Skip to content

Commit a4e91a7

Browse files
authored
Merge pull request #6214 from MicrosoftDocs/main
11/24/2021 AM Publish
2 parents f506516 + e7f461d commit a4e91a7

10 files changed

Lines changed: 316 additions & 43 deletions

File tree

memdocs/cloud-native-windows-endpoints.md

Lines changed: 27 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -297,20 +297,6 @@ Your cloud native endpoint will need some applications. To get started, we recom
297297

298298
To deploy Microsoft 365 Apps, see [Add Microsoft 365 apps to Windows devices using Microsoft Intune](./intune/apps/apps-add-office365.md)
299299

300-
- **Microsoft Edge**
301-
Microsoft Edge is the new browser from Microsoft built on Chromium open source. Edge can easily be deployed to devices using the built-in app profile in Intune.
302-
303-
To deploy Microsoft Edge, see [Add Microsoft Edge for Windows to Microsoft Intune](./intune/apps/apps-windows-edge.md).
304-
305-
> [!NOTE]
306-
> Microsoft Edge is included on devices that run:
307-
>
308-
> - Windows 11
309-
> - Windows 10 20H2 or later.
310-
> - Windows 10 1803 or later, with the May 2021 or later cumulative monthly security update.
311-
312-
For more information, see [New Microsoft Edge to replace Microsoft Edge Legacy with April’s Windows 10 Update Tuesday release](https://techcommunity.microsoft.com/t5/microsoft-365-blog/new-microsoft-edge-to-replace-microsoft-edge-legacy-with-april-s/ba-p/2114224).
313-
314300
- **Company Portal**
315301
Deploying the Intune *Company Portal* app to all devices as a required application is recommended. Company Portal is the self-service hub for users that they use to install applications from multiple sources, like Intune, Microsoft Store, and Configuration Manager. Users also use the portal to sync their device with Intune, check compliance status, and so on.
316302

@@ -496,9 +482,6 @@ For more information, see:
496482

497483
If you’d like more granular control for Windows Updates and you use Configuration Manager, consider [co-management](./configmgr/comanage/overview.md).
498484

499-
> [!NOTE]
500-
> Known Issue: Applying a Windows Update ring will cause a reboot during the Enrollment Status Page phase and require the user to authenticate again.
501-
502485
## Phase 4 – Apply customizations and review your on-premises configuration
503486

504487
:::image type="content" source="./media/cloud-native-windows-endpoints/phase-4.png" alt-text="Phase 4.":::
@@ -517,15 +500,28 @@ In this phase, you'll apply organization-specific settings, apps, and review you
517500
- [Applications](#applications)
518501

519502
### Microsoft Edge
503+
#### Microsoft Edge Deployment
504+
Microsoft Edge is included on devices that run:
505+
- Windows 11.
506+
- Windows 10 20H2 or later.
507+
- Windows 10 1803 or later, with the May 2021 or later cumulative monthly security update.
520508

509+
Microsoft Edge will update automatically post user logon. To trigger an update for Microsoft Edge during deployment you could run the following command:
510+
```powershell
511+
Start-Process -FilePath "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" -argumentlist "/silent /install appguid={56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}&appname=Microsoft%20Edge&needsadmin=True"
512+
```
513+
514+
To deploy Microsoft Edge to previous versions of Windows, see [Add Microsoft Edge for Windows to Microsoft Intune](./intune/apps/apps-windows-edge.md).
515+
516+
#### Microsoft Edge Configuration
521517
Two components of the Microsoft Edge experience, which apply when users sign in with their Microsoft 365 credentials, can be configured from the Microsoft 365 Admin Center.
522518

523519
- The start page logo in Microsoft Edge can be customized by configuring the *Your organization* section within the Microsoft 365 admin center. For more information, see [Customize ‎Office 365‎ for your organization](/microsoft-365/admin/setup/customize-your-organization-theme).
524520
- The default new tab page experience in Edge includes Office 365 information and personalized news. How this page is displayed can be customized from the Microsoft 365 admin center under **Settings** > **Org settings** > **News** > **Microsoft Edge new tab page**.
525521

526522
You can also set other settings for Microsoft Edge using settings catalog profiles. For example, you might want to configure specific sync settings for your organization.
527523

528-
- Microsoft Edge
524+
- **Microsoft Edge**
529525
- Configure the list of types that are excluded from synchronization - **passwords**
530526

531527
### Start and Taskbar layout
@@ -577,10 +573,22 @@ Following are some settings available in the settings catalog that might be rele
577573

578574
- **Block Gaming**
579575
Organizations might prefer that corporate endpoints cannot be used to play games. The Gaming page within the Settings app can be hidden entirely using the following setting.
580-
For additional information on the settings page visibility, refer to the CSP documentation [here](/windows/client-management/mdm/policy-csp-settings#settings-pagevisibilitylist) and the ms-settings URI scheme reference [here](/windows/uwp/launch-resume/launch-settings-app#ms-settings-uri-scheme-reference).
576+
For additional information on the settings page visibility, refer to the [CSP documentation](/windows/client-management/mdm/policy-csp-settings#settings-pagevisibilitylist) and the ms-settings [URI scheme reference](/windows/uwp/launch-resume/launch-settings-app#ms-settings-uri-scheme-reference).
581577
- Settings
582578
- Page Visibility List – **hide:gaming-gamebar;gaming-gamedvr;gaming-broadcasting;gaming-gamemode;gaming-trueplay;gaming-xboxnetworking;quietmomentsgame**
583579

580+
- **Control Chat Icon Visbility in Taskbar**
581+
The visiblity of the Chat icon in the Windows 11 taskbar can be controlled using the [Policy CSP](/windows/client-management/mdm/policy-csp-Experience#experience-configurechaticonvisibilityonthetaskbar).
582+
583+
- Experience
584+
- Configure Chat Icon - **Disabled**
585+
586+
- **Control which tenants the Teams desktop client can sign in to**
587+
When this policy is configured on a device, users can only sign in with accounts homed in an Azure AD tenant that is included in the "Tenant Allow List" defined in this policy. The "Tenant Allow List" is a comma seperated list of Azure AD tenant IDs. By specifing this policy and defining an Azure AD tenant you also block sign in to Teams for personal use. For more information see [How to restrict sign in on desktop devices](/microsoftteams/sign-in-teams#how-to-restrict-sign-in-on-desktop-devices).
588+
589+
- Administrative Templates \ Microsoft Teams
590+
- Restrict sign in to Teams to accounts in specific tenants (User) - **Enabled**
591+
584592
### Device Restrictions
585593

586594
Windows Device restrictions templates contain many of the settings required to secure and manage a Windows endpoint using Windows Configuration Service Providers (CSPs). More of these settings will be made available in the settings catalog over time. For more information, see [Device Restrictions](./intune/configuration/device-restrictions-configure.md).

memdocs/configmgr/core/clients/manage/collections/collection-evaluation.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -106,4 +106,3 @@ In the following example, installing DNS on the existing server makes it a membe
106106
- [Best practices for collections](best-practices-for-collections.md)
107107
- [View collection evaluation (starting in version 2010)](collection-evaluation-view.md)
108108
- [Collection Evaluation Viewer](../../../support/ceviewer.md)
109-
- [ConfigMgrDogs Troubleshoot ConfigMgr 2012](https://channel9.msdn.com/Events/TechEd/Australia/2014/DCI411) session at TechEd Australia

memdocs/configmgr/develop/core/understand/getting-started-with-configuration-manager-programming.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -35,8 +35,6 @@ To successfully automate or extend Configuration Manager, it is incredibly impor
3535

3636
#### Videos
3737

38-
- [Channel 9: Microsoft System Center 2012 Configuration Manager Overview](https://channel9.msdn.com/Events/TechEd/NorthAmerica/2012/MGT309)
39-
4038
- [YouTube: Technical Deep Dive: Configuration Manager 2012 Technical Overview](https://www.youtube.com/watch?v=qLACm3910_A)
4139

4240
#### Forums

memdocs/intune/fundamentals/whats-new.md

Lines changed: 23 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ keywords:
77
author: Erikre
88
ms.author: erikre
99
manager: dougeby
10-
ms.date: 11/16/2021
10+
ms.date: 11/23/2021
1111
ms.topic: reference
1212
ms.service: microsoft-intune
1313
ms.subservice: fundamentals
@@ -58,6 +58,28 @@ You can use RSS to be notified when this page is updated. For more information,
5858
### Scripts
5959
-->
6060

61+
## Week of November 22, 2021
62+
63+
<!-- vvvvvvvvvvvvvvvvvvvvvv -->
64+
65+
### Monitor and troubleshoot
66+
67+
#### Remote help app is available as a public preview<!-- 9843480 -->
68+
69+
As a public preview, you can use of the remote help app with your Intune tenant. With remote help, users who authenticate to your Azure Active directly can remotely assist others by connecting a remote help session between devices.
70+
71+
With permissions in remote help managed by Intune role-based access controls, you control who has permissions to help others and the actions they can take while assisting. The capabilities of remote help include:
72+
73+
- **Enable remote help for your tenant** –If you choose to turn on remote help, its use is enabled tenant-wide.
74+
- **Requires Organization login** - To use remote help, both the helper and the sharer must sign in with an Azure Active Directory (Azure AD) account from your organization.
75+
- **Use remote help with unenrolled devices** – You can choose to allow help to devices that aren't enrolled with Intune.
76+
- **Compliance Warnings** - Before connecting to device, a helper will see a non-compliance warning about that device if it’s not compliant to its assigned policies. This warning doesn’t block access but provides transparency about the risk of using sensitive data like administrative credentials during the session.
77+
- **Role-based access control** – Admins can set RBAC rules that determine the scope of a helper’s access and what the actions they can take while providing assistance.
78+
- **Elevation of privilege** - When needed, a helper with the correct RBAC permissions can interact with the UAC prompt on the sharer's machine to enter credentials.
79+
- **Monitor active remote help sessions, and view details about past sessions** – In the Microsoft Endpoint Manager admin center you can view reports that include details about who helped who, on what device, and for how long. You’ll also find details about active sessions.
80+
81+
This feature is rolling out over the next week and should soon be available for your tenant. For more information, see [Use remote help](../remote-actions/remote-help.md).
82+
6183
## Week of November 15, 2021 (Service release 2111)
6284

6385
<!-- vvvvvvvvvvvvvvvvvvvvvv -->

memdocs/intune/protect/encrypt-devices.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -180,7 +180,7 @@ All BitLocker recovery key accesses are audited. For more information on Audit L
180180

181181
When you’ve configured the tenant attach scenario, Microsoft Endpoint Manager can display recovery key data for tenant attached devices.
182182

183-
- To support the display of recovery keys for tenant attached devices, your Configuration Manager sites must run version 2107 or later. For sites that run 2107, you must install an update rollup to support Azure AD joined devices:. See [KB11121541](/configmgr/hotfix/2107/11121541).
183+
- To support the display of recovery keys for tenant attached devices, your Configuration Manager sites must run version 2107 or later. For sites that run 2107, you must install an update rollup to support Azure AD joined devices:. See [KB11121541](/mem/configmgr/hotfix/2107/11121541).
184184

185185
- To view the recovery keys, your Intune account must have the Intune RBAC permissions to view BitLocker keys, and must be associated with an on-premises user that has the related permissions for Configuration Manager of Collection Role, with Read Permission > Read BitLocker Recovery Key Permission. For more information see [Configure role-based administration for Configuration Manager](/configmgr/core/servers/deploy/configure/configure-role-based-administration).
186186

memdocs/intune/protect/mde-security-integration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -265,7 +265,7 @@ When you select a policy, you'll see information about the device check-in statu
265265
## Known limitations and considerations
266266

267267
### Co-existence with Microsoft Endpoint Configuration Manager
268-
When using Configuration Manager, the best path for management of security policy is using the [Configuration Manager tenant attach](/memdocs/configmgr/tenant-attach/endpoint-security-get-started). In some environments it may be desired to use Security Management for Microsoft Defender. When using Security Management for Microsoft Defender with Configuration Manager, endpoint security policy should be isolated to a single control plane. Controlling policy through both channels will create the opportunity for conflicts and undesired results.
268+
When using Configuration Manager, the best path for management of security policy is using the [Configuration Manager tenant attach](/mem/configmgr/tenant-attach/endpoint-security-get-started). In some environments it may be desired to use Security Management for Microsoft Defender. When using Security Management for Microsoft Defender with Configuration Manager, endpoint security policy should be isolated to a single control plane. Controlling policy through both channels will create the opportunity for conflicts and undesired results.
269269

270270
### Active Directory joined devices
271271

memdocs/intune/protect/security-baseline-settings-windows-365.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -125,7 +125,7 @@ For general information, see [Learn about attack surface reduction rules](/micro
125125

126126
- **Enable network protection**:
127127
Baseline default: *Enable*
128-
CSP: [Defender/EnableNetworkProtection](/windows/client-management/mdm/policy-csp-defender&preserve-view=true#defender-enablenetworkprotection)
128+
CSP: [Defender/EnableNetworkProtection](/windows/client-management/mdm/policy-csp-defender#defender-enablenetworkprotection)
129129

130130
- **Block untrusted and unsigned processes that run from USB**:
131131
Baseline default: *Block*
@@ -1261,4 +1261,4 @@ Audit settings configure the events that are generated for the conditions of the
12611261
Baseline default: *Enable*
12621262
[Reference for Tamper Protection](https://support.microsoft.com/windows/prevent-changes-to-security-settings-with-tamper-protection-31d51aaa-645d-408e-6ce7-8d7f8e593f87)
12631263

1264-
::: zone-end
1264+
::: zone-end

0 commit comments

Comments
 (0)