You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: memdocs/autopilot/windows-autopilot-whats-new.md
+4Lines changed: 4 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,6 +17,10 @@ ms.topic: article
17
17
18
18
# Windows Autopilot: What's new
19
19
20
+
## Updates to Autopilot device targeting infrastructure
21
+
22
+
With Intune 2208 we are updating the Autopilot infrastructure to ensure that the profiles and applications assigned are consistently ready when the devices are deployed. This change reduces the amount of data that needs to be synchronized per-Autopilot device and leverages device lifecycle change events to reduce the amount of time that it takes to recover from device resets for Azure AD and Hybrid Azure AD joined devices. No action is needed to enable this change, it will be rolling out to all clients starting August 2022.
23
+
20
24
## Update Intune Connector for Active Directory for Hybrid Azure AD joined devices
Copy file name to clipboardExpand all lines: memdocs/intune/protect/network-access-control-integrate.md
+7-32Lines changed: 7 additions & 32 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ keywords:
7
7
author: brenduns
8
8
ms.author: brenduns
9
9
manager: dougeby
10
-
ms.date: 09/08/2021
10
+
ms.date: 08/15/2022
11
11
ms.topic: how-to
12
12
ms.service: microsoft-intune
13
13
ms.subservice: protect
@@ -66,7 +66,7 @@ The following list is an overview on how NAC integration works when integrated w
66
66
67
67

68
68
69
-
1. Register the NAC partner solution with Azure Active Directory (AAD), and grant delegated permissions to the Intune NAC API.
69
+
1. Register the NAC partner solution with Azure Active Directory (Azure AD), and grant delegated permissions to the Intune NAC API.
70
70
2. Configure the NAC partner solution with the appropriate settings including the Intune discovery URL.
71
71
3. Configure the NAC partner solution for certificate authentication.
72
72
4. User connects to corporate Wi-Fi access point or makes a VPN connection request.
@@ -84,40 +84,15 @@ The following list is an overview on how NAC integration works when integrated w
84
84
>
85
85
> NAC Solutions are permitted to make as many of the device-specific queries as required. However the broad unfiltered queries may be throttled. The NAC solution should be configured to only submit the *all non-compliant devices* queries, at most, once every four hours. Queries made more frequently will receive an http 503 error from the Intune service.
86
86
87
-
## Use NAC for VPN on your iOS/iPadOS devices
87
+
## Enable NAC
88
88
89
-
NAC is available on the following VPNs without enabling NAC in the VPN profile:
89
+
To enable use of NAC and the *compliance retrieval service* that became available in July 2021, reference your NAC product's most recent documentation for enabling NAC integration with Intune. This integration might require you to make changes after you upgrade to their new NAC product or version.
90
90
91
-
- NAC for Cisco Legacy AnyConnect
92
-
- F5 Access Legacy
93
-
- Citrix VPN
94
-
- Cisco AnyConnect, if:
95
-
- You are using Cisco ISE 3.1 or later
96
-
- You are using certificate-based authentication and have included the Intune device ID in the subject alternative name of the authentication certificate
91
+
The compliance retrieval service requires certificate-based authentication and the use of the *Intune device ID* as the subject alternative name of the certificates. For Simple Certificate Enrollment Protocol (SCEP) and Private and public key pair (PKCS) certificates, you can add an attribute of the **URI** type with a value defined by your NAC provider. For example, your NAC provider's instructions might say to include `IntuneDeviceId://{{DeviceID}}`as the **Subject alternative name**.
97
92
98
-
NAC is also supported for Cisco AnyConnect, Citrix SSO, and F5 Access by enabling NAC in the VPN profile.
99
-
100
-
### To enable NAC for Cisco AnyConnect for iOS
101
-
102
-
- Integrate ISE with Intune for NAC as described in the link below.
103
-
- If using Cisco ISE 3.1 or later:
104
-
- Use certificate-based authentication for your AnyConnect VPN
105
-
- Include a subject alternative name entry in the authentication certificate profile with a **URI** attribute with a value of `{{DeviceId}}`
106
-
- If using an earlier version of Cisco ISE, in the VPN profile, select **Base settings** > **Enable Network Access Control (NAC)** > select **I agree**.
107
-
108
-
### To enable NAC for Citrix SSO
109
-
110
-
- Use Citrix Gateway 12.0.59 or higher.
111
-
- Users must have Citrix SSO 1.1.6 or later installed.
112
-
-[Integrate NetScaler with Intune for NAC](https://docs.citrix.com/en-us/citrix-gateway/current-release/microsoft-intune-integration/configuring-network-access-control-device-check-for-citrix-gateway-virtual-server-for-single-factor-authentication-deployment.html) as described in the Citrix product documentation.
113
-
- In the VPN profile, select **Base settings** > **Enable Network Access Control (NAC)** > select **I agree**.
114
-
115
-
### To enable NAC for F5 Access
116
-
117
-
- Use F5 BIG-IP 13.1.1.5 or later.
118
-
- Integrate BIG-IP with Intune for NAC, using the guide at the **Integrate F5 BIG-IP Access Policy Manager with Intune**
119
-
- In the VPN profile, select **Base settings** > **Enable Network Access Control (NAC)** > select **I agree**.
93
+
Other NAC products might require you include a device ID when using NAC with iOS VPN profiles.
120
94
95
+
To learn more about certificate profiles, see: [Use SCEP certificate profiles with Microsoft Intune](../protect/certificates-profile-scep.md) and [Use a PKCS certificate profile to provision devices with certificates in Microsoft Intune](../protect/certificates-pfx-configure.md)
Copy file name to clipboardExpand all lines: windows-365/enterprise/security.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -45,12 +45,12 @@ Take a look at the sections below to better understand the components and featur
45
45
46
46
The first consideration for securing your environment is to secure access to the Cloud PC.
47
47
48
-
As described in [identity and authentication](/windows-365/enterprise/identity-authentication#authentication), there are two authentication challenges to access the Cloud PC:
48
+
As described in [identity and authentication](./identity-authentication.md#authentication), there are two authentication challenges to access the Cloud PC:
49
49
50
50
- The Windows 365 service.
51
51
- The Cloud PC.
52
52
53
-
The primary control for securing access is by using Azure Active Directory (Azure AD) Conditional Access to conditionally grant access to the Windows 365 service. To secure access to the Cloud PC, see [set conditional access policies](/windows-365/enterprise/set-conditional-access-policies).
53
+
The primary control for securing access is by using Azure Active Directory (Azure AD) Conditional Access to conditionally grant access to the Windows 365 service. To secure access to the Cloud PC, see [set conditional access policies](./set-conditional-access-policies.md).
54
54
55
55
## Secure Cloud PC devices
56
56
@@ -85,10 +85,10 @@ The third consideration for securing your environment is to secure the Cloud PC
85
85
86
86
### Security of Cloud PC data
87
87
88
-
The data of the Cloud PC data itself is secured through encryption. For more details, see [data encryption in Windows 365](/windows-365/enterprise/encryption).
88
+
The data of the Cloud PC data itself is secured through encryption. For more details, see [data encryption in Windows 365](./encryption.md).
89
89
90
90
### Security of data available on the Cloud PC
91
91
92
92
Securing the data available to users on their Cloud PCs should be no different than securing the data available to users on work-assigned Windows PCs, with the caveat that the Cloud PC is being accessed through Remote Desktop Protocol (RDP).
93
93
94
-
To manage RDP features available to the user during their Cloud PC connection, see [manage RDP device redirections for Cloud PCs](/windows-365/enterprise/manage-rdp-device-redirections).
94
+
To manage RDP features available to the user during their Cloud PC connection, see [manage RDP device redirections for Cloud PCs](./manage-rdp-device-redirections.md).
0 commit comments