Skip to content

Commit a12e47e

Browse files
committed
Merge branch 'main' of https://github.com/microsoftdocs/memdocs-pr into erikre-oob2208-9740832
2 parents c849029 + 565797c commit a12e47e

14 files changed

Lines changed: 55 additions & 13 deletions

memdocs/autopilot/enrollment-autopilot.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -52,13 +52,12 @@ ms.collection:
5252

5353
- **Group type**: Select **Security**.
5454
- **Group name** and **Group description**: Enter a name and description for your group.
55-
- **Azure AD roles can be assigned to the group**: **Yes** allows Azure AD roles to be assigned to the group you're creating. Once set, the group is permanently and always allowed to be assigned Azure AD roles. When set to **No**, Azure AD roles aren't assigned to this group.
55+
- **Azure AD roles can be assigned to the group**: Select **No**, Azure AD roles aren't assigned to this group.
5656

5757
For more information, see [Use cloud groups to manage role assignments in Azure AD](/azure/active-directory/roles/groups-concept).
5858

59-
- **Membership type**: Choose how devices become members of this group. Select **Assigned**, **Dynamic user**, or **Dynamic Device**. For more information, see [Add groups to organize users and devices](../intune/fundamentals/groups-add.md).
59+
- **Membership type**: Choose how devices become members of this group. Select **Dynamic Device**. For more information, see [Add groups to organize users and devices](../intune/fundamentals/groups-add.md).
6060
- **Owners**: Select users that own the group. Owners can also delete this group.
61-
- **Members**: Select Autopilot devices that belong to this group. Autopilot devices that aren't enrolled show the serial number for the device name.
6261
- **Dynamic device members**: Select **Add dynamic query** > **Add expression**.
6362

6463
Create rules using Autopilot device attributes. Autopilot devices that meet these rules are automatically added to the group. Creating an expression using non-autopilot attributes doesn't guarantee that devices included in the group are registered to Autopilot.

memdocs/autopilot/existing-devices.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -85,7 +85,7 @@ If you want, you can set up an [enrollment status page](enrollment-status.md) (E
8585
Make sure the user account you specify has sufficient administrative rights.
8686
8787
```powershell
88-
Connect-MSGraphApp
88+
Connect-MSGraph
8989
```
9090
9191
Windows requests the user and password for your account with a standard Azure AD form. Type your username and password, and then select **Sign in**.

memdocs/autopilot/self-deploying.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,7 @@ Optionally, you can use a [device-only subscription](https://techcommunity.micro
7171
Self-deploying mode uses a device's TPM 2.0 hardware to authenticate the device into an organization's Azure AD tenant. Therefore, devices without TPM 2.0 can't be used with this mode. Devices must also support TPM device attestation. All new Windows devices should meet these requirements. The TPM attestation process also requires access to a set of HTTPS URLs that are unique for each TPM provider. For more information, see the entry for Autopilot self-Deploying mode and Autopilot pre-provisioning in [Networking requirements](networking-requirements.md#tpm). For Windows Autopilot software requirements, see [Windows Autopilot software requirements](./software-requirements.md).
7272

7373
> [!IMPORTANT]
74-
> If you attempt a self-deploying mode deployment on a device that does not have support TPM 2.0 or on a virtual machine, the process will fail when verifying the device with an 0x800705B4 timeout error (Hyper-V virtual TPMs are not supported). Also note that Windows 10, version 1903 or later is required to use self-deploying mode due to issues with TPM device attestation in Windows 10, version 1809. Since Windows 10 Enterprise 2019 LTSC is based on Windows 10 version 1809, self-deploying mode is also not supported on Windows 10 Enterprise 2019 LTSC.
74+
> If you attempt a self-deploying mode deployment on a device that does not have support TPM 2.0 or on a virtual machine, the process will fail when verifying the device with an 0x800705B4 timeout error (Hyper-V virtual TPMs are not supported). Also note that Windows 10, version 1903 or later is required to use self-deploying mode due to issues with TPM device attestation in Windows 10, version 1809.
7575
>
7676
> See [Windows Autopilot known issues](known-issues.md) and [Troubleshoot Autopilot device import and enrollment](troubleshoot-device-enrollment.md) to review other known errors and solutions.
7777

memdocs/configmgr/tenant-attach/breadcrumb/toc.yml

Lines changed: 21 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -21,3 +21,24 @@ items:
2121
- name: Tenant attach
2222
tocHref: /mem/intune/protect/
2323
topicHref: /mem/configmgr/tenant-attach/index
24+
25+
- name: Docs
26+
tocHref: /
27+
topicHref: /
28+
items:
29+
- name: Enterprise Mobility + Security
30+
tocHref: /enterprise-mobility-security/
31+
topicHref: /enterprise-mobility-security/
32+
items:
33+
- name: Microsoft Endpoint Manager
34+
tocHref: /mem/
35+
topicHref: /mem/
36+
items:
37+
- name: Configuration Manager
38+
tocHref: /mem/configmgr/
39+
topicHref: /mem/configmgr/index
40+
items:
41+
- name: Tenant attach
42+
tocHref: /mem/configmgr/cloud-attach/
43+
topicHref: /mem/configmgr/tenant-attach/index
44+

memdocs/intune/configuration/device-restrictions-windows-10.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -445,11 +445,9 @@ This device restrictions profile is directly related to the kiosk profile you cr
445445
- **Clear browsing data on exit** (desktop only): **Yes** clears the history, and browsing data when users exit Microsoft Edge. **No** (default) uses the OS default, which may cache the browsing data.
446446
- **Sync browser settings between user's devices**: Choose how you want to sync browser settings between devices. Your options:
447447
- **Allow**: Allow syncing of Microsoft Edge browser settings between user's devices
448-
- **Block and enable user override**: Block syncing of Microsoft Edge browser settings between user's devices. Users can override this setting.
448+
- **Block and enable user override**: Block syncing of Microsoft Edge browser settings between user's devices. Users can override this setting. When this option is selected, users can override the admin designation.
449449
- **Block**: Block syncing of Microsoft Edge browser setting between users devices. Users can't override this setting.
450450

451-
When "block and enable user override" is selected, user can override admin designation.
452-
453451
- **Allow Password Manager**: **Yes** (default) allows Microsoft Edge to automatically use Password Manager, which allows users to save and manage passwords on the device. **No** prevents Microsoft Edge from using Password Manager.
454452
- **Cookies**: Choose how cookies are handled in the web browser. Your options:
455453
- **Allow**: Cookies are stored on the device.

memdocs/intune/protect/device-compliance-get-started.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ keywords:
77
author: brenduns
88
ms.author: brenduns
99
manager: dougeby
10-
ms.date: 11/16/2021
10+
ms.date: 08/16/2022
1111
ms.topic: overview
1212
ms.service: microsoft-intune
1313
ms.subservice: protect
@@ -123,6 +123,7 @@ The following subjects link to dedicated articles for different aspects of devic
123123

124124
- [Android device administrator](compliance-policy-create-android.md)
125125
- [Android Enterprise](compliance-policy-create-android-for-work.md)
126+
- [Android Android Open Source Project (AOSP)](compliance-policy-create-android-aosp.md)
126127
- [iOS](compliance-policy-create-ios.md)
127128
- [macOS](compliance-policy-create-mac-os.md)
128129
- [Windows Holographic for Business](compliance-policy-create-windows.md#windows-holographic-for-business)

memdocs/intune/protect/encrypt-devices.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -187,7 +187,7 @@ To change the disk encryption type between full disk encryption and used space o
187187

188188
#### TPM startup PIN or key
189189

190-
A device **must not require** use of a startup PIN or startup key.
190+
A device **must not be set to require** a startup PIN or startup key.
191191

192192
When a TPM startup PIN or startup key is required on a device, BitLocker can't silently enable on the device and instead requires interaction from the end user. Settings to configure the TPM startup PIN or key are available in both the endpoint protection template and the BitLocker policy. By default, these policies do not configure these settings.
193193

@@ -289,4 +289,4 @@ For information about BitLocker deployments and requirements, see the [BitLocker
289289
- [Monitor disk encryption](../protect/encryption-monitor.md)
290290
- [Troubleshooting BitLocker policy](/troubleshoot/mem/intune/troubleshoot-bitlocker-policies)
291291
- [Known issues for Enforcing BitLocker policies with Intune](/windows/security/information-protection/bitlocker/ts-bitlocker-intune-issues)
292-
- [BitLocker management for enterprises](/windows/security/information-protection/bitlocker/bitlocker-management-for-enterprises), in the Windows security documentation
292+
- [BitLocker management for enterprises](/windows/security/information-protection/bitlocker/bitlocker-management-for-enterprises), in the Windows security documentation

memdocs/intune/protect/microsoft-tunnel-configure.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -365,7 +365,9 @@ For more information about *mst-cli*, see [Reference for Microsoft Tunnel](../pr
365365

366366
## Uninstall the Microsoft Tunnel
367367

368-
To uninstall the product, run **./mst-cli uninstall** from the Linux server as root.
368+
To uninstall the product, run **./mst-cli uninstall** from the Linux server as root.
369+
370+
After the product is uninstalled, delete the corresponding server record in the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431) under **Tenant administration** > **Microsoft Tunnel Gateway** > **Servers**.
369371

370372
## Next steps
371373

memdocs/intune/protect/windows-10-feature-updates.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -224,6 +224,9 @@ Selecting a profile from the list opens the profiles **Overview** pane where you
224224
- Select **Properties** to modify the deployment. On the *Properties* pane, select **Edit** to open the *Deployment settings or Assignments*, where you can then modify the deployment.
225225
- Select **End user update status** to view information about the policy.
226226

227+
> [!NOTE]
228+
> The End user update status Last Scanned Time value will return 'Not scanned yet' until an initial user logs on and Update Session Orchestrator (USO) scan is initiated. For more information on the Unified Update Platform (UUP) architecture and related components, see [Get started with Windows Update](/windows/deployment/update/windows-update-overview).
229+
227230
## Validation and reporting
228231

229232
There are multiple options to get in-depth reporting for Windows 10/11 updates with Intune. Windows update reports show details about your Windows 10 and Windows 11 devices side by side in the same report.
-3.65 KB
Loading

0 commit comments

Comments
 (0)