Skip to content

Commit 969a83a

Browse files
author
Angela Fleischmann
authored
Merge pull request #6712 from MicrosoftDocs/main
Publish 02/03/2022 3:30 PM PT
2 parents d24d30e + 3edc087 commit 969a83a

3 files changed

Lines changed: 9 additions & 5 deletions

File tree

memdocs/configmgr/core/servers/manage/upgrade-on-premises-infrastructure.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -68,6 +68,8 @@ Use the steps in this section for any of the following upgrade scenarios:
6868

6969
- (_Windows Server 2012 or Windows Server 2012 R2 only_): Remove the System Center Endpoint Protection (SCEP) client. Windows Server now has Windows Defender built in, which replaces the SCEP client. The presence of the SCEP client can prevent an upgrade to Windows Server.
7070

71+
- (_Windows Server 2012 or Windows Server 2012 R2 only_): Install the latest Cumulative Update and uninstall Windows Management Framework 5.1 before attempting the upgrade.
72+
7173
- Remove the WSUS role from the server if it's installed. You may keep the SUSDB and reattach it once WSUS is reinstalled.
7274

7375
- If you're upgrading the OS of the site server, make sure [file-based replication](../../plan-design/hierarchy/file-based-replication.md) is healthy for the site. Check all inboxes for a backlog on both sending and receiving sites. If there are lots of stuck or pending replication jobs, wait until they clear out.<!-- SCCMDocs#1792 -->

memdocs/intune/protect/compliance-use-custom-settings.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ keywords:
77
author: brenduns
88
ms.author: brenduns
99
manager: dougeby
10-
ms.date: 12/01/2021
10+
ms.date: 02/04/2022
1111
ms.topic: conceptual
1212
ms.service: microsoft-intune
1313
ms.subservice: protect
@@ -44,7 +44,7 @@ Before you can add custom settings to a policy, you’ll need to prepare the Pow
4444

4545
- The JSON file defines the settings you want to base your custom compliance on, and the acceptable values for those settings. You can also configure messages for device users for how to restore compliance for each setting. You’ll upload the file when you create a compliance policy that will include custom compliance settings.
4646

47-
After you’ve deployed custom compliance settings and devices have reported back, you’ll be able to view the results alongside the built-in compliance setting details in the Microsoft Endpoint Manager admin center. Custom settings can also be used for conditional access decisions, the same as the built-in compliance settings.
47+
After you’ve deployed custom compliance settings and devices have reported back, you’ll be able to view the results alongside the built-in compliance setting details in the Microsoft Endpoint Manager admin center. Custom compliance settings will be used for conditional access decisions, the same way built-in compliance settings are. Together they form a compound rule set, equally affecting the device compliance state.
4848

4949
## Prerequisites
5050

@@ -89,14 +89,13 @@ During the workflow to create a compliance policy, on the *Compliance settings*
8989
5. Complete the compliance policy creation task and assign the policy to devices.
9090

9191
> [!NOTE]
92-
> When a Windows device receives a compliance policy with custom settings, the device runs an MSI that installs services that enable the client to download and run PowerShell scripts that are part of a compliance policy, and to upload compliance results. Actions managed by the services include:
92+
> When a Windows device receives a compliance policy with custom settings, it checks for the presence of [Intune Management Extensions](../apps/intune-management-extension.md). If not found, the device runs an MSI that installs the extensions, enabling the client to download and run PowerShell scripts that are part of a compliance policy, and to upload compliance results. Actions managed by the services include:
9393
>
9494
> - Checking for new or updated PowerShell scripts every eight hours.
9595
> - Running the discovery scripts every eight hours.
9696
> - Running scripts that download when a user selects Check Compliance on the device. However, there is no check for new or updated scripts when Check Compliance is run.
9797
> - Don't support push notifications to enable custom compliance to run on demand.
9898
>
99-
> For more information, see [Add PowerShell Add PowerShell scripts to Windows 10/11 devices in Microsoft Intune.
10099
101100
## Monitor custom compliance policy
102101

@@ -115,7 +114,7 @@ Check the device compliance reports for the following error codes and insight in
115114
- 65009: Invalid json for the discovered setting
116115
- 65010: Invalid datatype for the discovered setting
117116

118-
To see errors related to the PowerShell script, add the following line to the end of the PowerShell script file: `return $hash | ConvertTo-Json -Compress`
117+
To see errors related to the PowerShell script, ensure the following line is at the end of the PowerShell script file: `return $hash | ConvertTo-Json -Compress`
119118

120119
### PowerShell scripts aren’t visible to select, or remain visible after being deleted
121120

memdocs/intune/protect/endpoint-security-account-protection-policy.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -79,6 +79,9 @@ The following are the configurations you can make:
7979

8080
- **Local group**: Select one or more groups from the drop-down. These groups will all apply the same Group and user action to the users you assign. You can create more than one grouping of local groups in a single profile and assign different actions and groups of users to each grouping of local groups.
8181

82+
> [!NOTE]
83+
> The list of local groups is limited to the six built-in local groups which are guaranteed to be evaluated at logon, as referenced in the [Managing administrator privileges using Azure AD groups](/azure/active-directory/devices/assign-local-admin#manage-administrator-privileges-using-azure-ad-groups-preview) documentation.
84+
8285
- **Group and user action**: Configure the action to apply to the selected groups. This action will apply to the users you select for this same action and grouping of local accounts. Actions you can choose include:
8386
- **Add (Update)**: Adds members to the selected groups. The group membership for users that aren’t specified by the policy are not changed.
8487
- **Remove (Update)**: Remove members from the selected groups. The group membership for users that aren’t specified by the policy are not changed.

0 commit comments

Comments
 (0)