Skip to content

Commit bab5560

Browse files
authored
Merge pull request #6296 from MicrosoftDocs/main
12/6/2021 AM Publish
2 parents 2409783 + 708354e commit bab5560

4 files changed

Lines changed: 12 additions & 11 deletions

File tree

memdocs/autopilot/software-requirements.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ The following editions are supported: Pro, Pro Education, Pro for Workstations,
5050

5151
### Windows 10
5252

53-
- A [supported version](/windows/release-health/) of Windows 10 Semi-Annual Channel is required.
53+
- A [supported version](/windows/release-health/) of Windows 10 Semi-Annual Channel or Windows 10 General Availability Channel is required.
5454
- The following editions are supported:
5555
- Windows 10 Pro
5656
- Windows 10 Pro Education

memdocs/intune/fundamentals/in-development.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -153,7 +153,7 @@ Applies to:
153153
- Android Enterprise corporate owned fully managed (COBO)
154154
- Android Enterprise dedicated devices (COSU)
155155

156-
### New Administrative Templates settings for Microsoft Edge 96 and Microsoft Edge updater on Windows devices<!-- 12426698 -->
156+
### New Administrative Templates settings for Microsoft Edge 96 and Microsoft Edge updater on Windows devices<!-- 12442597 -->
157157
In Intune, you can use Administrative Templates to configure Microsoft Edge settings (**Devices** > **Configuration profiles** > **Create profile** > **Windows 10 and later** for platform > **Templates** > **Administrative Templates** for profile type).
158158

159159
There are new Administrative Templates settings for Microsoft Edge 96 and the Microsoft Edge updater, including **Target Channel override** support. Use **Target Channel override** so users get the **Extended Stable** release cycle option, which can be set using Group Policy or through Intune.

memdocs/intune/protect/antivirus-security-experience-windows-settings.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ keywords:
77
author: brenduns
88
ms.author: brenduns
99
manager: dougeby
10-
ms.date: 05/11/2021
10+
ms.date: 12/06/2021
1111
ms.topic: reference
1212
ms.service: microsoft-intune
1313
ms.subservice: protect
@@ -106,7 +106,7 @@ View the Antivirus policy settings you can configure for the **Windows Security
106106

107107
Use this setting to block Windows Security notifications to your users for all of the preceding feature settings. Alternatively, you can manage the Windows Security app notifications per feature by using the proceeding settings.
108108

109-
- **Not configured** (*default*) - All Windows Security app notifications that are not controlled by another setting are allowed.
109+
- **Not configured** (*default*) - This setting doesn't enforce a block of any settings and all Windows Security app notifications that are not controlled by another setting are allowed.
110110
- **Block non-critical notification** - Notifications such as scan completions are blocked.
111111
- **Block all notifications** - Critical and non-critical notifications are blocked for all Windows Security features.
112112

memdocs/intune/protect/encrypt-devices.md

Lines changed: 8 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ keywords:
77
author: brenduns
88
ms.author: brenduns
99
manager: dougeby
10-
ms.date: 11/16/2021
10+
ms.date: 12/06/2021
1111
ms.topic: how-to
1212
ms.service: microsoft-intune
1313
ms.subservice: protect
@@ -73,7 +73,8 @@ Use one of the following procedures to create the policy type you prefer.
7373

7474
4. On the **Configuration settings** page, configure settings for BitLocker to meet your business needs.
7575

76-
If you want to enable BitLocker silently, see [Silently enable BitLocker on devices](#silently-enable-bitlocker-on-devices), in this article for additional prerequisites and the specific setting configurations you must use.
76+
> [!TIP]
77+
> If you want to enable BitLocker silently, you must use a Endpoint protection template as part of a device configuration profile and not an Endpoint security policy. See [Silently enable BitLocker on devices](#silently-enable-bitlocker-on-devices) in this article for additional prerequisites and the specific setting configurations you must use.
7778
7879
Select **Next**.
7980

@@ -117,26 +118,26 @@ To view information about devices that receive BitLocker policy, see [Monitor di
117118

118119
### Silently enable BitLocker on devices
119120

120-
You can configure a BitLocker policy that automatically and silently enables BitLocker on a device. That means that BitLocker enables successfully without presenting any UI to the end user, even when that user isn't a local Administrator on the device.
121+
You can use an *Endpoint protection* template as part of a *device configuration* profile to configure a BitLocker policy that automatically and silently enables BitLocker on a device. That means that BitLocker enables successfully without presenting any UI to the end user, even when that user isn't a local Administrator on the device.
121122

122123
**Device Prerequisites**:
123124

124125
A device must meet the following conditions to be eligible for silently enabling BitLocker:
125126

126127
- If end users log in to the devices as Administrators, the device must run Windows 10 version 1803 or later, or Windows 11.
127-
- If end users log in to the the devices as Standard Users, the device must run Windows 10 version 1809 or later, or Windows 11.
128+
- If end users log in to the devices as Standard Users, the device must run Windows 10 version 1809 or later, or Windows 11.
128129
- The device must be Azure AD Joined or Hybrid Azure AD Joined.
129130
- Device must contain at least TPM (Trusted Platform Module) 1.2.
130131
- The BIOS mode must be set to Native UEFI only.
131132

132133
**BitLocker policy configuration**:
133134

134-
The following two settings for *BitLocker base settings* must be configured in the BitLocker policy:
135+
The following two settings for *BitLocker base settings* must be configured in the BitLocker policy of a device configuration profile:
135136

136137
- **Warning for other disk encryption** = *Block*.
137138
- **Allow standard users to enable encryption during Azure AD Join** = *Allow*
138139

139-
The BitLocker policy **must not require** use of a startup PIN or startup key. When a TPM startup PIN or startup key is *required*, BitLocker can not silently enable and requires interaction from the end user. This requirement is met through the following four *BitLocker OS drive settings* in the same policy:
140+
The BitLocker policy **must not require** use of a startup PIN or startup key. When a TPM startup PIN or startup key is *required*, BitLocker can't silently enable and requires interaction from the end user. This requirement is met through the following four *BitLocker OS drive settings* in the same policy:
140141

141142
- **Compatible TPM startup** must be set to *Allowed* or *Required*
142143
- **Compatible TPM startup PIN** must not be set to *Require startup PIN with TPM*
@@ -182,7 +183,7 @@ When you’ve configured the tenant attach scenario, Microsoft Endpoint Manager
182183

183184
- To support the display of recovery keys for tenant attached devices, your Configuration Manager sites must run version 2107 or later. For sites that run 2107, you must install an update rollup to support Azure AD joined devices:. See [KB11121541](/mem/configmgr/hotfix/2107/11121541).
184185

185-
- To view the recovery keys, your Intune account must have the Intune RBAC permissions to view BitLocker keys, and must be associated with an on-premises user that has the related permissions for Configuration Manager of Collection Role, with Read Permission > Read BitLocker Recovery Key Permission. For more information see [Configure role-based administration for Configuration Manager](/configmgr/core/servers/deploy/configure/configure-role-based-administration).
186+
- To view the recovery keys, your Intune account must have the Intune RBAC permissions to view BitLocker keys, and must be associated with an on-premises user that has the related permissions for Configuration Manager of Collection Role, with Read Permission > Read BitLocker Recovery Key Permission. For more information, see [Configure role-based administration for Configuration Manager](/configmgr/core/servers/deploy/configure/configure-role-based-administration).
186187

187188

188189
### Rotate BitLocker recovery keys

0 commit comments

Comments
 (0)