Skip to content

Commit 973d6cb

Browse files
authored
Merge pull request #6771 from MicrosoftDocs/main
Publish 02/10/2022, 10:30 AM
2 parents 2e89611 + e0371d3 commit 973d6cb

7 files changed

Lines changed: 25 additions & 23 deletions

File tree

memdocs/configmgr/core/misc/doc-test.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,8 @@ ms.author: aaroncz
1313
ms.reviewer: mstewart
1414
manager: dougeby
1515
---
16+
# Doc team test - Baladell
17+
Date: 1/19/2022
1618

1719
# Doc team test
1820

memdocs/configmgr/core/plan-design/configs/supported-operating-systems-for-site-system-servers.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ This article details the Windows versions that you can use to host a Configurati
2020

2121
## Windows Server 2022
2222

23-
_Applies to Standard and Datacenter editions_
23+
_Applies to Datacenter: Azure Edition, Standard and Datacenter editions_
2424

2525
Starting in version 2107<!-- 10200029 -->, this OS version is supported for the following servers.
2626

memdocs/configmgr/core/servers/deploy/configure/site-server-high-availability.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Site server high availability
33
titleSuffix: Configuration Manager
44
description: How to configure high availability for the Configuration Manager site server by adding a passive mode site server.
5-
ms.date: 12/09/2021
5+
ms.date: 02/10/2022
66
ms.prod: configuration-manager
77
ms.technology: configmgr-core
88
ms.topic: conceptual

memdocs/configmgr/protect/deploy-use/endpoint-definitions-wsus.md

Lines changed: 1 addition & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Endpoint Protection malware definitions from WSUS
33
titleSuffix: Configuration Manager
4-
ms.date: 04/23/2020
4+
ms.date: 02/10/2022
55
ms.prod: configuration-manager
66
ms.technology: configmgr-protect
77
ms.topic: conceptual
@@ -34,20 +34,6 @@ If you use WSUS to keep your antimalware definitions up to date, you can configu
3434

3535
1. Select **OK** to close the **Software Update Point Component Properties** window.
3636

37-
## Synchronize definition updates for standalone WSUS
38-
39-
Use the following procedure to configure Endpoint Protection updates when your WSUS server isn't integrated into your Configuration Manager environment.
40-
41-
1. In the WSUS administration console, expand **Computers**, select **Options**, and then select **Products and Classifications**.
42-
43-
1. To specify the **Products** updated with WSUS, switch to the **Products** tab.
44-
45-
- For Windows 10 and later: Under Microsoft > Windows, select **Microsoft Defender Antivirus**.
46-
47-
- For Windows 8.1 and earlier: Under Microsoft > Forefront, select **System Center Endpoint Protection**.
48-
49-
1. Switch to the **Classifications** tab. Select **Definition Updates** and **Updates**.
50-
5137
## Approve definition updates
5238

5339
Endpoint Protection definition updates must be approved and downloaded to the WSUS server before they're offered to clients that request the list of available updates. Clients connect to the WSUS server to check for applicable updates and then request the latest approved definition updates.

memdocs/intune/enrollment/device-enrollment-manager-enroll.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -43,6 +43,7 @@ DEM user accounts and devices that are enrolled with a DEM user account have the
4343
- Wipe can't be done from the Company Portal. Wiping a device enrolled by a DEM user account can be done from the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431).
4444
- Only the local device appears in the Company Portal app or website.
4545
- DEM user accounts cannot use Apple Volume Purchase Program (VPP) apps with Apple VPP user licenses because of per-user Apple ID requirements for app management.
46+
- DEM accounts do not support conditional access because conditional access is intended for per-user scenarios.
4647
- DEM accounts cannot be used when enrolling devices via Apple's Automated Device Enrollment (ADE).
4748
- Devices can install VPP apps if they have Apple VPP device licenses.
4849
- On Windows 10 1709 and older, conditional access isn't available for Windows devices enrolled using bulk enrollment.

windows-365/enterprise/connection-errors.md

Lines changed: 19 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ keywords:
77
author: ErikjeMS
88
ms.author: erikje
99
manager: dougeby
10-
ms.date: 02/08/2022
10+
ms.date: 02/10/2022
1111
ms.topic: reference
1212
ms.service: cloudpc
1313
ms.subservice:
@@ -32,14 +32,27 @@ ms.collection: M365-identity-device-management
3232

3333
The following errors can occur when connecting to a Cloud PC.
3434

35-
## Errors when connecting to an Azure AD join Cloud PC
35+
## Errors when connecting to an Azure Active Directory (Azure AD) joined Cloud PC
3636

37-
**Potential cause**: Possible causes for connection errors include:
37+
### The logon attempt failed
38+
**Potential cause #1**: The Cloud PC denied PKU2U protocol requests. The PKU2U protocol is only triggered in the following cases:
3839

39-
- Windows sign-in works directly against Azure AD, potentially triggering Azure AD authentication controls.
40-
- Sign-in attempts from the Windows desktop client to a Cloud PC use a different protocol, called PKU2U.
40+
- The Cloud PC is Azure AD joined.
41+
- The user is connecting from the Windows desktop client.
42+
- The user's physical device is Azure AD registered, Azure AD joined, or hybrid Azure AD joined to the same organization as the Cloud PC.
4143

42-
**Possible solution**: Follow the guidance to [troubleshoot connections to Azure AD joined VMs](/azure/virtual-desktop/troubleshoot-azure-ad-connections?context=/windows-365/context/pr-context).
44+
**Possible solution**: Turn on PKU2U protocol requests on your Cloud PC:
45+
46+
1. [Create a filter for all Cloud PCs](create-filter.md#create-a-filter-for-all-cloud-pcs).
47+
2. Create a device configuration policy [using the settings catalog](/mem/intune/configuration/settings-catalog).
48+
3. On the **Configuration settings** page, search for and select **Network Security Allow PKU2U Authentication Requests** > **Allow**.
49+
![Screenshot with the **Network Security Allow PKU2U Authentication Requests** set to **Allow**.](./media/connection-errors/allow-pku2u.png)
50+
5. On the **Assignments** page, select **Add all devices** > **Edit filter** > **Include filtered devices in assignment** > select the filter you created for all Cloud PCs.
51+
6. Complete the creation of the device configuration policy.
52+
53+
**Potential cause #2**: [Per-user multi-factor authentication](/azure/active-directory/authentication/howto-mfa-userstates) is turned on for the user account. Because it blocks sign-in, per-user multi-factor authentication isn't supported for users connecting to Azure AD joined Cloud PCs.
54+
55+
**Possible solution**: [Remove per-user multi-factor authentication](/azure/active-directory/devices/howto-vm-sign-in-azure-ad-windows#mfa-sign-in-method-required) for all users connecting to Cloud PCs. Then, [set an Azure AD conditional access policy](set-conditional-access-policies.md) and assign it to the appropriate users.
4356

4457
## Specific connection errors
4558

105 KB
Loading

0 commit comments

Comments
 (0)