Skip to content

Commit 9bc8444

Browse files
authored
Merge pull request #6946 from MicrosoftDocs/main
Publish 03/03/2022, 10:30 AM
2 parents a399407 + 47f0c07 commit 9bc8444

35 files changed

Lines changed: 721 additions & 109 deletions

memdocs/autopilot/troubleshoot-oobe.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ ms.topic: troubleshooting
2828
When the out-of-box-experience (OOBE) includes unexpected Autopilot behavior, it's useful to check if the device received an Autopilot profile. If so, check the settings that the profile contained. Depending on the Windows client release, there are different mechanisms available to do that.
2929

3030
> [!NOTE]
31-
> **[Preview]** With Windows 11, you can enable users to view additional detailed troubleshooting information about the Autopilot provisioning process. The [Windows Autopilot diagnostics page](windows-autopilot-whats-new.md#preview-windows-autopilot-diagnostics-page) provides IT admins and end users with a user-friendly view to troubleshoot Windows Autopilot failures. This feature can be enabled by going to the [ESP profile](../intune/enrollment/windows-enrollment-status.md#available-settings) and selecting **Yes** to **Allow users to collect logs about installation errors**. This feature is currently supported for commercial OOBE, and Autopilot user-driven mode.
31+
> **[Preview]** With Windows 11, you can enable users to view additional detailed troubleshooting information about the Autopilot provisioning process. The [Windows Autopilot diagnostics page](windows-autopilot-whats-new.md#preview-windows-autopilot-diagnostics-page) provides IT admins and end users with a user-friendly view to troubleshoot Windows Autopilot failures. This feature can be enabled by going to the [ESP profile](../intune/enrollment/windows-enrollment-status.md) and selecting **Yes** to **Allow users to collect logs about installation errors**. This feature is currently supported for commercial OOBE, and Autopilot user-driven mode.
3232
3333
## Can't connect to MDM terms of use error
3434

memdocs/autopilot/windows-autopilot-whats-new.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -65,7 +65,7 @@ An example of the diagnostics page is shown below. In this example, **Configurat
6565
![diagnostics page click](images/oobe-02.png)<br>
6666
![diagnostics page expand](images/oobe-03.png)
6767

68-
The diagnostics page can be enabled by going to the [ESP profile](../intune/enrollment/windows-enrollment-status.md#available-settings) and selecting **Yes** to **Turn on log collection and diagnostics page for end users**.
68+
The diagnostics page can be enabled by going to the [ESP profile](../intune/enrollment/windows-enrollment-status.md) and selecting **Yes** to **Turn on log collection and diagnostics page for end users**.
6969

7070
The diagnostics page is currently supported for commercial OOBE, and Autopilot user-driven mode. It is currently available on Windows 11. Windows 10 users can still collect and export diagnostic logs when this setting is enabled in Intune.
7171

memdocs/intune/developer/data-warehouse-app-only-auth.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ keywords:
88
author: Erikre
99
ms.author: erikre
1010
manager: dougeby
11-
ms.date: 01/10/2022
11+
ms.date: 03/03/2022
1212
ms.topic: reference
1313
ms.service: microsoft-intune
1414
ms.subservice: developer
@@ -102,9 +102,9 @@ Using Visual Studio, create a Console App (.NET Framework) project that supports
102102
var applicationId = ConfigurationManager.AppSettings["appId"].ToString();
103103
SecureString applicationSecret = ConvertToSecureStr(ConfigurationManager.AppSettings["appKey"].ToString()); // Load as SecureString from configuration file or secret store (i.e. Azure KeyVault)
104104
var tenantDomain = ConfigurationManager.AppSettings["tenantDomain"].ToString();
105-
var adalContext = new AuthenticationContext($"https://login.windows.net/" + tenantDomain + "/oauth2/token");
105+
var msalContext = new AuthenticationContext($"https://login.windows.net/" + tenantDomain + "/oauth2/token");
106106

107-
AuthenticationResult authResult = adalContext.AcquireTokenAsync(
107+
AuthenticationResult authResult = msalContext.AcquireTokenAsync(
108108
resource: "https://api.manage.microsoft.com/",
109109
clientCredential: new ClientCredential(
110110
applicationId,
@@ -166,4 +166,4 @@ Using Visual Studio, create a Console App (.NET Framework) project that supports
166166
> To see additional implementation code, see [Intune-Data-Warehouse code example](https://github.com/Microsoft/Intune-Data-Warehouse/tree/master/Samples/CSharp ).
167167
168168
## Next Steps
169-
Learn more about Azure Key Vault by reviewing [What is Azure Key Vault?](/azure/key-vault/key-vault-whatis)
169+
Learn more about Azure Key Vault by reviewing [What is Azure Key Vault?](/azure/key-vault/key-vault-whatis)

memdocs/intune/developer/reports-proc-data-rest.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ keywords:
77
author: Erikre
88
ms.author: erikre
99
manager: dougeby
10-
ms.date: 01/10/2022
10+
ms.date: 03/03/2022
1111
ms.topic: reference
1212
ms.service: microsoft-intune
1313
ms.subservice: developer
@@ -207,8 +207,8 @@ The following sample contains a simple REST client. The code uses the **httpClie
207207
var warehouseUrl = "https://fef.{yourinfo}.manage.microsoft.com/ReportingService/DataWarehouseFEService?api-version=v1.0";
208208
var collectionName = "dates";
209209

210-
var adalContext = new AuthenticationContext("https://login.windows.net/common/oauth2/token");
211-
AuthenticationResult authResult = adalContext.AcquireTokenAsync(
210+
var msalContext = new AuthenticationContext("https://login.windows.net/common/oauth2/token");
211+
AuthenticationResult authResult = msalContext.AcquireTokenAsync(
212212
resource: "https://api.manage.microsoft.com/",
213213
clientId: applicationId,
214214
userCredential: new UserPasswordCredential(emailAddress, password)).Result;

memdocs/intune/enrollment/android-enroll.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ ms.collection:
3131
- highpri
3232
---
3333

34-
# Enroll Android devices
34+
# Enroll Android devices
3535

3636
[!INCLUDE [azure_portal](../includes/azure_portal.md)]
3737

@@ -41,7 +41,7 @@ As an Intune administrator, you can enroll Android devices in the following ways
4141
- [**Android Enterprise dedicated**](android-kiosk-enroll.md): For corporate-owned, single use devices, such as digital signage, ticket printing, or inventory management. Admins lock down the usage of a device for a limited set of apps and web links. It also prevents users from adding other apps or taking other actions on the device.
4242
- [**Android Enterprise fully managed**](android-fully-managed-enroll.md): For corporate-owned, single user devices used exclusively for work and not personal use. Admins can manage the entire device and enforce policy controls unavailable to personally-owned/corporate-owned work profiles.
4343
- [**Android Enterprise corporate-owned with a work profile**](android-corporate-owned-work-profile-enroll.md): For corporate-owned, single user devices intended for corporate and personal use.
44-
- [**Android device administrator**](android-enroll-device-administrator.md), including Samsung Knox Standard devices and [Zebra devices](../configuration/android-zebra-mx-overview.md). In areas where Android Enterprise is available, Google is encouraging movement off device administrator (DA) management by decreasing its management support in new Android releases. However, where Android Enterprise or Google Mobile Services (GMS) are unavailable, you'll want to use device administrator and familiarize yourself with these changes. For more information, see [Is Android Enterprise available in my country](https://support.google.com/work/android/answer/6270910)?
44+
- [**Android device administrator**](android-enroll-device-administrator.md), including Samsung Knox Standard devices and [Zebra devices](../configuration/android-zebra-mx-overview.md). Device administrator should be used in areas where Android Enterprise or Google Mobile Services (GMS) is unavailable. Google has decreased support for device administrator (DA) management in areas where Android Enterprise is available, and encourages organizations to migrate to Android Enterprise device management. For a list of countries that support Android Enterprise, see [Is Android Enterprise available in my country](https://support.google.com/work/android/answer/6270910)?
4545
- Android (AOSP), currently in public preview, offers a set of enrollment options for devices that aren't integrated with Google Mobile services.
4646
- [Corporate-owned, user associated devices](android-aosp-corporate-owned-user-associated-enroll.md): For corporate-owned, single user devices intended exclusively for work and not personal use. Admins can manage the entire device.
4747
- [Corporate-owned, userless devices](android-aosp-corporate-owned-userless-enroll.md): For corporate-owned, shared devices. Admins can manage the entire device.

memdocs/intune/enrollment/apple-mdm-push-certificate-get.md

Lines changed: 12 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -35,15 +35,14 @@ ms.collection:
3535

3636
[!INCLUDE [azure_portal](../includes/azure_portal.md)]
3737

38-
An Apple MDM Push certificate is required for Intune to manage iOS/iPadOS and macOS devices. After you add the certificate to Intune, your users can enroll their devices using:
38+
Upload and renew your Apple MDM push certificates in Microsoft Intune. An Apple MDM Push certificate is required to manage iOS/iPadOS and macOS devices in Microsoft Intune, and enables devices to enroll via:
3939

40-
- The Company Portal app.
40+
- The Intune Company Portal app.
41+
- Apple bulk enrollment methods, such as the Device Enrollment Program, Apple School Manager, and Apple Configurator.
4142

42-
- Apple's bulk enrollment methods like the Device Enrollment Program, Apple School Manager, or Apple Configurator.
43+
Certificates must be renewed annually.
4344

44-
For more information about enrollment options, see [Choose how to enroll iOS/iPadOS devices](ios-enroll.md).
45-
46-
When a push certificate expires, you must renew it. When renewing, make sure to use the same Apple ID that you used when you first created the push certificate.
45+
This article describes how to use Intune to create and renew an Apple MDM push certificate.
4746

4847

4948
## Steps to get your certificate
@@ -73,18 +72,22 @@ Record this ID as a reminder for when you need to renew this certificate.
7372
Go to the certificate (.pem) file, choose **Open**, and then choose **Upload**. With the push certificate, Intune can enroll and manage Apple devices.
7473

7574
## Renew Apple MDM push certificate
76-
The Apple MDM push certificate is valid for one year and must be renewed annually to maintain iOS/iPadOS and macOS device management. If your certificate expires, enrolled Apple devices cannot be contacted.
75+
The Apple MDM push certificate is valid for one year. You must renew it annually to maintain iOS/iPadOS and macOS device management. Once the certificate expires, there is a 30-day grace period to renew it.
7776

78-
The certificate is associated with the Apple ID used to create it. Renew the MDM push certificate with the same Apple ID used to create it.
77+
Renew the MDM push certificate with the same Apple ID you used to create it.
7978

8079
1. Sign in to the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), choose **Devices** > **Enroll devices** > **Apple enrollment** > **Apple MDM Push Certificate**.
8180
2. Choose **Download your CSR** to download and save the request file locally. The file is used to request a trust relationship certificate from the Apple Push Certificates Portal.
8281
3. Select **Create your MDM push Certificate** to go to the Apple Push Certificates Portal. Find the certificate you want to renew and select **Renew**.
8382
4. On the **Renew Push Certificate** screen, provide notes to help you identify the certificate in the future, select **Choose File** to browse to the new request file you downloaded, and choose **Upload**.
8483
> [!TIP]
85-
> A Certificate can be identified by its UID. Examine the **Subject ID** in the certificate details to find the GUID portion of the UID. Or, on an enrolled iOS/iPadOS device, go to **Settings** > **General** > **Device** **Management** > **Management Profile** > **More Details** > **Management Profile**. The second line item, **Topic**, contains the unique GUID that you can match up to the certificate in the Apple Push Certificates portal.
84+
> A certificate can be identified by its UID. Examine the **Subject ID** in the certificate details to find the GUID portion of the UID. Or, on an enrolled iOS/iPadOS device, go to **Settings** > **General** > **Device** **Management** > **Management Profile** > **More Details** > **Management Profile**. The second line item, **Topic**, contains the unique GUID that you can match up to the certificate in the Apple Push Certificates portal.
8685
8786
6. On the **Confirmation** screen, select **Download** and save the .pem file locally.
8887
7. In [Intune](https://go.microsoft.com/fwlink/?linkid=2090973), select the **Apple MDM push certificate** browse icon, select the .pem file downloaded from Apple, and choose **Upload**.
8988

9089
Your Apple MDM push certificate appears **Active** and has 365 days until expiration.
90+
91+
## Next steps
92+
93+
For more information about enrollment options, see [Choose how to enroll iOS/iPadOS devices](ios-enroll.md).

memdocs/intune/enrollment/backup-restore-ios.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ You might have to back up and restore an Intune Automated Device Enrollment (ADE
3838
To back up and restore an iOS/iPadOS device, you must follow the Apple instructions:
3939

4040
- To back up your device, see [How to back up your iPhone, iPad, and iPod touch](https://support.apple.com/HT203977).
41-
- To restore you device, see [Restore your iPhone, iPad, or iPod touch from a backup](https://support.apple.com/HT204184).
41+
- To restore your device, see [Restore your iPhone, iPad, or iPod touch from a backup](https://support.apple.com/HT204184).
4242
- To transfer data to a new device, see the following Apple support article:
4343
- [Use iCloud to transfer data from your previous iOS device to your new iPhone, iPad, or iPod touch](https://support.apple.com/HT210217)
4444

@@ -69,7 +69,8 @@ While it links files and documents, it doesn't typically restore any user data a
6969
### Specific to backup/restore
7070

7171
- In most cases, your MDM enrollment state (at the time of backup) isn't of any special significance. However, in a migration scenario where you are moving from one MDM vendor to another, it is important to be aware of.
72-
- When restoring a backup, taken while enrolled in MDM vendor A and restoring it on the same device but attempting to enroll in Intune, this will result in failure. The restore will be successful (no errors) as explained above, however since the management profile from MDM vendor A has been restored, the device isn't under management by Intune. Attempting to manually enroll the device using the Company Portal app will result in an error when trying to install the new Intune management profile "The new MDM payload doesn't match the old payload". To remediate this error, you would need to remove the existing management profile belonging to MDM vendor A and then re-enroll into Intune using Company Portal. Migrating from one Intune tenant to another Intune tenant would exhibit the same behavior.
72+
- When restoring a backup, taken while enrolled in MDM vendor A and restoring it on the same device but attempting to enroll in Intune, this will result in failure. The restore will be successful (no errors) as explained above, however since the management profile from MDM vendor A has been restored, the device isn't under management by Intune. Attempting to manually enroll the device using the Company Portal app will result in an error when trying to install the new Intune management profile "The new MDM payload doesn't match the old payload". To remediate this error, you would need to remove the existing management profile belonging to MDM vendor A and then re-enroll into Intune using Company Portal. Migrating from one Intune tenant to another Intune tenant would exhibit the same behavior.
73+
- To correctly and fully re-enroll an ADE device, a factory reset is required, and the device cannot be restored from its own backup (otherwise the ADE configuration and profiles in the backup will be applied).
7374

7475
### Migrating without wiping the device
7576

@@ -88,4 +89,4 @@ There is an additional migration scenario to consider, which should not be impac
8889
8990
## Next steps
9091

91-
[Learn more about Automated Device Enrollment](device-enrollment-program-enroll-ios.md).
92+
[Learn more about Automated Device Enrollment](device-enrollment-program-enroll-ios.md).

0 commit comments

Comments
 (0)