edge, Outlook, OneDrive, Office, or Teams, as this ensures that users can access and manipulate work or school data within any Microsoft app in a secure fashion.
68+
- They include all Microsoft 365 mobile applications, such as Edge, Outlook, OneDrive, Office, or Teams, as this ensures that users can access and manipulate work or school data within any Microsoft app in a secure fashion.
6969

70-
2. They are assigned to all users. This ensures that all users are protected, regardless of whether they use Outlook for iOS or Android.
70+
- They are assigned to all users. This ensures that all users are protected, regardless of whether they use Outlook for iOS or Android.
7171

72-
3. Determine which framework level meets your requirements. Most organizations should implement the settings defined in **Enterprise enhanced data protection** (Level 2) as that enables data protection and access requirements controls.
72+
- Determine which framework level meets your requirements. Most organizations should implement the settings defined in **Enterprise enhanced data protection** (Level 2) as that enables data protection and access requirements controls.
7373

7474
For more information on the available settings, see [Android app protection policy settings](app-protection-policy-settings-android.md) and [iOS app protection policy settings](app-protection-policy-settings-ios.md).
7575

7676
> [!IMPORTANT]
77-
> To apply Intune app protection policies against apps on Android devices that are not enrolled in Intune, the user must also install the Intune Company Portal. For more information, see [What to expect when your Android app is managed by app protection policies](../fundamentals/end-user-mam-apps-android.md).
77+
> To apply Intune app protection policies against apps on Android devices that are not enrolled in Intune, the user must also install the Intune Company Portal.
7878
79-
## Utilize app configuration
79+
## Use app configuration
8080

8181
Outlook for iOS and Android supports app settings that allow unified endpoint management, like Microsoft Endpoint Manager, administrators to customize the behavior of the app.
8282

@@ -92,4 +92,4 @@ For specific procedural steps and detailed documentation on the app configuratio
9292
## Next steps
9393

9494
- [What are app protection policies?](app-protection-policy.md)
95-
- [App configuration policies for Microsoft Intune](app-configuration-policies-overview.md)
95+
- [App configuration policies for Microsoft Intune](app-configuration-policies-overview.md)

memdocs/intune/apps/app-protection-policies-monitor.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -180,5 +180,4 @@ Follow these steps to generate App Protection .csv file or App Configuration .cs
180180
181181
## See also
182182
- [Manage data transfer between iOS/iPadOS apps](data-transfer-between-apps-manage-ios.md)
183-
- [What to expect when your Android app is managed by app protection policies](../fundamentals/end-user-mam-apps-android.md)
184183
- [What to expect when your iOS/iPadOS app is managed by app protection policies](../fundamentals/end-user-mam-apps-ios.md)

0 commit comments

Comments
 (0)