Skip to content

Commit 8e8f95e

Browse files
authored
Merge pull request #6738 from MicrosoftDocs/main
Publish 02/08/2022, 10:30 AM
2 parents aae1912 + f72200f commit 8e8f95e

6 files changed

Lines changed: 39 additions & 5 deletions

File tree

memdocs/intune/apps/apps-deploy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -97,7 +97,7 @@ The following table lists the various options for *assigning* apps to users and
9797
The app is now assigned to the groups that you selected. For more information about including and excluding app assignments, see [Include and exclude app assignments](apps-inc-exl-assignments.md).
9898

9999
> [!Tip]
100-
> Intune supports assigning apps to nested groups too. For example, if you assigned an app to the "Enineering Global" group and have "Engineering APAC", "Engineering EMEA" and "Engineering US" nested as child groups, the members of those child groups will also be targeted with the assignment.
100+
> Intune supports assigning apps to nested groups too. For example, if you assigned an app to the "Engineering Global" group and have "Engineering APAC", "Engineering EMEA" and "Engineering US" nested as child groups, the members of those child groups will also be targeted with the assignment.
101101
102102
## How conflicts between app intents are resolved
103103

memdocs/intune/configuration/device-profile-assign.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -153,7 +153,7 @@ Use the following matrix to understand support for excluding groups:
153153
| 2 | ✔️ Supported </br></br> Assigning a policy to a dynamic device group while excluding a static device group is supported. |
154154
| 3 | ❌ Not supported </br></br> Assigning a policy to a dynamic device group while excluding user groups (both dynamic and static) isn't supported. Intune doesn't evaluate user-to-device group relationships, and devices of the included users won't be excluded. |
155155
| 4 | ❌ Not supported </br></br> Assigning a policy to a dynamic device group and excluding user groups (both dynamic and static) isn't supported. Intune doesn't evaluate user-to-device group relationships, and devices of the included users won't be excluded. |
156-
| 5 | ❌ Not supported </br></br> Assigning a policy to a static device group while excluding a dynamic device group is supported. But, it's not recommended in scenarios that are sensitive to latency. Any delay in exclude group membership calculation can cause policies to be offered to devices. In this scenario, we recommend using [filters](../fundamentals/filters.md) instead of dynamic device groups for excluding devices. |
156+
| 5 | ❕ Partially supported </br></br> Assigning a policy to a static device group while excluding a dynamic device group is supported. But, it's not recommended in scenarios that are sensitive to latency. Any delay in exclude group membership calculation can cause policies to be offered to devices. In this scenario, we recommend using [filters](../fundamentals/filters.md) instead of dynamic device groups for excluding devices. |
157157
| 6 | ✔️ Supported </br></br> Assigning a policy to a static device group and excluding a different static device group is supported. |
158158
| 7 | ❌ Not supported </br></br> Assigning a policy to a static device group and excluding user groups (both dynamic and static) isn't supported. Intune doesn't evaluate user-to-device group relationships, and devices of the included users won't be excluded. |
159159
| 8 | ❌ Not supported </br></br> Assigning a policy to a static device group and excluding user groups (both dynamic and static) isn't supported. Intune doesn't evaluate user-to-device group relationships, and devices of the included users won't be excluded. |

memdocs/intune/fundamentals/whats-new.md

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ keywords:
77
author: Erikre
88
ms.author: erikre
99
manager: dougeby
10-
ms.date: 02/01/2022
10+
ms.date: 02/07/2022
1111
ms.topic: conceptual
1212
ms.service: microsoft-intune
1313
ms.subservice: fundamentals
@@ -60,6 +60,13 @@ You can use RSS to be notified when this page is updated. For more information,
6060
### Scripts
6161
-->
6262

63+
## Week of February 7, 2022
64+
65+
### App management
66+
67+
#### Advanced logging setting in Company Portal app<!-- 12859998 -->
68+
The **Enable Advanced Logging** setting is available in the Intune Company Portal app versions v5.2202 and higher for iOS/iPadOS and macOS. Device users can able to enable or disable advanced logging on a device. By turning on advanced logging, detailed log reports will be sent to Microsoft to troubleshoot issues. By default, the **Enable Advanced Logging** setting will be off. Device users should keep this setting off unless otherwise instructed by their organization's IT admin. For related information, see [Share Company Portal usage data with Microsoft](../user-help/turn-off-microsoft-usage-data-collection-ios.md) and [Manage Company Portal preferences for macOS](../user-help/intune-company-portal-preferences-macos.md).
69+
6370
## Week of January 31, 2022
6471

6572
### Device security

memdocs/intune/user-help/intune-company-portal-preferences-macos.md

Lines changed: 10 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ keywords:
77
author: lenewsad
88
ms.author: lanewsad
99
manager: dougeby
10-
ms.date: 07/19/2021
10+
ms.date: 02/07/2022
1111
ms.topic: end-user-help
1212
ms.prod:
1313
ms.service: microsoft-intune
@@ -47,6 +47,15 @@ This setting enables Microsoft to collect data about your Intune Company Portal
4747

4848
To turn off data collection in Company Portal, clear the checkbox next to **Allow Microsoft to collect usage data**.
4949

50+
## Enable or disable advanced logging
51+
52+
The **Enable Advanced Logging** setting is available in the Intune Company Portal app for macOS devices. Device users can able to enable or disable advanced logging on a device. By turning on advanced logging, detailed log reports will be sent to Microsoft to troubleshoot issues. By default, the **Enable Advanced Logging** setting will be off. Device users should keep this setting off unless otherwise instructed by their organization's IT admin.
53+
54+
To modify this setting on an macOS device:
55+
1. Open the Company Portal app.
56+
2. Go to the menu bar and select **Company Portal** > **Preferences**.
57+
3. Under **Advanced logging**, modify the checkbox next to **Turn on advanced logging**.
58+
5059
## Next steps
5160

5261
Still need help? Contact your IT support person. For contact information, check the [Company Portal website](https://go.microsoft.com/fwlink/?linkid=2010980).

memdocs/intune/user-help/turn-off-microsoft-usage-data-collection-ios.md

Lines changed: 10 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ author: lenewsad
88

99
ms.author: lanewsad
1010
manager: dougeby
11-
ms.date: 12/08/2020
11+
ms.date: 02/07/2022
1212
ms.topic: end-user-help
1313
ms.prod:
1414
ms.service: microsoft-intune
@@ -51,6 +51,15 @@ Change your usage data preferences to turn usage data collection on or off.
5151
2. Tap **Company Portal**.
5252
3. Switch the **Usage Data** toggle to the off position (to stop usage and diagnostic data from being sent to Intune), or to the on position (to allow usage and diagnostic data to be sent to Intune).
5353

54+
## Enable or disable advanced logging
55+
56+
The **Enable Advanced Logging** setting is available in the Intune Company Portal app for iOS/iPadOS devices. Device users can able to enable or disable advanced logging on a device. By turning on advanced logging, detailed log reports will be sent to Microsoft to troubleshoot issues. By default, the **Enable Advanced Logging** setting will be off. Device users should keep this setting off unless otherwise instructed by their organization's IT admin.
57+
58+
To modify this setting on an iOS/iPadOS device:
59+
1. Open the **Settings** app.
60+
2. Find **Comp Portal**.
61+
3. Under **Diagnostics**, turn on or off the **Enable Advanced Logging** toggle.
62+
5463
## Next steps
5564

5665
Still need help? Contact your IT support person. For contact information, check the [Company Portal website](https://go.microsoft.com/fwlink/?linkid=2010980).

windows-365/enterprise/requirements-network.md

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -86,6 +86,15 @@ You must allow traffic in your Azure network configuration to the following serv
8686

8787
All endpoints connect over port 443.
8888

89+
### Remote Desktop Protocol (RDP) broker service endpoints
90+
91+
Azure Virtual Desktop RDP broker service endpoints are critical to Cloud PC performance. These endpoints affect both connectivity and latency. To align with the [Microsoft 365 network connectivity principles](/microsoft-365/enterprise/microsoft-365-network-connectivity-principles?view=o365-worldwide#new-office-365-endpoint-categories), you should categorize these endpoints as **Optimize** endpoints.
92+
93+
To make it easier to configure network security controls, use Azure Virtual Desktop service tags to identity those endpoints for direct routing using an [Azure Networking User Defined Route (UDR)](/azure/virtual-network/virtual-networks-udr-overview). A UDR will result in direct routing between your virtual network and the RDP broker for lowest latency. For more information about Azure Service Tags, see (Azure service tags overview)[/azure/virtual-desktop/network-connectivity].
94+
95+
Changing the network routes of a Cloud PC (at the network layer or at the Cloud PC layer (e.g. VPN)), might break the connection between the Cloud PC and the Azure Virtual Desktop RDP broker. If so, the end user will be disconnected from their Cloud PC until a connection be established.
96+
97+
8998
## DNS requirements
9099

91100
As part of the Hybrid Azure AD Join requirements, your Cloud PCs must be able to join on-prem Active Directory. That requires that the Cloud PCs be able to resolve DNS records for your on-prem AD environment.

0 commit comments

Comments
 (0)