You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: memdocs/configmgr/protect/deploy-use/endpoint-definitions-wsus.md
+1-15Lines changed: 1 addition & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Endpoint Protection malware definitions from WSUS
3
3
titleSuffix: Configuration Manager
4
-
ms.date: 04/23/2020
4
+
ms.date: 02/10/2022
5
5
ms.prod: configuration-manager
6
6
ms.technology: configmgr-protect
7
7
ms.topic: conceptual
@@ -34,20 +34,6 @@ If you use WSUS to keep your antimalware definitions up to date, you can configu
34
34
35
35
1. Select **OK** to close the **Software Update Point Component Properties** window.
36
36
37
-
## Synchronize definition updates for standalone WSUS
38
-
39
-
Use the following procedure to configure Endpoint Protection updates when your WSUS server isn't integrated into your Configuration Manager environment.
40
-
41
-
1. In the WSUS administration console, expand **Computers**, select **Options**, and then select **Products and Classifications**.
42
-
43
-
1. To specify the **Products** updated with WSUS, switch to the **Products** tab.
44
-
45
-
- For Windows 10 and later: Under Microsoft > Windows, select **Microsoft Defender Antivirus**.
46
-
47
-
- For Windows 8.1 and earlier: Under Microsoft > Forefront, select **System Center Endpoint Protection**.
48
-
49
-
1. Switch to the **Classifications** tab. Select **Definition Updates** and **Updates**.
50
-
51
37
## Approve definition updates
52
38
53
39
Endpoint Protection definition updates must be approved and downloaded to the WSUS server before they're offered to clients that request the list of available updates. Clients connect to the WSUS server to check for applicable updates and then request the latest approved definition updates.
Copy file name to clipboardExpand all lines: memdocs/intune/enrollment/device-enrollment-manager-enroll.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -43,6 +43,7 @@ DEM user accounts and devices that are enrolled with a DEM user account have the
43
43
- Wipe can't be done from the Company Portal. Wiping a device enrolled by a DEM user account can be done from the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431).
44
44
- Only the local device appears in the Company Portal app or website.
45
45
- DEM user accounts cannot use Apple Volume Purchase Program (VPP) apps with Apple VPP user licenses because of per-user Apple ID requirements for app management.
46
+
- DEM accounts do not support conditional access because conditional access is intended for per-user scenarios.
46
47
- DEM accounts cannot be used when enrolling devices via Apple's Automated Device Enrollment (ADE).
47
48
- Devices can install VPP apps if they have Apple VPP device licenses.
48
49
- On Windows 10 1709 and older, conditional access isn't available for Windows devices enrolled using bulk enrollment.
The following errors can occur when connecting to a Cloud PC.
34
34
35
-
## Errors when connecting to an Azure AD join Cloud PC
35
+
## Errors when connecting to an Azure Active Directory (Azure AD) joined Cloud PC
36
36
37
-
**Potential cause**: Possible causes for connection errors include:
37
+
### The logon attempt failed
38
+
**Potential cause #1**: The Cloud PC denied PKU2U protocol requests. The PKU2U protocol is only triggered in the following cases:
38
39
39
-
- Windows sign-in works directly against Azure AD, potentially triggering Azure AD authentication controls.
40
-
- Sign-in attempts from the Windows desktop client to a Cloud PC use a different protocol, called PKU2U.
40
+
- The Cloud PC is Azure AD joined.
41
+
- The user is connecting from the Windows desktop client.
42
+
- The user's physical device is Azure AD registered, Azure AD joined, or hybrid Azure AD joined to the same organization as the Cloud PC.
41
43
42
-
**Possible solution**: Follow the guidance to [troubleshoot connections to Azure AD joined VMs](/azure/virtual-desktop/troubleshoot-azure-ad-connections?context=/windows-365/context/pr-context).
44
+
**Possible solution**: Turn on PKU2U protocol requests on your Cloud PC:
45
+
46
+
1.[Create a filter for all Cloud PCs](create-filter.md#create-a-filter-for-all-cloud-pcs).
47
+
2. Create a device configuration policy [using the settings catalog](/mem/intune/configuration/settings-catalog).
48
+
3. On the **Configuration settings** page, search for and select **Network Security Allow PKU2U Authentication Requests** > **Allow**.
49
+

50
+
5. On the **Assignments** page, select **Add all devices** > **Edit filter** > **Include filtered devices in assignment** > select the filter you created for all Cloud PCs.
51
+
6. Complete the creation of the device configuration policy.
52
+
53
+
**Potential cause #2**: [Per-user multi-factor authentication](/azure/active-directory/authentication/howto-mfa-userstates) is turned on for the user account. Because it blocks sign-in, per-user multi-factor authentication isn't supported for users connecting to Azure AD joined Cloud PCs.
54
+
55
+
**Possible solution**: [Remove per-user multi-factor authentication](/azure/active-directory/devices/howto-vm-sign-in-azure-ad-windows#mfa-sign-in-method-required) for all users connecting to Cloud PCs. Then, [set an Azure AD conditional access policy](set-conditional-access-policies.md) and assign it to the appropriate users.
0 commit comments