You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: memdocs/autopilot/existing-devices.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -56,7 +56,7 @@ To enable and configure the enrollment and status page:
56
56
57
57
1. Open [Intune in the Azure portal](https://aka.ms/intuneportal).
58
58
2. Access **Intune > Device enrollment > Windows enrollment** and [Set up an enrollment status page](/intune/windows-enrollment-status).
59
-
3. Access **Azure Active Directory > Mobility (MDM and MAM) > Microsoft Intune** and [Configure automatic MDM enrollment](/configmgr/mdm/deploy-use/enroll-hybrid-windows#enable-windows-10-automatic-enrollment) and configure the MDM user scope for some or all users.
59
+
3. Access **Azure Active Directory > Mobility (MDM and MAM) > Microsoft Intune** and [Configure automatic MDM enrollment](/configmgr/mdm/deploy-use/enroll-hybrid-windows#enable-windows-automatic-enrollment) and configure the MDM user scope for some or all users.
Copy file name to clipboardExpand all lines: memdocs/configmgr/comanage/how-to-monitor.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -91,7 +91,7 @@ There are hundreds of possible errors. The following table lists the most common
91
91
92
92
| Error | Description |
93
93
|---------|---------|
94
-
| 2147549183 (0x8000FFFF) | MDM enrollment hasn't been configured yet on Azure AD, or the enrollment URL isn't expected.<br><br>[Enable automatic enrollment](/intune/windows-enroll#enable-windows-10-automatic-enrollment)|
94
+
| 2147549183 (0x8000FFFF) | MDM enrollment hasn't been configured yet on Azure AD, or the enrollment URL isn't expected.<br><br>[Enable automatic enrollment](/intune/windows-enroll#enable-windows-automatic-enrollment)|
95
95
| 2149056536 (0x80180018)<br>MENROLL_E_USERLICENSE | License of user is in bad state blocking enrollment<br><br>[Assign licenses to users](/intune/licenses-assign)|
96
96
| 2149056555 (0x8018002B)<br>MENROLL_E_MDM_NOT_CONFIGURED | When trying to automatically enroll to Intune, but the Azure AD configuration isn't fully applied. This issue should be transient, as the device retries after a short time. |
97
97
| 2149056554 (0x8018002A)<br> | The user canceled the operation<br><br>If MDM enrollment requires multi-factor authentication, and the user hasn't signed in with a supported second factor, Windows displays a toast notification to the user to enroll. If the user doesn't respond to toast notification, this error occurs. This issue should be transient, as Configuration Manager will retry and prompt the user. Users should use multi-factor authentication when they sign in to Windows. Also educate them to expect this behavior, and if prompted, take action. |
Copy file name to clipboardExpand all lines: memdocs/configmgr/comanage/quickstart-upgrade-win10.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -24,7 +24,7 @@ In the following video, senior program manager Rob York and product marketing ma
24
24
25
25
Among other platform advancements, Windows 10 and later supports auto-enrollment. This behavior makes a device automatically enroll to Intune when it joined Azure Active Directory (Azure AD).
26
26
27
-
For more information, see [Enable Windows automatic enrollment](../../intune/enrollment/windows-enroll.md#enable-windows-10-automatic-enrollment).
27
+
For more information, see [Enable Windows automatic enrollment](../../intune/enrollment/windows-enroll.md#enable-windows-automatic-enrollment).
Copy file name to clipboardExpand all lines: memdocs/intune/apps/apps-supported-intune-apps.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -155,7 +155,7 @@ The following apps support the core Intune App Protection Policy settings. Apps
155
155
|**Egress Secure Mail for Intune**<p><imgalt="Partner app - Egress Secure Mail icon"src="./media/apps-supported-intune-apps/icon-p-egress-secure-mail-icon.png"width="100"> | Send and receive encrypted emails and files from your mobile device. Egress Secure Email provides user-friendly tools to secure sensitive data, with end-to-end encryption, access revocation and message restrictions to empower users to stay in control of the information they share.<p>The Egress Secure Email app requires you to be a licensed user of the Egress platform, with a valid subscription and appropriate infrastructure. |[Google Play link (Android)](https://play.google.com/store/apps/details?id=com.egress.switchdroid.intune)|
156
156
|**F2 Touch Intune**<p><imgalt="Partner app - F2 Touch Intune icon"src="./media/apps-supported-intune-apps/icon-p-f2-touch-intune-icon.png"width="100"> | With the F2 Touch app for iPad and iPhone, you can access and edit corporate case and document information. The app accesses the cBrain F2 eGovernment platform and enables employees and corporate management to securely perform their daily tasks while away from the office.<p><p>Key features of the F2 Touch for iPad and iPhone:<br><ul><li>Manage your inbox</li><li>Read and approve submittals</li><li>Read and create matters and documents</li><li>Chat</li><li>Search the corporate document archive</li></ul><p><p>**Note:** To use the F2 Touch Intune app with your business data, you must be a user of the F2 eGovernment platform, with mobile services and Intune enabled by your IT department. |[App Store link (iOS)](https://apps.apple.com/dk/app/f2-touch-intune/id1571703604)|
157
157
|**FactSet 3.0**<p><imgalt="Partner app - FactSet 3.0 icon"src="./media/apps-supported-intune-apps/icon-p-factset-icon.png"width="100"> | FactSet delivers superior analytics, service, content, and technology to help investment professionals see and seize opportunity sooner. Our Factset 3.0 app is a phone optimized experience that allows our subscribing users to leverage the power and intelligence of the FactSet workstation anytime, anywhere. |[Google Play link (Android)](https://play.google.com/store/apps/details?id=com.factset.wireless),<br>[App Store link (iOS)](https://apps.apple.com/app/factset-3-0/id1464041112)|
158
-
|**FleetSafer**<p><imgalt="Partner app - FleetSafer icon"src="./media/apps-supported-intune-apps/icon-p-fleet.png"width="100"> | FleetSafer is a risk measurement and mitigation tool that enforces communications policies and monitors safe driving practices. FleetSafer requires a Cogosense enterprise account. FleetSafer uses GPS or a connected cogoB smart device to automatically engage when driving movement is detected, disabling access to the device and silencing all calls and notifications. Calling text, social and email functionality is disabled. Driving behavior is monitored. |[Google Play link (Android)](https://play.google.com/store/apps/details?id=com.aegismobility.guardian),<br>[App Store link (iOS)](https://apps.apple.com/app/id957483278)|
158
+
|**FleetSafer**<p><imgalt="Partner app - FleetSafer icon"src="./media/apps-supported-intune-apps/icon-p-fleet.png"width="100"> | FleetSafer is a risk measurement and mitigation tool that enforces communications policies and monitors safe driving practices. FleetSafer requires a Cogosense enterprise account. FleetSafer uses GPS or a connected cogoB smart device to automatically engage when driving movement is detected, disabling access to the device and silencing all calls and notifications. Calling, text, social, and email functionality is disabled. Driving behavior is monitored. |[Google Play link (Android)](https://play.google.com/store/apps/details?id=com.aegismobility.guardian),<br>[App Store link (iOS)](https://apps.apple.com/app/id957483278)|
159
159
|**Fuze Mobile for Intune**<p><imgalt="Partner app - Fuze Mobile for Intune icon"src="./media/apps-supported-intune-apps/icon-p-fuze.png"width="100"> | Fuze Mobile for Intune allows end users to communicate using voice calling, video meetings, contact center, chat messaging, and content sharing. Admins can deploy Fuze Mobile securely and at scale in a BYOD context. Fuze Mobile for Intune requires both a Fuze account and a Microsoft managed environment. |[Google Play link (Android)](https://play.google.com/store/apps/details?id=com.fuze.fuzeappmdm),<br>[App Store link (iOS)](https://apps.apple.com/app/fuze-mobile-for-intune/id1530095324)|
160
160
| **Hearsay Relate for Intune**<p><img alt="Partner app - Hearsay Relate for Intune icon" src="./media/apps-supported-intune-apps/icon-p-hearsay-relate-icon.png" width="100"> | Hearsay Relate for Intune enables advisors to manage and nurture their book of business in a protected BYOD environment with mobile application management (MAM). This version of Hearsay Relate allows IT administrators to protect corporate data while keeping advisors in touch with their book of business.<br><br> Hearsay Relate, a mobile application that enables financial services professionals to move business forward. Leverage compliant texting and seamless voice calling to connect with your entire book of business. Stay productive with calendar integration to set appointments, and schedule reminder messages for upcoming meetings, birthday greetings, and more.<br>Hearsay Relate for Intune gives enterprise users all the features they expect from Hearsay Relate, while providing IT administrators the MAM functionality they need to keep corporate data safe. In the event of a lost or stolen device, IT can remove Hearsay Relate for Intune from the device along with any sensitive data associated with it. | [Google Play link (Android)](https://play.google.com/store/apps/details?id=com.hearsaysocial.messages.intune),<br>[App Store link (iOS)](https://apps.apple.com/app/hearsay-relate-for-intune/id1501771956) |
161
161
|**HowNow**<p><imgalt="Partner app - HowNow icon"src="./media/apps-supported-intune-apps/icon-p-hownow-icon.png"width="100"> | Use HowNow to get all the knowledge you need, everywhere you work. You can bring together the knowledge, business intelligence, and insights you need from a variety of internal and external sources. HowNow is tailored to you by personalizing learning for you based on your role, business goals, skill requirements, performance, and work you’re doing. You can teach, learn, and share knowledge with your team in any format you like at anytime, from anywhere. |[Google Play link (Android)](https://play.google.com/store/apps/details?id=com.hownow.gethownow),<br>[App Store link (iOS)](https://apps.apple.com/app/hownow/id1464131703)|
Copy file name to clipboardExpand all lines: memdocs/intune/apps/intune-management-extension.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -210,7 +210,7 @@ To see if the device is auto-enrolled, you can:
210
210
4. Open the `MDMDiagReport` in a web browser.
211
211
5. Search for the **MDMDeviceWithAAD** property. If the property exists, the device is auto-enrolled. If this property doesn't exist, then the device isn't auto-enrolled.
212
212
213
-
[Enable Windows 10 automatic enrollment](../enrollment/windows-enroll.md#enable-windows-10-automatic-enrollment) includes the steps to configure automatic enrollment in Intune.
213
+
[Enable Windows 10 automatic enrollment](../enrollment/windows-enroll.md#enable-windows-automatic-enrollment) includes the steps to configure automatic enrollment in Intune.
There are several methods to enroll your workforce's devices in Intune. Each method has different best practices and capabilities, as shown in the tables below.
36
36
37
37
## Best practices by enrollment method
38
-
|**Best practices**|**[Azure AD joined](windows-enroll.md#enable-windows-10-automatic-enrollment)**|**[Azure AD joined with Autopilot (User driven mode)](../../autopilot/enrollment-autopilot.md)**|**[Azure AD joined with Autopilot (Self deploying mode)](../../autopilot/enrollment-autopilot.md)**|**[Bulk](windows-bulk-enroll.md)**|**[DEM](device-enrollment-manager-enroll.md)**|**[BYOD](device-enrollment.md#bring-your-own-device)**|**[GPO](/windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy)**|**[Co-management](/configmgr/core/clients/manage/co-management-overview)**|
38
+
|**Best practices**|**[Azure AD joined](windows-enroll.md#enable-windows-automatic-enrollment)**|**[Azure AD joined with Autopilot (User driven mode)](../../autopilot/enrollment-autopilot.md)**|**[Azure AD joined with Autopilot (Self deploying mode)](../../autopilot/enrollment-autopilot.md)**|**[Bulk](windows-bulk-enroll.md)**|**[DEM](device-enrollment-manager-enroll.md)**|**[BYOD](device-enrollment.md#bring-your-own-device)**|**[GPO](/windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy)**|**[Co-management](/configmgr/core/clients/manage/co-management-overview)**|
|Commonly used in EDU|||||||||
41
41
|Devices can be used as shared devices|||||||||
@@ -44,7 +44,7 @@ There are several methods to enroll your workforce's devices in Intune. Each met
44
44
45
45
## Capabilities by enrollment method
46
46
47
-
|**Capabilities**|**[Azure AD joined](windows-enroll.md#enable-windows-10-automatic-enrollment)**|**[Azure AD joined with Autopilot (User driven mode)](../../autopilot/enrollment-autopilot.md)**|**[Azure AD joined with Autopilot (Self deploying mode)](../../autopilot/enrollment-autopilot.md)**|**[Bulk](windows-bulk-enroll.md)**|**[DEM](device-enrollment-manager-enroll.md)**|**[BYOD](device-enrollment.md#bring-your-own-device)**|**[GPO](/windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy)**|**[Co-management](/configmgr/core/clients/manage/co-management-overview)**|
47
+
|**Capabilities**|**[Azure AD joined](windows-enroll.md#enable-windows-automatic-enrollment)**|**[Azure AD joined with Autopilot (User driven mode)](../../autopilot/enrollment-autopilot.md)**|**[Azure AD joined with Autopilot (Self deploying mode)](../../autopilot/enrollment-autopilot.md)**|**[Bulk](windows-bulk-enroll.md)**|**[DEM](device-enrollment-manager-enroll.md)**|**[BYOD](device-enrollment.md#bring-your-own-device)**|**[GPO](/windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy)**|**[Co-management](/configmgr/core/clients/manage/co-management-overview)**|
|User gets associated with the device |||||||||
Copy file name to clipboardExpand all lines: memdocs/intune/enrollment/enrollment-restrictions-set.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -154,11 +154,11 @@ The following methods qualify as being authorized as a Windows corporate enrollm
154
154
- The device enrolls through GPO, or [automatic enrollment from Configuration Manager for co-management](/configmgr/comanage/quickstart-paths#bkmk_path1).
155
155
156
156
The following enrollments are marked as corporate by Intune. But since they don't offer the Intune administrator per-device control, they'll be blocked:
157
-
-[Automatic MDM enrollment](windows-enroll.md#enable-windows-10-automatic-enrollment) with [Azure Active Directory join during Windows setup](/azure/active-directory/device-management-azuread-joined-devices-frx)\*.
158
-
-[Automatic MDM enrollment](windows-enroll.md#enable-windows-10-automatic-enrollment) with [Azure Active Directory join from Windows Settings](/azure/active-directory/user-help/user-help-register-device-on-network)\*.
157
+
-[Automatic MDM enrollment](windows-enroll.md#enable-windows-automatic-enrollment) with [Azure Active Directory join during Windows setup](/azure/active-directory/device-management-azuread-joined-devices-frx)\*.
158
+
-[Automatic MDM enrollment](windows-enroll.md#enable-windows-automatic-enrollment) with [Azure Active Directory join from Windows Settings](/azure/active-directory/user-help/user-help-register-device-on-network)\*.
159
159
160
160
The following personal enrollment methods will also be blocked:
161
-
-[Automatic MDM enrollment](windows-enroll.md#enable-windows-10-automatic-enrollment) with [Add Work Account from Windows Settings](/azure/active-directory/user-help/user-help-join-device-on-network)\*.
161
+
-[Automatic MDM enrollment](windows-enroll.md#enable-windows-automatic-enrollment) with [Add Work Account from Windows Settings](/azure/active-directory/user-help/user-help-join-device-on-network)\*.
162
162
-[MDM enrollment only](/windows/client-management/mdm/mdm-enrollment-of-windows-devices#connecting-personally-owned-devices-bring-your-own-device) option from Windows Settings.
163
163
164
164
\* These won't be blocked if registered with Autopilot.
0 commit comments