Skip to content

Commit 7edb622

Browse files
author
Thomas Raya
authored
Merge pull request #7740 from MicrosoftDocs/main
Publish 06/06/2022, 10:30 AM
2 parents 9f0aea7 + 6f170a4 commit 7edb622

22 files changed

Lines changed: 183 additions & 28 deletions

memdocs/intune/configuration/settings-catalog-printer-provisioning.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ keywords:
77
author: MandiOhlinger
88
ms.author: mandia
99
manager: dougeby
10-
ms.date: 05/23/2022
10+
ms.date: 06/06/2022
1111
ms.topic: how-to
1212
ms.service: microsoft-intune
1313
ms.subservice: configuration
@@ -30,7 +30,7 @@ ms.collection: M365-identity-device-management
3030
# Create a Universal Print policy in Microsoft Intune
3131

3232
> [!NOTE]
33-
> This feature will release over several days and won't be available to all customers immediately.
33+
> This feature will release over several days and won't be available to all tenants immediately.
3434
3535
Many organizations are moving their printer infrastructure to the cloud. [Universal Print](/universal-print/fundamentals/universal-print-whatis) is a cloud-based printing solution in Microsoft 365. It uses built-in cloud printers, built-in legacy printers, and runs entirely in Microsoft Azure.
3636

@@ -60,9 +60,11 @@ This article shows you how to create a Universal Print policy in Microsoft Intun
6060
- **Printer Administrator** or **Global Administrator** roles: Needed to add printers.
6161

6262
For more information on these roles, go to [Azure AD built-in roles](/azure/active-directory/roles/permissions-reference).
63+
6364
- **Intune Administrator** or **Global Administrator** roles: Needed to create and assign Intune policies.
6465

6566
For more information on these roles, go to [Role-based access control (RBAC) with Microsoft Intune](../fundamentals/role-based-access-control.md)
67+
6668
- An assigned Universal Print license.
6769

6870
- End user accounts need the following permissions/licenses:
@@ -72,6 +74,8 @@ This article shows you how to create a Universal Print policy in Microsoft Intun
7274

7375
If the profile is assigned to an Azure AD user/user group that can't access the printers because of permissions, then Intune grants the assigned user/user group the permissions.
7476

77+
- These settings use the [UniversalPrint CSP](/windows/client-management/mdm/universalprint-csp).
78+
7579
## Create the policy
7680

7781
This policy includes your printer information. When you assign the policy, the printers are automatically installed. Then, on their devices, users select a printer that you added.

memdocs/intune/enrollment/windows-bulk-enroll.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -70,6 +70,9 @@ Azure AD users are standard users on these devices and receive assigned Intune p
7070
6. Select **Enroll in Azure AD**, enter a **Bulk Token Expiry** date, and then select **Get Bulk Token**. The token validity period is 180 days.
7171
![Screenshot of account management in the Windows Configuration Designer app](./media/windows-bulk-enroll/bulk-enroll-account.png)
7272

73+
> [!NOTE]
74+
> Once a provisioning package is created, it can be revoked before its expiration by removing the associated package_{GUID} user account from Azure AD.
75+
7376
7. Provide your Azure AD credentials to get a bulk token.
7477
![Screenshot of signing in to the Windows Configuration Designer app](./media/windows-bulk-enroll/bulk-enroll-cred.png)
7578

memdocs/intune/fundamentals/in-development.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -79,7 +79,7 @@ Feedback settings will be provided to address M365 enterprise feedback policies
7979
You will be able to select to include **Photo Library** as a supported application storage service for *outgoing* data. This support is in addition to *incoming* data transfer support for **Photo Library**. By selecting **Photo Library** in the **Allow users to open data from selected services** setting within Intune, you can allow managed accounts to send *outgoing* data to their device's photo library from their managed apps on iOS and Android platforms. In [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), select **Apps** > **App protection policies** > **Create Policy**. Choose either **iOS/iPadOS** or **Android**. This setting will be available as part of the **Data protection** step and specifically for **Policy managed apps**. For related information, see [Data protection](../apps/app-protection-framework.md#data-protection-2).
8080

8181
### Use App Protection Policies with Android Enterprise dedicated devices and Android (AOSP) devices<!-- 13819227 -->
82-
Intune-managed Android Enterprise dedicated devices enrolled with Azure Active Directory (Azure AD) shared mode and Android (AOSP) devices will be able to receive app protection policies policies and can be targeted separately from other Android device types. For more information about Android Enterprise dedicated devices and Android (AOSP), see [Android Enterprise dedicated devices](../fundamentals/deployment-guide-enrollment-android.md#android-enterprise-dedicated-devices) and [Android Open Source Project](../fundamentals/deployment-guide-enrollment-android.md#android-open-source-project).
82+
Intune-managed Android Enterprise dedicated devices enrolled with Azure Active Directory (Azure AD) shared mode and Android (AOSP) devices will be able to receive app protection policies and can be targeted separately from other Android device types. For more information about Android Enterprise dedicated devices and Android (AOSP), see [Android Enterprise dedicated devices](../fundamentals/deployment-guide-enrollment-android.md#android-enterprise-dedicated-devices) and [Android Open Source Project](../fundamentals/deployment-guide-enrollment-android.md#android-open-source-project).
8383

8484
<!-- ***********************************************-->
8585

@@ -99,7 +99,7 @@ Applies to:
9999
For more information, see [Using Azure Virtual Desktop multi-session with Microsoft Intune](../fundamentals/azure-virtual-desktop-multi-session.md)
100100

101101
### Remotely restart and shut down macOS device <!-- 12472418 -->
102-
You'll be able to remotely restart or shutdown a macOS device using device actions. These device actions are available for devices running macOS 10.13 and later.
102+
You'll be able to remotely restart or shut down a macOS device using device actions. These device actions are available for devices running macOS 10.13 and later.
103103
For more information, see [Restart devices with Microsoft Intune](../remote-actions/device-restart.md).
104104

105105
### Additional Remote actions for Android (AOSP) Corporate devices<!-- 8504019 -->
@@ -117,7 +117,7 @@ Applies to:
117117
### Improved certificate reporting details<!-- 13316515 -->
118118
We’re changing what Intune displays when you view certificate details for devices and certificate profiles. [Microsoft Endpoint Manager admin center]( https://go.microsoft.com/fwlink/?linkid=2109431) > **Devices** > **Monitor** > **Certificates**.
119119

120-
Today, the certificate reports can show certificates that are no longer valid, or that are no longer on a device. With this change, you’ll won't see information for those invalid certificates. Instead, Intune displays only those that are valid, that were revoked within the last 30 days, or that expired within the last 30 days will be shown.
120+
Today, the certificate reports can show certificates that are no longer valid, or that are no longer on a device. With this change, you won't see information for those invalid certificates. Instead, Intune displays only those that are valid, that were revoked within the last 30 days, or that expired within the last 30 days will be shown.
121121

122122
### View a managed device's group membership<!-- 4100067 -->
123123
In the monitor section of the **Devices** workload of Intune, you'll be able to view the group membership of all AAD groups for a managed device. When this is available, you will be able to select **Group Membership** by signing in to [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431) and selecting **Devices** > **Monitor** > *select a device* > **Group Membership**.

memdocs/intune/protect/advanced-threat-protection-configure.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ keywords: configure, manage, capabilities, attack surface reduction, next-genera
77
author: brenduns
88
ms.author: brenduns
99
manager: dougeby
10-
ms.date: 05/23/2022
10+
ms.date: 06/06/2022
1111
ms.topic: how-to
1212
ms.service: microsoft-intune
1313
ms.subservice: protect
@@ -40,6 +40,8 @@ Use the information and procedures in this article to configure integration of M
4040

4141
Before starting, your environment must meet the [prerequisites](../protect/advanced-threat-protection.md#prerequisites) to use Microsoft Defender for Endpoint with Intune.
4242

43+
In addition to managing settings for Microsoft Defender for Endpoint on devices you manage with Intune, you can manage Defender for Endpoint security configurations on devices that aren’t enrolled with Intune. This scenario is called *Security Management for Microsoft Defender for Endpoint* and requires configuring the *Allow Microsoft Defender for Endpoint to enforce Endpoint Security Configurations* toggle to *On*. For more information, see [MDE Security Configuration Management](../protect/mde-security-integration.md).
44+
4345
## Enable Microsoft Defender for Endpoint in Intune
4446

4547
The first step you take is to set up the service-to-service connection between Intune and Microsoft Defender for Endpoint. Set up requires administrative access to both the Microsoft Defender Security Center, and to Intune.
@@ -52,7 +54,7 @@ You only need to enable Microsoft Defender for Endpoint a single time per tenant
5254

5355
2. Select **Endpoint security** > **Microsoft Defender for Endpoint**, and then select **Open the Microsoft Defender for Endpoint admin console**.
5456

55-
This opens the **Microsoft 365 Defender** portal at *security.microsoft.com*, which [replaces the use of the previous portal](/microsoft-365/security/defender/microsoft-365-defender?view=o365-worldwide) at *securitycenter.windows.com*.
57+
This opens the **Microsoft 365 Defender** portal at *security.microsoft.com*, which [replaces the use of the previous portal](/microsoft-365/security/defender/microsoft-365-defender?view=o365-worldwide&preserve-view=true) at *securitycenter.windows.com*.
5658

5759
> [!TIP]
5860
> If the **Connection status** at the top of the page is already set to **Enabled**, the connection to Intune has already been made, and the admin center displays different UI than in the following screen shot. In this event, you can use the link **Open the Microsoft Defender for Endpoint admin console** to open the Microsoft Defender Security Center and use the guidance in the following step to confirm that the **Microsoft Intune connection** is set to **On**.

memdocs/intune/protect/antivirus-microsoft-defender-settings-windows-tenant-attach.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -327,7 +327,7 @@ Learn more
327327

328328
- **Allow users to view full History results**
329329
> [!NOTE]
330-
> This is a legacy setting that only applies to versions of Windows prior to Windows 10 version 1703. User of this setting with a current operating system has no effect. This setting is scheduled for removal from this policy. For more information, see **-DisablePrivacyMode** in [Set-MpPreference](/powershell/module/defender/set-mppreference?view=windowsserver2022-ps) in the Windows PowerShell documentation.
330+
> This is a legacy setting that only applies to versions of Windows prior to Windows 10 version 1703. User of this setting with a current operating system has no effect. This setting is scheduled for removal from this policy. For more information, see **-DisablePrivacyMode** in [Set-MpPreference](/powershell/module/defender/set-mppreference?view=windowsserver2022-ps&preserve-view=true) in the Windows PowerShell documentation.
331331
332332
- **Not Configured** (*default*)
333333
- **Yes**

memdocs/intune/protect/atp-manage-vulnerabilities.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -94,7 +94,7 @@ Following is an example workflow for an application. This same general workflow
9494

9595
## Work with security tasks
9696

97-
Before you can work with security tasks, they must be created from within the Defender Security Center. For information on using the Microsoft Defender Security Center to create security tasks, see [Remediate vulnerabilities with threat and vulnerability management](/microsoft-365/security/defender-endpoint/tvm-remediation?view=o365-worldwide#request-remediation) in the Defender for Endpoint documentation.
97+
Before you can work with security tasks, they must be created from within the Defender Security Center. For information on using the Microsoft Defender Security Center to create security tasks, see [Remediate vulnerabilities with threat and vulnerability management](/microsoft-365/security/defender-endpoint/tvm-remediation?view=o365-worldwide&preserve-view=true#request-remediation) in the Defender for Endpoint documentation.
9898

9999
To manage security tasks:
100100

memdocs/intune/protect/checkpoint-sandblast-mobile-mobile-threat-defense-connector.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -40,9 +40,9 @@ You can configure Conditional Access policies based on Check Point Harmony Mobil
4040
4141
## Supported platforms
4242

43-
- **Android 4.1 and later**
43+
- **Android 8 and later**
4444

45-
- **iOS 8 and later**
45+
- **iOS 12 and later**
4646

4747
## Pre-requisites
4848

memdocs/intune/protect/compliance-custom-script.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -63,7 +63,7 @@ PS C:\Users\apervaiz\Documents> .\sample.ps1
6363
4. On **Settings**, configure the following behavior for the script:
6464

6565
- **Run this script using the logged on credentials** – By default, the script runs in the System context on the device. Set this to Yes to have it run in the context of the logged-on user. If the user isn’t logged in, the script defaults back to the System context.
66-
- **Enforce script signature check** – For more information, see [about_Signing](/powershell/module/microsoft.powershell.core/about/about_signing?view=powershell-7.1) in the PowerShell documentation.
66+
- **Enforce script signature check** – For more information, see [about_Signing](/powershell/module/microsoft.powershell.core/about/about_signing?view=powershell-7.1&preserve-view=true) in the PowerShell documentation.
6767
- **Run script in 64 bit PowerShell Host** – By default, the script runs using the 32-bit PowerShell host. Set this to *Yes* to force the script to run using the 64-bit host instead.
6868

6969
5. Complete the script creation process. The script is now visible in the *Scripts* pane of the Microsoft Endpoint Manager admin center and will be available to select when configuring compliance policies.

memdocs/intune/protect/lookout-mobile-threat-defense-connector.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -56,8 +56,8 @@ Lookout's mobile app, **Lookout for work**, is installed and run on mobile devic
5656

5757
The following platforms are supported for Lookout when enrolled in Intune:
5858

59-
- **Android 4.1 and later**
60-
- **iOS 8 and later**
59+
- **Android 5.0 and later**
60+
- **iOS 12 and later**
6161

6262
For additional information about platform and language support, visit the [Lookout website](https://personal.support.lookout.com/hc/articles/114094140253).
6363

memdocs/intune/protect/mcafee-mobile-threat-defense-connector.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -37,9 +37,9 @@ You can configure Conditional Access policies based on MVISION Mobile risk asses
3737

3838
## Supported platforms
3939

40-
- **Android 8.0 and later**
40+
- **Android 5.1 and later**
4141

42-
- **iOS 9 and later**
42+
- **iOS 10 and later**
4343

4444
## Prerequisites
4545

0 commit comments

Comments
 (0)