You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
### New Administrative Templates settings for Microsoft Edge 96 and Microsoft Edge updater on Windows devices<!--12426698-->
156
+
### New Administrative Templates settings for Microsoft Edge 96 and Microsoft Edge updater on Windows devices<!--12442597-->
157
157
In Intune, you can use Administrative Templates to configure Microsoft Edge settings (**Devices** > **Configuration profiles** > **Create profile** > **Windows 10 and later** for platform > **Templates** > **Administrative Templates** for profile type).
158
158
159
159
There are new Administrative Templates settings for Microsoft Edge 96 and the Microsoft Edge updater, including **Target Channel override** support. Use **Target Channel override** so users get the **Extended Stable** release cycle option, which can be set using Group Policy or through Intune.
Copy file name to clipboardExpand all lines: memdocs/intune/protect/antivirus-security-experience-windows-settings.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ keywords:
7
7
author: brenduns
8
8
ms.author: brenduns
9
9
manager: dougeby
10
-
ms.date: 05/11/2021
10
+
ms.date: 12/06/2021
11
11
ms.topic: reference
12
12
ms.service: microsoft-intune
13
13
ms.subservice: protect
@@ -106,7 +106,7 @@ View the Antivirus policy settings you can configure for the **Windows Security
106
106
107
107
Use this setting to block Windows Security notifications to your users for all of the preceding feature settings. Alternatively, you can manage the Windows Security app notifications per feature by using the proceeding settings.
108
108
109
-
-**Not configured** (*default*) - All Windows Security app notifications that are not controlled by another setting are allowed.
109
+
-**Not configured** (*default*) - This setting doesn't enforce a block of any settings and all Windows Security app notifications that are not controlled by another setting are allowed.
110
110
-**Block non-critical notification** - Notifications such as scan completions are blocked.
111
111
-**Block all notifications** - Critical and non-critical notifications are blocked for all Windows Security features.
Copy file name to clipboardExpand all lines: memdocs/intune/protect/encrypt-devices.md
+8-7Lines changed: 8 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ keywords:
7
7
author: brenduns
8
8
ms.author: brenduns
9
9
manager: dougeby
10
-
ms.date: 11/16/2021
10
+
ms.date: 12/06/2021
11
11
ms.topic: how-to
12
12
ms.service: microsoft-intune
13
13
ms.subservice: protect
@@ -73,7 +73,8 @@ Use one of the following procedures to create the policy type you prefer.
73
73
74
74
4. On the **Configuration settings** page, configure settings for BitLocker to meet your business needs.
75
75
76
-
If you want to enable BitLocker silently, see [Silently enable BitLocker on devices](#silently-enable-bitlocker-on-devices), in this article for additional prerequisites and the specific setting configurations you must use.
76
+
> [!TIP]
77
+
> If you want to enable BitLocker silently, you must use a Endpoint protection template as part of a device configuration profile and not an Endpoint security policy. See [Silently enable BitLocker on devices](#silently-enable-bitlocker-on-devices) in this article for additional prerequisites and the specific setting configurations you must use.
77
78
78
79
Select **Next**.
79
80
@@ -117,26 +118,26 @@ To view information about devices that receive BitLocker policy, see [Monitor di
117
118
118
119
### Silently enable BitLocker on devices
119
120
120
-
You can configure a BitLocker policy that automatically and silently enables BitLocker on a device. That means that BitLocker enables successfully without presenting any UI to the end user, even when that user isn't a local Administrator on the device.
121
+
You can use an *Endpoint protection* template as part of a *device configuration* profile to configure a BitLocker policy that automatically and silently enables BitLocker on a device. That means that BitLocker enables successfully without presenting any UI to the end user, even when that user isn't a local Administrator on the device.
121
122
122
123
**Device Prerequisites**:
123
124
124
125
A device must meet the following conditions to be eligible for silently enabling BitLocker:
125
126
126
127
- If end users log in to the devices as Administrators, the device must run Windows 10 version 1803 or later, or Windows 11.
127
-
- If end users log in to the the devices as Standard Users, the device must run Windows 10 version 1809 or later, or Windows 11.
128
+
- If end users log in to the devices as Standard Users, the device must run Windows 10 version 1809 or later, or Windows 11.
128
129
- The device must be Azure AD Joined or Hybrid Azure AD Joined.
129
130
- Device must contain at least TPM (Trusted Platform Module) 1.2.
130
131
- The BIOS mode must be set to Native UEFI only.
131
132
132
133
**BitLocker policy configuration**:
133
134
134
-
The following two settings for *BitLocker base settings* must be configured in the BitLocker policy:
135
+
The following two settings for *BitLocker base settings* must be configured in the BitLocker policy of a device configuration profile:
135
136
136
137
-**Warning for other disk encryption** = *Block*.
137
138
-**Allow standard users to enable encryption during Azure AD Join** = *Allow*
138
139
139
-
The BitLocker policy **must not require** use of a startup PIN or startup key. When a TPM startup PIN or startup key is *required*, BitLocker can not silently enable and requires interaction from the end user. This requirement is met through the following four *BitLocker OS drive settings* in the same policy:
140
+
The BitLocker policy **must not require** use of a startup PIN or startup key. When a TPM startup PIN or startup key is *required*, BitLocker can't silently enable and requires interaction from the end user. This requirement is met through the following four *BitLocker OS drive settings* in the same policy:
140
141
141
142
-**Compatible TPM startup** must be set to *Allowed* or *Required*
142
143
-**Compatible TPM startup PIN** must not be set to *Require startup PIN with TPM*
@@ -182,7 +183,7 @@ When you’ve configured the tenant attach scenario, Microsoft Endpoint Manager
182
183
183
184
- To support the display of recovery keys for tenant attached devices, your Configuration Manager sites must run version 2107 or later. For sites that run 2107, you must install an update rollup to support Azure AD joined devices:. See [KB11121541](/mem/configmgr/hotfix/2107/11121541).
184
185
185
-
- To view the recovery keys, your Intune account must have the Intune RBAC permissions to view BitLocker keys, and must be associated with an on-premises user that has the related permissions for Configuration Manager of Collection Role, with Read Permission > Read BitLocker Recovery Key Permission. For more information see [Configure role-based administration for Configuration Manager](/configmgr/core/servers/deploy/configure/configure-role-based-administration).
186
+
- To view the recovery keys, your Intune account must have the Intune RBAC permissions to view BitLocker keys, and must be associated with an on-premises user that has the related permissions for Configuration Manager of Collection Role, with Read Permission > Read BitLocker Recovery Key Permission. For more information, see [Configure role-based administration for Configuration Manager](/configmgr/core/servers/deploy/configure/configure-role-based-administration).
0 commit comments